last executing test programs: 1m11.086463343s ago: executing program 1 (id=235): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2e0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x3e, 0x51, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206af", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f90931dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x50) 1m10.762091318s ago: executing program 1 (id=239): r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b06d25a806c8c6f94f90424fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0xd18c9b60, &(0x7f0000000080)=[{&(0x7f0000000100)="e03f03002a000b05d25a806c8c6f94f90524fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) 1m10.280487828s ago: executing program 2 (id=244): r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b06d25a806c8c6f94f90424fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0xd18c9b60, &(0x7f0000000080)=[{&(0x7f0000000100)="e03f03002a000b05d25a806c8c6f94f90524fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) 1m9.803349929s ago: executing program 1 (id=246): bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="15000000060000000f00000008000000410000", @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="10003d39fcffffff0000000000000000000000000000000000000000d2ec87f6e3de160774583c"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x18) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000003000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x5}, 0x94) r2 = socket$kcm(0xa, 0x922000000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000000)={r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63, 0x0, &(0x7f00000000c0)='\x00', 0x0, 0x2}, 0x48) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffff8, 0x3}, 0x0, 0x0, 0x2, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/29], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9d, 0x0, 0x8, 0x0, 0x0, 0x0, 0x10201, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ab, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x1c440, 0x10000, 0x0, 0x4, 0x0, 0x4, 0x1}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0xe, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], &(0x7f0000000200)='syzkaller\x00', 0xa}, 0x94) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x50, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8b04, &(0x7f0000000040)={'wlan1\x00', @random="01f8ffffff8d"}) 1m9.253478122s ago: executing program 1 (id=250): bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2505, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x940, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x922000000001, 0x106) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpu.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x4) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x240400c1) r2 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x6, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x10, 0x4}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r7, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x60ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x64, &(0x7f0000000000)=r8, 0x10) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x7b, &(0x7f0000000000), 0x4) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0500000004000000050000000100000000850c00ace9aeb0f11e1ef2e66cd840533130f0fac3fb524b5531aec95275ead80cf92bf1f261093160786c2f2ddd0c1d03694e229e", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r9, @ANYBLOB='\x00\x00\x00\x00'], 0x50) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda9, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)=@generic={&(0x7f00000001c0)='./file0\x00', r11}, 0x18) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r12, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r12, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x3, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000400a4b9e67afe89282e9500fe05ffff0000"], &(0x7f00000000c0)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x40, '\x00', r13, 0x1f00}, 0x94) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000003000000000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b703000000000000850000001b000000b700000000000000ad09e0ff100000009500000000000000a1809c075333d872a8740f796a378c208bad39ac070042dc716fae5d2e4b2c592446757490380b75c0dca3e82f1fe0e23c102878ddc49f5c4fc339499f294b6f4947ca7876abde"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r13, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r15, &(0x7f00000009c0)={&(0x7f0000000500)=@name, 0x10, 0x0}, 0x40045) setsockopt$sock_attach_bpf(r15, 0x1, 0x32, &(0x7f0000000140)=r14, 0x4) 1m9.212751094s ago: executing program 2 (id=251): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019001931a0e69ee517d34460bc06000000a701251e6182949a3651f60a84c9f4d4938037e70e4509c51c268811000000000000000000002571cd53b9851b30599980bc", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000c80)=""/230, 0xe6}, {&(0x7f0000004a40)=""/4081, 0xff1}, {&(0x7f0000001880)=""/4105, 0x1009}, {&(0x7f00000000c0)=""/112, 0x70}], 0x4}, 0x40002000) recvmsg$kcm(r0, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) 1m9.017097683s ago: executing program 2 (id=254): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b05d25a806c8c6f94f90424fc601000127a0a000600073582c137153e37080c18800aac0f000300", 0x33fe0}], 0x1, 0x0, 0x0, 0x8100000}, 0x0) 1m8.819503381s ago: executing program 2 (id=257): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2e0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x3f, 0x0, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", 0x0, 0x0, 0x3}, 0x50) 1m8.539019583s ago: executing program 2 (id=258): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x88, 0x64, &(0x7f00000009c0)=r2, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b708000000000000738af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000485000000a600000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000540)="84"}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b04, 0x0) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB="0a00000016000000b30000007f00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00e90000000002000000000000004000e29b00601cec020571f86dd79ea7acb2586b5f9f9b9fb8a999dcec0bf2571dba253cd2ccdd82ca433e92042cf3fce6ccaa211a0bf3d3751257072b9ffcde51507108cc83d89e0262b9e873b57d8f843822a71b45b7940ded80b365d689dbf67858a2debf18742bd61b8489594fb29c764e45341897e31331aa080921cc469199834796bfa651dc1de1c4ee2f40e890bb3526c2198b90eacf434e1ac23c6c7ae33e035ede533e947fd8bd067d2290df5e5e1fad7b803fd237"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x3, 0x0, 0x0, 0x1000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r6}, @generic={0x66}, @initr0, @exit, @alu={0x4, 0x0, 0x9, 0x3, 0x0, 0x0, 0xffffffffffffffff}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)={[{0x6, 'devices'}, {0x2b, 'net'}]}, 0xe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) (async) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) close(r1) (async) recvmsg$unix(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) socket$kcm(0xa, 0x2, 0x88) (async) setsockopt$sock_attach_bpf(r3, 0x88, 0x64, &(0x7f00000009c0)=r2, 0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b708000000000000738af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000485000000a600000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000540)="84"}, 0x50) (async) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$unix(0x1, 0x0, 0x0, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b04, 0x0) (async) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB="0a00000016000000b30000007f00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00e90000000002000000000000004000e29b00601cec020571f86dd79ea7acb2586b5f9f9b9fb8a999dcec0bf2571dba253cd2ccdd82ca433e92042cf3fce6ccaa211a0bf3d3751257072b9ffcde51507108cc83d89e0262b9e873b57d8f843822a71b45b7940ded80b365d689dbf67858a2debf18742bd61b8489594fb29c764e45341897e31331aa080921cc469199834796bfa651dc1de1c4ee2f40e890bb3526c2198b90eacf434e1ac23c6c7ae33e035ede533e947fd8bd067d2290df5e5e1fad7b803fd237"], 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x3, 0x0, 0x0, 0x1000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r6}, @generic={0x66}, @initr0, @exit, @alu={0x4, 0x0, 0x9, 0x3, 0x0, 0x0, 0xffffffffffffffff}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28}, 0x94) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)={[{0x6, 'devices'}, {0x2b, 'net'}]}, 0xe) (async) 1m8.177705098s ago: executing program 1 (id=259): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0xd3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000001400000000000018000000000200000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f0000017f00000a0000000800"/28, @ANYRES32, @ANYBLOB="7f000001ac141400000000011c0e0000000000000000000007006fc946f1f569c01801"], 0x230}, 0x8042) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030029000b12d25a80648c2594f90224fc60100c02c000000000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000004000)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$kcm(0x11, 0x200000000000002, 0x300) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8003fffe, 0x81031, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000007300000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r5}, 0x10) recvmsg$unix(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x15}, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x3, 0x0, 0x0, 0x0, 0x5d2e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x3}, 0x202, 0x6, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x7}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) r9 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r9, 0x0, 0x28, 0x0, 0xc) socketpair$unix(0x1, 0x5, 0x0, 0x0) r10 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000300)={'netdevsim0\x00', @random="a9ab4542446b"}) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1m7.741881557s ago: executing program 2 (id=262): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019001931a0e69ee517d34460bc06000000a701251e6182949a3651f60a84c9f4d4938037e70e4509c51c268811000000000000000000002571cd53b9851b30599980bc", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000c80)=""/230, 0xe6}, {&(0x7f0000004a40)=""/4081, 0xff1}, {&(0x7f0000001880)=""/4105, 0x1009}, {&(0x7f00000000c0)=""/112, 0x70}], 0x4}, 0x40002000) recvmsg$kcm(r0, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) 1m7.741408697s ago: executing program 1 (id=263): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100033200fc08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000040)={r2}, 0x8) write$cgroup_int(r3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r3}, 0x94) 1m7.305536276s ago: executing program 32 (id=263): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100033200fc08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000040)={r2}, 0x8) write$cgroup_int(r3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124cb0000000006113500000000000bf2000000000000007000000180000003d030100000000009500f000000000006926000000000000bf67000000000000560602000fff07006706000020000000170200000ee60000bf050000000000002d350000000000006507000002080000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad35010000000000840400000000000014000000000000009500000000000000db13d5d8b741f2cdaabc83df03395287fd51a700ea6553f304000000815dcf00c3eebc52267b042d196bde7c382d21ff79a8583a7482c5994747e19325b1ee980cbd800d845dacbcf5ad8cdbc7abf9"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r3}, 0x94) 1m7.233395829s ago: executing program 33 (id=262): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019001931a0e69ee517d34460bc06000000a701251e6182949a3651f60a84c9f4d4938037e70e4509c51c268811000000000000000000002571cd53b9851b30599980bc", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000c80)=""/230, 0xe6}, {&(0x7f0000004a40)=""/4081, 0xff1}, {&(0x7f0000001880)=""/4105, 0x1009}, {&(0x7f00000000c0)=""/112, 0x70}], 0x4}, 0x40002000) recvmsg$kcm(r0, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) 3.928336281s ago: executing program 0 (id=527): perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x3, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x9, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x1e, 0x1, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r6 = socket$kcm(0x1e, 0x1, 0x0) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r7 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f00000008c0), 0x4) sendmsg$kcm(r7, &(0x7f0000000100)={&(0x7f0000001540)=@tipc, 0x80, 0x0}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f00000002c0)="5c00000013006bcc9e3be35c6e976f9d43d9728517aa310f6b876c1d0000007ea60864160af36514000cc0080002cc07000200060001c003", 0x38}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x20000000) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x6, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000085100000ffffffff"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f00}, 0x94) socket$kcm(0x10, 0x400000002, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="850000008a0000006a0a00ffc10000000c000000000000009500000000000000181000c76f9c9882de52daaadda306b2acda00fd2837201e2286c420764b0e820e2ef277ecf55cd384f59fddaf232a7c061400355036d3c26aa4a2a0ac649c1531a9144a02ec20dd8000ffffff0c09a395dc448f185405", @ANYRES32, @ANYBLOB="000000000000000005000000000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0x95, &(0x7f00000009c0)=""/149, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) r10 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x9, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r10, 0x2405, r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)=r8}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r9, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf3, &(0x7f0000000480)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x5a, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r14 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r12, @ANYBLOB="0800000000000000000000000000000000000000efd167b518dcfc2636ecadd996c9f8a57892729b537b48467a1144c0c319bee2960b4314838e9ee8aab80174b0922c85fb8fe4f71578216e59efb9db54f67688e61a5793c4a4bf7f35d9f413fbef4c8effe60bdf6aa4e420", @ANYRES32=r13, @ANYRES32=r14, @ANYBLOB="00000000000000000500"/28], 0x50) 3.681223302s ago: executing program 4 (id=530): bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000c40)=[{0x0, 0x1}, {0x0, 0x4, 0x10004}]}, 0x94) r0 = socket$kcm(0x10, 0x3, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x3, 0xc, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1f, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x72, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200), &(0x7f0000000240)=[{0x3, 0x5, 0xc}], 0x10, 0x10000}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8912, &(0x7f0000000080)) sendmsg$inet(0xffffffffffffffff, 0x0, 0x400c0) r4 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r4, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4001, @empty}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x200048cc) sendmsg$inet(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000280)="11aa21b257da4a88df28a95bba51a371548d61174e2bc231e66d5c174efc798a02a8c2fb9c519a3f76499ddcf7059f1297a55d9ea7e1f8", 0x37}, {0x0}], 0x2}, 0x4000001) close(r4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030033000b35d25a806c8c6f94f90424fc60100005000a000200053582c137153e37000c0680050002000310", 0x33fe0}], 0x1}, 0x0) 3.603837615s ago: executing program 0 (id=532): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfdef) openat$cgroup_int(r1, &(0x7f0000000000)='memory.oom.group\x00', 0x2, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x16, 0x18, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000100000000000000010000180100002020702500000000002020207b1af8ff00000000bfa10000000000000701000078ffffffb702000008000000b7030000000800008500000006000000b7080000000000007b8af8ff00000000b7080000001000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x10, 0x70, &(0x7f00000006c0)="0000000005000000", &(0x7f0000000700)=""/8, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x28) r5 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r5, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4001, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x200048cc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000019580)=ANY=[@ANYBLOB="0f000000040000000800000001"], 0x37) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000d40)={0x0, 0x7000000, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000300000001"], 0x48) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r8}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r8, &(0x7f0000000140), &(0x7f0000000000)=""/48}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x15, 0xe, &(0x7f0000001440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000001800000000000000000000000000000095"], &(0x7f0000000200)='syzkaller\x00', 0x8}, 0x94) sendmsg$kcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000017c0)="93", 0x1}], 0x1}, 0x40) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x5, 0x7}, 0x0, 0xca, 0x0, 0x0, 0x16f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) recvmsg$unix(r9, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000340)=ANY=[@ANYRES64], 0x2) sendmsg$inet(r5, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x2004c841) recvmsg$kcm(r1, &(0x7f00000002c0)={&(0x7f0000000440)=@rc, 0x80, &(0x7f0000001a00)=[{&(0x7f00000004c0)=""/196, 0xc4}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/227, 0xe3}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000001800)=""/228, 0xe4}, {&(0x7f0000001900)=""/253, 0xfd}], 0x6, &(0x7f0000001a80)=""/181, 0xb5}, 0x40000001) bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=ANY=[@ANYBLOB="0200000004000000040000000a00000000100000", @ANYRES32=r10, @ANYBLOB="0500000000000001000000000000000000000000a7b7577dd8667a6cb6edbd5cb67cc130a7a37b50368b71887f794fb9fcba245a60b19bac15b7424d7ad89831499bc7272e6cc91a2827f133126dccec962fc6684cd1b8369b5f213634fa0522d28c78bc05dbffc3fced0a9246f80f87a8f1e1376d1a8ac522a5b3988a18735e8c55a2d4f670e06e5e7d7e7cbd129e5c836dd3dfaa2846", @ANYRES32=0x0, @ANYBLOB="60d12d7511a09abc57a320c40f5b2b211d6c09eb7d0cf09f456e450ba9653e3fee7c2e81c08afd119738a6a415f49a95ca92fa9517408c4f193febf30fc1bf9c998266bc57e6644d948d1dc3df5dae44989fd68d5e4921cbd6d1f7e5dfca1e1e946e174e515de25e048eabd5f45aa1403dd9494bc5a75130286dc96a9734e25e910b6eb3e8f876786d99ea95f985f29270a66dfe56639dd5f68424809df88cb911097eef378cbcded75178593d0235c983f10b71a0b535f8c83ca4c5cf", @ANYRESHEX=r4], 0x50) openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) 3.02225005s ago: executing program 4 (id=535): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xd0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x200, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7, 0x1, @perf_config_ext={0x5, 0x6}, 0x0, 0x0, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffbfffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0xbf}, @exit], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x11}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) close(r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3}, 0x18) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848110000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x8000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0, 0xc8b4aefc6476409b}, 0x75) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x9) r5 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b06d25a806c8c6f94f90424fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(r5, &(0x7f00000000c0)={0x0, 0xd18c9b60, &(0x7f0000000080)=[{&(0x7f0000000100)="e03f03002a000b05d25a806c8c6f94f90524fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) 2.568615209s ago: executing program 0 (id=540): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x87}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) unlink(&(0x7f0000000000)='./cgroup.cpu/cpuset.cpus/file0\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$kcm(0x10, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) close(r1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x700000000000000, &(0x7f0000000440)=@base={0x20, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x50) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000011008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000300020400bf050005001201", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair(0x9bddcea86eccf8a0, 0x800, 0x3, &(0x7f00000000c0)) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8983, 0x0) 2.56799123s ago: executing program 3 (id=541): bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$kcm(0x2, 0x922000000001, 0x106) setsockopt$sock_attach_bpf(r0, 0x6, 0x24, &(0x7f0000000000), 0xff7b) 2.342918819s ago: executing program 3 (id=542): perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x3, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x9, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x1e, 0x1, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r6 = socket$kcm(0x1e, 0x1, 0x0) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r7 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f00000008c0), 0x4) sendmsg$kcm(r7, &(0x7f0000000100)={&(0x7f0000001540)=@tipc, 0x80, 0x0}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f00000002c0)="5c00000013006bcc9e3be35c6e976f9d43d9728517aa310f6b876c1d0000007ea60864160af36514000cc0080002cc07000200060001c003", 0x38}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x20000000) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x6, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000085100000ffffffff"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f00}, 0x94) socket$kcm(0x10, 0x400000002, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="850000008a0000006a0a00ffc10000000c000000000000009500000000000000181000c76f9c9882de52daaadda306b2acda00fd2837201e2286c420764b0e820e2ef277ecf55cd384f59fddaf232a7c061400355036d3c26aa4a2a0ac649c1531a9144a02ec20dd8000ffffff0c09a395dc448f185405", @ANYRES32, @ANYBLOB="000000000000000005000000000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0x95, &(0x7f00000009c0)=""/149, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) r10 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x9, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r11) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r10, 0x2405, r0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)=r8}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r9, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf3, &(0x7f0000000480)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x5a, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r14 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r12, @ANYBLOB="0800000000000000000000000000000000000000efd167b518dcfc2636ecadd996c9f8a57892729b537b48467a1144c0c319bee2960b4314838e9ee8aab80174b0922c85fb8fe4f71578216e59efb9db54f67688e61a5793c4a4bf7f35d9f413fbef4c8effe60bdf6aa4e420", @ANYRES32=r13, @ANYRES32=r14, @ANYBLOB="00000000000000000500"/28], 0x50) 2.152794037s ago: executing program 4 (id=544): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019001931a0e69ee517d34460bc06000000a701251e", 0x2e}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003980)=""/156, 0x9c}, {&(0x7f0000000c80)=""/230, 0xe6}, {&(0x7f0000004a40)=""/4081, 0xff1}, {&(0x7f0000001880)=""/4105, 0x1009}, {&(0x7f00000000c0)=""/112, 0x70}, {&(0x7f0000000380)=""/103, 0x67}], 0x6}, 0x40002000) recvmsg$kcm(r0, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) 2.053941432s ago: executing program 3 (id=545): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x10, 0x2, 0x10) close(r1) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x9549, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x76, 0x1ef6}, 0x11efa, 0x4, 0x0, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x40200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2420, 0x0, 0x0, 0x3, 0x3, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="09000000010000004200000040"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x2, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x80000, 0xca, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0xe, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x1c0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYRES8=r1, @ANYBLOB="3eca", @ANYRES8=r2], 0x9a) r4 = socket$kcm(0x2, 0x0, 0x2) ioctl$SIOCSIFHWADDR(r4, 0x80111500, 0x0) 1.878160519s ago: executing program 5 (id=547): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000c40)=[{0x0, 0x8, 0x10009, 0x5}], 0x10, 0x800}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@fallback, 0xffffffffffffffff, 0x20, 0xe166c05f9a374916}, 0x20) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030023000b12d25a80648c2594f90124fc60020c084002000000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0xa}, 0x0) 1.827657462s ago: executing program 0 (id=548): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0f000000040000000800000008"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x15, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffdffd, 0x0, 0x0, 0x0, 0x800}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f00000004c0)="630b008646dc3f0adf33c9f7b986", 0x0, 0x1fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) 1.715559846s ago: executing program 5 (id=549): r0 = socket$kcm(0xa, 0x922000000003, 0x11) socket$kcm(0x10, 0x5, 0x4) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000001a40)}, 0x20000010) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000480)="f4000900062b2c25fe80070000e4c8030000000f238466cc0000be000000ad6e911b51818463b400", 0x28}], 0x1}, 0x0) 1.700194887s ago: executing program 0 (id=550): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff7ffa}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x52, 0x4, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xf, 0x4, 0x2, 0xdc, 0x7, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xd, 0xffffffffffffffff, 0x9) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x21, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1d240000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r2, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r3}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_clone(0x14112000, &(0x7f0000000280)="3f4dc3abb9b528cd490c740eb667a3ceea393659598614c6ffad985df1dfc2112c515e88473f33ce6921ba14c2c42efd4af3ee172854db54fa971a3bc773bb7453170f0c5a3616bbfd689669c239457dd9137ea9fc1f46c6f2e1ee117d07abbe075844e17a7c464992b7ddecebd6ad2ce6b9b7641d7011fc5fc417389eb335069debf840bc5176f122fc725d", 0x8c, 0x0, &(0x7f0000000340), 0x0) r6 = perf_event_open(&(0x7f0000000880)={0x2, 0x80, 0x5, 0xfe, 0x0, 0x0, 0x0, 0x9, 0x4022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000900)}, 0x0, 0x0, 0xfffffffc, 0x5, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x10000}, r5, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000, 0x0, 0x2, 0x0, 0x80}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_lsm={0x1d, 0x20, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000009000000000000004000200018110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000230000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b705000008000000850000c26c3502ca55a829abe3330003000091e4ffffffffffb602000400000000850000"], &(0x7f0000000440)='syzkaller\x00', 0x101, 0x23, &(0x7f0000000680)=""/35, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0xe, 0x8, 0x8}, 0x10, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000740)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff], &(0x7f0000000780)=[{0x0, 0x5, 0x8, 0x9}, {0x2, 0x5, 0x10, 0x7}], 0x10, 0xbda}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) recvmsg$unix(r10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x70}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x400000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) 1.630061s ago: executing program 3 (id=551): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={0x0, 0x0, 0x43}, 0x28) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, 0x0, &(0x7f00000001c0)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', r1}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r2, 0x0, 0x0}, 0x10) 1.601915851s ago: executing program 5 (id=552): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000e0ffffff001100"/28], 0x50) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd3c0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x200000000000003}, 0x0, 0x0, 0x80000001, 0x7, 0x0, 0x10000000, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="720ac4feffff97006910160000000000950000000000008189f9db6847687153703f0000"], &(0x7f0000000480)='GPL\x00'}, 0x80) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x20702, 0x0) sendmsg$inet(r5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x60}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="1808000000000000000000000300000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000002f000000b70900000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r2}, &(0x7f0000000280), &(0x7f0000000240)=r7}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYRES16=r5, @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r8, 0x4) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) close(r10) r11 = socket$kcm(0x15, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x541b, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) 1.567296962s ago: executing program 3 (id=553): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xd0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x200, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7, 0x1, @perf_config_ext={0x5, 0x6}, 0x0, 0x0, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffbfffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0xbf}, @exit], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x11}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) close(r1) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x1003}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x18) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848110000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x8000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0, 0xc8b4aefc6476409b}, 0x75) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x9) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b06d25a806c8c6f94f90424fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(r4, &(0x7f00000000c0)={0x0, 0xd18c9b60, &(0x7f0000000080)=[{&(0x7f0000000100)="e03f03002a000b05d25a806c8c6f94f90524fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) 1.101903413s ago: executing program 5 (id=554): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) (rerun: 32) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)={&(0x7f0000000080)=@abs={0x1}, 0x6e, 0x0}, 0x0) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000080)) (async, rerun: 64) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async) r5 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r5, 0x107, 0x8, 0x0, 0x300) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f0000000140)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f00000002c0)=ANY=[@ANYBLOB='-', @ANYRESOCT=r6, @ANYRESDEC=r6], 0x27) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000072"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) 684.192381ms ago: executing program 0 (id=555): bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000c40)=[{0x0, 0x1}, {0x0, 0x4, 0x10004}]}, 0x94) r0 = socket$kcm(0x10, 0x3, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x3, 0xc, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1f, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x72, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200), &(0x7f0000000240)=[{0x3, 0x5, 0xc}], 0x10, 0x10000}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8912, &(0x7f0000000080)) sendmsg$inet(0xffffffffffffffff, 0x0, 0x400c0) r4 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r4, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4001, @empty}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x200048cc) sendmsg$inet(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000280)="11aa21b257da4a88df28a95bba51a371548d61174e2bc231e66d5c174efc798a02a8c2fb9c519a3f76499ddcf7059f1297a55d9ea7e1f8", 0x37}, {0x0}], 0x2}, 0x4000001) close(r4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030033000b35d25a806c8c6f94f90424fc60100005000a000200053582c137153e37000c0680050002000310", 0x33fe0}], 0x1}, 0x0) 684.093641ms ago: executing program 4 (id=556): perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$kcm(0x2, 0x922000000001, 0x106) setsockopt$sock_attach_bpf(r0, 0x6, 0x24, &(0x7f0000000000), 0xff7b) 670.729131ms ago: executing program 5 (id=557): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000c40)=[{0x0, 0x8, 0x10009, 0x5}], 0x10, 0x800}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@fallback, 0xffffffffffffffff, 0x20, 0xe166c05f9a374916}, 0x20) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030023000b12d25a80648c2594f90124fc60020c084002000000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0xa}, 0x0) 514.028918ms ago: executing program 4 (id=558): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0f000000040000000800000008"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x15, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffdffd, 0x0, 0x0, 0x0, 0x800}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f00000004c0)="630b008646dc3f0adf33c9f7b986", 0x0, 0x1fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) 507.700228ms ago: executing program 5 (id=559): socket$kcm(0x2c, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x11b, 0x6, &(0x7f0000000040)=r0, 0x4) 467.03702ms ago: executing program 3 (id=560): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x50d46, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={&(0x7f00000002c0), 0x3}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x50d46, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={&(0x7f00000002c0), 0x3}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x310c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x310c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000040)={&(0x7f0000001340)=@hci={0x1f, 0x0, 0x12}, 0x80, &(0x7f0000000140)}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x2, 0x4}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f00000031c0)={&(0x7f0000000580)=@l2tp6={0xa, 0x0, 0xfffffffe, @mcast1, 0x4}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="dd9c1a729829edcdca9a41cee5df7cb276dcfe9c0b0cf925d1e8b9d98b7f52c78478578035b21d8a84b5c95bbd4f1d613d9ed51b96ca5fe629f18b352e4606adeee9030ab0ab3301540acd707cd7bc3f32f2c4ce6b886d1cd5", 0x59}, {&(0x7f0000000000)="8bd757448912ad669970bd90c3948cc19d2c68b9bafe7db1068beb348a0994516539b1ced0c15e057f8628dc2d9e0c7ee98f264238e707ea191d640bc85e30315b743c855f23029212b788c8713523f39500c942c8e8f30bd61025d2cec6a4d4bb79d2496994e42ab8b51fcf6aff48c4bad6dc158a79b5412caf6ac33b22dd", 0x7f}, {&(0x7f0000000180)="0451476f69b98984175998d59340b9996945e1150d547ca3a174509ce041e8d8e5007d04cdfcb509d9d6a1b980b5376b2d4bfffae2cba64774f0b25c68fa57443138f9e847e44b64aece92eeb51d42df9469a1a613e3370302714854a15a8cff77994ef52d76d232e1baf3f73a70bff465fee4cddb23e59fb1bbe7cdfe6dd89763a8ecfa6e580eeb5edccf30e69fc1030048e36c8b02195525ff9bb6168e270466b7d240f179eb8b2b5a0432a8", 0xad}, {&(0x7f0000000080)="1c95906e7b15baddf095d4cea72433cdec8bec6d08bfce01846c3b0393d07037ca4c76", 0x23}, {&(0x7f0000000240)="16749654ea6f5b120bde34239756fa46cd717610bb4fec2a7699817b8a84188aa7c7777832b541331c8c4f440dda2b3b03a4ce3ac6b8cb6e810347e792f9b1cef981aef163f40c6f61d7f7080b3609932268bf85946eb371094525857b9c4aaf7cb9a5cd6b18d0", 0x67}, {&(0x7f0000000340)="bf73ce0b4a6bb6de32558e4814ea6e6b6d1a717a387478db3256f5029eeec70395956a57e63bc2da3e90846374445a77dc83aa8178fbf7f1125ddbbf235263c34ef18a387d7bdeb45740882d4518d56bd19aadcdff686345bb9086b9e2b70d979869d30e26ab8df2f7c2c01ccc3e042df5b78f4c54b0649cce68d8e8e2f2947f2885f9a63ae7e1b08849594f6d28e1e426a9a653f75f9bc85d67a7df821ea7c77b545f237248d7d4055ae87631f83e7397ef211508", 0xb5}, {&(0x7f0000000600)="a500194fa052642868523de98a9810d0a4a5173e342bc242cf882b14c4445968af9699f7ea27e3be88a70a958cc38682491f2786e8a2702a1abff1fe42e0a4483b8d4c39436eeadb8f8f1a5fc703649c8910cdb4dd8af858ca4aed844d771b20a26d776b805d9872bdb58adb33c2f99035ca2b89435888304976aa77ab62df634e8e2c65a55d1d3f785a87777e2e04d0c8b3165b755bbe900e4eeb6d0323c253a4099df0289d5c06a4cb82f5b14acc11134e7e3cd72597a100", 0xb9}, {&(0x7f00000006c0)="f25dae8f6340176177583e7bc743acbcc326e34657c2601358a1e7f97e0d52d5c92086926c6f1757bc46bf458d12a415ad064afaa52d988d7f443263105fc1ea268c9efdd4a010fe0558fda42b6930138ef38cfd13aa32c248fc7580bdf9c0b8fe457500667974be6368f9afcebcf634d39345ddd4eb9a2dc75b5fae0bfeb3b9fca3381dd6348f8299f480a54eb116eb4410511a58f6dd3864b9086b57191432ea6fcbdc14bbc60fe7f916489cd72418c0501be95b692643da0260e0594fae3baa2d43a88199bf38f8a4307f3954adb40acdcb9ee9e3fde0d6aea342c5f3f7d227fae7aa9e34", 0xe6}, {&(0x7f0000000480)="f1107d04dd5935d8ba02f5a83352b2da9608ca211645bb6a2a25fe6809501d2a9e282c376a91f622b438ec1fe8a48ca6d1cf1aff71c525b7ba17f6a332818365bc6535ea0845cf51a8d4ddd3f49d5c7091b191df3adfa37d114c068a2be67a458cdbcacde36de795b37f96c094bddd3c0a86f25bbab684c3f3905b66ec92", 0x7e}, {&(0x7f00000007c0)="7b9e06b79ffb9fdff6fe4abfc8e2e7444c1f58740fee936f5ca3457cca1d4b6f22da036b222601d4773d77beabc07bd76717946fc61eed17c9f71a71457e8bc8e170bd95039ecbfa406f812cfafa3baa3ce5d0c8ebe95c19b8cb80f460106abec0e88763e43afe30af8dc7a820a8da69cf4a3e2a53ef94af16062c351c404fc08a32d2df52bed58b9671bb6ce8aa707749dac7f161a6adf3dba563209fd20f7309c580abf1797e63ba5bc993929475b3cf71a3e1e23d580118867b4c4e49e9c411477587e94353bc8be0a9ba8ef7de234c7383d67549f314fc", 0xd9}], 0xa, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000002900000004"], 0x18}, 0x4008000) sendmsg$kcm(r5, &(0x7f0000000440)={&(0x7f0000000100)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000001040)="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", 0x53f}], 0x1, 0x0, 0x0, 0x900}, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x4, 0x10, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000002000007b01230000000000b7080000959700007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d110, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb5, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x9, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async) r10 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d110, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb5, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x9, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r11) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x4, 0xa, 0x3, 0x41, 0xffffffffffffffff, 0x5}, 0x50) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x4, 0xa, 0x3, 0x41, 0xffffffffffffffff, 0x5}, 0x50) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0900000001000000020000004000000000000000", @ANYRES32, @ANYBLOB="40000000000000000000804000000000004d6f58", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x12, 0xfffffffb, 0x0, 0x0, 0x0, r13}, 0x48) r14 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r14, &(0x7f00000004c0)=ANY=[@ANYBLOB='$\x00\x00\x00f\x00'], 0xfe33) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8001, r12}, 0x38) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8001, r12}, 0x38) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f00000000c0)=r9, 0x4) sendmsg$unix(r8, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 0s ago: executing program 4 (id=561): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={0x0, 0x0, 0x43}, 0x28) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, 0x0, &(0x7f00000001c0)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', r1}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r2, 0x0, 0x0}, 0x10) kernel console output (not intermixed with test programs): vsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 132.757486][ T2105] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 132.890027][ T2105] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 133.040732][ T2105] bond0: (slave netdevsim0): Releasing backup interface [ 133.069650][ T2105] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 133.188111][ T42] wlan1: Trigger new scan to find an IBSS to join [ 133.198959][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 133.205715][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 133.395450][ T6623] netlink: 'syz.3.268': attribute type 10 has an invalid length. [ 133.458217][ T6623] .þ: (slave dummy0): Releasing backup interface [ 133.497149][ T6623] dummy0: entered promiscuous mode [ 133.518370][ T6628] netlink: 'syz.3.268': attribute type 9 has an invalid length. [ 133.534366][ T6623] dummy0: entered allmulticast mode [ 133.554903][ T6623] team0: Port device dummy0 added [ 133.617830][ T6625] netlink: 'syz.3.268': attribute type 10 has an invalid length. [ 133.689208][ T6625] dummy0: left promiscuous mode [ 133.694962][ T6625] dummy0: left allmulticast mode [ 133.717078][ T6625] team0: Port device dummy0 removed [ 133.759022][ T6625] .þ: (slave dummy0): Enslaving as an active interface with an up link [ 133.769553][ T5794] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 133.783289][ T5794] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 133.788629][ T6627] netlink: 'syz.0.269': attribute type 39 has an invalid length. [ 133.816078][ T5794] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 133.837518][ T5794] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 133.846050][ T5794] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 133.861709][ T5794] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 133.923349][ T5793] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 133.933137][ T5793] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 133.946761][ T5793] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 133.956462][ T5793] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 133.966552][ T5793] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 133.974688][ T5793] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 134.155257][ T59] wlan1: Creating new IBSS network, BSSID 9e:7c:59:b8:76:92 [ 134.426538][ T6638] FAULT_INJECTION: forcing a failure. [ 134.426538][ T6638] name failslab, interval 1, probability 0, space 0, times 0 [ 134.466975][ T6638] CPU: 0 PID: 6638 Comm: syz.3.271 Not tainted syzkaller #0 [ 134.474354][ T6638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 134.484454][ T6638] Call Trace: [ 134.487795][ T6638] [ 134.490777][ T6638] dump_stack_lvl+0x16c/0x230 [ 134.495517][ T6638] ? show_regs_print_info+0x20/0x20 [ 134.500862][ T6638] ? load_image+0x3b0/0x3b0 [ 134.505416][ T6638] ? verify_lock_unused+0x140/0x140 [ 134.510678][ T6638] should_fail_ex+0x39d/0x4d0 [ 134.515420][ T6638] should_failslab+0x9/0x20 [ 134.519984][ T6638] slab_pre_alloc_hook+0x59/0x310 [ 134.525068][ T6638] kmem_cache_alloc+0x5a/0x2e0 [ 134.529874][ T6638] ? skb_clone+0x1eb/0x370 [ 134.534327][ T6638] skb_clone+0x1eb/0x370 [ 134.538609][ T6638] __netlink_deliver_tap+0x41c/0x830 [ 134.543937][ T6638] ? netlink_deliver_tap+0x2e/0x1b0 [ 134.549264][ T6638] netlink_deliver_tap+0x19c/0x1b0 [ 134.554411][ T6638] netlink_unicast+0x72c/0x8d0 [ 134.559239][ T6638] netlink_sendmsg+0x8c1/0xbe0 [ 134.564080][ T6638] ? netlink_getsockopt+0x580/0x580 [ 134.569321][ T6638] ? aa_sock_msg_perm+0x94/0x150 [ 134.574358][ T6638] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 134.579775][ T6638] ? security_socket_sendmsg+0x80/0xa0 [ 134.585273][ T6638] ? netlink_getsockopt+0x580/0x580 [ 134.590524][ T6638] ____sys_sendmsg+0x5bf/0x950 [ 134.595509][ T6638] ? __asan_memset+0x22/0x40 [ 134.600134][ T6638] ? __sys_sendmsg_sock+0x30/0x30 [ 134.605185][ T6638] ? __import_iovec+0x5f2/0x860 [ 134.610068][ T6638] ? import_iovec+0x73/0xa0 [ 134.614597][ T6638] ___sys_sendmsg+0x220/0x290 [ 134.619311][ T6638] ? __sys_sendmsg+0x270/0x270 [ 134.624122][ T6638] ? __lock_acquire+0x7c80/0x7c80 [ 134.629188][ T6638] __se_sys_sendmsg+0x1a5/0x270 [ 134.634071][ T6638] ? __x64_sys_sendmsg+0x80/0x80 [ 134.639047][ T6638] ? lockdep_hardirqs_on+0x98/0x150 [ 134.644265][ T6638] do_syscall_64+0x55/0xb0 [ 134.648700][ T6638] ? clear_bhb_loop+0x40/0x90 [ 134.653392][ T6638] ? clear_bhb_loop+0x40/0x90 [ 134.658100][ T6638] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 134.664034][ T6638] RIP: 0033:0x7fda7b38f749 [ 134.668477][ T6638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 134.688108][ T6638] RSP: 002b:00007fda7c315038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 134.696549][ T6638] RAX: ffffffffffffffda RBX: 00007fda7b5e5fa0 RCX: 00007fda7b38f749 [ 134.704578][ T6638] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000003 [ 134.712567][ T6638] RBP: 00007fda7c315090 R08: 0000000000000000 R09: 0000000000000000 [ 134.720562][ T6638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 134.728555][ T6638] R13: 00007fda7b5e6038 R14: 00007fda7b5e5fa0 R15: 00007ffccedcb088 [ 134.736596][ T6638] [ 134.841304][ T6644] IPv6: pim6reg1: Disabled Multicast RS [ 135.256973][ T6659] __nla_validate_parse: 5 callbacks suppressed [ 135.256992][ T6659] netlink: 60 bytes leftover after parsing attributes in process `syz.3.274'. [ 135.487592][ T6659] netlink: 60 bytes leftover after parsing attributes in process `syz.3.274'. [ 135.584607][ T6663] netlink: 60 bytes leftover after parsing attributes in process `syz.3.274'. [ 135.594560][ T6665] netlink: 60 bytes leftover after parsing attributes in process `syz.3.274'. [ 135.882846][ T6631] chnl_net:caif_netlink_parms(): no params data found [ 135.909381][ T5794] Bluetooth: hci2: command tx timeout [ 135.934530][ T6629] chnl_net:caif_netlink_parms(): no params data found [ 136.067425][ T5794] Bluetooth: hci3: command tx timeout [ 136.255286][ T6680] netlink: 60 bytes leftover after parsing attributes in process `syz.0.277'. [ 136.312180][ T6680] netlink: 60 bytes leftover after parsing attributes in process `syz.0.277'. [ 136.354424][ T6685] netlink: 60 bytes leftover after parsing attributes in process `syz.0.277'. [ 136.368864][ T6680] netlink: 60 bytes leftover after parsing attributes in process `syz.0.277'. [ 136.731389][ T6701] FAULT_INJECTION: forcing a failure. [ 136.731389][ T6701] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 136.756647][ T6701] CPU: 1 PID: 6701 Comm: syz.0.279 Not tainted syzkaller #0 [ 136.764026][ T6701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 136.774127][ T6701] Call Trace: [ 136.777455][ T6701] [ 136.780443][ T6701] dump_stack_lvl+0x16c/0x230 [ 136.785247][ T6701] ? show_regs_print_info+0x20/0x20 [ 136.790512][ T6701] ? load_image+0x3b0/0x3b0 [ 136.795074][ T6701] ? __lock_acquire+0x7c80/0x7c80 [ 136.800154][ T6701] ? snprintf+0xdb/0x120 [ 136.804448][ T6701] should_fail_ex+0x39d/0x4d0 [ 136.809203][ T6701] _copy_to_user+0x2f/0xa0 [ 136.813669][ T6701] simple_read_from_buffer+0xe7/0x150 [ 136.819104][ T6701] proc_fail_nth_read+0x1e3/0x250 [ 136.824182][ T6701] ? proc_fault_inject_write+0x340/0x340 [ 136.829879][ T6701] ? fsnotify_perm+0x271/0x5e0 [ 136.834707][ T6701] ? proc_fault_inject_write+0x340/0x340 [ 136.840405][ T6701] vfs_read+0x27e/0x920 [ 136.844634][ T6701] ? kernel_read+0x1e0/0x1e0 [ 136.849287][ T6701] ? __fget_files+0x28/0x4d0 [ 136.853935][ T6701] ? __fget_files+0x44a/0x4d0 [ 136.858686][ T6701] ? __fdget_pos+0x2a3/0x330 [ 136.863335][ T6701] ? ksys_read+0x75/0x250 [ 136.867746][ T6701] ksys_read+0x147/0x250 [ 136.872040][ T6701] ? vfs_write+0x940/0x940 [ 136.876514][ T6701] ? lockdep_hardirqs_on+0x98/0x150 [ 136.881765][ T6701] do_syscall_64+0x55/0xb0 [ 136.886236][ T6701] ? clear_bhb_loop+0x40/0x90 [ 136.890960][ T6701] ? clear_bhb_loop+0x40/0x90 [ 136.895690][ T6701] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 136.901610][ T6701] RIP: 0033:0x7fa30198e15c [ 136.906035][ T6701] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 136.925760][ T6701] RSP: 002b:00007fa2ffbf6030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 136.934207][ T6701] RAX: ffffffffffffffda RBX: 00007fa301be5fa0 RCX: 00007fa30198e15c [ 136.942199][ T6701] RDX: 000000000000000f RSI: 00007fa2ffbf60a0 RDI: 0000000000000005 [ 136.950200][ T6701] RBP: 00007fa2ffbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 136.958210][ T6701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 136.966205][ T6701] R13: 00007fa301be6038 R14: 00007fa301be5fa0 R15: 00007ffc6c26c208 [ 136.974209][ T6701] [ 137.072842][ T6629] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.083888][ T6629] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.122048][ T6629] bridge_slave_0: entered allmulticast mode [ 137.132893][ T6629] bridge_slave_0: entered promiscuous mode [ 137.146416][ T6629] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.153934][ T6629] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.162008][ T6629] bridge_slave_1: entered allmulticast mode [ 137.170291][ T6629] bridge_slave_1: entered promiscuous mode [ 137.285577][ T6631] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.316725][ T6631] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.334784][ T6631] bridge_slave_0: entered allmulticast mode [ 137.344820][ T6631] bridge_slave_0: entered promiscuous mode [ 137.355326][ T6631] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.362979][ T6631] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.370539][ T6631] bridge_slave_1: entered allmulticast mode [ 137.378717][ T6631] bridge_slave_1: entered promiscuous mode [ 137.412797][ T6629] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 137.471636][ T2105] hsr_slave_0: left promiscuous mode [ 137.478963][ T2105] hsr_slave_1: left promiscuous mode [ 137.485172][ T2105] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 137.493046][ T2105] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 137.502600][ T2105] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 137.510694][ T2105] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 137.520253][ T2105] bridge_slave_1: left allmulticast mode [ 137.525956][ T2105] bridge_slave_1: left promiscuous mode [ 137.532874][ T2105] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.546212][ T2105] bridge_slave_0: left allmulticast mode [ 137.553547][ T2105] bridge_slave_0: left promiscuous mode [ 137.559679][ T2105] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.589301][ T2105] veth1_macvtap: left promiscuous mode [ 137.595259][ T2105] veth0_macvtap: left promiscuous mode [ 137.601036][ T2105] veth1_vlan: left promiscuous mode [ 137.606651][ T2105] veth0_vlan: left promiscuous mode [ 137.989918][ T5794] Bluetooth: hci2: command tx timeout [ 138.148725][ T5794] Bluetooth: hci3: command tx timeout [ 138.174584][ T2105] team0 (unregistering): Port device team_slave_1 removed [ 138.218876][ T2105] team0 (unregistering): Port device team_slave_0 removed [ 138.258589][ T2105] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 138.301116][ T2105] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 138.514211][ T2105] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 138.721194][ T2105] bond0 (unregistering): Released all slaves [ 138.824878][ T6629] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 138.895149][ T6629] team0: Port device team_slave_0 added [ 138.905649][ T6631] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 138.920170][ T6631] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 138.952487][ T6629] team0: Port device team_slave_1 added [ 139.006169][ T6631] team0: Port device team_slave_0 added [ 139.069638][ T6629] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 139.076662][ T6629] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 139.112031][ T6629] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 139.128126][ T6631] team0: Port device team_slave_1 added [ 139.135676][ T6629] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 139.143461][ T6629] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 139.173512][ T6629] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 139.274821][ T6631] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 139.284597][ T6631] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 139.319418][ T6631] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 139.373233][ T6629] hsr_slave_0: entered promiscuous mode [ 139.382515][ T6629] hsr_slave_1: entered promiscuous mode [ 139.392723][ T6629] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 139.402963][ T6629] Cannot create hsr debugfs directory [ 139.414493][ T6631] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 139.424424][ T6631] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 139.457335][ T6631] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 139.657070][ T6631] hsr_slave_0: entered promiscuous mode [ 139.665087][ T6631] hsr_slave_1: entered promiscuous mode [ 139.677859][ T6631] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 139.685496][ T6631] Cannot create hsr debugfs directory [ 139.933580][ T6629] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 139.944441][ T6629] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 139.961322][ T6629] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 139.983309][ T6629] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 140.069799][ T5794] Bluetooth: hci2: command tx timeout [ 140.100068][ T6631] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 140.118887][ T6631] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 140.162207][ T6631] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 140.198601][ T6631] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 140.227921][ T5794] Bluetooth: hci3: command tx timeout [ 140.340892][ T6629] 8021q: adding VLAN 0 to HW filter on device bond0 [ 140.415465][ T6629] 8021q: adding VLAN 0 to HW filter on device team0 [ 140.459573][ T59] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.466879][ T59] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.489665][ T3432] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.496877][ T3432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.591003][ T6631] 8021q: adding VLAN 0 to HW filter on device bond0 [ 140.683153][ T6631] 8021q: adding VLAN 0 to HW filter on device team0 [ 140.704443][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.711774][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.730423][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.737781][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.171142][ T6629] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 141.296984][ T6631] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 141.738033][ T6629] veth0_vlan: entered promiscuous mode [ 141.771879][ T6629] veth1_vlan: entered promiscuous mode [ 141.846416][ T6629] veth0_macvtap: entered promiscuous mode [ 141.873011][ T6629] veth1_macvtap: entered promiscuous mode [ 141.938488][ T6631] veth0_vlan: entered promiscuous mode [ 141.957150][ T6629] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 141.971606][ T6629] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 141.984262][ T6629] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 141.996498][ T6629] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.006963][ T6629] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 142.024263][ T6629] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.038529][ T6629] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 142.061886][ T6629] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 142.073114][ T6629] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.086648][ T6629] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 142.107153][ T6629] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.123526][ T6629] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 142.136153][ T6629] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.148260][ T5794] Bluetooth: hci2: command tx timeout [ 142.156122][ T6629] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 142.179594][ T6631] veth1_vlan: entered promiscuous mode [ 142.202071][ T6629] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 142.222300][ T6629] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 142.247324][ T6629] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 142.256195][ T6629] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 142.307410][ T5794] Bluetooth: hci3: command tx timeout [ 142.390369][ T6631] veth0_macvtap: entered promiscuous mode [ 142.449295][ T6631] veth1_macvtap: entered promiscuous mode [ 142.517492][ T2105] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 142.525359][ T2105] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 142.536854][ T6631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 142.548420][ T6631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.571697][ T6631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 142.585157][ T6631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.595719][ T6631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 142.606558][ T6631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.616737][ T6631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 142.628220][ T6631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.640576][ T6631] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 142.686635][ T6631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 142.698192][ T6631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.709046][ T6631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 142.720131][ T6631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.730356][ T6631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 142.741017][ T6631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.751025][ T6631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 142.761585][ T6631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 142.773166][ T6631] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 142.785680][ T42] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 142.786423][ T6631] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 142.803415][ T42] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 142.815103][ T6631] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 142.825719][ T6631] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 142.835095][ T6631] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 143.052484][ T3432] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 143.084169][ T3432] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 143.208860][ T6804] netlink: 'syz.0.290': attribute type 10 has an invalid length. [ 143.283971][ T6804] team0: Port device dummy0 added [ 143.403146][ T6804] netlink: 'syz.0.290': attribute type 9 has an invalid length. [ 143.419401][ T3432] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 143.440966][ T6808] netlink: 'syz.0.290': attribute type 10 has an invalid length. [ 143.461412][ T3432] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 143.508478][ T6804] netlink: 209836 bytes leftover after parsing attributes in process `syz.0.290'. [ 143.579236][ T6808] team0: Port device dummy0 removed [ 143.594230][ T6808] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 144.379842][ T6833] netlink: 60 bytes leftover after parsing attributes in process `syz.0.286'. [ 144.649778][ T6833] netlink: 60 bytes leftover after parsing attributes in process `syz.0.286'. [ 144.703848][ T6837] netlink: 60 bytes leftover after parsing attributes in process `syz.0.286'. [ 144.738799][ T6838] netlink: 60 bytes leftover after parsing attributes in process `syz.0.286'. [ 145.161011][ T6849] netlink: 'syz.4.292': attribute type 8 has an invalid length. [ 145.185838][ T6835] syzkaller0: entered promiscuous mode [ 145.196605][ T6849] netlink: 'syz.4.292': attribute type 1 has an invalid length. [ 145.211262][ T6849] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.292'. [ 145.247283][ T6835] syzkaller0: entered allmulticast mode [ 146.940131][ T6854] netlink: 'syz.0.295': attribute type 10 has an invalid length. [ 146.987844][ T6854] bond0: (slave dummy0): Releasing backup interface [ 147.049072][ T6854] team0: Port device dummy0 added [ 147.065475][ T6857] netlink: 'syz.0.295': attribute type 10 has an invalid length. [ 147.143297][ T6857] team0: Port device dummy0 removed [ 147.162888][ T6857] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 147.329269][ T6866] netlink: 60 bytes leftover after parsing attributes in process `syz.4.305'. [ 147.405642][ T6866] netlink: 60 bytes leftover after parsing attributes in process `syz.4.305'. [ 147.463954][ T6871] netlink: 60 bytes leftover after parsing attributes in process `syz.4.305'. [ 147.516270][ T6872] netlink: 60 bytes leftover after parsing attributes in process `syz.4.305'. [ 149.191531][ T6908] FAULT_INJECTION: forcing a failure. [ 149.191531][ T6908] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 149.231398][ T6908] CPU: 0 PID: 6908 Comm: syz.4.307 Not tainted syzkaller #0 [ 149.238778][ T6908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 149.248877][ T6908] Call Trace: [ 149.252200][ T6908] [ 149.255164][ T6908] dump_stack_lvl+0x16c/0x230 [ 149.259916][ T6908] ? show_regs_print_info+0x20/0x20 [ 149.265169][ T6908] ? load_image+0x3b0/0x3b0 [ 149.269719][ T6908] ? __might_fault+0xaa/0x120 [ 149.274436][ T6908] ? __lock_acquire+0x7c80/0x7c80 [ 149.279508][ T6908] should_fail_ex+0x39d/0x4d0 [ 149.284243][ T6908] _copy_to_user+0x2f/0xa0 [ 149.288729][ T6908] bpf_obj_get_info_by_fd+0x108f/0x2d90 [ 149.294396][ T6908] ? __might_fault+0xaa/0x120 [ 149.299125][ T6908] ? verify_lock_unused+0x140/0x140 [ 149.304372][ T6908] ? bpf_map_get_fd_by_id+0x310/0x310 [ 149.309807][ T6908] ? get_pid_task+0x20/0x1e0 [ 149.314484][ T6908] ? __might_fault+0xaa/0x120 [ 149.319209][ T6908] ? __lock_acquire+0x7c80/0x7c80 [ 149.324259][ T6908] ? file_end_write+0x159/0x250 [ 149.329137][ T6908] ? __might_fault+0xaa/0x120 [ 149.333840][ T6908] ? __might_fault+0xc6/0x120 [ 149.338541][ T6908] ? __might_fault+0xaa/0x120 [ 149.343232][ T6908] ? bpf_lsm_bpf+0x9/0x10 [ 149.347611][ T6908] ? security_bpf+0x7e/0xa0 [ 149.352163][ T6908] __sys_bpf+0x781/0x800 [ 149.356425][ T6908] ? bpf_link_show_fdinfo+0x350/0x350 [ 149.361828][ T6908] ? lock_chain_count+0x20/0x20 [ 149.366709][ T6908] __x64_sys_bpf+0x7c/0x90 [ 149.371146][ T6908] do_syscall_64+0x55/0xb0 [ 149.375592][ T6908] ? clear_bhb_loop+0x40/0x90 [ 149.380287][ T6908] ? clear_bhb_loop+0x40/0x90 [ 149.384982][ T6908] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 149.390897][ T6908] RIP: 0033:0x7f2f1cd8f749 [ 149.395329][ T6908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 149.414945][ T6908] RSP: 002b:00007f2f1dca0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 149.423372][ T6908] RAX: ffffffffffffffda RBX: 00007f2f1cfe5fa0 RCX: 00007f2f1cd8f749 [ 149.431355][ T6908] RDX: 0000000000000010 RSI: 00002000000001c0 RDI: 000000000000000f [ 149.439348][ T6908] RBP: 00007f2f1dca0090 R08: 0000000000000000 R09: 0000000000000000 [ 149.447330][ T6908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 149.455450][ T6908] R13: 00007f2f1cfe6038 R14: 00007f2f1cfe5fa0 R15: 00007ffd46cad438 [ 149.463459][ T6908] [ 149.480691][ T6912] FAULT_INJECTION: forcing a failure. [ 149.480691][ T6912] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 149.494018][ T6912] CPU: 0 PID: 6912 Comm: syz.0.309 Not tainted syzkaller #0 [ 149.501353][ T6912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 149.511453][ T6912] Call Trace: [ 149.514776][ T6912] [ 149.517744][ T6912] dump_stack_lvl+0x16c/0x230 [ 149.522502][ T6912] ? show_regs_print_info+0x20/0x20 [ 149.527737][ T6912] ? load_image+0x3b0/0x3b0 [ 149.532273][ T6912] ? __might_fault+0xaa/0x120 [ 149.536979][ T6912] ? __lock_acquire+0x7c80/0x7c80 [ 149.542069][ T6912] should_fail_ex+0x39d/0x4d0 [ 149.546895][ T6912] _copy_from_iter+0x1d3/0x1290 [ 149.551794][ T6912] ? slab_post_alloc_hook+0x8a/0x4d0 [ 149.557162][ T6912] ? __virt_addr_valid+0x18c/0x540 [ 149.562324][ T6912] ? __lock_acquire+0x7c80/0x7c80 [ 149.567573][ T6912] ? rcu_is_watching+0x15/0xb0 [ 149.572401][ T6912] ? copyout_mc+0x70/0x70 [ 149.576780][ T6912] ? __virt_addr_valid+0x18c/0x540 [ 149.581947][ T6912] ? __virt_addr_valid+0x18c/0x540 [ 149.587121][ T6912] ? __virt_addr_valid+0x469/0x540 [ 149.592285][ T6912] ? __check_object_size+0x506/0xa30 [ 149.597710][ T6912] netlink_sendmsg+0x75c/0xbe0 [ 149.602545][ T6912] ? netlink_getsockopt+0x580/0x580 [ 149.607804][ T6912] ? aa_sock_msg_perm+0x94/0x150 [ 149.612787][ T6912] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 149.618126][ T6912] ? security_socket_sendmsg+0x80/0xa0 [ 149.623624][ T6912] ? netlink_getsockopt+0x580/0x580 [ 149.628873][ T6912] ____sys_sendmsg+0x5bf/0x950 [ 149.633705][ T6912] ? __asan_memset+0x22/0x40 [ 149.638344][ T6912] ? __sys_sendmsg_sock+0x30/0x30 [ 149.643417][ T6912] ? __import_iovec+0x5f2/0x860 [ 149.648323][ T6912] ? import_iovec+0x73/0xa0 [ 149.652872][ T6912] ___sys_sendmsg+0x220/0x290 [ 149.657602][ T6912] ? __sys_sendmsg+0x270/0x270 [ 149.658595][ T6906] syzkaller0: entered promiscuous mode [ 149.662422][ T6912] ? __lock_acquire+0x7c80/0x7c80 [ 149.672968][ T6912] __se_sys_sendmsg+0x1a5/0x270 [ 149.677871][ T6912] ? __x64_sys_sendmsg+0x80/0x80 [ 149.682882][ T6912] ? lockdep_hardirqs_on+0x98/0x150 [ 149.687305][ T6906] syzkaller0: entered allmulticast mode [ 149.688108][ T6912] do_syscall_64+0x55/0xb0 [ 149.698135][ T6912] ? clear_bhb_loop+0x40/0x90 [ 149.702854][ T6912] ? clear_bhb_loop+0x40/0x90 [ 149.707593][ T6912] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 149.713520][ T6912] RIP: 0033:0x7fa30198f749 [ 149.717968][ T6912] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 149.737621][ T6912] RSP: 002b:00007fa2ffbf6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 149.746104][ T6912] RAX: ffffffffffffffda RBX: 00007fa301be5fa0 RCX: 00007fa30198f749 [ 149.754130][ T6912] RDX: 0000000000000000 RSI: 0000200000000600 RDI: 0000000000000003 [ 149.762198][ T6912] RBP: 00007fa2ffbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 149.770225][ T6912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 149.778244][ T6912] R13: 00007fa301be6038 R14: 00007fa301be5fa0 R15: 00007ffc6c26c208 [ 149.786289][ T6912] [ 150.175375][ T6921] netlink: 60 bytes leftover after parsing attributes in process `syz.0.310'. [ 150.233659][ T6921] netlink: 60 bytes leftover after parsing attributes in process `syz.0.310'. [ 150.278865][ T6923] netlink: 60 bytes leftover after parsing attributes in process `syz.0.310'. [ 150.328568][ T6921] netlink: 60 bytes leftover after parsing attributes in process `syz.0.310'. [ 150.384043][ T6920] netlink: 'syz.5.311': attribute type 10 has an invalid length. [ 150.511526][ T6920] team0: Port device dummy0 added [ 150.636020][ T6931] netlink: 'syz.4.313': attribute type 9 has an invalid length. [ 150.652602][ T6931] netlink: 209836 bytes leftover after parsing attributes in process `syz.4.313'. [ 152.751127][ T6927] netlink: 'syz.4.313': attribute type 10 has an invalid length. [ 152.781201][ T6927] team0: Port device dummy0 added [ 152.800639][ T6924] netlink: 'syz.5.311': attribute type 10 has an invalid length. [ 152.845085][ T6924] team0: Port device dummy0 removed [ 152.878110][ T6924] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 152.893524][ T6928] netlink: 'syz.4.313': attribute type 10 has an invalid length. [ 152.913387][ T6949] FAULT_INJECTION: forcing a failure. [ 152.913387][ T6949] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 152.926973][ T6949] CPU: 1 PID: 6949 Comm: syz.3.320 Not tainted syzkaller #0 [ 152.934326][ T6949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 152.944432][ T6949] Call Trace: [ 152.947751][ T6949] [ 152.950723][ T6949] dump_stack_lvl+0x16c/0x230 [ 152.955467][ T6949] ? show_regs_print_info+0x20/0x20 [ 152.960823][ T6949] ? load_image+0x3b0/0x3b0 [ 152.965379][ T6949] ? __might_fault+0xaa/0x120 [ 152.970117][ T6949] ? __lock_acquire+0x7c80/0x7c80 [ 152.975195][ T6949] should_fail_ex+0x39d/0x4d0 [ 152.979950][ T6949] _copy_from_iter+0x1d3/0x1290 [ 152.984853][ T6949] ? slab_post_alloc_hook+0x8a/0x4d0 [ 152.990186][ T6949] ? __virt_addr_valid+0x18c/0x540 [ 152.995334][ T6949] ? __lock_acquire+0x7c80/0x7c80 [ 153.000386][ T6949] ? rcu_is_watching+0x15/0xb0 [ 153.005192][ T6949] ? copyout_mc+0x70/0x70 [ 153.009541][ T6949] ? __virt_addr_valid+0x18c/0x540 [ 153.014686][ T6949] ? __virt_addr_valid+0x18c/0x540 [ 153.019825][ T6949] ? __virt_addr_valid+0x469/0x540 [ 153.024966][ T6949] ? __check_object_size+0x506/0xa30 [ 153.030284][ T6949] netlink_sendmsg+0x75c/0xbe0 [ 153.035104][ T6949] ? netlink_getsockopt+0x580/0x580 [ 153.040450][ T6949] ? aa_sock_msg_perm+0x94/0x150 [ 153.045477][ T6949] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 153.050791][ T6949] ? security_socket_sendmsg+0x80/0xa0 [ 153.056261][ T6949] ? netlink_getsockopt+0x580/0x580 [ 153.061491][ T6949] ____sys_sendmsg+0x5bf/0x950 [ 153.066299][ T6949] ? __asan_memset+0x22/0x40 [ 153.070908][ T6949] ? __sys_sendmsg_sock+0x30/0x30 [ 153.075957][ T6949] ? __import_iovec+0x5f2/0x860 [ 153.080847][ T6949] ? import_iovec+0x73/0xa0 [ 153.085397][ T6949] ___sys_sendmsg+0x220/0x290 [ 153.090134][ T6949] ? __sys_sendmsg+0x270/0x270 [ 153.094954][ T6949] ? __lock_acquire+0x7c80/0x7c80 [ 153.100122][ T6949] __se_sys_sendmsg+0x1a5/0x270 [ 153.105013][ T6949] ? __x64_sys_sendmsg+0x80/0x80 [ 153.109993][ T6949] ? lockdep_hardirqs_on+0x98/0x150 [ 153.115206][ T6949] do_syscall_64+0x55/0xb0 [ 153.119658][ T6949] ? clear_bhb_loop+0x40/0x90 [ 153.124431][ T6949] ? clear_bhb_loop+0x40/0x90 [ 153.129126][ T6949] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 153.135035][ T6949] RIP: 0033:0x7fda7b38f749 [ 153.139473][ T6949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 153.159120][ T6949] RSP: 002b:00007fda7c315038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 153.167572][ T6949] RAX: ffffffffffffffda RBX: 00007fda7b5e5fa0 RCX: 00007fda7b38f749 [ 153.175600][ T6949] RDX: 0000000000000800 RSI: 0000200000001100 RDI: 0000000000000003 [ 153.183603][ T6949] RBP: 00007fda7c315090 R08: 0000000000000000 R09: 0000000000000000 [ 153.191660][ T6949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 153.199679][ T6949] R13: 00007fda7b5e6038 R14: 00007fda7b5e5fa0 R15: 00007ffccedcb088 [ 153.207707][ T6949] [ 153.243866][ T6928] team0: Port device dummy0 removed [ 153.280818][ T6928] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 153.313687][ T6945] netlink: 'syz.0.319': attribute type 10 has an invalid length. [ 153.330393][ T6945] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 153.376817][ T6945] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 153.389737][ T6945] bond0: (slave batadv_slave_0): Enslaving as an active interface with an up link [ 153.459430][ T6920] netlink: 'syz.5.311': attribute type 9 has an invalid length. [ 153.486765][ T6920] netlink: 209836 bytes leftover after parsing attributes in process `syz.5.311'. [ 153.677918][ T6962] netlink: 60 bytes leftover after parsing attributes in process `syz.4.323'. [ 153.687001][ T6962] netlink: 60 bytes leftover after parsing attributes in process `syz.4.323'. [ 153.711422][ T6932] netlink: 'syz.5.311': attribute type 9 has an invalid length. [ 153.718515][ T6962] netlink: 60 bytes leftover after parsing attributes in process `syz.4.323'. [ 153.728893][ T6932] netlink: 209836 bytes leftover after parsing attributes in process `syz.5.311'. [ 154.273779][ T6977] netlink: 'syz.0.327': attribute type 10 has an invalid length. [ 154.301509][ T6977] bond0: (slave dummy0): Releasing backup interface [ 154.353634][ T6977] team0: Port device dummy0 added [ 154.369439][ T6982] netlink: 'syz.0.327': attribute type 10 has an invalid length. [ 154.507991][ T6982] team0: Port device dummy0 removed [ 154.542913][ T6982] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 154.635431][ T6979] bond0: (slave dummy0): Releasing backup interface [ 154.655828][ T6979] team0: Port device dummy0 added [ 154.780893][ T6983] team0: Port device dummy0 removed [ 154.802495][ T6983] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 155.423849][ T7001] validate_nla: 6 callbacks suppressed [ 155.423887][ T7001] netlink: 'syz.0.333': attribute type 11 has an invalid length. [ 155.425216][ T7004] FAULT_INJECTION: forcing a failure. [ 155.425216][ T7004] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 155.455445][ T7001] __nla_validate_parse: 5 callbacks suppressed [ 155.455487][ T7001] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.333'. [ 155.492226][ T7004] CPU: 0 PID: 7004 Comm: syz.5.334 Not tainted syzkaller #0 [ 155.499599][ T7004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 155.509698][ T7004] Call Trace: [ 155.513013][ T7004] [ 155.515988][ T7004] dump_stack_lvl+0x16c/0x230 [ 155.520723][ T7004] ? show_regs_print_info+0x20/0x20 [ 155.525969][ T7004] ? load_image+0x3b0/0x3b0 [ 155.530520][ T7004] ? __might_fault+0xaa/0x120 [ 155.535239][ T7004] ? __lock_acquire+0x7c80/0x7c80 [ 155.540339][ T7004] should_fail_ex+0x39d/0x4d0 [ 155.545075][ T7004] _copy_to_user+0x2f/0xa0 [ 155.549540][ T7004] bpf_prog_test_run_raw_tp+0x4bc/0x640 [ 155.555149][ T7004] ? trace_bpf_test_finish+0x1a0/0x1a0 [ 155.560670][ T7004] ? trace_bpf_test_finish+0x1a0/0x1a0 [ 155.566184][ T7004] bpf_prog_test_run+0x321/0x390 [ 155.571183][ T7004] __sys_bpf+0x440/0x800 [ 155.571648][ T7002] netlink: 'syz.3.332': attribute type 9 has an invalid length. [ 155.575458][ T7004] ? bpf_link_show_fdinfo+0x350/0x350 [ 155.575503][ T7004] ? lock_chain_count+0x20/0x20 [ 155.584484][ T7002] netlink: 209836 bytes leftover after parsing attributes in process `syz.3.332'. [ 155.588567][ T7004] __x64_sys_bpf+0x7c/0x90 [ 155.588596][ T7004] do_syscall_64+0x55/0xb0 [ 155.588623][ T7004] ? clear_bhb_loop+0x40/0x90 [ 155.588645][ T7004] ? clear_bhb_loop+0x40/0x90 [ 155.588668][ T7004] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 155.588689][ T7004] RIP: 0033:0x7f30c6d8f749 [ 155.588708][ T7004] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 155.588724][ T7004] RSP: 002b:00007f30c7b42038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 155.588748][ T7004] RAX: ffffffffffffffda RBX: 00007f30c6fe5fa0 RCX: 00007f30c6d8f749 [ 155.588763][ T7004] RDX: 000000000000000c RSI: 0000200000000280 RDI: 000000000000000a [ 155.588776][ T7004] RBP: 00007f30c7b42090 R08: 0000000000000000 R09: 0000000000000000 [ 155.588788][ T7004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 155.588800][ T7004] R13: 00007f30c6fe6038 R14: 00007f30c6fe5fa0 R15: 00007ffc88b62b28 [ 155.588830][ T7004] [ 155.871947][ T6999] netlink: 'syz.3.332': attribute type 9 has an invalid length. [ 155.898267][ T6999] netlink: 209836 bytes leftover after parsing attributes in process `syz.3.332'. [ 156.013574][ T7015] netlink: 'syz.4.337': attribute type 8 has an invalid length. [ 156.043634][ T7015] netlink: 199848 bytes leftover after parsing attributes in process `syz.4.337'. [ 156.645495][ T7027] netlink: 'syz.5.342': attribute type 10 has an invalid length. [ 156.692004][ T7027] bond0: (slave dummy0): Releasing backup interface [ 156.711628][ T7027] team0: Port device dummy0 added [ 156.732600][ T7030] netlink: 'syz.5.342': attribute type 10 has an invalid length. [ 156.799424][ T7027] netlink: 'syz.5.342': attribute type 9 has an invalid length. [ 156.807520][ T7030] team0: Port device dummy0 removed [ 156.817113][ T7030] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 156.826241][ T7027] netlink: 209836 bytes leftover after parsing attributes in process `syz.5.342'. [ 156.850099][ T7032] netlink: 'syz.4.343': attribute type 10 has an invalid length. [ 156.888845][ T7032] bond0: (slave dummy0): Releasing backup interface [ 156.933197][ T7032] team0: Port device dummy0 added [ 156.983147][ T7033] netlink: 'syz.4.343': attribute type 10 has an invalid length. [ 157.029911][ T7033] team0: Port device dummy0 removed [ 157.039829][ T7033] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 157.075865][ T7041] netlink: 'syz.3.346': attribute type 39 has an invalid length. [ 157.113995][ T7036] netlink: 209836 bytes leftover after parsing attributes in process `syz.5.342'. [ 157.281475][ T7039] netlink: 209836 bytes leftover after parsing attributes in process `syz.4.343'. [ 157.385179][ T7042] netlink: 209836 bytes leftover after parsing attributes in process `syz.4.343'. [ 157.806953][ T7051] bond0: (slave dummy0): Releasing backup interface [ 157.825695][ T7051] team0: Port device dummy0 added [ 157.940339][ T7053] netlink: 209836 bytes leftover after parsing attributes in process `syz.0.350'. [ 158.027028][ T7051] team0: Port device dummy0 removed [ 158.064439][ T7051] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 158.224689][ T7063] netlink: 209836 bytes leftover after parsing attributes in process `syz.0.350'. [ 158.690065][ T7074] sctp: [Deprecated]: syz.3.357 (pid 7074) Use of struct sctp_assoc_value in delayed_ack socket option. [ 158.690065][ T7074] Use struct sctp_sack_info instead [ 159.111314][ T7080] bond0: (slave dummy0): Releasing backup interface [ 159.186838][ T7080] team0: Port device dummy0 added [ 159.590023][ T7094] FAULT_INJECTION: forcing a failure. [ 159.590023][ T7094] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 159.603525][ T7094] CPU: 1 PID: 7094 Comm: syz.4.365 Not tainted syzkaller #0 [ 159.610960][ T7094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 159.621298][ T7094] Call Trace: [ 159.624599][ T7094] [ 159.627551][ T7094] dump_stack_lvl+0x16c/0x230 [ 159.632256][ T7094] ? show_regs_print_info+0x20/0x20 [ 159.637479][ T7094] ? load_image+0x3b0/0x3b0 [ 159.642091][ T7094] ? __lock_acquire+0x7c80/0x7c80 [ 159.647142][ T7094] should_fail_ex+0x39d/0x4d0 [ 159.651856][ T7094] _copy_from_user+0x2f/0xe0 [ 159.656466][ T7094] __copy_msghdr+0x3bb/0x580 [ 159.661092][ T7094] ___sys_sendmsg+0x1a6/0x290 [ 159.665798][ T7094] ? __sys_sendmsg+0x270/0x270 [ 159.670610][ T7094] ? __lock_acquire+0x7c80/0x7c80 [ 159.675714][ T7094] __se_sys_sendmsg+0x1a5/0x270 [ 159.680621][ T7094] ? __x64_sys_sendmsg+0x80/0x80 [ 159.685617][ T7094] ? lockdep_hardirqs_on+0x98/0x150 [ 159.690850][ T7094] do_syscall_64+0x55/0xb0 [ 159.695293][ T7094] ? clear_bhb_loop+0x40/0x90 [ 159.699991][ T7094] ? clear_bhb_loop+0x40/0x90 [ 159.704696][ T7094] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 159.710610][ T7094] RIP: 0033:0x7f2f1cd8f749 [ 159.715051][ T7094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 159.734687][ T7094] RSP: 002b:00007f2f1dca0038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 159.743129][ T7094] RAX: ffffffffffffffda RBX: 00007f2f1cfe5fa0 RCX: 00007f2f1cd8f749 [ 159.751118][ T7094] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000007 [ 159.759112][ T7094] RBP: 00007f2f1dca0090 R08: 0000000000000000 R09: 0000000000000000 [ 159.767106][ T7094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 159.775092][ T7094] R13: 00007f2f1cfe6038 R14: 00007f2f1cfe5fa0 R15: 00007ffd46cad438 [ 159.783098][ T7094] [ 160.066468][ T7105] delete_channel: no stack [ 160.660260][ T7125] FAULT_INJECTION: forcing a failure. [ 160.660260][ T7125] name failslab, interval 1, probability 0, space 0, times 0 [ 160.677798][ T7125] CPU: 1 PID: 7125 Comm: syz.0.376 Not tainted syzkaller #0 [ 160.685158][ T7125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 160.695229][ T7125] Call Trace: [ 160.698665][ T7125] [ 160.701637][ T7125] dump_stack_lvl+0x16c/0x230 [ 160.706379][ T7125] ? show_regs_print_info+0x20/0x20 [ 160.711620][ T7125] ? load_image+0x3b0/0x3b0 [ 160.716165][ T7125] ? __might_sleep+0xe0/0xe0 [ 160.720803][ T7125] ? __lock_acquire+0x7c80/0x7c80 [ 160.725969][ T7125] ? mark_lock+0x94/0x320 [ 160.730335][ T7125] should_fail_ex+0x39d/0x4d0 [ 160.735040][ T7125] should_failslab+0x9/0x20 [ 160.739658][ T7125] slab_pre_alloc_hook+0x59/0x310 [ 160.744724][ T7125] ? __get_vm_area_node+0x125/0x370 [ 160.749942][ T7125] __kmem_cache_alloc_node+0x53/0x260 [ 160.755377][ T7125] ? __get_vm_area_node+0x125/0x370 [ 160.760604][ T7125] kmalloc_node_trace+0x26/0xe0 [ 160.765492][ T7125] __get_vm_area_node+0x125/0x370 [ 160.770561][ T7125] __vmalloc_node_range+0x36e/0x1320 [ 160.775874][ T7125] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 160.781458][ T7125] ? mark_lock+0x94/0x320 [ 160.785814][ T7125] ? __lock_acquire+0x1334/0x7c80 [ 160.790862][ T7125] ? verify_lock_unused+0x140/0x140 [ 160.796112][ T7125] ? free_vm_area+0x50/0x50 [ 160.800658][ T7125] ? end_current_label_crit_section+0x170/0x170 [ 160.807013][ T7125] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 160.812578][ T7125] __vmalloc+0x7a/0x90 [ 160.816671][ T7125] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 160.822236][ T7125] bpf_prog_alloc_no_stats+0x47/0x440 [ 160.827637][ T7125] ? bpf_prog_alloc+0x2b/0x1b0 [ 160.832444][ T7125] bpf_prog_alloc+0x3d/0x1b0 [ 160.837069][ T7125] bpf_prog_load+0x6b8/0x16d0 [ 160.841871][ T7125] ? map_freeze+0x420/0x420 [ 160.846406][ T7125] ? __might_fault+0xaa/0x120 [ 160.851141][ T7125] ? __lock_acquire+0x7c80/0x7c80 [ 160.856181][ T7125] ? file_end_write+0x159/0x250 [ 160.861055][ T7125] ? __might_fault+0xaa/0x120 [ 160.865744][ T7125] ? __might_fault+0xc6/0x120 [ 160.870453][ T7125] ? __might_fault+0xaa/0x120 [ 160.875404][ T7125] ? bpf_lsm_bpf+0x9/0x10 [ 160.879751][ T7125] ? security_bpf+0x7e/0xa0 [ 160.884280][ T7125] __sys_bpf+0x55a/0x800 [ 160.888539][ T7125] ? bpf_link_show_fdinfo+0x350/0x350 [ 160.893936][ T7125] ? lock_chain_count+0x20/0x20 [ 160.898827][ T7125] __x64_sys_bpf+0x7c/0x90 [ 160.903255][ T7125] do_syscall_64+0x55/0xb0 [ 160.907696][ T7125] ? clear_bhb_loop+0x40/0x90 [ 160.912397][ T7125] ? clear_bhb_loop+0x40/0x90 [ 160.917184][ T7125] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 160.923101][ T7125] RIP: 0033:0x7fa30198f749 [ 160.927536][ T7125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 160.947161][ T7125] RSP: 002b:00007fa2ffbf6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 160.955639][ T7125] RAX: ffffffffffffffda RBX: 00007fa301be5fa0 RCX: 00007fa30198f749 [ 160.963624][ T7125] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 160.971611][ T7125] RBP: 00007fa2ffbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 160.979617][ T7125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 160.987625][ T7125] R13: 00007fa301be6038 R14: 00007fa301be5fa0 R15: 00007ffc6c26c208 [ 160.995637][ T7125] [ 161.016325][ T7125] syz.0.376: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz0,mems_allowed=0-1 [ 161.041193][ T7125] CPU: 0 PID: 7125 Comm: syz.0.376 Not tainted syzkaller #0 [ 161.048564][ T7125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 161.058640][ T7125] Call Trace: [ 161.061936][ T7125] [ 161.064883][ T7125] dump_stack_lvl+0x16c/0x230 [ 161.069609][ T7125] ? show_regs_print_info+0x20/0x20 [ 161.074832][ T7125] ? load_image+0x3b0/0x3b0 [ 161.079386][ T7125] ? cpuset_print_current_mems_allowed+0x1f/0x360 [ 161.085919][ T7125] ? cpuset_print_current_mems_allowed+0x2e3/0x360 [ 161.092616][ T7125] warn_alloc+0x210/0x300 [ 161.096984][ T7125] ? __get_vm_area_node+0x125/0x370 [ 161.102235][ T7125] ? zone_watermark_ok_safe+0x230/0x230 [ 161.107804][ T7125] ? rcu_is_watching+0x15/0xb0 [ 161.112594][ T7125] ? __get_vm_area_node+0x356/0x370 [ 161.117826][ T7125] __vmalloc_node_range+0x393/0x1320 [ 161.123136][ T7125] ? mark_lock+0x94/0x320 [ 161.127493][ T7125] ? __lock_acquire+0x1334/0x7c80 [ 161.132534][ T7125] ? verify_lock_unused+0x140/0x140 [ 161.137766][ T7125] ? free_vm_area+0x50/0x50 [ 161.142290][ T7125] ? end_current_label_crit_section+0x170/0x170 [ 161.148556][ T7125] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 161.154124][ T7125] __vmalloc+0x7a/0x90 [ 161.158252][ T7125] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 161.163837][ T7125] bpf_prog_alloc_no_stats+0x47/0x440 [ 161.169230][ T7125] ? bpf_prog_alloc+0x2b/0x1b0 [ 161.174013][ T7125] bpf_prog_alloc+0x3d/0x1b0 [ 161.178669][ T7125] bpf_prog_load+0x6b8/0x16d0 [ 161.183374][ T7125] ? map_freeze+0x420/0x420 [ 161.187898][ T7125] ? __might_fault+0xaa/0x120 [ 161.192593][ T7125] ? __lock_acquire+0x7c80/0x7c80 [ 161.197638][ T7125] ? file_end_write+0x159/0x250 [ 161.202520][ T7125] ? __might_fault+0xaa/0x120 [ 161.207213][ T7125] ? __might_fault+0xc6/0x120 [ 161.211907][ T7125] ? __might_fault+0xaa/0x120 [ 161.216594][ T7125] ? bpf_lsm_bpf+0x9/0x10 [ 161.220945][ T7125] ? security_bpf+0x7e/0xa0 [ 161.225471][ T7125] __sys_bpf+0x55a/0x800 [ 161.229741][ T7125] ? bpf_link_show_fdinfo+0x350/0x350 [ 161.235146][ T7125] ? lock_chain_count+0x20/0x20 [ 161.240048][ T7125] __x64_sys_bpf+0x7c/0x90 [ 161.244486][ T7125] do_syscall_64+0x55/0xb0 [ 161.248924][ T7125] ? clear_bhb_loop+0x40/0x90 [ 161.253620][ T7125] ? clear_bhb_loop+0x40/0x90 [ 161.258402][ T7125] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 161.264312][ T7125] RIP: 0033:0x7fa30198f749 [ 161.268764][ T7125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.288408][ T7125] RSP: 002b:00007fa2ffbf6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 161.296845][ T7125] RAX: ffffffffffffffda RBX: 00007fa301be5fa0 RCX: 00007fa30198f749 [ 161.304843][ T7125] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 161.312828][ T7125] RBP: 00007fa2ffbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 161.321076][ T7125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 161.329060][ T7125] R13: 00007fa301be6038 R14: 00007fa301be5fa0 R15: 00007ffc6c26c208 [ 161.337062][ T7125] [ 161.343306][ T7125] Mem-Info: [ 161.346487][ T7125] active_anon:5792 inactive_anon:0 isolated_anon:0 [ 161.346487][ T7125] active_file:1438 inactive_file:39910 isolated_file:0 [ 161.346487][ T7125] unevictable:768 dirty:448 writeback:0 [ 161.346487][ T7125] slab_reclaimable:10409 slab_unreclaimable:96168 [ 161.346487][ T7125] mapped:24339 shmem:1373 pagetables:692 [ 161.346487][ T7125] sec_pagetables:0 bounce:0 [ 161.346487][ T7125] kernel_misc_reclaimable:0 [ 161.346487][ T7125] free:1358292 free_pcp:11019 free_cma:0 [ 161.398277][ T7125] Node 0 active_anon:23268kB inactive_anon:0kB active_file:5752kB inactive_file:159436kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:97356kB dirty:1792kB writeback:0kB shmem:3956kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:11536kB pagetables:2768kB sec_pagetables:0kB all_unreclaimable? no [ 161.435495][ T7125] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:1536kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB sec_pagetables:0kB all_unreclaimable? no [ 161.505402][ T7125] Node 0 DMA free:15360kB boost:0kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 161.544376][ T7125] lowmem_reserve[]: 0 2525 2526 2526 2526 [ 161.574546][ T7125] Node 0 DMA32 free:1526328kB boost:0kB min:34676kB low:43344kB high:52012kB reserved_highatomic:0KB active_anon:22720kB inactive_anon:0kB active_file:5752kB inactive_file:158104kB unevictable:1536kB writepending:1792kB present:3129332kB managed:2589600kB mlocked:0kB bounce:0kB free_pcp:28184kB local_pcp:9484kB free_cma:0kB [ 161.685280][ T7125] lowmem_reserve[]: 0 0 1 1 1 [ 161.690919][ T7125] Node 0 Normal free:4kB boost:0kB min:16kB low:20kB high:24kB reserved_highatomic:0KB active_anon:48kB inactive_anon:0kB active_file:0kB inactive_file:1332kB unevictable:0kB writepending:0kB present:1048576kB managed:1384kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 161.726443][ T7125] lowmem_reserve[]: 0 0 0 0 0 [ 161.735094][ T7125] Node 1 Normal free:3891028kB boost:0kB min:55208kB low:69008kB high:82808kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB writepending:0kB present:4194304kB managed:4117312kB mlocked:0kB bounce:0kB free_pcp:18244kB local_pcp:9604kB free_cma:0kB [ 161.769130][ T7125] lowmem_reserve[]: 0 0 0 0 0 [ 161.773948][ T7125] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 161.787412][ T7125] Node 0 DMA32: 2*4kB (UE) 2*8kB (UM) 2*16kB (UM) 2*32kB (UE) 1*64kB (U) 1*128kB (E) 5*256kB (UM) 8*512kB (UME) 5*1024kB (M) 6*2048kB (UME) 367*4096kB (M) = 1526328kB [ 161.815858][ T7125] Node 0 Normal: 1*4kB (M) 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4kB [ 161.828980][ T7125] Node 1 Normal: 235*4kB (UE) 37*8kB (UME) 28*16kB (UME) 56*32kB (UME) 15*64kB (UE) 6*128kB (UME) 1*256kB (E) 1*512kB (M) 0*1024kB 1*2048kB (E) 948*4096kB (UM) = 3891028kB [ 161.861201][ T7125] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 161.878381][ T7125] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 161.892625][ T7125] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 161.904078][ T7125] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 161.971254][ T7125] 42721 total pagecache pages [ 161.976165][ T7125] 0 pages in swap cache [ 162.006180][ T7125] Free swap = 124996kB [ 162.020797][ T7145] validate_nla: 13 callbacks suppressed [ 162.020817][ T7145] netlink: 'syz.4.383': attribute type 39 has an invalid length. [ 162.026423][ T7125] Total swap = 124996kB [ 162.026442][ T7125] 2097051 pages RAM [ 162.026454][ T7125] 0 pages HighMem/MovableOnly [ 162.026467][ T7125] 416137 pages reserved [ 162.026479][ T7125] 0 pages cma reserved [ 162.098375][ T7147] netlink: 'syz.5.384': attribute type 8 has an invalid length. [ 162.117100][ T7147] netlink: 'syz.5.384': attribute type 1 has an invalid length. [ 162.127461][ T7147] __nla_validate_parse: 2 callbacks suppressed [ 162.127480][ T7147] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.384'. [ 162.241452][ T2105] wlan1: Trigger new scan to find an IBSS to join [ 162.764431][ T7158] delete_channel: no stack [ 163.214516][ T7175] netlink: 129384 bytes leftover after parsing attributes in process `syz.4.392'. [ 163.322505][ T7176] cgroup: fork rejected by pids controller in /syz3 [ 163.716026][ T7286] netlink: 'syz.4.395': attribute type 8 has an invalid length. [ 163.733653][ T7286] netlink: 'syz.4.395': attribute type 1 has an invalid length. [ 163.780432][ T7286] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.395'. [ 164.075466][ T7292] netlink: 'syz.0.397': attribute type 39 has an invalid length. [ 164.154138][ T7299] netlink: 14 bytes leftover after parsing attributes in process `syz.4.398'. [ 164.318432][ T7299] bond0: (slave dummy0): Releasing backup interface [ 164.526194][ T59] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 164.741591][ T59] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 164.902315][ T59] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 165.026526][ T59] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 165.540618][ T7323] delete_channel: no stack [ 165.584714][ T7326] netlink: 'syz.4.406': attribute type 8 has an invalid length. [ 165.613183][ T7326] netlink: 'syz.4.406': attribute type 1 has an invalid length. [ 165.632776][ T7326] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.406'. [ 165.915546][ T7335] netlink: 60 bytes leftover after parsing attributes in process `syz.4.408'. [ 165.986970][ T7335] netlink: 60 bytes leftover after parsing attributes in process `syz.4.408'. [ 166.008384][ T7338] netlink: 60 bytes leftover after parsing attributes in process `syz.4.408'. [ 166.039660][ T7335] netlink: 60 bytes leftover after parsing attributes in process `syz.4.408'. [ 166.108630][ T5793] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 166.119536][ T5793] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 166.137728][ T5793] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 166.149753][ T5793] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 166.161917][ T5793] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 166.171115][ T5793] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 166.184026][ T7341] netlink: 'syz.0.409': attribute type 39 has an invalid length. [ 166.679416][ T7354] FAULT_INJECTION: forcing a failure. [ 166.679416][ T7354] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 166.707525][ T7354] CPU: 1 PID: 7354 Comm: syz.0.411 Not tainted syzkaller #0 [ 166.714905][ T7354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 166.725012][ T7354] Call Trace: [ 166.728343][ T7354] [ 166.731319][ T7354] dump_stack_lvl+0x16c/0x230 [ 166.736053][ T7354] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 166.742278][ T7354] ? show_regs_print_info+0x20/0x20 [ 166.747536][ T7354] ? load_image+0x3b0/0x3b0 [ 166.752096][ T7354] should_fail_ex+0x39d/0x4d0 [ 166.756828][ T7354] _copy_from_user+0x2f/0xe0 [ 166.761521][ T7354] __copy_msghdr+0x3bb/0x580 [ 166.766251][ T7354] ___sys_sendmsg+0x1a6/0x290 [ 166.770985][ T7354] ? __sys_sendmsg+0x270/0x270 [ 166.775874][ T7354] __se_sys_sendmsg+0x1a5/0x270 [ 166.780789][ T7354] ? __x64_sys_sendmsg+0x80/0x80 [ 166.785807][ T7354] ? syscall_enter_from_user_mode+0x2e/0x80 [ 166.791756][ T7354] do_syscall_64+0x55/0xb0 [ 166.796225][ T7354] ? clear_bhb_loop+0x40/0x90 [ 166.800952][ T7354] ? clear_bhb_loop+0x40/0x90 [ 166.805683][ T7354] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 166.811630][ T7354] RIP: 0033:0x7fa30198f749 [ 166.816097][ T7354] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 166.835762][ T7354] RSP: 002b:00007fa2ffbf6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 166.844255][ T7354] RAX: ffffffffffffffda RBX: 00007fa301be5fa0 RCX: 00007fa30198f749 [ 166.852287][ T7354] RDX: 0000000020000810 RSI: 0000200000000100 RDI: 0000000000000008 [ 166.860396][ T7354] RBP: 00007fa2ffbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 166.868420][ T7354] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 166.876530][ T7354] R13: 00007fa301be6038 R14: 00007fa301be5fa0 R15: 00007ffc6c26c208 [ 166.884663][ T7354] [ 167.189291][ T42] wlan1: Trigger new scan to find an IBSS to join [ 167.460340][ T7379] netlink: 'syz.5.416': attribute type 8 has an invalid length. [ 167.505210][ T7379] netlink: 199848 bytes leftover after parsing attributes in process `syz.5.416'. [ 167.660951][ T59] hsr_slave_0: left promiscuous mode [ 167.682023][ T59] hsr_slave_1: left promiscuous mode [ 167.718262][ T59] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 167.749894][ T59] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 167.786680][ T59] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 167.801659][ T59] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 167.813617][ T59] bridge0: port 3(team0) entered disabled state [ 167.845938][ T59] bridge_slave_1: left allmulticast mode [ 167.856861][ T59] bridge_slave_1: left promiscuous mode [ 167.908046][ T59] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.952850][ T59] bridge_slave_0: left allmulticast mode [ 167.968166][ T59] bridge_slave_0: left promiscuous mode [ 167.979054][ T59] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.091088][ T59] veth1_macvtap: left promiscuous mode [ 168.096849][ T59] veth0_macvtap: left promiscuous mode [ 168.108653][ T59] veth1_vlan: left promiscuous mode [ 168.114136][ T59] veth0_vlan: left promiscuous mode [ 168.140518][ T11] wlan1: Creating new IBSS network, BSSID 62:b3:39:30:c4:17 [ 168.227660][ T5794] Bluetooth: hci1: command tx timeout [ 168.834930][ T59] team_slave_1 (unregistering): left promiscuous mode [ 168.842202][ T59] team_slave_1 (unregistering): left allmulticast mode [ 168.855652][ T59] team0 (unregistering): Port device team_slave_1 removed [ 168.897313][ T59] team_slave_0 (unregistering): left promiscuous mode [ 168.904152][ T59] team_slave_0 (unregistering): left allmulticast mode [ 168.915369][ T59] team0 (unregistering): Port device team_slave_0 removed [ 168.956256][ T59] .þ (unregistering): (slave bond_slave_1): Releasing backup interface [ 169.000490][ T59] .þ (unregistering): (slave bond_slave_0): Releasing backup interface [ 169.223492][ T59] .þ (unregistering): (slave dummy0): Releasing backup interface [ 169.448655][ T59] .þ (unregistering): Released all slaves [ 169.525567][ T7384] netlink: 'syz.0.419': attribute type 39 has an invalid length. [ 169.533998][ T7389] netlink: 14 bytes leftover after parsing attributes in process `syz.5.420'. [ 169.566054][ T7389] bond0: (slave dummy0): Releasing backup interface [ 169.616891][ T7402] netlink: 60 bytes leftover after parsing attributes in process `syz.0.422'. [ 169.640307][ T7402] netlink: 60 bytes leftover after parsing attributes in process `syz.0.422'. [ 169.669575][ T7402] netlink: 60 bytes leftover after parsing attributes in process `syz.0.422'. [ 169.689341][ T7402] netlink: 60 bytes leftover after parsing attributes in process `syz.0.422'. [ 169.796939][ T7340] chnl_net:caif_netlink_parms(): no params data found [ 170.249406][ T7425] FAULT_INJECTION: forcing a failure. [ 170.249406][ T7425] name failslab, interval 1, probability 0, space 0, times 0 [ 170.279618][ T7425] CPU: 0 PID: 7425 Comm: syz.0.427 Not tainted syzkaller #0 [ 170.286993][ T7425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 170.287405][ T7340] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.297066][ T7425] Call Trace: [ 170.297078][ T7425] [ 170.297087][ T7425] dump_stack_lvl+0x16c/0x230 [ 170.315116][ T7425] ? show_regs_print_info+0x20/0x20 [ 170.320382][ T7425] ? load_image+0x3b0/0x3b0 [ 170.325012][ T7425] ? __might_sleep+0xe0/0xe0 [ 170.329667][ T7425] ? __lock_acquire+0x7c80/0x7c80 [ 170.334749][ T7425] ? mark_lock+0x94/0x320 [ 170.339128][ T7425] should_fail_ex+0x39d/0x4d0 [ 170.343867][ T7425] should_failslab+0x9/0x20 [ 170.348426][ T7425] slab_pre_alloc_hook+0x59/0x310 [ 170.353517][ T7425] ? __get_vm_area_node+0x125/0x370 [ 170.358767][ T7425] __kmem_cache_alloc_node+0x53/0x260 [ 170.364205][ T7425] ? __get_vm_area_node+0x125/0x370 [ 170.365998][ T7340] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.369432][ T7425] kmalloc_node_trace+0x26/0xe0 [ 170.369469][ T7425] __get_vm_area_node+0x125/0x370 [ 170.369513][ T7425] __vmalloc_node_range+0x36e/0x1320 [ 170.391763][ T7425] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 170.397357][ T7425] ? mark_lock+0x94/0x320 [ 170.398808][ T7340] bridge_slave_0: entered allmulticast mode [ 170.401755][ T7425] ? __lock_acquire+0x1334/0x7c80 [ 170.412742][ T7425] ? verify_lock_unused+0x140/0x140 [ 170.418006][ T7425] ? free_vm_area+0x50/0x50 [ 170.422566][ T7425] ? end_current_label_crit_section+0x170/0x170 [ 170.425378][ T7340] bridge_slave_0: entered promiscuous mode [ 170.428842][ T7425] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 170.428871][ T7425] __vmalloc+0x7a/0x90 [ 170.428897][ T7425] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 170.428921][ T7425] bpf_prog_alloc_no_stats+0x47/0x440 [ 170.455486][ T7425] ? bpf_prog_alloc+0x2b/0x1b0 [ 170.460313][ T7425] bpf_prog_alloc+0x3d/0x1b0 [ 170.464948][ T7425] bpf_prog_load+0x6b8/0x16d0 [ 170.468552][ T7340] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.469661][ T7425] ? map_freeze+0x420/0x420 [ 170.469693][ T7425] ? __might_fault+0xaa/0x120 [ 170.476963][ T7340] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.481214][ T7425] ? __lock_acquire+0x7c80/0x7c80 [ 170.481242][ T7425] ? file_end_write+0x159/0x250 [ 170.481272][ T7425] ? __might_fault+0xaa/0x120 [ 170.488602][ T7340] bridge_slave_1: entered allmulticast mode [ 170.492971][ T7425] ? __might_fault+0xc6/0x120 [ 170.518243][ T7425] ? __might_fault+0xaa/0x120 [ 170.520117][ T7430] netlink: 'syz.4.428': attribute type 8 has an invalid length. [ 170.522956][ T7425] ? bpf_lsm_bpf+0x9/0x10 [ 170.532419][ T7340] bridge_slave_1: entered promiscuous mode [ 170.534955][ T7425] ? security_bpf+0x7e/0xa0 [ 170.545344][ T7425] __sys_bpf+0x55a/0x800 [ 170.549730][ T7425] ? bpf_link_show_fdinfo+0x350/0x350 [ 170.555159][ T7425] ? lock_chain_count+0x20/0x20 [ 170.560069][ T7425] __x64_sys_bpf+0x7c/0x90 [ 170.564529][ T7425] do_syscall_64+0x55/0xb0 [ 170.568411][ T7430] netlink: 199848 bytes leftover after parsing attributes in process `syz.4.428'. [ 170.568971][ T7425] ? clear_bhb_loop+0x40/0x90 [ 170.583083][ T7425] ? clear_bhb_loop+0x40/0x90 [ 170.587812][ T7425] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 170.593759][ T7425] RIP: 0033:0x7fa30198f749 [ 170.598223][ T7425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 170.617886][ T7425] RSP: 002b:00007fa2ffbf6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 170.626451][ T7425] RAX: ffffffffffffffda RBX: 00007fa301be5fa0 RCX: 00007fa30198f749 [ 170.634474][ T7425] RDX: 0000000000000094 RSI: 0000200000000140 RDI: 0000000000000005 [ 170.642504][ T7425] RBP: 00007fa2ffbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 170.650523][ T7425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 170.658543][ T7425] R13: 00007fa301be6038 R14: 00007fa301be5fa0 R15: 00007ffc6c26c208 [ 170.666572][ T7425] [ 170.679484][ T5794] Bluetooth: hci1: command tx timeout [ 170.812140][ T7340] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 170.823437][ T7435] netlink: 9286 bytes leftover after parsing attributes in process `syz.5.429'. [ 170.876206][ T7340] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 170.977006][ T7436] netlink: 'syz.0.430': attribute type 39 has an invalid length. [ 171.046244][ T7340] team0: Port device team_slave_0 added [ 171.078303][ T7340] team0: Port device team_slave_1 added [ 171.190135][ T7340] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 171.213820][ T7340] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 171.255083][ T7340] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 171.270381][ T7340] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 171.278945][ T7340] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 171.306542][ T7340] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 171.449641][ T7340] hsr_slave_0: entered promiscuous mode [ 171.476557][ T7340] hsr_slave_1: entered promiscuous mode [ 171.552423][ T7454] netlink: 60 bytes leftover after parsing attributes in process `syz.0.433'. [ 171.584642][ T7454] netlink: 60 bytes leftover after parsing attributes in process `syz.0.433'. [ 172.344890][ T7466] delete_channel: no stack [ 172.375467][ T7477] team0: Port device dummy0 removed [ 172.709373][ T5794] Bluetooth: hci1: command tx timeout [ 172.777550][ T7486] netlink: 'syz.4.440': attribute type 39 has an invalid length. [ 172.846799][ T7340] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 172.877865][ T7488] netlink: 'syz.0.439': attribute type 8 has an invalid length. [ 172.885816][ T7488] __nla_validate_parse: 3 callbacks suppressed [ 172.885832][ T7488] netlink: 199848 bytes leftover after parsing attributes in process `syz.0.439'. [ 172.984731][ T7340] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 173.033915][ T7340] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 173.132797][ T7340] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 173.525010][ T7340] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.558825][ T7505] netlink: 60 bytes leftover after parsing attributes in process `syz.4.443'. [ 173.604762][ T7505] netlink: 60 bytes leftover after parsing attributes in process `syz.4.443'. [ 173.636521][ T7505] netlink: 60 bytes leftover after parsing attributes in process `syz.4.443'. [ 173.679552][ T7340] 8021q: adding VLAN 0 to HW filter on device team0 [ 173.713710][ T2105] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.721015][ T2105] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.746251][ T2105] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.753520][ T2105] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.561597][ T7340] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 174.788247][ T5794] Bluetooth: hci1: command tx timeout [ 174.809332][ T7340] veth0_vlan: entered promiscuous mode [ 174.865391][ T7340] veth1_vlan: entered promiscuous mode [ 174.934336][ T7535] FAULT_INJECTION: forcing a failure. [ 174.934336][ T7535] name failslab, interval 1, probability 0, space 0, times 0 [ 174.966599][ T7340] veth0_macvtap: entered promiscuous mode [ 174.974053][ T7535] CPU: 0 PID: 7535 Comm: syz.0.448 Not tainted syzkaller #0 [ 174.981421][ T7535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 174.991537][ T7535] Call Trace: [ 174.994892][ T7535] [ 174.997867][ T7535] dump_stack_lvl+0x16c/0x230 [ 175.002617][ T7535] ? show_regs_print_info+0x20/0x20 [ 175.007875][ T7535] ? load_image+0x3b0/0x3b0 [ 175.012436][ T7535] ? __might_sleep+0xe0/0xe0 [ 175.017083][ T7535] ? __lock_acquire+0x7c80/0x7c80 [ 175.022185][ T7535] should_fail_ex+0x39d/0x4d0 [ 175.026919][ T7535] should_failslab+0x9/0x20 [ 175.031473][ T7535] slab_pre_alloc_hook+0x59/0x310 [ 175.036548][ T7535] kmem_cache_alloc_node+0x60/0x330 [ 175.041776][ T7535] ? __alloc_skb+0x108/0x2c0 [ 175.046398][ T7535] __alloc_skb+0x108/0x2c0 [ 175.050842][ T7535] alloc_skb_with_frags+0xca/0x7c0 [ 175.055978][ T7535] ? trace_event_raw_event_lock_acquire+0x2a0/0x2a0 [ 175.062680][ T7535] ? perf_trace_lock_acquire+0xfb/0x3e0 [ 175.068260][ T7535] sock_alloc_send_pskb+0x857/0x990 [ 175.073520][ T7535] ? sock_kzfree_s+0x50/0x50 [ 175.078196][ T7535] ? do_raw_spin_lock+0x121/0x2c0 [ 175.083268][ T7535] ? __rwlock_init+0x150/0x150 [ 175.088074][ T7535] ? do_raw_spin_unlock+0x121/0x230 [ 175.093648][ T7535] unix_dgram_sendmsg+0x5a1/0x1720 [ 175.098877][ T7535] ? verify_lock_unused+0x140/0x140 [ 175.104114][ T7535] ? perf_trace_lock_acquire+0xfb/0x3e0 [ 175.109715][ T7535] ? aa_sk_perm+0x7fc/0x930 [ 175.114300][ T7535] ? unix_dgram_poll+0x670/0x670 [ 175.119261][ T7535] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 175.125724][ T7535] ? aa_sock_msg_perm+0x94/0x150 [ 175.130684][ T7535] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 175.136000][ T7535] ? security_socket_sendmsg+0x80/0xa0 [ 175.141498][ T7535] ? unix_dgram_poll+0x670/0x670 [ 175.146476][ T7535] ____sys_sendmsg+0x5bf/0x950 [ 175.151282][ T7535] ? __asan_memset+0x22/0x40 [ 175.155926][ T7535] ? __sys_sendmsg_sock+0x30/0x30 [ 175.161107][ T7535] ? __import_iovec+0x3fa/0x860 [ 175.166024][ T7535] ? import_iovec+0x73/0xa0 [ 175.170578][ T7535] ___sys_sendmsg+0x220/0x290 [ 175.175291][ T7535] ? __sys_sendmsg+0x270/0x270 [ 175.180118][ T7535] ? __lock_acquire+0x7c80/0x7c80 [ 175.185213][ T7535] __se_sys_sendmsg+0x1a5/0x270 [ 175.190109][ T7535] ? __x64_sys_sendmsg+0x80/0x80 [ 175.195138][ T7535] ? lockdep_hardirqs_on+0x98/0x150 [ 175.200374][ T7535] do_syscall_64+0x55/0xb0 [ 175.204826][ T7535] ? clear_bhb_loop+0x40/0x90 [ 175.209533][ T7535] ? clear_bhb_loop+0x40/0x90 [ 175.214262][ T7535] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 175.220275][ T7535] RIP: 0033:0x7fa30198f749 [ 175.224706][ T7535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.244342][ T7535] RSP: 002b:00007fa2ffbf6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 175.252776][ T7535] RAX: ffffffffffffffda RBX: 00007fa301be5fa0 RCX: 00007fa30198f749 [ 175.260764][ T7535] RDX: 0000000020000000 RSI: 0000200000000100 RDI: 0000000000000009 [ 175.268751][ T7535] RBP: 00007fa2ffbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 175.276739][ T7535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.284727][ T7535] R13: 00007fa301be6038 R14: 00007fa301be5fa0 R15: 00007ffc6c26c208 [ 175.292738][ T7535] [ 175.336689][ T7340] veth1_macvtap: entered promiscuous mode [ 175.401506][ T7340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 175.437222][ T7340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.457340][ T7340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 175.497769][ T7340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.545249][ T7340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 175.595043][ T7340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.612749][ T7340] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 175.651534][ T7340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 175.692235][ T7548] netlink: 'syz.5.450': attribute type 8 has an invalid length. [ 175.695909][ T7340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.710847][ T7548] netlink: 'syz.5.450': attribute type 1 has an invalid length. [ 175.729136][ T7548] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.450'. [ 175.759501][ T7340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 175.792638][ T7340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.822470][ T7340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 175.844211][ T7340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.865127][ T7340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 175.887651][ T7340] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 175.916983][ T7340] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 175.954996][ T7549] netlink: 'syz.0.449': attribute type 39 has an invalid length. [ 175.986233][ T7559] FAULT_INJECTION: forcing a failure. [ 175.986233][ T7559] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 175.987099][ T7558] netlink: 'syz.4.452': attribute type 23 has an invalid length. [ 176.023623][ T7340] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 176.049729][ T7559] CPU: 1 PID: 7559 Comm: syz.4.452 Not tainted syzkaller #0 [ 176.053482][ T7340] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 176.057097][ T7559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 176.075909][ T7559] Call Trace: [ 176.079247][ T7559] [ 176.082228][ T7559] dump_stack_lvl+0x16c/0x230 [ 176.086976][ T7559] ? show_regs_print_info+0x20/0x20 [ 176.092242][ T7559] ? load_image+0x3b0/0x3b0 [ 176.092504][ T7340] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 176.096803][ T7559] ? __might_fault+0xaa/0x120 [ 176.096833][ T7559] ? __lock_acquire+0x7c80/0x7c80 [ 176.115301][ T7559] ? perf_trace_lock_acquire+0x32a/0x3e0 [ 176.121014][ T7559] should_fail_ex+0x39d/0x4d0 [ 176.125773][ T7559] _copy_from_user+0x2f/0xe0 [ 176.130428][ T7559] ___sys_sendmsg+0x159/0x290 [ 176.135191][ T7559] ? __sys_sendmsg+0x270/0x270 [ 176.138720][ T7340] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 176.140091][ T7559] ? __lock_acquire+0x7c80/0x7c80 [ 176.153911][ T7559] __se_sys_sendmsg+0x1a5/0x270 [ 176.158840][ T7559] ? __x64_sys_sendmsg+0x80/0x80 [ 176.164153][ T7559] ? lockdep_hardirqs_on+0x98/0x150 [ 176.169432][ T7559] do_syscall_64+0x55/0xb0 [ 176.173919][ T7559] ? clear_bhb_loop+0x40/0x90 [ 176.178657][ T7559] ? clear_bhb_loop+0x40/0x90 [ 176.183402][ T7559] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 176.189358][ T7559] RIP: 0033:0x7f2f1cd8f749 [ 176.193835][ T7559] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 176.213514][ T7559] RSP: 002b:00007f2f1dc7f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 176.222009][ T7559] RAX: ffffffffffffffda RBX: 00007f2f1cfe6090 RCX: 00007f2f1cd8f749 [ 176.230057][ T7559] RDX: 0000000000000000 RSI: 0000200000000600 RDI: 000000000000000b [ 176.238177][ T7559] RBP: 00007f2f1dc7f090 R08: 0000000000000000 R09: 0000000000000000 [ 176.246292][ T7559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 176.254319][ T7559] R13: 00007f2f1cfe6128 R14: 00007f2f1cfe6090 R15: 00007ffd46cad438 [ 176.262387][ T7559] [ 176.473798][ T7563] netlink: 'syz.0.453': attribute type 23 has an invalid length. [ 176.572636][ T59] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 176.582378][ T7563] netlink: 'syz.0.453': attribute type 10 has an invalid length. [ 176.607320][ T59] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 176.790250][ T7563] bond0: (slave syz_tun): Enslaving as an active interface with an up link [ 176.893388][ T42] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 176.916542][ T42] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 176.930852][ T7563] syz.0.453 (7563) used greatest stack depth: 18632 bytes left [ 177.048858][ T7573] netlink: 'syz.4.457': attribute type 10 has an invalid length. [ 177.071570][ T7573] netlink: 'syz.4.457': attribute type 10 has an invalid length. [ 177.092122][ T7573] netlink: 209836 bytes leftover after parsing attributes in process `syz.4.457'. [ 177.173150][ T7574] netlink: 209836 bytes leftover after parsing attributes in process `syz.4.457'. [ 178.377485][ T7584] validate_nla: 4 callbacks suppressed [ 178.377507][ T7584] netlink: 'syz.3.461': attribute type 39 has an invalid length. [ 178.518266][ T7589] netlink: 'syz.5.463': attribute type 8 has an invalid length. [ 178.539496][ T7589] netlink: 'syz.5.463': attribute type 1 has an invalid length. [ 178.554746][ T7589] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.463'. [ 180.242772][ T7606] netlink: 'syz.5.470': attribute type 23 has an invalid length. [ 180.259401][ T7600] delete_channel: no stack [ 180.295731][ T7606] netlink: 'syz.5.470': attribute type 10 has an invalid length. [ 180.461518][ T7606] bond0: (slave syz_tun): Enslaving as an active interface with an up link [ 180.500436][ T7610] netlink: 112 bytes leftover after parsing attributes in process `syz.4.471'. [ 180.641133][ T7612] netlink: 'syz.3.472': attribute type 10 has an invalid length. [ 180.687355][ T7617] netlink: 'syz.4.474': attribute type 8 has an invalid length. [ 180.712844][ T7612] team0: Port device dummy0 added [ 180.719299][ T7617] netlink: 199848 bytes leftover after parsing attributes in process `syz.4.474'. [ 180.742585][ T7615] netlink: 'syz.3.472': attribute type 10 has an invalid length. [ 180.830698][ T7612] netlink: 'syz.3.472': attribute type 9 has an invalid length. [ 180.887873][ T7612] netlink: 209836 bytes leftover after parsing attributes in process `syz.3.472'. [ 180.909661][ T7615] team0: Port device dummy0 removed [ 180.961813][ T7625] FAULT_INJECTION: forcing a failure. [ 180.961813][ T7625] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 180.964091][ T7615] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 180.986183][ T7625] CPU: 1 PID: 7625 Comm: syz.0.478 Not tainted syzkaller #0 [ 180.993608][ T7625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 181.003770][ T7625] Call Trace: [ 181.007124][ T7625] [ 181.010134][ T7625] dump_stack_lvl+0x16c/0x230 [ 181.014927][ T7625] ? show_regs_print_info+0x20/0x20 [ 181.020236][ T7625] ? load_image+0x3b0/0x3b0 [ 181.024835][ T7625] ? __might_fault+0xaa/0x120 [ 181.029605][ T7625] ? __lock_acquire+0x7c80/0x7c80 [ 181.034742][ T7625] should_fail_ex+0x39d/0x4d0 [ 181.039547][ T7625] _copy_from_user+0x2f/0xe0 [ 181.044243][ T7625] ___sys_sendmsg+0x159/0x290 [ 181.049031][ T7625] ? __sys_sendmsg+0x270/0x270 [ 181.054003][ T7625] ? __lock_acquire+0x7c80/0x7c80 [ 181.059254][ T7625] __se_sys_sendmsg+0x1a5/0x270 [ 181.064236][ T7625] ? __x64_sys_sendmsg+0x80/0x80 [ 181.069355][ T7625] ? lockdep_hardirqs_on+0x98/0x150 [ 181.074656][ T7625] do_syscall_64+0x55/0xb0 [ 181.079152][ T7625] ? clear_bhb_loop+0x40/0x90 [ 181.083915][ T7625] ? clear_bhb_loop+0x40/0x90 [ 181.088689][ T7625] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 181.094660][ T7625] RIP: 0033:0x7fa30198f749 [ 181.099159][ T7625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 181.118866][ T7625] RSP: 002b:00007fa2ffbf6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 181.127402][ T7625] RAX: ffffffffffffffda RBX: 00007fa301be5fa0 RCX: 00007fa30198f749 [ 181.135591][ T7625] RDX: 0900000000000000 RSI: 0000200000000500 RDI: 0000000000000004 [ 181.143657][ T7625] RBP: 00007fa2ffbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 181.151712][ T7625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 181.159779][ T7625] R13: 00007fa301be6038 R14: 00007fa301be5fa0 R15: 00007ffc6c26c208 [ 181.167917][ T7625] [ 181.224371][ T7627] syz.4.477 uses obsolete (PF_INET,SOCK_PACKET) [ 181.597619][ T7623] netlink: 'syz.3.472': attribute type 9 has an invalid length. [ 181.638500][ T7623] netlink: 209836 bytes leftover after parsing attributes in process `syz.3.472'. [ 182.466921][ T7648] netlink: 209836 bytes leftover after parsing attributes in process `syz.3.481'. [ 182.484806][ T7651] netlink: 199848 bytes leftover after parsing attributes in process `syz.4.485'. [ 184.028188][ T7638] validate_nla: 2 callbacks suppressed [ 184.028204][ T7638] netlink: 'syz.3.481': attribute type 10 has an invalid length. [ 184.047487][ T7638] bond0: (slave dummy0): Releasing backup interface [ 184.063748][ T7638] team0: Port device dummy0 added [ 184.080446][ T7644] netlink: 'syz.3.481': attribute type 10 has an invalid length. [ 184.120620][ T7644] team0: Port device dummy0 removed [ 184.144956][ T7644] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 184.154895][ T7646] netlink: 'syz.5.484': attribute type 10 has an invalid length. [ 184.188309][ T7649] netlink: 'syz.5.484': attribute type 10 has an invalid length. [ 184.253563][ T7652] netlink: 'syz.3.481': attribute type 9 has an invalid length. [ 184.294545][ T7652] netlink: 209836 bytes leftover after parsing attributes in process `syz.3.481'. [ 184.601617][ T7653] netlink: 'syz.5.484': attribute type 9 has an invalid length. [ 184.642966][ T7653] netlink: 209836 bytes leftover after parsing attributes in process `syz.5.484'. [ 184.837391][ T7661] netlink: 'syz.0.487': attribute type 5 has an invalid length. [ 184.847645][ T7661] netlink: 'syz.0.487': attribute type 15 has an invalid length. [ 184.907446][ T7654] netlink: 'syz.5.484': attribute type 9 has an invalid length. [ 184.937095][ T7654] netlink: 209836 bytes leftover after parsing attributes in process `syz.5.484'. [ 185.397604][ T7673] netlink: 'syz.5.491': attribute type 10 has an invalid length. [ 185.442341][ T7673] netlink: 209836 bytes leftover after parsing attributes in process `syz.5.491'. [ 185.583680][ T7677] netlink: 209836 bytes leftover after parsing attributes in process `syz.5.491'. [ 185.630823][ T7680] FAULT_INJECTION: forcing a failure. [ 185.630823][ T7680] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 185.662177][ T7680] CPU: 1 PID: 7680 Comm: syz.0.493 Not tainted syzkaller #0 [ 185.669551][ T7680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 185.679665][ T7680] Call Trace: [ 185.682990][ T7680] [ 185.685957][ T7680] dump_stack_lvl+0x16c/0x230 [ 185.690689][ T7680] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 185.696890][ T7680] ? show_regs_print_info+0x20/0x20 [ 185.702112][ T7680] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 185.708326][ T7680] should_fail_ex+0x39d/0x4d0 [ 185.713066][ T7680] _copy_from_user+0x2f/0xe0 [ 185.717714][ T7680] __copy_msghdr+0x3bb/0x580 [ 185.722349][ T7680] ___sys_sendmsg+0x1a6/0x290 [ 185.727091][ T7680] ? __sys_sendmsg+0x270/0x270 [ 185.731905][ T7680] ? seqcount_lockdep_reader_access+0x160/0x1c0 [ 185.738196][ T7680] __se_sys_sendmsg+0x1a5/0x270 [ 185.743074][ T7680] ? __x64_sys_sendmsg+0x80/0x80 [ 185.748052][ T7680] ? lockdep_hardirqs_on+0x98/0x150 [ 185.753270][ T7680] do_syscall_64+0x55/0xb0 [ 185.757707][ T7680] ? clear_bhb_loop+0x40/0x90 [ 185.762402][ T7680] ? clear_bhb_loop+0x40/0x90 [ 185.767097][ T7680] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 185.773007][ T7680] RIP: 0033:0x7fa30198f749 [ 185.777436][ T7680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.797079][ T7680] RSP: 002b:00007fa2ffbf6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 185.805547][ T7680] RAX: ffffffffffffffda RBX: 00007fa301be5fa0 RCX: 00007fa30198f749 [ 185.813655][ T7680] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000007 [ 185.821659][ T7680] RBP: 00007fa2ffbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 185.829678][ T7680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 185.837769][ T7680] R13: 00007fa301be6038 R14: 00007fa301be5fa0 R15: 00007ffc6c26c208 [ 185.845784][ T7680] [ 186.287720][ T7689] netlink: 199848 bytes leftover after parsing attributes in process `syz.3.496'. [ 187.382784][ T7704] netlink: 209836 bytes leftover after parsing attributes in process `syz.5.499'. [ 190.369584][ T7701] validate_nla: 5 callbacks suppressed [ 190.369600][ T7701] netlink: 'syz.5.499': attribute type 10 has an invalid length. [ 190.385729][ T7703] netlink: 'syz.5.499': attribute type 10 has an invalid length. [ 190.435091][ T7705] netlink: 'syz.5.499': attribute type 9 has an invalid length. [ 190.445178][ T7705] netlink: 209836 bytes leftover after parsing attributes in process `syz.5.499'. [ 190.860074][ T7733] netlink: 4083 bytes leftover after parsing attributes in process `syz.5.507'. [ 190.948632][ T7733] netlink: 4083 bytes leftover after parsing attributes in process `syz.5.507'. [ 190.968831][ T7732] netlink: 4083 bytes leftover after parsing attributes in process `syz.5.507'. [ 191.047363][ T7737] netlink: 4083 bytes leftover after parsing attributes in process `syz.5.507'. [ 191.208827][ T7741] netlink: 'syz.4.509': attribute type 8 has an invalid length. [ 191.254979][ T7741] netlink: 199848 bytes leftover after parsing attributes in process `syz.4.509'. [ 191.704497][ T7743] bridge0: port 3(veth0_to_bridge) entered blocking state [ 191.727394][ T7743] bridge0: port 3(veth0_to_bridge) entered disabled state [ 191.744341][ T7743] veth0_to_bridge: entered allmulticast mode [ 191.752582][ T7743] veth0_to_bridge: entered promiscuous mode [ 191.759311][ T7743] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 191.773455][ T7743] bridge0: port 3(veth0_to_bridge) entered blocking state [ 191.781214][ T7743] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 192.789285][ T7777] netlink: 'syz.0.515': attribute type 9 has an invalid length. [ 192.797058][ T7777] netlink: 209836 bytes leftover after parsing attributes in process `syz.0.515'. [ 192.867025][ T7768] bridge0: port 3(veth0_to_bridge) entered blocking state [ 192.897558][ T7768] bridge0: port 3(veth0_to_bridge) entered disabled state [ 192.927539][ T7768] veth0_to_bridge: entered allmulticast mode [ 192.964139][ T7768] veth0_to_bridge: entered promiscuous mode [ 192.980376][ T7768] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 193.011883][ T7768] bridge0: port 3(veth0_to_bridge) entered blocking state [ 193.020077][ T7768] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 193.452491][ T7771] netlink: 'syz.0.515': attribute type 10 has an invalid length. [ 193.463272][ T7776] netlink: 'syz.0.515': attribute type 10 has an invalid length. [ 193.617064][ T7780] FAULT_INJECTION: forcing a failure. [ 193.617064][ T7780] name failslab, interval 1, probability 0, space 0, times 0 [ 193.630573][ T7780] CPU: 0 PID: 7780 Comm: syz.3.517 Not tainted syzkaller #0 [ 193.637915][ T7780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 193.647995][ T7780] Call Trace: [ 193.651300][ T7780] [ 193.654248][ T7780] dump_stack_lvl+0x16c/0x230 [ 193.658966][ T7780] ? show_regs_print_info+0x20/0x20 [ 193.664185][ T7780] ? load_image+0x3b0/0x3b0 [ 193.668714][ T7780] ? __might_sleep+0xe0/0xe0 [ 193.673334][ T7780] ? __lock_acquire+0x7c80/0x7c80 [ 193.678463][ T7780] ? __asan_memset+0x22/0x40 [ 193.683076][ T7780] should_fail_ex+0x39d/0x4d0 [ 193.687778][ T7780] should_failslab+0x9/0x20 [ 193.692317][ T7780] slab_pre_alloc_hook+0x59/0x310 [ 193.697363][ T7780] ? __kthread_create_on_node+0xf0/0x3e0 [ 193.703027][ T7780] __kmem_cache_alloc_node+0x53/0x260 [ 193.708429][ T7780] ? __kthread_create_on_node+0xf0/0x3e0 [ 193.714195][ T7780] kmalloc_trace+0x2a/0xe0 [ 193.718679][ T7780] ? rxrpc_direct_abort+0x330/0x330 [ 193.723895][ T7780] __kthread_create_on_node+0xf0/0x3e0 [ 193.729402][ T7780] ? kthread_create_on_node+0x120/0x120 [ 193.734979][ T7780] ? lockdep_hardirqs_on_prepare+0x400/0x760 [ 193.740981][ T7780] ? rxrpc_direct_abort+0x330/0x330 [ 193.746196][ T7780] ? rxrpc_direct_abort+0x330/0x330 [ 193.751407][ T7780] kthread_create_on_node+0xde/0x120 [ 193.756716][ T7780] ? __local_bh_enable_ip+0x12e/0x1c0 [ 193.762103][ T7780] ? tsk_fork_get_node+0x70/0x70 [ 193.767086][ T7780] ? __local_bh_enable_ip+0x12e/0x1c0 [ 193.772483][ T7780] rxrpc_lookup_local+0xf59/0x1550 [ 193.777619][ T7780] ? rxrpc_local_dont_fragment+0x70/0x70 [ 193.783290][ T7780] ? none_clear+0x10/0x10 [ 193.787671][ T7780] ? rxrpc_client_conn_reap_timeout+0xd0/0xd0 [ 193.793774][ T7780] ? lockdep_hardirqs_on+0x98/0x150 [ 193.799089][ T7780] ? _local_bh_enable+0xa0/0xa0 [ 193.803967][ T7780] rxrpc_sendmsg+0x30a/0x5b0 [ 193.808587][ T7780] ? rxrpc_getsockopt+0x150/0x150 [ 193.813629][ T7780] ____sys_sendmsg+0x5bf/0x950 [ 193.818425][ T7780] ? __sys_sendmsg_sock+0x30/0x30 [ 193.823471][ T7780] ? __import_iovec+0x3fa/0x860 [ 193.828349][ T7780] ? import_iovec+0x73/0xa0 [ 193.832929][ T7780] ___sys_sendmsg+0x220/0x290 [ 193.837631][ T7780] ? __sys_sendmsg+0x270/0x270 [ 193.842436][ T7780] ? __lock_acquire+0x7c80/0x7c80 [ 193.847498][ T7780] __se_sys_sendmsg+0x1a5/0x270 [ 193.852372][ T7780] ? __x64_sys_sendmsg+0x80/0x80 [ 193.857348][ T7780] ? lockdep_hardirqs_on+0x98/0x150 [ 193.862564][ T7780] do_syscall_64+0x55/0xb0 [ 193.866998][ T7780] ? clear_bhb_loop+0x40/0x90 [ 193.871694][ T7780] ? clear_bhb_loop+0x40/0x90 [ 193.876390][ T7780] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 193.882298][ T7780] RIP: 0033:0x7f99ac98f749 [ 193.886736][ T7780] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 193.906367][ T7780] RSP: 002b:00007f99ad91d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 193.914884][ T7780] RAX: ffffffffffffffda RBX: 00007f99acbe5fa0 RCX: 00007f99ac98f749 [ 193.922869][ T7780] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000008 [ 193.930853][ T7780] RBP: 00007f99ad91d090 R08: 0000000000000000 R09: 0000000000000000 [ 193.938843][ T7780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 193.947088][ T7780] R13: 00007f99acbe6038 R14: 00007f99acbe5fa0 R15: 00007ffe4022c8d8 [ 193.955121][ T7780] [ 194.633837][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.640418][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 196.141169][ T7778] netlink: 'syz.0.515': attribute type 9 has an invalid length. [ 196.149630][ T7778] netlink: 209836 bytes leftover after parsing attributes in process `syz.0.515'. [ 196.584611][ T7815] netlink: 63503 bytes leftover after parsing attributes in process `syz.4.528'. [ 196.606347][ T7815] netlink: 63503 bytes leftover after parsing attributes in process `syz.4.528'. [ 197.024464][ T7819] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.530'. [ 197.129973][ T7831] FAULT_INJECTION: forcing a failure. [ 197.129973][ T7831] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 197.148439][ T7831] CPU: 0 PID: 7831 Comm: syz.3.534 Not tainted syzkaller #0 [ 197.155899][ T7831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 197.165984][ T7831] Call Trace: [ 197.169279][ T7831] [ 197.172231][ T7831] dump_stack_lvl+0x16c/0x230 [ 197.176937][ T7831] ? show_regs_print_info+0x20/0x20 [ 197.182157][ T7831] ? load_image+0x3b0/0x3b0 [ 197.186685][ T7831] ? __lock_acquire+0x7c80/0x7c80 [ 197.191734][ T7831] should_fail_ex+0x39d/0x4d0 [ 197.196445][ T7831] _copy_from_user+0x2f/0xe0 [ 197.201068][ T7831] __copy_msghdr+0x3bb/0x580 [ 197.205718][ T7831] ___sys_sendmsg+0x1a6/0x290 [ 197.210455][ T7831] ? __sys_sendmsg+0x270/0x270 [ 197.215274][ T7831] ? __lock_acquire+0x7c80/0x7c80 [ 197.220386][ T7831] __se_sys_sendmsg+0x1a5/0x270 [ 197.225272][ T7831] ? __x64_sys_sendmsg+0x80/0x80 [ 197.230247][ T7831] ? lockdep_hardirqs_on+0x98/0x150 [ 197.235464][ T7831] do_syscall_64+0x55/0xb0 [ 197.239903][ T7831] ? clear_bhb_loop+0x40/0x90 [ 197.244598][ T7831] ? clear_bhb_loop+0x40/0x90 [ 197.249294][ T7831] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 197.255201][ T7831] RIP: 0033:0x7f99ac98f749 [ 197.259636][ T7831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 197.279284][ T7831] RSP: 002b:00007f99ad91d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 197.287721][ T7831] RAX: ffffffffffffffda RBX: 00007f99acbe5fa0 RCX: 00007f99ac98f749 [ 197.295736][ T7831] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000004 [ 197.303721][ T7831] RBP: 00007f99ad91d090 R08: 0000000000000000 R09: 0000000000000000 [ 197.311707][ T7831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.319715][ T7831] R13: 00007f99acbe6038 R14: 00007f99acbe5fa0 R15: 00007ffe4022c8d8 [ 197.327716][ T7831] [ 197.526942][ T7837] netlink: 'syz.3.537': attribute type 8 has an invalid length. [ 197.538684][ T7837] netlink: 199848 bytes leftover after parsing attributes in process `syz.3.537'. [ 197.564829][ T7833] netlink: 'syz.4.535': attribute type 10 has an invalid length. [ 197.591959][ T7833] netlink: 'syz.4.535': attribute type 10 has an invalid length. [ 197.630856][ T7833] netlink: 'syz.4.535': attribute type 9 has an invalid length. [ 197.656728][ T7833] netlink: 209836 bytes leftover after parsing attributes in process `syz.4.535'. [ 197.744288][ T7838] netlink: 'syz.4.535': attribute type 9 has an invalid length. [ 197.757340][ T7838] netlink: 209836 bytes leftover after parsing attributes in process `syz.4.535'. [ 197.854354][ T7842] netlink: 63503 bytes leftover after parsing attributes in process `syz.5.539'. [ 197.931146][ T7847] netlink: 63503 bytes leftover after parsing attributes in process `syz.5.539'. [ 198.004428][ T7844] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 198.014854][ T7844] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 198.568552][ T7864] netlink: 'syz.5.547': attribute type 8 has an invalid length. [ 198.577743][ T7864] netlink: 199848 bytes leftover after parsing attributes in process `syz.5.547'. [ 198.996314][ T7876] netlink: 'syz.3.553': attribute type 10 has an invalid length. [ 199.022492][ T7876] bond0: (slave dummy0): Releasing backup interface [ 199.042553][ T7876] team0: Port device dummy0 added [ 199.072755][ T7877] netlink: 'syz.3.553': attribute type 10 has an invalid length. [ 199.140393][ T7876] netlink: 'syz.3.553': attribute type 9 has an invalid length. [ 199.162687][ T7877] team0: Port device dummy0 removed [ 199.183557][ T7877] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 200.417130][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 200.442229][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 200.464988][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 200.490042][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 200.512228][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 200.537057][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 200.559627][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 200.584463][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 200.607079][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 200.633465][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 203.936246][ T2105] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 205.418289][ C1] net_ratelimit: 1894 callbacks suppressed [ 205.418309][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.437725][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.451147][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.464603][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.478087][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.491516][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.500028][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 205.505011][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.530262][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 205.544021][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 210.428318][ C1] net_ratelimit: 4620 callbacks suppressed [ 210.428341][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 210.446849][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 210.460481][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 210.473046][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 210.486520][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 210.499028][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 210.512596][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 210.525068][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 210.538605][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 210.544899][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 215.438422][ C1] net_ratelimit: 5790 callbacks suppressed [ 215.438443][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 215.456880][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 215.469516][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 215.482891][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 215.482961][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 215.484502][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 215.519652][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 215.532170][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 215.545617][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 215.559004][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 220.447312][ C1] net_ratelimit: 5847 callbacks suppressed [ 220.447333][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 220.450755][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 220.454718][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 220.490908][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 220.503405][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 220.515943][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 220.528441][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 220.541911][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 220.555363][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 220.567878][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 225.264634][ T5790] Bluetooth: hci0: command 0x0406 tx timeout [ 225.459124][ C1] net_ratelimit: 5997 callbacks suppressed [ 225.459161][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 225.480951][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 225.504100][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 225.516497][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 225.521491][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 225.552724][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 225.568612][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 225.584766][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 225.600489][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 225.613166][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.469150][ C1] net_ratelimit: 961 callbacks suppressed [ 230.469188][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.490739][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 230.506033][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 230.523034][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.532110][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 230.552012][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 230.575037][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.591050][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 230.606864][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 230.622372][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 235.484997][ C1] net_ratelimit: 957 callbacks suppressed [ 235.485037][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 235.506107][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 235.518540][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.532907][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.536721][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 235.561726][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 235.577233][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 235.615672][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 235.631273][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 235.648681][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 240.487435][ C1] net_ratelimit: 996 callbacks suppressed [ 240.487472][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 240.508086][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 240.509310][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 240.541972][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 240.557053][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 240.579793][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 240.592063][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 240.607827][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 240.622800][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 240.638296][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 245.508777][ C1] net_ratelimit: 1047 callbacks suppressed [ 245.508814][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 245.530652][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 245.553675][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.569592][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.585506][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 245.601683][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 245.624205][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 245.639573][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 245.663910][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 245.679896][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.517174][ C1] net_ratelimit: 1018 callbacks suppressed [ 250.517217][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.538767][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.553776][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 250.568413][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.568998][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 250.583481][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 250.609678][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 250.631822][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.647186][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 250.657173][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.527498][ C0] net_ratelimit: 1024 callbacks suppressed [ 255.527568][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.529227][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 255.570434][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.586395][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.602789][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 255.618297][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 255.634519][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 255.644496][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 255.662940][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 255.685366][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.542170][ C1] net_ratelimit: 1006 callbacks suppressed [ 260.542208][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.564152][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.567552][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.592675][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 260.608280][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 260.631735][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 260.632052][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.648770][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 260.681722][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 260.697753][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 265.548897][ C1] net_ratelimit: 1004 callbacks suppressed [ 265.548938][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 265.563752][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 265.582922][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 265.598571][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 265.622338][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 265.637822][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 265.654118][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 265.669748][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 265.684129][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 265.697184][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 270.557517][ C1] net_ratelimit: 900 callbacks suppressed [ 270.557555][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 270.571152][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.591130][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 270.595017][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 270.628065][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 270.649846][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.651163][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.678416][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 270.693754][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 270.709499][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 275.569690][ C1] net_ratelimit: 897 callbacks suppressed [ 275.569727][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 275.595993][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 275.599314][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 275.633440][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 275.649540][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 275.665440][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 275.676153][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 275.683020][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 275.711771][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 275.727351][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 280.585634][ C1] net_ratelimit: 929 callbacks suppressed [ 280.585672][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.593088][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.609629][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.632202][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 280.648044][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 280.669357][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 280.684623][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 280.700009][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 280.713040][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 280.735896][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.592936][ C0] net_ratelimit: 965 callbacks suppressed [ 285.593101][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.596416][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.629320][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 285.644970][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.660646][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 285.676137][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 285.680868][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 285.702449][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 285.707221][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 285.737167][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 290.600351][ C1] net_ratelimit: 924 callbacks suppressed [ 290.600389][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 290.630742][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 290.647564][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 290.656267][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 290.665315][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 290.689006][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 290.704969][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 290.727660][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 290.743622][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 290.759281][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 295.616024][ C1] net_ratelimit: 913 callbacks suppressed [ 295.616065][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 295.637642][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 295.660475][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 295.670052][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 295.688437][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 295.704979][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 295.721490][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 295.736539][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 295.752191][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 295.763047][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 300.626078][ C1] net_ratelimit: 935 callbacks suppressed [ 300.626118][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 300.647784][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 300.670618][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 300.684362][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 300.699131][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 300.715549][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 300.731300][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 300.746759][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 300.762264][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 300.775976][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.457138][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 305.463830][ C0] rcu: 0-....: (10378 ticks this GP) idle=9814/1/0x4000000000000000 softirq=22801/22920 fqs=47 [ 305.475480][ C0] rcu: hardirqs softirqs csw/system [ 305.481975][ C0] rcu: number: 30062 5 0 [ 305.488423][ C0] rcu: cputime: 477 256 0 ==> 740(ms) [ 305.496089][ C0] rcu: (t=10500 jiffies g=26397 q=497 ncpus=2) [ 305.502385][ C0] CPU: 0 PID: 7892 Comm: syz.0.555 Not tainted syzkaller #0 [ 305.509802][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 305.519923][ C0] RIP: 0010:__find_rr_leaf+0x32d/0x6c0 [ 305.525449][ C0] Code: 00 00 00 00 00 fc ff df 4c 8b 7c 24 30 49 83 c6 08 4c 89 f0 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89 f7 e8 16 5d af f8 4d 8b 36 de 45 41 01 89 c3 31 ff 89 c6 e8 63 05 58 f8 85 db 74 1b e8 2a [ 305.545100][ C0] RSP: 0018:ffffc900000067e0 EFLAGS: 00000246 [ 305.551208][ C0] RAX: 1ffff1100ee17701 RBX: 0000000000000001 RCX: ffff888078d88000 [ 305.559221][ C0] RDX: 0000000000000100 RSI: 00000000fffffffd RDI: 00000000fffffffd [ 305.567235][ C0] RBP: ffffc90000006938 R08: ffffc90000006a60 R09: ffffc90000006a70 [ 305.575244][ C0] R10: ffffc900000068c0 R11: fffff52000000d1a R12: 1ffff1100ee1770a [ 305.583257][ C0] R13: dffffc0000000000 R14: ffff88807b543c00 R15: ffffc90000006a38 [ 305.591272][ C0] FS: 00007fa2ffbf66c0(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000 [ 305.600251][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 305.606882][ C0] CR2: 000000110c2e1ca3 CR3: 000000006b7b0000 CR4: 00000000003506f0 [ 305.614904][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 305.622918][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 305.630933][ C0] Call Trace: [ 305.634244][ C0] [ 305.637135][ C0] ? rt6_remove_exception+0x280/0x280 [ 305.642552][ C0] ? lockdep_hardirqs_on+0x98/0x150 [ 305.647800][ C0] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 305.654011][ C0] ? fib6_table_lookup+0x247/0xa70 [ 305.659165][ C0] fib6_table_lookup+0x3a0/0xa70 [ 305.664167][ C0] ? fib6_nh_age_exceptions+0x5e0/0x5e0 [ 305.669761][ C0] ip6_pol_route+0x22d/0x1160 [ 305.670270][ C1] net_ratelimit: 1061 callbacks suppressed [ 305.670305][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 305.674452][ C0] ? lapic_next_event+0x11/0x20 [ 305.696225][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 305.697100][ C0] ? ip6_pol_route+0x166/0x1160 [ 305.697133][ C0] ? trace_fib6_table_lookup+0x1c0/0x1c0 [ 305.697160][ C0] ? mark_lock+0x94/0x320 [ 305.697189][ C0] ? lockdep_hardirqs_on_prepare+0x400/0x760 [ 305.697218][ C0] fib6_rule_lookup+0x1d7/0x510 [ 305.697255][ C0] ? ip6_route_input_lookup+0xc0/0xc0 [ 305.697277][ C0] ? fib6_lookup+0x2c0/0x2c0 [ 305.726147][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.729998][ C0] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 305.730029][ C0] ? lockdep_hardirqs_on+0x98/0x150 [ 305.730052][ C0] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 305.730092][ C0] ip6_route_input+0x6cf/0xa50 [ 305.730122][ C0] ? ip6_multipath_l3_keys+0x710/0x710 [ 305.740817][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 305.744951][ C0] ? lockdep_hardirqs_on_prepare+0x400/0x760 [ 305.744993][ C0] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 305.745023][ C0] ? ip6_rcv_finish_core+0x21d/0x420 [ 305.762818][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 305.763054][ C0] ip6_rcv_finish+0x143/0x230 [ 305.763084][ C0] ? net_zcopy_put_abort+0x90/0x90 [ 305.763109][ C0] ip_sabotage_in+0x1f4/0x280 [ 305.763143][ C0] ? br_nf_post_routing+0xfb0/0xfb0 [ 305.763175][ C0] nf_hook_slow+0xbd/0x200 [ 305.774699][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 305.779401][ C0] NF_HOOK+0x204/0x390 [ 305.779431][ C0] ? audit_tree_destroy_watch+0x20/0x20 [ 305.779459][ C0] ? net_zcopy_put_abort+0x90/0x90 [ 305.779483][ C0] ? NF_HOOK+0x9b/0x390 [ 305.779505][ C0] ? ip6_rcv_core+0x1740/0x1740 [ 305.779532][ C0] ? net_zcopy_put_abort+0x90/0x90 [ 305.779565][ C0] ? ip6_rcv_finish_core+0x420/0x420 [ 305.791068][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 305.796998][ C0] __netif_receive_skb+0xcc/0x290 [ 305.797045][ C0] ? netif_receive_skb+0x106/0x6f0 [ 305.797072][ C0] netif_receive_skb+0x1bc/0x6f0 [ 305.797102][ C0] ? enqueue_to_backlog+0xe30/0xe30 [ 305.797132][ C0] ? br_netif_receive_skb+0x126/0x190 [ 305.819937][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 305.826575][ C0] NF_HOOK+0x9a/0x380 [ 305.826610][ C0] ? NF_HOOK+0x380/0x380 [ 305.838670][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 305.841112][ C0] ? NF_HOOK+0xf8/0x380 [ 305.841147][ C0] ? br_del_frame+0x150/0x150 [ 305.841176][ C0] ? NF_HOOK+0x380/0x380 [ 305.841206][ C0] ? br_pass_frame_up+0x275/0x410 [ 305.863960][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 305.866912][ C0] br_handle_frame_finish+0x146c/0x1920 [ 305.866961][ C0] ? brport_get_ownership+0x80/0x80 [ 305.866991][ C0] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 306.014404][ C0] ? lockdep_hardirqs_on+0x98/0x150 [ 306.019669][ C0] ? asm_sysvec_error_interrupt+0x13/0x20 [ 306.025457][ C0] ? nf_hook_slow+0x16c/0x200 [ 306.030184][ C0] ? brport_get_ownership+0x80/0x80 [ 306.035431][ C0] br_nf_hook_thresh+0x3b6/0x480 [ 306.040426][ C0] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 306.046635][ C0] ? brnf_get_logical_dev+0x270/0x270 [ 306.052075][ C0] ? brport_get_ownership+0x80/0x80 [ 306.057332][ C0] ? lock_is_held_type+0x13e/0x190 [ 306.062496][ C0] br_nf_pre_routing_finish_ipv6+0x9e3/0xd90 [ 306.068625][ C0] ? brport_get_ownership+0x80/0x80 [ 306.073883][ C0] br_nf_pre_routing_ipv6+0x34d/0x680 [ 306.079309][ C0] ? br_nf_pre_routing_ipv6+0x3fa/0x680 [ 306.084918][ C0] ? br_validate_ipv6+0x720/0x720 [ 306.089999][ C0] ? br_nf_pre_routing_ipv6+0x680/0x680 [ 306.095606][ C0] ? br_nf_pre_routing+0x70f/0x1420 [ 306.100865][ C0] ? br_nf_hook_thresh+0x480/0x480 [ 306.106118][ C0] br_handle_frame+0x96b/0x1480 [ 306.111023][ C0] ? br_handle_frame_dummy+0x10/0x10 [ 306.116375][ C0] ? brport_get_ownership+0x80/0x80 [ 306.121708][ C0] ? __netif_receive_skb_core+0xe37/0x3ac0 [ 306.127572][ C0] ? br_handle_frame_dummy+0x10/0x10 [ 306.132905][ C0] __netif_receive_skb_core+0xf6b/0x3ac0 [ 306.138593][ C0] ? perf_trace_run_bpf_submit+0xf4/0x1c0 [ 306.144368][ C0] ? mark_lock+0x94/0x320 [ 306.148750][ C0] ? qdisc_run+0x230/0x230 [ 306.153231][ C0] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 306.159441][ C0] ? lockdep_hardirqs_on+0x98/0x150 [ 306.164691][ C0] ? process_backlog+0x2be/0x6e0 [ 306.169676][ C0] ? process_backlog+0x2be/0x6e0 [ 306.174666][ C0] __netif_receive_skb+0x74/0x290 [ 306.179775][ C0] ? process_backlog+0x2be/0x6e0 [ 306.184754][ C0] process_backlog+0x380/0x6e0 [ 306.189574][ C0] ? trigger_rx_softirq+0x60/0x60 [ 306.194645][ C0] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 306.200859][ C0] __napi_poll+0xc0/0x460 [ 306.205336][ C0] net_rx_action+0x5ea/0xbf0 [ 306.209982][ C0] ? net_tx_action+0x950/0x950 [ 306.214794][ C0] ? lockdep_hardirqs_on+0x98/0x150 [ 306.220034][ C0] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 306.226255][ C0] handle_softirqs+0x280/0x820 [ 306.231072][ C0] ? __irq_exit_rcu+0xc7/0x190 [ 306.235887][ C0] ? do_softirq+0x180/0x180 [ 306.240441][ C0] ? irqtime_account_irq+0xb6/0x1c0 [ 306.245697][ C0] __irq_exit_rcu+0xc7/0x190 [ 306.250334][ C0] ? irq_exit_rcu+0x20/0x20 [ 306.254886][ C0] irq_exit_rcu+0x9/0x20 [ 306.259255][ C0] sysvec_apic_timer_interrupt+0xa4/0xc0 [ 306.264940][ C0] [ 306.267993][ C0] [ 306.270968][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 306.277004][ C0] RIP: 0010:preempt_schedule_irq+0xb0/0x140 [ 306.282962][ C0] Code: 44 24 20 f6 44 24 21 02 74 0b 0f 0b 48 f7 03 08 00 00 00 74 63 bf 01 00 00 00 e8 9b 58 e4 f6 e8 06 de 14 f7 fb bf 01 00 00 00 db b5 ff ff 48 c7 44 24 40 00 00 00 00 9c 8f 44 24 40 8b 44 24 [ 306.302615][ C0] RSP: 0018:ffffc9000453f0a0 EFLAGS: 00000286 [ 306.308733][ C0] RAX: f483b95288fe6900 RBX: 0000000000000000 RCX: f483b95288fe6900 [ 306.316745][ C0] RDX: dffffc0000000000 RSI: ffffffff8aaabce0 RDI: 0000000000000001 [ 306.324769][ C0] RBP: ffffc9000453f150 R08: ffffffff90da852f R09: 1ffffffff21b50a5 [ 306.332786][ C0] R10: dffffc0000000000 R11: fffffbfff21b50a6 R12: 0000000000000000 [ 306.340800][ C0] R13: 0000000000000000 R14: dffffc0000000000 R15: 1ffff920008a7e14 [ 306.348840][ C0] ? preempt_schedule_notrace+0x110/0x110 [ 306.354626][ C0] ? lock_chain_count+0x20/0x20 [ 306.359533][ C0] ? rcu_irq_exit_check_preempt+0xdf/0x210 [ 306.365390][ C0] irqentry_exit+0x67/0x70 [ 306.369855][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 306.375879][ C0] RIP: 0010:__slab_free+0x67/0x410 [ 306.381064][ C0] Code: 65 48 8b 04 25 28 00 00 00 48 3b 44 24 48 0f 85 55 03 00 00 48 89 df 48 83 c4 50 5b 41 5c 41 5d 41 5e 41 5f 5d e9 89 9b 00 00 <48> 89 fd 44 89 44 24 04 48 89 4c 24 20 0f 1f 44 00 00 31 ff 48 ba [ 306.400729][ C0] RSP: 0018:ffffc9000453f210 EFLAGS: 00000202 [ 306.406860][ C0] RAX: ffff88823bc00001 RBX: ffff88807c8f6d80 RCX: ffff88807c8f6d80 [ 306.414877][ C0] RDX: fffffffe40cf6d01 RSI: ffffea0001f23d80 RDI: ffff888019a4cc80 [ 306.422895][ C0] RBP: ffff8880232be100 R08: 0000000000000001 R09: ffffffff81dcf9ea [ 306.430906][ C0] R10: 0000000000042a30 R11: fffffbfff21b50a6 R12: ffff888019a4cc80 [ 306.438918][ C0] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff88807c8f6d80 [ 306.446954][ C0] ? qlist_free_all+0x6a/0xe0 [ 306.451722][ C0] ? __phys_addr+0xba/0x170 [ 306.456288][ C0] qlist_free_all+0x75/0xe0 [ 306.460853][ C0] kasan_quarantine_reduce+0x143/0x160 [ 306.466375][ C0] __kasan_slab_alloc+0x22/0x80 [ 306.471272][ C0] slab_post_alloc_hook+0x6e/0x4d0 [ 306.476452][ C0] __kmem_cache_alloc_node+0x13e/0x260 [ 306.481967][ C0] ? genl_family_rcv_msg_attrs_parse+0xa3/0x290 [ 306.488279][ C0] ? genl_family_rcv_msg_attrs_parse+0xa3/0x290 [ 306.494577][ C0] __kmalloc+0xa4/0x240 [ 306.498798][ C0] genl_family_rcv_msg_attrs_parse+0xa3/0x290 [ 306.504928][ C0] genl_family_rcv_msg_doit+0xb9/0x2f0 [ 306.510474][ C0] ? genl_family_rcv_msg_dumpit+0x2c0/0x2c0 [ 306.516433][ C0] ? ctrl_dumppolicy_done+0x70/0x70 [ 306.521700][ C0] ? __tipc_nl_add_bearer+0xb50/0xb50 [ 306.527130][ C0] ? tipc_detach_loopback+0xd0/0xd0 [ 306.532404][ C0] genl_rcv_msg+0x60b/0x790 [ 306.536979][ C0] ? genl_bind+0x360/0x360 [ 306.541454][ C0] ? __tipc_nl_add_bearer+0xb50/0xb50 [ 306.546909][ C0] netlink_rcv_skb+0x216/0x480 [ 306.551814][ C0] ? genl_bind+0x360/0x360 [ 306.556373][ C0] ? netlink_ack+0x1110/0x1110 [ 306.561202][ C0] ? __lock_acquire+0x7c80/0x7c80 [ 306.566367][ C0] ? down_read+0x1ac/0x2e0 [ 306.570895][ C0] genl_rcv+0x28/0x40 [ 306.575114][ C0] netlink_unicast+0x751/0x8d0 [ 306.579944][ C0] netlink_sendmsg+0x8c1/0xbe0 [ 306.584819][ C0] ? netlink_getsockopt+0x580/0x580 [ 306.590095][ C0] ? aa_sock_msg_perm+0x94/0x150 [ 306.595189][ C0] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 306.600542][ C0] ? security_socket_sendmsg+0x80/0xa0 [ 306.606065][ C0] ? netlink_getsockopt+0x580/0x580 [ 306.611318][ C0] ____sys_sendmsg+0x5bf/0x950 [ 306.616142][ C0] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 306.622352][ C0] ? __asan_memset+0x22/0x40 [ 306.627007][ C0] ? __sys_sendmsg_sock+0x30/0x30 [ 306.632082][ C0] ? __import_iovec+0x5f2/0x860 [ 306.636998][ C0] ? import_iovec+0x73/0xa0 [ 306.641561][ C0] ___sys_sendmsg+0x220/0x290 [ 306.646297][ C0] ? __sys_sendmsg+0x270/0x270 [ 306.651164][ C0] __se_sys_sendmsg+0x1a5/0x270 [ 306.656070][ C0] ? __x64_sys_sendmsg+0x80/0x80 [ 306.661088][ C0] ? syscall_enter_from_user_mode+0x2e/0x80 [ 306.667034][ C0] do_syscall_64+0x55/0xb0 [ 306.671506][ C0] ? clear_bhb_loop+0x40/0x90 [ 306.676227][ C0] ? clear_bhb_loop+0x40/0x90 [ 306.680954][ C0] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 306.687071][ C0] RIP: 0033:0x7fa30198f749 [ 306.691625][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 306.711283][ C0] RSP: 002b:00007fa2ffbf6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 306.719765][ C0] RAX: ffffffffffffffda RBX: 00007fa301be5fa0 RCX: 00007fa30198f749 [ 306.727788][ C0] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 306.735812][ C0] RBP: 00007fa301a13f91 R08: 0000000000000000 R09: 0000000000000000 [ 306.743830][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 306.751852][ C0] R13: 00007fa301be6038 R14: 00007fa301be5fa0 R15: 00007ffc6c26c208 [ 306.759896][ C0] [ 310.677387][ C0] net_ratelimit: 10591 callbacks suppressed [ 310.677408][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.681101][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:06:e9:c0:fe:62, vlan:0) [ 310.684008][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.700857][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:82:7d:a7:a9:f1:85, vlan:0) [ 310.708077][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.735005][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 310.744082][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.760794][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 310.768175][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 310.792177][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)