last executing test programs: 1m10.433824496s ago: executing program 3 (id=68): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454ce, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) ioctl$TUNSETLINK(r1, 0x400454cc, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x20000810) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d80000001c0081044e81f782db44b904021d080303000000e8fe03a1180015000600142603600e1208000f0000810401a8001604040001400300000003", 0x3d}], 0x1, 0x0, 0x0, 0x7400}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35"], 0xcfa4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 1m7.805412669s ago: executing program 3 (id=74): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0xc, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, [@printk={@s, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xb0}}, @call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000200), &(0x7f0000000240)=r0}, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x3}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x3d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020032000b07d25a806f8c6394f90424fc602f0000000a740200053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 1m7.438716026s ago: executing program 3 (id=77): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0xc, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, [@printk={@s, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xb0}}, @call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000200), &(0x7f0000000240)=r0}, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x3}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x3d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020032000b07d25a806f8c6394f90424fc602f0000000a740200053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 1m6.092886493s ago: executing program 3 (id=82): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001340)=ANY=[@ANYRESOCT], &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002a0, 0x1f, 0x62, &(0x7f0000000380)="b9e403c6630d698cb8a00b04339c", 0x0, 0x172, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000540)=ANY=[@ANYRESDEC=r0, @ANYRESDEC=r0, @ANYBLOB="6368dbb54ad9f7c93df052172900e615f6bc6bae0720645582b485d1fd54053832cf46d5b3b9d5cdb374775433b891f2c7e63c0df02ed9e1f572ae824712a34d59c9d2b0443f97f2e775b1a1effbd9041b671074b370fcd66fbbdd7db49a83d7ed84eb30f7fd567f984a95aa1213cf63b77305f0bb235736b5dcddb0e26f24a764954e02ee97ce353fdad84eab7abb3b5a0fc780dd6d2789faaad5bff8ecc47e4b35253ff6dceed8e46ab318ff5d5e807da9c71d00c9f46af8786024be18b633a5fd6db2047e2c875420c50771c08f90575cdd2c61a9c3d63ed9", @ANYRESDEC=r0], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0900000003000000040001000500000000000000", @ANYRES32, @ANYBLOB="0000d20c942487dce71cce29accc36bc58d02bbe4e23121ce3a5b3c6564390c0a11a1705c5e7f07544284b0d385382e0fc31b337c706eff4bfbc9bb5252f6046e617752efb26f7b6ba31c39207b405f2cc9b0e822182cfa93aca984ebb3be7bf45bd544b1d143a9b3b619d9218ae7e5803dcf8f62379912dc69992ea3f56c9cd0e19e9237483fe1079a1e33918e6484643de53d6317b78c59d095109074f5da745ec1b238489cd2ba45f7486c4e5c849e075de6519a427b5815a27e5a3d1ca9df3c413aff1cb091c5db749f571a28c230e81327ea33ddebb95d35014e123b99f0671cec6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e40)={@ifindex, 0xffffffffffffffff, 0x2f, 0x12}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000002d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e000000000000000400"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='netlink_extack\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x20, &(0x7f0000000680)=[{&(0x7f0000000340)="d80000001c0081044e81f782db44b904021d0802010000000500f0a1180002000000000000000e1208000f0100810401a8001600200001400300000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c11503c6bbace8017cb090000001fb791643a5ee4001b146218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e0060000000000000080bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd68adbef3d93452a00"/216, 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x20004800) 1m5.946672796s ago: executing program 3 (id=84): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_tracing={0x1a, 0xf, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80000000}, @ldst={0x0, 0x0, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x1}, @generic={0x1, 0x3, 0x7, 0x7, 0xb}], &(0x7f0000000080)='GPL\x00', 0x8, 0x77, &(0x7f0000000380)=""/119, 0x41100, 0x48, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x29ed7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0x22, 0x0, &(0x7f0000000380)="f6f4e95c358ad62c5d3a66520b4eec26a99b1251f89de8fa214fc09105069ae23e60", 0x0, 0xa17, 0x0, 0x2, 0x0, &(0x7f0000000700)="010a", 0x0}, 0x50) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup/syz1\x00', 0x200002, 0x0) 1m5.345271298s ago: executing program 3 (id=88): r0 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r1 = socket$kcm(0x1e, 0x1, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f00000008c0), 0x43) sendmsg$kcm(r1, &(0x7f00000002c0)={&(0x7f0000001540)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x80, 0x0}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89fa, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@map, 0xf, 0x1, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) close(r2) socket$kcm(0x10, 0x2, 0x0) write$cgroup_type(r2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r5, 0x1, 0x41, &(0x7f0000000040)=r4, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x2000004, 0x0, 0x8, 0x3, 0x0, 0x1}, r0, 0x1, r4, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000580)='ns/time\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/time\x00') ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 1m4.912546216s ago: executing program 32 (id=88): r0 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r1 = socket$kcm(0x1e, 0x1, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f00000008c0), 0x43) sendmsg$kcm(r1, &(0x7f00000002c0)={&(0x7f0000001540)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x80, 0x0}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89fa, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@map, 0xf, 0x1, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) close(r2) socket$kcm(0x10, 0x2, 0x0) write$cgroup_type(r2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r5, 0x1, 0x41, &(0x7f0000000040)=r4, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x2000004, 0x0, 0x8, 0x3, 0x0, 0x1}, r0, 0x1, r4, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000580)='ns/time\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/time\x00') ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 9.106992319s ago: executing program 2 (id=367): bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\n\x00'/12, @ANYRES32=0x0, @ANYBLOB="18"], 0x20) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@cgroup=r0, 0x1e, 0x1, 0x5, &(0x7f0000000000)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0]}, 0x40) 8.725058886s ago: executing program 2 (id=368): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="09000000030000000400010005"], 0x48) close(0x3) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000004b40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="10000000000000002e020000020000000804000000000000010000000100"], 0x418}, 0x8) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1e00000005000000030000000600000000000200", @ANYRES32=r0, @ANYBLOB="b89be019ea0080000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000003000000050000000b00"/28], 0xfe5b) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x3, 0x84) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r5, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000000a00)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, 0x0}, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c9042, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x226140, 0x0) close(r7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r7, 0x8923, &(0x7f0000002280)={'syzkaller0\x00', @random="2d311e000008"}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9b}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x2, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40a, 0x4, @perf_bp={0x0, 0x1}, 0x1060b8, 0xa1b7, 0xffffffff, 0x0, 0x1fd, 0xffffffff, 0x0, 0x0, 0xffffb7fe, 0x0, 0x8}, 0x0, 0x5, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) 3.933726251s ago: executing program 4 (id=372): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x42}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r0, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2, 0x0, &(0x7f0000001b40), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x47, 0x0}}, 0x10) 3.852614153s ago: executing program 2 (id=373): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0xc, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, [@printk={@s, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xb0}}, @call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000200), &(0x7f0000000240)=r0}, 0x20) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020032000b07d25a806f8c6394f90424fc602f0000000a740200053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 3.602965438s ago: executing program 1 (id=374): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f90324fc60", 0x14}], 0x1}, 0x40010) recvmsg(r1, &(0x7f0000004300)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x61, &(0x7f00000027c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1}, 0x10100) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000580)="d8000000140081054e81f782db44b904021d080225000000040000", 0x1b}], 0x1, 0x0, 0x0, 0x7400}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000580)=ANY=[], 0xfe33) r3 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0xb, &(0x7f0000000000), 0xe) openat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) sendmsg$inet(r3, &(0x7f00000007c0)={&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000080)="92", 0x1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x158}, 0x40) 3.565264109s ago: executing program 2 (id=375): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x101000, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9041c1d0800fe007c05e8fe55a104000100ff02142603600e12080005007a010401a80016002000034004020000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x18) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f00000001c0)=r2) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x20, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x7e02, 0x0, 0x0, 0x0, 0x0, 0x8d3c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1}, 0x20) close(0x3) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3b, 0x6, 0x8, 0x2, 0x0, 0x0, 0x8002, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x1240, 0x1b9, 0x8, 0x7, 0x2e31a4e0, 0xf9c8, 0x7, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xc, r3, 0x2) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x3, 0x73) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}, 0x100904, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x2a, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r4, &(0x7f0000001180)={&(0x7f0000000000)={0xa, 0x0, @empty}, 0xffac, &(0x7f0000001080)=[{&(0x7f0000002440)="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", 0xffa0}, {&(0x7f0000001040)="9d7fcf3efc63f4a6a555ba8b4726d7ccaf8a207100e69cfac4377876021d7131b838059f96bd206d4776368ed2a92432e5af71", 0x33}], 0x2, &(0x7f0000001940)=[@ip_tos_int={{0x50, 0x29, 0x32, 0x80fe}}, @ip_pktinfo={{0x0, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @loopback}}}], 0x50}, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000200)=0x1) 3.458700271s ago: executing program 4 (id=376): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x1820a6, 0x20000000000ca, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x0, 0xe, 0x0, 0x6}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20020, 0x4, @perf_bp={0x0, 0xa}, 0x2018, 0x3, 0x0, 0x9, 0x0, 0x0, 0x207}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x1c0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001"], 0x0, 0x4a, 0x0, 0x1}, 0x28) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYRES8=r1, @ANYBLOB="3eca0d"], 0x9a) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x605, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4a5ba, 0x0, @perf_bp={0x0}, 0x100410, 0x200, 0x6, 0x7, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)=@generic={&(0x7f0000000740)='./file0\x00'}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r2, 0xe0, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0], 0x0, 0xe1, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0xe9, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000c80)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0xb6a0, '\x00', r4, r2, 0x0, 0x2, 0x2}, 0x50) syz_clone(0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x600000000000000, &(0x7f0000000580)=@base={0xf, 0x4, 0x4, 0x20002, 0x0, 0x1, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) socketpair$tipc(0x1e, 0x6371c68694af2c5f, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000700)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x2, {0x4e23, 0x3}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="a68eb751f27024bff2468c8a8a463dec52854632760bfb753f332fb7709829f6eea93a3771111ff18358b2a42080c28f258479270816", 0x36}, {&(0x7f00000000c0)="24da26ca4933ca8b07285a54e4a2099d5aa52730d2bd66a688935f1402bd16e9308d103d4aabffca84a9a0d70f226e29bfa3ce3ac437d1c2e042acb6bae845fda0ce0bc080a3ff2581f346caa7c5236e33e1581f9fd9d773c7405f9b0d008b29e9a7e2038ac0dcd2a5606b74db9f150f0febfffe2a44569b6d4e", 0x7a}, {&(0x7f0000000140)="ffe804726c299cf52a2d71295ead520ac0e552fce934ff849d58dfa18686da9de47172fc7ff61e6ab9f47925e902fe569a92e06e902859b80465be13ca4182e00e921bec0ed3bb5763a852688243a7", 0x4f}, {&(0x7f00000001c0)="49948a634ca05f53c9ea42c29f9f3fc3b0f281b02f221c72bd6d8c808e15daceaa4ceee7239f12d21a135bc6962bd3416247ba26373bfb", 0x37}, {&(0x7f0000000200)="8b9c93c822abd0f24e039685bfefc52fd75f960ddcd0e3fb89394ee991abf3fbfd1d4a40913dc5d3963a2a6d07a6c38e8f4fd6b531b703268c8c1fb42fdb7d280af472f513bb3283aba642db86a99d763050dadbe7deefc6b692d2fa6b201751ef991552cfc0777005d9ec08c47caab2cc810dd73e800422eca81c943d6b061af8cedfad3f42e7a75c890be104ed0956162689bee50b2930d609b9817412ee6d88b34af39f9ace8b3d641962630334e64df8786a169f26afbce00230719584f8cbb7cc564dc4532cc836da7bea9955a4a7be89b90b2a2c7fc182", 0xda}, {&(0x7f0000000300)="bda03c39f262f4d84b3f0c4a0802b6b7c4b99ded5dc654941e5573427f2f7329bf59b53c6daf9a34c0ed4c4a5f7b10a160393297fd7f45c4599175edae0cafbc667d7d81c9cfbacccf17708514808bd5e430392e742945b5d071f58b07d35364f54ffec60060f6a6b510b6caad0ce144555ff74f120b674e8de00ca976f075a511b0c6d085347ce5843894ede6648f6012a9abb1039bd269b8f10580432397", 0x9f}, {&(0x7f00000003c0)='S', 0x1}, {&(0x7f0000000400)="30456740a7f0276d5466004b49c6ae89c7f23de3b5b21c0aaee1296efc9de1cd4fe1543e0b88f5a99259e7d92ecc24c14a7ec883756e41eeda3f35a89451c1d3187f26ae11aeba0a47860d02d290af06cb3e5137c055642c04a85bc3b352fac94a9f5e2615b4c106b7857f5e26c3148f47664a48be036973bcab31eaa29fecb361e7748de69b9b3733d9e7d323f7bf4dbd", 0x91}, {&(0x7f00000004c0)="fb2005b7dfb9f4c9bc753facb17c0dee1cd83a4e6b038550c04020690f7e7cc29820b5369dfe9352bcb9bc8903145f1d5fdcaea6e5267e09abc45d2b333809fccadd02e908e05030ea94e2db2e121e7f2f0f40fcaf646b4087256792114cc980c1ce3cd0f63b530ea6c9fb432c102e8b873fabb12b3eca1d90a22a59c2e8498dcd3310dc9d2fe329553e39a49c8324c08e5cf4f890577f9f9f4c77bcb52dd11af59d5bf014b37039c8c8e17790", 0xad}], 0x9, &(0x7f0000000640)="4f5a49b256e9e875155f98129983499bbacb4f48b28c27fba16f5c450e25f99349604631f1b2b1dad9dbb9af55c98efd1e6d427bc973ece7da0d072ee234d686221cccd7bfdf17379a1856ca000d2449c69ecca9c95edf9fdac4159b81807b7532fa80a1780e99717bfff9b8dca98daf9ef266ed28a3c28ab2a215415bbd890ca1236bee61b831401a", 0x89, 0x4001}, 0x55) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{0x0, 0x1, 0x1, 0xb}, {0x5, 0x3, 0x8, 0x1}, {0x8000, 0x4, 0x10008, 0xa}]}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000001400000000000000000000000200000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f0000017f000001000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f000001ac141400000000001c00000000000000000000004700000044aa00210a2101"], 0x230}, 0x0) r6 = socket$kcm(0x10, 0x3, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0xd6, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0xc}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030033000b35d25a806c8c6f94f90224fc60100005000a000200053582c137153e37000c0680050002000300", 0x33fe0}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0xa, [@datasec={0x4, 0x6, 0x0, 0xf, 0x3, [{}, {}, {}, {}, {}, {}], "491eaf"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "d5"}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x30, 0x30, 0x2e, 0x0]}}, &(0x7f00000006c0)=""/50, 0x86, 0x32, 0x1}, 0x20) r8 = socket$kcm(0xa, 0x1, 0x106) setsockopt$sock_attach_bpf(r8, 0x29, 0x4e, 0x0, 0x0) 3.258917295s ago: executing program 1 (id=377): r0 = socket$kcm(0x2, 0x200000000000001, 0x106) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0xc220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x16, 0x2, 0x0, 0x0, 0x0, 0x1, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x1ff, 0xa6}, 0x11619d, 0x9, 0xfffffbff, 0x5, 0x2, 0x200, 0x5, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="d8000000310081044e81f782db44b904021d080005000000e8fe55a1180015000600142603600e120900210000000401a8001600a40001", 0x37}], 0x1}, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f0000000040)="b64b6779e728a585fc6d831c9c111ee3bf867c7fa20663508d961b5b0bc1d4eded804b84c8ee0b5e7b55af44aa8bf4a16c4d4aaf896a13f650a3b4f737945a9a179a6ceb93adadb8dd841258d0f04b02868cd415ab9bc48b055a8b3f92b143cb16138c216513a045af2101e7e3c507bedee404330f1171812cdaeed17a0e89dd4863a4e6808ca6b7046c38f33b9a0417e1c8fae7a9e1b4c8161b02", 0x0, 0x0, 0x0}, 0x38) r3 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES8=r0], 0xfe33) r4 = socket$kcm(0x29, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB="0f0000000400000008000000cc0a000000000000", @ANYRES32=0x1, @ANYBLOB="000000000000daf20fe176c703d300000000000200", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r5, &(0x7f00000001c0), 0x0}, 0x20) r6 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180)={0x0, r6}, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1a, 0x3, &(0x7f00000007c0)=ANY=[@ANYRESHEX, @ANYRESDEC=r2, @ANYRES64=r4, @ANYBLOB="850d195b6acd0c5d251f0288636b1e5c831abe07ce957db1a673c78c2b30b999149b18eb19f9f0a0f46657fc58808e76d0bbba188af1120b1e566c60eb89242054c04f926ba3633c44e133e800f567a5e52165c532de70dadc4a809dc8ea0dd720276d3e85e21ad0c6678370c07dc4380831f1382eaceafb03b805bf514e14dca0a8d433c682b8f8542cc0e9300bfa266af54c3bedafbb10b4881cdea577a5ba2b48e31dcf8d471aa4fb9ce7e6e1a8f6db2ba1b3aa38f1879e2d55ad16a87ae8e107448eb893b144801de22a681977497bbdd108e8a00974eeda800d"], 0x0, 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x7, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) sendmsg$kcm(r0, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x20040000) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0xfc, 0x0}, 0x30004001) socket$kcm(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000090) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x20000001) r8 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x8) r9 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={0x0, 0xf}, 0x1000, 0x2214, 0x0, 0x8, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) ioctl$TUNSETQUEUE(r3, 0x400454d9, 0x0) sendmsg$kcm(r8, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="d8000000100081046881f782db44b904021d080b01000000e8fe55a11800150006001400060000120800040043000000a80016000a00014006000d3f036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1, 0x0, 0x0, 0xc3ff}, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)=@generic={&(0x7f0000000000)='./file0\x00', r7}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x83, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x2100, 0x0) 3.225911706s ago: executing program 0 (id=378): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x20, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x21}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kfree\x00', r2}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r0, 0x0, 0x14, 0x0, &(0x7f0000000080)="f6f4e9a10000502468da5eb1c6b2feff8833c000", 0x0, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x50) 3.081704978s ago: executing program 0 (id=379): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffdf5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x14, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x89}, [@map_idx_val={0x18, 0x9, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @jmp={0x5, 0x0, 0x7, 0x8, 0x4, 0xc}, @call={0x85, 0x0, 0x0, 0xb}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xf}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="5c00000026006bab9a3fe3d86e17aa31106b876c1d0000007ea60864160af36504001a0038001d004231a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb5b64f69853362ac3407173ec", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x4080) recvmsg$kcm(r1, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x2020) recvmsg$kcm(r1, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x40000100) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) recvmsg$kcm(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) openat$cgroup_int(r4, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) 2.266856675s ago: executing program 0 (id=380): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0xa, 0x0, 0x1, 0xb9}, 0x28) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xffffffff7fffffff}, 0x0, 0x7, 0x0, 0x0, 0xca}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r3 = openat$cgroup_devices(r2, &(0x7f0000000200)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r3, &(0x7f0000000340)=ANY=[@ANYBLOB='b 75:*\tw\nr'], 0xa) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x40080, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x40086602, 0x0) write$cgroup_subtree(r7, &(0x7f0000000440)=ANY=[@ANYBLOB="2d696f2025bf22393d2d70696473202b6d656d4e2dff353464657669636573ca3f24290078ae472cc9d18a677ce8488500"/64], 0x24) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x9}, 0x10000, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="130000001000000008"], 0x50) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000001c0)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000005c0)="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", 0x0, 0x4}, 0x20) r9 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0xffffffffffffffd0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r9, 0x84, 0x83, &(0x7f0000000000)=r12, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYRES32=r4], &(0x7f0000000340)='syzkaller\x00', 0xfffffffe}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r13 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r13, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="d8000000140081044e81f782db44b904021d080207000000040000a118000200e000000100000e1208000f0100810401a80016ea1f000840032e5f54c92011148ed08734843c8802033d0803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c0100000000000000cb090000001fb791643a5ee4001b146218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e0060000000000000080bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd68adbef", 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x0) 2.125340578s ago: executing program 1 (id=381): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x3, 0x5, &(0x7f0000000640)=ANY=[@ANYBLOB="180000008f0800000000000000000000850000004f000000850000000500000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000740)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000a000000040000000000000e0400000000000000060000000100000f0100000004000000ff0f00000000000009000000000000000f03000000e10418000000002e61"], 0x0, 0x5a, 0x0, 0x1}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="f4b84de4115d64244a0e839e9900", 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x3, '\x00', 0x0, r1, 0x5, 0x3, 0x2}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1, 0xffffffffffffffff}, 0x4) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)=@generic={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r6, 0x84, 0x64, &(0x7f0000000000)=r8, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r11, r10, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r11}, &(0x7f0000000000), &(0x7f0000000080)=r9}, 0x20) r12 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x8}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)=@o_path={&(0x7f0000000200)='./cgroup\x00', r13, 0x4000, r12}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_ext={0x1c, 0x1f, &(0x7f00000003c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @generic={0xff, 0x1, 0xb, 0x6, 0x7}, @map_fd={0x18, 0x8, 0x1, 0x0, r4}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='GPL\x00', 0x9, 0x87, &(0x7f0000000540)=""/135, 0x41000, 0x80, '\x00', r5, 0x0, r8, 0x8, &(0x7f0000000600)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x1, 0xd, 0x27}, 0x10, 0x1a74d, r0, 0x1, &(0x7f00000006c0)=[r11, r13], &(0x7f0000000700)=[{0x5, 0x3, 0x4, 0x4}], 0x10, 0x1f6}, 0x94) 1.882941272s ago: executing program 0 (id=382): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="09000000030000000400010005"], 0x48) close(0x3) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000004b40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="10000000000000002e020000020000000804000000000000010000000100"], 0x418}, 0x8) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1e00000005000000030000000600000000000200", @ANYRES32=r0, @ANYBLOB="b89be019ea0080000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000003000000050000000b00"/28], 0xfe5b) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x3, 0x84) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r5, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000000a00)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, 0x0}, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c9042, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x226140, 0x0) close(r7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r7, 0x8923, &(0x7f0000002280)={'syzkaller0\x00', @random="2d311e000008"}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9b}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x2, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40a, 0x4, @perf_bp={0x0, 0x1}, 0x1060b8, 0xa1b7, 0xffffffff, 0x0, 0x1fd, 0xffffffff, 0x0, 0x0, 0xffffb7fe, 0x0, 0x8}, 0x0, 0x5, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) 1.882559743s ago: executing program 4 (id=383): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0xc, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, [@printk={@s, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xb0}}, @call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000200), &(0x7f0000000240)=r0}, 0x20) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020032000b07d25a806f8c6394f90424fc602f0000000a740200053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 1.51662476s ago: executing program 4 (id=384): r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80, &(0x7f0000000040)=[{&(0x7f00000006c0)='@', 0x1}], 0x1, &(0x7f0000000200)=[{0x10, 0x84, 0x40000008}], 0x10}, 0x41) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x2}) ioctl$TUNGETVNETHDRSZ(r1, 0x400454cc, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b0000000180100002020782500000000f01f20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000700)='signal_generate\x00', r2}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 1.082342729s ago: executing program 1 (id=385): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000700000000000000000095"], &(0x7f0000000040)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sock_rcvqueue_full\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000040)='syzkaller\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sock_rcvqueue_full\x00', r1}, 0x10) r2 = socket$kcm(0x10, 0x3, 0x10) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x3, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000700)='GPL\x00'}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x300, 0x0}, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003f000b05d25a806c8c6f94f90524fc6010000200d7070000053582c137153e37000c0980fc0b10000300", 0x33fe0}], 0x1}, 0x0) 833.990154ms ago: executing program 4 (id=386): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x5) r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000002280)=ANY=[@ANYBLOB="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"/3636], &(0x7f0000000040)='GPL\x00', 0x4, 0xfdc0, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x70) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000100)=r1, 0x120) 789.069594ms ago: executing program 1 (id=387): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000040000000800020001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x6, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB="18d0ff0004000000000000000300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000052200007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400005b6dae5385000000b500000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x22}, 0x94) 701.212226ms ago: executing program 0 (id=388): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000300)="2e00000011008188040f80ec59acbc0413a181004000000004000000000000000e00b4360d00000002800200121f", 0x2e}], 0x1}, 0x0) 522.838ms ago: executing program 1 (id=389): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@typedef={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x2d}, 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d80)={0x6, 0x29, &(0x7f0000000c00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0x3}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000380)='syzkaller\x00', 0x1, 0xec, &(0x7f0000000840)=""/236, 0x40f00, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000009c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000a00)={0x3, 0x4, 0x7, 0x6}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000ac0), &(0x7f0000000b00)=[{0x5, 0x4, 0xa, 0x4}, {0x5, 0x3, 0xd, 0x3}, {0x5, 0x2, 0x0, 0x1}, {0x3, 0x1, 0x9, 0xa}, {0x4, 0x3, 0x6, 0x2}, {0x0, 0x5, 0x7, 0x1}], 0x10, 0x200}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x58, &(0x7f0000000e40)={0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x17, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100, 0x11, '\x00', 0x0, @fallback=0x7, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x5, 0x7, 0x3, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000ec0)=ANY=[@ANYBLOB="0600000004000000dd0000000a00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="ffffffffffffffeb0000000000000000000000000000000000000000b89c946571cf4769b1162e1c95364e7a481695e79124cfd77ada210b617f3ad3922d7056e1610d8bf2b918f865eccef456cc7d654bb2d291dac7c2370b24c8375795d492c8046a77574b3fcb9ac3f6edabced377cf2cb670fdb4169d592ec0d0f1af530e81105a50a0763300c06526cfa093a7805a0e5269bcc5065d4bae4fbaf6e61f8e7a7a2559fed7f3101fb3f9da2671c76587637ad7996191fa8ebd62cf80b836c196"], 0x50) close(0x3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r5 = perf_event_open(&(0x7f00000001c0)={0x3, 0xffffffffffffff30, 0xb9, 0x7, 0x4f, 0x9, 0x0, 0x7, 0x581, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x196, 0x2, @perf_config_ext={0x9, 0xf}, 0x4, 0x6fe, 0x80, 0x4, 0xbb06, 0x1, 0x1, 0x0, 0x5, 0x0, 0xc}, 0x0, 0x5, 0xffffffffffffffff, 0x9) perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x2, 0x5, 0xd4, 0x0, 0x7, 0x800, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x7f, 0x6}, 0x101001, 0x6, 0x1c, 0x9, 0x7ff, 0x9, 0x0, 0x0, 0x6, 0x0, 0x8}, r4, 0xf, r5, 0xe) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYRES64=0x0, @ANYRESDEC=r5, @ANYRES64=r2], 0x48) r7 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x5}, {0x2}]}, 0x94) r8 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], 0x0, 0x32}, 0x20) setsockopt$sock_attach_bpf(r8, 0x84, 0x6e, &(0x7f0000000000)=r11, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r13) recvmsg$unix(r12, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)}, 0x0) setsockopt$sock_attach_bpf(r7, 0x84, 0x7b, &(0x7f0000000000), 0x8) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0}, 0x94) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r14}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000280)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41000}, 0x94) 522.52108ms ago: executing program 0 (id=390): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x1820a6, 0x20000000000ca, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x0, 0xe, 0x0, 0x6}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20020, 0x4, @perf_bp={0x0, 0xa}, 0x2018, 0x3, 0x0, 0x9, 0x0, 0x0, 0x207}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x1c0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001"], 0x0, 0x4a, 0x0, 0x1}, 0x28) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYRES8=r1, @ANYBLOB="3eca0d"], 0x9a) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x605, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4a5ba, 0x0, @perf_bp={0x0}, 0x100410, 0x200, 0x6, 0x7, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)=@generic={&(0x7f0000000740)='./file0\x00'}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r2, 0xe0, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0], 0x0, 0xe1, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0xe9, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000c80)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0xb6a0, '\x00', r4, r2, 0x0, 0x2, 0x2}, 0x50) syz_clone(0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x600000000000000, &(0x7f0000000580)=@base={0xf, 0x4, 0x4, 0x20002, 0x0, 0x1, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) socketpair$tipc(0x1e, 0x6371c68694af2c5f, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000700)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x2, {0x4e23, 0x3}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="a68eb751f27024bff2468c8a8a463dec52854632760bfb753f332fb7709829f6eea93a3771111ff18358b2a42080c28f258479270816", 0x36}, {&(0x7f00000000c0)="24da26ca4933ca8b07285a54e4a2099d5aa52730d2bd66a688935f1402bd16e9308d103d4aabffca84a9a0d70f226e29bfa3ce3ac437d1c2e042acb6bae845fda0ce0bc080a3ff2581f346caa7c5236e33e1581f9fd9d773c7405f9b0d008b29e9a7e2038ac0dcd2a5606b74db9f150f0febfffe2a44569b6d4e", 0x7a}, {&(0x7f0000000140)="ffe804726c299cf52a2d71295ead520ac0e552fce934ff849d58dfa18686da9de47172fc7ff61e6ab9f47925e902fe569a92e06e902859b80465be13ca4182e00e921bec0ed3bb5763a852688243a7", 0x4f}, {&(0x7f00000001c0)="49948a634ca05f53c9ea42c29f9f3fc3b0f281b02f221c72bd6d8c808e15daceaa4ceee7239f12d21a135bc6962bd3416247ba26373bfb", 0x37}, {&(0x7f0000000200)="8b9c93c822abd0f24e039685bfefc52fd75f960ddcd0e3fb89394ee991abf3fbfd1d4a40913dc5d3963a2a6d07a6c38e8f4fd6b531b703268c8c1fb42fdb7d280af472f513bb3283aba642db86a99d763050dadbe7deefc6b692d2fa6b201751ef991552cfc0777005d9ec08c47caab2cc810dd73e800422eca81c943d6b061af8cedfad3f42e7a75c890be104ed0956162689bee50b2930d609b9817412ee6d88b34af39f9ace8b3d641962630334e64df8786a169f26afbce00230719584f8cbb7cc564dc4532cc836da7bea9955a4a7be89b90b2a2c7fc182", 0xda}, {&(0x7f0000000300)="bda03c39f262f4d84b3f0c4a0802b6b7c4b99ded5dc654941e5573427f2f7329bf59b53c6daf9a34c0ed4c4a5f7b10a160393297fd7f45c4599175edae0cafbc667d7d81c9cfbacccf17708514808bd5e430392e742945b5d071f58b07d35364f54ffec60060f6a6b510b6caad0ce144555ff74f120b674e8de00ca976f075a511b0c6d085347ce5843894ede6648f6012a9abb1039bd269b8f10580432397", 0x9f}, {&(0x7f00000003c0)='S', 0x1}, {&(0x7f0000000400)="30456740a7f0276d5466004b49c6ae89c7f23de3b5b21c0aaee1296efc9de1cd4fe1543e0b88f5a99259e7d92ecc24c14a7ec883756e41eeda3f35a89451c1d3187f26ae11aeba0a47860d02d290af06cb3e5137c055642c04a85bc3b352fac94a9f5e2615b4c106b7857f5e26c3148f47664a48be036973bcab31eaa29fecb361e7748de69b9b3733d9e7d323f7bf4dbd", 0x91}, {&(0x7f00000004c0)="fb2005b7dfb9f4c9bc753facb17c0dee1cd83a4e6b038550c04020690f7e7cc29820b5369dfe9352bcb9bc8903145f1d5fdcaea6e5267e09abc45d2b333809fccadd02e908e05030ea94e2db2e121e7f2f0f40fcaf646b4087256792114cc980c1ce3cd0f63b530ea6c9fb432c102e8b873fabb12b3eca1d90a22a59c2e8498dcd3310dc9d2fe329553e39a49c8324c08e5cf4f890577f9f9f4c77bcb52dd11af59d5bf014b37039c8c8e17790", 0xad}], 0x9, &(0x7f0000000640)="4f5a49b256e9e875155f98129983499bbacb4f48b28c27fba16f5c450e25f99349604631f1b2b1dad9dbb9af55c98efd1e6d427bc973ece7da0d072ee234d686221cccd7bfdf17379a1856ca000d2449c69ecca9c95edf9fdac4159b81807b7532fa80a1780e99717bfff9b8dca98daf9ef266ed28a3c28ab2a215415bbd890ca1236bee61b831401a", 0x89, 0x4001}, 0x55) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{0x0, 0x1, 0x1, 0xb}, {0x5, 0x3, 0x8, 0x1}, {0x8000, 0x4, 0x10008, 0xa}]}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000001400000000000000000000000200000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f0000017f000001000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f000001ac141400000000001c00000000000000000000004700000044aa00210a2101"], 0x230}, 0x0) r6 = socket$kcm(0x10, 0x3, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0xd6, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0xc}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030033000b35d25a806c8c6f94f90224fc60100005000a000200053582c137153e37000c0680050002000300", 0x33fe0}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0xa, [@datasec={0x4, 0x6, 0x0, 0xf, 0x3, [{}, {}, {}, {}, {}, {}], "491eaf"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "d5"}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x30, 0x30, 0x2e, 0x0]}}, &(0x7f00000006c0)=""/50, 0x86, 0x32, 0x1}, 0x20) r8 = socket$kcm(0xa, 0x1, 0x106) setsockopt$sock_attach_bpf(r8, 0x29, 0x4e, 0x0, 0x0) 414.626652ms ago: executing program 4 (id=391): r0 = socket$kcm(0x2, 0x200000000000001, 0x106) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0xc220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x16, 0x2, 0x0, 0x0, 0x0, 0x1, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x1ff, 0xa6}, 0x11619d, 0x9, 0xfffffbff, 0x5, 0x2, 0x200, 0x5, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="d8000000310081044e81f782db44b904021d080005000000e8fe55a1180015000600142603600e120900210000000401a8001600a40001", 0x37}], 0x1}, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f0000000040)="b64b6779e728a585fc6d831c9c111ee3bf867c7fa20663508d961b5b0bc1d4eded804b84c8ee0b5e7b55af44aa8bf4a16c4d4aaf896a13f650a3b4f737945a9a179a6ceb93adadb8dd841258d0f04b02868cd415ab9bc48b055a8b3f92b143cb16138c216513a045af2101e7e3c507bedee404330f1171812cdaeed17a0e89dd4863a4e6808ca6b7046c38f33b9a0417e1c8fae7a9e1b4c8161b02", 0x0, 0x0, 0x0}, 0x38) r3 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES8=r0], 0xfe33) r4 = socket$kcm(0x29, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB="0f0000000400000008000000cc0a000000000000", @ANYRES32=0x1, @ANYBLOB="000000000000daf20fe176c703d300000000000200", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r5, &(0x7f00000001c0), 0x0}, 0x20) r6 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180)={0x0, r6}, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1a, 0x3, &(0x7f00000007c0)=ANY=[@ANYRESHEX, @ANYRESDEC=r2, @ANYRES64=r4, @ANYBLOB="850d195b6acd0c5d251f0288636b1e5c831abe07ce957db1a673c78c2b30b999149b18eb19f9f0a0f46657fc58808e76d0bbba188af1120b1e566c60eb89242054c04f926ba3633c44e133e800f567a5e52165c532de70dadc4a809dc8ea0dd720276d3e85e21ad0c6678370c07dc4380831f1382eaceafb03b805bf514e14dca0a8d433c682b8f8542cc0e9300bfa266af54c3bedafbb10b4881cdea577a5ba2b48e31dcf8d471aa4fb9ce7e6e1a8f6db2ba1b3aa38f1879e2d55ad16a87ae8e107448eb893b144801de22a681977497bbdd108e8a00974eeda800d"], 0x0, 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x7, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) sendmsg$kcm(r0, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x20040000) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0xfc, 0x0}, 0x30004001) socket$kcm(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000090) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x20000001) r8 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x8) r9 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={0x0, 0xf}, 0x1000, 0x2214, 0x0, 0x8, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) ioctl$TUNSETQUEUE(r3, 0x400454d9, 0x0) sendmsg$kcm(r8, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="d8000000100081046881f782db44b904021d080b01000000e8fe55a11800150006001400060000120800040043000000a80016000a00014006000d3f036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1, 0x0, 0x0, 0xc3ff}, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)=@generic={&(0x7f0000000000)='./file0\x00', r7}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x83, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x2100, 0x0) 323.287613ms ago: executing program 2 (id=392): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0xc, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, [@printk={@s, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xb0}}, @call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000200), &(0x7f0000000240)=r0}, 0x20) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020032000b07d25a806f8c6394f90424fc602f0000000a740200053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 0s ago: executing program 2 (id=393): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x3, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x660}}, &(0x7f0000000040)='GPL\x00', 0xc, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x9, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000026006bab9a3fe3d86e17aa31106b876c1d0000007ea60864160af36504001a0038001d004231a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb5b64f69853362ac3407173ec", 0x24}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.86' (ED25519) to the list of known hosts. [ 96.047104][ T5779] cgroup: Unknown subsys name 'net' [ 96.214277][ T5779] cgroup: Unknown subsys name 'rlimit' Setting up swapspace version 1, size = 127995904 bytes [ 98.059415][ T5779] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 100.002554][ T50] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 100.027553][ T50] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 100.033849][ T5803] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 100.045976][ T50] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 100.047079][ T5803] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 100.061248][ T50] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 100.067677][ T5803] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 100.070856][ T5797] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 100.078622][ T5803] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 100.085374][ T5797] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 100.090834][ T5804] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 100.100390][ T5803] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 100.113549][ T5805] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 100.116225][ T5797] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 100.122044][ T5805] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 100.129243][ T5803] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 100.139071][ T5804] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 100.143913][ T5803] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 100.152808][ T5804] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 100.158868][ T5803] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 100.166760][ T5804] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 100.174046][ T5803] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 100.202584][ T5800] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 100.216162][ T5108] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 100.896121][ T5790] chnl_net:caif_netlink_parms(): no params data found [ 100.909019][ T5789] chnl_net:caif_netlink_parms(): no params data found [ 100.940151][ T5801] chnl_net:caif_netlink_parms(): no params data found [ 100.981123][ T5794] chnl_net:caif_netlink_parms(): no params data found [ 101.204343][ T5790] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.212056][ T5790] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.220638][ T5790] bridge_slave_0: entered allmulticast mode [ 101.229358][ T5790] bridge_slave_0: entered promiscuous mode [ 101.253112][ T5789] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.260694][ T5789] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.268861][ T5789] bridge_slave_0: entered allmulticast mode [ 101.277075][ T5789] bridge_slave_0: entered promiscuous mode [ 101.300471][ T5801] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.308037][ T5801] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.316615][ T5801] bridge_slave_0: entered allmulticast mode [ 101.324032][ T5801] bridge_slave_0: entered promiscuous mode [ 101.333642][ T5790] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.341738][ T5790] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.349304][ T5790] bridge_slave_1: entered allmulticast mode [ 101.357178][ T5790] bridge_slave_1: entered promiscuous mode [ 101.378651][ T5789] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.386248][ T5789] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.393662][ T5789] bridge_slave_1: entered allmulticast mode [ 101.402284][ T5789] bridge_slave_1: entered promiscuous mode [ 101.409935][ T5801] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.417683][ T5801] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.425593][ T5801] bridge_slave_1: entered allmulticast mode [ 101.433149][ T5801] bridge_slave_1: entered promiscuous mode [ 101.453386][ T5794] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.461115][ T5794] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.469392][ T5794] bridge_slave_0: entered allmulticast mode [ 101.477379][ T5794] bridge_slave_0: entered promiscuous mode [ 101.529125][ T5794] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.537345][ T5794] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.546050][ T5794] bridge_slave_1: entered allmulticast mode [ 101.553872][ T5794] bridge_slave_1: entered promiscuous mode [ 101.588948][ T5790] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 101.614722][ T5789] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 101.627298][ T5801] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 101.640347][ T5801] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 101.652392][ T5790] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 101.691083][ T5794] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 101.702883][ T5789] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 101.763513][ T5794] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 101.793377][ T5801] team0: Port device team_slave_0 added [ 101.804142][ T5790] team0: Port device team_slave_0 added [ 101.813044][ T5790] team0: Port device team_slave_1 added [ 101.848643][ T5789] team0: Port device team_slave_0 added [ 101.857074][ T5801] team0: Port device team_slave_1 added [ 101.864872][ T5789] team0: Port device team_slave_1 added [ 101.898286][ T5794] team0: Port device team_slave_0 added [ 101.956319][ T5790] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 101.963430][ T5790] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 101.989760][ T5790] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 102.003838][ T5794] team0: Port device team_slave_1 added [ 102.023736][ T5801] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 102.032302][ T5801] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 102.058646][ T5801] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 102.071809][ T5801] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 102.079093][ T5801] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 102.110337][ T5801] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 102.122262][ T5789] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 102.129636][ T5789] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 102.155980][ T5789] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 102.169328][ T5789] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 102.176759][ T5789] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 102.203369][ T5789] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 102.215782][ T5790] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 102.222793][ T5790] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 102.249514][ T5790] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 102.266216][ T5108] Bluetooth: hci0: command tx timeout [ 102.272526][ T5792] Bluetooth: hci2: command tx timeout [ 102.278700][ T5800] Bluetooth: hci3: command tx timeout [ 102.294286][ T5794] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 102.301568][ T5794] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 102.328525][ T5794] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 102.346017][ T5794] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 102.353014][ T5794] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 102.379975][ T5794] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 102.383719][ T5800] Bluetooth: hci1: command tx timeout [ 102.513958][ T5789] hsr_slave_0: entered promiscuous mode [ 102.521738][ T5789] hsr_slave_1: entered promiscuous mode [ 102.552589][ T5790] hsr_slave_0: entered promiscuous mode [ 102.560219][ T5790] hsr_slave_1: entered promiscuous mode [ 102.567454][ T5790] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 102.575923][ T5790] Cannot create hsr debugfs directory [ 102.586682][ T5801] hsr_slave_0: entered promiscuous mode [ 102.593338][ T5801] hsr_slave_1: entered promiscuous mode [ 102.599881][ T5801] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 102.607664][ T5801] Cannot create hsr debugfs directory [ 102.635640][ T5794] hsr_slave_0: entered promiscuous mode [ 102.642443][ T5794] hsr_slave_1: entered promiscuous mode [ 102.649926][ T5794] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 102.657768][ T5794] Cannot create hsr debugfs directory [ 103.134005][ T5789] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 103.149646][ T5789] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 103.161419][ T5789] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 103.175027][ T5789] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 103.249728][ T5794] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 103.264322][ T5794] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 103.286238][ T5794] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 103.299042][ T5794] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 103.328642][ T1203] cfg80211: failed to load regulatory.db [ 103.418294][ T5790] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 103.438635][ T5790] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 103.450218][ T5790] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 103.461168][ T5790] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 103.577748][ T5801] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 103.589665][ T5801] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 103.601921][ T5801] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 103.626483][ T5801] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 103.748458][ T5789] 8021q: adding VLAN 0 to HW filter on device bond0 [ 103.777880][ T5794] 8021q: adding VLAN 0 to HW filter on device bond0 [ 103.839630][ T5794] 8021q: adding VLAN 0 to HW filter on device team0 [ 103.866365][ T5789] 8021q: adding VLAN 0 to HW filter on device team0 [ 103.886989][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.894547][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.916576][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.923762][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.954191][ T5790] 8021q: adding VLAN 0 to HW filter on device bond0 [ 103.965067][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.972551][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.016460][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.023742][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.067144][ T5790] 8021q: adding VLAN 0 to HW filter on device team0 [ 104.112971][ T5801] 8021q: adding VLAN 0 to HW filter on device bond0 [ 104.124446][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.131879][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.159661][ T2905] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.167250][ T2905] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.241584][ T5789] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 104.307976][ T5801] 8021q: adding VLAN 0 to HW filter on device team0 [ 104.349306][ T5800] Bluetooth: hci2: command tx timeout [ 104.349341][ T5108] Bluetooth: hci0: command tx timeout [ 104.362006][ T5792] Bluetooth: hci3: command tx timeout [ 104.384311][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.391686][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.426477][ T5108] Bluetooth: hci1: command tx timeout [ 104.431513][ T5790] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 104.478325][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.486208][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.734144][ T5794] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 104.821230][ T5789] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 104.916519][ T5794] veth0_vlan: entered promiscuous mode [ 104.954898][ T5789] veth0_vlan: entered promiscuous mode [ 104.997414][ T5794] veth1_vlan: entered promiscuous mode [ 105.051747][ T5790] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 105.080026][ T5789] veth1_vlan: entered promiscuous mode [ 105.097573][ T5794] veth0_macvtap: entered promiscuous mode [ 105.120879][ T5794] veth1_macvtap: entered promiscuous mode [ 105.163596][ T5794] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 105.183920][ T5801] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 105.206759][ T5794] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 105.241128][ T5794] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.250689][ T5794] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.259855][ T5794] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.268953][ T5794] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.301249][ T5789] veth0_macvtap: entered promiscuous mode [ 105.327212][ T5789] veth1_macvtap: entered promiscuous mode [ 105.367522][ T5790] veth0_vlan: entered promiscuous mode [ 105.423127][ T5789] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 105.440976][ T5789] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 105.453194][ T5789] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 105.465939][ T5801] veth0_vlan: entered promiscuous mode [ 105.490803][ T5789] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 105.502922][ T5789] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 105.515737][ T5789] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 105.527122][ T5790] veth1_vlan: entered promiscuous mode [ 105.534590][ T5789] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.544526][ T5789] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.555737][ T5789] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.564660][ T5789] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.613921][ T5801] veth1_vlan: entered promiscuous mode [ 105.656123][ T3509] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 105.664434][ T3509] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 105.762768][ T3509] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 105.776177][ T3465] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 105.792089][ T3509] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 105.796531][ T5790] veth0_macvtap: entered promiscuous mode [ 105.809203][ T3465] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 105.874566][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 105.888624][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 105.892948][ T5790] veth1_macvtap: entered promiscuous mode [ 105.945098][ T5801] veth0_macvtap: entered promiscuous mode [ 105.963653][ T5801] veth1_macvtap: entered promiscuous mode [ 105.984269][ T5790] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 105.999530][ T5790] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 106.013003][ T5790] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 106.023806][ T5790] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 106.038014][ T5790] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 106.050540][ T5790] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 106.061320][ T5790] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 106.073234][ T5790] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 106.084791][ T5790] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 106.097524][ T5790] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 106.145078][ T5790] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 106.154809][ T5790] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 106.205458][ T5790] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 106.234826][ T5790] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 106.303034][ T5801] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 106.321779][ T5801] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 106.332007][ T5801] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 106.342569][ T5801] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 106.354906][ T5801] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 106.366541][ T5801] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 106.381450][ T5801] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 106.413598][ T5801] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 106.425960][ T5108] Bluetooth: hci0: command tx timeout [ 106.431456][ T5108] Bluetooth: hci3: command tx timeout [ 106.433330][ T5801] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 106.444322][ T5792] Bluetooth: hci2: command tx timeout [ 106.448786][ T5801] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 106.471193][ T5801] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 106.481914][ T5801] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 106.493094][ T5801] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 106.506880][ T5801] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 106.516099][ T5108] Bluetooth: hci1: command tx timeout [ 106.532767][ T5801] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 106.543237][ T5801] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 106.553303][ T5801] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 106.563718][ T5801] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 106.751713][ T5887] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5'. [ 106.805035][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 106.814585][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 106.975189][ C0] hrtimer: interrupt took 45738 ns [ 106.983444][ T42] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 106.997126][ T42] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 107.039944][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 107.057909][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 107.137855][ T2905] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 107.171372][ T2905] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 107.609870][ T5891] syzkaller0: entered promiscuous mode [ 107.626950][ T5891] syzkaller0: entered allmulticast mode [ 107.984359][ T5904] netlink: 209852 bytes leftover after parsing attributes in process `syz.0.1'. [ 108.008189][ T5904] openvswitch: netlink: Tunnel attr 0 has unexpected len 3060 expected 8 [ 108.419662][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 108.506968][ T5108] Bluetooth: hci0: command tx timeout [ 108.515386][ T5108] Bluetooth: hci3: command tx timeout [ 108.521025][ T5108] Bluetooth: hci2: command tx timeout [ 108.585542][ T5108] Bluetooth: hci1: command tx timeout [ 110.579854][ T5924] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 110.860787][ T5925] warning: `syz.2.9' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 [ 112.167529][ T5947] netlink: 'syz.0.19': attribute type 10 has an invalid length. [ 112.176826][ T5947] netlink: 40 bytes leftover after parsing attributes in process `syz.0.19'. [ 112.205820][ T5947] batadv0: entered promiscuous mode [ 112.243367][ T5947] bridge0: port 3(batadv0) entered blocking state [ 112.288518][ T5947] bridge0: port 3(batadv0) entered disabled state [ 112.303259][ T5947] batadv0: entered allmulticast mode [ 112.510974][ T5947] bridge0: port 3(batadv0) entered blocking state [ 112.519688][ T5947] bridge0: port 3(batadv0) entered forwarding state [ 112.852106][ T5947] syz.0.19 (5947) used greatest stack depth: 19368 bytes left [ 112.879870][ T3465] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 112.889601][ T3465] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 113.142090][ T5959] netlink: 132 bytes leftover after parsing attributes in process `syz.1.23'. [ 113.151813][ T5960] Q6\bY4: renamed from lo (while UP) [ 113.770022][ T5966] netlink: 209852 bytes leftover after parsing attributes in process `syz.1.25'. [ 113.780101][ T5966] openvswitch: netlink: Tunnel attr 0 has unexpected len 3060 expected 8 [ 114.363485][ T5975] netlink: 'syz.3.30': attribute type 10 has an invalid length. [ 114.393117][ T5975] netlink: 40 bytes leftover after parsing attributes in process `syz.3.30'. [ 114.462506][ T5975] batadv0: entered promiscuous mode [ 114.548373][ T5975] bridge0: port 3(batadv0) entered blocking state [ 114.559101][ T5975] bridge0: port 3(batadv0) entered disabled state [ 114.586608][ T5975] batadv0: entered allmulticast mode [ 114.689350][ T5975] bridge0: port 3(batadv0) entered blocking state [ 114.698815][ T5975] bridge0: port 3(batadv0) entered forwarding state [ 114.968284][ T11] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 114.977936][ T11] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 115.135974][ T5983] netlink: 132 bytes leftover after parsing attributes in process `syz.2.32'. [ 115.463126][ T5994] Q6\bY4: renamed from lo (while UP) [ 116.478560][ T6010] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.39'. [ 116.491604][ T6010] openvswitch: netlink: Tunnel attr 0 has unexpected len 3060 expected 8 [ 117.932995][ T6022] netlink: 132 bytes leftover after parsing attributes in process `syz.3.42'. [ 118.605183][ T6024] netlink: 'syz.2.43': attribute type 10 has an invalid length. [ 118.621058][ T6024] netlink: 40 bytes leftover after parsing attributes in process `syz.2.43'. [ 118.633856][ T6024] batadv0: entered promiscuous mode [ 118.658800][ T6024] bridge0: port 3(batadv0) entered blocking state [ 118.717403][ T6024] bridge0: port 3(batadv0) entered disabled state [ 118.739990][ T6024] batadv0: entered allmulticast mode [ 118.780324][ T6024] bridge0: port 3(batadv0) entered blocking state [ 118.787022][ T6024] bridge0: port 3(batadv0) entered forwarding state [ 118.997810][ T3509] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 119.007531][ T3509] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 119.257877][ T6035] Q6\bY4: renamed from lo (while UP) [ 121.106014][ T6058] syzkaller0: entered promiscuous mode [ 121.111763][ T6058] syzkaller0: entered allmulticast mode [ 122.871914][ T6072] netlink: 132 bytes leftover after parsing attributes in process `syz.0.59'. [ 123.498512][ T6081] FAULT_INJECTION: forcing a failure. [ 123.498512][ T6081] name failslab, interval 1, probability 0, space 0, times 1 [ 123.552724][ T6081] CPU: 0 PID: 6081 Comm: syz.1.71 Not tainted syzkaller #0 [ 123.560104][ T6081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 123.570300][ T6081] Call Trace: [ 123.573615][ T6081] [ 123.576704][ T6081] dump_stack_lvl+0x16c/0x230 [ 123.581460][ T6081] ? show_regs_print_info+0x20/0x20 [ 123.586836][ T6081] ? load_image+0x3b0/0x3b0 [ 123.591401][ T6081] ? __might_sleep+0xe0/0xe0 [ 123.596129][ T6081] ? __lock_acquire+0x7c80/0x7c80 [ 123.601211][ T6081] should_fail_ex+0x39d/0x4d0 [ 123.605940][ T6081] should_failslab+0x9/0x20 [ 123.610483][ T6081] slab_pre_alloc_hook+0x59/0x310 [ 123.615564][ T6081] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 123.621339][ T6081] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 123.627112][ T6081] __kmem_cache_alloc_node+0x53/0x260 [ 123.632562][ T6081] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 123.638331][ T6081] __kmalloc+0xa4/0x240 [ 123.642540][ T6081] tomoyo_realpath_from_path+0xe3/0x5d0 [ 123.648151][ T6081] tomoyo_path_number_perm+0x1ea/0x590 [ 123.653659][ T6081] ? tomoyo_path_number_perm+0x1ba/0x590 [ 123.659339][ T6081] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 123.664848][ T6081] ? ksys_write+0x1c1/0x250 [ 123.669435][ T6081] ? __fget_files+0x28/0x4d0 [ 123.674082][ T6081] security_file_ioctl+0x70/0xa0 [ 123.679084][ T6081] __se_sys_ioctl+0x48/0x170 [ 123.683738][ T6081] do_syscall_64+0x55/0xb0 [ 123.688203][ T6081] ? clear_bhb_loop+0x40/0x90 [ 123.692914][ T6081] ? clear_bhb_loop+0x40/0x90 [ 123.697630][ T6081] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 123.703571][ T6081] RIP: 0033:0x7f78aaf8eba9 [ 123.708020][ T6081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 123.727674][ T6081] RSP: 002b:00007f78abda3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 123.736129][ T6081] RAX: ffffffffffffffda RBX: 00007f78ab1d5fa0 RCX: 00007f78aaf8eba9 [ 123.744145][ T6081] RDX: 0000200000000000 RSI: 0000000000008b18 RDI: 0000000000000004 [ 123.752150][ T6081] RBP: 00007f78abda3090 R08: 0000000000000000 R09: 0000000000000000 [ 123.760156][ T6081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 123.768158][ T6081] R13: 00007f78ab1d6038 R14: 00007f78ab1d5fa0 R15: 00007ffe84d7b9e8 [ 123.776193][ T6081] [ 123.800619][ T6081] ERROR: Out of memory at tomoyo_realpath_from_path. [ 124.924723][ T6102] syzkaller0: entered promiscuous mode [ 124.937707][ T6102] syzkaller0: entered allmulticast mode [ 126.939347][ T6113] netlink: 132 bytes leftover after parsing attributes in process `syz.2.70'. [ 128.818577][ T6148] netlink: 132 bytes leftover after parsing attributes in process `syz.3.82'. [ 129.129844][ T6154] FAULT_INJECTION: forcing a failure. [ 129.129844][ T6154] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 129.149822][ T6154] CPU: 1 PID: 6154 Comm: syz.1.86 Not tainted syzkaller #0 [ 129.157115][ T6154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 129.167318][ T6154] Call Trace: [ 129.170659][ T6154] [ 129.173639][ T6154] dump_stack_lvl+0x16c/0x230 [ 129.178390][ T6154] ? show_regs_print_info+0x20/0x20 [ 129.183652][ T6154] ? load_image+0x3b0/0x3b0 [ 129.188234][ T6154] ? __might_fault+0xaa/0x120 [ 129.192968][ T6154] ? __lock_acquire+0x7c80/0x7c80 [ 129.198073][ T6154] should_fail_ex+0x39d/0x4d0 [ 129.202822][ T6154] strncpy_from_user+0x36/0x2e0 [ 129.207904][ T6154] getname_flags+0xf6/0x500 [ 129.212485][ T6154] do_sys_openat2+0xcb/0x1c0 [ 129.217115][ T6154] ? do_sys_open+0xe0/0xe0 [ 129.221569][ T6154] ? lockdep_hardirqs_on_prepare+0x400/0x760 [ 129.227598][ T6154] ? lock_chain_count+0x20/0x20 [ 129.232478][ T6154] __x64_sys_openat+0x139/0x160 [ 129.237361][ T6154] do_syscall_64+0x55/0xb0 [ 129.241840][ T6154] ? clear_bhb_loop+0x40/0x90 [ 129.246536][ T6154] ? clear_bhb_loop+0x40/0x90 [ 129.251237][ T6154] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 129.257170][ T6154] RIP: 0033:0x7f78aaf8d510 [ 129.261627][ T6154] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 129.281252][ T6154] RSP: 002b:00007f78abda2f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 129.289702][ T6154] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f78aaf8d510 [ 129.297698][ T6154] RDX: 0000000000000002 RSI: 00007f78abda2fa0 RDI: 00000000ffffff9c [ 129.305690][ T6154] RBP: 00007f78abda2fa0 R08: 0000000000000000 R09: 0000000000000000 [ 129.313678][ T6154] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 129.321671][ T6154] R13: 00007f78ab1d6038 R14: 00007f78ab1d5fa0 R15: 00007ffe84d7b9e8 [ 129.329717][ T6154] [ 129.627061][ T42] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 129.738655][ T42] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 129.930038][ T42] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 130.050703][ T42] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 130.240367][ T6166] netlink: 10 bytes leftover after parsing attributes in process `syz.2.97'. [ 130.847125][ T5792] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 130.865709][ T5792] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 130.875786][ T5792] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 130.889435][ T5792] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 130.906883][ T5792] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 130.915819][ T5792] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 131.516529][ T6186] netlink: 61967 bytes leftover after parsing attributes in process `syz.2.95'. [ 132.986783][ T5108] Bluetooth: hci2: command tx timeout [ 133.575498][ T6240] FAULT_INJECTION: forcing a failure. [ 133.575498][ T6240] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 133.590079][ T6238] FAULT_INJECTION: forcing a failure. [ 133.590079][ T6238] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 133.603904][ T6240] CPU: 1 PID: 6240 Comm: syz.1.103 Not tainted syzkaller #0 [ 133.611252][ T6240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 133.621355][ T6240] Call Trace: [ 133.624682][ T6240] [ 133.627650][ T6240] dump_stack_lvl+0x16c/0x230 [ 133.632444][ T6240] ? show_regs_print_info+0x20/0x20 [ 133.637683][ T6240] ? load_image+0x3b0/0x3b0 [ 133.642211][ T6240] ? __might_fault+0xaa/0x120 [ 133.646922][ T6240] ? __lock_acquire+0x7c80/0x7c80 [ 133.652063][ T6240] should_fail_ex+0x39d/0x4d0 [ 133.656781][ T6240] _copy_to_user+0x2f/0xa0 [ 133.661240][ T6240] generic_map_lookup_batch+0x8c1/0xcd0 [ 133.666834][ T6240] ? __lock_acquire+0x7c80/0x7c80 [ 133.671916][ T6240] ? bpf_map_update_value+0x720/0x720 [ 133.677334][ T6240] ? __fdget+0x180/0x210 [ 133.681607][ T6240] ? bpf_map_update_value+0x720/0x720 [ 133.687012][ T6240] bpf_map_do_batch+0x2cb/0x610 [ 133.691890][ T6240] ? bpf_lsm_bpf+0x9/0x10 [ 133.696242][ T6240] ? security_bpf+0x7e/0xa0 [ 133.700777][ T6240] __sys_bpf+0x76e/0x800 [ 133.705044][ T6240] ? bpf_link_show_fdinfo+0x350/0x350 [ 133.710461][ T6240] ? lock_chain_count+0x20/0x20 [ 133.715351][ T6240] __x64_sys_bpf+0x7c/0x90 [ 133.719798][ T6240] do_syscall_64+0x55/0xb0 [ 133.724249][ T6240] ? clear_bhb_loop+0x40/0x90 [ 133.728957][ T6240] ? clear_bhb_loop+0x40/0x90 [ 133.733681][ T6240] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 133.739624][ T6240] RIP: 0033:0x7f78aaf8eba9 [ 133.744072][ T6240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 133.763902][ T6240] RSP: 002b:00007f78abda3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 133.772362][ T6240] RAX: ffffffffffffffda RBX: 00007f78ab1d5fa0 RCX: 00007f78aaf8eba9 [ 133.780360][ T6240] RDX: 0000000000000038 RSI: 00002000000003c0 RDI: 0000000000000018 [ 133.788361][ T6240] RBP: 00007f78abda3090 R08: 0000000000000000 R09: 0000000000000000 [ 133.796372][ T6240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 133.804378][ T6240] R13: 00007f78ab1d6038 R14: 00007f78ab1d5fa0 R15: 00007ffe84d7b9e8 [ 133.812412][ T6240] [ 133.815458][ T6238] CPU: 0 PID: 6238 Comm: syz.2.102 Not tainted syzkaller #0 [ 133.822806][ T6238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 133.832892][ T6238] Call Trace: [ 133.836188][ T6238] [ 133.839137][ T6238] dump_stack_lvl+0x16c/0x230 [ 133.843852][ T6238] ? show_regs_print_info+0x20/0x20 [ 133.849080][ T6238] ? load_image+0x3b0/0x3b0 [ 133.853624][ T6238] ? __might_fault+0xaa/0x120 [ 133.858335][ T6238] ? __lock_acquire+0x7c80/0x7c80 [ 133.863398][ T6238] should_fail_ex+0x39d/0x4d0 [ 133.868290][ T6238] _copy_from_iter+0x1d3/0x1290 [ 133.873170][ T6238] ? rep_movs_alternative+0x4a/0x90 [ 133.878402][ T6238] ? _copy_from_iter+0x248/0x1290 [ 133.883477][ T6238] ? __virt_addr_valid+0x18c/0x540 [ 133.888621][ T6238] ? __lock_acquire+0x7c80/0x7c80 [ 133.893693][ T6238] ? copyout_mc+0x70/0x70 [ 133.898057][ T6238] ? copyout_mc+0x70/0x70 [ 133.902412][ T6238] ? __virt_addr_valid+0x18c/0x540 [ 133.907553][ T6238] ? page_copy_sane+0x16a/0x270 [ 133.912435][ T6238] copy_page_from_iter+0x7b/0x100 [ 133.917491][ T6238] skb_copy_datagram_from_iter+0x2e4/0x6e0 [ 133.923341][ T6238] tun_get_user+0x1583/0x3bf0 [ 133.928055][ T6238] ? aa_file_perm+0x120/0xec0 [ 133.932754][ T6238] ? aa_file_perm+0x3e8/0xec0 [ 133.937452][ T6238] ? rcu_read_unlock+0xa0/0xa0 [ 133.942246][ T6238] ? tun_get+0x1c/0x2e0 [ 133.946456][ T6238] ? __lock_acquire+0x7c80/0x7c80 [ 133.951503][ T6238] ? tun_get+0x1c/0x2e0 [ 133.955794][ T6238] tun_chr_write_iter+0x119/0x200 [ 133.961038][ T6238] vfs_write+0x43b/0x940 [ 133.965333][ T6238] ? file_end_write+0x250/0x250 [ 133.970239][ T6238] ? __fget_files+0x44a/0x4d0 [ 133.974999][ T6238] ? __fdget_pos+0x1d8/0x330 [ 133.979650][ T6238] ? ksys_write+0x75/0x250 [ 133.984196][ T6238] ksys_write+0x147/0x250 [ 133.988555][ T6238] ? __ia32_sys_read+0x90/0x90 [ 133.993358][ T6238] ? lockdep_hardirqs_on+0x98/0x150 [ 133.998636][ T6238] do_syscall_64+0x55/0xb0 [ 134.003143][ T6238] ? clear_bhb_loop+0x40/0x90 [ 134.007896][ T6238] ? clear_bhb_loop+0x40/0x90 [ 134.012628][ T6238] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 134.018651][ T6238] RIP: 0033:0x7ffa4398eba9 [ 134.023093][ T6238] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 134.042758][ T6238] RSP: 002b:00007ffa448d1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 134.051224][ T6238] RAX: ffffffffffffffda RBX: 00007ffa43bd5fa0 RCX: 00007ffa4398eba9 [ 134.059249][ T6238] RDX: 000000000000fdef RSI: 0000200000000640 RDI: 00000000000000c8 [ 134.067347][ T6238] RBP: 00007ffa448d1090 R08: 0000000000000000 R09: 0000000000000000 [ 134.075370][ T6238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 134.083363][ T6238] R13: 00007ffa43bd6038 R14: 00007ffa43bd5fa0 R15: 00007ffd8e4e9b58 [ 134.091402][ T6238] [ 134.175401][ T6176] chnl_net:caif_netlink_parms(): no params data found [ 134.394147][ T6245] netlink: 44 bytes leftover after parsing attributes in process `syz.2.105'. [ 134.421543][ T6245] netlink: 44 bytes leftover after parsing attributes in process `syz.2.105'. [ 134.513421][ T42] hsr_slave_0: left promiscuous mode [ 134.528678][ T42] hsr_slave_1: left promiscuous mode [ 134.548019][ T42] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 134.556128][ T42] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 134.578256][ T42] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 134.595282][ T42] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 134.603712][ T42] batadv0: left allmulticast mode [ 134.616709][ T42] bridge0: port 3(batadv0) entered disabled state [ 134.631804][ T42] bridge_slave_1: left allmulticast mode [ 134.638973][ T42] bridge_slave_1: left promiscuous mode [ 134.644818][ T42] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.661202][ T42] bridge_slave_0: left allmulticast mode [ 134.667812][ T42] bridge_slave_0: left promiscuous mode [ 134.673625][ T42] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.725275][ T42] veth1_macvtap: left promiscuous mode [ 134.737362][ T42] veth0_macvtap: left promiscuous mode [ 134.743793][ T42] veth1_vlan: left promiscuous mode [ 134.750460][ T42] veth0_vlan: left promiscuous mode [ 135.065386][ T5108] Bluetooth: hci2: command tx timeout [ 135.608274][ T42] team0 (unregistering): Port device team_slave_1 removed [ 135.649267][ T42] team0 (unregistering): Port device team_slave_0 removed [ 135.696859][ T42] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 135.740372][ T42] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 136.175079][ T42] bond0 (unregistering): Released all slaves [ 136.350632][ T6176] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.359488][ T6176] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.368833][ T6176] bridge_slave_0: entered allmulticast mode [ 136.377252][ T6176] bridge_slave_0: entered promiscuous mode [ 136.452714][ T6176] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.473049][ T6176] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.486771][ T6176] bridge_slave_1: entered allmulticast mode [ 136.494381][ T6176] bridge_slave_1: entered promiscuous mode [ 136.571289][ T6176] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 136.667259][ T6176] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 136.849840][ T6176] team0: Port device team_slave_0 added [ 136.884105][ T6176] team0: Port device team_slave_1 added [ 137.011534][ T6176] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 137.028157][ T6176] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 137.064194][ T6176] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 137.096007][ T6176] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 137.103031][ T6176] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 137.145315][ T5108] Bluetooth: hci2: command tx timeout [ 137.173498][ T6176] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 138.225286][ T6176] hsr_slave_0: entered promiscuous mode [ 138.283634][ T6176] hsr_slave_1: entered promiscuous mode [ 138.324474][ T6176] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 138.332794][ T6176] Cannot create hsr debugfs directory [ 138.358110][ T6302] mac80211_hwsim hwsim5 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 138.380207][ T6306] netlink: 'syz.0.114': attribute type 10 has an invalid length. [ 138.393082][ T6306] netlink: 2 bytes leftover after parsing attributes in process `syz.0.114'. [ 138.443499][ T6306] bond0: entered promiscuous mode [ 138.449962][ T6306] bond_slave_0: entered promiscuous mode [ 138.461197][ T6306] bond_slave_1: entered promiscuous mode [ 138.467705][ T6306] bridge0: port 4(bond0) entered blocking state [ 138.474235][ T6306] bridge0: port 4(bond0) entered disabled state [ 138.491380][ T6306] bond0: entered allmulticast mode [ 138.509168][ T6306] bond_slave_0: entered allmulticast mode [ 138.514983][ T6306] bond_slave_1: entered allmulticast mode [ 138.563969][ T6306] bridge0: port 4(bond0) entered blocking state [ 138.570505][ T6306] bridge0: port 4(bond0) entered forwarding state [ 138.679693][ T6309] netlink: 'syz.2.113': attribute type 10 has an invalid length. [ 138.741122][ T6309] team0: Device hsr_slave_0 failed to register rx_handler [ 139.200929][ T1288] ieee802154 phy0 wpan0: encryption failed: -22 [ 139.208450][ T1288] ieee802154 phy1 wpan1: encryption failed: -22 [ 139.242447][ T5108] Bluetooth: hci2: command tx timeout [ 139.830098][ T6176] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 139.914611][ T6176] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 139.972456][ T6176] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 140.009921][ T6176] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 140.527193][ T6176] 8021q: adding VLAN 0 to HW filter on device bond0 [ 140.590730][ T6176] 8021q: adding VLAN 0 to HW filter on device team0 [ 140.614437][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.621700][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.678954][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.686304][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.066790][ T3465] wlan1: Trigger new scan to find an IBSS to join [ 141.238700][ T6370] FAULT_INJECTION: forcing a failure. [ 141.238700][ T6370] name failslab, interval 1, probability 0, space 0, times 0 [ 141.309392][ T6370] CPU: 0 PID: 6370 Comm: syz.0.124 Not tainted syzkaller #0 [ 141.316771][ T6370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 141.326916][ T6370] Call Trace: [ 141.330220][ T6370] [ 141.333168][ T6370] dump_stack_lvl+0x16c/0x230 [ 141.337962][ T6370] ? show_regs_print_info+0x20/0x20 [ 141.343212][ T6370] ? load_image+0x3b0/0x3b0 [ 141.347766][ T6370] ? __might_sleep+0xe0/0xe0 [ 141.352384][ T6370] ? __lock_acquire+0x7c80/0x7c80 [ 141.357431][ T6370] should_fail_ex+0x39d/0x4d0 [ 141.362145][ T6370] should_failslab+0x9/0x20 [ 141.366695][ T6370] slab_pre_alloc_hook+0x59/0x310 [ 141.371763][ T6370] ? bpf_prog_test_run_skb+0x22c/0x11c0 [ 141.377335][ T6370] ? bpf_prog_test_run_skb+0x22c/0x11c0 [ 141.382914][ T6370] __kmem_cache_alloc_node+0x53/0x260 [ 141.388314][ T6370] ? __lock_acquire+0x7c80/0x7c80 [ 141.393362][ T6370] ? bpf_prog_test_run_skb+0x22c/0x11c0 [ 141.398952][ T6370] __kmalloc+0xa4/0x240 [ 141.403524][ T6370] bpf_prog_test_run_skb+0x22c/0x11c0 [ 141.408919][ T6370] ? __fget_files+0x28/0x4d0 [ 141.413528][ T6370] ? __fget_files+0x44a/0x4d0 [ 141.418241][ T6370] ? cpu_online+0x60/0x60 [ 141.422602][ T6370] bpf_prog_test_run+0x321/0x390 [ 141.427559][ T6370] __sys_bpf+0x440/0x800 [ 141.431818][ T6370] ? bpf_link_show_fdinfo+0x350/0x350 [ 141.437223][ T6370] ? lock_chain_count+0x20/0x20 [ 141.442096][ T6370] __x64_sys_bpf+0x7c/0x90 [ 141.446534][ T6370] do_syscall_64+0x55/0xb0 [ 141.450992][ T6370] ? clear_bhb_loop+0x40/0x90 [ 141.455709][ T6370] ? clear_bhb_loop+0x40/0x90 [ 141.460403][ T6370] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 141.466328][ T6370] RIP: 0033:0x7f5c0878eba9 [ 141.470770][ T6370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 141.490418][ T6370] RSP: 002b:00007f5c095f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 141.498858][ T6370] RAX: ffffffffffffffda RBX: 00007f5c089d5fa0 RCX: 00007f5c0878eba9 [ 141.506852][ T6370] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 000000000000000a [ 141.514926][ T6370] RBP: 00007f5c095f0090 R08: 0000000000000000 R09: 0000000000000000 [ 141.522911][ T6370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 141.530895][ T6370] R13: 00007f5c089d6038 R14: 00007f5c089d5fa0 R15: 00007ffe5e0fe0f8 [ 141.538901][ T6370] [ 141.700618][ T6176] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 143.019566][ T6405] netlink: 'syz.1.130': attribute type 25 has an invalid length. [ 143.055537][ T6405] netlink: 2418 bytes leftover after parsing attributes in process `syz.1.130'. [ 143.428310][ T6176] veth0_vlan: entered promiscuous mode [ 143.524559][ T6176] veth1_vlan: entered promiscuous mode [ 143.659158][ T6176] veth0_macvtap: entered promiscuous mode [ 143.701090][ T6176] veth1_macvtap: entered promiscuous mode [ 143.808077][ T6176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 143.845725][ T6176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.895354][ T6176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 143.911739][ T6176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.922220][ T6176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 143.932930][ T6176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 143.947154][ T6176] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 143.977101][ T6176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 144.018737][ T6176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.045306][ T6176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 144.079602][ T6176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.113793][ T6176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 144.149755][ T6176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 144.180043][ T6176] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 144.227482][ T6176] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 144.243960][ T6430] FAULT_INJECTION: forcing a failure. [ 144.243960][ T6430] name failslab, interval 1, probability 0, space 0, times 0 [ 144.275321][ T6176] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 144.284093][ T6176] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 144.291170][ T6430] CPU: 0 PID: 6430 Comm: syz.1.136 Not tainted syzkaller #0 [ 144.300116][ T6430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 144.310208][ T6430] Call Trace: [ 144.313531][ T6430] [ 144.316494][ T6430] dump_stack_lvl+0x16c/0x230 [ 144.321218][ T6430] ? show_regs_print_info+0x20/0x20 [ 144.326461][ T6430] ? load_image+0x3b0/0x3b0 [ 144.331004][ T6430] ? __might_sleep+0xe0/0xe0 [ 144.335722][ T6430] ? __lock_acquire+0x7c80/0x7c80 [ 144.340784][ T6430] ? register_lock_class+0xb5/0x890 [ 144.346022][ T6430] should_fail_ex+0x39d/0x4d0 [ 144.350720][ T6430] should_failslab+0x9/0x20 [ 144.355241][ T6430] slab_pre_alloc_hook+0x59/0x310 [ 144.360285][ T6430] ? __lock_acquire+0x1334/0x7c80 [ 144.365350][ T6430] ? tcp_sendmsg_fastopen+0x1de/0x5d0 [ 144.370735][ T6430] __kmem_cache_alloc_node+0x53/0x260 [ 144.376145][ T6430] ? tcp_sendmsg_fastopen+0x1de/0x5d0 [ 144.381538][ T6430] kmalloc_trace+0x2a/0xe0 [ 144.385976][ T6430] tcp_sendmsg_fastopen+0x1de/0x5d0 [ 144.391198][ T6430] tcp_sendmsg_locked+0x4555/0x4af0 [ 144.396411][ T6430] ? verify_lock_unused+0x140/0x140 [ 144.401640][ T6430] ? verify_lock_unused+0x140/0x140 [ 144.406883][ T6430] ? mark_lock+0x94/0x320 [ 144.411248][ T6430] ? lockdep_hardirqs_on_prepare+0x400/0x760 [ 144.417245][ T6430] ? lock_chain_count+0x20/0x20 [ 144.422121][ T6430] ? tcp_set_state+0x650/0x650 [ 144.426930][ T6430] tcp_sendmsg+0x2f/0x50 [ 144.431191][ T6430] ? inet_send_prepare+0x260/0x260 [ 144.436316][ T6430] ____sys_sendmsg+0x5bf/0x950 [ 144.441120][ T6430] ? __asan_memset+0x22/0x40 [ 144.445728][ T6430] ? __sys_sendmsg_sock+0x30/0x30 [ 144.450768][ T6430] ? __import_iovec+0x3fa/0x860 [ 144.455739][ T6430] ? import_iovec+0x73/0xa0 [ 144.460264][ T6430] ___sys_sendmsg+0x220/0x290 [ 144.464962][ T6430] ? __sys_sendmsg+0x270/0x270 [ 144.469761][ T6430] ? __lock_acquire+0x7c80/0x7c80 [ 144.474815][ T6430] __se_sys_sendmsg+0x1a5/0x270 [ 144.479683][ T6430] ? __x64_sys_sendmsg+0x80/0x80 [ 144.484652][ T6430] ? lockdep_hardirqs_on+0x98/0x150 [ 144.489869][ T6430] do_syscall_64+0x55/0xb0 [ 144.494322][ T6430] ? clear_bhb_loop+0x40/0x90 [ 144.499032][ T6430] ? clear_bhb_loop+0x40/0x90 [ 144.503717][ T6430] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 144.509633][ T6430] RIP: 0033:0x7f78aaf8eba9 [ 144.514080][ T6430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.533698][ T6430] RSP: 002b:00007f78abda3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 144.542142][ T6430] RAX: ffffffffffffffda RBX: 00007f78ab1d5fa0 RCX: 00007f78aaf8eba9 [ 144.550155][ T6430] RDX: 000000003000c085 RSI: 0000200000000080 RDI: 0000000000000003 [ 144.558162][ T6430] RBP: 00007f78abda3090 R08: 0000000000000000 R09: 0000000000000000 [ 144.566196][ T6430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.574200][ T6430] R13: 00007f78ab1d6038 R14: 00007f78ab1d5fa0 R15: 00007ffe84d7b9e8 [ 144.582206][ T6430] [ 144.593061][ T6176] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 144.726275][ T2905] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 144.754478][ T2905] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 144.832961][ T3465] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 144.861357][ T3465] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 144.927507][ T6442] FAULT_INJECTION: forcing a failure. [ 144.927507][ T6442] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 144.985627][ T6442] CPU: 1 PID: 6442 Comm: syz.2.139 Not tainted syzkaller #0 [ 144.992991][ T6442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 145.003067][ T6442] Call Trace: [ 145.006372][ T6442] [ 145.009321][ T6442] dump_stack_lvl+0x16c/0x230 [ 145.014031][ T6442] ? show_regs_print_info+0x20/0x20 [ 145.019249][ T6442] ? load_image+0x3b0/0x3b0 [ 145.023772][ T6442] ? __might_fault+0xaa/0x120 [ 145.028546][ T6442] ? __lock_acquire+0x7c80/0x7c80 [ 145.033579][ T6442] ? perf_trace_lock+0xf7/0x380 [ 145.038454][ T6442] should_fail_ex+0x39d/0x4d0 [ 145.043155][ T6442] _copy_from_user+0x2f/0xe0 [ 145.047764][ T6442] ___sys_sendmsg+0x159/0x290 [ 145.052464][ T6442] ? __sys_sendmsg+0x270/0x270 [ 145.057267][ T6442] ? __lock_acquire+0x7c80/0x7c80 [ 145.062331][ T6442] __se_sys_sendmsg+0x1a5/0x270 [ 145.067204][ T6442] ? __x64_sys_sendmsg+0x80/0x80 [ 145.072195][ T6442] ? lockdep_hardirqs_on+0x98/0x150 [ 145.077421][ T6442] do_syscall_64+0x55/0xb0 [ 145.081862][ T6442] ? clear_bhb_loop+0x40/0x90 [ 145.086578][ T6442] ? clear_bhb_loop+0x40/0x90 [ 145.091278][ T6442] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 145.097196][ T6442] RIP: 0033:0x7ffa4398eba9 [ 145.101621][ T6442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 145.121244][ T6442] RSP: 002b:00007ffa448d1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 145.129687][ T6442] RAX: ffffffffffffffda RBX: 00007ffa43bd5fa0 RCX: 00007ffa4398eba9 [ 145.138190][ T6442] RDX: 0000000000000000 RSI: 0000200000000600 RDI: 0000000000000004 [ 145.146179][ T6442] RBP: 00007ffa448d1090 R08: 0000000000000000 R09: 0000000000000000 [ 145.154175][ T6442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.162159][ T6442] R13: 00007ffa43bd6038 R14: 00007ffa43bd5fa0 R15: 00007ffd8e4e9b58 [ 145.170163][ T6442] [ 145.200474][ T2974] wlan1: Trigger new scan to find an IBSS to join [ 145.526443][ T6453] netlink: 'syz.2.142': attribute type 10 has an invalid length. [ 145.589553][ T6453] 8021q: adding VLAN 0 to HW filter on device team0 [ 145.628482][ T6453] bond0: (slave team0): Enslaving as an active interface with an up link [ 145.746904][ T6457] Zero length message leads to an empty skb [ 146.167471][ T11] wlan1: Creating new IBSS network, BSSID c2:12:79:f4:73:9d [ 149.366085][ T6499] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.152'. [ 149.685979][ T6508] netlink: 132 bytes leftover after parsing attributes in process `syz.1.155'. [ 149.962533][ T6520] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.157'. [ 149.980056][ T6516] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.157'. [ 150.116347][ T6512] netlink: 'syz.0.156': attribute type 51 has an invalid length. [ 150.477006][ T6529] Q6\bY4: renamed from lo (while UP) [ 150.932842][ T6544] netlink: 16222 bytes leftover after parsing attributes in process `syz.1.165'. [ 151.952902][ T6570] Q6\bY4: renamed from lo (while UP) [ 152.413833][ T6585] netlink: 'syz.4.177': attribute type 21 has an invalid length. [ 152.440181][ T6585] netlink: 152 bytes leftover after parsing attributes in process `syz.4.177'. [ 152.473317][ T6585] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.177'. [ 152.478536][ T6587] FAULT_INJECTION: forcing a failure. [ 152.478536][ T6587] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 152.504930][ T6587] CPU: 0 PID: 6587 Comm: syz.2.179 Not tainted syzkaller #0 [ 152.512279][ T6587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 152.522374][ T6587] Call Trace: [ 152.525678][ T6587] [ 152.528641][ T6587] dump_stack_lvl+0x16c/0x230 [ 152.533371][ T6587] ? show_regs_print_info+0x20/0x20 [ 152.538594][ T6587] ? load_image+0x3b0/0x3b0 [ 152.543136][ T6587] ? __lock_acquire+0x7c80/0x7c80 [ 152.548190][ T6587] ? snprintf+0xdb/0x120 [ 152.552477][ T6587] should_fail_ex+0x39d/0x4d0 [ 152.557286][ T6587] _copy_to_user+0x2f/0xa0 [ 152.561736][ T6587] simple_read_from_buffer+0xe7/0x150 [ 152.567144][ T6587] proc_fail_nth_read+0x1e3/0x250 [ 152.572198][ T6587] ? proc_fault_inject_write+0x340/0x340 [ 152.577861][ T6587] ? fsnotify_perm+0x271/0x5e0 [ 152.582670][ T6587] ? proc_fault_inject_write+0x340/0x340 [ 152.588335][ T6587] vfs_read+0x27e/0x920 [ 152.592523][ T6587] ? kernel_read+0x1e0/0x1e0 [ 152.597149][ T6587] ? __fget_files+0x28/0x4d0 [ 152.601796][ T6587] ? __fget_files+0x44a/0x4d0 [ 152.606518][ T6587] ? __fdget_pos+0x2a3/0x330 [ 152.611135][ T6587] ? ksys_read+0x75/0x250 [ 152.615490][ T6587] ksys_read+0x147/0x250 [ 152.619758][ T6587] ? vfs_write+0x940/0x940 [ 152.624204][ T6587] ? lockdep_hardirqs_on+0x98/0x150 [ 152.629428][ T6587] do_syscall_64+0x55/0xb0 [ 152.633865][ T6587] ? clear_bhb_loop+0x40/0x90 [ 152.638565][ T6587] ? clear_bhb_loop+0x40/0x90 [ 152.643273][ T6587] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 152.649189][ T6587] RIP: 0033:0x7ffa4398d5bc [ 152.653617][ T6587] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 152.673277][ T6587] RSP: 002b:00007ffa448d1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 152.681720][ T6587] RAX: ffffffffffffffda RBX: 00007ffa43bd5fa0 RCX: 00007ffa4398d5bc [ 152.689711][ T6587] RDX: 000000000000000f RSI: 00007ffa448d10a0 RDI: 0000000000000007 [ 152.697698][ T6587] RBP: 00007ffa448d1090 R08: 0000000000000000 R09: 0000000000000000 [ 152.705689][ T6587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 152.713686][ T6587] R13: 00007ffa43bd6038 R14: 00007ffa43bd5fa0 R15: 00007ffd8e4e9b58 [ 152.721693][ T6587] [ 153.021069][ T6597] netlink: 168 bytes leftover after parsing attributes in process `syz.4.181'. [ 153.562257][ T6614] netlink: 'syz.4.188': attribute type 2 has an invalid length. [ 153.580659][ T6614] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.188'. [ 153.765947][ T6623] FAULT_INJECTION: forcing a failure. [ 153.765947][ T6623] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 153.835923][ T6623] CPU: 1 PID: 6623 Comm: syz.0.191 Not tainted syzkaller #0 [ 153.843342][ T6623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 153.853431][ T6623] Call Trace: [ 153.856744][ T6623] [ 153.859706][ T6623] dump_stack_lvl+0x16c/0x230 [ 153.864505][ T6623] ? show_regs_print_info+0x20/0x20 [ 153.869731][ T6623] ? load_image+0x3b0/0x3b0 [ 153.874256][ T6623] ? __lock_acquire+0x7c80/0x7c80 [ 153.879322][ T6623] should_fail_ex+0x39d/0x4d0 [ 153.884034][ T6623] strncpy_from_user+0x36/0x2e0 [ 153.888955][ T6623] bpf_raw_tp_link_attach+0x1cf/0x560 [ 153.894355][ T6623] ? bpf_insn_prepare_dump+0x840/0x840 [ 153.899857][ T6623] bpf_raw_tracepoint_open+0x197/0x210 [ 153.905349][ T6623] __sys_bpf+0x364/0x800 [ 153.909628][ T6623] ? bpf_link_show_fdinfo+0x350/0x350 [ 153.915029][ T6623] ? lock_chain_count+0x20/0x20 [ 153.919923][ T6623] __x64_sys_bpf+0x7c/0x90 [ 153.924366][ T6623] do_syscall_64+0x55/0xb0 [ 153.928819][ T6623] ? clear_bhb_loop+0x40/0x90 [ 153.933532][ T6623] ? clear_bhb_loop+0x40/0x90 [ 153.938240][ T6623] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 153.944172][ T6623] RIP: 0033:0x7f5c0878eba9 [ 153.948602][ T6623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 153.968225][ T6623] RSP: 002b:00007f5c095f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 153.976661][ T6623] RAX: ffffffffffffffda RBX: 00007f5c089d5fa0 RCX: 00007f5c0878eba9 [ 153.984646][ T6623] RDX: 0000000000000010 RSI: 0000200000000480 RDI: 0000000000000011 [ 153.992630][ T6623] RBP: 00007f5c095f0090 R08: 0000000000000000 R09: 0000000000000000 [ 154.000709][ T6623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 154.008695][ T6623] R13: 00007f5c089d6038 R14: 00007f5c089d5fa0 R15: 00007ffe5e0fe0f8 [ 154.016776][ T6623] [ 154.127108][ T6628] netlink: 16178 bytes leftover after parsing attributes in process `syz.2.193'. [ 154.362611][ T6640] FAULT_INJECTION: forcing a failure. [ 154.362611][ T6640] name failslab, interval 1, probability 0, space 0, times 0 [ 154.405874][ T6640] CPU: 0 PID: 6640 Comm: syz.2.196 Not tainted syzkaller #0 [ 154.413249][ T6640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 154.423348][ T6640] Call Trace: [ 154.426688][ T6640] [ 154.429637][ T6640] dump_stack_lvl+0x16c/0x230 [ 154.434343][ T6640] ? show_regs_print_info+0x20/0x20 [ 154.439568][ T6640] ? load_image+0x3b0/0x3b0 [ 154.444096][ T6640] ? __lock_acquire+0x7c80/0x7c80 [ 154.449170][ T6640] should_fail_ex+0x39d/0x4d0 [ 154.453902][ T6640] should_failslab+0x9/0x20 [ 154.458434][ T6640] slab_pre_alloc_hook+0x59/0x310 [ 154.463485][ T6640] ? apparmor_sk_alloc_security+0x77/0x100 [ 154.469312][ T6640] __kmem_cache_alloc_node+0x53/0x260 [ 154.474700][ T6640] ? apparmor_sk_alloc_security+0x77/0x100 [ 154.480539][ T6640] kmalloc_trace+0x2a/0xe0 [ 154.484986][ T6640] apparmor_sk_alloc_security+0x77/0x100 [ 154.490633][ T6640] security_sk_alloc+0x6e/0xa0 [ 154.495416][ T6640] sk_prot_alloc+0x101/0x210 [ 154.500042][ T6640] sk_alloc+0x3a/0x360 [ 154.504139][ T6640] unix_create1+0xb0/0x790 [ 154.508589][ T6640] unix_create+0x154/0x1f0 [ 154.513034][ T6640] __sock_create+0x4a6/0x940 [ 154.517652][ T6640] __sys_socketpair+0x1c1/0x550 [ 154.522525][ T6640] __x64_sys_socketpair+0x9b/0xb0 [ 154.527587][ T6640] do_syscall_64+0x55/0xb0 [ 154.532033][ T6640] ? clear_bhb_loop+0x40/0x90 [ 154.536735][ T6640] ? clear_bhb_loop+0x40/0x90 [ 154.541443][ T6640] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 154.547386][ T6640] RIP: 0033:0x7ffa4398eba9 [ 154.551818][ T6640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.571446][ T6640] RSP: 002b:00007ffa448b0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 154.579879][ T6640] RAX: ffffffffffffffda RBX: 00007ffa43bd6090 RCX: 00007ffa4398eba9 [ 154.587863][ T6640] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000001 [ 154.595953][ T6640] RBP: 00007ffa448b0090 R08: 0000000000000000 R09: 0000000000000000 [ 154.603941][ T6640] R10: 00002000000029c0 R11: 0000000000000246 R12: 0000000000000001 [ 154.611924][ T6640] R13: 00007ffa43bd6128 R14: 00007ffa43bd6090 R15: 00007ffd8e4e9b58 [ 154.619935][ T6640] [ 154.863577][ T6647] netlink: 60 bytes leftover after parsing attributes in process `syz.0.199'. [ 155.040440][ T6655] netlink: 'syz.2.200': attribute type 3 has an invalid length. [ 155.066988][ T6655] netlink: 13435 bytes leftover after parsing attributes in process `syz.2.200'. [ 156.219597][ T6677] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 156.229111][ T6677] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 156.238350][ T6677] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 156.247601][ T6677] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 156.256900][ T6677] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 156.266108][ T6677] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 156.275315][ T6677] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 156.284487][ T6677] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 156.293721][ T6677] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 156.302916][ T6677] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 156.753255][ T6687] Driver unsupported XDP return value 0 on prog (id 191) dev N/A, expect packet loss! [ 157.929147][ T6712] netlink: 65038 bytes leftover after parsing attributes in process `syz.2.215'. [ 158.824734][ T6739] netlink: 60 bytes leftover after parsing attributes in process `syz.1.224'. [ 162.195290][ T6798] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 164.047791][ T6841] FAULT_INJECTION: forcing a failure. [ 164.047791][ T6841] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 164.102832][ T6841] CPU: 1 PID: 6841 Comm: syz.1.250 Not tainted syzkaller #0 [ 164.110200][ T6841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 164.120292][ T6841] Call Trace: [ 164.123606][ T6841] [ 164.126589][ T6841] dump_stack_lvl+0x16c/0x230 [ 164.131320][ T6841] ? show_regs_print_info+0x20/0x20 [ 164.136563][ T6841] ? load_image+0x3b0/0x3b0 [ 164.141122][ T6841] ? __lock_acquire+0x7c80/0x7c80 [ 164.146189][ T6841] ? snprintf+0xdb/0x120 [ 164.150473][ T6841] should_fail_ex+0x39d/0x4d0 [ 164.155195][ T6841] _copy_to_user+0x2f/0xa0 [ 164.159650][ T6841] simple_read_from_buffer+0xe7/0x150 [ 164.165073][ T6841] proc_fail_nth_read+0x1e3/0x250 [ 164.170155][ T6841] ? proc_fault_inject_write+0x340/0x340 [ 164.175870][ T6841] ? fsnotify_perm+0x271/0x5e0 [ 164.180684][ T6841] ? proc_fault_inject_write+0x340/0x340 [ 164.186361][ T6841] vfs_read+0x27e/0x920 [ 164.190567][ T6841] ? kernel_read+0x1e0/0x1e0 [ 164.195199][ T6841] ? __fget_files+0x28/0x4d0 [ 164.199832][ T6841] ? __fget_files+0x44a/0x4d0 [ 164.204593][ T6841] ? __fdget_pos+0x2a3/0x330 [ 164.209216][ T6841] ? ksys_read+0x75/0x250 [ 164.213588][ T6841] ksys_read+0x147/0x250 [ 164.217881][ T6841] ? vfs_write+0x940/0x940 [ 164.222346][ T6841] ? lockdep_hardirqs_on+0x98/0x150 [ 164.227593][ T6841] do_syscall_64+0x55/0xb0 [ 164.232048][ T6841] ? clear_bhb_loop+0x40/0x90 [ 164.236782][ T6841] ? clear_bhb_loop+0x40/0x90 [ 164.241501][ T6841] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 164.247459][ T6841] RIP: 0033:0x7f78aaf8d5bc [ 164.251913][ T6841] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 164.271564][ T6841] RSP: 002b:00007f78abda3030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 164.280023][ T6841] RAX: ffffffffffffffda RBX: 00007f78ab1d5fa0 RCX: 00007f78aaf8d5bc [ 164.288034][ T6841] RDX: 000000000000000f RSI: 00007f78abda30a0 RDI: 0000000000000004 [ 164.296062][ T6841] RBP: 00007f78abda3090 R08: 0000000000000000 R09: 0000000000000000 [ 164.304077][ T6841] R10: 0000200000000100 R11: 0000000000000246 R12: 0000000000000001 [ 164.312085][ T6841] R13: 00007f78ab1d6038 R14: 00007f78ab1d5fa0 R15: 00007ffe84d7b9e8 [ 164.320112][ T6841] [ 164.862232][ T6869] net_ratelimit: 3319 callbacks suppressed [ 164.862249][ T6869] netlink: set zone limit has 8 unknown bytes [ 165.217773][ T6887] netlink: 4083 bytes leftover after parsing attributes in process `syz.1.261'. [ 165.254909][ T6884] bridge_slave_1: left allmulticast mode [ 165.296206][ T6884] bridge_slave_1: left promiscuous mode [ 165.302517][ T6884] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.328299][ T6884] bridge_slave_0: left allmulticast mode [ 165.341596][ T6884] bridge_slave_0: left promiscuous mode [ 165.349160][ T6884] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.777352][ T6903] A link change request failed with some changes committed already. Interface Q6\bY4 may have been left with an inconsistent configuration, please check. [ 166.179935][ T6926] A link change request failed with some changes committed already. Interface Q6\bY4 may have been left with an inconsistent configuration, please check. [ 166.799688][ T6935] netlink: 'syz.2.270': attribute type 10 has an invalid length. [ 166.831196][ T6935] netlink: 40 bytes leftover after parsing attributes in process `syz.2.270'. [ 166.905972][ T6935] ipvlan1: entered promiscuous mode [ 166.977595][ T6935] ipvlan1: entered allmulticast mode [ 166.982997][ T6935] veth0_vlan: entered allmulticast mode [ 167.149321][ T6935] bridge0: port 4(ipvlan1) entered blocking state [ 167.188318][ T6935] bridge0: port 4(ipvlan1) entered disabled state [ 167.222029][ T6935] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 167.356688][ T6948] A link change request failed with some changes committed already. Interface Q6\bY4 may have been left with an inconsistent configuration, please check. [ 167.436947][ T6955] FAULT_INJECTION: forcing a failure. [ 167.436947][ T6955] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 167.475783][ T6955] CPU: 0 PID: 6955 Comm: syz.1.275 Not tainted syzkaller #0 [ 167.483232][ T6955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 167.493339][ T6955] Call Trace: [ 167.496657][ T6955] [ 167.499622][ T6955] dump_stack_lvl+0x16c/0x230 [ 167.504349][ T6955] ? show_regs_print_info+0x20/0x20 [ 167.509599][ T6955] ? load_image+0x3b0/0x3b0 [ 167.514145][ T6955] ? __might_fault+0xaa/0x120 [ 167.518863][ T6955] ? __lock_acquire+0x7c80/0x7c80 [ 167.523923][ T6955] should_fail_ex+0x39d/0x4d0 [ 167.528626][ T6955] _copy_from_user+0x2f/0xe0 [ 167.533231][ T6955] __sys_bpf+0x1e9/0x800 [ 167.537501][ T6955] ? bpf_link_show_fdinfo+0x350/0x350 [ 167.542902][ T6955] ? lock_chain_count+0x20/0x20 [ 167.547788][ T6955] __x64_sys_bpf+0x7c/0x90 [ 167.552228][ T6955] do_syscall_64+0x55/0xb0 [ 167.556674][ T6955] ? clear_bhb_loop+0x40/0x90 [ 167.561405][ T6955] ? clear_bhb_loop+0x40/0x90 [ 167.566105][ T6955] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 167.572016][ T6955] RIP: 0033:0x7f78aaf8eba9 [ 167.576445][ T6955] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 167.596085][ T6955] RSP: 002b:00007f78abda3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 167.604527][ T6955] RAX: ffffffffffffffda RBX: 00007f78ab1d5fa0 RCX: 00007f78aaf8eba9 [ 167.612512][ T6955] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 167.620499][ T6955] RBP: 00007f78abda3090 R08: 0000000000000000 R09: 0000000000000000 [ 167.628487][ T6955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 167.636474][ T6955] R13: 00007f78ab1d6038 R14: 00007f78ab1d5fa0 R15: 00007ffe84d7b9e8 [ 167.644472][ T6955] [ 168.515551][ T6968] netlink: 'syz.1.279': attribute type 33 has an invalid length. [ 168.525370][ T6968] netlink: 164 bytes leftover after parsing attributes in process `syz.1.279'. [ 169.626794][ T7006] netlink: 'syz.2.284': attribute type 39 has an invalid length. [ 169.816275][ T7006] veth0_macvtap: left promiscuous mode [ 170.040399][ T7016] FAULT_INJECTION: forcing a failure. [ 170.040399][ T7016] name failslab, interval 1, probability 0, space 0, times 0 [ 170.118550][ T7016] CPU: 0 PID: 7016 Comm: syz.4.286 Not tainted syzkaller #0 [ 170.125968][ T7016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 170.136062][ T7016] Call Trace: [ 170.139382][ T7016] [ 170.142349][ T7016] dump_stack_lvl+0x16c/0x230 [ 170.147089][ T7016] ? show_regs_print_info+0x20/0x20 [ 170.152330][ T7016] ? load_image+0x3b0/0x3b0 [ 170.156888][ T7016] ? __might_sleep+0xe0/0xe0 [ 170.161522][ T7016] ? __lock_acquire+0x7c80/0x7c80 [ 170.166603][ T7016] should_fail_ex+0x39d/0x4d0 [ 170.171345][ T7016] should_failslab+0x9/0x20 [ 170.175901][ T7016] slab_pre_alloc_hook+0x59/0x310 [ 170.180989][ T7016] ? trace_probe_init+0x6e/0x410 [ 170.185974][ T7016] ? trace_probe_init+0x6e/0x410 [ 170.190951][ T7016] __kmem_cache_alloc_node+0x53/0x260 [ 170.196384][ T7016] ? trace_probe_init+0x6e/0x410 [ 170.201375][ T7016] __kmalloc+0xa4/0x240 [ 170.205592][ T7016] trace_probe_init+0x6e/0x410 [ 170.210438][ T7016] create_local_trace_uprobe+0x179/0x6a0 [ 170.216151][ T7016] ? bpf_get_uprobe_info+0x520/0x520 [ 170.221474][ T7016] ? __might_fault+0xaa/0x120 [ 170.226192][ T7016] ? _copy_from_user+0xa5/0xe0 [ 170.231008][ T7016] perf_uprobe_init+0xf3/0x190 [ 170.235824][ T7016] perf_uprobe_event_init+0xe6/0x180 [ 170.241162][ T7016] perf_try_init_event+0x12b/0x3c0 [ 170.246328][ T7016] perf_event_alloc+0xfa4/0x21b0 [ 170.251296][ T7016] ? perf_event_alloc+0xc06/0x21b0 [ 170.256475][ T7016] ? find_lively_task_by_vpid+0x19/0x290 [ 170.262174][ T7016] __se_sys_perf_event_open+0x70e/0x1c20 [ 170.267876][ T7016] ? mutex_unlock+0x10/0x10 [ 170.272437][ T7016] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 170.278159][ T7016] ? lock_chain_count+0x20/0x20 [ 170.283076][ T7016] ? lockdep_hardirqs_on+0x98/0x150 [ 170.288321][ T7016] ? __x64_sys_perf_event_open+0x20/0xc0 [ 170.294039][ T7016] do_syscall_64+0x55/0xb0 [ 170.298509][ T7016] ? clear_bhb_loop+0x40/0x90 [ 170.303219][ T7016] ? clear_bhb_loop+0x40/0x90 [ 170.307942][ T7016] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 170.313917][ T7016] RIP: 0033:0x7fa87598eba9 [ 170.318381][ T7016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 170.338044][ T7016] RSP: 002b:00007fa876790038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 170.346514][ T7016] RAX: ffffffffffffffda RBX: 00007fa875bd5fa0 RCX: 00007fa87598eba9 [ 170.354520][ T7016] RDX: 0000000000000000 RSI: 000000000000007c RDI: 0000200000000000 [ 170.362552][ T7016] RBP: 00007fa876790090 R08: 0000000000000000 R09: 0000000000000000 [ 170.370563][ T7016] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 170.378576][ T7016] R13: 00007fa875bd6038 R14: 00007fa875bd5fa0 R15: 00007ffcf3f1ef68 [ 170.386630][ T7016] [ 170.415608][ T7016] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 170.495511][ T7013] netlink: 'syz.0.282': attribute type 39 has an invalid length. [ 170.613464][ T7013] veth0_macvtap: left promiscuous mode [ 170.886664][ T7014] A link change request failed with some changes committed already. Interface Q6\bY4 may have been left with an inconsistent configuration, please check. [ 171.018402][ T7028] netlink: 'syz.4.287': attribute type 10 has an invalid length. [ 171.035681][ T7028] netlink: 2 bytes leftover after parsing attributes in process `syz.4.287'. [ 171.068290][ T7028] bond0: entered promiscuous mode [ 171.085736][ T7028] bond_slave_0: entered promiscuous mode [ 171.107458][ T7028] bond_slave_1: entered promiscuous mode [ 171.217646][ T5108] Bluetooth: hci1: unexpected subevent 0x01 length: 150 > 18 [ 171.286041][ T7039] bond0: left allmulticast mode [ 171.305914][ T7039] bond_slave_0: left allmulticast mode [ 171.311462][ T7039] bond_slave_1: left allmulticast mode [ 171.356291][ T7039] bridge0: port 4(bond0) entered disabled state [ 171.396147][ T7039] batadv0: left allmulticast mode [ 171.401508][ T7039] bridge0: port 3(batadv0) entered disabled state [ 171.483564][ T7039] bridge_slave_1: left allmulticast mode [ 171.505861][ T7039] bridge_slave_1: left promiscuous mode [ 171.511712][ T7039] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.578770][ T7039] bridge_slave_0: left allmulticast mode [ 171.584488][ T7039] bridge_slave_0: left promiscuous mode [ 171.621499][ T7039] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.619598][ T7078] netlink: 14 bytes leftover after parsing attributes in process `syz.0.300'. [ 172.664375][ T5108] Bluetooth: hci0: unexpected event 0x05 length: 15 > 4 [ 173.106926][ T7089] netlink: 'syz.4.298': attribute type 39 has an invalid length. [ 173.214888][ T7089] veth0_macvtap: left promiscuous mode [ 173.565638][ T7087] pim6reg1: entered allmulticast mode [ 173.663196][ T7102] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.303'. [ 175.457790][ T7133] netlink: 144 bytes leftover after parsing attributes in process `syz.4.310'. [ 176.254680][ T3465] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 176.285059][ T7162] FAULT_INJECTION: forcing a failure. [ 176.285059][ T7162] name failslab, interval 1, probability 0, space 0, times 0 [ 176.307113][ T7162] CPU: 1 PID: 7162 Comm: syz.2.315 Not tainted syzkaller #0 [ 176.314463][ T7162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 176.324557][ T7162] Call Trace: [ 176.327871][ T7162] [ 176.330834][ T7162] dump_stack_lvl+0x16c/0x230 [ 176.335587][ T7162] ? show_regs_print_info+0x20/0x20 [ 176.340827][ T7162] ? load_image+0x3b0/0x3b0 [ 176.345448][ T7162] ? __lock_acquire+0x1260/0x7c80 [ 176.350516][ T7162] ? lockdep_hardirqs_on+0x98/0x150 [ 176.355761][ T7162] should_fail_ex+0x39d/0x4d0 [ 176.360482][ T7162] should_failslab+0x9/0x20 [ 176.365027][ T7162] slab_pre_alloc_hook+0x59/0x310 [ 176.370109][ T7162] ? ___neigh_create+0x6d2/0x2440 [ 176.375164][ T7162] ? ___neigh_create+0x6d2/0x2440 [ 176.380398][ T7162] __kmem_cache_alloc_node+0x53/0x260 [ 176.385826][ T7162] ? ___neigh_create+0x6d2/0x2440 [ 176.390888][ T7162] __kmalloc+0xa4/0x240 [ 176.395086][ T7162] ___neigh_create+0x6d2/0x2440 [ 176.399992][ T7162] ip_neigh_gw4+0x35a/0x4e0 [ 176.404538][ T7162] ? ip_finish_output2+0x11d0/0x11d0 [ 176.409876][ T7162] ip_finish_output2+0xf1d/0x11d0 [ 176.414941][ T7162] ? ip_finish_output2+0x45c/0x11d0 [ 176.420186][ T7162] ? ip_mc_finish_output+0x250/0x250 [ 176.425499][ T7162] ? dev_loopback_xmit+0x2bf/0x430 [ 176.430624][ T7162] ? ip_fragment+0x210/0x210 [ 176.435232][ T7162] ? ip_skb_dst_mtu+0x58a/0x9c0 [ 176.440103][ T7162] ? ip_finish_output+0x3ef/0x4c0 [ 176.445155][ T7162] ip_send_skb+0x12f/0x1d0 [ 176.449591][ T7162] raw_sendmsg+0x1488/0x1950 [ 176.454201][ T7162] ? compat_raw_ioctl+0x70/0x70 [ 176.459070][ T7162] ? aa_sk_perm+0x7fc/0x930 [ 176.463599][ T7162] ? tomoyo_socket_sendmsg_permission+0x216/0x2f0 [ 176.470036][ T7162] ? sock_rps_record_flow+0x19/0x400 [ 176.475333][ T7162] ? inet_send_prepare+0x260/0x260 [ 176.480473][ T7162] ? inet_sendmsg+0x7c/0x2f0 [ 176.485077][ T7162] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 176.490374][ T7162] ? security_socket_sendmsg+0x80/0xa0 [ 176.495849][ T7162] ? inet_send_prepare+0x260/0x260 [ 176.500986][ T7162] ____sys_sendmsg+0x5bf/0x950 [ 176.505868][ T7162] ? __sys_sendmsg_sock+0x30/0x30 [ 176.510906][ T7162] ? __import_iovec+0x3fa/0x860 [ 176.515784][ T7162] ? import_iovec+0x73/0xa0 [ 176.520310][ T7162] ___sys_sendmsg+0x220/0x290 [ 176.525007][ T7162] ? __sys_sendmsg+0x270/0x270 [ 176.529805][ T7162] ? __lock_acquire+0x7c80/0x7c80 [ 176.534863][ T7162] __se_sys_sendmsg+0x1a5/0x270 [ 176.539740][ T7162] ? __x64_sys_sendmsg+0x80/0x80 [ 176.544804][ T7162] ? lockdep_hardirqs_on+0x98/0x150 [ 176.550020][ T7162] do_syscall_64+0x55/0xb0 [ 176.554453][ T7162] ? clear_bhb_loop+0x40/0x90 [ 176.559144][ T7162] ? clear_bhb_loop+0x40/0x90 [ 176.563834][ T7162] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 176.569753][ T7162] RIP: 0033:0x7ffa4398eba9 [ 176.574193][ T7162] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 176.593810][ T7162] RSP: 002b:00007ffa448d1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 176.602235][ T7162] RAX: ffffffffffffffda RBX: 00007ffa43bd5fa0 RCX: 00007ffa4398eba9 [ 176.610216][ T7162] RDX: 0000000000000000 RSI: 00002000000009c0 RDI: 0000000000000003 [ 176.618197][ T7162] RBP: 00007ffa448d1090 R08: 0000000000000000 R09: 0000000000000000 [ 176.626196][ T7162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 176.634173][ T7162] R13: 00007ffa43bd6038 R14: 00007ffa43bd5fa0 R15: 00007ffd8e4e9b58 [ 176.642166][ T7162] [ 176.866634][ T7166] netlink: 'syz.0.324': attribute type 10 has an invalid length. [ 176.888090][ T7166] netlink: 3819 bytes leftover after parsing attributes in process `syz.0.324'. [ 177.458177][ T7180] netlink: 'syz.2.316': attribute type 39 has an invalid length. [ 178.828320][ T7207] sit0: entered allmulticast mode [ 178.957781][ T7212] sit0: entered promiscuous mode Stopping sshd: [ 179.272735][ T7218] FAULT_INJECTION: forcing a failure. [ 179.272735][ T7218] name failslab, interval 1, probability 0, space 0, times 0 stopped /usr/sbin/sshd (pid 5553) [ 179.322238][ T7218] CPU: 1 PID: 7218 Comm: syz.2.331 Not tainted syzkaller #0 [ 179.329619][ T7218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 179.339731][ T7218] Call Trace: [ 179.343034][ T7218] [ 179.345994][ T7218] dump_stack_lvl+0x16c/0x230 [ 179.350708][ T7218] ? show_regs_print_info+0x20/0x20 [ 179.355965][ T7218] ? load_image+0x3b0/0x3b0 [ 179.360502][ T7218] ? __might_sleep+0xe0/0xe0 [ 179.365136][ T7218] ? __lock_acquire+0x7c80/0x7c80 [ 179.370203][ T7218] should_fail_ex+0x39d/0x4d0 [ 179.374920][ T7218] should_failslab+0x9/0x20 [ 179.379458][ T7218] slab_pre_alloc_hook+0x59/0x310 [ 179.384521][ T7218] ? tomoyo_encode+0x28b/0x540 [ 179.389328][ T7218] ? tomoyo_encode+0x28b/0x540 [ 179.394130][ T7218] __kmem_cache_alloc_node+0x53/0x260 [ 179.399541][ T7218] ? tomoyo_encode+0x28b/0x540 [ 179.404375][ T7218] __kmalloc+0xa4/0x240 [ 179.408566][ T7218] tomoyo_encode+0x28b/0x540 [ 179.413198][ T7218] tomoyo_realpath_from_path+0x592/0x5d0 [ 179.418902][ T7218] tomoyo_path_number_perm+0x1ea/0x590 [ 179.424397][ T7218] ? tomoyo_path_number_perm+0x1ba/0x590 [ 179.430066][ T7218] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 179.435572][ T7218] ? trace_call_bpf+0xc3/0x690 [ 179.440366][ T7218] ? trace_call_bpf+0xc3/0x690 [ 179.445182][ T7218] ? trace_call_bpf+0x5ba/0x690 [ 179.450115][ T7218] ? __fget_files+0x28/0x4d0 [ 179.454754][ T7218] security_file_ioctl+0x70/0xa0 [ 179.459727][ T7218] __se_sys_ioctl+0x48/0x170 [ 179.464346][ T7218] do_syscall_64+0x55/0xb0 [ 179.468786][ T7218] ? clear_bhb_loop+0x40/0x90 [ 179.473485][ T7218] ? clear_bhb_loop+0x40/0x90 [ 179.478199][ T7218] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 179.484127][ T7218] RIP: 0033:0x7ffa4398eba9 [ 179.488573][ T7218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 179.508200][ T7218] RSP: 002b:00007ffa448d1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 179.516646][ T7218] RAX: ffffffffffffffda RBX: 00007ffa43bd5fa0 RCX: 00007ffa4398eba9 [ 179.524654][ T7218] RDX: 0000000000000557 RSI: 0000000000002400 RDI: 0000000000000006 [ 179.532655][ T7218] RBP: 00007ffa448d1090 R08: 0000000000000000 R09: 0000000000000000 [ 179.540653][ T7218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 179.548661][ T7218] R13: 00007ffa43bd6038 R14: 00007ffa43bd5fa0 R15: 00007ffd8e4e9b58 [ 179.556709][ T7218] OK [ 179.865610][ T7218] ERROR: Out of memory at tomoyo_realpath_from_path. Stopping crond: stopped /usr/sbin/crond (pid 5535) OK [ 180.263222][ T7235] netlink: 'syz.2.337': attribute type 29 has an invalid length. [ 180.296389][ T7235] netlink: 'syz.2.337': attribute type 29 has an invalid length. [ 180.330963][ T7235] netlink: 'syz.2.337': attribute type 29 has an invalid length. [ 180.362186][ T7235] netlink: 'syz.2.337': attribute type 29 has an invalid length. [ 180.399044][ T7235] FAULT_INJECTION: forcing a failure. [ 180.399044][ T7235] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 180.450771][ T7235] CPU: 0 PID: 7235 Comm: syz.2.337 Not tainted syzkaller #0 [ 180.458147][ T7235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 180.468249][ T7235] Call Trace: [ 180.471567][ T7235] [ 180.474529][ T7235] dump_stack_lvl+0x16c/0x230 [ 180.479263][ T7235] ? show_regs_print_info+0x20/0x20 [ 180.484508][ T7235] ? load_image+0x3b0/0x3b0 [ 180.489062][ T7235] ? __lock_acquire+0x7c80/0x7c80 [ 180.494136][ T7235] ? snprintf+0xdb/0x120 [ 180.498446][ T7235] should_fail_ex+0x39d/0x4d0 [ 180.503186][ T7235] _copy_to_user+0x2f/0xa0 [ 180.507672][ T7235] simple_read_from_buffer+0xe7/0x150 [ 180.513109][ T7235] proc_fail_nth_read+0x1e3/0x250 [ 180.518196][ T7235] ? proc_fault_inject_write+0x340/0x340 [ 180.523881][ T7235] ? fsnotify_perm+0x271/0x5e0 [ 180.528693][ T7235] ? proc_fault_inject_write+0x340/0x340 [ 180.534382][ T7235] vfs_read+0x27e/0x920 [ 180.538590][ T7235] ? kernel_read+0x1e0/0x1e0 [ 180.543220][ T7235] ? __fget_files+0x28/0x4d0 [ 180.547851][ T7235] ? __fget_files+0x44a/0x4d0 [ 180.552581][ T7235] ? __fdget_pos+0x2a3/0x330 [ 180.557214][ T7235] ? ksys_read+0x75/0x250 [ 180.561588][ T7235] ksys_read+0x147/0x250 [ 180.565965][ T7235] ? vfs_write+0x940/0x940 [ 180.570441][ T7235] ? lockdep_hardirqs_on+0x98/0x150 [ 180.575692][ T7235] do_syscall_64+0x55/0xb0 [ 180.580185][ T7235] ? clear_bhb_loop+0x40/0x90 [ 180.584899][ T7235] ? clear_bhb_loop+0x40/0x90 [ 180.589613][ T7235] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 180.595550][ T7235] RIP: 0033:0x7ffa4398d5bc [ 180.599998][ T7235] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 180.619632][ T7235] RSP: 002b:00007ffa448d1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 180.628080][ T7235] RAX: ffffffffffffffda RBX: 00007ffa43bd5fa0 RCX: 00007ffa4398d5bc [ 180.636171][ T7235] RDX: 000000000000000f RSI: 00007ffa448d10a0 RDI: 0000000000000004 [ 180.644183][ T7235] RBP: 00007ffa448d1090 R08: 0000000000000000 R09: 0000000000000000 [ 180.652284][ T7235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 180.660330][ T7235] R13: 00007ffa43bd6038 R14: 00007ffa43bd5fa0 R15: 00007ffd8e4e9b58 [ 180.668356][ T7235] [ 180.687499][ T7243] -1: renamed from syzkaller0 Stopping dhcpcd... stopped /sbin/dhcpcd (pid 5457) [ 181.613931][ T7266] netlink: 'syz.2.347': attribute type 29 has an invalid length. [ 181.655720][ T7266] netlink: 'syz.2.347': attribute type 29 has an invalid length. [ 181.725072][ T7271] netlink: 'syz.2.347': attribute type 29 has an invalid length. [ 181.844420][ T7266] netlink: 188 bytes leftover after parsing attributes in process `syz.2.347'. [ 181.945701][ T7266] netlink: 'syz.2.347': attribute type 9 has an invalid length. [ 181.953439][ T7266] netlink: 209836 bytes leftover after parsing attributes in process `syz.2.347'. Stopping network: [ 182.944831][ T7290] netlink: 188 bytes leftover after parsing attributes in process `syz.1.352'. [ 183.257635][ T7298] netlink: 188 bytes leftover after parsing attributes in process `syz.4.354'. [ 183.460558][ T7290] delete_channel: no stack [ 183.505725][ T7298] delete_channel: no stack [ 183.527017][ T7298] delete_channel: no stack [ 183.546317][ T7290] delete_channel: no stack [ 184.377876][ T7322] FAULT_INJECTION: forcing a failure. [ 184.377876][ T7322] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 184.465287][ T7322] CPU: 0 PID: 7322 Comm: syz.0.358 Not tainted syzkaller #0 [ 184.472662][ T7322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 184.482762][ T7322] Call Trace: [ 184.486083][ T7322] [ 184.489048][ T7322] dump_stack_lvl+0x16c/0x230 [ 184.493774][ T7322] ? show_regs_print_info+0x20/0x20 [ 184.499115][ T7322] ? load_image+0x3b0/0x3b0 [ 184.503674][ T7322] ? __might_fault+0xaa/0x120 [ 184.508389][ T7322] ? __lock_acquire+0x7c80/0x7c80 [ 184.513461][ T7322] should_fail_ex+0x39d/0x4d0 [ 184.518193][ T7322] _copy_to_user+0x2f/0xa0 [ 184.522669][ T7322] bpf_test_finish+0x24b/0x620 [ 184.527488][ T7322] ? bpf_test_timer_leave+0x110/0x150 [ 184.532910][ T7322] ? convert_skb_to___skb+0x420/0x420 [ 184.538329][ T7322] ? read_tsc+0x9/0x20 [ 184.542458][ T7322] bpf_prog_test_run_flow_dissector+0x4a1/0x600 [ 184.548758][ T7322] ? xdp_convert_buff_to_md+0x200/0x200 [ 184.554410][ T7322] ? __fget_files+0x28/0x4d0 [ 184.559054][ T7322] ? xdp_convert_buff_to_md+0x200/0x200 [ 184.564630][ T7322] bpf_prog_test_run+0x321/0x390 [ 184.569596][ T7322] __sys_bpf+0x440/0x800 [ 184.573899][ T7322] ? bpf_link_show_fdinfo+0x350/0x350 [ 184.579328][ T7322] ? lock_chain_count+0x20/0x20 [ 184.584218][ T7322] __x64_sys_bpf+0x7c/0x90 [ 184.588667][ T7322] do_syscall_64+0x55/0xb0 [ 184.593128][ T7322] ? clear_bhb_loop+0x40/0x90 [ 184.597829][ T7322] ? clear_bhb_loop+0x40/0x90 [ 184.602542][ T7322] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 184.608479][ T7322] RIP: 0033:0x7f5c0878eba9 [ 184.612923][ T7322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 184.632554][ T7322] RSP: 002b:00007f5c095f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 184.641022][ T7322] RAX: ffffffffffffffda RBX: 00007f5c089d5fa0 RCX: 00007f5c0878eba9 [ 184.649040][ T7322] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 184.657041][ T7322] RBP: 00007f5c095f0090 R08: 0000000000000000 R09: 0000000000000000 [ 184.665032][ T7322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 184.673030][ T7322] R13: 00007f5c089d6038 R14: 00007f5c089d5fa0 R15: 00007ffe5e0fe0f8 [ 184.681034][ T7322] OK Stopping iptables: OK [ 185.543052][ T7329] syzkaller0: entered promiscuous mode [ 185.581428][ T7329] syzkaller0: entered allmulticast mode Stopping system message bus: [ 186.623355][ T7372] netlink: 16410 bytes leftover after parsing attributes in process `syz.0.366'. done Stopping klogd: OK Stopping acpid: [ 190.213274][ T7356] netlink: 'syz.0.366': attribute type 10 has an invalid length. [ 190.225484][ T7356] netlink: 40 bytes leftover after parsing attributes in process `syz.0.366'. [ 190.238671][ T7356] caif0: entered promiscuous mode [ 190.243751][ T7356] caif0: entered allmulticast mode [ 190.259406][ T7356] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 190.291009][ T7362] netlink: 'syz.0.366': attribute type 10 has an invalid length. [ 190.416241][ T7391] netlink: 16222 bytes leftover after parsing attributes in process `syz.4.369'. [ 190.562417][ T7391] netlink: 15231 bytes leftover after parsing attributes in process `syz.4.369'. OK Stopping syslogd: stopped /sbin/syslogd (pid 5145) OK [ 190.981800][ T7404] netlink: 'syz.0.370': attribute type 10 has an invalid length. [ 191.309238][ T7416] netlink: 'syz.1.374': attribute type 8 has an invalid length. [ 191.324471][ T7416] netlink: 'syz.1.374': attribute type 9 has an invalid length. [ 191.358650][ T7416] netlink: 'syz.1.374': attribute type 10 has an invalid length. [ 191.386219][ T7416] netlink: 'syz.1.374': attribute type 11 has an invalid length. [ 191.405597][ T7416] netlink: 16 bytes leftover after parsing attributes in process `syz.1.374'. [ 191.439605][ T7419] netlink: 'syz.2.375': attribute type 1 has an invalid length. [ 191.608038][ T5108] Bluetooth: hci2: Malformed LE Event: 0x0d [ 191.828092][ T7432] A link change request failed with some changes committed already. Interface Q6\bY4 may have been left with an inconsistent configuration, please check. umount: can't remount debugfs read-only umount: can't remount tmpfs read-only [ 192.228700][ T7433] netlink: 201392 bytes leftover after parsing attributes in process `syz.4.376'. [ 192.396688][ T7433] netlink: 8446 bytes leftover after parsing attributes in process `syz.4.376'. [ 192.749767][ T7444] netlink: 'syz.0.380': attribute type 2 has an invalid length. [ 192.771499][ T7444] netlink: 'syz.0.380': attribute type 8 has an invalid length. [ 192.792715][ T7444] netlink: 132 bytes leftover after parsing attributes in process `syz.0.380'. [ 193.740072][ T7453] -1: renamed from syzkaller0 [ 193.899203][ T7462] netlink: 209852 bytes leftover after parsing attributes in process `syz.1.385'. [ 194.410794][ T5108] Bluetooth: hci3: Malformed LE Event: 0x0d [ 194.725607][ T7476] A link change request failed with some changes committed already. Interface Q6\bY4 may have been left with an inconsistent configuration, please check. umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only The system is going down NOW! Sent SIGTERM to all processes Connection to 10.128.0.86 closed by remote host. [ 196.074640][ T3465] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Sent SIGKILL to all processes Requesting system poweroff [ 196.185537][ T3465] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 196.292577][ T3465] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 196.372792][ T3465] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 197.128908][ T7484] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 197.139376][ T7484] ACPI: PM: Preparing to enter system sleep state S5 [ 197.148935][ T7484] kvm: exiting hardware virtualization [ 197.154636][ T7484] reboot: Power down serialport: VM disconnected.