last executing test programs: 53.986443601s ago: executing program 2 (id=1148): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000110b0008850000000500000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xa) (async, rerun: 64) socket$kcm(0x10, 0x2, 0x0) (async) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x6c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x800}, 0x0, 0x7, 0x0, 0x7, 0x6, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$kcm(0x2, 0x3, 0x84) r2 = socket$kcm(0xa, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000040)={0xa, 0xa, @local}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="24c0359fbd7fc446c85da2", 0xfffffffffffffe9b}, {&(0x7f0000000340)="73a18447286c6d07b7703c10f1b9241e6d9955dff45fca129da46eedf1240e89b7", 0x31}], 0x2, 0x0, 0x0, 0xa6820000}, 0xafe6) (async) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x0, 0x0) (async) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x2, {0x2, 0x0, @empty}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[], 0x18, 0x68000000}, 0x0) r3 = socket$kcm(0xa, 0x6, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000002280)=ANY=[@ANYBLOB="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"/3636], &(0x7f0000000040)='GPL\x00', 0x4, 0xfdc0, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x70) setsockopt$sock_attach_bpf(r3, 0x29, 0x22, &(0x7f0000000100)=r4, 0x120) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', r0, 0x4000, r1}, 0x18) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0d, 0x0, @perf_config_ext={0x1, 0x80}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94b4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x3, 0x12, &(0x7f0000000040)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x26, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0xb4}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) (async) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r5}, 0x38) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000c40)="00800000000000004284860186dd", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x50) (rerun: 32) 53.706203878s ago: executing program 2 (id=1152): r0 = socket$kcm(0x2, 0x3, 0x106) sendmsg$inet(r0, &(0x7f00000016c0)={&(0x7f0000000180)={0x2, 0xebff, @dev}, 0x10, &(0x7f0000001640)=[{&(0x7f0000000540)="83ac6f4b9a2ffa25922fee4db5d86075d7965b13", 0xffeb}], 0x2, 0x0, 0x0, 0x1000000}, 0x0) 53.57219722s ago: executing program 3 (id=1153): r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000040)=""/82, 0x52}, {&(0x7f00000047c0)=""/4042, 0xfca}, {&(0x7f0000001140)=""/227, 0xe3}, {&(0x7f0000000300)=""/158, 0x9e}, {&(0x7f00000003c0)=""/143, 0x8f}, {&(0x7f0000000b00)=""/185, 0xb9}, {&(0x7f0000000bc0)=""/165, 0xa5}, {&(0x7f0000000c80)=""/249, 0xf9}, {&(0x7f00000000c0)=""/56, 0x38}, {&(0x7f0000000d80)=""/133, 0x85}], 0xa}, 0x2000) recvmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x20000000) 53.560345473s ago: executing program 0 (id=1154): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x3, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000f9ff0000000000000000008500000020000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x4}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000680)="e0b9547ed387dbe9abc89b6f5bff", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0x50) 53.507321821s ago: executing program 2 (id=1155): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfc79, &(0x7f0000000140)=[{&(0x7f00000004c0)="d800000018009f064e81f744db4cb904021d0800fd02fe02e8fe50a10a001100250000000c600e41b0000900ac00082025000000a4000b000a00ff150048035c3b61c1d67f6f94007134cf6efb8000a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d31afe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667daffffff5ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5b7276505de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9000001008af26c8b7b55f4d2a6823a4500000000", 0xd8}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f00000002c0), 0x4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000140)="2e00000010008188040f80ec59acbc0413a1f8480d0000005e140602000000000e000a00100000000580607ee622", 0x2e}], 0x30a}, 0x24000044) r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0500000005000000fd09000084"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x800, r5}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000000c0)={0x0, &(0x7f00000012c0)=""/54, &(0x7f0000001380), &(0x7f0000000100), 0x3, r5}, 0x38) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@map, 0x11, 0x1, 0x8000, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0], 0x0}, 0x40) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x3}, 0x50) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000200)={0x0, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0)=r8, 0x4) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r8, 0x4) r9 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x2, @perf_bp={0x0, 0xa}, 0x104105, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={@cgroup=r11, r4, 0x2, 0x10, 0xffffffffffffffff, @void, @value=r10, @void, @void, r6}, 0x20) r12 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r12, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c01803003a000b12d25a80648c2594f90324fc60100c034002a10100feff000037153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)=ANY=[@ANYRES32=r7, @ANYRES32=r4, @ANYBLOB="0f0000002c2000000000000051d89852eda4", @ANYRES32=r8, @ANYBLOB, @ANYRES64=r6], 0x20) 53.346763238s ago: executing program 0 (id=1156): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xac, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x5, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000d"], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x4, 0x4, 0xe, 0x10, 0xffffffffffffffff, 0xfffffffd}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000007300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000bc0)={r1, 0x0, 0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.stat\x00', 0x26e1, 0x0) socketpair(0x1, 0x20000000000001, 0x100, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8948, &(0x7f0000000000)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x00 \'Y\x17]\x15c\xcaR\xdd\x98OGK\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb7s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0R\xd3\x8a\xe1n\x97\xea\xf1\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB\x01\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\tb\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18\x00\b\x00\x00Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000500)={0x3, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x26600, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x2, 0x20000}, 0x102065, 0x0, 0x0, 0x3, 0x7, 0x1, 0x3, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="7a0af8ff75257075bfa100000000000007010000f9ffffffb702000005000000bf130000000000008500000006000000b7000000000000009500000000000000b2595285faa6ead0169191d54f8196217fc560e2fc91f6da4dad4fdc2eb1b257183fa3bcd48666d1ddd73f3047d248df061222193165274bc7f2382f6cda4bfdd45be583823c0f09601f3c1c65ee19ee875daf45006a4c4ea5e15b2f9618d547244a22000000000000db453620ce7243d1aebd00000000000000005839c77edf2d34b12cd48a0c20fb7dd843267e0331759f4ec6b5b0af58e604f4942eb613eff289026d5045ef76d7d864409eb2dcc718a09f4886afc26abba34635d0e8b54bc76be40d435aa8b5202db761014b1b999a12df6bee431a666100"/292], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x2800000002000000, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x7300, 0x4000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x4}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x12, 0x7, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x40}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{r4}, &(0x7f0000000700), &(0x7f0000000740)=r2}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) socket$kcm(0x2, 0x5, 0x84) 52.834741984s ago: executing program 0 (id=1158): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x3b, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x5}, 0x100e64, 0xc78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x72bd1de2ad10b2f3, 0x63, 0xcfb5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x84000, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8940, &(0x7f0000000080)) 52.38254077s ago: executing program 3 (id=1159): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0xf, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014001e00b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f00000000c0)=r4) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000040000", @ANYRESDEC], 0xffdd) 52.236759184s ago: executing program 2 (id=1160): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0xe) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x7, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa10000000000000701000000feffffbfa40000000000000708000000feffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000c500000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x120}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x40, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETOFFLOAD(r1, 0x400454c9, 0xba98575a95aeb70d) ioctl$TUNATTACHFILTER(r1, 0x401054d5, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd79, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x1, 0x106) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x9, &(0x7f00000001c0)=@raw=[@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @func, @jmp={0x5, 0x1, 0x5, 0x3, 0x13, 0xffffffffffffffff}, @tail_call], &(0x7f0000000280)='syzkaller\x00', 0x5, 0x25, &(0x7f00000002c0)=""/37, 0x41100, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000380)=[{0x3, 0x1, 0x1, 0x7}, {0x3, 0x5, 0xd, 0x9}, {0x3, 0x2, 0xf, 0x6}, {0x4, 0x1, 0xc, 0xb}, {0x1, 0x5, 0x8, 0x1}], 0x10, 0x9}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={@cgroup, 0x14, 0x0, 0x1, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000680)=[0x0, 0x0], &(0x7f00000006c0)=[0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000840)={{0x1, 0xffffffffffffffff}, &(0x7f00000007c0), &(0x7f0000000800)='%pi6 \x00'}, 0x20) r6 = socket$kcm(0xa, 0x6, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020023000b02d25a806f8c6394f90224fc602f1a99000a740100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x5, 0x4, 0x1, 0x9}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r9}, 0xc) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001ac0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0xffff) setsockopt$sock_attach_bpf(r6, 0x10d, 0xb, &(0x7f0000000000)=r10, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000780)={@map=r5, r3, 0x31, 0x2010, 0x0, @value=r10, @void, @void, @void, r4}, 0x20) setsockopt$sock_attach_bpf(r2, 0x29, 0x4e, 0x0, 0x0) r11 = socket$kcm(0x10, 0x2, 0x4) close(r11) socket$kcm(0x10, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000400)={'vcan0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x31}}) sendmsg$inet(r11, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="5c00000010006bcc9e3be35c6e17aa0b006b876c1d0000007ea60864160af365310012c008000200070002002500020003a9e99fd8dc7add954664bc24eab556a705251e6182942259e65f0151f60a84c9f4d4938037e786a6d00010", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x80) 52.182229513s ago: executing program 0 (id=1161): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000580)="5c00000052006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038021d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d49380e78ff6a1577ae18c819945fb4e37e70e4509c5", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x10) recvmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x20000000) recvmsg$kcm(r0, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x40000120) 51.24626951s ago: executing program 0 (id=1162): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close(r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x301) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r1, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000280)="d8000000180081064e81f782db4cb904021d0800fd0002020c600e41b0000900ac00060311000000040005000a0012000048035c3b61c1d67f6f94007134cf6efb8000a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9000000008af26c8b7b55f4d2a6823a45f28fcb1d00"/216, 0xd8}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000000c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xdc, &(0x7f0000000440)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x12, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=r5, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r6, 0x20, &(0x7f0000000380)={&(0x7f0000000080)=""/27, 0x1b, 0x0, &(0x7f0000000180)=""/228, 0xe4}}, 0x10) 51.027867226s ago: executing program 1 (id=1164): r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000001340)=@hci={0x1f, 0x8, 0x2c}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000000)='G', 0x1}], 0x1, 0x0, 0x0, 0xe000}, 0x48891) 50.909813416s ago: executing program 1 (id=1165): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x12, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000000000000000000031d0851000000600000018040000c28c000063df499b1dda77beee057774217b5ca2183692973c4f808e8fedad7e67aa25162ef0921a2613cf8749c254360895ca7eaa3501a7c4666e67aaea032615af14894fe77a6a8552c766cacfeb6e8c03c2f38cb9cd60b027e7d7e446b0be99cb5fb6aecc5e1921d81d4c87fe9f98bfee73b66bd3be1e2e62813d6945866a634453cb9d65ba1f53e9484f33", @ANYRES32, @ANYBLOB="0000000000000000660000000000000018000000000000000000000000000000950000000000000018010000202070250000000000202020db1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b502000000100000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0xce, &(0x7f0000000340)=""/206, 0x41000, 0xf}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"/2767], &(0x7f00000001c0)='GPL\x00'}, 0x48) r0 = socket$kcm(0x10, 0x3, 0x10) socket$kcm(0x29, 0x5, 0x0) sendmsg$inet(r0, &(0x7f00000006c0)={&(0x7f0000000440)={0x2, 0x4e24, @local}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000480)="b793108dc129a24d3b3fb2be3ea0f5c80b0c5d50b43fc53a0b0ea558ed1f53113a71b637fad27361d4f2990a0d7361ca90c1d0ec98a3b2153a61138d68d12f03921fb71577c6baa26aa694d54d584db4f452762b0ccea5beaa56491a58aeacffe9c51d75b3675017455c360976ec205cd761a37a603fe4d9f5faee49b6d4634584e10e76c00f4ed0", 0x88}, {&(0x7f0000000540)="cf91d1ef6f26a541c05ae5e8aae644ba05e9ea2349e0eed91ca6ec6f9707035d1b505159bfaf2e17e188f7e9cb5e21958976c4670d8456501402d98108647de290ef2394f8a78d39fc1634dfdfd51014bdc84d25057727b7cdad6dddd18e01069557abfdcbb28d0ac49cc51e1de4453122571a20e448d37b9b31e69f24e8bd1194c3b5b408af82da24a9cfd7070ef7e10083757808f4f4ed5331c1e496ffd1406c7d516e896982aa04729fe675b9745e6bd74e0c811a545d198be336eb5b9930ef6bb73241245559d0e6fe267d89d594d8d037135eb54bdca3334487af", 0xdd}], 0x2, &(0x7f0000000680)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xe}}], 0x18}, 0xc8) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="d8000000180081064e81f782db00b904021d0800fd007c05e8fe55a10a000140014002020a0e1888caa971afff00060411000000160026000a0003000248035c3b61c1d67f6f94007134cf6efb8000a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43dbb19703920723f9000000008af26c8b7b55f4d2a6823a45f28fcb1d", 0xd8}], 0x1}, 0x0) socket$kcm(0x11, 0xa, 0x300) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f00000002c0)='syzkaller\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="259a53f271a76d2688a24c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000100)=r5, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x24008000) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000dc0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, r5, 0x5, 0x4, 0x3}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000e40)=r6, 0x4) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'ipvlan1\x00', 0x400}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r8, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) setsockopt$sock_attach_bpf(r4, 0x1, 0x4c, &(0x7f0000000000), 0x4) sendmsg$unix(r3, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="140000"], 0x18}, 0x0) recvmsg$unix(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x0) 49.201973822s ago: executing program 3 (id=1166): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xac, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x5, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000d"], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x4, 0x4, 0xe, 0x10, 0xffffffffffffffff, 0xfffffffd}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000007300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000bc0)={r1, 0x0, 0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.stat\x00', 0x26e1, 0x0) socketpair(0x1, 0x20000000000001, 0x100, &(0x7f00000006c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8948, &(0x7f0000000000)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x00 \'Y\x17]\x15c\xcaR\xdd\x98OGK\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb7s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0R\xd3\x8a\xe1n\x97\xea\xf1\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB\x01\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\tb\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18\x00\b\x00\x00Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000500)={0x3, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x26600, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x2, 0x20000}, 0x102065, 0x0, 0x0, 0x3, 0x7, 0x1, 0x3, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/292], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x2800000002000000, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x7300, 0x4000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x4}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x12, 0x7, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x40}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{r4}, &(0x7f0000000700), &(0x7f0000000740)=r2}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) socket$kcm(0x2, 0x5, 0x84) 49.110494107s ago: executing program 2 (id=1167): r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000040)=""/82, 0x52}, {&(0x7f00000047c0)=""/4042, 0xfca}, {&(0x7f0000001140)=""/227, 0xe3}, {&(0x7f0000000300)=""/158, 0x9e}, {&(0x7f00000003c0)=""/143, 0x8f}, {&(0x7f0000000b00)=""/185, 0xb9}, {&(0x7f0000000bc0)=""/165, 0xa5}, {&(0x7f0000000c80)=""/249, 0xf9}, {&(0x7f00000000c0)=""/56, 0x38}, {&(0x7f0000000d80)=""/133, 0x85}], 0xa}, 0x2000) recvmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x20000000) 48.96993874s ago: executing program 1 (id=1169): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffe}, [@call={0x85, 0x0, 0x0, 0x2f}, @call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f86dd", 0x0, 0x104, 0x0, 0x2f00, 0x0, 0x0, 0x0}, 0x50) 48.943947104s ago: executing program 3 (id=1170): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6000000005c31, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x100c, 0x0, 0x2002, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = socket$kcm(0x2, 0x1000000000000005, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x41, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x4156, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x12640, 0x0, 0xfffffffe, 0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x3) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x3, 0x9, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000080)=ANY=[@ANYBLOB="180300000000000000000000000000008510000006000000180000002000000000000000000000007f00000000000000180000000000002000000000000000009500000000000000540300000400000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x45}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002f000b08d25a80648c7494f90424fc600b0002", 0x17}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="934300005a"], 0xfe33) sendmsg$inet(r0, &(0x7f0000007940)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="20000000000000008400000002000000"], 0x20}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) socket$kcm(0x10, 0x400000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x3a, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f00000003c0)={&(0x7f00000002c0)=@abs, 0x6e, &(0x7f0000000340), 0x0, &(0x7f0000000380)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x12000) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/27], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 48.943569425s ago: executing program 1 (id=1171): r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xed, 0x7, 0x0, 0x0, 0x0, 0x804, 0x14c9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, @perf_config_ext={0x1, 0x800004}, 0xa0, 0x58, 0x0, 0x4, 0x2, 0x0, 0x1}, 0x0, 0x4, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a00000006000000080000000800000040000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000fe00000000f20000"], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x4, 0x2, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b703000000000000850000007300000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 48.926772327s ago: executing program 0 (id=1172): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000800000000000000", @ANYRES32, @ANYBLOB="0000ffff46791c00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r0, &(0x7f00000001c0), &(0x7f0000000080)=""/45}, 0x20) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000a40)="89000000120081ae08060cdc030ec0007f03e3f700000000001f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e7d4ba3a0093b837dc6cc01e32efaec8c7a6ec081207000000080001400400446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538a7fff4f2cbbe8d5e6dde60978c05a90ed65a6", 0x89}], 0x1}, 0x20) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x2, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x28}, @printk={@llx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x7b}}]}, &(0x7f0000000680)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000500)="0000000000000000000051229dc9", 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) ioctl$TUNSETOFFLOAD(r2, 0x4004743d, 0x110c230002) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x100084, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r5, &(0x7f00000000c0)={&(0x7f0000000100)=@ieee802154={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0002}}}, 0x80, &(0x7f0000000480)=[{&(0x7f00000007c0)="27031c0016001400020000000000000006e1f0000000890900000002ee1680ca82973d2bd4b836954268e611", 0x2c}, {&(0x7f0000001980)="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", 0x1c0}], 0x2}, 0x24000008) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYRESHEX=r2, @ANYRES32=r6, @ANYRES16=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r7, 0x2000000, 0xe, 0x0, &(0x7f0000000500)="630b00dcb95b0e4afdb20104bb4e", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) 48.019528929s ago: executing program 2 (id=1173): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0xe, 0x0, 0x0, 0x0, 0x5, 0x200, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0xcdd, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x3, 0x0, 0x500) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84480, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair(0x1d, 0x3, 0x1, &(0x7f00000014c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0500000000f01f00810000007f00000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r2, 0x0, 0x0}, 0x20) r3 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r3, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1, &(0x7f0000000580)}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x10, &(0x7f0000000040), 0x4) sendmsg$unix(r5, &(0x7f0000000640)={&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000001280)='\\', 0xffffffe3}], 0x1}, 0x24004044) ioctl$SIOCSIFHWADDR(r4, 0x8b29, &(0x7f0000000000)={'wlan1\x00', @random="010000000700"}) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x9, 0x9, 0x80000005, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0xfffffffffffffff8, 0x3}, 0x0, 0x0, 0x2, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000000500)={0x0, 0x4100, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x3) recvmsg$unix(r8, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x40000000) close(r7) sendmsg$tipc(r6, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, 0x0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x10, 0xd, &(0x7f0000000080)=ANY=[@ANYBLOB="180200000000000000000000000007008510000001000000950000000000000018010000202073250000000000202020731af8ff00000000bf9600000000000007010000f8ffffffb702000008000000b70300000000002885000000c700000095"], &(0x7f0000000000)='syzkaller\x00', 0x8, 0x90, &(0x7f00000001c0)=""/144, 0x41100, 0x20}, 0x94) 48.006200341s ago: executing program 1 (id=1181): r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000040)=""/82, 0x52}, {&(0x7f00000047c0)=""/4042, 0xfca}, {&(0x7f0000001140)=""/227, 0xe3}, {&(0x7f0000000300)=""/158, 0x9e}, {&(0x7f00000003c0)=""/143, 0x8f}, {&(0x7f0000000b00)=""/185, 0xb9}, {&(0x7f0000000bc0)=""/165, 0xa5}, {&(0x7f0000000c80)=""/249, 0xf9}, {&(0x7f00000000c0)=""/56, 0x38}, {&(0x7f0000000d80)=""/133, 0x85}], 0xa}, 0x2000) recvmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x20000000) 47.257722557s ago: executing program 3 (id=1174): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000, 0x4, 0x2, 0x0, 0x80, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 46.484521416s ago: executing program 1 (id=1175): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0xcdd, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x1e, 0x5, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r1 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x1004, 0x6dd700000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xd, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @sock_ops}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d80000001800810804000000db44b904021d080010000000e8fe55a10a", 0x1d}], 0x1, 0x0, 0x0, 0x6000}, 0x6000800) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x3, 0x2, 0x2}}, 0x80, 0x0}, 0x0) close(0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="d8000000210081044e81f7d28344b904020000", 0x2}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x33fe0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x2, 0xb6, 0xd, 0xf2, 0x0, 0x7fffffff, 0x2000, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x102000, 0x7fffffffffffffff, 0x1, 0x2, 0xf, 0x5, 0x7, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0x4, r1, 0x2) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x6}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x35, &(0x7f00000005c0), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)=ANY=[], 0x50) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x0, 0x37, 0x0, 0x0, 0x1}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000080)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@map=r0, 0x2b, 0x1, 0x8, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, 0x0, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0]}, 0x40) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x11, 0x4, 0x4, 0x2, 0x0, 0x1, 0x1000000}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x6, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b80)={r7, 0x2000012, 0xe, 0x0, &(0x7f0000000000)="63ec90c97b265715fe27cd9359a4", 0x0, 0xe6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xd}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a2, &(0x7f0000000080)) 46.483950796s ago: executing program 3 (id=1176): openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x6, 0xc, 0x80000000, 0x1, 0xffffffffffffffff, 0x3}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f00000004c0)="d8000000180081064e81f782db4cb904021d0800fd007c05e8fe50a10a000600014002020c600e41b000090008000005020000f2a40015000a00ff150048035c3b61c1d67f6f94007134cf6efb8007a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667daffffffffff1f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5b7276505de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9000001008af26c8b7b55f4d2a6823a45", 0xd8}], 0x1}, 0xc842) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x2000000, 0xe, 0x48, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext={0x0, 0x1000000}, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='.//\x00\x00\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x100000000003, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa19a, 0x1000}, 0x0, 0x0, 0xffffffff, 0x1, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000340)='\"pu\t&0&&\t') bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d080006007c09e8fe55a10a0015000900142603600e1208000f0000000401a80016002000014003000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0x98, 0x0, &(0x7f0000000680)="7993ff011900000000a63b00008f20e94d079f199b8a1fb521f3756a955ecdf157902f64d1c3c941187f21467c767be90f8829742af2bc17d5721b550573478b6b8282040c5a3747186fdbb5cd07a005be37af4306c2444dad7bc6bee8ca671654ba67b740554a723ad450d2fe05e561efd5b5fd646a06d273ca188f346864bb2a4ba3f2ea1dfb3a21122eae0d8b60fad85a08720d94453f", 0x0, 0x400, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe}, 0x50) 0s ago: executing program 32 (id=1172): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000800000000000000", @ANYRES32, @ANYBLOB="0000ffff46791c00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r0, &(0x7f00000001c0), &(0x7f0000000080)=""/45}, 0x20) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000a40)="89000000120081ae08060cdc030ec0007f03e3f700000000001f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e7d4ba3a0093b837dc6cc01e32efaec8c7a6ec081207000000080001400400446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538a7fff4f2cbbe8d5e6dde60978c05a90ed65a6", 0x89}], 0x1}, 0x20) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x2, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x28}, @printk={@llx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x7b}}]}, &(0x7f0000000680)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000500)="0000000000000000000051229dc9", 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) ioctl$TUNSETOFFLOAD(r2, 0x4004743d, 0x110c230002) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x100084, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r5, &(0x7f00000000c0)={&(0x7f0000000100)=@ieee802154={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0002}}}, 0x80, &(0x7f0000000480)=[{&(0x7f00000007c0)="27031c0016001400020000000000000006e1f0000000890900000002ee1680ca82973d2bd4b836954268e611", 0x2c}, {&(0x7f0000001980)="7d586d16062b1e1b9685b88189e0093982f6994b8df2fe56386ed999f1b34b06f2f69618bf033adc88f5360397a115f725e1165f4333f06cbce55a5f20f3095d1492f30e34c2e78534aa2059bcdd5e6c215f8a1d23f5b78a8119bd6c6c6e104923606c286343b114791a0a866bcccd0fb4fa8a960d6e7a59fd52884294b949a1a028d0fd8aefa6ee1070863365ffdfc3ab2876f7423594e3ff0182a3b92a1d51842ad30dab67f17c9938c758102e63c18870f229e0ffd2398686915f863c49fdc6e949856be1d47dac4f6d56e49c9fe34ec3306a64761d6fce755e911854ad8aaf1eb5411bdd83773c3dbf8a774f02e39ce9a13692a2e62e497588697b3406011dff49e483b7af2e2ab2324cdb0854dd9c05fcd9f7891d3f4d166b88a26a1463ac7f87ab1108eb14620661c1eb302caa7417ef79e463c0447f90f85a5b7c8dfed05edcd6cd56eb526a10b859e6e23f7e8d0911defae5937f74d4b60e05992585a3a88d7234c77a5038ae4c84942a6dd682094421a9d22e412f8500823a9482dcddef53022db0e12a7ba36547b7a62e5a22279966bf8c9783d5ca2ebcff237bbbc50ae48f87e4bca97b69279826358efe838bd7a503a2d42ee1989e9302a22188", 0x1c0}], 0x2}, 0x24000008) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYRESHEX=r2, @ANYRES32=r6, @ANYRES16=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r7, 0x2000000, 0xe, 0x0, &(0x7f0000000500)="630b00dcb95b0e4afdb20104bb4e", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) kernel console output (not intermixed with test programs): 8352][ T7919] netlink: 60 bytes leftover after parsing attributes in process `syz.3.618'. [ 230.467488][ T7920] netlink: 60 bytes leftover after parsing attributes in process `syz.3.618'. [ 230.719308][ T7929] netlink: 60 bytes leftover after parsing attributes in process `syz.3.620'. [ 230.800937][ T7929] netlink: 60 bytes leftover after parsing attributes in process `syz.3.620'. [ 230.812326][ T7925] netlink: 60 bytes leftover after parsing attributes in process `syz.3.620'. [ 231.399410][ T7937] netlink: 'syz.0.623': attribute type 10 has an invalid length. [ 231.560641][ T7926] netlink: 'syz.1.619': attribute type 6 has an invalid length. [ 231.577405][ T7926] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.619'. [ 232.055859][ T7951] netlink: 60 bytes leftover after parsing attributes in process `syz.1.627'. [ 232.248388][ T7964] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 232.573387][ T7978] netlink: 'syz.1.635': attribute type 10 has an invalid length. [ 233.827814][ T8017] FAULT_INJECTION: forcing a failure. [ 233.827814][ T8017] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 233.845784][ T8017] CPU: 1 PID: 8017 Comm: syz.0.649 Not tainted syzkaller #0 [ 233.853131][ T8017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 233.863227][ T8017] Call Trace: [ 233.866561][ T8017] [ 233.869540][ T8017] dump_stack_lvl+0x18c/0x250 [ 233.874304][ T8017] ? show_regs_print_info+0x20/0x20 [ 233.879681][ T8017] ? load_image+0x420/0x420 [ 233.884340][ T8017] ? __might_fault+0xaa/0x120 [ 233.889072][ T8017] ? __lock_acquire+0x7d40/0x7d40 [ 233.894154][ T8017] should_fail_ex+0x39d/0x4d0 [ 233.898906][ T8017] _copy_to_user+0x2f/0xa0 [ 233.903376][ T8017] ip_tunnel_siocdevprivate+0x162/0x1f0 [ 233.908975][ T8017] ? dev_ioctl+0x83c/0x1140 [ 233.913519][ T8017] ? ip_tunnel_update+0xb10/0xb10 [ 233.918598][ T8017] ? dev_ifsioc+0x958/0xc40 [ 233.923168][ T8017] dev_ioctl+0x84c/0x1140 [ 233.927656][ T8017] sock_ioctl+0x74c/0x7e0 [ 233.932035][ T8017] ? sock_poll+0x3e0/0x3e0 [ 233.936689][ T8017] ? bpf_lsm_file_ioctl+0x9/0x10 [ 233.941696][ T8017] ? security_file_ioctl+0x80/0xa0 [ 233.946862][ T8017] ? sock_poll+0x3e0/0x3e0 [ 233.951348][ T8017] __se_sys_ioctl+0xfd/0x170 [ 233.956176][ T8017] do_syscall_64+0x55/0xa0 [ 233.960638][ T8017] ? clear_bhb_loop+0x40/0x90 [ 233.965382][ T8017] ? clear_bhb_loop+0x40/0x90 [ 233.970459][ T8017] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 233.976402][ T8017] RIP: 0033:0x7fecd319c819 [ 233.980865][ T8017] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 234.000538][ T8017] RSP: 002b:00007fecd40ed028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 234.009001][ T8017] RAX: ffffffffffffffda RBX: 00007fecd3415fa0 RCX: 00007fecd319c819 [ 234.017020][ T8017] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000004 [ 234.025112][ T8017] RBP: 00007fecd40ed090 R08: 0000000000000000 R09: 0000000000000000 [ 234.033115][ T8017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 234.041116][ T8017] R13: 00007fecd3416038 R14: 00007fecd3415fa0 R15: 00007ffec3e0d5c8 [ 234.049352][ T8017] [ 234.974983][ T8047] FAULT_INJECTION: forcing a failure. [ 234.974983][ T8047] name failslab, interval 1, probability 0, space 0, times 0 [ 235.006453][ T8047] CPU: 1 PID: 8047 Comm: syz.2.659 Not tainted syzkaller #0 [ 235.013831][ T8047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 235.024014][ T8047] Call Trace: [ 235.027336][ T8047] [ 235.030301][ T8047] dump_stack_lvl+0x18c/0x250 [ 235.035025][ T8047] ? sctp_sendmsg+0x1575/0x28c0 [ 235.039918][ T8047] ? ___sys_sendmsg+0x2a6/0x360 [ 235.044909][ T8047] ? show_regs_print_info+0x20/0x20 [ 235.050259][ T8047] ? load_image+0x420/0x420 [ 235.054825][ T8047] should_fail_ex+0x39d/0x4d0 [ 235.059559][ T8047] should_failslab+0x9/0x20 [ 235.064124][ T8047] slab_pre_alloc_hook+0x59/0x310 [ 235.069366][ T8047] ? sctp_add_bind_addr+0x8c/0x360 [ 235.074604][ T8047] __kmem_cache_alloc_node+0x53/0x250 [ 235.080022][ T8047] ? sctp_add_bind_addr+0x8c/0x360 [ 235.085167][ T8047] kmalloc_trace+0x2a/0xe0 [ 235.089634][ T8047] sctp_add_bind_addr+0x8c/0x360 [ 235.094626][ T8047] sctp_copy_local_addr_list+0x315/0x4f0 [ 235.100310][ T8047] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 235.106063][ T8047] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 235.112174][ T8047] ? sctp_v4_is_any+0x35/0x60 [ 235.116971][ T8047] ? sctp_copy_one_addr+0x8c/0x350 [ 235.122214][ T8047] sctp_bind_addr_copy+0xb3/0x3c0 [ 235.127292][ T8047] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 235.134037][ T8047] sctp_connect_new_asoc+0x2f9/0x6a0 [ 235.139373][ T8047] ? __sctp_connect+0xd80/0xd80 [ 235.144282][ T8047] ? __local_bh_enable_ip+0x13a/0x1c0 [ 235.149892][ T8047] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 235.155889][ T8047] ? security_sctp_bind_connect+0x89/0xb0 [ 235.161839][ T8047] sctp_sendmsg+0x1575/0x28c0 [ 235.166577][ T8047] ? sctp_getsockopt+0xb60/0xb60 [ 235.171636][ T8047] ? aa_sk_perm+0x83c/0x970 [ 235.176250][ T8047] ? aa_af_perm+0x330/0x330 [ 235.180805][ T8047] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 235.187263][ T8047] ? sock_rps_record_flow+0x19/0x3f0 [ 235.192770][ T8047] ? inet_sendmsg+0xe9/0x2f0 [ 235.197396][ T8047] ? inet_send_prepare+0x260/0x260 [ 235.202626][ T8047] ____sys_sendmsg+0x5ba/0x960 [ 235.207442][ T8047] ? __asan_memset+0x22/0x40 [ 235.212164][ T8047] ? __sys_sendmsg_sock+0x30/0x30 [ 235.217219][ T8047] ? __import_iovec+0x3fa/0x850 [ 235.222129][ T8047] ? import_iovec+0x73/0xa0 [ 235.226706][ T8047] ___sys_sendmsg+0x2a6/0x360 [ 235.231518][ T8047] ? get_pid_task+0x20/0x1e0 [ 235.236154][ T8047] ? __sys_sendmsg+0x2a0/0x2a0 [ 235.241069][ T8047] ? __lock_acquire+0x7d40/0x7d40 [ 235.246156][ T8047] __se_sys_sendmsg+0x1c2/0x2b0 [ 235.251256][ T8047] ? __x64_sys_sendmsg+0x80/0x80 [ 235.256448][ T8047] ? lockdep_hardirqs_on+0x98/0x150 [ 235.261699][ T8047] do_syscall_64+0x55/0xa0 [ 235.266162][ T8047] ? clear_bhb_loop+0x40/0x90 [ 235.270963][ T8047] ? clear_bhb_loop+0x40/0x90 [ 235.275696][ T8047] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 235.281737][ T8047] RIP: 0033:0x7fca15b9c819 [ 235.286314][ T8047] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 235.306264][ T8047] RSP: 002b:00007fca16a46028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 235.314800][ T8047] RAX: ffffffffffffffda RBX: 00007fca15e15fa0 RCX: 00007fca15b9c819 [ 235.323002][ T8047] RDX: 0000000000000080 RSI: 0000200000000380 RDI: 0000000000000005 [ 235.331027][ T8047] RBP: 00007fca16a46090 R08: 0000000000000000 R09: 0000000000000000 [ 235.339132][ T8047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 235.347162][ T8047] R13: 00007fca15e16038 R14: 00007fca15e15fa0 R15: 00007ffc13d58958 [ 235.355307][ T8047] [ 235.474312][ T8052] __nla_validate_parse: 17 callbacks suppressed [ 235.474331][ T8052] netlink: 17279 bytes leftover after parsing attributes in process `syz.0.658'. [ 235.876000][ T8060] syzkaller0: entered promiscuous mode [ 235.897772][ T8060] syzkaller0: entered allmulticast mode [ 236.256099][ T8072] netlink: 60 bytes leftover after parsing attributes in process `syz.2.665'. [ 237.865800][ T8072] netlink: 60 bytes leftover after parsing attributes in process `syz.2.665'. [ 239.114382][ T8111] netlink: 'syz.1.678': attribute type 39 has an invalid length. [ 239.191117][ T8108] netlink: 14593 bytes leftover after parsing attributes in process `syz.3.677'. [ 239.301062][ T8119] netlink: 60 bytes leftover after parsing attributes in process `syz.2.679'. [ 239.333063][ T8119] netlink: 60 bytes leftover after parsing attributes in process `syz.2.679'. [ 239.376083][ T8113] netlink: 60 bytes leftover after parsing attributes in process `syz.2.679'. [ 239.418385][ T8118] netlink: 60 bytes leftover after parsing attributes in process `syz.2.679'. [ 239.691151][ T8123] netlink: 14568 bytes leftover after parsing attributes in process `syz.0.681'. [ 241.493249][ T8155] netlink: 60 bytes leftover after parsing attributes in process `syz.1.690'. [ 241.508066][ T8154] netlink: 17279 bytes leftover after parsing attributes in process `syz.2.689'. [ 241.531840][ T8155] netlink: 60 bytes leftover after parsing attributes in process `syz.1.690'. [ 241.575429][ T8147] netlink: 60 bytes leftover after parsing attributes in process `syz.1.690'. [ 241.585246][ T8153] netlink: 60 bytes leftover after parsing attributes in process `syz.1.690'. [ 242.827434][ T8167] netlink: 'syz.0.692': attribute type 39 has an invalid length. [ 244.209957][ T8149] delete_channel: no stack [ 245.119116][ T8193] netlink: 60 bytes leftover after parsing attributes in process `syz.2.700'. [ 245.147834][ T8193] netlink: 60 bytes leftover after parsing attributes in process `syz.2.700'. [ 245.164356][ T8190] netlink: 60 bytes leftover after parsing attributes in process `syz.2.700'. [ 245.188140][ T8191] netlink: 60 bytes leftover after parsing attributes in process `syz.2.700'. [ 245.949430][ T8208] netlink: 132 bytes leftover after parsing attributes in process `syz.3.706'. [ 246.766812][ T8225] netlink: 60 bytes leftover after parsing attributes in process `syz.1.708'. [ 246.775874][ T8225] netlink: 60 bytes leftover after parsing attributes in process `syz.1.708'. [ 246.789615][ T8223] netlink: 60 bytes leftover after parsing attributes in process `syz.1.708'. [ 246.810658][ T8224] netlink: 60 bytes leftover after parsing attributes in process `syz.1.708'. [ 247.117982][ T8231] netlink: 14 bytes leftover after parsing attributes in process `syz.1.710'. [ 247.618735][ T8241] netlink: 'syz.3.712': attribute type 39 has an invalid length. [ 247.739778][ T8245] netlink: 60 bytes leftover after parsing attributes in process `syz.1.713'. [ 249.803162][ T8245] netlink: 60 bytes leftover after parsing attributes in process `syz.1.713'. [ 249.814701][ T8252] netlink: 40 bytes leftover after parsing attributes in process `syz.2.716'. [ 250.138594][ T8270] netlink: 60 bytes leftover after parsing attributes in process `syz.1.718'. [ 250.163000][ T8270] netlink: 60 bytes leftover after parsing attributes in process `syz.1.718'. [ 250.198133][ T8263] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 250.571756][ T8281] netlink: 'syz.3.726': attribute type 2 has an invalid length. [ 250.588778][ T8281] netlink: 'syz.3.726': attribute type 1 has an invalid length. [ 251.801163][ T8329] __nla_validate_parse: 12 callbacks suppressed [ 251.801181][ T8329] netlink: 60 bytes leftover after parsing attributes in process `syz.1.738'. [ 251.834482][ T8329] netlink: 60 bytes leftover after parsing attributes in process `syz.1.738'. [ 251.854747][ T8321] netlink: 60 bytes leftover after parsing attributes in process `syz.1.738'. [ 251.882412][ T8325] netlink: 60 bytes leftover after parsing attributes in process `syz.1.738'. [ 252.058723][ T8336] netlink: 60 bytes leftover after parsing attributes in process `syz.0.741'. [ 252.080417][ T8336] netlink: 60 bytes leftover after parsing attributes in process `syz.0.741'. [ 252.114491][ T8332] netlink: 60 bytes leftover after parsing attributes in process `syz.0.741'. [ 252.178500][ T8333] netlink: 60 bytes leftover after parsing attributes in process `syz.0.741'. [ 252.386280][ T8345] netlink: 'syz.0.744': attribute type 29 has an invalid length. [ 252.413141][ T8343] netlink: 'syz.2.745': attribute type 10 has an invalid length. [ 252.429147][ T8345] netlink: 'syz.0.744': attribute type 29 has an invalid length. [ 252.441061][ T8343] netlink: 209852 bytes leftover after parsing attributes in process `syz.2.745'. [ 252.454218][ T8342] netlink: 'syz.0.744': attribute type 29 has an invalid length. [ 252.470074][ T8343] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 252.855884][ T8360] netlink: 207508 bytes leftover after parsing attributes in process `syz.0.749'. [ 253.109328][ T8364] netlink: 'syz.0.749': attribute type 4 has an invalid length. [ 253.138101][ T8364] A link change request failed with some changes committed already. Interface hsr_slave_1 may have been left with an inconsistent configuration, please check. [ 254.075985][ T8402] netlink: 'syz.1.763': attribute type 6 has an invalid length. [ 254.439326][ T8411] FAULT_INJECTION: forcing a failure. [ 254.439326][ T8411] name failslab, interval 1, probability 0, space 0, times 0 [ 254.452255][ T8411] CPU: 1 PID: 8411 Comm: syz.2.764 Not tainted syzkaller #0 [ 254.459683][ T8411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 254.469776][ T8411] Call Trace: [ 254.473089][ T8411] [ 254.476139][ T8411] dump_stack_lvl+0x18c/0x250 [ 254.480957][ T8411] ? show_regs_print_info+0x20/0x20 [ 254.486200][ T8411] ? load_image+0x420/0x420 [ 254.490827][ T8411] ? netdev_core_pick_tx+0x340/0x340 [ 254.496165][ T8411] should_fail_ex+0x39d/0x4d0 [ 254.500875][ T8411] should_failslab+0x9/0x20 [ 254.505483][ T8411] slab_pre_alloc_hook+0x59/0x310 [ 254.510545][ T8411] kmem_cache_alloc+0x5a/0x2d0 [ 254.515325][ T8411] ? skb_clone+0x1eb/0x370 [ 254.519768][ T8411] skb_clone+0x1eb/0x370 [ 254.524029][ T8411] bpf_clone_redirect+0x167/0x4a0 [ 254.529091][ T8411] bpf_prog_c08ef512837047f4+0x61/0x66 [ 254.534659][ T8411] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 254.540681][ T8411] ? perf_trace_preemptirq_template+0xac/0x330 [ 254.546899][ T8411] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 254.553109][ T8411] ? lockdep_softirqs_on+0x580/0x580 [ 254.558525][ T8411] ? lock_chain_count+0x20/0x20 [ 254.563397][ T8411] ? seqcount_lockdep_reader_access+0x191/0x1d0 [ 254.569793][ T8411] ? __local_bh_disable_ip+0x108/0x1a0 [ 254.575371][ T8411] ? __cant_sleep+0x220/0x220 [ 254.580091][ T8411] ? __local_bh_enable_ip+0x13a/0x1c0 [ 254.585610][ T8411] ? _local_bh_enable+0xa0/0xa0 [ 254.590612][ T8411] ? bpf_test_timer_continue+0x135/0x380 [ 254.596509][ T8411] ? bpf_test_run+0x174/0x870 [ 254.601231][ T8411] bpf_test_run+0x2df/0x870 [ 254.605796][ T8411] ? bpf_test_run+0x174/0x870 [ 254.610525][ T8411] ? convert___skb_to_skb+0x590/0x590 [ 254.616022][ T8411] ? eth_get_headlen+0x210/0x210 [ 254.620997][ T8411] ? slab_build_skb+0x25f/0x3f0 [ 254.625865][ T8411] ? convert___skb_to_skb+0x3d/0x590 [ 254.631170][ T8411] bpf_prog_test_run_skb+0xad2/0x12b0 [ 254.636668][ T8411] ? cpu_online+0x60/0x60 [ 254.641048][ T8411] bpf_prog_test_run+0x321/0x390 [ 254.646157][ T8411] __sys_bpf+0x49d/0x890 [ 254.650639][ T8411] ? bpf_link_show_fdinfo+0x390/0x390 [ 254.656056][ T8411] ? lock_chain_count+0x20/0x20 [ 254.660937][ T8411] __x64_sys_bpf+0x7c/0x90 [ 254.665373][ T8411] do_syscall_64+0x55/0xa0 [ 254.669891][ T8411] ? clear_bhb_loop+0x40/0x90 [ 254.674675][ T8411] ? clear_bhb_loop+0x40/0x90 [ 254.679431][ T8411] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 254.685518][ T8411] RIP: 0033:0x7fca15b9c819 [ 254.689954][ T8411] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 254.709577][ T8411] RSP: 002b:00007fca16a46028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 254.718022][ T8411] RAX: ffffffffffffffda RBX: 00007fca15e15fa0 RCX: 00007fca15b9c819 [ 254.726008][ T8411] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 254.733993][ T8411] RBP: 00007fca16a46090 R08: 0000000000000000 R09: 0000000000000000 [ 254.741982][ T8411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 254.750062][ T8411] R13: 00007fca15e16038 R14: 00007fca15e15fa0 R15: 00007ffc13d58958 [ 254.758156][ T8411] [ 256.100827][ T1290] ieee802154 phy0 wpan0: encryption failed: -22 [ 256.107453][ T1290] ieee802154 phy1 wpan1: encryption failed: -22 [ 256.291513][ T8438] netlink: 'syz.1.775': attribute type 21 has an invalid length. [ 256.882312][ T8452] __nla_validate_parse: 26 callbacks suppressed [ 256.882332][ T8452] netlink: 4 bytes leftover after parsing attributes in process `syz.3.780'. [ 256.994533][ T8447] mac80211_hwsim hwsim5 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 257.217413][ T8460] netlink: 60 bytes leftover after parsing attributes in process `syz.0.781'. [ 257.242316][ T8460] netlink: 60 bytes leftover after parsing attributes in process `syz.0.781'. [ 257.264181][ T8458] netlink: 60 bytes leftover after parsing attributes in process `syz.0.781'. [ 257.315287][ T8459] netlink: 60 bytes leftover after parsing attributes in process `syz.0.781'. [ 257.649658][ T8468] netlink: 12 bytes leftover after parsing attributes in process `syz.3.783'. [ 258.212454][ T8484] netlink: 60 bytes leftover after parsing attributes in process `syz.1.788'. [ 258.271134][ T8484] netlink: 60 bytes leftover after parsing attributes in process `syz.1.788'. [ 258.328888][ T8478] netlink: 60 bytes leftover after parsing attributes in process `syz.1.788'. [ 258.366985][ T8480] netlink: 60 bytes leftover after parsing attributes in process `syz.1.788'. [ 259.228314][ T6004] wlan1: Trigger new scan to find an IBSS to join [ 260.448366][ T8517] netlink: 'syz.0.801': attribute type 3 has an invalid length. [ 261.914670][ T5779] Bluetooth: hci2: ISO packet for unknown connection handle 3856 [ 262.257117][ T34] wlan1: Trigger new scan to find an IBSS to join [ 262.765344][ T8573] netlink: 'syz.3.821': attribute type 3 has an invalid length. [ 262.992053][ T8583] __nla_validate_parse: 7 callbacks suppressed [ 262.992072][ T8583] netlink: 4 bytes leftover after parsing attributes in process `syz.2.825'. [ 263.077875][ T8585] netlink: 2 bytes leftover after parsing attributes in process `syz.3.826'. [ 263.098738][ T8585] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 263.111086][ T8585] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 263.121751][ T8585] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 263.155831][ T8585] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 263.177086][ T8585] batadv_slave_1: entered promiscuous mode [ 264.792117][ T8618] netlink: 4 bytes leftover after parsing attributes in process `syz.3.837'. [ 264.831488][ T8624] netlink: 60 bytes leftover after parsing attributes in process `syz.2.836'. [ 264.886119][ T8624] netlink: 60 bytes leftover after parsing attributes in process `syz.2.836'. [ 264.957004][ T8616] netlink: 60 bytes leftover after parsing attributes in process `syz.2.836'. [ 265.015116][ T8623] netlink: 60 bytes leftover after parsing attributes in process `syz.2.836'. [ 265.472074][ T6004] wlan1: Trigger new scan to find an IBSS to join [ 265.579614][ T8643] netlink: 'syz.3.843': attribute type 153 has an invalid length. [ 265.616857][ T8643] netlink: 128124 bytes leftover after parsing attributes in process `syz.3.843'. [ 265.982609][ T8653] netlink: 'syz.1.848': attribute type 10 has an invalid length. [ 266.705932][ T4079] wlan1: Creating new IBSS network, BSSID 36:e4:7a:74:81:58 [ 267.290105][ T8662] netlink: 4 bytes leftover after parsing attributes in process `syz.3.851'. [ 267.318467][ T8673] netlink: 16186 bytes leftover after parsing attributes in process `syz.1.854'. [ 268.360776][ T8689] netlink: 'syz.3.861': attribute type 10 has an invalid length. [ 268.410946][ T8689] netlink: 40 bytes leftover after parsing attributes in process `syz.3.861'. [ 268.492818][ T8689] netlink: 'syz.3.861': attribute type 10 has an invalid length. [ 268.512165][ T8689] netlink: 40 bytes leftover after parsing attributes in process `syz.3.861'. [ 268.574223][ T8694] netlink: 60 bytes leftover after parsing attributes in process `syz.0.860'. [ 268.684509][ T8694] netlink: 60 bytes leftover after parsing attributes in process `syz.0.860'. [ 268.709542][ T8691] netlink: 60 bytes leftover after parsing attributes in process `syz.0.860'. [ 268.723298][ T8692] netlink: 60 bytes leftover after parsing attributes in process `syz.0.860'. [ 268.978701][ T8706] FAULT_INJECTION: forcing a failure. [ 268.978701][ T8706] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 269.017311][ T8706] CPU: 1 PID: 8706 Comm: syz.0.866 Not tainted syzkaller #0 [ 269.024782][ T8706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 269.034893][ T8706] Call Trace: [ 269.038219][ T8706] [ 269.041184][ T8706] dump_stack_lvl+0x18c/0x250 [ 269.045935][ T8706] ? show_regs_print_info+0x20/0x20 [ 269.051227][ T8706] ? load_image+0x420/0x420 [ 269.055789][ T8706] ? __lock_acquire+0x7d40/0x7d40 [ 269.060962][ T8706] should_fail_ex+0x39d/0x4d0 [ 269.065795][ T8706] _copy_from_user+0x2f/0xe0 [ 269.070437][ T8706] __copy_msghdr+0x3bb/0x580 [ 269.075095][ T8706] ___sys_sendmsg+0x214/0x360 [ 269.079927][ T8706] ? get_pid_task+0x20/0x1e0 [ 269.084569][ T8706] ? __sys_sendmsg+0x2a0/0x2a0 [ 269.089662][ T8706] ? __lock_acquire+0x7d40/0x7d40 [ 269.094852][ T8706] __se_sys_sendmsg+0x1c2/0x2b0 [ 269.099756][ T8706] ? __x64_sys_sendmsg+0x80/0x80 [ 269.104757][ T8706] ? lockdep_hardirqs_on+0x98/0x150 [ 269.109994][ T8706] do_syscall_64+0x55/0xa0 [ 269.114598][ T8706] ? clear_bhb_loop+0x40/0x90 [ 269.119293][ T8706] ? clear_bhb_loop+0x40/0x90 [ 269.124341][ T8706] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 269.130336][ T8706] RIP: 0033:0x7fecd319c819 [ 269.134770][ T8706] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 269.154500][ T8706] RSP: 002b:00007fecd40ed028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 269.163209][ T8706] RAX: ffffffffffffffda RBX: 00007fecd3415fa0 RCX: 00007fecd319c819 [ 269.171564][ T8706] RDX: 0000000000000044 RSI: 00002000000017c0 RDI: 0000000000000004 [ 269.179872][ T8706] RBP: 00007fecd40ed090 R08: 0000000000000000 R09: 0000000000000000 [ 269.187888][ T8706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 269.196059][ T8706] R13: 00007fecd3416038 R14: 00007fecd3415fa0 R15: 00007ffec3e0d5c8 [ 269.204180][ T8706] [ 270.420153][ T8736] netlink: 60 bytes leftover after parsing attributes in process `syz.3.874'. [ 270.453585][ T8736] netlink: 60 bytes leftover after parsing attributes in process `syz.3.874'. [ 270.498826][ T8730] netlink: 60 bytes leftover after parsing attributes in process `syz.3.874'. [ 270.504562][ T8739] FAULT_INJECTION: forcing a failure. [ 270.504562][ T8739] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 270.524898][ T8733] netlink: 60 bytes leftover after parsing attributes in process `syz.3.874'. [ 270.549428][ T8739] CPU: 0 PID: 8739 Comm: syz.0.877 Not tainted syzkaller #0 [ 270.556804][ T8739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 270.566903][ T8739] Call Trace: [ 270.570220][ T8739] [ 270.573245][ T8739] dump_stack_lvl+0x18c/0x250 [ 270.577991][ T8739] ? show_regs_print_info+0x20/0x20 [ 270.583243][ T8739] ? load_image+0x420/0x420 [ 270.587797][ T8739] ? __might_fault+0xaa/0x120 [ 270.592523][ T8739] ? __lock_acquire+0x7d40/0x7d40 [ 270.597618][ T8739] should_fail_ex+0x39d/0x4d0 [ 270.602356][ T8739] _copy_from_user+0x2f/0xe0 [ 270.606995][ T8739] generic_map_update_batch+0x59a/0x810 [ 270.612695][ T8739] ? rcu_read_unlock+0xa0/0xa0 [ 270.617522][ T8739] ? __fdget+0x180/0x210 [ 270.621914][ T8739] ? rcu_read_unlock+0xa0/0xa0 [ 270.626728][ T8739] bpf_map_do_batch+0x3d7/0x610 [ 270.631729][ T8739] __sys_bpf+0x381/0x890 [ 270.636025][ T8739] ? bpf_link_show_fdinfo+0x390/0x390 [ 270.641480][ T8739] ? lock_chain_count+0x20/0x20 [ 270.646388][ T8739] __x64_sys_bpf+0x7c/0x90 [ 270.650859][ T8739] do_syscall_64+0x55/0xa0 [ 270.655515][ T8739] ? clear_bhb_loop+0x40/0x90 [ 270.660426][ T8739] ? clear_bhb_loop+0x40/0x90 [ 270.665170][ T8739] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 270.671130][ T8739] RIP: 0033:0x7fecd319c819 [ 270.675692][ T8739] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 270.695368][ T8739] RSP: 002b:00007fecd40ed028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 270.704020][ T8739] RAX: ffffffffffffffda RBX: 00007fecd3415fa0 RCX: 00007fecd319c819 [ 270.712046][ T8739] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 270.717186][ T8744] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 270.720139][ T8739] RBP: 00007fecd40ed090 R08: 0000000000000000 R09: 0000000000000000 [ 270.720159][ T8739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 270.720173][ T8739] R13: 00007fecd3416038 R14: 00007fecd3415fa0 R15: 00007ffec3e0d5c8 [ 270.720203][ T8739] [ 270.725768][ T8744] dvmrp1: linktype set to 804 [ 270.796935][ T8745] netlink: 'syz.1.880': attribute type 25 has an invalid length. [ 270.893544][ T8747] netlink: 'syz.2.881': attribute type 3 has an invalid length. [ 272.554224][ T8799] FAULT_INJECTION: forcing a failure. [ 272.554224][ T8799] name failslab, interval 1, probability 0, space 0, times 0 [ 272.607063][ T8799] CPU: 0 PID: 8799 Comm: syz.2.895 Not tainted syzkaller #0 [ 272.614425][ T8799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 272.624583][ T8799] Call Trace: [ 272.627879][ T8799] [ 272.630830][ T8799] dump_stack_lvl+0x18c/0x250 [ 272.635534][ T8799] ? sctp_sendmsg+0x1575/0x28c0 [ 272.640405][ T8799] ? ___sys_sendmsg+0x2a6/0x360 [ 272.645301][ T8799] ? show_regs_print_info+0x20/0x20 [ 272.650562][ T8799] ? load_image+0x420/0x420 [ 272.655206][ T8799] should_fail_ex+0x39d/0x4d0 [ 272.659926][ T8799] should_failslab+0x9/0x20 [ 272.664468][ T8799] slab_pre_alloc_hook+0x59/0x310 [ 272.669613][ T8799] ? sctp_add_bind_addr+0x8c/0x360 [ 272.674775][ T8799] __kmem_cache_alloc_node+0x53/0x250 [ 272.680182][ T8799] ? sctp_add_bind_addr+0x8c/0x360 [ 272.685310][ T8799] kmalloc_trace+0x2a/0xe0 [ 272.689756][ T8799] sctp_add_bind_addr+0x8c/0x360 [ 272.694822][ T8799] sctp_copy_local_addr_list+0x315/0x4f0 [ 272.700473][ T8799] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 272.706237][ T8799] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 272.712451][ T8799] ? sctp_v6_is_any+0x64/0x70 [ 272.717255][ T8799] ? sctp_copy_one_addr+0x8c/0x350 [ 272.722394][ T8799] sctp_bind_addr_copy+0xb3/0x3c0 [ 272.727530][ T8799] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 272.733984][ T8799] sctp_connect_new_asoc+0x2f9/0x6a0 [ 272.739386][ T8799] ? __sctp_connect+0xd80/0xd80 [ 272.744342][ T8799] ? __local_bh_enable_ip+0x13a/0x1c0 [ 272.749744][ T8799] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 272.755319][ T8799] ? security_sctp_bind_connect+0x89/0xb0 [ 272.761063][ T8799] sctp_sendmsg+0x1575/0x28c0 [ 272.765863][ T8799] ? sctp_getsockopt+0xb60/0xb60 [ 272.770824][ T8799] ? aa_sk_perm+0x83c/0x970 [ 272.775469][ T8799] ? aa_af_perm+0x330/0x330 [ 272.779990][ T8799] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 272.786548][ T8799] ? sock_rps_record_flow+0x19/0x3f0 [ 272.791896][ T8799] ? inet_sendmsg+0xe9/0x2f0 [ 272.796522][ T8799] ? inet_send_prepare+0x260/0x260 [ 272.801663][ T8799] ____sys_sendmsg+0x5ba/0x960 [ 272.806464][ T8799] ? __lock_acquire+0x7d40/0x7d40 [ 272.811523][ T8799] ? __asan_memset+0x22/0x40 [ 272.816221][ T8799] ? __sys_sendmsg_sock+0x30/0x30 [ 272.821372][ T8799] ? __import_iovec+0x5f2/0x850 [ 272.826248][ T8799] ? import_iovec+0x73/0xa0 [ 272.830855][ T8799] ___sys_sendmsg+0x2a6/0x360 [ 272.835558][ T8799] ? __sys_sendmsg+0x2a0/0x2a0 [ 272.840447][ T8799] ? __lock_acquire+0x7d40/0x7d40 [ 272.845516][ T8799] __se_sys_sendmsg+0x1c2/0x2b0 [ 272.850385][ T8799] ? __x64_sys_sendmsg+0x80/0x80 [ 272.855360][ T8799] ? syscall_enter_from_user_mode+0x2e/0x80 [ 272.861282][ T8799] do_syscall_64+0x55/0xa0 [ 272.865800][ T8799] ? clear_bhb_loop+0x40/0x90 [ 272.870494][ T8799] ? clear_bhb_loop+0x40/0x90 [ 272.875275][ T8799] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 272.881906][ T8799] RIP: 0033:0x7fca15b9c819 [ 272.886362][ T8799] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 272.906020][ T8799] RSP: 002b:00007fca16a46028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 272.914649][ T8799] RAX: ffffffffffffffda RBX: 00007fca15e15fa0 RCX: 00007fca15b9c819 [ 272.922643][ T8799] RDX: 0000000000000041 RSI: 0000200000002dc0 RDI: 0000000000000006 [ 272.930737][ T8799] RBP: 00007fca16a46090 R08: 0000000000000000 R09: 0000000000000000 [ 272.938723][ T8799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 272.946713][ T8799] R13: 00007fca15e16038 R14: 00007fca15e15fa0 R15: 00007ffc13d58958 [ 272.954716][ T8799] [ 273.597270][ T8814] FAULT_INJECTION: forcing a failure. [ 273.597270][ T8814] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 273.615067][ T8814] CPU: 1 PID: 8814 Comm: syz.1.900 Not tainted syzkaller #0 [ 273.622421][ T8814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 273.632695][ T8814] Call Trace: [ 273.636014][ T8814] [ 273.638990][ T8814] dump_stack_lvl+0x18c/0x250 [ 273.643729][ T8814] ? show_regs_print_info+0x20/0x20 [ 273.648984][ T8814] ? load_image+0x420/0x420 [ 273.653714][ T8814] ? __might_fault+0xaa/0x120 [ 273.658492][ T8814] ? __lock_acquire+0x7d40/0x7d40 [ 273.663568][ T8814] ? tomoyo_path_number_perm+0x5b4/0x620 [ 273.669306][ T8814] should_fail_ex+0x39d/0x4d0 [ 273.674053][ T8814] _copy_from_user+0x2f/0xe0 [ 273.678688][ T8814] wext_handle_ioctl+0xc8/0x1d0 [ 273.683778][ T8814] ? call_commit_handler+0xf0/0xf0 [ 273.688961][ T8814] sock_ioctl+0x15d/0x7e0 [ 273.693344][ T8814] ? sock_poll+0x3e0/0x3e0 [ 273.697824][ T8814] ? bpf_lsm_file_ioctl+0x9/0x10 [ 273.702801][ T8814] ? security_file_ioctl+0x80/0xa0 [ 273.707962][ T8814] ? sock_poll+0x3e0/0x3e0 [ 273.712440][ T8814] __se_sys_ioctl+0xfd/0x170 [ 273.717091][ T8814] do_syscall_64+0x55/0xa0 [ 273.721550][ T8814] ? clear_bhb_loop+0x40/0x90 [ 273.726300][ T8814] ? clear_bhb_loop+0x40/0x90 [ 273.731012][ T8814] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 273.737138][ T8814] RIP: 0033:0x7f63a9b9c819 [ 273.741571][ T8814] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 273.761222][ T8814] RSP: 002b:00007f63aa9ec028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 273.769670][ T8814] RAX: ffffffffffffffda RBX: 00007f63a9e15fa0 RCX: 00007f63a9b9c819 [ 273.777743][ T8814] RDX: 0000200000000040 RSI: 0000000000008b04 RDI: 0000000000000004 [ 273.785753][ T8814] RBP: 00007f63aa9ec090 R08: 0000000000000000 R09: 0000000000000000 [ 273.793751][ T8814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 273.801739][ T8814] R13: 00007f63a9e16038 R14: 00007f63a9e15fa0 R15: 00007ffc86a16cd8 [ 273.809765][ T8814] [ 274.284001][ T8834] __nla_validate_parse: 6 callbacks suppressed [ 274.284018][ T8834] netlink: 60 bytes leftover after parsing attributes in process `syz.0.906'. [ 274.301960][ T8834] netlink: 60 bytes leftover after parsing attributes in process `syz.0.906'. [ 274.312012][ T8829] netlink: 60 bytes leftover after parsing attributes in process `syz.0.906'. [ 274.322713][ T8830] netlink: 60 bytes leftover after parsing attributes in process `syz.0.906'. [ 274.404735][ T8835] netlink: 132 bytes leftover after parsing attributes in process `syz.3.909'. [ 274.431871][ T8835] netlink: 26 bytes leftover after parsing attributes in process `syz.3.909'. [ 274.467761][ T8835] netlink: 144 bytes leftover after parsing attributes in process `syz.3.909'. [ 274.634496][ T8846] netlink: 209820 bytes leftover after parsing attributes in process `syz.2.907'. [ 274.685900][ T8835] team0: Port device team_slave_0 removed [ 274.707586][ T8835] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 274.751628][ T8845] netlink: 61211 bytes leftover after parsing attributes in process `syz.0.912'. [ 275.200054][ T8855] netlink: 'syz.2.915': attribute type 153 has an invalid length. [ 275.212474][ T8861] netlink: 'syz.3.917': attribute type 39 has an invalid length. [ 275.216943][ T8855] netlink: 128124 bytes leftover after parsing attributes in process `syz.2.915'. [ 275.417767][ T8861] hsr_slave_1 (unregistering): left promiscuous mode [ 275.489545][ T8871] sctp: [Deprecated]: syz.2.915 (pid 8871) Use of struct sctp_assoc_value in delayed_ack socket option. [ 275.489545][ T8871] Use struct sctp_sack_info instead [ 276.344089][ T8882] netlink: 'syz.3.922': attribute type 5 has an invalid length. [ 276.709455][ T8891] netlink: 'syz.1.924': attribute type 10 has an invalid length. [ 276.783124][ T8891] veth0_vlan: left promiscuous mode [ 276.821429][ T8891] veth0_vlan: entered promiscuous mode [ 276.862348][ T8891] team0: Device veth0_vlan failed to register rx_handler [ 277.027345][ T8891] syz.1.924 (8891) used greatest stack depth: 19752 bytes left [ 277.595143][ T8923] netlink: 'syz.2.938': attribute type 9 has an invalid length. [ 278.379866][ T8944] netlink: 'syz.2.945': attribute type 10 has an invalid length. [ 278.400311][ T8944] team0: Device veth1_macvtap is up. Set it down before adding it as a team port [ 279.002988][ T8946] tipc: Started in network mode [ 279.107189][ T8946] tipc: Node identity 1a, cluster identity 4711 [ 279.122747][ T8946] tipc: Node number set to 26 [ 279.262798][ T8958] netlink: 'syz.0.951': attribute type 7 has an invalid length. [ 279.274872][ T8958] netlink: 'syz.0.951': attribute type 6 has an invalid length. [ 279.352145][ T8960] __nla_validate_parse: 17 callbacks suppressed [ 279.352164][ T8960] netlink: 207508 bytes leftover after parsing attributes in process `syz.3.952'. [ 279.552616][ T8968] netlink: 'syz.3.956': attribute type 10 has an invalid length. [ 279.580393][ T8968] netlink: 40 bytes leftover after parsing attributes in process `syz.3.956'. [ 279.629700][ T8970] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 279.631042][ T8968] veth0_vlan: entered allmulticast mode [ 279.639226][ T8970] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 279.639311][ T8970] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 279.639377][ T8970] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 279.639440][ T8970] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 279.639501][ T8970] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 279.639565][ T8970] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 279.700199][ T8970] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 279.709695][ T8970] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 279.718921][ T8970] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 279.728161][ T8970] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 279.737378][ T8970] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 279.746495][ T8970] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 279.755843][ T8970] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 279.765243][ T8970] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 279.774605][ T8970] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 279.783788][ T8970] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 279.793051][ T8970] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 279.802586][ T8970] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 281.798307][ T9006] netlink: 60 bytes leftover after parsing attributes in process `syz.3.966'. [ 281.823153][ T9006] netlink: 60 bytes leftover after parsing attributes in process `syz.3.966'. [ 281.833522][ T9005] netlink: 60 bytes leftover after parsing attributes in process `syz.3.966'. [ 281.869737][ T9010] netlink: 'syz.0.968': attribute type 10 has an invalid length. [ 281.895916][ T9010] netlink: 40 bytes leftover after parsing attributes in process `syz.0.968'. [ 281.909230][ T9010] veth0_vlan: entered allmulticast mode [ 282.021932][ T9014] FAULT_INJECTION: forcing a failure. [ 282.021932][ T9014] name failslab, interval 1, probability 0, space 0, times 0 [ 282.056868][ T9014] CPU: 1 PID: 9014 Comm: syz.3.969 Not tainted syzkaller #0 [ 282.064235][ T9014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 282.074399][ T9014] Call Trace: [ 282.077703][ T9014] [ 282.080646][ T9014] dump_stack_lvl+0x18c/0x250 [ 282.085374][ T9014] ? sctp_sendmsg+0x1575/0x28c0 [ 282.090247][ T9014] ? ___sys_sendmsg+0x2a6/0x360 [ 282.095121][ T9014] ? show_regs_print_info+0x20/0x20 [ 282.100397][ T9014] ? load_image+0x420/0x420 [ 282.104968][ T9014] should_fail_ex+0x39d/0x4d0 [ 282.109690][ T9014] should_failslab+0x9/0x20 [ 282.114230][ T9014] slab_pre_alloc_hook+0x59/0x310 [ 282.119302][ T9014] ? sctp_add_bind_addr+0x8c/0x360 [ 282.124445][ T9014] __kmem_cache_alloc_node+0x53/0x250 [ 282.129850][ T9014] ? sctp_add_bind_addr+0x8c/0x360 [ 282.134989][ T9014] kmalloc_trace+0x2a/0xe0 [ 282.139519][ T9014] sctp_add_bind_addr+0x8c/0x360 [ 282.144735][ T9014] sctp_copy_local_addr_list+0x315/0x4f0 [ 282.150406][ T9014] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 282.156239][ T9014] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 282.162435][ T9014] ? sctp_v6_is_any+0x64/0x70 [ 282.167317][ T9014] ? sctp_copy_one_addr+0x8c/0x350 [ 282.172471][ T9014] sctp_bind_addr_copy+0xb3/0x3c0 [ 282.177692][ T9014] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 282.184230][ T9014] sctp_connect_new_asoc+0x2f9/0x6a0 [ 282.189567][ T9014] ? __sctp_connect+0xd80/0xd80 [ 282.194563][ T9014] ? __local_bh_enable_ip+0x13a/0x1c0 [ 282.200160][ T9014] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 282.206007][ T9014] ? security_sctp_bind_connect+0x89/0xb0 [ 282.211761][ T9014] sctp_sendmsg+0x1575/0x28c0 [ 282.216471][ T9014] ? sctp_getsockopt+0xb60/0xb60 [ 282.221516][ T9014] ? aa_sk_perm+0x83c/0x970 [ 282.226046][ T9014] ? aa_af_perm+0x330/0x330 [ 282.230571][ T9014] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 282.237006][ T9014] ? sock_rps_record_flow+0x19/0x3f0 [ 282.242500][ T9014] ? inet_sendmsg+0xe9/0x2f0 [ 282.247226][ T9014] ? inet_send_prepare+0x260/0x260 [ 282.252384][ T9014] ____sys_sendmsg+0x5ba/0x960 [ 282.257254][ T9014] ? __lock_acquire+0x7d40/0x7d40 [ 282.262393][ T9014] ? __sys_sendmsg_sock+0x30/0x30 [ 282.267430][ T9014] ? __import_iovec+0x5f2/0x850 [ 282.272304][ T9014] ? import_iovec+0x73/0xa0 [ 282.276995][ T9014] ___sys_sendmsg+0x2a6/0x360 [ 282.281684][ T9014] ? get_pid_task+0x20/0x1e0 [ 282.286295][ T9014] ? __sys_sendmsg+0x2a0/0x2a0 [ 282.291096][ T9014] ? __lock_acquire+0x7d40/0x7d40 [ 282.296167][ T9014] __se_sys_sendmsg+0x1c2/0x2b0 [ 282.301036][ T9014] ? __x64_sys_sendmsg+0x80/0x80 [ 282.306023][ T9014] ? lockdep_hardirqs_on+0x98/0x150 [ 282.311253][ T9014] do_syscall_64+0x55/0xa0 [ 282.315676][ T9014] ? clear_bhb_loop+0x40/0x90 [ 282.320369][ T9014] ? clear_bhb_loop+0x40/0x90 [ 282.325151][ T9014] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 282.331059][ T9014] RIP: 0033:0x7f3cc339c819 [ 282.335577][ T9014] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 282.355394][ T9014] RSP: 002b:00007f3cc42ee028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 282.363828][ T9014] RAX: ffffffffffffffda RBX: 00007f3cc3615fa0 RCX: 00007f3cc339c819 [ 282.371901][ T9014] RDX: 0000000000000041 RSI: 0000200000000600 RDI: 0000000000000003 [ 282.379886][ T9014] RBP: 00007f3cc42ee090 R08: 0000000000000000 R09: 0000000000000000 [ 282.387963][ T9014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 282.396038][ T9014] R13: 00007f3cc3616038 R14: 00007f3cc3615fa0 R15: 00007ffc93c07bc8 [ 282.404042][ T9014] [ 282.624160][ T9021] netlink: 'syz.3.972': attribute type 4 has an invalid length. [ 282.779813][ T5779] Bluetooth: hci0: unexpected event 0x30 length: 15 > 3 [ 282.779917][ T5779] Bluetooth: hci0: unexpected event 0x30 length: 15 > 3 [ 284.060065][ T9046] netlink: 121460 bytes leftover after parsing attributes in process `syz.0.978'. [ 284.086830][ T9046] netlink: 21096 bytes leftover after parsing attributes in process `syz.0.978'. [ 284.121809][ T9046] tipc: Started in network mode [ 284.140131][ T9046] tipc: Node identity 1a, cluster identity 4711 [ 284.251162][ T9046] tipc: Node number set to 26 [ 284.467534][ T9064] netlink: 'syz.2.984': attribute type 10 has an invalid length. [ 284.525162][ T9064] netlink: 40 bytes leftover after parsing attributes in process `syz.2.984'. [ 284.589642][ T9064] bridge0: port 3(veth0_vlan) entered blocking state [ 284.632835][ T9064] bridge0: port 3(veth0_vlan) entered disabled state [ 284.765929][ T9064] net_ratelimit: 47 callbacks suppressed [ 284.765977][ T9064] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 284.830945][ T9070] netlink: 'syz.1.988': attribute type 21 has an invalid length. [ 284.843938][ T9074] netlink: 'syz.0.987': attribute type 2 has an invalid length. [ 284.883902][ T9074] netlink: 'syz.0.987': attribute type 8 has an invalid length. [ 284.914854][ T9074] netlink: 132 bytes leftover after parsing attributes in process `syz.0.987'. [ 285.086451][ T9080] netlink: 'syz.1.989': attribute type 10 has an invalid length. [ 285.658034][ T9080] netlink: 132 bytes leftover after parsing attributes in process `syz.1.989'. [ 286.091521][ T9097] netlink: 121460 bytes leftover after parsing attributes in process `syz.2.994'. [ 286.129289][ T9097] netlink: 21096 bytes leftover after parsing attributes in process `syz.2.994'. [ 286.146054][ T9097] tipc: Started in network mode [ 286.151586][ T9097] tipc: Node identity 1a, cluster identity 4711 [ 286.160054][ T9097] tipc: Node number set to 26 [ 286.199916][ T9104] netlink: 4 bytes leftover after parsing attributes in process `syz.0.997'. [ 287.797065][ T9137] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1008'. [ 287.817449][ T9139] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1009'. [ 289.899472][ T9177] FAULT_INJECTION: forcing a failure. [ 289.899472][ T9177] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 289.953772][ T9177] CPU: 1 PID: 9177 Comm: syz.2.1020 Not tainted syzkaller #0 [ 289.961421][ T9177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 289.971617][ T9177] Call Trace: [ 289.974944][ T9177] [ 289.977990][ T9177] dump_stack_lvl+0x18c/0x250 [ 289.982729][ T9177] ? show_regs_print_info+0x20/0x20 [ 289.987977][ T9177] ? load_image+0x420/0x420 [ 289.992554][ T9177] ? __might_fault+0xaa/0x120 [ 289.997471][ T9177] ? __lock_acquire+0x7d40/0x7d40 [ 290.002598][ T9177] should_fail_ex+0x39d/0x4d0 [ 290.007356][ T9177] _copy_from_user+0x2f/0xe0 [ 290.012030][ T9177] generic_map_update_batch+0x54b/0x810 [ 290.017775][ T9177] ? rcu_read_unlock+0xa0/0xa0 [ 290.022639][ T9177] ? __fdget+0x180/0x210 [ 290.027047][ T9177] ? rcu_read_unlock+0xa0/0xa0 [ 290.031875][ T9177] bpf_map_do_batch+0x3d7/0x610 [ 290.036822][ T9177] __sys_bpf+0x381/0x890 [ 290.041132][ T9177] ? bpf_link_show_fdinfo+0x390/0x390 [ 290.046637][ T9177] ? lock_chain_count+0x20/0x20 [ 290.051597][ T9177] __x64_sys_bpf+0x7c/0x90 [ 290.056070][ T9177] do_syscall_64+0x55/0xa0 [ 290.060640][ T9177] ? clear_bhb_loop+0x40/0x90 [ 290.065381][ T9177] ? clear_bhb_loop+0x40/0x90 [ 290.070141][ T9177] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 290.076094][ T9177] RIP: 0033:0x7fca15b9c819 [ 290.080561][ T9177] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 290.100240][ T9177] RSP: 002b:00007fca16a46028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 290.108904][ T9177] RAX: ffffffffffffffda RBX: 00007fca15e15fa0 RCX: 00007fca15b9c819 [ 290.116927][ T9177] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 290.125054][ T9177] RBP: 00007fca16a46090 R08: 0000000000000000 R09: 0000000000000000 [ 290.133071][ T9177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 290.141170][ T9177] R13: 00007fca15e16038 R14: 00007fca15e15fa0 R15: 00007ffc13d58958 [ 290.149332][ T9177] [ 291.114732][ T9183] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1021'. [ 291.565489][ T9187] netlink: 'syz.0.1022': attribute type 29 has an invalid length. [ 291.717587][ T9192] netlink: 'syz.3.1023': attribute type 29 has an invalid length. [ 291.717990][ T9192] netlink: 'syz.3.1023': attribute type 29 has an invalid length. [ 291.829757][ T9187] netlink: 'syz.0.1022': attribute type 29 has an invalid length. [ 292.388343][ T9203] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1027'. [ 292.476804][ T9203] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1027'. [ 292.537411][ T9200] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1027'. [ 292.641884][ T9202] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1027'. [ 294.177467][ T9216] netlink: 199824 bytes leftover after parsing attributes in process `syz.2.1030'. [ 294.480209][ T9223] netlink: 'syz.1.1032': attribute type 3 has an invalid length. [ 294.506370][ T9223] netlink: 152 bytes leftover after parsing attributes in process `syz.1.1032'. [ 294.631647][ T9228] netlink: 'syz.3.1031': attribute type 10 has an invalid length. [ 295.790845][ T9238] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1031'. [ 295.986367][ T9245] bridge0: port 3(veth0_to_bridge) entered blocking state [ 296.026752][ T9245] bridge0: port 3(veth0_to_bridge) entered disabled state [ 296.035628][ T9245] veth0_to_bridge: entered allmulticast mode [ 296.058627][ T9245] veth0_to_bridge: entered promiscuous mode [ 296.064915][ T9245] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 296.120028][ T9245] bridge0: port 3(veth0_to_bridge) entered blocking state [ 296.127807][ T9245] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 296.157708][ T9244] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1035'. [ 296.555392][ T9254] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1037'. [ 296.586813][ T9254] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1037'. [ 296.597180][ T9250] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1037'. [ 296.622364][ T9253] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1037'. [ 296.956998][ T9256] netlink: 'syz.3.1039': attribute type 10 has an invalid length. [ 296.985675][ T9256] netlink: 40 bytes leftover after parsing attributes in process `syz.3.1039'. [ 297.067073][ T9257] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1038'. [ 297.164243][ T9265] netlink: 199824 bytes leftover after parsing attributes in process `syz.2.1041'. [ 297.691105][ T9268] netlink: 'syz.0.1040': attribute type 27 has an invalid length. [ 297.703002][ T9268] netlink: 164 bytes leftover after parsing attributes in process `syz.0.1040'. [ 297.914325][ T9275] netlink: 199824 bytes leftover after parsing attributes in process `syz.3.1042'. [ 299.474550][ T9291] syzkaller0: entered promiscuous mode [ 299.486593][ T9291] syzkaller0: entered allmulticast mode [ 299.617664][ T6025] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 302.508787][ T9315] __nla_validate_parse: 7 callbacks suppressed [ 302.508805][ T9315] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1052'. [ 302.688908][ T9332] netlink: 'syz.2.1055': attribute type 27 has an invalid length. [ 302.718897][ T9332] netlink: 164 bytes leftover after parsing attributes in process `syz.2.1055'. [ 302.762058][ T9334] netlink: 212912 bytes leftover after parsing attributes in process `syz.1.1057'. [ 302.778614][ T9334] openvswitch: netlink: IP tunnel dst address not specified [ 303.357298][ T9350] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1059'. [ 303.366033][ T9347] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1060'. [ 303.380519][ T9350] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1059'. [ 303.407073][ T9343] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1059'. [ 303.422992][ T9345] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1059'. [ 303.604804][ T9357] netlink: 'syz.0.1062': attribute type 10 has an invalid length. [ 303.921910][ T9358] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1064'. [ 304.371859][ T9357] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1062'. [ 305.272968][ T9393] FAULT_INJECTION: forcing a failure. [ 305.272968][ T9393] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 305.296938][ T9393] CPU: 1 PID: 9393 Comm: syz.2.1075 Not tainted syzkaller #0 [ 305.304420][ T9393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 305.314546][ T9393] Call Trace: [ 305.317900][ T9393] [ 305.320904][ T9393] dump_stack_lvl+0x18c/0x250 [ 305.325685][ T9393] ? show_regs_print_info+0x20/0x20 [ 305.331067][ T9393] ? load_image+0x420/0x420 [ 305.335752][ T9393] ? __lock_acquire+0x7d40/0x7d40 [ 305.340952][ T9393] ? snprintf+0xe9/0x140 [ 305.345413][ T9393] should_fail_ex+0x39d/0x4d0 [ 305.350189][ T9393] _copy_to_user+0x2f/0xa0 [ 305.354688][ T9393] simple_read_from_buffer+0xe7/0x150 [ 305.360154][ T9393] proc_fail_nth_read+0x1e8/0x260 [ 305.365432][ T9393] ? proc_fault_inject_write+0x360/0x360 [ 305.371143][ T9393] ? fsnotify_perm+0x271/0x5e0 [ 305.376040][ T9393] ? proc_fault_inject_write+0x360/0x360 [ 305.381867][ T9393] vfs_read+0x28b/0x970 [ 305.386108][ T9393] ? kernel_read+0x1e0/0x1e0 [ 305.390775][ T9393] ? __fget_files+0x28/0x4b0 [ 305.395446][ T9393] ? __fget_files+0x28/0x4b0 [ 305.400115][ T9393] ? __fget_files+0x43d/0x4b0 [ 305.404888][ T9393] ? __fdget_pos+0x2a3/0x330 [ 305.409561][ T9393] ? ksys_read+0x75/0x260 [ 305.414049][ T9393] ksys_read+0x150/0x260 [ 305.418376][ T9393] ? vfs_write+0x990/0x990 [ 305.422879][ T9393] ? lockdep_hardirqs_on+0x98/0x150 [ 305.428149][ T9393] do_syscall_64+0x55/0xa0 [ 305.432634][ T9393] ? clear_bhb_loop+0x40/0x90 [ 305.437395][ T9393] ? clear_bhb_loop+0x40/0x90 [ 305.442234][ T9393] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 305.448190][ T9393] RIP: 0033:0x7fca15b5d04e [ 305.452665][ T9393] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 305.472344][ T9393] RSP: 002b:00007fca16a45fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 305.480834][ T9393] RAX: ffffffffffffffda RBX: 00007fca16a466c0 RCX: 00007fca15b5d04e [ 305.489047][ T9393] RDX: 000000000000000f RSI: 00007fca16a460a0 RDI: 000000000000000b [ 305.497176][ T9393] RBP: 00007fca16a46090 R08: 0000000000000000 R09: 0000000000000000 [ 305.505214][ T9393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 305.513251][ T9393] R13: 00007fca15e16038 R14: 00007fca15e15fa0 R15: 00007ffc13d58958 [ 305.521506][ T9393] [ 305.696578][ T9405] netlink: 'syz.2.1079': attribute type 10 has an invalid length. [ 305.716608][ T9405] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 306.235951][ T9414] netlink: 'syz.2.1083': attribute type 29 has an invalid length. [ 306.251528][ T9414] netlink: 'syz.2.1083': attribute type 29 has an invalid length. [ 306.378360][ T9422] FAULT_INJECTION: forcing a failure. [ 306.378360][ T9422] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 306.409386][ T9422] CPU: 1 PID: 9422 Comm: syz.3.1085 Not tainted syzkaller #0 [ 306.416942][ T9422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 306.427052][ T9422] Call Trace: [ 306.430355][ T9422] [ 306.433384][ T9422] dump_stack_lvl+0x18c/0x250 [ 306.438102][ T9422] ? show_regs_print_info+0x20/0x20 [ 306.443318][ T9422] ? load_image+0x420/0x420 [ 306.447927][ T9422] ? __might_fault+0xaa/0x120 [ 306.452639][ T9422] ? __lock_acquire+0x7d40/0x7d40 [ 306.457683][ T9422] should_fail_ex+0x39d/0x4d0 [ 306.462390][ T9422] _copy_to_user+0x2f/0xa0 [ 306.466835][ T9422] __htab_map_lookup_and_delete_batch+0xfcd/0x1360 [ 306.473382][ T9422] ? jhash+0x740/0x740 [ 306.477473][ T9422] ? __fdget+0x180/0x210 [ 306.481738][ T9422] ? __htab_percpu_map_update_elem+0x720/0x720 [ 306.487913][ T9422] bpf_map_do_batch+0x2cb/0x610 [ 306.492781][ T9422] ? bpf_lsm_bpf+0x9/0x10 [ 306.497243][ T9422] ? security_bpf+0x7e/0xa0 [ 306.501924][ T9422] __sys_bpf+0x7d7/0x890 [ 306.506284][ T9422] ? bpf_link_show_fdinfo+0x390/0x390 [ 306.511684][ T9422] ? lock_chain_count+0x20/0x20 [ 306.516639][ T9422] __x64_sys_bpf+0x7c/0x90 [ 306.521129][ T9422] do_syscall_64+0x55/0xa0 [ 306.525564][ T9422] ? clear_bhb_loop+0x40/0x90 [ 306.530450][ T9422] ? clear_bhb_loop+0x40/0x90 [ 306.535145][ T9422] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 306.541052][ T9422] RIP: 0033:0x7f3cc339c819 [ 306.545572][ T9422] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 306.565211][ T9422] RSP: 002b:00007f3cc42cd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 306.573853][ T9422] RAX: ffffffffffffffda RBX: 00007f3cc3616090 RCX: 00007f3cc339c819 [ 306.581867][ T9422] RDX: 0000000000000038 RSI: 0000200000000040 RDI: 0000000000000018 [ 306.590026][ T9422] RBP: 00007f3cc42cd090 R08: 0000000000000000 R09: 0000000000000000 [ 306.598057][ T9422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 306.606050][ T9422] R13: 00007f3cc3616128 R14: 00007f3cc3616090 R15: 00007ffc93c07bc8 [ 306.614146][ T9422] [ 306.712011][ T9429] netlink: 'syz.1.1088': attribute type 3 has an invalid length. [ 307.633066][ T9452] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 307.824594][ T9460] __nla_validate_parse: 9 callbacks suppressed [ 307.824611][ T9460] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1097'. [ 307.840130][ T9460] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1097'. [ 307.856123][ T9455] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1097'. [ 307.870435][ T9457] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1097'. [ 307.891771][ T9451] syzkaller0: tun_chr_ioctl cmd 35108 [ 307.897768][ T9445] netlink: 'syz.1.1094': attribute type 153 has an invalid length. [ 307.907131][ T9445] netlink: 128124 bytes leftover after parsing attributes in process `syz.1.1094'. [ 307.929560][ T9451] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1094'. [ 308.029804][ T9465] netlink: 180 bytes leftover after parsing attributes in process `syz.2.1100'. [ 308.209841][ T9467] netlink: 'syz.0.1101': attribute type 1 has an invalid length. [ 308.245314][ T9467] netlink: 181400 bytes leftover after parsing attributes in process `syz.0.1101'. [ 308.423163][ T9474] netlink: 199824 bytes leftover after parsing attributes in process `syz.3.1104'. [ 308.558917][ T9478] netlink: 'syz.2.1105': attribute type 10 has an invalid length. [ 308.601601][ T9478] netlink: 'syz.2.1105': attribute type 10 has an invalid length. [ 308.613619][ T9478] netlink: 209216 bytes leftover after parsing attributes in process `syz.2.1105'. [ 308.623734][ T9478] openvswitch: netlink: Message has 4 unknown bytes. [ 312.258325][ T9545] netlink: 'syz.2.1128': attribute type 1 has an invalid length. [ 312.636321][ T9548] FAULT_INJECTION: forcing a failure. [ 312.636321][ T9548] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 312.691001][ T9548] CPU: 1 PID: 9548 Comm: syz.2.1129 Not tainted syzkaller #0 [ 312.698481][ T9548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 312.708670][ T9548] Call Trace: [ 312.712007][ T9548] [ 312.715034][ T9548] dump_stack_lvl+0x18c/0x250 [ 312.719775][ T9548] ? show_regs_print_info+0x20/0x20 [ 312.725388][ T9548] ? load_image+0x420/0x420 [ 312.729959][ T9548] ? __might_fault+0xaa/0x120 [ 312.734765][ T9548] ? __lock_acquire+0x7d40/0x7d40 [ 312.739870][ T9548] should_fail_ex+0x39d/0x4d0 [ 312.744617][ T9548] _copy_to_user+0x2f/0xa0 [ 312.749088][ T9548] ip_tunnel_siocdevprivate+0x162/0x1f0 [ 312.754677][ T9548] ? dev_ioctl+0x83c/0x1140 [ 312.759225][ T9548] ? ip_tunnel_update+0xb10/0xb10 [ 312.764307][ T9548] ? dev_ifsioc+0x958/0xc40 [ 312.769077][ T9548] dev_ioctl+0x84c/0x1140 [ 312.773508][ T9548] sock_ioctl+0x74c/0x7e0 [ 312.778051][ T9548] ? sock_poll+0x3e0/0x3e0 [ 312.782606][ T9548] ? bpf_lsm_file_ioctl+0x9/0x10 [ 312.787594][ T9548] ? security_file_ioctl+0x80/0xa0 [ 312.792754][ T9548] ? sock_poll+0x3e0/0x3e0 [ 312.797227][ T9548] __se_sys_ioctl+0xfd/0x170 [ 312.801956][ T9548] do_syscall_64+0x55/0xa0 [ 312.806461][ T9548] ? clear_bhb_loop+0x40/0x90 [ 312.811205][ T9548] ? clear_bhb_loop+0x40/0x90 [ 312.816021][ T9548] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 312.821972][ T9548] RIP: 0033:0x7fca15b9c819 [ 312.826426][ T9548] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 312.846168][ T9548] RSP: 002b:00007fca16a46028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 312.854616][ T9548] RAX: ffffffffffffffda RBX: 00007fca15e15fa0 RCX: 00007fca15b9c819 [ 312.862708][ T9548] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000004 [ 312.870715][ T9548] RBP: 00007fca16a46090 R08: 0000000000000000 R09: 0000000000000000 [ 312.878715][ T9548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 312.886721][ T9548] R13: 00007fca15e16038 R14: 00007fca15e15fa0 R15: 00007ffc13d58958 [ 312.894751][ T9548] [ 313.255583][ T9553] __nla_validate_parse: 5 callbacks suppressed [ 313.255605][ T9553] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1130'. [ 315.816325][ T9579] FAULT_INJECTION: forcing a failure. [ 315.816325][ T9579] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 315.830586][ T9579] CPU: 0 PID: 9579 Comm: syz.0.1138 Not tainted syzkaller #0 [ 315.838027][ T9579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 315.848657][ T9579] Call Trace: [ 315.852074][ T9579] [ 315.855047][ T9579] dump_stack_lvl+0x18c/0x250 [ 315.859801][ T9579] ? show_regs_print_info+0x20/0x20 [ 315.865057][ T9579] ? load_image+0x420/0x420 [ 315.869616][ T9579] ? __might_fault+0xaa/0x120 [ 315.874340][ T9579] ? __lock_acquire+0x7d40/0x7d40 [ 315.879419][ T9579] should_fail_ex+0x39d/0x4d0 [ 315.884254][ T9579] _copy_from_user+0x2f/0xe0 [ 315.888910][ T9579] generic_map_update_batch+0x54b/0x810 [ 315.894536][ T9579] ? rcu_read_unlock+0xa0/0xa0 [ 315.899356][ T9579] ? __fdget+0x180/0x210 [ 315.903828][ T9579] ? rcu_read_unlock+0xa0/0xa0 [ 315.908717][ T9579] bpf_map_do_batch+0x3d7/0x610 [ 315.913729][ T9579] __sys_bpf+0x381/0x890 [ 315.918033][ T9579] ? bpf_link_show_fdinfo+0x390/0x390 [ 315.923493][ T9579] ? lock_chain_count+0x20/0x20 [ 315.928411][ T9579] __x64_sys_bpf+0x7c/0x90 [ 315.932873][ T9579] do_syscall_64+0x55/0xa0 [ 315.937337][ T9579] ? clear_bhb_loop+0x40/0x90 [ 315.942063][ T9579] ? clear_bhb_loop+0x40/0x90 [ 315.946795][ T9579] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 315.952739][ T9579] RIP: 0033:0x7fecd319c819 [ 315.957293][ T9579] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 315.977041][ T9579] RSP: 002b:00007fecd40ed028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 315.985516][ T9579] RAX: ffffffffffffffda RBX: 00007fecd3415fa0 RCX: 00007fecd319c819 [ 315.993579][ T9579] RDX: 0000000000000038 RSI: 0000200000000300 RDI: 000000000000001a [ 316.001607][ T9579] RBP: 00007fecd40ed090 R08: 0000000000000000 R09: 0000000000000000 [ 316.009632][ T9579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 316.017925][ T9579] R13: 00007fecd3416038 R14: 00007fecd3415fa0 R15: 00007ffec3e0d5c8 [ 316.025987][ T9579] [ 316.415898][ T9585] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1140'. [ 316.430658][ T9586] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 316.708612][ T9586] netlink: 'syz.0.1141': attribute type 153 has an invalid length. [ 316.712204][ T9593] syzkaller0: tun_chr_ioctl cmd 35108 [ 316.746984][ T9586] netlink: 128124 bytes leftover after parsing attributes in process `syz.0.1141'. [ 316.902577][ T9599] FAULT_INJECTION: forcing a failure. [ 316.902577][ T9599] name failslab, interval 1, probability 0, space 0, times 0 [ 316.915977][ T9599] CPU: 0 PID: 9599 Comm: syz.3.1145 Not tainted syzkaller #0 [ 316.923403][ T9599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 316.933502][ T9599] Call Trace: [ 316.936831][ T9599] [ 316.939091][ T9586] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1141'. [ 316.939787][ T9599] dump_stack_lvl+0x18c/0x250 [ 316.939863][ T9599] ? sctp_sendmsg+0x1575/0x28c0 [ 316.939886][ T9599] ? ___sys_sendmsg+0x2a6/0x360 [ 316.939907][ T9599] ? show_regs_print_info+0x20/0x20 [ 316.939937][ T9599] ? load_image+0x420/0x420 [ 316.939978][ T9599] should_fail_ex+0x39d/0x4d0 [ 316.977992][ T9599] should_failslab+0x9/0x20 [ 316.982540][ T9599] slab_pre_alloc_hook+0x59/0x310 [ 316.987682][ T9599] ? sctp_add_bind_addr+0x8c/0x360 [ 316.992860][ T9599] __kmem_cache_alloc_node+0x53/0x250 [ 316.998274][ T9599] ? sctp_add_bind_addr+0x8c/0x360 [ 317.003438][ T9599] kmalloc_trace+0x2a/0xe0 [ 317.007988][ T9599] sctp_add_bind_addr+0x8c/0x360 [ 317.013046][ T9599] sctp_copy_local_addr_list+0x315/0x4f0 [ 317.018707][ T9599] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 317.024456][ T9599] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 317.030542][ T9599] ? sctp_v4_is_any+0x35/0x60 [ 317.035231][ T9599] ? sctp_copy_one_addr+0x8c/0x350 [ 317.040359][ T9599] sctp_bind_addr_copy+0xb3/0x3c0 [ 317.045401][ T9599] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 317.051759][ T9599] sctp_connect_new_asoc+0x2f9/0x6a0 [ 317.057198][ T9599] ? __sctp_connect+0xd80/0xd80 [ 317.062093][ T9599] ? __local_bh_enable_ip+0x13a/0x1c0 [ 317.067514][ T9599] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 317.073111][ T9599] ? security_sctp_bind_connect+0x89/0xb0 [ 317.078870][ T9599] sctp_sendmsg+0x1575/0x28c0 [ 317.083667][ T9599] ? sctp_getsockopt+0xb60/0xb60 [ 317.088717][ T9599] ? aa_sk_perm+0x83c/0x970 [ 317.093341][ T9599] ? aa_af_perm+0x330/0x330 [ 317.097863][ T9599] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 317.104495][ T9599] ? sock_rps_record_flow+0x19/0x3f0 [ 317.109906][ T9599] ? inet_sendmsg+0xe9/0x2f0 [ 317.114665][ T9599] ? inet_send_prepare+0x260/0x260 [ 317.119893][ T9599] ____sys_sendmsg+0x5ba/0x960 [ 317.124802][ T9599] ? __asan_memset+0x22/0x40 [ 317.129429][ T9599] ? __sys_sendmsg_sock+0x30/0x30 [ 317.134596][ T9599] ? __import_iovec+0x3fa/0x850 [ 317.139477][ T9599] ? import_iovec+0x73/0xa0 [ 317.144262][ T9599] ___sys_sendmsg+0x2a6/0x360 [ 317.149100][ T9599] ? get_pid_task+0x20/0x1e0 [ 317.153719][ T9599] ? __sys_sendmsg+0x2a0/0x2a0 [ 317.158515][ T9599] ? __lock_acquire+0x7d40/0x7d40 [ 317.163755][ T9599] __se_sys_sendmsg+0x1c2/0x2b0 [ 317.168634][ T9599] ? __x64_sys_sendmsg+0x80/0x80 [ 317.173711][ T9599] ? lockdep_hardirqs_on+0x98/0x150 [ 317.178959][ T9599] do_syscall_64+0x55/0xa0 [ 317.183425][ T9599] ? clear_bhb_loop+0x40/0x90 [ 317.188142][ T9599] ? clear_bhb_loop+0x40/0x90 [ 317.192962][ T9599] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 317.199339][ T9599] RIP: 0033:0x7f3cc339c819 [ 317.203795][ T9599] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 317.223440][ T9599] RSP: 002b:00007f3cc42ee028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 317.232004][ T9599] RAX: ffffffffffffffda RBX: 00007f3cc3615fa0 RCX: 00007f3cc339c819 [ 317.239994][ T9599] RDX: 0000000000000080 RSI: 0000200000000380 RDI: 0000000000000005 [ 317.247989][ T9599] RBP: 00007f3cc42ee090 R08: 0000000000000000 R09: 0000000000000000 [ 317.255971][ T9599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 317.263955][ T9599] R13: 00007f3cc3616038 R14: 00007f3cc3615fa0 R15: 00007ffc93c07bc8 [ 317.272048][ T9599] [ 317.557066][ T1290] ieee802154 phy0 wpan0: encryption failed: -22 [ 317.563565][ T1290] ieee802154 phy1 wpan1: encryption failed: -22 [ 318.323000][ T9627] netlink: 'syz.1.1157': attribute type 39 has an invalid length. [ 318.565277][ T9621] netlink: 'syz.2.1155': attribute type 1 has an invalid length. [ 318.606509][ T9621] netlink: 161700 bytes leftover after parsing attributes in process `syz.2.1155'. [ 319.124207][ T9634] syzkaller0: entered promiscuous mode [ 319.167129][ T9634] syzkaller0: entered allmulticast mode [ 319.811199][ T9650] netlink: 'syz.2.1160': attribute type 153 has an invalid length. [ 319.902324][ T9650] netlink: 128124 bytes leftover after parsing attributes in process `syz.2.1160'. [ 320.072655][ T9648] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 322.019428][ T9641] syzkaller0: tun_chr_ioctl cmd 35108 [ 322.031166][ T9646] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1160'. [ 322.040769][ T9667] netlink: 'syz.1.1165': attribute type 1 has an invalid length. [ 322.053325][ T9667] netlink: 176 bytes leftover after parsing attributes in process `syz.1.1165'. [ 322.064239][ T9662] syzkaller0: entered promiscuous mode [ 322.074059][ T9662] syzkaller0: entered allmulticast mode [ 322.155849][ T9676] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1162'. [ 322.415328][ T9691] netlink: 'syz.3.1170': attribute type 2 has an invalid length. [ 322.427243][ T9691] netlink: 17255 bytes leftover after parsing attributes in process `syz.3.1170'. [ 322.663291][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.676113][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.689027][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.701746][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.714431][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.727217][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.739867][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.752691][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.765457][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 322.778333][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 324.742664][ T9713] netlink: 'syz.3.1176': attribute type 6 has an invalid length. [ 324.909696][ T9714] netlink: 176 bytes leftover after parsing attributes in process `syz.1.1175'. [ 324.996942][ T9716] netlink: 'syz.3.1176': attribute type 21 has an invalid length. [ 325.305825][ T9715] À: port 1(vlan0) entered blocking state [ 325.359433][ T9715] À: port 1(vlan0) entered disabled state [ 325.425919][ T9715] vlan0: entered allmulticast mode [ 325.445685][ T9715] veth0_vlan: entered allmulticast mode [ 325.495704][ T9715] vlan0: entered promiscuous mode [ 327.678751][ C0] net_ratelimit: 3081 callbacks suppressed [ 327.678787][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.706115][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.720304][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.734564][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.756208][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.770497][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 327.789793][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 327.803098][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 327.816455][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 327.829963][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 332.687239][ C1] net_ratelimit: 3788 callbacks suppressed [ 332.687261][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 332.688212][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.694462][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 332.724742][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.731141][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 332.754911][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.755817][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 332.780792][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 332.786300][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 332.794277][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 333.199906][ T6025] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 337.697900][ C1] net_ratelimit: 3683 callbacks suppressed [ 337.697922][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 337.706978][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.717176][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 337.741647][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 337.743959][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.755129][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 337.779565][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 337.787833][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 337.793038][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 337.817439][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 342.706886][ C1] net_ratelimit: 5657 callbacks suppressed [ 342.706906][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 342.725719][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.738910][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 342.752055][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.765089][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 342.778025][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.790987][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 342.804030][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.817043][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 342.829936][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.717532][ C1] net_ratelimit: 5509 callbacks suppressed [ 347.717554][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 347.736669][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.740531][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.749669][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 347.774146][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.780063][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.787095][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 347.811383][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.815495][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 347.824531][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 352.727494][ C1] net_ratelimit: 5627 callbacks suppressed [ 352.727515][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.741205][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.746536][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 352.770913][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.773260][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.784459][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 352.808548][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.816698][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 352.821613][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 352.846264][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 357.736791][ C1] net_ratelimit: 5618 callbacks suppressed [ 357.736813][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 357.746311][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.755540][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 357.780126][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 357.787101][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.793000][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 357.817878][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 357.820065][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.830860][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 357.855299][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 362.746778][ C0] net_ratelimit: 12415 callbacks suppressed [ 362.746796][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.760629][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 362.765245][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.789354][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.801906][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.814484][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.814895][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 362.827064][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.851354][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.863928][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.756894][ C0] net_ratelimit: 11547 callbacks suppressed [ 367.756914][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.758810][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 367.763427][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.791145][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 367.799754][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.824180][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.826731][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 367.836719][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.861044][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.866354][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 372.766750][ C0] net_ratelimit: 11996 callbacks suppressed [ 372.766772][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.772521][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 372.773045][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.799520][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 372.809429][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.834048][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.839790][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 372.846727][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.870909][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.872021][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.776875][ C0] net_ratelimit: 12081 callbacks suppressed [ 377.776895][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.791096][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 377.795332][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.795773][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.832250][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.833741][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.844716][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.869223][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.871709][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 377.881733][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.179955][ T1290] ieee802154 phy0 wpan0: encryption failed: -22 [ 381.199132][ T1290] ieee802154 phy1 wpan1: encryption failed: -22 [ 382.787139][ C0] net_ratelimit: 12245 callbacks suppressed [ 382.787159][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.788653][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.793517][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.826002][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 382.830182][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.854636][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.859603][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.867172][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.891696][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.896688][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 387.796845][ C0] net_ratelimit: 15929 callbacks suppressed [ 387.796866][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.797050][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 387.803221][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.815720][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.827538][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.839999][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 387.851433][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.863875][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.875706][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.888063][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 392.806817][ C1] net_ratelimit: 7942 callbacks suppressed [ 392.806838][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 392.813217][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.825881][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 392.842434][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.850272][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 392.870522][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.874652][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 392.893268][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.899481][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 392.917067][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.817414][ C1] net_ratelimit: 6053 callbacks suppressed [ 397.817435][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 397.822103][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.824578][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 397.843750][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.848477][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 397.865404][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.873074][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 397.893181][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.897295][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 397.914621][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.827053][ C1] net_ratelimit: 6004 callbacks suppressed [ 402.827081][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 402.833294][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.846118][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 402.867488][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.870563][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 402.889651][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.895003][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 402.916118][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.919679][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 402.937765][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.836709][ C1] net_ratelimit: 5968 callbacks suppressed [ 407.836729][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 407.837042][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.843523][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 407.865641][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.867441][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 407.886163][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.891806][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 407.911993][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.916173][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 407.935303][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.847214][ C1] net_ratelimit: 6059 callbacks suppressed [ 412.847245][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 412.850826][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.853906][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 412.872329][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.878905][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 412.895201][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.902644][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 412.921109][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.927781][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 412.946464][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.857058][ C0] net_ratelimit: 11428 callbacks suppressed [ 417.857086][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.857213][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 417.863349][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.875905][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 417.887614][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.900108][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 417.911695][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.924257][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 417.936124][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.948426][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 422.866751][ C0] net_ratelimit: 14683 callbacks suppressed [ 422.866772][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.868450][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 422.873174][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.906184][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 422.909695][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.934340][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.940239][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 422.947097][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.971253][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.975249][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 427.877082][ C0] net_ratelimit: 12290 callbacks suppressed [ 427.877103][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.885973][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 427.895564][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.895994][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.927205][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 427.932113][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.956548][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.958569][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 427.969082][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.993394][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.886753][ C0] net_ratelimit: 11960 callbacks suppressed [ 432.886774][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.891021][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 432.893182][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.918643][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 432.929499][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.954086][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.958915][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 432.966782][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.967213][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.995384][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 437.896812][ C0] net_ratelimit: 12058 callbacks suppressed [ 437.896833][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.899261][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 437.903203][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.931419][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 437.939616][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.963925][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.967287][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 437.976295][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.000380][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.001202][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 441.677956][ T1290] ieee802154 phy0 wpan0: encryption failed: -22 [ 441.696585][ T1290] ieee802154 phy1 wpan1: encryption failed: -22 [ 442.906975][ C0] net_ratelimit: 12618 callbacks suppressed [ 442.906995][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.919390][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 442.925460][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.949795][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.951495][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 442.962298][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.986833][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.992402][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 442.999292][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.023784][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.916669][ C0] net_ratelimit: 12421 callbacks suppressed [ 447.916690][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.924948][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 447.935007][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.959341][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.960559][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 447.971813][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 447.996256][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.000771][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 448.008739][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.033569][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.926912][ C0] net_ratelimit: 12149 callbacks suppressed [ 452.926934][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.931175][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 452.933601][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.964072][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 452.969963][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.970417][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 452.998814][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 453.007090][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.007531][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.034577][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 457.936866][ C0] net_ratelimit: 12516 callbacks suppressed [ 457.936886][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.946320][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 457.955734][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 457.980172][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 457.980435][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.004783][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.009244][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 458.017345][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.041922][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.044796][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 462.946941][ C0] net_ratelimit: 12165 callbacks suppressed [ 462.946962][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.952738][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 462.953362][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 462.982941][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 462.990429][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 463.014903][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 463.019234][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 463.027318][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 463.027753][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 463.055533][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 467.957033][ C0] net_ratelimit: 12365 callbacks suppressed [ 467.957053][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 467.971793][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 467.975335][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.000091][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.001009][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.012620][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.036821][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.038993][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 468.049274][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.073731][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 472.967078][ C0] net_ratelimit: 12375 callbacks suppressed [ 472.967098][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 472.967471][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 472.973426][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.002882][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 473.010218][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.034795][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.035128][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.047381][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.047732][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.075991][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 475.220867][ T6002] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 477.977145][ C1] net_ratelimit: 6209 callbacks suppressed [ 477.977167][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 477.981327][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 477.984069][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 478.004874][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.008584][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 478.025536][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.032779][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 478.052261][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.057228][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 478.073870][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.987153][ C0] net_ratelimit: 5850 callbacks suppressed [ 482.987209][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.987447][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 483.000607][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 483.006241][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 483.027707][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 483.031032][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 483.047992][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 483.055374][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 483.076537][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 483.079864][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 487.997378][ C1] net_ratelimit: 5783 callbacks suppressed [ 487.997399][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 488.001079][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.003996][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 488.022961][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.028518][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 488.045610][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.052455][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 488.071822][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.077691][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 488.094989][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 493.006986][ C1] net_ratelimit: 5913 callbacks suppressed [ 493.007007][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 493.011716][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 493.013944][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 493.035371][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 493.038394][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 493.057625][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 493.062700][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 493.082567][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 493.087160][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 493.104580][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 498.017131][ C1] net_ratelimit: 5835 callbacks suppressed [ 498.017152][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 498.020790][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 498.024183][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 498.041984][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 498.048889][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 498.067645][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 498.073160][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 498.092313][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 498.097878][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 498.118550][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.027157][ C1] net_ratelimit: 6004 callbacks suppressed [ 503.027179][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 503.028978][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.033951][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 503.053541][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.058383][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 503.076739][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.082986][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 503.100952][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.107170][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 503.125178][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.424433][ T1290] ieee802154 phy0 wpan0: encryption failed: -22 [ 506.445936][ T1290] ieee802154 phy1 wpan1: encryption failed: -22 [ 508.037284][ C1] net_ratelimit: 6056 callbacks suppressed [ 508.037303][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 508.040416][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.043924][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 508.060856][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.068665][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 508.087051][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.093349][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 508.113251][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.119266][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 508.139584][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.047167][ C1] net_ratelimit: 8752 callbacks suppressed [ 513.047190][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 513.048599][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.053804][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 513.074738][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.078660][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 513.097388][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.103569][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 513.122590][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.128043][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 513.146244][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.056962][ C1] net_ratelimit: 5934 callbacks suppressed [ 518.056982][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 518.063465][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.075685][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 518.097200][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.100178][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 518.119125][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.124710][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 518.147617][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.149461][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 518.169575][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.066635][ C1] net_ratelimit: 5846 callbacks suppressed [ 523.066655][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 523.068360][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.073789][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 523.091198][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.097956][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 523.116927][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.122849][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 523.142133][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.147392][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 523.167600][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.076774][ C1] net_ratelimit: 6328 callbacks suppressed [ 528.076794][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 528.081462][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.083515][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 528.102527][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.107715][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 528.126630][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.132746][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 528.152660][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.157366][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 528.176304][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.086929][ C1] net_ratelimit: 6229 callbacks suppressed [ 533.086949][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 533.089630][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.093703][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 533.112861][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.118144][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 533.137881][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.142669][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 533.161047][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.166943][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 533.184575][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 534.783851][ T29] INFO: task syz.0.1172:9694 blocked for more than 149 seconds. [ 534.806435][ T29] Not tainted syzkaller #0 [ 538.097331][ C1] net_ratelimit: 5799 callbacks suppressed [ 538.097353][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 538.100761][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.103985][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 538.124928][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.128417][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 538.144992][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.152905][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 538.173662][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.177530][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 538.196857][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.107051][ C1] net_ratelimit: 6087 callbacks suppressed [ 543.107071][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 543.109218][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.117320][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 543.132839][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.138129][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 543.156462][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.163022][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:1a:5e:0c:f9:b2:1c, vlan:0) [ 543.185663][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.188377][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 543.207159][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.224744][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 543.224761][ T29] task:syz.0.1172 state:D stack:24392 pid:9694 ppid:5768 flags:0x00004004 [ 543.224808][ T29] Call Trace: [ 543.224818][ T29] [ 543.224834][ T29] __schedule+0x1553/0x45a0 [ 543.224881][ T29] ? trace_event_raw_event_lock+0x250/0x250 [ 543.224906][ T29] ? _raw_spin_unlock_irqrestore+0x86/0x120 [ 543.224947][ T29] ? asan.module_dtor+0x20/0x20 [ 543.224979][ T29] ? __mutex_lock+0x6a4/0xcc0 [ 543.225003][ T29] ? __mutex_trylock_common+0x8a/0x260 [ 543.225028][ T29] ? trace_raw_output_contention_end+0xd0/0xd0 [ 543.225061][ T29] schedule+0xbd/0x170 [ 543.225092][ T29] schedule_preempt_disabled+0x13/0x20 [ 543.225121][ T29] __mutex_lock+0x6a9/0xcc0 [ 543.225144][ T29] ? __mutex_lock+0x4f9/0xcc0 [ 543.225170][ T29] ? perf_trace_destroy+0x2e/0x140 [ 543.225198][ T29] ? mutex_lock_nested+0x20/0x20 [ 543.225216][ T29] ? __mutex_lock+0x315/0xcc0 [ 543.225255][ T29] ? __mutex_unlock_slowpath+0x1b4/0x6c0 [ 543.225278][ T29] ? perf_detach_cgroup+0x310/0x310 [ 543.225308][ T29] ? perf_swevent_read+0x10/0x10 [ 543.225338][ T29] perf_trace_destroy+0x2e/0x140 [ 543.225361][ T29] ? perf_swevent_read+0x10/0x10 [ 543.225390][ T29] _free_event+0xb73/0xf30 [ 543.225426][ T29] perf_event_release_kernel+0x842/0x8d0 [ 543.225453][ T29] ? __might_sleep+0xe0/0xe0 [ 543.225480][ T29] ? calc_timer_values+0x400/0x400 [ 543.225507][ T29] ? __fput+0x61c/0x970 [ 543.225531][ T29] ? perf_mmap+0x15c0/0x15c0