last executing test programs: 12m38.467300697s ago: executing program 2 (id=5937): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x10, 0x0, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x20000000000000c8, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000000)="d5", 0x101d0}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) close(r0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x50) sendmsg$kcm(r2, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f00000006c0)='@', 0x1}], 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000800000000000000072dfff000000000020000000000000008400000008000000eeb4fe8ba15e3999ef"], 0x38}, 0x41) 12m37.874919611s ago: executing program 2 (id=5938): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000aecd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad94ed406f21caf5adcf920569c00cc1199684fa75814709fea019af247c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c1faca0f9d9924be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6fab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b79db2e3d5986c82b5aa94e539b204d58f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c7160ec83070000020000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72b0000000000001cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2cc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78ac02ca3cdf6a662db1c9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad943e392955f4f979ea13201bafedcd2063d11dd665647223c78a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd89346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca2533659edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffca9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a294351c5356c1d06c92cf8ce3c7c56cd31121624d74517fd3666277f670e812b28e2f30d035cee5d0e77a3c7220000000000000005a474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f034b8d3ebce68663ef5af469abe75b314fae31a0445859a5ece8fb11a4ee8e46354c9c3a041e12282ce24463aaf28345bd168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f09000000000000004fc4bda3453602004535a976eacd3adaa4d2ee6fe0d072ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d401adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb40f7f02f750d6c977a191852c9ae031db044b2353199546609f9f69a6cfefdf879d447df53f3b9b70d10355b00300000000000000553d18a6cc50feeb7bfad9b7be3283b6450d264e7712d2f1d7004548b19162cef04d18d4f58fab987baab97a9bfbd8f185b5631820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe527340935aa3c0b4f3f45b418a18217747ae442e31560e5b741445ea2a1acee2a81425ff000000d2a0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51423b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f88735fce5115dc83ed73d8ee4a91322608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf5000000000000fa08ad0631c4b839688b22c4da2a6bc4cf45854d221a2d5f96bc64647f15daa2ba79cd0f4254ed55217912ef84bd2927df82fc061aef2920c49b2a90886da75561173fa186cb7ee86dd4285c4721eb428c953296bb2f5d825da54dbef07c1b349b4901e093d13e6b9a0000009b5b22e887bc061d40bcaf0aa18623fd9b7179ccc692ba74b531b65c4decf9d080a8ac7e82d4cde1267aa64b2a94fd87a009e6742c2ddc3a9d7eccbb1831b1fa218277c2814a91cab7cb59c697166d6f1bb1a360470000000000000000000000000000000000000000000000000000f9f9b4ce7e871f507084c8c88e0652decbe579b03ed84ea94597dd1059620a050f69ea03b99b4e19d35f4a3b54e96ae2172effecec80f6baa4bf69a6ebf5392882df78b0983e662dc0cb64b77f3f006b6b25443197ae93f0be6de5a703d003f00720943c0e4b33af00000000000000000021a688b2d7007fcc4b59f719afb0b3b7e0aee306ca70fe42bf4984a68f40e1fc043a03a17e4744359b87dc27c82d51cbeb64e52a28daeb6a78d6fe06181ecc840000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="5c0000001e006bcd9e3fe3dc6e08000007000000190000007ea60864160af36504005425198bc3488bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f668c3664402682fb6e27bbfa83b5cae0300c9f4d1938037e786a6", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x138f67536d80380e, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x5, 0x10, 0x0, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x1, 0x8000000}]}]}}, 0x0, 0x42}, 0x28) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000140)={'veth1_macvtap\x00'}) socket$kcm(0x2, 0x5, 0x84) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3c, 0x3}, {0x6}]}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000280)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f00000007c0)=ANY=[], 0x6) 12m36.529190741s ago: executing program 3 (id=5945): r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x8, 0x0, 0x4000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="5c0000001e006bcd9e3fe3dc6e08000007000000190000007ea60864160af36504005425198bc3488bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f668c3664402682fb6e27bbfa83b5cae0300c9f4d1938037e786a6", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x138f67536d80380e, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x5, 0x10, 0x0, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x1, 0x8000000}]}]}}, 0x0, 0x42}, 0x28) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000140)={'veth1_macvtap\x00'}) socket$kcm(0x2, 0x5, 0x84) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3c, 0x3}, {0x6}]}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000280)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f00000007c0)=ANY=[], 0x6) 12m33.683001368s ago: executing program 1 (id=5950): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x5, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000002c0)='GPL\x00', 0x5, 0xbc, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffd}, 0x10}, 0x94) perf_event_open$cgroup(&(0x7f00000001c0)={0x2, 0x80, 0x1, 0x3, 0x2f, 0x40, 0x0, 0x0, 0x20000, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x2}, 0x4, 0x3, 0x6, 0x8, 0x22c00000000000, 0xffffffff, 0x8, 0x0, 0x4, 0x0, 0x40}, 0xffffffffffffffff, 0xa, r0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, 0x0, &(0x7f0000000500), 0xce}, 0x38) bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=ANY=[], 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x400000002, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000000c0)={0x2, 0x0, [0x0, 0x0]}) sendmsg$inet(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000180)="1c0000005e007f62516a071c02f8abc36f1d73dbe1ce84ebc7c4c1c9", 0x1c}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f00000001c0)={0x0, 0x64, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040)}, 0x800, 0x9, 0x6, 0x1, 0xfffffffffdf7bbfe, 0x0, 0x5, 0x0, 0xfffeffff, 0x0, 0x3}, 0x0, 0x4000000000e, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=@base={0xb, 0x5, 0x7, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20}, [@ringbuf_query, @ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 12m33.437423103s ago: executing program 3 (id=5952): getpid() bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x5, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x5, 0xbc, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffd}, 0x10}, 0x94) perf_event_open$cgroup(&(0x7f00000001c0)={0x2, 0x80, 0x1, 0x3, 0x2f, 0x40, 0x0, 0x0, 0x20000, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x2}, 0x4, 0x3, 0x6, 0x8, 0x22c00000000000, 0xffffffff, 0x8, 0x0, 0x4, 0x0, 0x40}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=ANY=[], 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000180)="1c0000005e007f62516a071c02f8abc36f1d73dbe1ce84ebc7c4c1c9", 0x1c}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f00000001c0)={0x0, 0x64, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040)}, 0x800, 0x9, 0x6, 0x1, 0xfffffffffdf7bbfe, 0x0, 0x5, 0x0, 0xfffeffff, 0x0, 0x3}, 0x0, 0x4000000000e, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=@base={0xb, 0x5, 0x7, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20}, [@ringbuf_query, @ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 12m33.415868154s ago: executing program 2 (id=5953): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="5c0000001e006bcd9e3fe3dc6e08000007000000190000007ea60864160af36504005425198bc3488bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f668c3664402682fb6e27bbfa83b5cae0300c9f4d1938037e786a6", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x138f67536d80380e, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x5, 0x10, 0x0, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x1, 0x8000000}]}]}}, 0x0, 0x42}, 0x28) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000140)={'veth1_macvtap\x00'}) socket$kcm(0x2, 0x5, 0x84) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3c, 0x3}, {0x6}]}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000280)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f00000007c0)=ANY=[], 0x6) 12m33.282859662s ago: executing program 1 (id=5955): socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0xc, 0xb, 0x0, &(0x7f00000005c0)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001040)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000003c0)="b9ff03316844268cb89e14f00800", 0x0, 0x2000000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 12m32.825061339s ago: executing program 1 (id=5956): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b700000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r1}) r4 = socket$kcm(0x10, 0x2, 0x4) close(r4) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="180000006800930de85ca5ef0d4a33008800000000000000", 0x18}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r5 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r5, &(0x7f0000003a80)={&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000003a00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1}}}], 0x20}, 0x4008804) sendmsg$kcm(r5, &(0x7f0000000480)={&(0x7f00000002c0)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f0000000180)=[{&(0x7f0000002800)="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", 0x306}, {&(0x7f0000002b40)="da752f575198baaac222d34e85893d37a6bd281687872ed9151c56f415698f3fecf56eebf5edb42ed5d54e0419b2a13128d3ad19b6eed6b4aad46baaa57203e0d4f567d8d79fe07e7b3142de43e55cf69c65db2469175cf60c82f49d0f9dc4c4dde733a14d57f4117ed2f46aea5950ff0176d73349c2808eee62ce1c7d846ffdf65211f3192dabe5b3ac1516ad90e618d0ca9e4ac2778acabeac244f2f90af2616647e5cf8ab5e2ac404ebf2a866c8a73f68ae2cc4523e63e3a1aa5ab60a23e4c47534bda546042120c5333d91fefc68226bc9149d282937797a2fe036a58c9ecd19e54bcfb85d3f75ec7c74d86be94ef6b9191e0fa86d2a9330af3f592e24bc30b84632e5121bf04abc0e12f4073f6678ad97b786cc73b8175e35eda542e3631d283a3ca6fef91607ec7dee1b4a62bae169cc8fb64e8bdef95474f0b3c526f69ce55281e18016a4785875ba99e313fd63f66cfd36234bcc6048f25bce8cce39cf709eb10e1ea88497ff7401aae0d4a7e07f14691b6c4b75dc16e2586744317ffbb9966d8bfb16efcdf6ab308426e5c1aec6a6636122ffaca89af3b03834612b93989d0bbb251a42c1b48b86ac7162ad8d5cbf3d6cfccdc590724ff6caa85320f9d5beea2370b8c0533c19422c9097a7164651ad9d8f9cca4ea7815e53fd9c42eab1cb76b451cd3b18cf31c16d01731efd1506b844f52d2f173c825a7f8814ada5f6361a48f20250df6b98965d0c85f3df3b72b2ac49f3ed52e6fa30d7d3d54d95e8bd13ec2ed4883feb3b778d624ff0c1a3ec900671acd0ff00edc7b96d1cad51fba25565c67ce0e62302dbff8f68c0de8330c44704b2f019a7afc753538ed61f3744f286735af18a8f5e7ae3fd66e4562565b31a9e5d947a06ea69ee5f0ea97d2e832e1bbc9e74498a2f99473ef8822ad0254013fefff6c4c35d84072307633de00985a6477ff6480e75", 0x2ab}], 0x2}, 0x8400) sendmsg$inet(r5, &(0x7f0000000500)={&(0x7f0000000080)={0x2, 0x80, @local}, 0x10, &(0x7f0000000b00)=[{&(0x7f0000000640)="455b1c1ed590", 0x6}], 0x1}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0xf, 0x0, &(0x7f0000001a40)="c1dfb080cd217b283fd308098ee688", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 12m30.865944074s ago: executing program 4 (id=5957): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f4, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={&(0x7f00000005c0)=""/108, 0x6c, 0x0, &(0x7f0000000640)=""/242, 0xf2}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x16, 0x10, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, {}, {}, [@jmp={0x5, 0x0, 0xb, 0x2, 0x1, 0x20, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x10, 0xa3, &(0x7f0000000380)=""/163, 0x41100, 0x58, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000580)={0x2, 0x6, 0x2, 0x1}, 0x10, r3, r2, 0x6, &(0x7f0000000840)=[r4, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x5, 0x2, 0xe, 0xe}, {0x0, 0x2, 0xa, 0xb}, {0x3, 0x2, 0xc, 0x8}, {0x3, 0x1, 0x2, 0xa}, {0x2, 0x4, 0xf, 0x5}, {0x3, 0x1, 0x4, 0xa}], 0x10, 0x2}, 0x94) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x7fff, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x1}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@raw=[@generic={0xca, 0x6, 0x7, 0x4, 0x101}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x0, 0x8, 0x0, 0xb, 0xc}, @alu={0x7, 0x0, 0xa, 0x7, 0x0, 0x6, 0xffffffffffffffff}], &(0x7f00000002c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xb, 0x8001, 0x7}, 0x10, r3, 0x0, 0x2, &(0x7f0000000580)=[r5], &(0x7f00000005c0)=[{0x2, 0x4, 0xa}, {0x4, 0x4, 0xb, 0xa}], 0x10, 0x80}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8937, &(0x7f0000000000)={'veth0_vlan\x00', @random="0100002010ff"}) 12m30.822930897s ago: executing program 3 (id=5958): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000200e8fe55a1180015000600142603600e120900210000000401a80016000a00014006000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7ce", 0x6c}, {&(0x7f0000000ec0)="c9df04cd8ce4f37656ffabb858c02ee95c69ff108ad5b76475bf8916734cbd57c84685f29a99074838097ed28b3d45bd4f24b1ad5ed7661fcf04c5f4e9fbfcebef046540294bb08de607993d1594343d19b89e6da0c4d2f7d7b92a2222268aa59e3113070d539092c09406c9", 0x6c}], 0x2}, 0x24004880) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x4}, 0x0, 0x0, 0x0, 0x8, 0x2, 0xfffffffc}, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280)={'macvlan0', 0x32, 0x33}, 0xb) socket$kcm(0x11, 0x200000000000002, 0x300) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, &(0x7f0000000a80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xb}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @call={0x85, 0x0, 0x0, 0x1000070}, @ringbuf_query, @call={0x85, 0x0, 0x0, 0x5f}, @initr0={0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x8}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd]}, &(0x7f00000003c0)='GPL\x00', 0xb1c, 0x6e, &(0x7f0000000400)=""/110, 0x41100, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x20000004}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x8}, 0x94) 12m30.470367337s ago: executing program 1 (id=5960): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x10, 0x0, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x20000000000000c8, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000000)="d5", 0x101d0}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) close(r0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x50) sendmsg$kcm(r2, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f00000006c0)='@', 0x1}], 0x1, &(0x7f0000000040)=ANY=[], 0x38}, 0x41) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8916, &(0x7f0000000000)={'wlan1\x00', @random="0200ff7fffff"}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020206b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x35, 0x0, 0x3, 0xfffffffe}, {}, {}, {0x0, 0x0, 0x20}, {0x6, 0x0, 0x0, 0xac}]}) ioctl$TUNSETDEBUG(r4, 0x400454c9, &(0x7f0000000040)=0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) close(r5) 12m30.469826727s ago: executing program 4 (id=5961): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x10, 0x0, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x20000000000000c8, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000000)="d5", 0x101d0}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) close(r0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x50) sendmsg$kcm(r2, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f00000006c0)='@', 0x1}], 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000800000000000000072dfff000000000020000000000000008400000008000000eeb4fe8ba15e3999ef0000"], 0x38}, 0x41) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8916, &(0x7f0000000000)={'wlan1\x00', @random="0200ff7fffff"}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020206b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x35, 0x0, 0x3, 0xfffffffe}, {}, {}, {0x0, 0x0, 0x20}, {0x6, 0x0, 0x0, 0xac}]}) ioctl$TUNSETDEBUG(r4, 0x400454c9, &(0x7f0000000040)=0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) close(r5) ioctl$SIOCSIFHWADDR(r5, 0x8b19, &(0x7f0000000000)={'wlan0\x00', @random="7cf1e97c9e4f"}) 12m30.199339603s ago: executing program 3 (id=5963): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="5c0000001e006bcd9e3fe3dc6e08000007000000190000007ea60864160af36504005425198bc3488bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f668c3664402682fb6e27bbfa83b5cae0300c9f4d1938037e786a6", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x138f67536d80380e, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x5, 0x10, 0x0, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x1, 0x8000000}]}]}}, 0x0, 0x42}, 0x28) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000140)={'veth1_macvtap\x00'}) socket$kcm(0x2, 0x5, 0x84) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3c, 0x3}, {0x6}]}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000280)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f00000007c0)=ANY=[], 0x6) 12m29.776839648s ago: executing program 2 (id=5964): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x10, 0x0, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x20000000000000c8, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket$kcm(0x1e, 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) close(r0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x50) sendmsg$kcm(r1, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f00000006c0)}], 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000800000000000000072dfff000000000020000000000000008400000008000000eeb4fe8ba15e3999ef000000"], 0x38}, 0x41) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8916, &(0x7f0000000000)={'wlan1\x00', @random="0200ff7fffff"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020206b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x35, 0x0, 0x3, 0xfffffffe}, {}, {}, {0x0, 0x0, 0x20}, {0x6, 0x0, 0x0, 0xac}]}) ioctl$TUNSETDEBUG(r3, 0x400454c9, &(0x7f0000000040)=0x8) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) close(r4) ioctl$SIOCSIFHWADDR(r4, 0x8b19, &(0x7f0000000000)={'wlan0\x00', @random="7cf1e97c9e4f"}) 12m28.56348255s ago: executing program 0 (id=5965): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x5, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000002c0)='GPL\x00', 0x5, 0xbc, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffd}, 0x10}, 0x94) perf_event_open$cgroup(&(0x7f00000001c0)={0x2, 0x80, 0x1, 0x3, 0x2f, 0x40, 0x0, 0x0, 0x20000, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x2}, 0x4, 0x3, 0x6, 0x8, 0x22c00000000000, 0xffffffff, 0x8, 0x0, 0x4, 0x0, 0x40}, 0xffffffffffffffff, 0xa, r0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, 0x0, &(0x7f0000000500), 0xce}, 0x38) bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=ANY=[], 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x400000002, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000000c0)={0x2, 0x0, [0x0, 0x0]}) sendmsg$inet(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000180)="1c0000005e007f62516a071c02f8abc36f1d73dbe1ce84ebc7c4c1c9", 0x1c}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f00000001c0)={0x0, 0x64, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040)}, 0x800, 0x9, 0x6, 0x1, 0xfffffffffdf7bbfe, 0x0, 0x5, 0x0, 0xfffeffff, 0x0, 0x3}, 0x0, 0x4000000000e, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=@base={0xb, 0x5, 0x7, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20}, [@ringbuf_query, @ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 12m28.56308949s ago: executing program 1 (id=5966): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x10, 0x0, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x20000000000000c8, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000000)="d5", 0x101d0}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) close(r0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x50) sendmsg$kcm(r2, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f00000006c0)='@', 0x1}], 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000800000000000000072dfff000000000020000000000000008400000008000000eeb4fe8ba15e3999ef000000"], 0x38}, 0x41) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8916, &(0x7f0000000000)={'wlan1\x00', @random="0200ff7fffff"}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020206b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a0000000000008500"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x35, 0x0, 0x3, 0xfffffffe}, {}, {}, {0x0, 0x0, 0x20}, {0x6, 0x0, 0x0, 0xac}]}) ioctl$TUNSETDEBUG(r4, 0x400454c9, &(0x7f0000000040)=0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) close(r5) ioctl$SIOCSIFHWADDR(r5, 0x8b19, &(0x7f0000000000)={'wlan0\x00', @random="7cf1e97c9e4f"}) 12m28.437850557s ago: executing program 4 (id=5967): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b700000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r1}) r4 = socket$kcm(0x10, 0x2, 0x4) close(r4) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="180000006800930de85ca5ef0d4a33008800000000000000", 0x18}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r5 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r5, &(0x7f0000003a80)={&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000003a00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1}}}], 0x20}, 0x4008804) sendmsg$kcm(r5, &(0x7f0000000480)={&(0x7f00000002c0)=@l2tp={0x2, 0x0, @remote}, 0x80, 0x0}, 0x8400) sendmsg$inet(r5, &(0x7f0000000500)={&(0x7f0000000080)={0x2, 0x80, @local}, 0x10, &(0x7f0000000b00)=[{&(0x7f0000000640)="455b1c1ed590", 0x6}], 0x1}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0xf, 0x0, &(0x7f0000001a40)="c1dfb080cd217b283fd308098ee688", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 12m28.235588249s ago: executing program 3 (id=5968): r0 = socket$kcm(0xa, 0x7, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x46, &(0x7f0000000040), 0xcf) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000980)={&(0x7f0000000080)=@qipcrtr, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000240)=""/118, 0x76}, {&(0x7f0000000300)=""/116, 0x74}, {&(0x7f0000000380)=""/204, 0xcc}, {&(0x7f0000000540)=""/30, 0x1e}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/58, 0x3a}, {&(0x7f00000006c0)=""/131, 0x83}, {&(0x7f0000000780)=""/214, 0xd6}, {&(0x7f0000000880)=""/72, 0x48}], 0x9, &(0x7f0000000900)=""/15, 0xf}, 0x26c787988cd92447) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3, 0x100, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x450, 0x16ac, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="1c000000210081044e81f782db44b9040200000000806c0100001500", 0x1c}], 0x1}, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x106) r3 = bpf$ITER_CREATE(0xb, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x6, 0xd, &(0x7f0000000000)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x3, 0x0, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sched_cls, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={&(0x7f0000000580)=""/89, 0x59, 0x0, &(0x7f0000000640)=""/218, 0xda}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000200"/16], 0x0}, 0x94) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="d8000000180081054e81f783db4cb9040a1db00006007c09e8fc55a10a0015000600142603600e1208000600000004010c00040008000c4004000000035c0461c1d67f6f94007134cf6efb8000a007a290557f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb71b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd4e1ffffffffc1c9b6278754ca397c388b0dd6e4edef3d9300"/216, 0xd8}], 0x1}, 0x0) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001040)={r5, 0x5, 0xffffffa9, 0xfffffffffffffd0d, &(0x7f00000002c0)='\x00', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x50) sendmsg$kcm(r0, &(0x7f0000001240)={&(0x7f0000000a00)=@generic={0xa, "8ab77fa26849ff263ef30c98b353011a5990650042e2dacdc165ececece6be1862e2adacd2737d00ad6f9fa9f3d7145e15dd9fb1a7adc211220963ad5def53b911ba5b9da13641f982757012a7496de0b3a36f5849f260c603dbc317f54b901ee80ea6132ca6e88c776553e1833052ca376304313c5637786a36a4b83857"}, 0x80, 0x0}, 0x0) syz_clone(0x80000000, &(0x7f0000000bc0)="f56cc60b3768286311161fe3ba3c0ee6c0f1c83270d5f5a75075ce3e8101e66dc0ff2e67856e7274937bdca85d6b67dea639269ee729a543d05de526f36dd4041f1ba8f4b71d77e33d2d02a0298d5b86435cd179ea861eaa817d1aafb94d34befb4e31b1c45e41ca66d8b96b1390", 0x6e, &(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000cc0)="0f4782e28c46380753d8f33db523f37af46e02ba843a58774d6248514b3a7b96e0722d9254b5254717a32febe51f97205bf709701a2590fc94232271035d462c3dd1a7994ee82c47000eb5bd6390b577e432e2ca696e2d81ec8f875cc65a670d4409b2f0132779d4b8d441da989bc13c36a497c250b38a4fcee7b4") r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNGETIFF(r6, 0x800454d2, &(0x7f0000000040)={'batadv_slave_1\x00'}) perf_event_open$cgroup(&(0x7f0000000d80)={0x4, 0x80, 0x6b, 0x4, 0x8, 0x9d, 0x0, 0x5, 0x1401, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000d40), 0x9}, 0x80, 0x5, 0x1, 0x0, 0xa91e, 0x3, 0xe4, 0x0, 0x10, 0x0, 0xf75}, r3, 0x1, r1, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=ANY=[@ANYBLOB="0f00000004000000040000001200000000080000", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000e1ffffff00000002402ea6ced30000000000000000008000000000002b7f0d9a1f3a0c65a02fdb50cb8ad0d8b591c9b7d07bc8442aae880c6ebb91bb32b3ea6f055071ac4c2ccbf95bcdc3b9cb5c3fced0c78d1d4bb9afa65b43c2c12775a5f0c3ff54e17c96831d4a0ffbf1d82cbd2dfdb12acf39c1540da629924e2fad11079f021b361c8483ec4bfcd122c5da9f385627792e1ec5f4dde321707e4f7abcc75a0ec3489330cfef4c88f3f64c0448efb1ba724fedb09a751f1ccb2490ce35a9746a12d040bdadefd0c20231235f437524cc2bfab2f069e07ab71ab33b8645c8a59db4e8"], 0x50) 12m28.234561159s ago: executing program 0 (id=5969): getpid() bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x5, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x5, 0xbc, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffd}, 0x10}, 0x94) perf_event_open$cgroup(&(0x7f00000001c0)={0x2, 0x80, 0x1, 0x3, 0x2f, 0x40, 0x0, 0x0, 0x20000, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x2}, 0x4, 0x3, 0x6, 0x8, 0x22c00000000000, 0xffffffff, 0x8, 0x0, 0x4, 0x0, 0x40}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=ANY=[], 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000180)="1c0000005e007f62516a071c02f8abc36f1d73dbe1ce84ebc7c4c1c9", 0x1c}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f00000001c0)={0x0, 0x64, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040)}, 0x800, 0x9, 0x6, 0x1, 0xfffffffffdf7bbfe, 0x0, 0x5, 0x0, 0xfffeffff, 0x0, 0x3}, 0x0, 0x4000000000e, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=@base={0xb, 0x5, 0x7, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20}, [@ringbuf_query, @ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 12m27.923646497s ago: executing program 0 (id=5970): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="030000000400000004"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b700000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r1}) r4 = socket$kcm(0x10, 0x2, 0x4) close(r4) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="180000006800930de85ca5ef0d4a33008800000000000000", 0x18}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r5 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r5, &(0x7f0000003a80)={&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000003a00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1}}}], 0x20}, 0x4008804) sendmsg$kcm(r5, &(0x7f0000000480)={&(0x7f00000002c0)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f0000000180)=[{&(0x7f0000002800)="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", 0x306}, {&(0x7f0000002b40)="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", 0x2ab}], 0x2}, 0x8400) sendmsg$inet(r5, &(0x7f0000000500)={&(0x7f0000000080)={0x2, 0x80, @local}, 0x10, &(0x7f0000000b00)=[{&(0x7f0000000640)="455b1c1ed590", 0x6}], 0x1}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0xf, 0x0, &(0x7f0000001a40)="c1dfb080cd217b283fd308098ee688", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 12m27.922805128s ago: executing program 4 (id=5971): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f4, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={&(0x7f00000005c0)=""/108, 0x6c, 0x0, &(0x7f0000000640)=""/242, 0xf2}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x16, 0x10, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, {}, {}, [@jmp={0x5, 0x0, 0xb, 0x2, 0x1, 0x20, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x10, 0xa3, &(0x7f0000000380)=""/163, 0x41100, 0x58, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000580)={0x2, 0x6, 0x2, 0x1}, 0x10, r3, r2, 0x6, &(0x7f0000000840)=[r4, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x5, 0x2, 0xe, 0xe}, {0x0, 0x2, 0xa, 0xb}, {0x3, 0x2, 0xc, 0x8}, {0x3, 0x1, 0x2, 0xa}, {0x2, 0x4, 0xf, 0x5}, {0x3, 0x1, 0x4, 0xa}], 0x10, 0x2}, 0x94) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x7fff, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x1}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000040)=@raw=[@generic={0xca, 0x6, 0x7, 0x4, 0x101}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x5}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x0, 0x8, 0x0, 0xb, 0xc}, @alu={0x7, 0x0, 0xa, 0x7, 0x0, 0x6, 0xffffffffffffffff}], &(0x7f00000002c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xb, 0x8001, 0x7}, 0x10, r3, 0x0, 0x2, &(0x7f0000000580)=[r5], &(0x7f00000005c0)=[{0x2, 0x4, 0xa}, {0x4, 0x4, 0xb, 0xa}], 0x10, 0x80}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8937, &(0x7f0000000000)={'veth0_vlan\x00', @random="0100002010ff"}) 12m27.631334685s ago: executing program 2 (id=5972): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x10, 0x0, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x20000000000000c8, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000000)="d5", 0x101d0}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) close(r0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x50) sendmsg$kcm(r2, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f00000006c0)='@', 0x1}], 0x1, &(0x7f0000000040)=ANY=[], 0x38}, 0x41) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8916, &(0x7f0000000000)={'wlan1\x00', @random="0200ff7fffff"}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020206b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x35, 0x0, 0x3, 0xfffffffe}, {}, {}, {0x0, 0x0, 0x20}, {0x6, 0x0, 0x0, 0xac}]}) ioctl$TUNSETDEBUG(r4, 0x400454c9, &(0x7f0000000040)=0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) close(r5) ioctl$SIOCSIFHWADDR(r5, 0x8b19, &(0x7f0000000000)={'wlan0\x00', @random="7cf1e97c9e4f"}) 12m27.435867976s ago: executing program 0 (id=5973): r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f00000006c0)='@', 0x1}], 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000800000000000000072dfff000000000020000000000000008400000008000000eeb4fe8ba15e3999ef"], 0x38}, 0x41) 12m27.398329969s ago: executing program 4 (id=5974): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000200e8fe55a1180015000600142603600e120900210000000401a80016000a00014006000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7ce", 0x6c}, {&(0x7f0000000ec0)="c9df04cd8ce4f37656ffabb858c02ee95c69ff108ad5b76475bf8916734cbd57c84685f29a99074838097ed28b3d45bd4f24b1ad5ed7661fcf04c5f4e9fbfcebef046540294bb08de607993d1594343d19b89e6da0c4d2f7d7b92a2222268aa59e3113070d539092c09406c9", 0x6c}], 0x2}, 0x24004880) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x4}, 0x0, 0x0, 0x0, 0x8, 0x2, 0xfffffffc}, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000280)={'macvlan0', 0x32, 0x33}, 0xb) socket$kcm(0x11, 0x200000000000002, 0x300) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, &(0x7f0000000a80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xb}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @call={0x85, 0x0, 0x0, 0x1000070}, @ringbuf_query, @call={0x85, 0x0, 0x0, 0x5f}, @initr0={0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x8}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd]}, &(0x7f00000003c0)='GPL\x00', 0xb1c, 0x6e, &(0x7f0000000400)=""/110, 0x41100, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x20000004}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x8}, 0x94) 12m27.194425101s ago: executing program 0 (id=5975): r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x8, 0x0, 0x4000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="5c0000001e006bcd9e3fe3dc6e08000007000000190000007ea60864160af36504005425198bc3488bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f668c3664402682fb6e27bbfa83b5cae0300c9f4d1938037e786a6", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x138f67536d80380e, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x5, 0x10, 0x0, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x1, 0x8000000}]}]}}, 0x0, 0x42}, 0x28) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000140)={'veth1_macvtap\x00'}) socket$kcm(0x2, 0x5, 0x84) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3c, 0x3}, {0x6}]}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000280)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f00000007c0)=ANY=[], 0x6) 12m25.947722404s ago: executing program 3 (id=5976): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x10, 0x0, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x20000000000000c8, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000000)="d5", 0x101d0}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) close(r0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x50) sendmsg$kcm(r2, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f00000006c0)}], 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000800000000000000072dfff000000000020000000000000008400000008000000eeb4fe8ba15e3999ef000000"], 0x38}, 0x41) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8916, &(0x7f0000000000)={'wlan1\x00', @random="0200ff7fffff"}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020206b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x35, 0x0, 0x3, 0xfffffffe}, {}, {}, {0x0, 0x0, 0x20}, {0x6, 0x0, 0x0, 0xac}]}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) close(r5) ioctl$SIOCSIFHWADDR(r5, 0x8b19, &(0x7f0000000000)={'wlan0\x00', @random="7cf1e97c9e4f"}) 12m25.947387874s ago: executing program 4 (id=5977): socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80800, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0xc, 0xb, &(0x7f00000000c0)=ANY=[@ANYBLOB="18040000000000000000000000000000180000002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], &(0x7f00000005c0)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001040)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000003c0)="b9ff03316844268cb89e14f00800", 0x0, 0x2000000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 12m25.852390669s ago: executing program 1 (id=5986): r0 = socket$kcm(0xa, 0x7, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x46, &(0x7f0000000040), 0xcf) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000980)={&(0x7f0000000080)=@qipcrtr, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000240)=""/118, 0x76}, {&(0x7f0000000300)=""/116, 0x74}, {&(0x7f0000000380)=""/204, 0xcc}, {&(0x7f0000000540)=""/30, 0x1e}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/58, 0x3a}, {&(0x7f00000006c0)=""/131, 0x83}, {&(0x7f0000000780)=""/214, 0xd6}, {&(0x7f0000000880)=""/72, 0x48}], 0x9, &(0x7f0000000900)=""/15, 0xf}, 0x26c787988cd92447) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3, 0x100, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x450, 0x16ac, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="1c000000210081044e81f782db44b9040200000000806c0100001500", 0x1c}], 0x1}, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x106) r3 = bpf$ITER_CREATE(0xb, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x6, 0xd, &(0x7f0000000000)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x3, 0x0, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sched_cls, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={&(0x7f0000000580)=""/89, 0x59, 0x0, &(0x7f0000000640)=""/218, 0xda}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000200"/16], 0x0}, 0x94) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="d8000000180081054e81f783db4cb9040a1db00006007c09e8fc55a10a0015000600142603600e1208000600000004010c00040008000c4004000000035c0461c1d67f6f94007134cf6efb8000a007a290557f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb71b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd4e1ffffffffc1c9b6278754ca397c388b0dd6e4edef3d9300"/216, 0xd8}], 0x1}, 0x0) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001040)={r5, 0x5, 0xffffffa9, 0xfffffffffffffd0d, &(0x7f00000002c0)='\x00', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x50) sendmsg$kcm(r0, &(0x7f0000001240)={&(0x7f0000000a00)=@generic={0xa, "8ab77fa26849ff263ef30c98b353011a5990650042e2dacdc165ececece6be1862e2adacd2737d00ad6f9fa9f3d7145e15dd9fb1a7adc211220963ad5def53b911ba5b9da13641f982757012a7496de0b3a36f5849f260c603dbc317f54b901ee80ea6132ca6e88c776553e1833052ca376304313c5637786a36a4b83857"}, 0x80, 0x0}, 0x0) syz_clone(0x80000000, &(0x7f0000000bc0)="f56cc60b3768286311161fe3ba3c0ee6c0f1c83270d5f5a75075ce3e8101e66dc0ff2e67856e7274937bdca85d6b67dea639269ee729a543d05de526f36dd4041f1ba8f4b71d77e33d2d02a0298d5b86435cd179ea861eaa817d1aafb94d34befb4e31b1c45e41ca66d8b96b1390", 0x6e, &(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000cc0)="0f4782e28c46380753d8f33db523f37af46e02ba843a58774d6248514b3a7b96e0722d9254b5254717a32febe51f97205bf709701a2590fc94232271035d462c3dd1a7994ee82c47000eb5bd6390b577e432e2ca696e2d81ec8f875cc65a670d4409b2f0132779d4b8d441da989bc13c36a497c250b38a4fcee7b4") r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNGETIFF(r6, 0x800454d2, &(0x7f0000000040)={'batadv_slave_1\x00'}) perf_event_open$cgroup(&(0x7f0000000d80)={0x4, 0x80, 0x6b, 0x4, 0x8, 0x9d, 0x0, 0x5, 0x1401, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000d40), 0x9}, 0x80, 0x5, 0x1, 0x0, 0xa91e, 0x3, 0xe4, 0x0, 0x10, 0x0, 0xf75}, r3, 0x1, r1, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=ANY=[@ANYBLOB="0f00000004000000040000001200000000080000", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000e1ffffff00000002402ea6ced30000000000000000008000000000002b7f0d9a1f3a0c65a02fdb50cb8ad0d8b591c9b7d07bc8442aae880c6ebb91bb32b3ea6f055071ac4c2ccbf95bcdc3b9cb5c3fced0c78d1d4bb9afa65b43c2c12775a5f0c3ff54e17c96831d4a0ffbf1d82cbd2dfdb12acf39c1540da629924e2fad11079f021b361c8483ec4bfcd122c5da9f385627792e1ec5f4dde321707e4f7abcc75a0ec3489330cfef4c88f3f64c0448efb1ba724fedb09a751f1ccb2490ce35a9746a12d040bdadefd0c20231235f437524cc2bfab2f069e07ab71ab33b8645c8a59db4e8"], 0x50) 12m25.85202869s ago: executing program 2 (id=5987): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b700000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r1}) r4 = socket$kcm(0x10, 0x2, 0x4) close(r4) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="180000006800930de85ca5ef0d4a33008800000000000000", 0x18}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r5 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r5, &(0x7f0000003a80)={&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000003a00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1}}}], 0x20}, 0x4008804) sendmsg$kcm(r5, &(0x7f0000000480)={&(0x7f00000002c0)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f0000000180)=[{&(0x7f0000002800)="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", 0x306}, {&(0x7f0000002b40)="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", 0x2ab}], 0x2}, 0x8400) sendmsg$inet(r5, &(0x7f0000000500)={&(0x7f0000000080)={0x2, 0x80, @local}, 0x10, &(0x7f0000000b00)=[{&(0x7f0000000640)="455b1c1ed590", 0x6}], 0x1}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0xf, 0x0, &(0x7f0000001a40)="c1dfb080cd217b283fd308098ee688", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 12m25.85157029s ago: executing program 0 (id=5978): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x10, 0x0, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x20000000000000c8, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000000)="d5", 0x101d0}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) close(r0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x50) sendmsg$kcm(r2, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f00000006c0)='@', 0x1}], 0x1, &(0x7f0000000040)=ANY=[], 0x38}, 0x41) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8916, &(0x7f0000000000)={'wlan1\x00', @random="0200ff7fffff"}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020206b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x35, 0x0, 0x3, 0xfffffffe}, {}, {}, {0x0, 0x0, 0x20}, {0x6, 0x0, 0x0, 0xac}]}) ioctl$TUNSETDEBUG(r4, 0x400454c9, &(0x7f0000000040)=0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) close(r5) 12m10.73726816s ago: executing program 32 (id=5978): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x10, 0x0, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x20000000000000c8, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000000)="d5", 0x101d0}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) close(r0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x50) sendmsg$kcm(r2, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f00000006c0)='@', 0x1}], 0x1, &(0x7f0000000040)=ANY=[], 0x38}, 0x41) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8916, &(0x7f0000000000)={'wlan1\x00', @random="0200ff7fffff"}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020206b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x35, 0x0, 0x3, 0xfffffffe}, {}, {}, {0x0, 0x0, 0x20}, {0x6, 0x0, 0x0, 0xac}]}) ioctl$TUNSETDEBUG(r4, 0x400454c9, &(0x7f0000000040)=0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) close(r5) 12m10.651413625s ago: executing program 33 (id=5986): r0 = socket$kcm(0xa, 0x7, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x46, &(0x7f0000000040), 0xcf) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000980)={&(0x7f0000000080)=@qipcrtr, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000240)=""/118, 0x76}, {&(0x7f0000000300)=""/116, 0x74}, {&(0x7f0000000380)=""/204, 0xcc}, {&(0x7f0000000540)=""/30, 0x1e}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/58, 0x3a}, {&(0x7f00000006c0)=""/131, 0x83}, {&(0x7f0000000780)=""/214, 0xd6}, {&(0x7f0000000880)=""/72, 0x48}], 0x9, &(0x7f0000000900)=""/15, 0xf}, 0x26c787988cd92447) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x4, 0x0, 0x3, 0x100, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x450, 0x16ac, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="1c000000210081044e81f782db44b9040200000000806c0100001500", 0x1c}], 0x1}, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x106) r3 = bpf$ITER_CREATE(0xb, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x6, 0xd, &(0x7f0000000000)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x3, 0x0, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sched_cls, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={&(0x7f0000000580)=""/89, 0x59, 0x0, &(0x7f0000000640)=""/218, 0xda}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000200"/16], 0x0}, 0x94) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="d8000000180081054e81f783db4cb9040a1db00006007c09e8fc55a10a0015000600142603600e1208000600000004010c00040008000c4004000000035c0461c1d67f6f94007134cf6efb8000a007a290557f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb71b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd4e1ffffffffc1c9b6278754ca397c388b0dd6e4edef3d9300"/216, 0xd8}], 0x1}, 0x0) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001040)={r5, 0x5, 0xffffffa9, 0xfffffffffffffd0d, &(0x7f00000002c0)='\x00', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x50) sendmsg$kcm(r0, &(0x7f0000001240)={&(0x7f0000000a00)=@generic={0xa, "8ab77fa26849ff263ef30c98b353011a5990650042e2dacdc165ececece6be1862e2adacd2737d00ad6f9fa9f3d7145e15dd9fb1a7adc211220963ad5def53b911ba5b9da13641f982757012a7496de0b3a36f5849f260c603dbc317f54b901ee80ea6132ca6e88c776553e1833052ca376304313c5637786a36a4b83857"}, 0x80, 0x0}, 0x0) syz_clone(0x80000000, &(0x7f0000000bc0)="f56cc60b3768286311161fe3ba3c0ee6c0f1c83270d5f5a75075ce3e8101e66dc0ff2e67856e7274937bdca85d6b67dea639269ee729a543d05de526f36dd4041f1ba8f4b71d77e33d2d02a0298d5b86435cd179ea861eaa817d1aafb94d34befb4e31b1c45e41ca66d8b96b1390", 0x6e, &(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000cc0)="0f4782e28c46380753d8f33db523f37af46e02ba843a58774d6248514b3a7b96e0722d9254b5254717a32febe51f97205bf709701a2590fc94232271035d462c3dd1a7994ee82c47000eb5bd6390b577e432e2ca696e2d81ec8f875cc65a670d4409b2f0132779d4b8d441da989bc13c36a497c250b38a4fcee7b4") r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNGETIFF(r6, 0x800454d2, &(0x7f0000000040)={'batadv_slave_1\x00'}) perf_event_open$cgroup(&(0x7f0000000d80)={0x4, 0x80, 0x6b, 0x4, 0x8, 0x9d, 0x0, 0x5, 0x1401, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000d40), 0x9}, 0x80, 0x5, 0x1, 0x0, 0xa91e, 0x3, 0xe4, 0x0, 0x10, 0x0, 0xf75}, r3, 0x1, r1, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=ANY=[@ANYBLOB="0f00000004000000040000001200000000080000", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000e1ffffff00000002402ea6ced30000000000000000008000000000002b7f0d9a1f3a0c65a02fdb50cb8ad0d8b591c9b7d07bc8442aae880c6ebb91bb32b3ea6f055071ac4c2ccbf95bcdc3b9cb5c3fced0c78d1d4bb9afa65b43c2c12775a5f0c3ff54e17c96831d4a0ffbf1d82cbd2dfdb12acf39c1540da629924e2fad11079f021b361c8483ec4bfcd122c5da9f385627792e1ec5f4dde321707e4f7abcc75a0ec3489330cfef4c88f3f64c0448efb1ba724fedb09a751f1ccb2490ce35a9746a12d040bdadefd0c20231235f437524cc2bfab2f069e07ab71ab33b8645c8a59db4e8"], 0x50) 12m10.531255752s ago: executing program 34 (id=5987): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b700000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r1}) r4 = socket$kcm(0x10, 0x2, 0x4) close(r4) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="180000006800930de85ca5ef0d4a33008800000000000000", 0x18}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r5 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r5, &(0x7f0000003a80)={&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000003a00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1}}}], 0x20}, 0x4008804) sendmsg$kcm(r5, &(0x7f0000000480)={&(0x7f00000002c0)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f0000000180)=[{&(0x7f0000002800)="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", 0x306}, {&(0x7f0000002b40)="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", 0x2ab}], 0x2}, 0x8400) sendmsg$inet(r5, &(0x7f0000000500)={&(0x7f0000000080)={0x2, 0x80, @local}, 0x10, &(0x7f0000000b00)=[{&(0x7f0000000640)="455b1c1ed590", 0x6}], 0x1}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0xf, 0x0, &(0x7f0000001a40)="c1dfb080cd217b283fd308098ee688", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 12m10.39128034s ago: executing program 35 (id=5976): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x10, 0x0, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x20000000000000c8, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000000)="d5", 0x101d0}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) close(r0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x50) sendmsg$kcm(r2, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f00000006c0)}], 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000800000000000000072dfff000000000020000000000000008400000008000000eeb4fe8ba15e3999ef000000"], 0x38}, 0x41) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8916, &(0x7f0000000000)={'wlan1\x00', @random="0200ff7fffff"}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020206b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x35, 0x0, 0x3, 0xfffffffe}, {}, {}, {0x0, 0x0, 0x20}, {0x6, 0x0, 0x0, 0xac}]}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) close(r5) ioctl$SIOCSIFHWADDR(r5, 0x8b19, &(0x7f0000000000)={'wlan0\x00', @random="7cf1e97c9e4f"}) 12m10.300400846s ago: executing program 36 (id=5977): socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80800, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0xc, 0xb, &(0x7f00000000c0)=ANY=[@ANYBLOB="18040000000000000000000000000000180000002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], &(0x7f00000005c0)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001040)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000003c0)="b9ff03316844268cb89e14f00800", 0x0, 0x2000000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.453421106s ago: executing program 5 (id=9440): bpf$BPF_PROG_DETACH(0x9, &(0x7f00000014c0)={@fallback, 0xffffffffffffffff, 0x1c}, 0x20) 2.398212179s ago: executing program 8 (id=9442): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x181000, 0x0) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00', 0x800}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80400, 0x0) ioctl$TUNSETIFF(r1, 0x400454da, &(0x7f00000002c0)={'bond0\x00', 0x4000}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) 2.284603986s ago: executing program 7 (id=9443): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000300000073113900000000008510000002000000850000007600000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) 2.2269047s ago: executing program 5 (id=9445): bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000040000004100faff0000000001000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0240000005"], 0x48) 2.22160105s ago: executing program 6 (id=9446): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x702, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000080)) 2.04607651s ago: executing program 5 (id=9447): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x58c8, 0x0, 0xeffffffc, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x5d31, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x22, 0x7}, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="364000001a00913a"], 0x82d7) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0xfffffffc}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001840)=ANY=[@ANYBLOB="0900000017000000080000000400000042000000", @ANYRES32=0x1, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000a8a4006c8cb604920a1aa1d72a71062d6104000000"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000000), 0x1000, r1}, 0x38) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{r2, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)='%pB \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000400008500000018000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0xfe6, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030030000b12d25a80648c2594f90124fc60100c0340020400", 0x1b}], 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="100000002d000b02d25a806f8c6394f9101a04000a7401", 0x17}], 0x1}, 0x40000) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="93430000520033d487277b9b108b4ab502", @ANYRES32, @ANYRES8=r5], 0xfe33) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000000000000000000000000000007fffffff0001000000000071273fa79d93014b8e3381b6"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 2.04588586s ago: executing program 7 (id=9448): bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x10, 0x0, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x20000000000000c8, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000000)="d5", 0x101d0}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) socket$kcm(0xa, 0x5, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8916, &(0x7f0000000000)={'wlan1\x00', @random="0200ff7fffff"}) 2.000790263s ago: executing program 8 (id=9449): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x10, 0x0, 0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x20000000000000c8, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xb) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, &(0x7f00000004c0)}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) close(r0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x50) sendmsg$kcm(r2, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f00000006c0)}], 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000800000000000000072dfff000000000020000000000000008400000008000000eeb4fe8ba15e3999ef000000"], 0x38}, 0x41) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8916, &(0x7f0000000000)={'wlan1\x00', @random="0200ff7fffff"}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020206b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x35, 0x0, 0x3, 0xfffffffe}, {}, {}, {0x0, 0x0, 0x20}, {0x6, 0x0, 0x0, 0xac}]}) ioctl$TUNSETDEBUG(r4, 0x400454c9, &(0x7f0000000040)=0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) close(r5) ioctl$SIOCSIFHWADDR(r5, 0x8b19, &(0x7f0000000000)={'wlan0\x00', @random="7cf1e97c9e4f"}) 1.731220139s ago: executing program 6 (id=9450): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x702, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000080)) 1.672155502s ago: executing program 7 (id=9451): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000730000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000080000000000000064ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000005"], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x480783, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602, 0x403, 0x6, 0x0, 0x34d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x37}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) 1.54491659s ago: executing program 9 (id=9452): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="5c0000001e006bcd9e3fe3dc6e08000007000000190000007ea60864160af36504005425198bc3488bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f668c3664402682fb6e27bbfa83b5cae0300c9f4d1938037e786a6", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x138f67536d80380e, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x5, 0x10, 0x0, 0x2}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x1, 0x8000000}]}]}}, 0x0, 0x42}, 0x28) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000140)={'veth1_macvtap\x00'}) socket$kcm(0x2, 0x5, 0x84) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x3c, 0x3}, {0x6}]}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000280)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f00000007c0)=ANY=[], 0x6) 1.19919737s ago: executing program 5 (id=9453): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0400000009000000020000000100000020900000", @ANYRES32, @ANYBLOB="feffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000020000000100"/20, @ANYRES32, @ANYBLOB="f765149dab790a50f9423200420830b5a9f4c9254863e73d88e71e041c89994583656b4aa4abbd3a3574a708be3b5237edf54f24975ee41d6e6571e6e21e827f5ff327ec596c474bb3af"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/8, 0x2}, 0x20) openat$cgroup_int(r2, &(0x7f00000000c0)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='cpu<=0||!') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={0x0, 0xf}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18020000000000bd00000000030000008500000027000000"], &(0x7f0000000080)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0x18, 0x0, &(0x7f0000000380)="e0bcd7c6a00e0588cd5e47b8bffc8e670f78f1f5b3aac3eb", 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'\x00', 0x52d35ce30131f272}) r6 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000007, 0x4, @perf_bp={0x0, 0x8}, 0x101000, 0x7, 0x8, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c008104e00f80ecdb4cb9f207c804a00d000000880802fb0a0002000a0ada1b40d80800c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000700)={&(0x7f0000000000)=@abs={0x20, 0x0, 0x4e23}, 0x6e, 0x0, 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r7]}}], 0x18, 0x14}, 0x4000) ioctl$TUNSETLINK(r5, 0x400454cd, 0x30c) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x900, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000011008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000300020400bf050005001201", 0x2e}], 0x1}, 0x0) 1.19893738s ago: executing program 6 (id=9454): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x58c8, 0x0, 0xeffffffc, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x5d31, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x22, 0x7}, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="364000001a00913a"], 0x82d7) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0xfffffffc}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001840)=ANY=[@ANYBLOB="0900000017000000080000000400000042000000", @ANYRES32=0x1, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000a8a4006c8cb604920a1aa1d72a71062d6104000000"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000000), 0x1000, r1}, 0x38) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{r2, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)='%pB \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000400008500000018000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0xfe6, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030030000b12d25a80648c2594f90124fc60100c0340020400", 0x1b}], 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="100000002d000b02d25a806f8c6394f9101a04000a7401", 0x17}], 0x1}, 0x40000) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="93430000520033d487277b9b108b4ab502", @ANYRES32, @ANYRES8=r5], 0xfe33) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 1.141966423s ago: executing program 8 (id=9455): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x702, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000080)) 1.085155617s ago: executing program 9 (id=9456): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000050000000300000000000011030000000000000000000000000000f74400000000000000010000047f0000000000000002000000010100000000002e"], 0x0, 0x51}, 0x28) 731.312637ms ago: executing program 9 (id=9457): bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000000040), 0x3, 0xffffffffffffffff, 0x4}, 0x38) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r0, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random='\x00\x00\x00\x00\x00 '}) 607.035855ms ago: executing program 7 (id=9458): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x8, &(0x7f0000000240)=@raw=[@printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x660000}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x3, 0xb, 0x1}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) 514.76677ms ago: executing program 9 (id=9459): bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@ifindex, 0xffffffffffffffff, 0x37, 0x6}, 0x20) 473.443733ms ago: executing program 8 (id=9460): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="020000000400000008", @ANYRES32], 0x17) 464.647703ms ago: executing program 6 (id=9461): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x36, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fffffff}, [@tail_call, @ringbuf_query, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xffffffffffffffff}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xb}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x4}, @ringbuf_query, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10000}}, @generic={0xfe, 0x6, 0x9, 0x3, 0x4e}, @alu={0x3, 0x0, 0x2, 0x0, 0xb, 0xffffffffffffffc4, 0xfffffffffffffffc}, @tail_call]}, 0x0, 0x2, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xf475, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40000000}, 0x94) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000001780)={&(0x7f00000003c0)=@caif, 0x80, 0x0}, 0x0) 354.99256ms ago: executing program 5 (id=9462): bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x15, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport}, 0x48) 305.066152ms ago: executing program 9 (id=9463): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000008000000040000000000000700000000030000000000000f0100000000000000000000020200000000ba592e2e"], 0x0, 0x44, 0x0, 0x4, 0xfffffffd}, 0x28) 304.862622ms ago: executing program 7 (id=9464): r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$inet(r0, &(0x7f0000001180)={&(0x7f0000000000)={0xa, 0x0, @empty}, 0x64, &(0x7f0000001080), 0x2, &(0x7f00000010c0)=[@ip_tos_int={{0x12, 0x29, 0x36}}, @ip_tos_u8={{0x11, 0x29, 0x3b}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @loopback}}}], 0x50}, 0x0) 278.768544ms ago: executing program 6 (id=9465): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x13}]}}, 0x0, 0x26}, 0x20) 216.530788ms ago: executing program 8 (id=9466): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000006b00)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x10, &(0x7f0000000000), 0x4) sendmsg$unix(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="ef", 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0xa4ff) close(0x3) 92.958175ms ago: executing program 5 (id=9467): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xc, 0x4, &(0x7f00000005c0)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@call={0x85, 0x0, 0x0, 0xa9}]}, &(0x7f0000000700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) 92.796455ms ago: executing program 9 (id=9468): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x1, 0x9, 0x492f, 0x2, 0x41, 0x1, 0xfffffffc}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f00000001c0), 0x0}, 0x20) 92.646745ms ago: executing program 7 (id=9469): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) 82.698606ms ago: executing program 6 (id=9470): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c9042, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xa0800, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) 0s ago: executing program 8 (id=9471): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000980)='cpu.idle\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000600)=ANY=[@ANYBLOB='-'], 0x27) kernel console output (not intermixed with test programs): netlink: 'syz.5.8897': attribute type 27 has an invalid length. [ 1839.664796][ T3244] FAULT_INJECTION: forcing a failure. [ 1839.664796][ T3244] name failslab, interval 1, probability 0, space 0, times 0 [ 1839.684395][ T3244] CPU: 0 PID: 3244 Comm: syz.8.8903 Not tainted syzkaller #0 [ 1839.691859][ T3244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1839.701977][ T3244] Call Trace: [ 1839.705302][ T3244] [ 1839.708278][ T3244] dump_stack_lvl+0x188/0x24e [ 1839.713120][ T3244] ? show_regs_print_info+0x12/0x12 [ 1839.718464][ T3244] ? load_image+0x400/0x400 [ 1839.723024][ T3244] ? perf_trace_lock_acquire+0x100/0x3e0 [ 1839.728720][ T3244] should_fail_ex+0x399/0x4d0 [ 1839.733504][ T3244] should_failslab+0x5/0x20 [ 1839.738072][ T3244] slab_pre_alloc_hook+0x59/0x310 [ 1839.743161][ T3244] kmem_cache_alloc+0x56/0x2f0 [ 1839.747977][ T3244] ? skb_clone+0x1e7/0x370 [ 1839.752486][ T3244] skb_clone+0x1e7/0x370 [ 1839.756802][ T3244] __netlink_deliver_tap+0x3ed/0x800 [ 1839.762168][ T3244] ? netlink_deliver_tap+0x2e/0x1b0 [ 1839.767430][ T3244] netlink_deliver_tap+0x19c/0x1b0 [ 1839.772611][ T3244] netlink_dump+0x832/0xd00 [ 1839.777188][ T3244] ? netlink_lookup+0x200/0x200 [ 1839.782110][ T3244] ? netlink_recvmsg+0x5e3/0xe00 [ 1839.787103][ T3244] ? kmem_cache_free+0xf7/0x290 [ 1839.791997][ T3244] netlink_recvmsg+0x68f/0xe00 [ 1839.796817][ T3244] ? netlink_sendmsg+0xbd0/0xbd0 [ 1839.801806][ T3244] ? aa_af_perm+0x340/0x340 [ 1839.806344][ T3244] ? __lock_acquire+0x12f4/0x7d10 [ 1839.811409][ T3244] ? bpf_lsm_socket_recvmsg+0x5/0x10 [ 1839.816725][ T3244] ? security_socket_recvmsg+0x85/0xb0 [ 1839.822280][ T3244] ? netlink_sendmsg+0xbd0/0xbd0 [ 1839.827266][ T3244] ____sys_recvmsg+0x2cb/0x5e0 [ 1839.832094][ T3244] ? __sys_recvmsg_sock+0x40/0x40 [ 1839.837199][ T3244] ? import_iovec+0x6f/0xa0 [ 1839.841749][ T3244] ___sys_recvmsg+0x212/0x590 [ 1839.846474][ T3244] ? __sys_recvmsg+0x290/0x290 [ 1839.851278][ T3244] ? common_file_perm+0x171/0x1c0 [ 1839.856347][ T3244] ? __fget_files+0x43d/0x4b0 [ 1839.861075][ T3244] __x64_sys_recvmsg+0x205/0x2e0 [ 1839.866059][ T3244] ? ___sys_recvmsg+0x590/0x590 [ 1839.870965][ T3244] ? lockdep_hardirqs_on+0x94/0x140 [ 1839.876293][ T3244] do_syscall_64+0x4c/0xa0 [ 1839.880749][ T3244] ? clear_bhb_loop+0x60/0xb0 [ 1839.885494][ T3244] ? clear_bhb_loop+0x60/0xb0 [ 1839.890222][ T3244] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1839.896153][ T3244] RIP: 0033:0x7fa23d39acb9 [ 1839.900609][ T3244] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1839.920251][ T3244] RSP: 002b:00007fa23e175028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1839.928695][ T3244] RAX: ffffffffffffffda RBX: 00007fa23d615fa0 RCX: 00007fa23d39acb9 [ 1839.936698][ T3244] RDX: 0000000000000000 RSI: 0000200000000900 RDI: 0000000000000003 [ 1839.944700][ T3244] RBP: 00007fa23e175090 R08: 0000000000000000 R09: 0000000000000000 [ 1839.952742][ T3244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1839.960740][ T3244] R13: 00007fa23d616038 R14: 00007fa23d615fa0 R15: 00007fffe3088888 [ 1839.968787][ T3244] [ 1839.973009][ T3240] __nla_validate_parse: 27 callbacks suppressed [ 1839.973027][ T3240] netlink: 60 bytes leftover after parsing attributes in process `syz.7.8899'. [ 1840.300594][ T3254] netlink: 60 bytes leftover after parsing attributes in process `syz.9.8906'. [ 1840.344862][ T3254] netlink: 60 bytes leftover after parsing attributes in process `syz.9.8906'. [ 1840.361204][ T3255] netlink: 60 bytes leftover after parsing attributes in process `syz.9.8906'. [ 1840.372454][ T3254] netlink: 60 bytes leftover after parsing attributes in process `syz.9.8906'. [ 1840.451754][ T3261] netlink: 44 bytes leftover after parsing attributes in process `syz.6.8908'. [ 1840.626249][ T3266] netlink: 44 bytes leftover after parsing attributes in process `syz.9.8910'. [ 1840.645430][ T3267] netlink: 56 bytes leftover after parsing attributes in process `syz.8.8911'. [ 1840.855692][ T3276] netlink: 60 bytes leftover after parsing attributes in process `syz.8.8914'. [ 1840.931355][ T3276] netlink: 60 bytes leftover after parsing attributes in process `syz.8.8914'. [ 1840.945677][ T3280] FAULT_INJECTION: forcing a failure. [ 1840.945677][ T3280] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1840.959642][ T3280] CPU: 1 PID: 3280 Comm: syz.8.8914 Not tainted syzkaller #0 [ 1840.967099][ T3280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1840.977214][ T3280] Call Trace: [ 1840.980532][ T3280] [ 1840.983519][ T3280] dump_stack_lvl+0x188/0x24e [ 1840.988257][ T3280] ? show_regs_print_info+0x12/0x12 [ 1840.993611][ T3280] ? load_image+0x400/0x400 [ 1840.998174][ T3280] ? __might_fault+0xa6/0x120 [ 1841.002908][ T3280] should_fail_ex+0x399/0x4d0 [ 1841.007648][ T3280] copyout+0x1b/0x120 [ 1841.011692][ T3280] _copy_to_iter+0x48b/0x1040 [ 1841.016445][ T3280] ? iov_iter_init+0x1f0/0x1f0 [ 1841.021270][ T3280] ? __virt_addr_valid+0x188/0x540 [ 1841.026452][ T3280] ? __virt_addr_valid+0x465/0x540 [ 1841.031634][ T3280] ? __phys_addr_symbol+0x2b/0x70 [ 1841.036711][ T3280] ? __check_object_size+0x500/0xa40 [ 1841.042057][ T3280] __skb_datagram_iter+0xde/0x740 [ 1841.047152][ T3280] ? skb_copy_datagram_iter+0x290/0x290 [ 1841.052761][ T3280] skb_copy_datagram_iter+0xd7/0x290 [ 1841.058112][ T3280] netlink_recvmsg+0x2d0/0xe00 [ 1841.062945][ T3280] ? netlink_sendmsg+0xbd0/0xbd0 [ 1841.067990][ T3280] ? aa_af_perm+0x340/0x340 [ 1841.072535][ T3280] ? __might_fault+0xa6/0x120 [ 1841.077244][ T3280] ? bpf_lsm_socket_recvmsg+0x5/0x10 [ 1841.082572][ T3280] ? security_socket_recvmsg+0x85/0xb0 [ 1841.088073][ T3280] ? netlink_sendmsg+0xbd0/0xbd0 [ 1841.093045][ T3280] ____sys_recvmsg+0x2cb/0x5e0 [ 1841.097873][ T3280] ? __sys_recvmsg_sock+0x40/0x40 [ 1841.102949][ T3280] ? import_iovec+0x6f/0xa0 [ 1841.107505][ T3280] ___sys_recvmsg+0x212/0x590 [ 1841.112332][ T3280] ? __sys_recvmsg+0x290/0x290 [ 1841.117140][ T3280] ? common_file_perm+0x171/0x1c0 [ 1841.122216][ T3280] ? __fget_files+0x43d/0x4b0 [ 1841.126959][ T3280] __x64_sys_recvmsg+0x205/0x2e0 [ 1841.131951][ T3280] ? ___sys_recvmsg+0x590/0x590 [ 1841.136851][ T3280] ? lockdep_hardirqs_on+0x94/0x140 [ 1841.142092][ T3280] do_syscall_64+0x4c/0xa0 [ 1841.146576][ T3280] ? clear_bhb_loop+0x60/0xb0 [ 1841.151342][ T3280] ? clear_bhb_loop+0x60/0xb0 [ 1841.156140][ T3280] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1841.162073][ T3280] RIP: 0033:0x7fa23d39acb9 [ 1841.166576][ T3280] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1841.186219][ T3280] RSP: 002b:00007fa23b5f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1841.194663][ T3280] RAX: ffffffffffffffda RBX: 00007fa23d616090 RCX: 00007fa23d39acb9 [ 1841.202688][ T3280] RDX: 0000000000002100 RSI: 0000200000000040 RDI: 0000000000000003 [ 1841.210701][ T3280] RBP: 00007fa23b5f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1841.218708][ T3280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1841.226706][ T3280] R13: 00007fa23d616128 R14: 00007fa23d616090 R15: 00007fffe3088888 [ 1841.234717][ T3280] [ 1844.421205][ T3372] FAULT_INJECTION: forcing a failure. [ 1844.421205][ T3372] name failslab, interval 1, probability 0, space 0, times 0 [ 1844.435327][ T3372] CPU: 1 PID: 3372 Comm: syz.8.8949 Not tainted syzkaller #0 [ 1844.442789][ T3372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1844.452894][ T3372] Call Trace: [ 1844.456219][ T3372] [ 1844.459198][ T3372] dump_stack_lvl+0x188/0x24e [ 1844.463946][ T3372] ? show_regs_print_info+0x12/0x12 [ 1844.469210][ T3372] ? load_image+0x400/0x400 [ 1844.473770][ T3372] ? __lock_acquire+0x7d10/0x7d10 [ 1844.478849][ T3372] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 1844.484897][ T3372] should_fail_ex+0x399/0x4d0 [ 1844.489646][ T3372] should_failslab+0x5/0x20 [ 1844.494204][ T3372] slab_pre_alloc_hook+0x59/0x310 [ 1844.499287][ T3372] kmem_cache_alloc_lru+0x49/0x2e0 [ 1844.504449][ T3372] ? __d_alloc+0x31/0x700 [ 1844.508832][ T3372] __d_alloc+0x31/0x700 [ 1844.513034][ T3372] d_alloc_pseudo+0x19/0x70 [ 1844.517599][ T3372] alloc_file_pseudo+0xe0/0x200 [ 1844.522507][ T3372] ? alloc_empty_file_noaccount+0x80/0x80 [ 1844.528284][ T3372] ? _raw_spin_unlock+0x24/0x40 [ 1844.533220][ T3372] ? alloc_fd+0x58f/0x630 [ 1844.537614][ T3372] sock_alloc_file+0xb3/0x240 [ 1844.542354][ T3372] __sys_socket+0x12a/0x190 [ 1844.546914][ T3372] __x64_sys_socket+0x76/0x80 [ 1844.551699][ T3372] do_syscall_64+0x4c/0xa0 [ 1844.556173][ T3372] ? clear_bhb_loop+0x60/0xb0 [ 1844.560899][ T3372] ? clear_bhb_loop+0x60/0xb0 [ 1844.565625][ T3372] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1844.571576][ T3372] RIP: 0033:0x7fa23d39acb9 [ 1844.576040][ T3372] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1844.595707][ T3372] RSP: 002b:00007fa23e175028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 1844.604258][ T3372] RAX: ffffffffffffffda RBX: 00007fa23d615fa0 RCX: 00007fa23d39acb9 [ 1844.612541][ T3372] RDX: 000000000000003a RSI: 0000000000000002 RDI: 000000000000000a [ 1844.620560][ T3372] RBP: 00007fa23e175090 R08: 0000000000000000 R09: 0000000000000000 [ 1844.628613][ T3372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1844.636649][ T3372] R13: 00007fa23d616038 R14: 00007fa23d615fa0 R15: 00007fffe3088888 [ 1844.644698][ T3372] [ 1844.684327][T23827] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 1844.694733][T23827] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 1844.714263][ T3379] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 1844.723435][ T3379] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 1844.731356][ T3379] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 1844.739102][ T3379] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 1844.813523][ T3383] FAULT_INJECTION: forcing a failure. [ 1844.813523][ T3383] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1844.827103][ T3383] CPU: 0 PID: 3383 Comm: syz.8.8951 Not tainted syzkaller #0 [ 1844.834544][ T3383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1844.844651][ T3383] Call Trace: [ 1844.847967][ T3383] [ 1844.850936][ T3383] dump_stack_lvl+0x188/0x24e [ 1844.855669][ T3383] ? show_regs_print_info+0x12/0x12 [ 1844.860922][ T3383] ? load_image+0x400/0x400 [ 1844.865481][ T3383] ? __might_fault+0xa6/0x120 [ 1844.870245][ T3383] should_fail_ex+0x399/0x4d0 [ 1844.874992][ T3383] copyin+0x1b/0x120 [ 1844.879170][ T3383] _copy_from_iter+0x559/0x1130 [ 1844.884091][ T3383] ? copyout_mc+0x110/0x110 [ 1844.888644][ T3383] ? verify_lock_unused+0x140/0x140 [ 1844.894018][ T3383] ? release_sock+0x2b/0x1b0 [ 1844.898643][ T3383] ? __check_object_size+0x89/0xa40 [ 1844.903873][ T3383] ping_common_sendmsg+0xb8/0x2a0 [ 1844.908938][ T3383] ping_v6_sendmsg+0x1f9/0x1250 [ 1844.913826][ T3383] ? ping_v6_pre_connect+0x30/0x30 [ 1844.918969][ T3383] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 1844.925042][ T3383] ? lock_chain_count+0x20/0x20 [ 1844.929934][ T3383] ? inet_sendmsg+0x147/0x2f0 [ 1844.934650][ T3383] ? __local_bh_enable_ip+0x136/0x1c0 [ 1844.940054][ T3383] ? lockdep_hardirqs_on+0x94/0x140 [ 1844.945312][ T3383] ? _local_bh_enable+0xa0/0xa0 [ 1844.950287][ T3383] ? do_raw_spin_unlock+0x11d/0x230 [ 1844.955533][ T3383] ? inet_sendmsg+0x147/0x2f0 [ 1844.960268][ T3383] ? inet_sendmsg+0x147/0x2f0 [ 1844.964990][ T3383] ? inet_send_prepare+0x260/0x260 [ 1844.970143][ T3383] ____sys_sendmsg+0x5be/0x970 [ 1844.974999][ T3383] ? __sys_sendmsg_sock+0x30/0x30 [ 1844.980065][ T3383] ? __import_iovec+0x315/0x500 [ 1844.984948][ T3383] ? import_iovec+0x6f/0xa0 [ 1844.989481][ T3383] ___sys_sendmsg+0x2a2/0x360 [ 1844.994203][ T3383] ? __sys_sendmsg+0x290/0x290 [ 1844.999018][ T3383] ? __lock_acquire+0x7d10/0x7d10 [ 1845.004101][ T3383] __se_sys_sendmsg+0x1bb/0x2a0 [ 1845.008993][ T3383] ? __x64_sys_sendmsg+0x80/0x80 [ 1845.013986][ T3383] ? lockdep_hardirqs_on+0x94/0x140 [ 1845.019225][ T3383] do_syscall_64+0x4c/0xa0 [ 1845.023684][ T3383] ? clear_bhb_loop+0x60/0xb0 [ 1845.028479][ T3383] ? clear_bhb_loop+0x60/0xb0 [ 1845.033188][ T3383] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1845.039115][ T3383] RIP: 0033:0x7fa23d39acb9 [ 1845.043563][ T3383] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1845.063199][ T3383] RSP: 002b:00007fa23e175028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1845.071656][ T3383] RAX: ffffffffffffffda RBX: 00007fa23d615fa0 RCX: 00007fa23d39acb9 [ 1845.079754][ T3383] RDX: 0000000000000000 RSI: 0000200000000440 RDI: 0000000000000003 [ 1845.087751][ T3383] RBP: 00007fa23e175090 R08: 0000000000000000 R09: 0000000000000000 [ 1845.095753][ T3383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1845.103752][ T3383] R13: 00007fa23d616038 R14: 00007fa23d615fa0 R15: 00007fffe3088888 [ 1845.111771][ T3383] [ 1845.237784][ T3388] __nla_validate_parse: 14 callbacks suppressed [ 1845.237805][ T3388] netlink: 44 bytes leftover after parsing attributes in process `syz.5.8953'. [ 1845.502576][T10554] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1845.528440][ T3389] netlink: 188 bytes leftover after parsing attributes in process `syz.9.8952'. [ 1845.620771][T10554] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1845.672528][ T3401] netlink: 44 bytes leftover after parsing attributes in process `syz.6.8956'. [ 1845.866736][T10554] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1846.219892][ T3374] chnl_net:caif_netlink_parms(): no params data found [ 1846.376846][T10554] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1846.625785][ T3374] bridge0: port 1(bridge_slave_0) entered blocking state [ 1846.633126][ T3374] bridge0: port 1(bridge_slave_0) entered disabled state [ 1846.643151][ T3374] device bridge_slave_0 entered promiscuous mode [ 1846.653745][ T3374] bridge0: port 2(bridge_slave_1) entered blocking state [ 1846.662888][ T3374] bridge0: port 2(bridge_slave_1) entered disabled state [ 1846.671585][ T3374] device bridge_slave_1 entered promiscuous mode [ 1846.700954][ T3421] netlink: 56 bytes leftover after parsing attributes in process `syz.8.8962'. [ 1846.833842][ T3374] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1846.843623][ T3379] Bluetooth: hci0: command 0x0409 tx timeout [ 1846.924871][ T3374] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1847.169985][ T3374] team0: Port device team_slave_0 added [ 1847.273383][ T3374] team0: Port device team_slave_1 added [ 1847.308792][ T3438] netlink: 122896 bytes leftover after parsing attributes in process `syz.6.8966'. [ 1847.426099][ T3374] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1847.433577][ T3374] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1847.486241][ T3448] netlink: 44 bytes leftover after parsing attributes in process `syz.8.8970'. [ 1847.517596][ T3374] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1847.693975][ T3374] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1847.716404][ T3374] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1847.778815][ T3374] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1847.791054][ T3449] netlink: 188 bytes leftover after parsing attributes in process `syz.5.8969'. [ 1848.379074][ T3374] device hsr_slave_0 entered promiscuous mode [ 1848.407936][ T3374] device hsr_slave_1 entered promiscuous mode [ 1848.508939][ T3469] netlink: 56 bytes leftover after parsing attributes in process `syz.5.8976'. [ 1848.856280][ T3479] netlink: 'syz.6.8977': attribute type 4 has an invalid length. [ 1848.876474][ T3479] netlink: 128124 bytes leftover after parsing attributes in process `syz.6.8977'. [ 1848.928103][ T3379] Bluetooth: hci0: command 0x041b tx timeout [ 1849.102864][ T3479] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 1849.298095][T10554] team0: Port device wlan1 removed [ 1849.700541][T10554] device hsr_slave_0 left promiscuous mode [ 1849.710825][T10554] device hsr_slave_1 left promiscuous mode [ 1849.726464][T10554] device veth0_to_bridge left promiscuous mode [ 1849.740498][T10554] bridge0: port 3(veth0_to_bridge) entered disabled state [ 1849.768092][T10554] device bridge_slave_1 left promiscuous mode [ 1849.817605][T10554] bridge0: port 2(bridge_slave_1) entered disabled state [ 1849.846292][T10554] device bridge_slave_0 left promiscuous mode [ 1849.852604][T10554] bridge0: port 1(bridge_slave_0) entered disabled state [ 1849.898267][ T3504] FAULT_INJECTION: forcing a failure. [ 1849.898267][ T3504] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1849.918795][ T3504] CPU: 0 PID: 3504 Comm: syz.6.8982 Not tainted syzkaller #0 [ 1849.926267][ T3504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1849.936355][ T3504] Call Trace: [ 1849.939663][ T3504] [ 1849.942636][ T3504] dump_stack_lvl+0x188/0x24e [ 1849.947452][ T3504] ? show_regs_print_info+0x12/0x12 [ 1849.952680][ T3504] ? load_image+0x400/0x400 [ 1849.957224][ T3504] ? __lock_acquire+0x7d10/0x7d10 [ 1849.962394][ T3504] should_fail_ex+0x399/0x4d0 [ 1849.967119][ T3504] _copy_to_user+0x2c/0x130 [ 1849.971662][ T3504] move_addr_to_user+0x146/0x1e0 [ 1849.976648][ T3504] ____sys_recvmsg+0x331/0x5e0 [ 1849.981474][ T3504] ? __sys_recvmsg_sock+0x40/0x40 [ 1849.986633][ T3504] ? import_iovec+0x6f/0xa0 [ 1849.991178][ T3504] ___sys_recvmsg+0x212/0x590 [ 1849.995904][ T3504] ? __sys_recvmsg+0x290/0x290 [ 1850.000719][ T3504] ? common_file_perm+0x171/0x1c0 [ 1850.005778][ T3504] ? __fget_files+0x43d/0x4b0 [ 1850.010504][ T3504] __x64_sys_recvmsg+0x205/0x2e0 [ 1850.015486][ T3504] ? ___sys_recvmsg+0x590/0x590 [ 1850.020387][ T3504] ? lockdep_hardirqs_on+0x94/0x140 [ 1850.025636][ T3504] do_syscall_64+0x4c/0xa0 [ 1850.030094][ T3504] ? clear_bhb_loop+0x60/0xb0 [ 1850.034808][ T3504] ? clear_bhb_loop+0x60/0xb0 [ 1850.039518][ T3504] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1850.045442][ T3504] RIP: 0033:0x7fb05e79acb9 [ 1850.049884][ T3504] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1850.069536][ T3504] RSP: 002b:00007fb05f745028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1850.077995][ T3504] RAX: ffffffffffffffda RBX: 00007fb05ea15fa0 RCX: 00007fb05e79acb9 [ 1850.085999][ T3504] RDX: 0000000000000000 RSI: 0000200000003040 RDI: 0000000000000003 [ 1850.094006][ T3504] RBP: 00007fb05f745090 R08: 0000000000000000 R09: 0000000000000000 [ 1850.102014][ T3504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1850.110020][ T3504] R13: 00007fb05ea16038 R14: 00007fb05ea15fa0 R15: 00007ffe64bf63a8 [ 1850.118038][ T3504] [ 1850.216056][T10554] device veth1_macvtap left promiscuous mode [ 1850.222180][T10554] device veth0_macvtap left promiscuous mode [ 1850.244280][T10554] device veth1_vlan left promiscuous mode [ 1850.250211][T10554] device veth0_vlan left promiscuous mode [ 1850.381657][ T3520] netlink: 44 bytes leftover after parsing attributes in process `syz.9.8986'. [ 1850.994712][ T3379] Bluetooth: hci0: command 0x040f tx timeout [ 1853.078510][ T1269] ieee802154 phy0 wpan0: encryption failed: -22 [ 1853.085026][ T3379] Bluetooth: hci0: command 0x0419 tx timeout [ 1853.091357][ T1269] ieee802154 phy1 wpan1: encryption failed: -22 [ 1853.443613][T10554] team0 (unregistering): Port device team_slave_1 removed [ 1853.491483][T10554] team0 (unregistering): Port device team_slave_0 removed [ 1853.541847][T10554] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1853.587629][T10554] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1853.900646][T10554] bond0 (unregistering): Released all slaves [ 1854.012346][ T3519] netlink: 188 bytes leftover after parsing attributes in process `syz.8.8985'. [ 1854.035306][ T3532] netlink: 56 bytes leftover after parsing attributes in process `syz.9.8988'. [ 1854.780650][ T3374] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 1854.848615][ T3374] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 1854.937686][ T3374] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 1854.992188][ T3374] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 1855.467231][ T3587] netlink: 44 bytes leftover after parsing attributes in process `syz.5.8997'. [ 1855.533747][ T3374] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1855.603575][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1855.615271][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1855.647506][ T3374] 8021q: adding VLAN 0 to HW filter on device team0 [ 1855.680577][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1855.700318][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1855.730635][T10554] bridge0: port 1(bridge_slave_0) entered blocking state [ 1855.737880][T10554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1855.795316][ T3600] netlink: 188 bytes leftover after parsing attributes in process `syz.8.8999'. [ 1855.844926][ T3606] netlink: 56 bytes leftover after parsing attributes in process `syz.5.9001'. [ 1855.869992][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1855.879405][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1855.903653][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1855.927199][T10554] bridge0: port 2(bridge_slave_1) entered blocking state [ 1855.934556][T10554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1855.957491][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1855.987821][ T3609] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1856.026026][ T3609] device syzkaller0 entered promiscuous mode [ 1856.074470][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1856.099674][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1856.117005][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1856.137315][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1856.168198][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1856.195547][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1856.236562][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1856.262962][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1856.282139][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1856.298615][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1856.327737][ T3374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1857.440277][ T3653] netlink: 44 bytes leftover after parsing attributes in process `syz.5.9010'. [ 1857.642781][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1857.658306][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1857.693861][ T3374] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1858.001078][ T3668] FAULT_INJECTION: forcing a failure. [ 1858.001078][ T3668] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1858.061649][ T3670] netlink: 56 bytes leftover after parsing attributes in process `syz.9.9012'. [ 1858.071208][ T3668] CPU: 1 PID: 3668 Comm: syz.5.9013 Not tainted syzkaller #0 [ 1858.078648][ T3668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1858.088756][ T3668] Call Trace: [ 1858.092084][ T3668] [ 1858.095062][ T3668] dump_stack_lvl+0x188/0x24e [ 1858.099803][ T3668] ? show_regs_print_info+0x12/0x12 [ 1858.105069][ T3668] ? load_image+0x400/0x400 [ 1858.109675][ T3668] ? __might_fault+0xa6/0x120 [ 1858.114419][ T3668] should_fail_ex+0x399/0x4d0 [ 1858.119200][ T3668] copyin+0x1b/0x120 [ 1858.123161][ T3668] _copy_from_iter+0x447/0x1130 [ 1858.128079][ T3668] ? copyout_mc+0x110/0x110 [ 1858.132632][ T3668] ? __virt_addr_valid+0x188/0x540 [ 1858.137811][ T3668] ? __virt_addr_valid+0x188/0x540 [ 1858.142999][ T3668] ? __virt_addr_valid+0x465/0x540 [ 1858.148174][ T3668] ? __check_object_size+0x500/0xa40 [ 1858.153517][ T3668] netlink_sendmsg+0x755/0xbd0 [ 1858.158374][ T3668] ? netlink_getsockopt+0x550/0x550 [ 1858.163670][ T3668] ? aa_sock_msg_perm+0x94/0x150 [ 1858.168670][ T3668] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1858.174011][ T3668] ? security_socket_sendmsg+0x7c/0xa0 [ 1858.179542][ T3668] ? netlink_getsockopt+0x550/0x550 [ 1858.184812][ T3668] ____sys_sendmsg+0x5be/0x970 [ 1858.189652][ T3668] ? __sys_sendmsg_sock+0x30/0x30 [ 1858.194737][ T3668] ? __import_iovec+0x315/0x500 [ 1858.199647][ T3668] ? import_iovec+0x6f/0xa0 [ 1858.204204][ T3668] ___sys_sendmsg+0x2a2/0x360 [ 1858.208944][ T3668] ? __sys_sendmsg+0x290/0x290 [ 1858.213819][ T3668] ? __lock_acquire+0x7d10/0x7d10 [ 1858.218946][ T3668] __se_sys_sendmsg+0x1bb/0x2a0 [ 1858.223860][ T3668] ? __x64_sys_sendmsg+0x80/0x80 [ 1858.228879][ T3668] ? lockdep_hardirqs_on+0x94/0x140 [ 1858.234141][ T3668] do_syscall_64+0x4c/0xa0 [ 1858.238648][ T3668] ? clear_bhb_loop+0x60/0xb0 [ 1858.243386][ T3668] ? clear_bhb_loop+0x60/0xb0 [ 1858.248125][ T3668] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1858.254078][ T3668] RIP: 0033:0x7f2b3a99acb9 [ 1858.258547][ T3668] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1858.278219][ T3668] RSP: 002b:00007f2b3b905028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1858.286696][ T3668] RAX: ffffffffffffffda RBX: 00007f2b3ac15fa0 RCX: 00007f2b3a99acb9 [ 1858.294728][ T3668] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000003 [ 1858.302758][ T3668] RBP: 00007f2b3b905090 R08: 0000000000000000 R09: 0000000000000000 [ 1858.310801][ T3668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1858.318831][ T3668] R13: 00007f2b3ac16038 R14: 00007f2b3ac15fa0 R15: 00007ffc2616ed28 [ 1858.326856][ T3668] [ 1858.381059][ T3674] netlink: 188 bytes leftover after parsing attributes in process `syz.6.9014'. [ 1859.327083][ T3710] netlink: 44 bytes leftover after parsing attributes in process `syz.9.9022'. [ 1859.338253][T10569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1859.358553][T10569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1859.404242][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1859.413116][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1859.432400][ T3374] device veth0_vlan entered promiscuous mode [ 1859.441126][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1859.489379][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1859.563021][ T3374] device veth1_vlan entered promiscuous mode [ 1859.633925][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1859.655039][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1859.687284][ T3374] device veth0_macvtap entered promiscuous mode [ 1859.736133][ T3374] device veth1_macvtap entered promiscuous mode [ 1859.780261][ T3374] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1859.797684][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1859.821055][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1859.842553][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1859.863145][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1859.890898][ T3374] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1859.938477][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1859.958022][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1859.978539][ T3724] netlink: 56 bytes leftover after parsing attributes in process `syz.9.9026'. [ 1860.011106][ T3374] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1860.030549][ T3374] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1860.059807][ T3374] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1860.069063][ T3374] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1860.326873][T10554] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1860.360657][T10554] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1860.437683][T10569] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1860.471241][T10569] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1860.483156][T10569] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1860.523549][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1860.822487][ T3744] netlink: 188 bytes leftover after parsing attributes in process `syz.8.9030'. [ 1861.309483][ T3758] netlink: 44 bytes leftover after parsing attributes in process `syz.9.9035'. [ 1861.748062][ T3768] netlink: 56 bytes leftover after parsing attributes in process `syz.8.9038'. [ 1861.760392][T24276] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 1861.770962][T24276] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 1861.787850][T24276] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 1861.796920][T24276] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 1861.807498][T23827] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 1861.815045][T23827] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 1862.028755][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1862.131308][ T3781] netlink: 60 bytes leftover after parsing attributes in process `syz.6.9041'. [ 1862.422150][T10554] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1862.595198][T10554] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1862.798731][T10554] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1862.993052][ T3766] chnl_net:caif_netlink_parms(): no params data found [ 1863.190877][T10554] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1863.223708][ T3810] netlink: 44 bytes leftover after parsing attributes in process `syz.7.9049'. [ 1863.526258][ T3803] netlink: 188 bytes leftover after parsing attributes in process `syz.9.9047'. [ 1863.687023][ T3818] device wg2 entered promiscuous mode [ 1863.738189][ T3824] netlink: 56 bytes leftover after parsing attributes in process `syz.8.9052'. [ 1863.845460][ T3766] bridge0: port 1(bridge_slave_0) entered blocking state [ 1863.866253][ T3828] FAULT_INJECTION: forcing a failure. [ 1863.866253][ T3828] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1863.884147][T23827] Bluetooth: hci2: command 0x0409 tx timeout [ 1863.891668][ T3828] CPU: 0 PID: 3828 Comm: syz.9.9053 Not tainted syzkaller #0 [ 1863.899105][ T3828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1863.909186][ T3828] Call Trace: [ 1863.912479][ T3828] [ 1863.915422][ T3828] dump_stack_lvl+0x188/0x24e [ 1863.920129][ T3828] ? show_regs_print_info+0x12/0x12 [ 1863.925399][ T3828] ? load_image+0x400/0x400 [ 1863.929920][ T3828] ? __lock_acquire+0x7d10/0x7d10 [ 1863.934992][ T3828] should_fail_ex+0x399/0x4d0 [ 1863.939739][ T3828] _copy_from_user+0x2c/0x170 [ 1863.944467][ T3828] ____sys_sendmsg+0x30a/0x970 [ 1863.944506][ T3766] bridge0: port 1(bridge_slave_0) entered disabled state [ 1863.949292][ T3828] ? __sys_sendmsg_sock+0x30/0x30 [ 1863.949330][ T3828] ? __import_iovec+0x315/0x500 [ 1863.949367][ T3828] ? import_iovec+0x6f/0xa0 [ 1863.970886][ T3828] ___sys_sendmsg+0x2a2/0x360 [ 1863.972363][ T3766] device bridge_slave_0 entered promiscuous mode [ 1863.975620][ T3828] ? __sys_sendmsg+0x290/0x290 [ 1863.975676][ T3828] ? __lock_acquire+0x7d10/0x7d10 [ 1863.991904][ T3828] __se_sys_sendmsg+0x1bb/0x2a0 [ 1863.996827][ T3828] ? __x64_sys_sendmsg+0x80/0x80 [ 1864.001873][ T3828] ? lockdep_hardirqs_on+0x94/0x140 [ 1864.007197][ T3828] do_syscall_64+0x4c/0xa0 [ 1864.011683][ T3828] ? clear_bhb_loop+0x60/0xb0 [ 1864.016416][ T3828] ? clear_bhb_loop+0x60/0xb0 [ 1864.021157][ T3828] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1864.027079][ T3828] RIP: 0033:0x7fd3f979acb9 [ 1864.031515][ T3828] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1864.051291][ T3828] RSP: 002b:00007fd3fa71c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1864.059766][ T3828] RAX: ffffffffffffffda RBX: 00007fd3f9a15fa0 RCX: 00007fd3f979acb9 [ 1864.067796][ T3828] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000003 [ 1864.075890][ T3828] RBP: 00007fd3fa71c090 R08: 0000000000000000 R09: 0000000000000000 [ 1864.083899][ T3828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1864.091902][ T3828] R13: 00007fd3f9a16038 R14: 00007fd3f9a15fa0 R15: 00007ffdcc0c4d68 [ 1864.099918][ T3828] [ 1864.148907][ T3766] bridge0: port 2(bridge_slave_1) entered blocking state [ 1864.160082][ T3766] bridge0: port 2(bridge_slave_1) entered disabled state [ 1864.185420][ T3766] device bridge_slave_1 entered promiscuous mode [ 1864.346371][ T3766] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1864.415964][ T3766] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1864.766193][ T3766] team0: Port device team_slave_0 added [ 1864.863241][ T3766] team0: Port device team_slave_1 added [ 1864.919057][ T3846] netlink: 44 bytes leftover after parsing attributes in process `syz.8.9060'. [ 1865.223341][ T3766] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1865.242401][ T3766] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1865.313584][ T3766] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1865.660374][ T3766] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1865.672262][ T3766] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1865.829205][ T3766] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1865.954332][T23827] Bluetooth: hci2: command 0x041b tx timeout [ 1866.113918][ T3870] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 1866.132611][ T3870] syzkaller0: persist enabled [ 1866.162971][ T3874] netlink: 188 bytes leftover after parsing attributes in process `syz.8.9062'. [ 1866.188073][ T3879] FAULT_INJECTION: forcing a failure. [ 1866.188073][ T3879] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1866.204635][ T3879] CPU: 0 PID: 3879 Comm: syz.7.9067 Not tainted syzkaller #0 [ 1866.212084][ T3879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1866.222218][ T3879] Call Trace: [ 1866.225550][ T3879] [ 1866.228532][ T3879] dump_stack_lvl+0x188/0x24e [ 1866.233275][ T3879] ? show_regs_print_info+0x12/0x12 [ 1866.238528][ T3879] ? load_image+0x400/0x400 [ 1866.243087][ T3879] ? __lock_acquire+0x7d10/0x7d10 [ 1866.248184][ T3879] ? snprintf+0xe5/0x140 [ 1866.250425][ T3869] netlink: 56 bytes leftover after parsing attributes in process `syz.9.9065'. [ 1866.252456][ T3879] should_fail_ex+0x399/0x4d0 [ 1866.252503][ T3879] _copy_to_user+0x2c/0x130 [ 1866.270715][ T3879] simple_read_from_buffer+0xe3/0x150 [ 1866.276170][ T3879] proc_fail_nth_read+0x1a6/0x220 [ 1866.281248][ T3879] ? proc_fault_inject_write+0x310/0x310 [ 1866.286942][ T3879] ? fsnotify_perm+0x248/0x550 [ 1866.291759][ T3879] ? proc_fault_inject_write+0x310/0x310 [ 1866.297440][ T3879] vfs_read+0x2de/0xa00 [ 1866.301660][ T3879] ? kernel_read+0x1e0/0x1e0 [ 1866.306311][ T3879] ? __fget_files+0x28/0x4b0 [ 1866.310953][ T3879] ? __fget_files+0x28/0x4b0 [ 1866.315595][ T3879] ? __fget_files+0x43d/0x4b0 [ 1866.320327][ T3879] ? __fdget_pos+0x2ae/0x360 [ 1866.324958][ T3879] ? ksys_read+0x71/0x250 [ 1866.329329][ T3879] ksys_read+0x14c/0x250 [ 1866.333618][ T3879] ? vfs_write+0xa30/0xa30 [ 1866.338076][ T3879] ? lockdep_hardirqs_on+0x94/0x140 [ 1866.343325][ T3879] do_syscall_64+0x4c/0xa0 [ 1866.347779][ T3879] ? clear_bhb_loop+0x60/0xb0 [ 1866.352489][ T3879] ? clear_bhb_loop+0x60/0xb0 [ 1866.357195][ T3879] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1866.363119][ T3879] RIP: 0033:0x7f57a175b58e [ 1866.367569][ T3879] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1866.387234][ T3879] RSP: 002b:00007f57a26ddfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1866.395682][ T3879] RAX: ffffffffffffffda RBX: 00007f57a26de6c0 RCX: 00007f57a175b58e [ 1866.403694][ T3879] RDX: 000000000000000f RSI: 00007f57a26de0a0 RDI: 0000000000000004 [ 1866.411691][ T3879] RBP: 00007f57a26de090 R08: 0000000000000000 R09: 0000000000000000 [ 1866.419689][ T3879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1866.427691][ T3879] R13: 00007f57a1a16038 R14: 00007f57a1a15fa0 R15: 00007ffd1a5c9118 [ 1866.435709][ T3879] [ 1866.667582][ T3766] device hsr_slave_0 entered promiscuous mode [ 1866.909109][ T3766] device hsr_slave_1 entered promiscuous mode [ 1866.932332][ T3766] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1866.948211][ T3766] Cannot create hsr debugfs directory [ 1867.083513][ T3893] netlink: 44 bytes leftover after parsing attributes in process `syz.7.9071'. [ 1867.411087][ T3898] net_ratelimit: 375 callbacks suppressed [ 1867.411118][ T3898] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 1867.942426][T10554] team0: Port device wlan1 removed [ 1868.034308][T23827] Bluetooth: hci2: command 0x040f tx timeout [ 1868.337449][ T3921] netlink: 188 bytes leftover after parsing attributes in process `syz.9.9078'. [ 1868.370601][T10554] device hsr_slave_0 left promiscuous mode [ 1868.388823][T10554] device hsr_slave_1 left promiscuous mode [ 1868.415135][T10554] device veth0_to_bridge left promiscuous mode [ 1868.446871][T10554] bridge0: port 3(veth0_to_bridge) entered disabled state [ 1868.501638][T10554] device bridge_slave_1 left promiscuous mode [ 1868.525169][T10554] bridge0: port 2(bridge_slave_1) entered disabled state [ 1868.557144][T10554] device bridge_slave_0 left promiscuous mode [ 1868.563572][T10554] bridge0: port 1(bridge_slave_0) entered disabled state [ 1868.683243][T10554] device veth1_macvtap left promiscuous mode [ 1868.692011][T10554] device veth0_macvtap left promiscuous mode [ 1868.710069][T10554] device veth1_vlan left promiscuous mode [ 1868.726847][T10554] device veth0_vlan left promiscuous mode [ 1869.806384][T10554] team0 (unregistering): Port device team_slave_1 removed [ 1869.861281][T10554] team0 (unregistering): Port device team_slave_0 removed [ 1869.910167][T10554] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1869.960463][T10554] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1870.118903][T23827] Bluetooth: hci2: command 0x0419 tx timeout [ 1870.308248][T10554] bond0 (unregistering): Released all slaves [ 1870.453841][ T3950] netlink: 56 bytes leftover after parsing attributes in process `syz.9.9082'. [ 1870.696066][ T3964] FAULT_INJECTION: forcing a failure. [ 1870.696066][ T3964] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1870.709480][ T3964] CPU: 0 PID: 3964 Comm: syz.7.9085 Not tainted syzkaller #0 [ 1870.717022][ T3964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1870.727133][ T3964] Call Trace: [ 1870.730478][ T3964] [ 1870.733456][ T3964] dump_stack_lvl+0x188/0x24e [ 1870.738200][ T3964] ? show_regs_print_info+0x12/0x12 [ 1870.743458][ T3964] ? load_image+0x400/0x400 [ 1870.748027][ T3964] ? __lock_acquire+0x7d10/0x7d10 [ 1870.753125][ T3964] ? snprintf+0xe5/0x140 [ 1870.757440][ T3967] netlink: 44 bytes leftover after parsing attributes in process `syz.9.9086'. [ 1870.757425][ T3964] should_fail_ex+0x399/0x4d0 [ 1870.771151][ T3964] _copy_to_user+0x2c/0x130 [ 1870.775737][ T3964] simple_read_from_buffer+0xe3/0x150 [ 1870.781373][ T3964] proc_fail_nth_read+0x1a6/0x220 [ 1870.786465][ T3964] ? proc_fault_inject_write+0x310/0x310 [ 1870.792158][ T3964] ? fsnotify_perm+0x248/0x550 [ 1870.796993][ T3964] ? proc_fault_inject_write+0x310/0x310 [ 1870.802701][ T3964] vfs_read+0x2de/0xa00 [ 1870.806948][ T3964] ? kernel_read+0x1e0/0x1e0 [ 1870.811602][ T3964] ? __fget_files+0x28/0x4b0 [ 1870.816270][ T3964] ? __fget_files+0x28/0x4b0 [ 1870.820919][ T3964] ? __fget_files+0x43d/0x4b0 [ 1870.825677][ T3964] ? __fdget_pos+0x2ae/0x360 [ 1870.830413][ T3964] ? ksys_read+0x71/0x250 [ 1870.834828][ T3964] ksys_read+0x14c/0x250 [ 1870.839135][ T3964] ? vfs_write+0xa30/0xa30 [ 1870.843607][ T3964] ? lockdep_hardirqs_on+0x94/0x140 [ 1870.848872][ T3964] do_syscall_64+0x4c/0xa0 [ 1870.853337][ T3964] ? clear_bhb_loop+0x60/0xb0 [ 1870.858083][ T3964] ? clear_bhb_loop+0x60/0xb0 [ 1870.862835][ T3964] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1870.868799][ T3964] RIP: 0033:0x7f57a175b58e [ 1870.873268][ T3964] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1870.893106][ T3964] RSP: 002b:00007f57a26ddfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1870.901575][ T3964] RAX: ffffffffffffffda RBX: 00007f57a26de6c0 RCX: 00007f57a175b58e [ 1870.909605][ T3964] RDX: 000000000000000f RSI: 00007f57a26de0a0 RDI: 0000000000000005 [ 1870.917722][ T3964] RBP: 00007f57a26de090 R08: 0000000000000000 R09: 0000000000000000 [ 1870.925759][ T3964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1870.933784][ T3964] R13: 00007f57a1a16038 R14: 00007f57a1a15fa0 R15: 00007ffd1a5c9118 [ 1870.941826][ T3964] [ 1871.266293][ T3766] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 1871.512831][ T3766] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 1871.552579][ T3766] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 1871.587674][ T3766] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1872.153867][ T3990] netlink: 188 bytes leftover after parsing attributes in process `syz.8.9092'. [ 1872.280022][ T3766] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1872.307895][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1872.337808][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1872.390016][ T3766] 8021q: adding VLAN 0 to HW filter on device team0 [ 1872.413142][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1872.438441][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1872.451318][T10554] bridge0: port 1(bridge_slave_0) entered blocking state [ 1872.458562][T10554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1872.496909][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1872.512052][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1872.540957][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1872.550338][T10554] bridge0: port 2(bridge_slave_1) entered blocking state [ 1872.557549][T10554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1872.575119][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1872.612704][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1872.629868][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1872.661089][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1872.687459][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1872.715368][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1872.763006][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1872.805806][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1872.826690][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1872.857679][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1872.882991][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1872.917556][ T3766] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1872.984802][ T4022] netlink: 'syz.8.9097': attribute type 1 has an invalid length. [ 1873.072304][ T4017] netlink: 56 bytes leftover after parsing attributes in process `syz.7.9096'. [ 1873.084334][ T4022] netlink: 'syz.8.9097': attribute type 3 has an invalid length. [ 1873.092250][ T4022] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.9097'. [ 1873.372327][ T4029] netlink: 44 bytes leftover after parsing attributes in process `syz.6.9099'. [ 1873.858320][ T4044] FAULT_INJECTION: forcing a failure. [ 1873.858320][ T4044] name failslab, interval 1, probability 0, space 0, times 0 [ 1874.014618][ T4044] CPU: 1 PID: 4044 Comm: syz.9.9103 Not tainted syzkaller #0 [ 1874.022103][ T4044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1874.032215][ T4044] Call Trace: [ 1874.035530][ T4044] [ 1874.038489][ T4044] dump_stack_lvl+0x188/0x24e [ 1874.043207][ T4044] ? show_regs_print_info+0x12/0x12 [ 1874.048451][ T4044] ? load_image+0x400/0x400 [ 1874.053011][ T4044] ? __might_sleep+0xd0/0xd0 [ 1874.057628][ T4044] ? __lock_acquire+0x7d10/0x7d10 [ 1874.062689][ T4044] should_fail_ex+0x399/0x4d0 [ 1874.067408][ T4044] should_failslab+0x5/0x20 [ 1874.071953][ T4044] slab_pre_alloc_hook+0x59/0x310 [ 1874.077010][ T4044] ? apparmor_sk_alloc_security+0x74/0x100 [ 1874.082855][ T4044] __kmem_cache_alloc_node+0x4f/0x260 [ 1874.088259][ T4044] ? apparmor_sk_alloc_security+0x74/0x100 [ 1874.094105][ T4044] kmalloc_trace+0x26/0xe0 [ 1874.098561][ T4044] apparmor_sk_alloc_security+0x74/0x100 [ 1874.104231][ T4044] security_sk_alloc+0x6a/0xa0 [ 1874.109040][ T4044] sk_prot_alloc+0x101/0x210 [ 1874.113667][ T4044] ? sk_alloc+0x20/0x340 [ 1874.117951][ T4044] sk_alloc+0x36/0x340 [ 1874.122061][ T4044] ? bpf_ctx_init+0x163/0x1a0 [ 1874.126764][ T4044] ? bpf_prog_test_run_skb+0x26f/0x12a0 [ 1874.132367][ T4044] bpf_prog_test_run_skb+0x35e/0x12a0 [ 1874.137769][ T4044] ? __fget_files+0x28/0x4b0 [ 1874.142395][ T4044] ? __fget_files+0x43d/0x4b0 [ 1874.147117][ T4044] ? cpu_online+0xa0/0xa0 [ 1874.151509][ T4044] bpf_prog_test_run+0x31e/0x390 [ 1874.156486][ T4044] __sys_bpf+0x62b/0x780 [ 1874.160765][ T4044] ? bpf_link_show_fdinfo+0x380/0x380 [ 1874.166199][ T4044] ? lock_chain_count+0x20/0x20 [ 1874.171094][ T4044] __x64_sys_bpf+0x78/0x90 [ 1874.175549][ T4044] do_syscall_64+0x4c/0xa0 [ 1874.179998][ T4044] ? clear_bhb_loop+0x60/0xb0 [ 1874.184702][ T4044] ? clear_bhb_loop+0x60/0xb0 [ 1874.189441][ T4044] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1874.195362][ T4044] RIP: 0033:0x7fd3f979acb9 [ 1874.199800][ T4044] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1874.219439][ T4044] RSP: 002b:00007fd3fa71c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1874.227987][ T4044] RAX: ffffffffffffffda RBX: 00007fd3f9a15fa0 RCX: 00007fd3f979acb9 [ 1874.235990][ T4044] RDX: 0000000000000050 RSI: 00002000000000c0 RDI: 000000000000000a [ 1874.244000][ T4044] RBP: 00007fd3fa71c090 R08: 0000000000000000 R09: 0000000000000000 [ 1874.252007][ T4044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1874.260005][ T4044] R13: 00007fd3f9a16038 R14: 00007fd3f9a15fa0 R15: 00007ffdcc0c4d68 [ 1874.268016][ T4044] [ 1874.403322][ T4050] netlink: 188 bytes leftover after parsing attributes in process `syz.8.9104'. [ 1874.468005][T31549] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1874.497387][T31549] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1874.540868][ T3766] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1875.082775][ T4085] netlink: 56 bytes leftover after parsing attributes in process `syz.6.9110'. [ 1875.372538][ T4090] netlink: 44 bytes leftover after parsing attributes in process `syz.7.9111'. [ 1875.531260][ T4095] netlink: 'syz.8.9112': attribute type 3 has an invalid length. [ 1876.006906][ T4098] netlink: 'syz.6.9113': attribute type 9 has an invalid length. [ 1876.509528][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1876.584630][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1876.722898][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1876.745140][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1876.772275][ T4123] netlink: 188 bytes leftover after parsing attributes in process `syz.7.9118'. [ 1876.797224][ T3766] device veth0_vlan entered promiscuous mode [ 1876.810569][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1876.823159][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1876.862477][ T3766] device veth1_vlan entered promiscuous mode [ 1876.869389][ T4130] netlink: 154788 bytes leftover after parsing attributes in process `syz.8.9120'. [ 1876.905946][ T4130] openvswitch: netlink: Message has 48126 unknown bytes. [ 1876.956605][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1876.972868][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1877.000160][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1877.039657][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1877.070752][ T3766] device veth0_macvtap entered promiscuous mode [ 1877.120513][ T3766] device veth1_macvtap entered promiscuous mode [ 1877.153013][ T4133] netlink: 56 bytes leftover after parsing attributes in process `syz.6.9122'. [ 1877.199662][ T4137] netlink: 44 bytes leftover after parsing attributes in process `syz.8.9123'. [ 1877.298945][ T3766] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1877.436472][ T3766] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1877.495801][ T3766] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1877.519374][T10577] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1877.546151][T10577] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1877.577393][T10577] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1877.606179][T10577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1877.640048][ T3766] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1877.672655][ T3766] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1877.706935][ T3766] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1877.770350][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1877.788418][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1877.847267][ T3766] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1877.869602][ T3766] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1877.888311][ T3766] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1877.898615][ T3766] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1878.100972][ T4348] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1878.126156][ T4348] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1878.157495][ T4143] FAULT_INJECTION: forcing a failure. [ 1878.157495][ T4143] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1878.184255][ T4143] CPU: 1 PID: 4143 Comm: syz.7.9124 Not tainted syzkaller #0 [ 1878.192171][ T4143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1878.202290][ T4143] Call Trace: [ 1878.205639][ T4143] [ 1878.208712][ T4143] dump_stack_lvl+0x188/0x24e [ 1878.213453][ T4143] ? show_regs_print_info+0x12/0x12 [ 1878.218707][ T4143] ? load_image+0x400/0x400 [ 1878.223270][ T4143] ? __lock_acquire+0x7d10/0x7d10 [ 1878.228368][ T4143] should_fail_ex+0x399/0x4d0 [ 1878.233128][ T4143] _copy_from_user+0x2c/0x170 [ 1878.237868][ T4143] iovec_from_user+0x143/0x360 [ 1878.242697][ T4143] __import_iovec+0x6d/0x500 [ 1878.247345][ T4143] ? __might_fault+0xc2/0x120 [ 1878.252097][ T4143] import_iovec+0x6f/0xa0 [ 1878.256498][ T4143] ___sys_sendmsg+0x252/0x360 [ 1878.261252][ T4143] ? __sys_sendmsg+0x290/0x290 [ 1878.266105][ T4143] ? __lock_acquire+0x7d10/0x7d10 [ 1878.271221][ T4143] __se_sys_sendmsg+0x1bb/0x2a0 [ 1878.276232][ T4143] ? __x64_sys_sendmsg+0x80/0x80 [ 1878.281262][ T4143] ? syscall_enter_from_user_mode+0x2a/0x80 [ 1878.287301][ T4143] do_syscall_64+0x4c/0xa0 [ 1878.291779][ T4143] ? clear_bhb_loop+0x60/0xb0 [ 1878.296551][ T4143] ? clear_bhb_loop+0x60/0xb0 [ 1878.301291][ T4143] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1878.307236][ T4143] RIP: 0033:0x7f57a179acb9 [ 1878.311692][ T4143] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1878.331354][ T4143] RSP: 002b:00007f57a26de028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1878.339830][ T4143] RAX: ffffffffffffffda RBX: 00007f57a1a15fa0 RCX: 00007f57a179acb9 [ 1878.347857][ T4143] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 1878.355890][ T4143] RBP: 00007f57a26de090 R08: 0000000000000000 R09: 0000000000000000 [ 1878.363907][ T4143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1878.371926][ T4143] R13: 00007f57a1a16038 R14: 00007f57a1a15fa0 R15: 00007ffd1a5c9118 [ 1878.379968][ T4143] [ 1878.425706][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1878.446716][T24387] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1878.478789][T24387] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1878.509715][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1879.555249][ T4182] netlink: 188 bytes leftover after parsing attributes in process `syz.5.9134'. [ 1879.651021][ T4186] netlink: 56 bytes leftover after parsing attributes in process `syz.7.9135'. [ 1880.086595][T23827] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 1880.099733][T23827] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 1880.109457][T23827] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 1880.140816][T23827] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 1880.149366][T23827] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 1880.161039][T23827] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 1880.291786][ T4201] netlink: 44 bytes leftover after parsing attributes in process `syz.7.9138'. [ 1880.333564][T24387] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1880.387056][ T4204] FAULT_INJECTION: forcing a failure. [ 1880.387056][ T4204] name failslab, interval 1, probability 0, space 0, times 0 [ 1880.410845][ T4204] CPU: 1 PID: 4204 Comm: syz.5.9139 Not tainted syzkaller #0 [ 1880.418317][ T4204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1880.428435][ T4204] Call Trace: [ 1880.431795][ T4204] [ 1880.434767][ T4204] dump_stack_lvl+0x188/0x24e [ 1880.439508][ T4204] ? show_regs_print_info+0x12/0x12 [ 1880.444850][ T4204] ? load_image+0x400/0x400 [ 1880.449508][ T4204] ? __might_sleep+0xd0/0xd0 [ 1880.454179][ T4204] ? __lock_acquire+0x7d10/0x7d10 [ 1880.459281][ T4204] should_fail_ex+0x399/0x4d0 [ 1880.464061][ T4204] should_failslab+0x5/0x20 [ 1880.468627][ T4204] slab_pre_alloc_hook+0x59/0x310 [ 1880.473719][ T4204] kmem_cache_alloc_node+0x5a/0x320 [ 1880.478981][ T4204] ? __alloc_skb+0xfc/0x7e0 [ 1880.483558][ T4204] __alloc_skb+0xfc/0x7e0 [ 1880.487960][ T4204] alloc_skb_with_frags+0xa7/0x710 [ 1880.493133][ T4204] ? __lock_acquire+0x7d10/0x7d10 [ 1880.498216][ T4204] sock_alloc_send_pskb+0x87f/0x9a0 [ 1880.503473][ T4204] ? sock_kzfree_s+0x50/0x50 [ 1880.508104][ T4204] ? ct_irq_exit_irqson+0x113/0x170 [ 1880.513341][ T4204] ? ct_irq_enter_irqson+0x170/0x170 [ 1880.518671][ T4204] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 1880.524707][ T4204] ? dev_get_by_index+0x1e/0x2d0 [ 1880.529694][ T4204] ? dev_get_by_index+0x1e/0x2d0 [ 1880.534690][ T4204] packet_sendmsg+0x32b0/0x4e60 [ 1880.539603][ T4204] ? perf_trace_lock+0xf8/0x390 [ 1880.544503][ T4204] ? __might_sleep+0xd0/0xd0 [ 1880.549127][ T4204] ? trace_event_raw_event_lock+0x250/0x250 [ 1880.555060][ T4204] ? lock_acquire+0x225/0x4a0 [ 1880.559787][ T4204] ? aa_sk_perm+0x81f/0x950 [ 1880.564335][ T4204] ? packet_getsockopt+0x9a0/0x9a0 [ 1880.569510][ T4204] ? aa_sock_msg_perm+0x94/0x150 [ 1880.574497][ T4204] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1880.579821][ T4204] ? security_socket_sendmsg+0x7c/0xa0 [ 1880.585340][ T4204] ? packet_getsockopt+0x9a0/0x9a0 [ 1880.590502][ T4204] ____sys_sendmsg+0x5be/0x970 [ 1880.595317][ T4204] ? __sys_sendmsg_sock+0x30/0x30 [ 1880.600423][ T4204] ? __import_iovec+0x315/0x500 [ 1880.605396][ T4204] ? import_iovec+0x6f/0xa0 [ 1880.609944][ T4204] ___sys_sendmsg+0x2a2/0x360 [ 1880.614674][ T4204] ? __sys_sendmsg+0x290/0x290 [ 1880.619495][ T4204] ? __lock_acquire+0x7d10/0x7d10 [ 1880.624588][ T4204] __se_sys_sendmsg+0x1bb/0x2a0 [ 1880.629493][ T4204] ? __x64_sys_sendmsg+0x80/0x80 [ 1880.634493][ T4204] ? lockdep_hardirqs_on+0x94/0x140 [ 1880.639744][ T4204] do_syscall_64+0x4c/0xa0 [ 1880.644200][ T4204] ? clear_bhb_loop+0x60/0xb0 [ 1880.648929][ T4204] ? clear_bhb_loop+0x60/0xb0 [ 1880.653669][ T4204] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1880.659601][ T4204] RIP: 0033:0x7f09ed99acb9 [ 1880.664053][ T4204] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1880.683732][ T4204] RSP: 002b:00007f09ee79e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1880.692195][ T4204] RAX: ffffffffffffffda RBX: 00007f09edc15fa0 RCX: 00007f09ed99acb9 [ 1880.700207][ T4204] RDX: 0000000000044881 RSI: 00002000000000c0 RDI: 0000000000000003 [ 1880.708215][ T4204] RBP: 00007f09ee79e090 R08: 0000000000000000 R09: 0000000000000000 [ 1880.716234][ T4204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1880.724244][ T4204] R13: 00007f09edc16038 R14: 00007f09edc15fa0 R15: 00007fffd5f90758 [ 1880.732270][ T4204] [ 1880.870873][T24387] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1881.007700][T24387] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1881.159215][T24387] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1881.248072][ T4206] netlink: 60 bytes leftover after parsing attributes in process `syz.5.9140'. [ 1881.278188][ T4206] netlink: 60 bytes leftover after parsing attributes in process `syz.5.9140'. [ 1881.475014][ T4211] netlink: 60 bytes leftover after parsing attributes in process `syz.5.9140'. [ 1881.786831][ T4191] chnl_net:caif_netlink_parms(): no params data found [ 1882.118367][ T4229] netlink: 56 bytes leftover after parsing attributes in process `syz.5.9147'. [ 1882.194790][T23827] Bluetooth: hci3: command 0x0409 tx timeout [ 1882.392595][ T4232] netlink: 'syz.7.9146': attribute type 1 has an invalid length. [ 1882.427671][ T4232] netlink: 'syz.7.9146': attribute type 4 has an invalid length. [ 1882.466891][ T4232] netlink: 9462 bytes leftover after parsing attributes in process `syz.7.9146'. [ 1882.623309][ T4191] bridge0: port 1(bridge_slave_0) entered blocking state [ 1882.656064][ T4191] bridge0: port 1(bridge_slave_0) entered disabled state [ 1882.681754][ T4191] device bridge_slave_0 entered promiscuous mode [ 1882.734157][ T4241] netlink: 188 bytes leftover after parsing attributes in process `syz.6.9148'. [ 1882.894547][ T4191] bridge0: port 2(bridge_slave_1) entered blocking state [ 1882.901743][ T4191] bridge0: port 2(bridge_slave_1) entered disabled state [ 1882.963916][ T4191] device bridge_slave_1 entered promiscuous mode [ 1882.980407][ T4262] netlink: 44 bytes leftover after parsing attributes in process `syz.5.9152'. [ 1883.114902][ T4191] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1883.259410][ T4191] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1883.387574][ T4191] team0: Port device team_slave_0 added [ 1883.473420][ T4191] team0: Port device team_slave_1 added [ 1883.727535][ T4280] netlink: 'syz.9.9156': attribute type 7 has an invalid length. [ 1883.787728][ T4191] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1883.818064][ T4191] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1883.894312][ T4191] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1884.066286][ T4288] FAULT_INJECTION: forcing a failure. [ 1884.066286][ T4288] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1884.111779][ T4191] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1884.124399][ T4191] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1884.169019][ T4288] CPU: 0 PID: 4288 Comm: syz.5.9158 Not tainted syzkaller #0 [ 1884.176521][ T4288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1884.186662][ T4288] Call Trace: [ 1884.190019][ T4288] [ 1884.193029][ T4288] dump_stack_lvl+0x188/0x24e [ 1884.197820][ T4288] ? show_regs_print_info+0x12/0x12 [ 1884.203107][ T4288] ? load_image+0x400/0x400 [ 1884.207723][ T4288] ? __lock_acquire+0x7d10/0x7d10 [ 1884.212828][ T4288] ? __kmem_cache_alloc_node+0x140/0x260 [ 1884.218555][ T4288] ? __virt_addr_valid+0x188/0x540 [ 1884.223778][ T4288] should_fail_ex+0x399/0x4d0 [ 1884.228588][ T4288] _copy_from_user+0x2c/0x170 [ 1884.233374][ T4288] map_update_elem+0x454/0x680 [ 1884.238271][ T4288] __sys_bpf+0x4ec/0x780 [ 1884.242632][ T4288] ? bpf_link_show_fdinfo+0x380/0x380 [ 1884.248161][ T4288] ? lock_chain_count+0x20/0x20 [ 1884.253142][ T4288] __x64_sys_bpf+0x78/0x90 [ 1884.257657][ T4288] do_syscall_64+0x4c/0xa0 [ 1884.262153][ T4288] ? clear_bhb_loop+0x60/0xb0 [ 1884.266911][ T4288] ? clear_bhb_loop+0x60/0xb0 [ 1884.271695][ T4288] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1884.277677][ T4288] RIP: 0033:0x7f09ed99acb9 [ 1884.282180][ T4288] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1884.286317][T23827] Bluetooth: hci3: command 0x041b tx timeout [ 1884.301833][ T4288] RSP: 002b:00007f09ee79e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1884.301872][ T4288] RAX: ffffffffffffffda RBX: 00007f09edc15fa0 RCX: 00007f09ed99acb9 [ 1884.301895][ T4288] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000002 [ 1884.301915][ T4288] RBP: 00007f09ee79e090 R08: 0000000000000000 R09: 0000000000000000 [ 1884.301932][ T4288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1884.301950][ T4288] R13: 00007f09edc16038 R14: 00007f09edc15fa0 R15: 00007fffd5f90758 [ 1884.302032][ T4288] [ 1884.504317][ T4191] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1884.680032][ T4292] FAULT_INJECTION: forcing a failure. [ 1884.680032][ T4292] name failslab, interval 1, probability 0, space 0, times 0 [ 1884.710497][ T4292] CPU: 1 PID: 4292 Comm: syz.5.9160 Not tainted syzkaller #0 [ 1884.717970][ T4292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1884.728125][ T4292] Call Trace: [ 1884.731446][ T4292] [ 1884.734423][ T4292] dump_stack_lvl+0x188/0x24e [ 1884.739178][ T4292] ? show_regs_print_info+0x12/0x12 [ 1884.744446][ T4292] ? load_image+0x400/0x400 [ 1884.749017][ T4292] ? __might_sleep+0xd0/0xd0 [ 1884.753651][ T4292] ? __lock_acquire+0x7d10/0x7d10 [ 1884.758726][ T4292] ? __might_sleep+0xd0/0xd0 [ 1884.763353][ T4292] should_fail_ex+0x399/0x4d0 [ 1884.768080][ T4292] should_failslab+0x5/0x20 [ 1884.772648][ T4292] slab_pre_alloc_hook+0x59/0x310 [ 1884.777720][ T4292] kmem_cache_alloc_lru+0x49/0x2e0 [ 1884.782868][ T4292] ? sock_alloc_inode+0x24/0xc0 [ 1884.787756][ T4292] sock_alloc_inode+0x24/0xc0 [ 1884.792475][ T4292] ? sockfs_init_fs_context+0xa0/0xa0 [ 1884.797884][ T4292] new_inode_pseudo+0x5f/0x1c0 [ 1884.802780][ T4292] __sock_create+0x129/0x940 [ 1884.807430][ T4292] __sys_socketpair+0x232/0x540 [ 1884.812357][ T4292] __x64_sys_socketpair+0x97/0xb0 [ 1884.817434][ T4292] do_syscall_64+0x4c/0xa0 [ 1884.821886][ T4292] ? clear_bhb_loop+0x60/0xb0 [ 1884.826604][ T4292] ? clear_bhb_loop+0x60/0xb0 [ 1884.831320][ T4292] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1884.837251][ T4292] RIP: 0033:0x7f09ed99acb9 [ 1884.841698][ T4292] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1884.861339][ T4292] RSP: 002b:00007f09ee79e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1884.869789][ T4292] RAX: ffffffffffffffda RBX: 00007f09edc15fa0 RCX: 00007f09ed99acb9 [ 1884.877793][ T4292] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 1884.885790][ T4292] RBP: 00007f09ee79e090 R08: 0000000000000000 R09: 0000000000000000 [ 1884.893798][ T4292] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 1884.901797][ T4292] R13: 00007f09edc16038 R14: 00007f09edc15fa0 R15: 00007fffd5f90758 [ 1884.909826][ T4292] [ 1884.972604][ T4292] socket: no more sockets [ 1885.081372][T24387] team0: Port device wlan1 removed [ 1885.118696][ T4296] netlink: 56 bytes leftover after parsing attributes in process `syz.9.9161'. [ 1885.167737][ T4303] netlink: 44 bytes leftover after parsing attributes in process `syz.7.9164'. [ 1885.204652][ T4191] device hsr_slave_0 entered promiscuous mode [ 1885.212733][ T4191] device hsr_slave_1 entered promiscuous mode [ 1885.221349][ T4191] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1885.308988][ T4191] Cannot create hsr debugfs directory [ 1885.606118][ T4308] netlink: 188 bytes leftover after parsing attributes in process `syz.5.9163'. [ 1885.660870][T24387] device hsr_slave_0 left promiscuous mode [ 1885.697556][T24387] device hsr_slave_1 left promiscuous mode [ 1885.729588][T24387] device veth0_to_bridge left promiscuous mode [ 1885.754293][T24387] bridge0: port 3(veth0_to_bridge) entered disabled state [ 1885.784977][T24387] device bridge_slave_1 left promiscuous mode [ 1885.791336][T24387] bridge0: port 2(bridge_slave_1) entered disabled state [ 1885.838939][T24387] device bridge_slave_0 left promiscuous mode [ 1885.852730][T24387] bridge0: port 1(bridge_slave_0) entered disabled state [ 1886.223208][T24387] device veth1_macvtap left promiscuous mode [ 1886.229765][T24387] device veth0_macvtap left promiscuous mode [ 1886.247196][T24387] device veth1_vlan left promiscuous mode [ 1886.267231][T24387] device veth0_vlan left promiscuous mode [ 1886.408858][ T4330] netlink: 14 bytes leftover after parsing attributes in process `syz.6.9169'. [ 1886.435705][T23827] Bluetooth: hci3: command 0x040f tx timeout [ 1886.522163][ T4330] openvswitch: netlink: Message has 6 unknown bytes. [ 1888.026726][T24387] team0 (unregistering): Port device team_slave_1 removed [ 1888.119242][T24387] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1888.172801][T24387] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1888.495034][T24387] bond0 (unregistering): Released all slaves [ 1888.529216][T23827] Bluetooth: hci3: command 0x0419 tx timeout [ 1888.621591][ T4334] FAULT_INJECTION: forcing a failure. [ 1888.621591][ T4334] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1888.641096][ T4334] CPU: 0 PID: 4334 Comm: syz.7.9170 Not tainted syzkaller #0 [ 1888.648647][ T4334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1888.658853][ T4334] Call Trace: [ 1888.662173][ T4334] [ 1888.665154][ T4334] dump_stack_lvl+0x188/0x24e [ 1888.669899][ T4334] ? show_regs_print_info+0x12/0x12 [ 1888.675238][ T4334] ? load_image+0x400/0x400 [ 1888.679805][ T4334] ? __lock_acquire+0x7d10/0x7d10 [ 1888.684898][ T4334] ? __local_bh_enable_ip+0x136/0x1c0 [ 1888.690307][ T4334] should_fail_ex+0x399/0x4d0 [ 1888.695041][ T4334] _copy_from_user+0x2c/0x170 [ 1888.699756][ T4334] copy_from_sockptr+0x69/0x80 [ 1888.704558][ T4334] do_ip_setsockopt+0xfee/0x2ed0 [ 1888.709544][ T4334] ? ip_sock_set_pktinfo+0x60/0x60 [ 1888.714710][ T4334] ? aa_sk_perm+0x81f/0x950 [ 1888.719268][ T4334] ? aa_af_perm+0x340/0x340 [ 1888.723834][ T4334] ? __fget_files+0x43d/0x4b0 [ 1888.728575][ T4334] ? aa_sock_opt_perm+0x74/0x100 [ 1888.733552][ T4334] ip_setsockopt+0x5d/0x100 [ 1888.738099][ T4334] ? sock_common_recvmsg+0x190/0x190 [ 1888.743423][ T4334] __sys_setsockopt+0x2bf/0x3d0 [ 1888.748321][ T4334] __x64_sys_setsockopt+0xb1/0xc0 [ 1888.753392][ T4334] do_syscall_64+0x4c/0xa0 [ 1888.757934][ T4334] ? clear_bhb_loop+0x60/0xb0 [ 1888.762648][ T4334] ? clear_bhb_loop+0x60/0xb0 [ 1888.767360][ T4334] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1888.773287][ T4334] RIP: 0033:0x7f57a179acb9 [ 1888.777734][ T4334] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1888.797375][ T4334] RSP: 002b:00007f57a26de028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1888.805829][ T4334] RAX: ffffffffffffffda RBX: 00007f57a1a15fa0 RCX: 00007f57a179acb9 [ 1888.813836][ T4334] RDX: 0000000000000028 RSI: 0000000000000000 RDI: 0000000000000003 [ 1888.821856][ T4334] RBP: 00007f57a26de090 R08: 000000000000000c R09: 0000000000000000 [ 1888.829865][ T4334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1888.837862][ T4334] R13: 00007f57a1a16038 R14: 00007f57a1a15fa0 R15: 00007ffd1a5c9118 [ 1888.845879][ T4334] [ 1888.890433][ T4351] netlink: 'syz.5.9173': attribute type 21 has an invalid length. [ 1889.111515][ T4363] netlink: 44 bytes leftover after parsing attributes in process `syz.7.9175'. [ 1889.380885][ T4369] netlink: 56 bytes leftover after parsing attributes in process `syz.9.9178'. [ 1889.892172][ T4387] netlink: 65039 bytes leftover after parsing attributes in process `syz.7.9179'. [ 1889.911831][ T4385] netlink: 188 bytes leftover after parsing attributes in process `syz.6.9181'. [ 1890.366846][ T4400] netlink: 'syz.9.9183': attribute type 10 has an invalid length. [ 1890.407354][ T4400] bridge0: port 4(netdevsim0) entered blocking state [ 1890.464738][ T4400] bridge0: port 4(netdevsim0) entered disabled state [ 1890.493354][ T4400] device netdevsim0 entered promiscuous mode [ 1890.597454][ T4191] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 1890.644335][ T4191] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 1890.673844][ T4191] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 1890.715826][ T4191] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 1890.786398][ T4411] netlink: 40 bytes leftover after parsing attributes in process `syz.9.9186'. [ 1890.812329][ T4417] FAULT_INJECTION: forcing a failure. [ 1890.812329][ T4417] name failslab, interval 1, probability 0, space 0, times 0 [ 1890.827743][ T4417] CPU: 0 PID: 4417 Comm: syz.6.9187 Not tainted syzkaller #0 [ 1890.835192][ T4417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1890.845307][ T4417] Call Trace: [ 1890.848656][ T4417] [ 1890.851639][ T4417] dump_stack_lvl+0x188/0x24e [ 1890.856403][ T4417] ? show_regs_print_info+0x12/0x12 [ 1890.861660][ T4417] ? load_image+0x400/0x400 [ 1890.866315][ T4417] ? __lock_acquire+0x7d10/0x7d10 [ 1890.871409][ T4417] should_fail_ex+0x399/0x4d0 [ 1890.876234][ T4417] should_failslab+0x5/0x20 [ 1890.880797][ T4417] slab_pre_alloc_hook+0x59/0x310 [ 1890.885879][ T4417] kmem_cache_alloc+0x56/0x2f0 [ 1890.890696][ T4417] ? security_file_alloc+0x30/0x110 [ 1890.895970][ T4417] security_file_alloc+0x30/0x110 [ 1890.901073][ T4417] __alloc_file+0xc2/0x230 [ 1890.905651][ T4417] alloc_empty_file+0x90/0x180 [ 1890.910524][ T4417] alloc_file+0x5c/0x5f0 [ 1890.914840][ T4417] alloc_file_pseudo+0x180/0x200 [ 1890.919839][ T4417] ? alloc_empty_file_noaccount+0x80/0x80 [ 1890.925634][ T4417] ? unclone_ctx+0xca/0x120 [ 1890.930196][ T4417] anon_inode_getfile+0xc1/0x1a0 [ 1890.935202][ T4417] __se_sys_perf_event_open+0xc26/0x1ec0 [ 1890.940916][ T4417] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 1890.946645][ T4417] ? lockdep_hardirqs_on+0x94/0x140 [ 1890.951920][ T4417] ? __x64_sys_perf_event_open+0x1c/0xc0 [ 1890.957633][ T4417] do_syscall_64+0x4c/0xa0 [ 1890.962113][ T4417] ? clear_bhb_loop+0x60/0xb0 [ 1890.966854][ T4417] ? clear_bhb_loop+0x60/0xb0 [ 1890.971604][ T4417] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1890.977552][ T4417] RIP: 0033:0x7fb05e79acb9 [ 1890.982013][ T4417] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1891.001677][ T4417] RSP: 002b:00007fb05f745028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1891.010155][ T4417] RAX: ffffffffffffffda RBX: 00007fb05ea15fa0 RCX: 00007fb05e79acb9 [ 1891.018188][ T4417] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000000480 [ 1891.026237][ T4417] RBP: 00007fb05f745090 R08: 0000000000000008 R09: 0000000000000000 [ 1891.034256][ T4417] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1891.042283][ T4417] R13: 00007fb05ea16038 R14: 00007fb05ea15fa0 R15: 00007ffe64bf63a8 [ 1891.050340][ T4417] [ 1891.116887][ T4411] netlink: 'syz.9.9186': attribute type 21 has an invalid length. [ 1891.312453][ T4433] netlink: 44 bytes leftover after parsing attributes in process `syz.9.9189'. [ 1891.515514][ T4191] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1891.573200][ T4191] 8021q: adding VLAN 0 to HW filter on device team0 [ 1891.609457][T10577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1891.631688][T10577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1891.669811][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1891.692654][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1891.705192][ T4348] bridge0: port 1(bridge_slave_0) entered blocking state [ 1891.712395][ T4348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1891.726448][ T4437] FAULT_INJECTION: forcing a failure. [ 1891.726448][ T4437] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1891.742242][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1891.777187][ T4437] CPU: 0 PID: 4437 Comm: syz.6.9191 Not tainted syzkaller #0 [ 1891.784677][ T4437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1891.786570][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1891.794768][ T4437] Call Trace: [ 1891.794779][ T4437] [ 1891.794788][ T4437] dump_stack_lvl+0x188/0x24e [ 1891.794823][ T4437] ? show_regs_print_info+0x12/0x12 [ 1891.794849][ T4437] ? load_image+0x400/0x400 [ 1891.794873][ T4437] ? __lock_acquire+0x7d10/0x7d10 [ 1891.794902][ T4437] ? snprintf+0xe5/0x140 [ 1891.794923][ T4437] should_fail_ex+0x399/0x4d0 [ 1891.794977][ T4437] _copy_to_user+0x2c/0x130 [ 1891.842328][ T4437] simple_read_from_buffer+0xe3/0x150 [ 1891.847797][ T4437] proc_fail_nth_read+0x1a6/0x220 [ 1891.850876][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1891.852868][ T4437] ? proc_fault_inject_write+0x310/0x310 [ 1891.852902][ T4437] ? fsnotify_perm+0x248/0x550 [ 1891.871414][ T4437] ? proc_fault_inject_write+0x310/0x310 [ 1891.877114][ T4437] vfs_read+0x2de/0xa00 [ 1891.881352][ T4437] ? kernel_read+0x1e0/0x1e0 [ 1891.886004][ T4437] ? __fget_files+0x28/0x4b0 [ 1891.890654][ T4437] ? __fget_files+0x28/0x4b0 [ 1891.891278][ T4348] bridge0: port 2(bridge_slave_1) entered blocking state [ 1891.895287][ T4437] ? __fget_files+0x43d/0x4b0 [ 1891.895330][ T4437] ? __fdget_pos+0x2ae/0x360 [ 1891.895359][ T4437] ? ksys_read+0x71/0x250 [ 1891.902698][ T4348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1891.907201][ T4437] ksys_read+0x14c/0x250 [ 1891.907237][ T4437] ? vfs_write+0xa30/0xa30 [ 1891.932246][ T4437] ? lockdep_hardirqs_on+0x94/0x140 [ 1891.937536][ T4437] do_syscall_64+0x4c/0xa0 [ 1891.942021][ T4437] ? clear_bhb_loop+0x60/0xb0 [ 1891.946755][ T4437] ? clear_bhb_loop+0x60/0xb0 [ 1891.951496][ T4437] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1891.957447][ T4437] RIP: 0033:0x7fb05e75b58e [ 1891.961910][ T4437] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1891.981596][ T4437] RSP: 002b:00007fb05f744fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1891.990071][ T4437] RAX: ffffffffffffffda RBX: 00007fb05f7456c0 RCX: 00007fb05e75b58e [ 1891.998096][ T4437] RDX: 000000000000000f RSI: 00007fb05f7450a0 RDI: 0000000000000004 [ 1892.006108][ T4437] RBP: 00007fb05f745090 R08: 0000000000000000 R09: 0000000000000000 [ 1892.014113][ T4437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1892.022116][ T4437] R13: 00007fb05ea16038 R14: 00007fb05ea15fa0 R15: 00007ffe64bf63a8 [ 1892.030136][ T4437] [ 1892.044478][ T4445] netlink: 56 bytes leftover after parsing attributes in process `syz.7.9192'. [ 1892.079918][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1892.095409][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1892.112300][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1892.159843][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1892.269001][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1892.288616][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1892.315453][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1892.342673][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1892.413157][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1892.449506][ T4191] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1892.495862][ T4191] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1892.549727][ T4450] netlink: 188 bytes leftover after parsing attributes in process `syz.5.9194'. [ 1892.592186][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1892.617023][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1893.382297][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1893.419939][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1893.469922][ T4191] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1893.642289][ T4483] netlink: 44 bytes leftover after parsing attributes in process `syz.9.9202'. [ 1894.906570][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1894.926126][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1895.028356][T24387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1895.125772][T24387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1895.147269][ T4191] device veth0_vlan entered promiscuous mode [ 1895.168679][T24387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1895.185624][T24387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1895.238450][ T4191] device veth1_vlan entered promiscuous mode [ 1895.260105][ T4514] netlink: 56 bytes leftover after parsing attributes in process `syz.9.9207'. [ 1895.330820][ T4516] netlink: 188 bytes leftover after parsing attributes in process `syz.6.9206'. [ 1895.419411][ T4516] netlink: 188 bytes leftover after parsing attributes in process `syz.6.9206'. [ 1895.448268][ T4523] FAULT_INJECTION: forcing a failure. [ 1895.448268][ T4523] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1895.488611][ T4191] device veth0_macvtap entered promiscuous mode [ 1895.512990][ T4523] CPU: 1 PID: 4523 Comm: syz.5.9210 Not tainted syzkaller #0 [ 1895.520467][ T4523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1895.530565][ T4523] Call Trace: [ 1895.533881][ T4523] [ 1895.536840][ T4523] dump_stack_lvl+0x188/0x24e [ 1895.541571][ T4523] ? show_regs_print_info+0x12/0x12 [ 1895.546802][ T4523] ? load_image+0x400/0x400 [ 1895.551342][ T4523] ? __lock_acquire+0x7d10/0x7d10 [ 1895.556439][ T4523] ? __kmem_cache_alloc_node+0x140/0x260 [ 1895.562110][ T4523] ? __virt_addr_valid+0x188/0x540 [ 1895.567261][ T4523] should_fail_ex+0x399/0x4d0 [ 1895.571991][ T4523] _copy_from_user+0x2c/0x170 [ 1895.576702][ T4523] map_update_elem+0x454/0x680 [ 1895.581508][ T4523] __sys_bpf+0x4ec/0x780 [ 1895.585880][ T4523] ? bpf_link_show_fdinfo+0x380/0x380 [ 1895.591350][ T4523] ? lock_chain_count+0x20/0x20 [ 1895.596274][ T4523] __x64_sys_bpf+0x78/0x90 [ 1895.600762][ T4523] do_syscall_64+0x4c/0xa0 [ 1895.605234][ T4523] ? clear_bhb_loop+0x60/0xb0 [ 1895.609967][ T4523] ? clear_bhb_loop+0x60/0xb0 [ 1895.614687][ T4523] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1895.620622][ T4523] RIP: 0033:0x7f09ed99acb9 [ 1895.625071][ T4523] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1895.644707][ T4523] RSP: 002b:00007f09ee79e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1895.653169][ T4523] RAX: ffffffffffffffda RBX: 00007f09edc15fa0 RCX: 00007f09ed99acb9 [ 1895.661193][ T4523] RDX: 0000000000000020 RSI: 0000200000001100 RDI: 0000000000000002 [ 1895.669214][ T4523] RBP: 00007f09ee79e090 R08: 0000000000000000 R09: 0000000000000000 [ 1895.677230][ T4523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1895.685250][ T4523] R13: 00007f09edc16038 R14: 00007f09edc15fa0 R15: 00007fffd5f90758 [ 1895.693297][ T4523] [ 1895.712770][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1895.723347][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1895.736881][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1895.785032][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1895.817562][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1895.832534][ T4525] netlink: 188 bytes leftover after parsing attributes in process `syz.7.9209'. [ 1895.859024][ T4191] device veth1_macvtap entered promiscuous mode [ 1895.895165][ T4191] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1896.004591][ T4191] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1896.057257][ T4191] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1896.088506][ T4191] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1896.130048][ T4191] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1896.167604][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1896.184773][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1896.216099][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1896.282049][ T4191] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1896.308472][ T4191] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1896.328882][ T4538] netlink: 44 bytes leftover after parsing attributes in process `syz.5.9213'. [ 1896.350780][ T4191] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1896.418972][ T4191] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1896.485948][ T4191] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1896.513774][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1896.592005][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1896.626370][ T4191] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1896.659794][ T4191] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1896.680255][ T4191] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1896.697435][ T4191] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1896.917485][T10554] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1896.936519][T10554] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1897.002180][ T4348] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1897.010853][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1897.029257][ T4348] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1897.058302][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1897.548048][ T4557] netlink: 'syz.9.9219': attribute type 21 has an invalid length. [ 1897.727186][ T4572] netlink: 56 bytes leftover after parsing attributes in process `syz.5.9221'. [ 1898.329204][ T4589] netlink: 44 bytes leftover after parsing attributes in process `syz.8.9226'. [ 1898.536836][ T4586] netlink: 188 bytes leftover after parsing attributes in process `syz.7.9224'. [ 1899.105931][T23827] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1899.119940][T23827] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1899.128684][T23827] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1899.138644][T23827] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1899.160794][T23827] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1899.169948][T23827] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1899.313612][ T1111] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1899.333731][ T4617] FAULT_INJECTION: forcing a failure. [ 1899.333731][ T4617] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1899.410061][ T4617] CPU: 1 PID: 4617 Comm: syz.8.9231 Not tainted syzkaller #0 [ 1899.417532][ T4617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1899.427639][ T4617] Call Trace: [ 1899.430967][ T4617] [ 1899.433952][ T4617] dump_stack_lvl+0x188/0x24e [ 1899.438698][ T4617] ? show_regs_print_info+0x12/0x12 [ 1899.443961][ T4617] ? load_image+0x400/0x400 [ 1899.448520][ T4617] ? __might_fault+0xa6/0x120 [ 1899.453265][ T4617] should_fail_ex+0x399/0x4d0 [ 1899.458053][ T4617] copyin+0x1b/0x120 [ 1899.462125][ T4617] _copy_from_iter+0x447/0x1130 [ 1899.467086][ T4617] ? copyout_mc+0x110/0x110 [ 1899.471651][ T4617] ? __virt_addr_valid+0x188/0x540 [ 1899.476826][ T4617] ? __virt_addr_valid+0x188/0x540 [ 1899.482007][ T4617] ? __virt_addr_valid+0x465/0x540 [ 1899.487184][ T4617] ? __check_object_size+0x500/0xa40 [ 1899.492529][ T4617] netlink_sendmsg+0x755/0xbd0 [ 1899.497372][ T4617] ? netlink_getsockopt+0x550/0x550 [ 1899.502638][ T4617] ? aa_sock_msg_perm+0x94/0x150 [ 1899.507632][ T4617] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1899.513079][ T4617] ? security_socket_sendmsg+0x7c/0xa0 [ 1899.518603][ T4617] ? netlink_getsockopt+0x550/0x550 [ 1899.523854][ T4617] ____sys_sendmsg+0x5be/0x970 [ 1899.528686][ T4617] ? __sys_sendmsg_sock+0x30/0x30 [ 1899.533758][ T4617] ? __import_iovec+0x315/0x500 [ 1899.538661][ T4617] ? import_iovec+0x6f/0xa0 [ 1899.543215][ T4617] ___sys_sendmsg+0x2a2/0x360 [ 1899.547955][ T4617] ? __sys_sendmsg+0x290/0x290 [ 1899.552797][ T4617] ? __lock_acquire+0x7d10/0x7d10 [ 1899.557905][ T4617] __se_sys_sendmsg+0x1bb/0x2a0 [ 1899.562833][ T4617] ? __x64_sys_sendmsg+0x80/0x80 [ 1899.567900][ T4617] ? lockdep_hardirqs_on+0x94/0x140 [ 1899.573602][ T4617] do_syscall_64+0x4c/0xa0 [ 1899.578074][ T4617] ? clear_bhb_loop+0x60/0xb0 [ 1899.582813][ T4617] ? clear_bhb_loop+0x60/0xb0 [ 1899.587541][ T4617] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1899.593495][ T4617] RIP: 0033:0x7f90d6b9acb9 [ 1899.597961][ T4617] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1899.617608][ T4617] RSP: 002b:00007f90d7a4d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1899.626077][ T4617] RAX: ffffffffffffffda RBX: 00007f90d6e16090 RCX: 00007f90d6b9acb9 [ 1899.634093][ T4617] RDX: 0000000000008000 RSI: 0000200000000600 RDI: 0000000000000005 [ 1899.642111][ T4617] RBP: 00007f90d7a4d090 R08: 0000000000000000 R09: 0000000000000000 [ 1899.650125][ T4617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1899.658134][ T4617] R13: 00007f90d6e16128 R14: 00007f90d6e16090 R15: 00007ffe0bac41f8 [ 1899.666171][ T4617] [ 1899.881092][ T1111] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1900.066903][ T4629] netlink: 56 bytes leftover after parsing attributes in process `syz.9.9236'. [ 1900.151077][ T1111] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1900.350602][ T1111] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1900.509407][ T4640] netlink: 14975 bytes leftover after parsing attributes in process `syz.7.9238'. [ 1900.661217][ T4606] chnl_net:caif_netlink_parms(): no params data found [ 1900.858575][ T4652] netlink: 44 bytes leftover after parsing attributes in process `syz.9.9240'. [ 1900.878697][ T4649] netlink: 188 bytes leftover after parsing attributes in process `syz.8.9239'. [ 1901.189135][ T4660] netlink: 'syz.7.9241': attribute type 10 has an invalid length. [ 1901.234683][ T3379] Bluetooth: hci4: command 0x0409 tx timeout [ 1901.457608][ T4606] bridge0: port 1(bridge_slave_0) entered blocking state [ 1901.473821][ T4606] bridge0: port 1(bridge_slave_0) entered disabled state [ 1901.482714][ T4606] device bridge_slave_0 entered promiscuous mode [ 1901.644521][ T4606] bridge0: port 2(bridge_slave_1) entered blocking state [ 1901.658337][ T4606] bridge0: port 2(bridge_slave_1) entered disabled state [ 1901.685785][ T4606] device bridge_slave_1 entered promiscuous mode [ 1901.751734][ T4671] netlink: 'syz.9.9244': attribute type 10 has an invalid length. [ 1901.852969][ T4671] bridge0: port 4(netdevsim0) entered disabled state [ 1902.343165][ T4672] netlink: 'syz.5.9243': attribute type 10 has an invalid length. [ 1902.400828][ T4672] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 1902.526672][ T4606] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1902.665091][ T4606] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1902.961557][ T4606] team0: Port device team_slave_0 added [ 1903.033475][ T4606] team0: Port device team_slave_1 added [ 1903.181230][ T4606] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1903.194250][ T4606] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1903.304474][ T4606] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1903.324577][ T3379] Bluetooth: hci4: command 0x041b tx timeout [ 1903.406931][ T4710] netlink: 56 bytes leftover after parsing attributes in process `syz.9.9251'. [ 1903.461381][ T4606] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1903.477991][ T4606] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1903.534122][ T4606] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1903.724989][ T4606] device hsr_slave_0 entered promiscuous mode [ 1903.733779][ T4606] device hsr_slave_1 entered promiscuous mode [ 1903.756083][ T4606] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1903.763899][ T4606] Cannot create hsr debugfs directory [ 1904.047499][ T4727] netlink: 44 bytes leftover after parsing attributes in process `syz.9.9255'. [ 1904.153517][ T4729] netlink: 168864 bytes leftover after parsing attributes in process `syz.5.9256'. [ 1904.211024][ T4729] netlink: zone id is out of range [ 1904.211577][ T1111] team0: Port device wlan1 removed [ 1904.306928][ T4729] netlink: zone id is out of range [ 1904.312463][ T4729] netlink: zone id is out of range [ 1904.318633][ T4729] netlink: zone id is out of range [ 1904.323921][ T4729] netlink: zone id is out of range [ 1904.337221][ T4729] netlink: zone id is out of range [ 1904.342821][ T4729] netlink: zone id is out of range [ 1904.353941][ T4729] netlink: zone id is out of range [ 1904.363229][ T4729] netlink: zone id is out of range [ 1904.406101][ T4725] bond0: (slave dummy0): Error: Slave device does not support XDP [ 1904.444351][ T4729] netlink: zone id is out of range [ 1904.448115][ T4728] netlink: 188 bytes leftover after parsing attributes in process `syz.7.9254'. [ 1905.233366][ T1111] device hsr_slave_0 left promiscuous mode [ 1905.253224][ T1111] device hsr_slave_1 left promiscuous mode [ 1905.265924][ T1111] device veth0_to_bridge left promiscuous mode [ 1905.291690][ T1111] bridge0: port 3(veth0_to_bridge) entered disabled state [ 1905.311012][ T1111] device bridge_slave_1 left promiscuous mode [ 1905.325495][ T1111] bridge0: port 2(bridge_slave_1) entered disabled state [ 1905.343298][ T1111] device bridge_slave_0 left promiscuous mode [ 1905.358345][ T1111] bridge0: port 1(bridge_slave_0) entered disabled state [ 1905.394355][ T3379] Bluetooth: hci4: command 0x040f tx timeout [ 1905.452881][ T1111] device veth1_macvtap left promiscuous mode [ 1905.468481][ T1111] device veth0_macvtap left promiscuous mode [ 1905.494596][ T1111] device veth1_vlan left promiscuous mode [ 1905.518846][ T1111] device veth0_vlan left promiscuous mode [ 1906.310404][ T1111] team0 (unregistering): Port device team_slave_1 removed [ 1906.399449][ T1111] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1906.450975][ T1111] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1906.855323][ T1111] bond0 (unregistering): Released all slaves [ 1906.967267][ T4752] netlink: 'syz.7.9262': attribute type 10 has an invalid length. [ 1907.003226][ T4759] netlink: 56 bytes leftover after parsing attributes in process `syz.9.9265'. [ 1907.485650][ T3379] Bluetooth: hci4: command 0x0419 tx timeout [ 1907.567225][ T4784] netlink: 44 bytes leftover after parsing attributes in process `syz.9.9269'. [ 1907.729149][ T4606] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 1907.739887][ T4606] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 1907.793206][ T4606] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 1907.836112][ T4606] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 1908.031524][ T4786] netlink: 188 bytes leftover after parsing attributes in process `syz.5.9271'. [ 1908.254436][ T4807] netlink: 174904 bytes leftover after parsing attributes in process `syz.8.9273'. [ 1908.348550][ T4606] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1908.401867][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1908.436916][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1908.457034][ T4606] 8021q: adding VLAN 0 to HW filter on device team0 [ 1908.469823][ T4812] FAULT_INJECTION: forcing a failure. [ 1908.469823][ T4812] name failslab, interval 1, probability 0, space 0, times 0 [ 1908.501854][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1908.516362][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1908.527004][ T4812] CPU: 0 PID: 4812 Comm: syz.5.9274 Not tainted syzkaller #0 [ 1908.534479][ T4812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1908.544577][ T4812] Call Trace: [ 1908.547885][ T4812] [ 1908.550844][ T4812] dump_stack_lvl+0x188/0x24e [ 1908.555565][ T4812] ? show_regs_print_info+0x12/0x12 [ 1908.560812][ T4812] ? load_image+0x400/0x400 [ 1908.565354][ T4812] ? __might_sleep+0xd0/0xd0 [ 1908.569978][ T4812] ? __lock_acquire+0x7d10/0x7d10 [ 1908.575043][ T4812] should_fail_ex+0x399/0x4d0 [ 1908.579772][ T4812] should_failslab+0x5/0x20 [ 1908.584320][ T4812] slab_pre_alloc_hook+0x59/0x310 [ 1908.589394][ T4812] ? apparmor_sk_alloc_security+0x74/0x100 [ 1908.595249][ T4812] __kmem_cache_alloc_node+0x4f/0x260 [ 1908.600656][ T4812] ? apparmor_sk_alloc_security+0x74/0x100 [ 1908.606505][ T4812] kmalloc_trace+0x26/0xe0 [ 1908.610993][ T4812] apparmor_sk_alloc_security+0x74/0x100 [ 1908.616709][ T4812] security_sk_alloc+0x6a/0xa0 [ 1908.621542][ T4812] sk_prot_alloc+0x101/0x210 [ 1908.626169][ T4812] ? sk_alloc+0x20/0x340 [ 1908.630456][ T4812] sk_alloc+0x36/0x340 [ 1908.634563][ T4812] ? bpf_ctx_init+0x163/0x1a0 [ 1908.639270][ T4812] ? bpf_prog_test_run_skb+0x26f/0x12a0 [ 1908.644857][ T4812] bpf_prog_test_run_skb+0x35e/0x12a0 [ 1908.650261][ T4812] ? lockdep_hardirqs_on+0x94/0x140 [ 1908.655502][ T4812] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 1908.661967][ T4812] ? cpu_online+0xa0/0xa0 [ 1908.666328][ T4812] bpf_prog_test_run+0x31e/0x390 [ 1908.671313][ T4812] __sys_bpf+0x62b/0x780 [ 1908.675594][ T4812] ? bpf_link_show_fdinfo+0x380/0x380 [ 1908.681023][ T4812] ? lock_chain_count+0x20/0x20 [ 1908.685915][ T4812] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 1908.691942][ T4812] __x64_sys_bpf+0x78/0x90 [ 1908.696398][ T4812] do_syscall_64+0x4c/0xa0 [ 1908.700847][ T4812] ? clear_bhb_loop+0x60/0xb0 [ 1908.705556][ T4812] ? clear_bhb_loop+0x60/0xb0 [ 1908.710265][ T4812] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1908.716190][ T4812] RIP: 0033:0x7f09ed99acb9 [ 1908.720636][ T4812] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1908.740274][ T4812] RSP: 002b:00007f09ee79e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1908.748734][ T4812] RAX: ffffffffffffffda RBX: 00007f09edc15fa0 RCX: 00007f09ed99acb9 [ 1908.756738][ T4812] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 1908.764736][ T4812] RBP: 00007f09ee79e090 R08: 0000000000000000 R09: 0000000000000000 [ 1908.772733][ T4812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1908.780736][ T4812] R13: 00007f09edc16038 R14: 00007f09edc15fa0 R15: 00007fffd5f90758 [ 1908.788752][ T4812] [ 1908.829057][T10554] bridge0: port 1(bridge_slave_0) entered blocking state [ 1908.836384][T10554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1908.862452][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1908.890069][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1908.921929][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1908.937721][T10554] bridge0: port 2(bridge_slave_1) entered blocking state [ 1908.945022][T10554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1908.960380][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1908.989031][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1909.008650][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1909.033133][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1909.050960][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1909.071646][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1909.087257][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1909.106920][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1909.124646][T10554] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1909.148720][ T4606] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1909.188447][ T4606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1909.210804][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1909.234803][ T5888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1909.380206][ T4831] netlink: 56 bytes leftover after parsing attributes in process `syz.8.9279'. [ 1910.062710][ T4851] netlink: 188 bytes leftover after parsing attributes in process `syz.5.9284'. [ 1910.362139][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1910.373433][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1910.427890][ T4606] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1911.741303][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1911.752001][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1911.795351][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1911.810737][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1911.822476][ T4606] device veth0_vlan entered promiscuous mode [ 1911.836124][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1911.851154][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1911.873866][ T4606] device veth1_vlan entered promiscuous mode [ 1911.920821][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1911.933808][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1911.948749][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1911.973394][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1911.989601][ T4606] device veth0_macvtap entered promiscuous mode [ 1912.009545][ T4606] device veth1_macvtap entered promiscuous mode [ 1912.056033][ T4606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1912.066970][ T4606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1912.078364][ T4606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1912.089579][ T4606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1912.102725][ T4606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1912.113732][ T4606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1912.130084][ T4606] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1912.138487][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1912.150818][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1912.160026][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1912.169461][ T1111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1912.181019][ T4606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1912.192053][ T4606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1912.203556][ T4606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1912.214313][ T4606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1912.224244][ T4606] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1912.235630][ T4606] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1912.256127][ T4606] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1912.264505][T31549] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1912.276647][T31549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1912.315557][ T4606] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1912.334238][ T4606] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1912.371275][ T4606] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1912.424292][ T4606] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1912.661194][ T4908] netlink: 188 bytes leftover after parsing attributes in process `syz.9.9301'. [ 1912.684790][T24387] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1912.711383][T24387] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1912.815594][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1912.875783][ T4348] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1912.928233][ T4348] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1912.973263][T24387] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1913.279847][ T4921] FAULT_INJECTION: forcing a failure. [ 1913.279847][ T4921] name failslab, interval 1, probability 0, space 0, times 0 [ 1913.344564][ T4921] CPU: 0 PID: 4921 Comm: syz.6.9222 Not tainted syzkaller #0 [ 1913.352080][ T4921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1913.362223][ T4921] Call Trace: [ 1913.365573][ T4921] [ 1913.368578][ T4921] dump_stack_lvl+0x188/0x24e [ 1913.373364][ T4921] ? show_regs_print_info+0x12/0x12 [ 1913.378659][ T4921] ? load_image+0x400/0x400 [ 1913.383259][ T4921] ? __local_bh_enable_ip+0x136/0x1c0 [ 1913.388723][ T4921] ? lockdep_hardirqs_on+0x94/0x140 [ 1913.394013][ T4921] ? __local_bh_enable_ip+0x136/0x1c0 [ 1913.399456][ T4921] should_fail_ex+0x399/0x4d0 [ 1913.404282][ T4921] should_failslab+0x5/0x20 [ 1913.408875][ T4921] slab_pre_alloc_hook+0x59/0x310 [ 1913.413959][ T4921] ? sctp_get_port_local+0xd75/0x1510 [ 1913.419416][ T4921] ? sctp_add_bind_addr+0x89/0x350 [ 1913.424616][ T4921] __kmem_cache_alloc_node+0x4f/0x260 [ 1913.430075][ T4921] ? sctp_add_bind_addr+0x89/0x350 [ 1913.435264][ T4921] kmalloc_trace+0x26/0xe0 [ 1913.439767][ T4921] sctp_add_bind_addr+0x89/0x350 [ 1913.444795][ T4921] sctp_do_bind+0x616/0x990 [ 1913.449402][ T4921] sctp_connect_new_asoc+0x266/0x6a0 [ 1913.454781][ T4921] ? __sctp_connect+0xd80/0xd80 [ 1913.459700][ T4921] ? __local_bh_enable_ip+0x136/0x1c0 [ 1913.465164][ T4921] ? bpf_lsm_sctp_bind_connect+0x5/0x10 [ 1913.470779][ T4921] ? security_sctp_bind_connect+0x85/0xb0 [ 1913.476583][ T4921] sctp_sendmsg+0x15b0/0x2940 [ 1913.481382][ T4921] ? trace_event_raw_event_lock+0x250/0x250 [ 1913.487399][ T4921] ? aa_sk_perm+0x7e1/0x950 [ 1913.491973][ T4921] ? sctp_getsockopt+0x8a0/0x8a0 [ 1913.496983][ T4921] ? __might_fault+0xa6/0x120 [ 1913.501717][ T4921] ? aa_af_perm+0x340/0x340 [ 1913.506272][ T4921] ? tomoyo_socket_sendmsg_permission+0x1dd/0x2f0 [ 1913.512777][ T4921] ? inet_sendmsg+0xe5/0x2f0 [ 1913.517447][ T4921] ? inet_send_prepare+0x260/0x260 [ 1913.522632][ T4921] ____sys_sendmsg+0x5be/0x970 [ 1913.527500][ T4921] ? __sys_sendmsg_sock+0x30/0x30 [ 1913.532596][ T4921] ? __import_iovec+0x315/0x500 [ 1913.537540][ T4921] ? import_iovec+0x6f/0xa0 [ 1913.542117][ T4921] ___sys_sendmsg+0x2a2/0x360 [ 1913.546892][ T4921] ? __sys_sendmsg+0x290/0x290 [ 1913.551786][ T4921] ? __lock_acquire+0x7d10/0x7d10 [ 1913.556982][ T4921] __se_sys_sendmsg+0x1bb/0x2a0 [ 1913.561955][ T4921] ? __x64_sys_sendmsg+0x80/0x80 [ 1913.567019][ T4921] ? lockdep_hardirqs_on+0x94/0x140 [ 1913.572307][ T4921] do_syscall_64+0x4c/0xa0 [ 1913.576792][ T4921] ? clear_bhb_loop+0x60/0xb0 [ 1913.581533][ T4921] ? clear_bhb_loop+0x60/0xb0 [ 1913.586294][ T4921] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1913.592256][ T4921] RIP: 0033:0x7f4cb159acb9 [ 1913.596749][ T4921] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1913.616693][ T4921] RSP: 002b:00007f4cb2475028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1913.625431][ T4921] RAX: ffffffffffffffda RBX: 00007f4cb1815fa0 RCX: 00007f4cb159acb9 [ 1913.633467][ T4921] RDX: 00000000000000c9 RSI: 0000200000002dc0 RDI: 0000000000000003 [ 1913.641584][ T4921] RBP: 00007f4cb2475090 R08: 0000000000000000 R09: 0000000000000000 [ 1913.649621][ T4921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1913.657732][ T4921] R13: 00007f4cb1816038 R14: 00007f4cb1815fa0 R15: 00007ffc0a171ab8 [ 1913.665804][ T4921] [ 1913.832186][ T4922] delete_channel: no stack [ 1914.521896][ T1269] ieee802154 phy0 wpan0: encryption failed: -22 [ 1914.528343][ T1269] ieee802154 phy1 wpan1: encryption failed: -22 [ 1914.968589][T24276] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 1914.978911][T24276] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 1914.987513][T24276] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 1914.999531][T24276] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 1915.007728][T24276] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 1915.022410][T24276] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 1915.064453][ T4943] netlink: 'syz.8.9313': attribute type 39 has an invalid length. [ 1915.087275][ T4947] FAULT_INJECTION: forcing a failure. [ 1915.087275][ T4947] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1915.106648][ T4943] device veth0_macvtap left promiscuous mode [ 1915.190487][ T4947] CPU: 1 PID: 4947 Comm: syz.5.9314 Not tainted syzkaller #0 [ 1915.197974][ T4947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1915.208085][ T4947] Call Trace: [ 1915.211416][ T4947] [ 1915.214390][ T4947] dump_stack_lvl+0x188/0x24e [ 1915.219136][ T4947] ? show_regs_print_info+0x12/0x12 [ 1915.224400][ T4947] ? load_image+0x400/0x400 [ 1915.228967][ T4947] ? __lock_acquire+0x7d10/0x7d10 [ 1915.234069][ T4947] should_fail_ex+0x399/0x4d0 [ 1915.238817][ T4947] _copy_from_user+0x2c/0x170 [ 1915.243542][ T4947] ___sys_sendmsg+0x1c3/0x360 [ 1915.248263][ T4947] ? __sys_sendmsg+0x290/0x290 [ 1915.253079][ T4947] ? __lock_acquire+0x7d10/0x7d10 [ 1915.258162][ T4947] __se_sys_sendmsg+0x1bb/0x2a0 [ 1915.263056][ T4947] ? ct_nmi_exit+0x145/0x1c0 [ 1915.267688][ T4947] ? __x64_sys_sendmsg+0x80/0x80 [ 1915.272687][ T4947] ? lockdep_hardirqs_on+0x94/0x140 [ 1915.277948][ T4947] do_syscall_64+0x4c/0xa0 [ 1915.282403][ T4947] ? clear_bhb_loop+0x60/0xb0 [ 1915.287116][ T4947] ? clear_bhb_loop+0x60/0xb0 [ 1915.291826][ T4947] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1915.297771][ T4947] RIP: 0033:0x7f09ed99acb9 [ 1915.302224][ T4947] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1915.321867][ T4947] RSP: 002b:00007f09ee79e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1915.330348][ T4947] RAX: ffffffffffffffda RBX: 00007f09edc15fa0 RCX: 00007f09ed99acb9 [ 1915.338361][ T4947] RDX: 0000000004004000 RSI: 0000200000000000 RDI: 0000000000000009 [ 1915.346384][ T4947] RBP: 00007f09ee79e090 R08: 0000000000000000 R09: 0000000000000000 [ 1915.354422][ T4947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1915.362433][ T4947] R13: 00007f09edc16038 R14: 00007f09edc15fa0 R15: 00007fffd5f90758 [ 1915.370448][ T4947] [ 1915.587282][ T1111] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1915.765265][ T1111] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1915.965601][ T1111] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1916.023573][ T4961] netlink: 188 bytes leftover after parsing attributes in process `syz.7.9317'. [ 1916.426333][ T1111] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1916.600115][ T4944] chnl_net:caif_netlink_parms(): no params data found [ 1917.074721][T24276] Bluetooth: hci1: command 0x0409 tx timeout [ 1917.457510][ T4944] bridge0: port 1(bridge_slave_0) entered blocking state [ 1917.494014][ T4944] bridge0: port 1(bridge_slave_0) entered disabled state [ 1917.535804][ T4944] device bridge_slave_0 entered promiscuous mode [ 1917.546090][ T5006] netlink: 188 bytes leftover after parsing attributes in process `syz.8.9326'. [ 1917.644776][ T4944] bridge0: port 2(bridge_slave_1) entered blocking state [ 1917.654408][ T4944] bridge0: port 2(bridge_slave_1) entered disabled state [ 1917.687424][ T4944] device bridge_slave_1 entered promiscuous mode [ 1917.863989][ T4944] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1917.888482][ T4944] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1918.133718][ T4944] team0: Port device team_slave_0 added [ 1918.263385][ T4944] team0: Port device team_slave_1 added [ 1919.154572][T24276] Bluetooth: hci1: command 0x041b tx timeout [ 1920.616930][ T5020] netlink: 14975 bytes leftover after parsing attributes in process `syz.7.9329'. [ 1920.680078][ T5047] netlink: 188 bytes leftover after parsing attributes in process `syz.6.9334'. [ 1920.818984][ T4944] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1920.840881][ T4944] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1921.081166][ T4944] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1921.234697][T24276] Bluetooth: hci1: command 0x040f tx timeout [ 1921.381759][ T4944] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1921.408638][ T4944] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1921.468950][ T4944] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1921.710822][ T4944] device hsr_slave_0 entered promiscuous mode [ 1921.725156][ T4944] device hsr_slave_1 entered promiscuous mode [ 1921.742098][ T4944] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1921.793633][ T4944] Cannot create hsr debugfs directory [ 1921.818050][ T5076] netlink: 188 bytes leftover after parsing attributes in process `syz.6.9347'. [ 1922.120899][ T1111] team0: Port device wlan1 removed [ 1922.953041][ T1111] device hsr_slave_0 left promiscuous mode [ 1923.049654][ T1111] device hsr_slave_1 left promiscuous mode [ 1923.167231][ T1111] device veth0_to_bridge left promiscuous mode [ 1923.173631][ T1111] bridge0: port 3(veth0_to_bridge) entered disabled state [ 1923.201183][ T1111] device bridge_slave_1 left promiscuous mode [ 1923.228605][ T1111] bridge0: port 2(bridge_slave_1) entered disabled state [ 1923.285474][ T1111] device bridge_slave_0 left promiscuous mode [ 1923.311988][ T1111] bridge0: port 1(bridge_slave_0) entered disabled state [ 1923.315326][T24276] Bluetooth: hci1: command 0x0419 tx timeout [ 1925.150799][ T1111] device veth1_macvtap left promiscuous mode [ 1925.164180][ T1111] device veth0_macvtap left promiscuous mode [ 1925.180847][ T1111] device veth1_vlan left promiscuous mode [ 1925.196654][ T1111] device veth0_vlan left promiscuous mode [ 1927.917706][ T1111] team0 (unregistering): Port device team_slave_1 removed [ 1927.998465][ T1111] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1928.047104][ T1111] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1928.398652][ T1111] bond0 (unregistering): Released all slaves [ 1928.516425][ T5118] netlink: 14975 bytes leftover after parsing attributes in process `syz.6.9345'. [ 1928.525886][ T5106] netlink: 188 bytes leftover after parsing attributes in process `syz.7.9343'. [ 1929.671573][ T5156] netlink: 188 bytes leftover after parsing attributes in process `syz.7.9352'. [ 1929.842503][ T4944] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 1929.871929][ T4944] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 1929.919980][ T4944] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 1929.931015][ T4944] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 1930.200276][ T4944] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1930.248776][T24387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1930.326559][T24387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1930.407847][ T4944] 8021q: adding VLAN 0 to HW filter on device team0 [ 1930.528527][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1930.546100][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1930.567887][ T4348] bridge0: port 1(bridge_slave_0) entered blocking state [ 1930.575143][ T4348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1930.665857][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1930.675081][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1930.703361][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1930.750004][ T4348] bridge0: port 2(bridge_slave_1) entered blocking state [ 1930.757283][ T4348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1930.785303][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1930.846219][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1930.956894][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1930.984767][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1930.994922][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1931.056098][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1931.096413][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1931.140639][ T4944] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1931.153688][ T4944] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1931.201513][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1931.223670][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1931.243004][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1931.253763][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1931.272212][ T4348] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1931.798487][T24387] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1931.840568][T24387] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1931.933225][ T4944] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1932.591749][ T5235] netlink: 188 bytes leftover after parsing attributes in process `syz.6.9365'. [ 1932.831729][ T5232] netlink: 188 bytes leftover after parsing attributes in process `syz.7.9367'. [ 1933.205727][ T5254] netlink: 14975 bytes leftover after parsing attributes in process `syz.8.9368'. [ 1933.501310][ T5260] netlink: 188 bytes leftover after parsing attributes in process `syz.7.9381'. [ 1933.601615][T10577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1933.641378][T10577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1933.752666][T24387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1933.770560][T24387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1933.814513][T24387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1933.835876][T24387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1933.849847][ T4944] device veth0_vlan entered promiscuous mode [ 1933.883171][ T4944] device veth1_vlan entered promiscuous mode [ 1933.967184][T31549] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1933.991262][T31549] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1934.015738][T31549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1934.036931][T31549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1934.057774][ T4944] device veth0_macvtap entered promiscuous mode [ 1934.093802][ T4944] device veth1_macvtap entered promiscuous mode [ 1934.158788][ T4944] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1934.212000][ T4944] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1934.222373][ T4944] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1934.239549][ T4944] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1934.249637][ T4944] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1934.281544][ T4944] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1934.295368][ T4944] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1934.324354][ T4944] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1934.346213][ T4944] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1934.358844][T31549] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1934.368572][T31549] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1934.401710][T31549] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1934.412954][T31549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1934.430524][ T4944] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1934.445115][ T4944] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1934.464153][ T4944] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1934.484065][ T4944] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1934.524539][ T4944] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1934.558465][ T4944] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1934.576159][ T4944] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1934.594176][ T4944] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1934.617306][ T4944] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1934.664364][T31549] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1934.683987][T31549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1934.697854][ T4944] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1934.724090][ T4944] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1934.732974][ T4944] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1934.764288][ T4944] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1936.222532][T10577] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1936.259471][T10577] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1936.306279][T10569] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1936.329307][T10577] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1936.392971][T10569] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1936.445966][T10577] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1938.200208][ T5325] netlink: 188 bytes leftover after parsing attributes in process `syz.6.9385'. [ 1939.140934][ T5347] netlink: 830 bytes leftover after parsing attributes in process `syz.8.9394'. [ 1940.496912][ T5374] netlink: 188 bytes leftover after parsing attributes in process `syz.5.9401'. [ 1942.940961][ T5434] pimreg0: tun_chr_ioctl cmd 35108 [ 1943.143664][ T5444] bridge0: port 2(bridge_slave_1) entered disabled state [ 1943.152808][ T5444] bridge0: port 1(bridge_slave_0) entered disabled state [ 1943.213399][ T5444] device bridge0 entered promiscuous mode [ 1943.902838][ T5464] netlink: 830 bytes leftover after parsing attributes in process `syz.8.9437'. [ 1944.493834][ T5480] netlink: 'syz.9.9444': attribute type 39 has an invalid length. [ 1944.716964][ T5484] bridge0: port 2(bridge_slave_1) entered disabled state [ 1944.726168][ T5484] bridge0: port 1(bridge_slave_0) entered disabled state [ 1944.738463][ T5484] device bridge0 entered promiscuous mode [ 1944.998442][ T5491] netlink: 14975 bytes leftover after parsing attributes in process `syz.5.9447'. [ 1945.264545][ T5499] netlink: 56 bytes leftover after parsing attributes in process `syz.9.9452'. [ 1945.831940][ T5506] netlink: 14975 bytes leftover after parsing attributes in process `syz.6.9454'. [ 1946.003381][ T5505] bridge0: port 2(bridge_slave_1) entered disabled state [ 1946.012882][ T5505] bridge0: port 1(bridge_slave_0) entered disabled state [ 1946.025334][ T5505] device bridge0 entered promiscuous mode [ 1946.080485][ T5509] netlink: 830 bytes leftover after parsing attributes in process `syz.5.9453'. [ 1946.696815][ T5537] [ 1946.699586][ T5537] ============================= [ 1946.704821][ T5537] WARNING: suspicious RCU usage [ 1946.709749][ T5537] syzkaller #0 Not tainted [ 1946.714311][ T5537] ----------------------------- [ 1946.719208][ T5537] kernel/events/callchain.c:161 suspicious rcu_dereference_check() usage! [ 1946.727859][ T5537] [ 1946.727859][ T5537] other info that might help us debug this: [ 1946.727859][ T5537] [ 1946.738218][ T5537] [ 1946.738218][ T5537] rcu_scheduler_active = 2, debug_locks = 1 [ 1946.746474][ T5537] 1 lock held by syz.7.9469/5537: [ 1946.751845][ T5537] #0: ffffffff8cb2d7a0 (rcu_read_lock_trace){....}-{0:0}, at: rcu_read_lock_trace+0x37/0x70 [ 1946.762801][ T5537] [ 1946.762801][ T5537] stack backtrace: [ 1946.769087][ T5537] CPU: 0 PID: 5537 Comm: syz.7.9469 Not tainted syzkaller #0 [ 1946.776528][ T5537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 1946.786649][ T5537] Call Trace: [ 1946.789985][ T5537] [ 1946.792971][ T5537] dump_stack_lvl+0x188/0x24e [ 1946.797725][ T5537] ? show_regs_print_info+0x12/0x12 [ 1946.802998][ T5537] ? load_image+0x400/0x400 [ 1946.807580][ T5537] lockdep_rcu_suspicious+0x1dd/0x300 [ 1946.813040][ T5537] get_callchain_entry+0x2a5/0x3b0 [ 1946.818246][ T5537] get_perf_callchain+0xc4/0x490 [ 1946.823257][ T5537] ? put_callchain_entry+0xb0/0xb0 [ 1946.828440][ T5537] ? plist_add+0x3d4/0x480 [ 1946.832926][ T5537] ? verify_lock_unused+0x140/0x140 [ 1946.838225][ T5537] __bpf_get_stack+0x2de/0x520 [ 1946.843067][ T5537] ? stack_map_get_build_id_offset+0x970/0x970 [ 1946.849293][ T5537] ? __cant_sleep+0x220/0x220 [ 1946.854045][ T5537] ? bpf_prog_b8a90dd1efcc4ad9+0x3d/0x41 [ 1946.859750][ T5537] bpf_get_stack_raw_tp+0x189/0x1c0 [ 1946.865041][ T5537] bpf_prog_b8a90dd1efcc4ad9+0x3d/0x41 [ 1946.870683][ T5537] bpf_prog_run_pin_on_cpu+0x64/0x150 [ 1946.876207][ T5537] bpf_prog_test_run_syscall+0x313/0x4a0 [ 1946.882059][ T5537] ? sock_gen_cookie+0x60/0x60 [ 1946.886915][ T5537] ? sock_gen_cookie+0x60/0x60 [ 1946.891732][ T5537] bpf_prog_test_run+0x31e/0x390 [ 1946.896731][ T5537] __sys_bpf+0x62b/0x780 [ 1946.901026][ T5537] ? bpf_link_show_fdinfo+0x380/0x380 [ 1946.906435][ T5537] ? _raw_spin_unlock_irqrestore+0x82/0x120 [ 1946.912386][ T5537] ? lock_chain_count+0x20/0x20 [ 1946.917379][ T5537] __x64_sys_bpf+0x78/0x90 [ 1946.921844][ T5537] do_syscall_64+0x4c/0xa0 [ 1946.926301][ T5537] ? clear_bhb_loop+0x60/0xb0 [ 1946.931013][ T5537] ? clear_bhb_loop+0x60/0xb0 [ 1946.935728][ T5537] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1946.941653][ T5537] RIP: 0033:0x7f57a179acb9 [ 1946.946110][ T5537] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1946.965776][ T5537] RSP: 002b:00007f57a26de028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1946.974231][ T5537] RAX: ffffffffffffffda RBX: 00007f57a1a15fa0 RCX: 00007f57a179acb9 [ 1946.982416][ T5537] RDX: 000000000000000c RSI: 00002000000004c0 RDI: 000000000000000a [ 1946.990421][ T5537] RBP: 00007f57a1808bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1946.998429][ T5537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1947.006430][ T5537] R13: 00007f57a1a16038 R14: 00007f57a1a15fa0 R15: 00007ffd1a5c9118 [ 1947.014446][ T5537]