last executing test programs: 6.178744474s ago: executing program 2 (id=529): sendmsg(0xffffffffffffffff, 0x0, 0x10) r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0xa, 0x3, 0x11) recvmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x80108907, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r1}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0x8}, 0x200, 0x2, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000080)="5c00000013006bcc9e3be35c6e17aa31076b876c1d0000007ea60864160af36514000cc0040002020800010004000600eab556a70500006182940d0151f60a84c9f4d4938037e786a6d0001000000e4509c5bbcd72c6c92800000000", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x300) r3 = socket$kcm(0xa, 0x922000000003, 0x11) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x6}, 0x0, 0x10000, 0x408, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000637000000a944e359a82b95000000001700403a4d5fe506ecfa5de3ffefacd08e9afa763ca6d2cd02db5ffc6ce34dfb7845fc362393e714a2ef4bee00000000"], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000}, 0x94) r5 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8, 0x1, 0x0, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xead3086ce9776e26}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xb, 0xffffffffffffffff, 0x0) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r5, 0x84, 0x10, &(0x7f0000000000)=r8, 0xc) r9 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000000140)=ANY=[@ANYBLOB='1-N:5/', @ANYRESDEC], 0x31) r10 = socket$kcm(0xa, 0x6, 0x0) recvmsg(r10, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x10111) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000000)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000780)="f4000900062b3a25fe80000000000000dc8b850f238466cc00007a000000ad6e911b51818462b400", 0x28}], 0x1}, 0x0) r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000009000000000000000001000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000009cb8500010000000186300000e0000000000000002000000851000000400000018110000", @ANYRES32, @ANYBLOB="e93c0000e45ac32a649a6651030000007b8af8ff169541a400000001bfa200000000000007020000f8ff393e1c66000008000000b704000002000c00850000008200000018070000faffffff007ebad9be23a9dd964033a23402e0d9a99ddede68b692b10840dbbcd6bf4405cbd3e64bfd297a21ba4562b8b53034ce9174ea94b37b98e536c4819abd96dee703dcffc7af1d48d8d8173ce31ced165d760bab229995237b9bdfe1378363d19e5783bfbeca", @ANYRES32, @ANYBLOB="0000000000000000b7080000090000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000073ba0c00100000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000540000008500000006000000bf91000000000000b70200003f2eaf368500000084000000b7000000000000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x9b, 0xa8, &(0x7f00000002c0)=""/168, 0x41000, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x7f, 0x401}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000440)=[{0x1, 0x2, 0xe, 0xc}, {0x0, 0x2, 0x6, 0xa}], 0x10, 0x8000}, 0x94) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000540)={r10, r11}) 5.731243445s ago: executing program 3 (id=531): bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r6, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1, 0x0, 0x0, 0x6000}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000900000000044000000000000000000000000000000f7b1661845b997b08779dc45b0bf8bde099d22"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r8}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r9, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r10}, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r9, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{0x0, 0x2, 0x1, 0x4}, {0x0, 0x0, 0x0, 0x1}, {0x1, 0x4, 0x10, 0x8}]}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000001400000000000018000000000200000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f0000017f00000a0000000800"/28, @ANYRES32, @ANYBLOB="7f000001ac141400000000011c0e0000000000000000000007006fc946f1f569c01801"], 0x230}, 0x0) r11 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r11, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030029000b12d25a80648c2594f90124fc60100c02000c0c0400053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 4.952160669s ago: executing program 2 (id=533): r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000e80)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x5, 0x9}, 0x8000, 0xcdd, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000780)="d8000000100081044e81f782db44b904021d080005000000e8fe552603600e1209000d0000000101a80016000a00144006000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e4dc3b90317008e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db7010000e006dcdf63951f215ce3bb9ad809d5e1cace140efdc0272ae6089ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701000000000000000000", 0xd8}], 0x1}, 0x0) 4.801798032s ago: executing program 0 (id=534): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000001f00)="89000000120081ae08060cdc030000017f03e3f7000000006ee2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32ef", 0x45}], 0x1}, 0xff0f000020000080) 4.634086053s ago: executing program 2 (id=536): r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000980)=[{&(0x7f00000002c0)="d64342f6f54f0cb0c74b9859076c6e5a", 0x10}], 0x1}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0a000000070000000200000004"], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="00000000103600"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000180000000100000000000000", @ANYRES32, @ANYBLOB='[\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4.61722699s ago: executing program 3 (id=537): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffeffffffff}, 0xc001, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x2, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$inet(r0, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=[@ip_retopts={{0x8c, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x34, 0xdc, 0x3, 0x6, [{@private=0xa010100}, {@rand_addr=0x64010100, 0x7}, {@broadcast, 0x7f06}, {@private=0xa010101, 0x4}, {@empty, 0x31a}, {@private=0xa010101, 0x7ff}]}, @generic={0x44, 0x2}, @generic={0x44, 0xc, "96b0c6640f8feda5312e"}, @end, @timestamp_prespec={0x44, 0xc, 0xf1, 0x3, 0x1, [{@private=0xa010101, 0x4}]}, @lsrr={0x83, 0x1b, 0x50, [@multicast1, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @dev={0xac, 0x14, 0x14, 0xa}, @remote]}, @lsrr={0x83, 0xf, 0xd9, [@dev={0xac, 0x14, 0x14, 0x1a}, @private=0xa010102, @private=0xa010100]}]}}}, @ip_tos_u8={{0x11, 0x29, 0x4}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x21}}}}], 0xc8}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x69, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001140)='memory.events\x00', 0x0, 0x0) recvmsg$unix(r2, 0x0, 0x10060) recvmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000d00)=""/242, 0xfffffd63}, {&(0x7f0000000240)=""/205, 0xcd}, {&(0x7f0000000380)=""/210, 0xd2}, {&(0x7f00000006c0)=""/188, 0xc9}, {&(0x7f0000000f40)=""/213, 0xd5}, {&(0x7f0000002100)=""/4077, 0xfed}, {&(0x7f00000007c0)=""/211, 0xd3}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000480)=""/176, 0xb0}, {&(0x7f0000000c00)=""/208, 0xd0}], 0xa}, 0x40012100) recvmsg$kcm(r1, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x10002) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xec, 0x0, 0x0, 0x7, 0x0, 0x2, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x828, 0x0, 0x4, 0x9, 0x0, 0x4000002, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000000)={'geneve1\x00', 0x400}) close(r3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) recvmsg$kcm(r1, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000005c0)={@ifindex, 0xffffffffffffffff, 0xf}, 0x20) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) 4.582699854s ago: executing program 0 (id=538): r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000980)=[{&(0x7f00000002c0)="d64342f6f54f0cb0c74b9859076c6e5a", 0x10}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0a000000070000000200000004"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="00000000103600"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000180000000100000000000000", @ANYRES32, @ANYBLOB='[\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r5) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffc) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110c23004a) 4.464134743s ago: executing program 2 (id=539): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x200, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r2, &(0x7f00000011c0)={0x0, 0x0, 0x0}, 0x0) r3 = socket$kcm(0x25, 0x1, 0x0) sendmsg$inet(r3, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)='M', 0x1}], 0x1}, 0x4044850) socket$kcm(0xf, 0x3, 0x2) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x4, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x2f}, @call={0x85, 0x0, 0x0, 0x7d}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002280)={r4, 0x0, 0xe, 0x0, &(0x7f00000008c0)="e02742e8680d85ff9782762f86dd", 0x0, 0x57af, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$inet(r2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c01803003a000b12d25a80648c2594f90324fc60100c03", 0x17}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x63, 0x2, 0x0, 0x0, 0x0, 0x0, 0x37a05, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={0x0, 0x6}, 0x1075, 0x0, 0x0, 0x0, 0xffffffffffffbbfa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1c0000000000000}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x230}, 0x0) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030029000b12d25a80648c2594f90124fc60100c02000c0c0400053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, 0x0, 0x100, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="18020000000000800000000000000000850000004100000095000000000000004be98911ed523cf4451d51e400cbd30efbb0a73ceb2b050a456c3a6cfd127868ad3fe3f9a9b946c97f9fc091e4c3f4b0a0d7ed298717a480c48868162ff933958cb6a5265519fee4cb1b8b93f0b164770fd40c7a8060ce72beff7cda177e281ef0b7a1a97b2c8c5617bff8c9441a45fd951df19a9c6e933500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r7, 0xfffff000, 0xfe71, 0xffffffffffffff40, &(0x7f0000000080)="85d77444c5a569f1e21b08c0f264", 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0x3b) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNGETVNETLE(r0, 0x40047451, &(0x7f0000000180)) 4.192340185s ago: executing program 0 (id=542): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x4, &(0x7f0000000640)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x57}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x51, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)='%ps \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1500000000"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xd, 0x4, 0x4, 0xc, 0x0, r0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x15, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x800}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = gettid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000700000095000000000000009500a50500"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r6 = socket$kcm(0x10, 0x3, 0x10) r7 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="1400000017000b63d25a80648c2594f952a3c92b", 0x14}], 0x1}, 0x0) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xa, [@enum64={0x4, 0x3, 0x0, 0x13, 0x1, 0x2, [{0xb, 0x2, 0xdb9}, {0x6, 0x1, 0x6}, {0x10, 0x7, 0x7ff}]}]}, {0x0, [0x6f, 0x5f, 0x61, 0x5f, 0x5f, 0x51, 0x30, 0x5f]}}, &(0x7f0000000500)=""/149, 0x52, 0x95, 0x1}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={r9, 0x20, &(0x7f00000003c0)={&(0x7f0000002480)=""/4096, 0x1000, 0x0, &(0x7f0000003480)=""/4096, 0x1000}}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r5) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xa, 0xe, 0x1, 0x8, 0x0, 0xc1, 0x20, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x14000, 0x1, 0x9, 0x0, 0x4, 0x8, 0x7a09, 0x0, 0x9, 0x0, 0x2}, r4, 0xb, r2, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000400)=[0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x1c, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000005c0), &(0x7f00000007c0), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) 3.837736963s ago: executing program 0 (id=543): bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r6, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1, 0x0, 0x0, 0x6000}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000900000000044000000000000000000000000000000f7b1661845b997b08779dc45b0bf8bde099d22"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r8}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r9, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r10}, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r9, 0x0}, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x5b7}, 0x100904, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000001400000000000018000000000200000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f0000017f00000a0000000800"/28, @ANYRES32, @ANYBLOB="7f000001ac141400000000011c0e0000000000000000000007006fc946f1f569c01801"], 0x230}, 0x0) r11 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r11, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030029000b12d25a80648c2594f90124fc60100c02000c0c0400053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 3.837411173s ago: executing program 2 (id=544): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_devices(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="1e0301003c05120128876b60864668f82ffdeefa000000000000ffd2acb165fe580cd568020031b87b548cb74136f366da0abe"], 0xffdd) 3.717597992s ago: executing program 3 (id=545): bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r6, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1, 0x0, 0x0, 0x6000}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000900000000044000000000000000000000000000000f7b1661845b997b08779dc45b0bf8bde099d22"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r8}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r9, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r10}, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r9, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{0x0, 0x2, 0x1, 0x4}, {0x0, 0x0, 0x0, 0x1}, {0x1, 0x4, 0x10, 0x8}]}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000001400000000000018000000000200000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f0000017f00000a0000000800"/28, @ANYRES32, @ANYBLOB="7f000001ac141400000000011c0e0000000000000000000007006fc946f1f569c01801"], 0x230}, 0x0) r11 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r11, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030029000b12d25a80648c2594f90124fc60100c02000c0c0400053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 2.538091194s ago: executing program 1 (id=548): r0 = perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/31], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000000000)={0x0, 0xf00, &(0x7f0000000040)=[{&(0x7f00000000c0)="5c00000014006b02c84e21100af32c6e0a0675f8d34460400000000000005c1e6182949a36c23d3b48dfd8cdbf9367b498fa51f60a64c9f4d493803792684b71bdd70000b6c0504bb9183132be471b93c91b5d7870743719b4b53cf2", 0x91}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 2.425186114s ago: executing program 1 (id=549): perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x1, 0x800000, 0xfffc, 0x0, 0x0, 0x0, 0x3d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket$kcm(0x11, 0x2, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000780)='blkio.bfq.io_queued_recursive\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x2a, &(0x7f0000000100)=r2, 0x4) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000605f027d8c2e273000020000000000000000000004"], 0x0, 0x26, 0x0, 0x3, 0x1, 0x10000, @value=r2}, 0x28) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x0, 0x0}, 0x8) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000005c000000000095000000000000006b8fa08ebb5eee210ff64499976380fcd9d5f4f6e7c97b735f5711d53f28da8d9a41c2346bc69959926ecf77ef71b3ecfb284411c8e845f2155287be307abaf1b2202948b4c58c7ffb985f161148b39a1f28dfbfa28750b0ebe19b38daaf32a508e2b7a6d2446a4e265283cf65573d837f3f42e6726dcfce26cda895fcacfef24b048ead2bc7e43b4c253c2b3b1b42a6646516226a5124f2b5e2d3722a865ee1bc72a0b9"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r4}, 0x90) (async) close(r0) 2.263515467s ago: executing program 1 (id=550): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x3}, {0x1, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)=r2, 0x8) 2.163015529s ago: executing program 1 (id=551): r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000980)=[{&(0x7f00000002c0)="d64342f6f54f0cb0c74b9859076c6e5a", 0x10}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0a000000070000000200000004"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="00000000103600"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000180000000100000000000000", @ANYRES32, @ANYBLOB='[\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r5) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110c23004a) 846.858969ms ago: executing program 0 (id=552): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x4, &(0x7f0000000640)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x57}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x51, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)='%ps \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1500000000"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xd, 0x4, 0x4, 0xc, 0x0, r0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x15, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x800}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = gettid() r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000700000095000000000000009500a50500"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r6 = socket$kcm(0x10, 0x3, 0x10) r7 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="1400000017000b63d25a80648c2594f952a3c92b", 0x14}], 0x1}, 0x0) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@func={0x3, 0x0, 0x0, 0xc, 0x4}]}, {0x0, [0x6f, 0x5f, 0x61, 0x5f, 0x5f, 0x51, 0x30, 0x5f]}}, &(0x7f0000000500)=""/149, 0x2e, 0x95, 0x1}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={r9, 0x20, &(0x7f00000003c0)={&(0x7f0000002480)=""/4096, 0x1000, 0x0, &(0x7f0000003480)=""/4096, 0x1000}}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r5) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xa, 0xe, 0x1, 0x8, 0x0, 0xc1, 0x20, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x14000, 0x1, 0x9, 0x0, 0x4, 0x8, 0x7a09, 0x0, 0x9, 0x0, 0x2}, r4, 0xb, r2, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000400)=[0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x1c, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000005c0), &(0x7f00000007c0), 0x8, 0x60, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) 703.967954ms ago: executing program 2 (id=553): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000ac0)=ANY=[@ANYBLOB="b7050000000000006110be00000000000fa000000000000095000000000000001f495ff727520cccddfad6fab92a770b445d050000006edc1b5613c5e35079725d19e88b662c2596b2f0b40aa9de45cf931a7ddaae7bdd97a9787684a5a6bbe879d6561715a194eb15d509b1837f6d317d12dd2c98f05e43aa14b3655a78009367bac65148a671b0ffd1c946b31202b7c73e0f1c5df29d57ed708602599a04fde318753c358d42ba7c52b4e20bc5c0e91fbc96da558c38891cd5bc38b6db9863a1273811976d15ba39fe2700"/218], &(0x7f00000002c0)='GPL\x00', 0x5, 0x9e, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79, 0x0, 0xffffffffffffffff, 0xfffffffffffffe21}, 0x2a) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="d80000001c0081044e81f782db44b904021d080201000000040000a118000c000600142603600e1208000f0100810401a80016002000014003", 0x39}], 0x1, 0x0, 0x0, 0x7400}, 0x0) r2 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="1303000054009155090893b31b71a54a07"], 0xfe33) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x2}, 0x0, 0x1000, 0x3, 0x6}, 0x0, 0xffffffffffffffff, r1, 0x0) socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa0000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001e80)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@enum={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, 0x0, 0x2c, 0x0, 0x1}, 0x28) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netdevsim0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000600)={&(0x7f00000003c0)=@l2={0x1f, 0x1, @none, 0x7fff}, 0x80, &(0x7f0000000440)=[{&(0x7f00000001c0)}, {&(0x7f0000000500)="6e09b38c35bd2ed99057068a15f4985a7acfae68fc150d7709b9ebc823b9cc5d9e186103e1b8f75d9ed86cb272109a5e9a765612b072e41d30fcb9c230270c104941ca013085c81fa1ac575a7980cc636d0337865be33501a3b1002a5d8e07d3240f07e73c630296e954c003ae35950227f64a20ab9532d0b005a53133a14cf153f09395bf729dc6312929e128587f9f8d02823be125d933ac9426facb128414556d2fce9ccbdad135a282841c24efecf319095e070b1e530d695fc606bb156f8b95e0a3fecb", 0xc6}], 0x2}, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0xff, 0x3, 0x7f, 0x3, 0x0, 0x3ff, 0x80080, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000640), 0x5}, 0xd648, 0x3, 0x5, 0x5, 0x8, 0x7, 0xe7, 0x0, 0x64b, 0x0, 0xc3}, r5, 0x3, r0, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0), 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000005c0)={r6}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x6, 0x11, &(0x7f0000000100)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x36}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 665.359777ms ago: executing program 1 (id=554): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000010040), 0x0, 0xffffffffffffffff, 0x4}, 0x38) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r0, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random="0005008dff20"}) 606.549327ms ago: executing program 3 (id=555): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000001f00)="89000000120081ae08060cdc030000017f03e3f7000000006ee2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c0001000c080c00bdad0140310068ad639a8ace8680210bc28b80", 0x67}], 0x1}, 0xff0f000020000080) 363.697794ms ago: executing program 3 (id=556): r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000980)=[{&(0x7f00000002c0)="d64342f6f54f0cb0c74b9859076c6e5a", 0x10}], 0x1}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0a000000070000000200000004"], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="00000000103600"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000180000000100000000000000", @ANYRES32, @ANYBLOB='[\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 133.913984ms ago: executing program 3 (id=557): r0 = perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/31], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000000000)={0x0, 0xf00, &(0x7f0000000040)=[{&(0x7f00000000c0)="5c00000014006b02c84e21100af32c6e0a0675f8d34460400000000000005c1e6182949a36c23d3b48dfd8cdbf9367b498fa51f60a64c9f4d493803792684b71bdd70000b6c0504bb9183132be471b93c91b5d7870743719b4b53cf2", 0x91}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 47.320048ms ago: executing program 1 (id=565): r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000980)=[{&(0x7f00000002c0)="d64342f6f54f0cb0c74b9859076c6e5a", 0x10}], 0x1}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0a000000070000000200000004"], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="00000000103600"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000180000000100000000000000", @ANYRES32, @ANYBLOB='[\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 0s ago: executing program 0 (id=558): bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r6, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1, 0x0, 0x0, 0x6000}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000900000000044000000000000000000000000000000f7b1661845b997b08779dc45b0bf8bde099d22"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r8, @ANYRES32=r7, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r8}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r9, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r10}, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r9, 0x0}, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x5b7}, 0x100904, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{0x0, 0x2, 0x1, 0x4}, {0x0, 0x0, 0x0, 0x1}, {0x1, 0x4, 0x10, 0x8}]}, 0x94) r11 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r11, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030029000b12d25a80648c2594f90124fc60100c02000c0c0400053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.187' (ED25519) to the list of known hosts. [ 66.931547][ T5753] cgroup: Unknown subsys name 'net' [ 67.061241][ T5753] cgroup: Unknown subsys name 'rlimit' Setting up swapspace version 1, size = 127995904 bytes [ 68.435769][ T5753] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 70.167145][ T5766] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 70.176169][ T5766] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 70.196080][ T5771] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 70.203357][ T5771] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 70.219840][ T5774] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 70.227439][ T5771] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 70.237493][ T5775] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 70.237978][ T5774] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 70.252216][ T5775] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 70.252984][ T5774] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 70.277717][ T5775] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 70.296673][ T5775] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 70.310971][ T5779] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 70.314089][ T5778] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 70.326754][ T5775] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 70.333962][ T5778] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 70.341909][ T5779] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 70.343195][ T5778] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 70.357166][ T5775] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 70.365940][ T5778] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 70.374001][ T5086] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 70.374199][ T5775] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 70.388625][ T5778] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 70.400483][ T5775] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 70.845409][ T5768] chnl_net:caif_netlink_parms(): no params data found [ 70.867971][ T5765] chnl_net:caif_netlink_parms(): no params data found [ 70.897338][ T5773] chnl_net:caif_netlink_parms(): no params data found [ 71.014313][ T5769] chnl_net:caif_netlink_parms(): no params data found [ 71.064348][ T5768] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.072753][ T5768] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.080256][ T5768] bridge_slave_0: entered allmulticast mode [ 71.087958][ T5768] bridge_slave_0: entered promiscuous mode [ 71.097096][ T5768] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.104259][ T5768] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.111535][ T5768] bridge_slave_1: entered allmulticast mode [ 71.118167][ T5768] bridge_slave_1: entered promiscuous mode [ 71.132237][ T5765] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.139506][ T5765] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.146703][ T5765] bridge_slave_0: entered allmulticast mode [ 71.153782][ T5765] bridge_slave_0: entered promiscuous mode [ 71.161558][ T5765] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.169155][ T5765] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.176454][ T5765] bridge_slave_1: entered allmulticast mode [ 71.183952][ T5765] bridge_slave_1: entered promiscuous mode [ 71.246013][ T5768] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.261587][ T1283] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.273075][ T1283] ieee802154 phy1 wpan1: encryption failed: -22 [ 71.279655][ T5765] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.302650][ T5773] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.310188][ T5773] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.317987][ T5773] bridge_slave_0: entered allmulticast mode [ 71.324547][ T5773] bridge_slave_0: entered promiscuous mode [ 71.334234][ T5768] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.345519][ T5765] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.371339][ T5773] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.378810][ T5773] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.386165][ T5773] bridge_slave_1: entered allmulticast mode [ 71.392785][ T5773] bridge_slave_1: entered promiscuous mode [ 71.456431][ T5768] team0: Port device team_slave_0 added [ 71.464954][ T5765] team0: Port device team_slave_0 added [ 71.474363][ T5765] team0: Port device team_slave_1 added [ 71.480905][ T5769] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.488063][ T5769] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.495283][ T5769] bridge_slave_0: entered allmulticast mode [ 71.502160][ T5769] bridge_slave_0: entered promiscuous mode [ 71.521618][ T5768] team0: Port device team_slave_1 added [ 71.541164][ T5769] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.550298][ T5769] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.558172][ T5769] bridge_slave_1: entered allmulticast mode [ 71.564945][ T5769] bridge_slave_1: entered promiscuous mode [ 71.584901][ T5773] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.598177][ T5773] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.622823][ T5765] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 71.630011][ T5765] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 71.656209][ T5765] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 71.688338][ T5768] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 71.695318][ T5768] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 71.723512][ T5768] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 71.735579][ T5765] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 71.742701][ T5765] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 71.768713][ T5765] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 71.789475][ T5769] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.803082][ T5769] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.826755][ T5768] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 71.833716][ T5768] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 71.859715][ T5768] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 71.885394][ T5773] team0: Port device team_slave_0 added [ 71.912261][ T5773] team0: Port device team_slave_1 added [ 71.940512][ T5769] team0: Port device team_slave_0 added [ 71.962112][ T5765] hsr_slave_0: entered promiscuous mode [ 71.968553][ T5765] hsr_slave_1: entered promiscuous mode [ 71.991940][ T5769] team0: Port device team_slave_1 added [ 72.024541][ T5768] hsr_slave_0: entered promiscuous mode [ 72.030997][ T5768] hsr_slave_1: entered promiscuous mode [ 72.037598][ T5768] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 72.045386][ T5768] Cannot create hsr debugfs directory [ 72.070033][ T5773] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 72.077146][ T5773] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.103075][ T5773] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 72.123733][ T5769] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 72.130949][ T5769] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.157211][ T5769] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 72.171441][ T5769] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 72.178492][ T5769] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.204583][ T5769] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 72.228724][ T5773] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 72.236997][ T5773] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.263294][ T5773] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 72.376798][ T5775] Bluetooth: hci0: command tx timeout [ 72.388110][ T5769] hsr_slave_0: entered promiscuous mode [ 72.394315][ T5769] hsr_slave_1: entered promiscuous mode [ 72.400557][ T5769] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 72.409037][ T5769] Cannot create hsr debugfs directory [ 72.455924][ T5775] Bluetooth: hci2: command tx timeout [ 72.461727][ T5775] Bluetooth: hci1: command tx timeout [ 72.468269][ T5778] Bluetooth: hci3: command tx timeout [ 72.473817][ T5773] hsr_slave_0: entered promiscuous mode [ 72.481118][ T5773] hsr_slave_1: entered promiscuous mode [ 72.487334][ T5773] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 72.494887][ T5773] Cannot create hsr debugfs directory [ 72.777069][ T5768] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 72.788846][ T5768] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 72.800784][ T5768] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 72.811322][ T5768] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 72.892939][ T5765] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 72.908506][ T5765] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 72.921297][ T5765] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 72.943402][ T5765] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 73.025559][ T5769] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 73.048048][ T5769] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 73.058538][ T5769] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 73.068563][ T5769] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 73.133954][ T5773] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 73.151899][ T5773] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 73.164935][ T5773] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 73.175393][ T5773] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 73.192544][ T5768] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.264266][ T5768] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.308048][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.315237][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.365034][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.372221][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.408268][ T5765] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.436363][ T5769] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.453734][ T5765] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.492192][ T1087] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.499342][ T1087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.531126][ T5769] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.553065][ T1087] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.560288][ T1087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.571884][ T1087] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.579109][ T1087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.612979][ T5773] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.648006][ T1087] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.655190][ T1087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.731945][ T5773] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.772979][ T1087] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.780275][ T1087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.828870][ T1087] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.836211][ T1087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.972443][ T5773] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 74.110353][ T5768] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 74.224921][ T5765] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 74.284109][ T5768] veth0_vlan: entered promiscuous mode [ 74.352249][ T5768] veth1_vlan: entered promiscuous mode [ 74.424294][ T5765] veth0_vlan: entered promiscuous mode [ 74.447377][ T5769] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 74.462897][ T5765] veth1_vlan: entered promiscuous mode [ 74.469447][ T5775] Bluetooth: hci0: command tx timeout [ 74.483976][ T5768] veth0_macvtap: entered promiscuous mode [ 74.494525][ T5768] veth1_macvtap: entered promiscuous mode [ 74.513346][ T5773] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 74.536148][ T5775] Bluetooth: hci1: command tx timeout [ 74.537941][ T5778] Bluetooth: hci3: command tx timeout [ 74.541597][ T5775] Bluetooth: hci2: command tx timeout [ 74.588012][ T5768] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 74.626899][ T5765] veth0_macvtap: entered promiscuous mode [ 74.637761][ T5768] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 74.653558][ T5773] veth0_vlan: entered promiscuous mode [ 74.661839][ T5765] veth1_macvtap: entered promiscuous mode [ 74.700010][ T5768] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.709399][ T5768] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.718511][ T5768] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.727278][ T5768] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.750530][ T5773] veth1_vlan: entered promiscuous mode [ 74.765602][ T5769] veth0_vlan: entered promiscuous mode [ 74.789414][ T5765] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 74.800339][ T5765] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.814082][ T5765] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 74.825077][ T5765] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 74.836376][ T5765] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 74.848226][ T5765] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 74.879783][ T5769] veth1_vlan: entered promiscuous mode [ 74.924846][ T5765] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.934605][ T5765] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.944269][ T5765] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.953220][ T5765] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.034552][ T48] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 75.052148][ T48] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 75.062108][ T5773] veth0_macvtap: entered promiscuous mode [ 75.128661][ T5773] veth1_macvtap: entered promiscuous mode [ 75.140677][ T5769] veth0_macvtap: entered promiscuous mode [ 75.165273][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 75.175461][ T5769] veth1_macvtap: entered promiscuous mode [ 75.176179][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 75.214411][ T5769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 75.226301][ T5769] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.236587][ T5769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 75.247255][ T5769] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.259057][ T5769] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 75.276107][ T1113] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 75.283994][ T1113] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 75.327844][ T5773] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 75.343246][ T5773] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.353639][ T5773] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 75.364245][ T5773] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.374572][ T5773] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 75.385632][ T5773] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.398873][ T5773] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 75.412906][ T5769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.424975][ T5769] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.435548][ T5769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.450061][ T5769] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.461110][ T5769] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 75.479778][ T5773] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.491600][ T5773] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.501808][ T5773] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.514374][ T5773] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.524251][ T5773] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 75.535296][ T5773] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 75.550039][ T5773] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 75.591531][ T5769] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.600537][ T5769] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.615615][ T5769] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.628132][ T5769] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.645312][ T1087] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 75.648605][ T5773] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.662439][ T1087] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 75.672855][ T5773] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.683971][ T5773] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.693079][ T5773] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.993000][ T1102] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.019078][ T1102] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 76.067143][ T1087] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.075052][ T1087] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 76.132226][ C0] hrtimer: interrupt took 68314 ns [ 76.219048][ T1102] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.237067][ T1102] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 76.315519][ T1087] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 76.338843][ T1087] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 76.536946][ T5772] Bluetooth: hci0: command tx timeout [ 76.615888][ T5772] Bluetooth: hci2: command tx timeout [ 76.621476][ T5772] Bluetooth: hci3: command tx timeout [ 76.627448][ T5775] Bluetooth: hci1: command tx timeout [ 78.591123][ T5862] warning: `syz.3.10' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 [ 78.616319][ T5772] Bluetooth: hci0: command tx timeout [ 78.696019][ T5772] Bluetooth: hci3: command tx timeout [ 78.701670][ T5775] Bluetooth: hci1: command tx timeout [ 78.707480][ T5775] Bluetooth: hci2: command tx timeout [ 79.250799][ T5856] netlink: 'syz.1.8': attribute type 10 has an invalid length. [ 79.514074][ T5856] team0: Port device geneve1 added [ 79.995480][ T5852] netlink: 'syz.2.6': attribute type 4 has an invalid length. [ 80.058344][ T5852] netlink: 152 bytes leftover after parsing attributes in process `syz.2.6'. [ 80.359722][ T5852] A link change request failed with some changes committed already. Interface hsr_slave_1 may have been left with an inconsistent configuration, please check. [ 80.993901][ T5881] netlink: 1 bytes leftover after parsing attributes in process `syz.3.13'. [ 81.520190][ T27] cfg80211: failed to load regulatory.db [ 83.077569][ T5896] Driver unsupported XDP return value 0 on prog (id 16) dev N/A, expect packet loss! [ 83.560695][ T5900] netlink: 'syz.1.16': attribute type 3 has an invalid length. [ 83.612285][ T5900] netlink: 130984 bytes leftover after parsing attributes in process `syz.1.16'. [ 83.701477][ T5906] netlink: 1057 bytes leftover after parsing attributes in process `syz.3.18'. [ 84.110598][ T5910] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 84.686215][ T5909] syz.3.18 (5909) used greatest stack depth: 19912 bytes left [ 84.938719][ T5913] Zero length message leads to an empty skb [ 85.926529][ T5918] netlink: 'syz.3.22': attribute type 10 has an invalid length. [ 86.084861][ T5918] team0: Device ipvlan1 failed to register rx_handler [ 86.293307][ T5928] netlink: 'syz.2.24': attribute type 10 has an invalid length. [ 86.413450][ T5918] syz.3.22 (5918) used greatest stack depth: 17544 bytes left [ 90.326525][ T6019] netlink: 'syz.0.30': attribute type 27 has an invalid length. [ 90.346199][ T6019] netlink: 152 bytes leftover after parsing attributes in process `syz.0.30'. [ 90.367303][ T6019] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 90.547822][ T6019] netlink: 'syz.0.30': attribute type 21 has an invalid length. [ 95.958542][ T6042] sit0: entered allmulticast mode [ 96.006493][ T6046] netlink: 60 bytes leftover after parsing attributes in process `syz.3.38'. [ 96.111977][ T6042] netlink: 129384 bytes leftover after parsing attributes in process `syz.2.36'. [ 96.216430][ T6044] sit0: entered promiscuous mode [ 96.939646][ T6046] netlink: 60 bytes leftover after parsing attributes in process `syz.3.38'. [ 98.126680][ T6070] netlink: 'syz.1.45': attribute type 27 has an invalid length. [ 98.142987][ T6070] netlink: 152 bytes leftover after parsing attributes in process `syz.1.45'. [ 98.156788][ T6070] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 98.236217][ T6071] netlink: 'syz.3.44': attribute type 10 has an invalid length. [ 98.566556][ T6070] netlink: 'syz.1.45': attribute type 21 has an invalid length. [ 99.062813][ T6080] netlink: 60 bytes leftover after parsing attributes in process `syz.1.48'. [ 99.085894][ T6080] netlink: 60 bytes leftover after parsing attributes in process `syz.1.48'. [ 99.139796][ T6080] netlink: 60 bytes leftover after parsing attributes in process `syz.1.48'. [ 99.209218][ T6084] sit0: entered allmulticast mode [ 99.295347][ T6085] sit0: entered promiscuous mode [ 99.404851][ T6087] netlink: 60 bytes leftover after parsing attributes in process `syz.0.60'. [ 99.448181][ T6084] netlink: 129384 bytes leftover after parsing attributes in process `syz.3.50'. [ 100.921182][ T6087] netlink: 60 bytes leftover after parsing attributes in process `syz.0.60'. [ 102.267452][ T6104] netlink: 'syz.0.55': attribute type 10 has an invalid length. [ 102.313618][ T6104] team0: Device ipvlan1 failed to register rx_handler [ 102.707414][ T6125] netlink: 1057 bytes leftover after parsing attributes in process `syz.0.61'. [ 104.876173][ T6135] sit0: entered allmulticast mode [ 104.939335][ T6135] sit0: entered promiscuous mode [ 105.024889][ T6137] netlink: 129384 bytes leftover after parsing attributes in process `syz.0.65'. [ 108.076062][ T6169] netlink: 'syz.3.70': attribute type 4 has an invalid length. [ 108.083700][ T6169] netlink: 152 bytes leftover after parsing attributes in process `syz.3.70'. [ 110.134144][ T6169] A link change request failed with some changes committed already. Interface hsr_slave_1 may have been left with an inconsistent configuration, please check. [ 110.590620][ T6191] sit0: entered allmulticast mode [ 110.732204][ T6191] sit0: entered promiscuous mode [ 110.757382][ T6198] netlink: 129384 bytes leftover after parsing attributes in process `syz.1.78'. [ 111.782921][ T6216] netlink: 132 bytes leftover after parsing attributes in process `syz.1.85'. [ 112.294047][ T6235] netlink: 'syz.3.92': attribute type 10 has an invalid length. [ 112.490685][ T6237] netlink: 1057 bytes leftover after parsing attributes in process `syz.1.93'. [ 113.869973][ T6253] netlink: 'syz.1.99': attribute type 1 has an invalid length. [ 115.053788][ T6282] netlink: 'syz.2.106': attribute type 10 has an invalid length. [ 116.293097][ T6297] FAULT_INJECTION: forcing a failure. [ 116.293097][ T6297] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 116.313239][ T6297] CPU: 1 PID: 6297 Comm: syz.1.112 Not tainted syzkaller #0 [ 116.320602][ T6297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 116.330703][ T6297] Call Trace: [ 116.334053][ T6297] [ 116.337028][ T6297] dump_stack_lvl+0x18c/0x250 [ 116.341763][ T6297] ? show_regs_print_info+0x20/0x20 [ 116.347005][ T6297] ? load_image+0x400/0x400 [ 116.351548][ T6297] ? __might_fault+0xaa/0x120 [ 116.356268][ T6297] ? __lock_acquire+0x7d40/0x7d40 [ 116.361334][ T6297] should_fail_ex+0x39d/0x4d0 [ 116.366066][ T6297] _copy_from_user+0x2f/0xe0 [ 116.370701][ T6297] ____sys_sendmsg+0x2fd/0x960 [ 116.375506][ T6297] ? __lock_acquire+0x7d40/0x7d40 [ 116.380580][ T6297] ? __sys_sendmsg_sock+0x30/0x30 [ 116.385646][ T6297] ? __import_iovec+0x3fa/0x850 [ 116.390550][ T6297] ? import_iovec+0x73/0xa0 [ 116.395089][ T6297] ___sys_sendmsg+0x2a6/0x360 [ 116.399798][ T6297] ? get_pid_task+0x20/0x1e0 [ 116.404434][ T6297] ? __sys_sendmsg+0x2a0/0x2a0 [ 116.409262][ T6297] ? __lock_acquire+0x7d40/0x7d40 [ 116.414359][ T6297] __se_sys_sendmsg+0x1c2/0x2b0 [ 116.419404][ T6297] ? __x64_sys_sendmsg+0x80/0x80 [ 116.424385][ T6297] ? lockdep_hardirqs_on+0x98/0x150 [ 116.429629][ T6297] do_syscall_64+0x55/0xa0 [ 116.434095][ T6297] ? clear_bhb_loop+0x40/0x90 [ 116.439002][ T6297] ? clear_bhb_loop+0x40/0x90 [ 116.443680][ T6297] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 116.449649][ T6297] RIP: 0033:0x7f8e8599c799 [ 116.454050][ T6297] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 116.474441][ T6297] RSP: 002b:00007f8e868c6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 116.482886][ T6297] RAX: ffffffffffffffda RBX: 00007f8e85c15fa0 RCX: 00007f8e8599c799 [ 116.490862][ T6297] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000005 [ 116.498832][ T6297] RBP: 00007f8e868c6090 R08: 0000000000000000 R09: 0000000000000000 [ 116.506811][ T6297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.514792][ T6297] R13: 00007f8e85c16038 R14: 00007f8e85c15fa0 R15: 00007ffe76465848 [ 116.522770][ T6297] [ 118.353055][ T6321] FAULT_INJECTION: forcing a failure. [ 118.353055][ T6321] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 118.372376][ T6321] CPU: 0 PID: 6321 Comm: syz.3.118 Not tainted syzkaller #0 [ 118.379729][ T6321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 118.389829][ T6321] Call Trace: [ 118.393195][ T6321] [ 118.396159][ T6321] dump_stack_lvl+0x18c/0x250 [ 118.400882][ T6321] ? show_regs_print_info+0x20/0x20 [ 118.406119][ T6321] ? load_image+0x400/0x400 [ 118.410661][ T6321] ? __might_fault+0xaa/0x120 [ 118.415390][ T6321] ? __lock_acquire+0x7d40/0x7d40 [ 118.420497][ T6321] should_fail_ex+0x39d/0x4d0 [ 118.425236][ T6321] _copy_from_user+0x2f/0xe0 [ 118.429887][ T6321] ___sys_sendmsg+0x1c7/0x360 [ 118.434692][ T6321] ? get_pid_task+0x20/0x1e0 [ 118.439334][ T6321] ? __sys_sendmsg+0x2a0/0x2a0 [ 118.444163][ T6321] ? __lock_acquire+0x7d40/0x7d40 [ 118.449258][ T6321] __se_sys_sendmsg+0x1c2/0x2b0 [ 118.454152][ T6321] ? __x64_sys_sendmsg+0x80/0x80 [ 118.459116][ T6321] ? lockdep_hardirqs_on+0x98/0x150 [ 118.464300][ T6321] do_syscall_64+0x55/0xa0 [ 118.468739][ T6321] ? clear_bhb_loop+0x40/0x90 [ 118.473462][ T6321] ? clear_bhb_loop+0x40/0x90 [ 118.478180][ T6321] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 118.484109][ T6321] RIP: 0033:0x7fc75219c799 [ 118.488562][ T6321] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 118.508398][ T6321] RSP: 002b:00007fc752fcf028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 118.516855][ T6321] RAX: ffffffffffffffda RBX: 00007fc752415fa0 RCX: 00007fc75219c799 [ 118.524868][ T6321] RDX: 0000000000000000 RSI: 0000200000000880 RDI: 0000000000000003 [ 118.531336][ T6319] netlink: 'syz.1.117': attribute type 10 has an invalid length. [ 118.532948][ T6321] RBP: 00007fc752fcf090 R08: 0000000000000000 R09: 0000000000000000 [ 118.532966][ T6321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 118.532977][ T6321] R13: 00007fc752416038 R14: 00007fc752415fa0 R15: 00007ffe47aaf8b8 [ 118.533011][ T6321] [ 118.724849][ T6319] geneve0: entered promiscuous mode [ 118.829929][ T6319] bond0: (slave geneve0): Enslaving as an active interface with an up link [ 118.849407][ T6328] netlink: 'syz.0.119': attribute type 10 has an invalid length. [ 118.904139][ T6331] lo: entered allmulticast mode [ 118.928502][ T6334] lo: entered promiscuous mode [ 118.933537][ T6334] lo: left allmulticast mode [ 119.266955][ T6338] netlink: 1047 bytes leftover after parsing attributes in process `syz.2.122'. [ 119.291012][ T6338] bridge_slave_1: default FDB implementation only supports local addresses [ 119.699442][ T6344] netlink: 'syz.0.124': attribute type 8 has an invalid length. [ 119.752077][ T6344] netlink: 156 bytes leftover after parsing attributes in process `syz.0.124'. [ 120.542673][ T6376] netlink: 'syz.2.133': attribute type 10 has an invalid length. [ 121.066583][ T6386] FAULT_INJECTION: forcing a failure. [ 121.066583][ T6386] name failslab, interval 1, probability 0, space 0, times 0 [ 121.079490][ T6386] CPU: 1 PID: 6386 Comm: syz.3.137 Not tainted syzkaller #0 [ 121.086822][ T6386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 121.096910][ T6386] Call Trace: [ 121.100225][ T6386] [ 121.103185][ T6386] dump_stack_lvl+0x18c/0x250 [ 121.107906][ T6386] ? show_regs_print_info+0x20/0x20 [ 121.113163][ T6386] ? load_image+0x400/0x400 [ 121.117728][ T6386] should_fail_ex+0x39d/0x4d0 [ 121.122535][ T6386] should_failslab+0x9/0x20 [ 121.127065][ T6386] slab_pre_alloc_hook+0x59/0x310 [ 121.132113][ T6386] kmem_cache_alloc+0x5a/0x2d0 [ 121.136906][ T6386] ? inet_frag_find+0x8f8/0x1ec0 [ 121.141860][ T6386] inet_frag_find+0x8f8/0x1ec0 [ 121.146640][ T6386] ? ip4_obj_hashfn+0x1e0/0x1e0 [ 121.151602][ T6386] ? inet_frag_find+0x138/0x1ec0 [ 121.156557][ T6386] ? inet_frag_destroy_rcu+0xc0/0xc0 [ 121.161907][ T6386] ? verify_lock_unused+0x140/0x140 [ 121.167123][ T6386] ip_defrag+0x33b/0x1fa0 [ 121.171527][ T6386] ? mark_lock+0x94/0x320 [ 121.175877][ T6386] ? __in_dev_get_rcu+0xc0/0xc0 [ 121.180779][ T6386] ? ipv4_conntrack_defrag+0x3c5/0x5a0 [ 121.186283][ T6386] ipv4_conntrack_defrag+0x3df/0x5a0 [ 121.191773][ T6386] ? defrag4_net_exit+0xb0/0xb0 [ 121.196639][ T6386] nf_hook_slow+0xbd/0x200 [ 121.201077][ T6386] ? nf_hook+0x390/0x390 [ 121.205337][ T6386] nf_hook+0x228/0x390 [ 121.209425][ T6386] ? nf_hook+0xa2/0x390 [ 121.213598][ T6386] ? __ip_local_out+0x5f0/0x5f0 [ 121.218559][ T6386] ? nf_hook+0x390/0x390 [ 121.222822][ T6386] ? ip_fast_csum+0x1ee/0x2b0 [ 121.227513][ T6386] __ip_local_out+0x4db/0x5f0 [ 121.232203][ T6386] ? nf_hook+0x390/0x390 [ 121.236467][ T6386] ip_local_out+0x2a/0x130 [ 121.240903][ T6386] iptunnel_xmit+0x4f0/0x920 [ 121.245525][ T6386] ip_tunnel_xmit+0x1cbc/0x2410 [ 121.250424][ T6386] ? ip4_dst_hoplimit+0x2d0/0x2d0 [ 121.255472][ T6386] ? validate_xmit_xfrm+0xbc/0x12c0 [ 121.260696][ T6386] ? gre_build_header+0x25b/0x990 [ 121.265743][ T6386] ipgre_xmit+0x7a6/0xb20 [ 121.270106][ T6386] dev_hard_start_xmit+0x246/0x740 [ 121.275247][ T6386] __dev_queue_xmit+0x19a3/0x3660 [ 121.280306][ T6386] ? __dev_queue_xmit+0x265/0x3660 [ 121.285441][ T6386] ? netdev_core_pick_tx+0x340/0x340 [ 121.290743][ T6386] ? skb_release_data+0x1cf/0x800 [ 121.295789][ T6386] ? pskb_expand_head+0xbfe/0x1230 [ 121.300923][ T6386] __bpf_tx_skb+0x189/0x250 [ 121.305451][ T6386] bpf_clone_redirect+0x30f/0x4a0 [ 121.310502][ T6386] bpf_prog_208b094576c80b22+0x5e/0x63 [ 121.316094][ T6386] ? perf_trace_run_bpf_submit+0x125/0x1c0 [ 121.321916][ T6386] ? perf_trace_preemptirq_template+0x269/0x330 [ 121.328179][ T6386] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 121.334168][ T6386] ? lockdep_softirqs_on+0x580/0x580 [ 121.339468][ T6386] ? lock_chain_count+0x20/0x20 [ 121.344335][ T6386] ? __local_bh_disable_ip+0x108/0x1a0 [ 121.349804][ T6386] ? __cant_sleep+0x220/0x220 [ 121.354491][ T6386] ? __local_bh_enable_ip+0x13a/0x1c0 [ 121.359869][ T6386] ? _local_bh_enable+0xa0/0xa0 [ 121.364750][ T6386] ? bpf_test_timer_continue+0x135/0x380 [ 121.370426][ T6386] ? bpf_test_run+0x174/0x870 [ 121.375222][ T6386] bpf_test_run+0x2df/0x870 [ 121.379770][ T6386] ? bpf_test_run+0x174/0x870 [ 121.384469][ T6386] ? convert___skb_to_skb+0x590/0x590 [ 121.389867][ T6386] ? eth_get_headlen+0x210/0x210 [ 121.394832][ T6386] ? slab_build_skb+0x25f/0x3f0 [ 121.399703][ T6386] ? convert___skb_to_skb+0x3d/0x590 [ 121.405003][ T6386] bpf_prog_test_run_skb+0xad2/0x12b0 [ 121.410407][ T6386] ? cpu_online+0x60/0x60 [ 121.414749][ T6386] bpf_prog_test_run+0x321/0x390 [ 121.419730][ T6386] __sys_bpf+0x49d/0x890 [ 121.424007][ T6386] ? bpf_link_show_fdinfo+0x390/0x390 [ 121.429418][ T6386] ? lock_chain_count+0x20/0x20 [ 121.434302][ T6386] __x64_sys_bpf+0x7c/0x90 [ 121.438744][ T6386] do_syscall_64+0x55/0xa0 [ 121.443179][ T6386] ? clear_bhb_loop+0x40/0x90 [ 121.447877][ T6386] ? clear_bhb_loop+0x40/0x90 [ 121.452570][ T6386] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 121.458473][ T6386] RIP: 0033:0x7fc75219c799 [ 121.462898][ T6386] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 121.482534][ T6386] RSP: 002b:00007fc752fcf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 121.491007][ T6386] RAX: ffffffffffffffda RBX: 00007fc752415fa0 RCX: 00007fc75219c799 [ 121.498993][ T6386] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 000000000000000a [ 121.507027][ T6386] RBP: 00007fc752fcf090 R08: 0000000000000000 R09: 0000000000000000 [ 121.515096][ T6386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 121.523077][ T6386] R13: 00007fc752416038 R14: 00007fc752415fa0 R15: 00007ffe47aaf8b8 [ 121.531085][ T6386] [ 122.044342][ T6391] netlink: 'syz.3.139': attribute type 15 has an invalid length. [ 122.056829][ T6380] netlink: 668 bytes leftover after parsing attributes in process `syz.1.134'. [ 122.070956][ T6391] netlink: 'syz.3.139': attribute type 5 has an invalid length. [ 122.078948][ T6391] netlink: 144 bytes leftover after parsing attributes in process `syz.3.139'. [ 122.088311][ T6380] openvswitch: netlink: ufid size 3064 bytes exceeds the range (1, 16) [ 122.106235][ T6380] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 122.610219][ T6409] bridge_slave_1: left allmulticast mode [ 122.646655][ T6409] bridge_slave_1: left promiscuous mode [ 122.668743][ T6409] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.701109][ T6409] bridge_slave_0: left allmulticast mode [ 122.814994][ T6409] bridge_slave_0: left promiscuous mode [ 122.922870][ T6409] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.629272][ T6428] netlink: 'syz.3.148': attribute type 10 has an invalid length. [ 123.916902][ T6438] FAULT_INJECTION: forcing a failure. [ 123.916902][ T6438] name failslab, interval 1, probability 0, space 0, times 0 [ 123.930014][ T6438] CPU: 1 PID: 6438 Comm: syz.1.151 Not tainted syzkaller #0 [ 123.937349][ T6438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 123.947425][ T6438] Call Trace: [ 123.950717][ T6438] [ 123.953660][ T6438] dump_stack_lvl+0x18c/0x250 [ 123.958364][ T6438] ? show_regs_print_info+0x20/0x20 [ 123.963579][ T6438] ? load_image+0x400/0x400 [ 123.968105][ T6438] ? ieee80211_tx_dequeue+0x48a9/0x4bc0 [ 123.973766][ T6438] should_fail_ex+0x39d/0x4d0 [ 123.978468][ T6438] should_failslab+0x9/0x20 [ 123.982986][ T6438] slab_pre_alloc_hook+0x59/0x310 [ 123.988051][ T6438] kmem_cache_alloc_node+0x60/0x320 [ 123.993266][ T6438] ? __alloc_skb+0x103/0x2c0 [ 123.997883][ T6438] __alloc_skb+0x103/0x2c0 [ 124.002322][ T6438] mac80211_hwsim_tx_frame_nl+0x268/0xbd0 [ 124.008069][ T6438] ? mac80211_hwsim_monitor_rx+0x800/0x800 [ 124.013885][ T6438] ? mac80211_hwsim_tx+0x175b/0x2720 [ 124.019201][ T6438] ieee80211_handle_wake_tx_queue+0x199/0x2b0 [ 124.025377][ T6438] ? ieee80211_ctstoself_duration+0x460/0x460 [ 124.031456][ T6438] ? __local_bh_enable_ip+0x13a/0x1c0 [ 124.037272][ T6438] ? _local_bh_enable+0xa0/0xa0 [ 124.042135][ T6438] ? do_raw_spin_unlock+0x121/0x230 [ 124.047352][ T6438] ieee80211_queue_skb+0x1a3e/0x21c0 [ 124.052678][ T6438] ieee80211_tx+0x2c3/0x460 [ 124.057218][ T6438] ? ieee80211_skb_resize+0x630/0x630 [ 124.062649][ T6438] ? ieee80211_xmit+0x310/0x3f0 [ 124.067535][ T6438] __ieee80211_subif_start_xmit+0xe10/0x1500 [ 124.073550][ T6438] ? __ieee80211_subif_start_xmit+0x2ae/0x1500 [ 124.079731][ T6438] ? ieee80211_txq_schedule_start+0x310/0x310 [ 124.085817][ T6438] ? arch_stack_walk+0x160/0x190 [ 124.090789][ T6438] ? ieee80211_multicast_to_unicast+0x19c/0x310 [ 124.097066][ T6438] ieee80211_subif_start_xmit+0xf4/0x560 [ 124.102723][ T6438] ? ieee80211_build_hdr+0x2710/0x2710 [ 124.108215][ T6438] dev_hard_start_xmit+0x246/0x740 [ 124.113359][ T6438] __dev_queue_xmit+0x19a3/0x3660 [ 124.118464][ T6438] ? __dev_queue_xmit+0x265/0x3660 [ 124.123600][ T6438] ? netdev_core_pick_tx+0x340/0x340 [ 124.128896][ T6438] ? skb_release_data+0x1cf/0x800 [ 124.133941][ T6438] ? pskb_expand_head+0xbfe/0x1230 [ 124.139167][ T6438] __bpf_tx_skb+0x189/0x250 [ 124.143706][ T6438] bpf_clone_redirect+0x30f/0x4a0 [ 124.148759][ T6438] bpf_prog_c6f54bbad6dab1ee+0x5e/0x63 [ 124.154250][ T6438] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 124.160240][ T6438] ? preempt_schedule+0xc0/0xd0 [ 124.165108][ T6438] ? bpf_test_run+0x174/0x870 [ 124.169794][ T6438] ? preempt_schedule_common+0x82/0xc0 [ 124.175359][ T6438] ? schedule_preempt_disabled+0x20/0x20 [ 124.181006][ T6438] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 124.187128][ T6438] ? lockdep_softirqs_on+0x580/0x580 [ 124.192427][ T6438] ? lock_chain_count+0x20/0x20 [ 124.197292][ T6438] ? preempt_schedule_thunk+0x1a/0x30 [ 124.202681][ T6438] ? __local_bh_disable_ip+0x108/0x1a0 [ 124.208147][ T6438] ? __cant_sleep+0x220/0x220 [ 124.212833][ T6438] ? __local_bh_enable_ip+0x14b/0x1c0 [ 124.218219][ T6438] ? _local_bh_enable+0xa0/0xa0 [ 124.223087][ T6438] ? bpf_test_timer_continue+0x135/0x380 [ 124.228731][ T6438] ? bpf_test_run+0x174/0x870 [ 124.233417][ T6438] bpf_test_run+0x2df/0x870 [ 124.238035][ T6438] ? bpf_test_run+0x174/0x870 [ 124.242731][ T6438] ? convert___skb_to_skb+0x590/0x590 [ 124.248195][ T6438] ? eth_get_headlen+0x210/0x210 [ 124.253187][ T6438] ? slab_build_skb+0x25f/0x3f0 [ 124.258086][ T6438] ? convert___skb_to_skb+0x3d/0x590 [ 124.263397][ T6438] bpf_prog_test_run_skb+0xad2/0x12b0 [ 124.268806][ T6438] ? cpu_online+0x60/0x60 [ 124.273150][ T6438] bpf_prog_test_run+0x321/0x390 [ 124.278125][ T6438] __sys_bpf+0x49d/0x890 [ 124.282381][ T6438] ? bpf_link_show_fdinfo+0x390/0x390 [ 124.287780][ T6438] ? lock_chain_count+0x20/0x20 [ 124.292653][ T6438] __x64_sys_bpf+0x7c/0x90 [ 124.297078][ T6438] do_syscall_64+0x55/0xa0 [ 124.301519][ T6438] ? clear_bhb_loop+0x40/0x90 [ 124.306209][ T6438] ? clear_bhb_loop+0x40/0x90 [ 124.310907][ T6438] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 124.316814][ T6438] RIP: 0033:0x7f8e8599c799 [ 124.321245][ T6438] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 124.340863][ T6438] RSP: 002b:00007f8e868c6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 124.349291][ T6438] RAX: ffffffffffffffda RBX: 00007f8e85c15fa0 RCX: 00007f8e8599c799 [ 124.357364][ T6438] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 124.365341][ T6438] RBP: 00007f8e868c6090 R08: 0000000000000000 R09: 0000000000000000 [ 124.373324][ T6438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 124.381302][ T6438] R13: 00007f8e85c16038 R14: 00007f8e85c15fa0 R15: 00007ffe76465848 [ 124.389299][ T6438] [ 124.393978][ T5778] Bluetooth: hci1: ISO packet too small [ 124.553916][ T6437] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 125.987663][ T6472] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 126.068475][ T6479] netlink: 830 bytes leftover after parsing attributes in process `syz.1.164'. [ 126.120813][ T6482] netlink: 'syz.2.165': attribute type 6 has an invalid length. [ 126.167680][ T6482] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.165'. [ 126.988249][ T6503] syz.0.173 uses obsolete (PF_INET,SOCK_PACKET) [ 127.098072][ T6497] netlink: 'syz.1.170': attribute type 4 has an invalid length. [ 127.129322][ T6497] netlink: 152 bytes leftover after parsing attributes in process `syz.1.170'. [ 127.308275][ T6497] .`: renamed from bond0 (while UP) [ 127.496145][ T6504] netlink: 'syz.1.170': attribute type 10 has an invalid length. [ 127.510549][ T6499] netlink: 668 bytes leftover after parsing attributes in process `syz.2.171'. [ 127.517402][ T6504] team0: Device ipvlan1 failed to register rx_handler [ 127.529940][ T6499] openvswitch: netlink: ufid size 3064 bytes exceeds the range (1, 16) [ 127.540386][ T6499] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 127.595045][ T6509] netlink: 'syz.3.172': attribute type 10 has an invalid length. [ 127.788887][ T6517] netlink: 'syz.1.175': attribute type 1 has an invalid length. [ 127.803390][ T6517] netlink: 181400 bytes leftover after parsing attributes in process `syz.1.175'. [ 128.286470][ T6528] FAULT_INJECTION: forcing a failure. [ 128.286470][ T6528] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 128.351293][ T6528] CPU: 1 PID: 6528 Comm: syz.3.179 Not tainted syzkaller #0 [ 128.358669][ T6528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 128.368759][ T6528] Call Trace: [ 128.372069][ T6528] [ 128.375030][ T6528] dump_stack_lvl+0x18c/0x250 [ 128.379759][ T6528] ? show_regs_print_info+0x20/0x20 [ 128.385091][ T6528] ? load_image+0x400/0x400 [ 128.389982][ T6528] ? __might_fault+0xaa/0x120 [ 128.394690][ T6528] ? __lock_acquire+0x7d40/0x7d40 [ 128.399758][ T6528] should_fail_ex+0x39d/0x4d0 [ 128.404466][ T6528] _copy_from_user+0x2f/0xe0 [ 128.409081][ T6528] __sys_bpf+0x23e/0x890 [ 128.413473][ T6528] ? bpf_link_show_fdinfo+0x390/0x390 [ 128.418909][ T6528] ? lock_chain_count+0x20/0x20 [ 128.423813][ T6528] __x64_sys_bpf+0x7c/0x90 [ 128.428471][ T6528] do_syscall_64+0x55/0xa0 [ 128.432920][ T6528] ? clear_bhb_loop+0x40/0x90 [ 128.437716][ T6528] ? clear_bhb_loop+0x40/0x90 [ 128.442464][ T6528] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 128.448402][ T6528] RIP: 0033:0x7fc75219c799 [ 128.452848][ T6528] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 128.472484][ T6528] RSP: 002b:00007fc752fcf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 128.480934][ T6528] RAX: ffffffffffffffda RBX: 00007fc752415fa0 RCX: 00007fc75219c799 [ 128.488936][ T6528] RDX: 0000000000000048 RSI: 0000200000000340 RDI: 000000000000000a [ 128.496929][ T6528] RBP: 00007fc752fcf090 R08: 0000000000000000 R09: 0000000000000000 [ 128.504927][ T6528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 128.512919][ T6528] R13: 00007fc752416038 R14: 00007fc752415fa0 R15: 00007ffe47aaf8b8 [ 128.520938][ T6528] [ 129.058342][ T6533] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 129.504187][ T6532] netlink: 'syz.0.181': attribute type 10 has an invalid length. [ 129.592691][ T6532] team0: Device ipvlan1 failed to register rx_handler [ 129.898186][ T6555] netlink: 'syz.2.186': attribute type 10 has an invalid length. [ 130.369199][ T6547] netlink: 668 bytes leftover after parsing attributes in process `syz.3.185'. [ 130.476291][ T6547] openvswitch: netlink: ufid size 3064 bytes exceeds the range (1, 16) [ 130.607860][ T6547] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 131.059400][ T6572] FAULT_INJECTION: forcing a failure. [ 131.059400][ T6572] name failslab, interval 1, probability 0, space 0, times 0 [ 131.073217][ T6572] CPU: 1 PID: 6572 Comm: syz.3.191 Not tainted syzkaller #0 [ 131.080679][ T6572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 131.090809][ T6572] Call Trace: [ 131.094157][ T6572] [ 131.097151][ T6572] dump_stack_lvl+0x18c/0x250 [ 131.101922][ T6572] ? show_regs_print_info+0x20/0x20 [ 131.107199][ T6572] ? load_image+0x400/0x400 [ 131.111844][ T6572] should_fail_ex+0x39d/0x4d0 [ 131.116628][ T6572] should_failslab+0x9/0x20 [ 131.121210][ T6572] slab_pre_alloc_hook+0x59/0x310 [ 131.126338][ T6572] ? nf_ct_ext_add+0x1ab/0x440 [ 131.131181][ T6572] ? nf_ct_ext_add+0x1ab/0x440 [ 131.136017][ T6572] __kmem_cache_alloc_node+0x53/0x250 [ 131.141486][ T6572] ? nf_ct_ext_add+0x1ab/0x440 [ 131.146311][ T6572] __kmalloc_node_track_caller+0xa2/0x230 [ 131.152095][ T6572] krealloc+0x86/0x120 [ 131.156338][ T6572] nf_ct_ext_add+0x1ab/0x440 [ 131.160982][ T6572] init_conntrack+0x69c/0xf10 [ 131.165723][ T6572] ? early_drop+0x7f0/0x7f0 [ 131.170271][ T6572] ? nf_conntrack_find_get+0x650/0x650 [ 131.175777][ T6572] ? __local_bh_enable_ip+0x13a/0x1c0 [ 131.181195][ T6572] ? __siphash_unaligned+0x22e/0x3a0 [ 131.186538][ T6572] nf_conntrack_in+0xc06/0x15c0 [ 131.191502][ T6572] ? perf_trace_run_bpf_submit+0x125/0x1c0 [ 131.197412][ T6572] ? nf_ct_pernet+0x270/0x270 [ 131.202155][ T6572] ? ipt_do_table+0x2c1/0x15e0 [ 131.207091][ T6572] ? ipv4_conntrack_defrag+0x29d/0x5a0 [ 131.212671][ T6572] ? ip_select_ttl+0xb1/0x330 [ 131.217405][ T6572] ? ipv4_conntrack_local+0x123/0x200 [ 131.222844][ T6572] ? ipv4_conntrack_in+0x20/0x20 [ 131.227856][ T6572] nf_hook_slow+0xbd/0x200 [ 131.232345][ T6572] ? nf_hook+0x390/0x390 [ 131.236638][ T6572] nf_hook+0x228/0x390 [ 131.240763][ T6572] ? nf_hook+0xa2/0x390 [ 131.244958][ T6572] ? __ip_local_out+0x5f0/0x5f0 [ 131.249859][ T6572] ? nf_hook+0x390/0x390 [ 131.254159][ T6572] ? ip_fast_csum+0x1ee/0x2b0 [ 131.258884][ T6572] __ip_local_out+0x4db/0x5f0 [ 131.263595][ T6572] ? nf_hook+0x390/0x390 [ 131.267888][ T6572] ip_send_skb+0x4c/0x1d0 [ 131.272261][ T6572] raw_sendmsg+0x163e/0x1c00 [ 131.276950][ T6572] ? compat_raw_ioctl+0x70/0x70 [ 131.281927][ T6572] ? tomoyo_socket_sendmsg_permission+0x216/0x2f0 [ 131.288443][ T6572] ? sock_rps_record_flow+0x19/0x3f0 [ 131.293816][ T6572] ? inet_sendmsg+0x7c/0x2f0 [ 131.298461][ T6572] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 131.303783][ T6572] ? security_socket_sendmsg+0x80/0xa0 [ 131.309279][ T6572] ? inet_send_prepare+0x260/0x260 [ 131.314436][ T6572] ____sys_sendmsg+0x5ba/0x960 [ 131.319247][ T6572] ? __lock_acquire+0x7d40/0x7d40 [ 131.324417][ T6572] ? __asan_memset+0x22/0x40 [ 131.329046][ T6572] ? __sys_sendmsg_sock+0x30/0x30 [ 131.334099][ T6572] ? __import_iovec+0x5f2/0x850 [ 131.339038][ T6572] ? import_iovec+0x73/0xa0 [ 131.343588][ T6572] ___sys_sendmsg+0x2a6/0x360 [ 131.348318][ T6572] ? __sys_sendmsg+0x2a0/0x2a0 [ 131.353192][ T6572] ? __lock_acquire+0x7d40/0x7d40 [ 131.358341][ T6572] __se_sys_sendmsg+0x1c2/0x2b0 [ 131.363238][ T6572] ? __x64_sys_sendmsg+0x80/0x80 [ 131.368261][ T6572] ? lockdep_hardirqs_on+0x98/0x150 [ 131.373505][ T6572] do_syscall_64+0x55/0xa0 [ 131.377959][ T6572] ? clear_bhb_loop+0x40/0x90 [ 131.382665][ T6572] ? clear_bhb_loop+0x40/0x90 [ 131.387381][ T6572] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 131.393302][ T6572] RIP: 0033:0x7fc75219c799 [ 131.397753][ T6572] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 131.417421][ T6572] RSP: 002b:00007fc752fcf028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 131.425922][ T6572] RAX: ffffffffffffffda RBX: 00007fc752415fa0 RCX: 00007fc75219c799 [ 131.433948][ T6572] RDX: 0000000020040000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 131.441957][ T6572] RBP: 00007fc752fcf090 R08: 0000000000000000 R09: 0000000000000000 [ 131.449957][ T6572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 131.457956][ T6572] R13: 00007fc752416038 R14: 00007fc752415fa0 R15: 00007ffe47aaf8b8 [ 131.466043][ T6572] [ 131.542777][ T6560] netlink: 'syz.0.187': attribute type 10 has an invalid length. [ 132.330018][ T6585] netlink: 209852 bytes leftover after parsing attributes in process `syz.1.196'. [ 132.358352][ T6585] openvswitch: netlink: Flow key attribute not present in set flow. [ 132.707488][ T1283] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.714060][ T1283] ieee802154 phy1 wpan1: encryption failed: -22 [ 134.135244][ T6595] netlink: 'syz.0.197': attribute type 10 has an invalid length. [ 134.361876][ T6592] mac80211_hwsim hwsim2 wlan0: entered promiscuous mode [ 134.377117][ T6592] mac80211_hwsim hwsim2 wlan0: entered allmulticast mode [ 135.326401][ T6605] netlink: 'syz.0.203': attribute type 9 has an invalid length. [ 135.369168][ T6605] netlink: 209836 bytes leftover after parsing attributes in process `syz.0.203'. [ 135.507785][ T6606] netlink: 'syz.0.203': attribute type 21 has an invalid length. [ 135.517710][ T6606] netlink: 132 bytes leftover after parsing attributes in process `syz.0.203'. [ 135.572469][ T6606] netlink: 'syz.0.203': attribute type 39 has an invalid length. [ 135.996285][ T6608] netlink: 'syz.2.204': attribute type 10 has an invalid length. [ 136.128562][ T6624] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.208'. [ 136.190149][ T6624] openvswitch: netlink: Flow key attribute not present in set flow. [ 137.109445][ T6633] FAULT_INJECTION: forcing a failure. [ 137.109445][ T6633] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 137.185065][ T6633] CPU: 1 PID: 6633 Comm: syz.3.212 Not tainted syzkaller #0 [ 137.192435][ T6633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 137.202521][ T6633] Call Trace: [ 137.205825][ T6633] [ 137.208778][ T6633] dump_stack_lvl+0x18c/0x250 [ 137.213497][ T6633] ? show_regs_print_info+0x20/0x20 [ 137.218747][ T6633] ? load_image+0x400/0x400 [ 137.223308][ T6633] ? __might_fault+0xaa/0x120 [ 137.228034][ T6633] ? __lock_acquire+0x7d40/0x7d40 [ 137.233115][ T6633] should_fail_ex+0x39d/0x4d0 [ 137.237927][ T6633] _copy_from_iter+0x1d9/0x12e0 [ 137.242819][ T6633] ? slab_post_alloc_hook+0x8a/0x4b0 [ 137.248148][ T6633] ? __virt_addr_valid+0x18c/0x540 [ 137.253310][ T6633] ? __lock_acquire+0x7d40/0x7d40 [ 137.258374][ T6633] ? rcu_is_watching+0x15/0xb0 [ 137.263180][ T6633] ? copyout_mc+0x70/0x70 [ 137.267544][ T6633] ? __virt_addr_valid+0x18c/0x540 [ 137.272693][ T6633] ? __virt_addr_valid+0x18c/0x540 [ 137.277839][ T6633] ? __virt_addr_valid+0x469/0x540 [ 137.282986][ T6633] ? __check_object_size+0x506/0xa20 [ 137.288329][ T6633] netlink_sendmsg+0x76b/0xbf0 [ 137.293145][ T6633] ? netlink_getsockopt+0x590/0x590 [ 137.298383][ T6633] ? aa_sock_msg_perm+0x94/0x150 [ 137.303358][ T6633] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 137.308693][ T6633] ? security_socket_sendmsg+0x80/0xa0 [ 137.314200][ T6633] ? netlink_getsockopt+0x590/0x590 [ 137.319449][ T6633] ____sys_sendmsg+0x5ba/0x960 [ 137.324257][ T6633] ? __asan_memset+0x22/0x40 [ 137.328883][ T6633] ? __sys_sendmsg_sock+0x30/0x30 [ 137.333941][ T6633] ? __import_iovec+0x5f2/0x850 [ 137.338937][ T6633] ? import_iovec+0x73/0xa0 [ 137.343472][ T6633] ___sys_sendmsg+0x2a6/0x360 [ 137.348184][ T6633] ? get_pid_task+0x20/0x1e0 [ 137.352818][ T6633] ? __sys_sendmsg+0x2a0/0x2a0 [ 137.357638][ T6633] ? __lock_acquire+0x7d40/0x7d40 [ 137.362729][ T6633] __se_sys_sendmsg+0x1c2/0x2b0 [ 137.367628][ T6633] ? __x64_sys_sendmsg+0x80/0x80 [ 137.372635][ T6633] ? lockdep_hardirqs_on+0x98/0x150 [ 137.377904][ T6633] do_syscall_64+0x55/0xa0 [ 137.382363][ T6633] ? clear_bhb_loop+0x40/0x90 [ 137.387080][ T6633] ? clear_bhb_loop+0x40/0x90 [ 137.391802][ T6633] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 137.397816][ T6633] RIP: 0033:0x7fc75219c799 [ 137.402262][ T6633] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 137.421915][ T6633] RSP: 002b:00007fc752fcf028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 137.430380][ T6633] RAX: ffffffffffffffda RBX: 00007fc752415fa0 RCX: 00007fc75219c799 [ 137.438390][ T6633] RDX: 0000000060044084 RSI: 0000200000000040 RDI: 0000000000000003 [ 137.446395][ T6633] RBP: 00007fc752fcf090 R08: 0000000000000000 R09: 0000000000000000 [ 137.454397][ T6633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.462404][ T6633] R13: 00007fc752416038 R14: 00007fc752415fa0 R15: 00007ffe47aaf8b8 [ 137.470432][ T6633] [ 137.856093][ T6642] netlink: 'syz.3.214': attribute type 2 has an invalid length. [ 137.863818][ T6642] netlink: 'syz.3.214': attribute type 8 has an invalid length. [ 137.905988][ T6642] netlink: 132 bytes leftover after parsing attributes in process `syz.3.214'. [ 138.367493][ T6657] netlink: 'syz.3.217': attribute type 2 has an invalid length. [ 138.385815][ T6657] netlink: 164 bytes leftover after parsing attributes in process `syz.3.217'. [ 138.416094][ T6656] mac80211_hwsim hwsim2 »»»»»»: renamed from wlan0 (while UP) [ 139.001456][ T6667] netlink: 209852 bytes leftover after parsing attributes in process `syz.2.221'. [ 139.163523][ T6667] openvswitch: netlink: Flow key attribute not present in set flow. [ 139.878671][ T6677] netlink: 'syz.1.224': attribute type 10 has an invalid length. [ 140.289262][ T6677] .`: (slave geneve0): Releasing backup interface [ 140.342366][ T6680] FAULT_INJECTION: forcing a failure. [ 140.342366][ T6680] name failslab, interval 1, probability 0, space 0, times 0 [ 140.391029][ T6680] CPU: 0 PID: 6680 Comm: syz.0.225 Not tainted syzkaller #0 [ 140.398403][ T6680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 140.408507][ T6680] Call Trace: [ 140.411817][ T6680] [ 140.414786][ T6680] dump_stack_lvl+0x18c/0x250 [ 140.419541][ T6680] ? show_regs_print_info+0x20/0x20 [ 140.424787][ T6680] ? load_image+0x400/0x400 [ 140.429420][ T6680] ? __might_sleep+0xe0/0xe0 [ 140.434047][ T6680] ? __lock_acquire+0x7d40/0x7d40 [ 140.439127][ T6680] should_fail_ex+0x39d/0x4d0 [ 140.443855][ T6680] should_failslab+0x9/0x20 [ 140.448391][ T6680] slab_pre_alloc_hook+0x59/0x310 [ 140.453455][ T6680] ? sctp_association_new+0x89/0x25c0 [ 140.458864][ T6680] __kmem_cache_alloc_node+0x53/0x250 [ 140.464279][ T6680] ? sctp_association_new+0x89/0x25c0 [ 140.469684][ T6680] kmalloc_trace+0x2a/0xe0 [ 140.474151][ T6680] sctp_association_new+0x89/0x25c0 [ 140.479379][ T6680] ? sctp_do_bind+0x6bd/0x990 [ 140.484069][ T6680] ? __ipv6_addr_type+0x10c/0x2f0 [ 140.489134][ T6680] sctp_connect_new_asoc+0x2de/0x6a0 [ 140.494463][ T6680] ? __sctp_connect+0xd80/0xd80 [ 140.499422][ T6680] ? __local_bh_enable_ip+0x13a/0x1c0 [ 140.504804][ T6680] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 140.510365][ T6680] ? security_sctp_bind_connect+0x89/0xb0 [ 140.514135][ T6684] netlink: 'syz.3.227': attribute type 13 has an invalid length. [ 140.516116][ T6680] sctp_sendmsg+0x1575/0x28c0 [ 140.516180][ T6680] ? sctp_getsockopt+0xb60/0xb60 [ 140.516202][ T6680] ? aa_sk_perm+0x83c/0x970 [ 140.516238][ T6680] ? aa_af_perm+0x330/0x330 [ 140.542615][ T6680] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 140.549055][ T6680] ? sock_rps_record_flow+0x19/0x3f0 [ 140.554397][ T6680] ? inet_sendmsg+0xe9/0x2f0 [ 140.558998][ T6680] ? inet_send_prepare+0x260/0x260 [ 140.564109][ T6680] ____sys_sendmsg+0x5ba/0x960 [ 140.568860][ T6680] ? __lock_acquire+0x7d40/0x7d40 [ 140.573872][ T6680] ? __sys_sendmsg_sock+0x30/0x30 [ 140.578886][ T6680] ? __import_iovec+0x5f2/0x850 [ 140.583746][ T6680] ? import_iovec+0x73/0xa0 [ 140.588252][ T6680] ___sys_sendmsg+0x2a6/0x360 [ 140.593051][ T6680] ? get_pid_task+0x20/0x1e0 [ 140.597684][ T6680] ? __sys_sendmsg+0x2a0/0x2a0 [ 140.602440][ T6680] ? __lock_acquire+0x7d40/0x7d40 [ 140.607501][ T6680] __se_sys_sendmsg+0x1c2/0x2b0 [ 140.612363][ T6680] ? __x64_sys_sendmsg+0x80/0x80 [ 140.617290][ T6680] ? lockdep_hardirqs_on+0x98/0x150 [ 140.622582][ T6680] do_syscall_64+0x55/0xa0 [ 140.627017][ T6680] ? clear_bhb_loop+0x40/0x90 [ 140.631733][ T6680] ? clear_bhb_loop+0x40/0x90 [ 140.636451][ T6680] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 140.642377][ T6680] RIP: 0033:0x7fa9c7d9c799 [ 140.646813][ T6680] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 140.666518][ T6680] RSP: 002b:00007fa9c8bae028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 140.674951][ T6680] RAX: ffffffffffffffda RBX: 00007fa9c8015fa0 RCX: 00007fa9c7d9c799 [ 140.682957][ T6680] RDX: 00000000000480c4 RSI: 00002000000017c0 RDI: 0000000000000003 [ 140.690937][ T6680] RBP: 00007fa9c8bae090 R08: 0000000000000000 R09: 0000000000000000 [ 140.698927][ T6680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.706931][ T6680] R13: 00007fa9c8016038 R14: 00007fa9c8015fa0 R15: 00007ffc06a9e078 [ 140.714963][ T6680] [ 141.122537][ T6698] netlink: 60 bytes leftover after parsing attributes in process `syz.2.233'. [ 141.192222][ T6698] netlink: 60 bytes leftover after parsing attributes in process `syz.2.233'. [ 141.216397][ T6700] netlink: 60 bytes leftover after parsing attributes in process `syz.2.233'. [ 141.246149][ T6698] netlink: 60 bytes leftover after parsing attributes in process `syz.2.233'. [ 141.771766][ T6709] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 141.842304][ T6694] netlink: 'syz.0.231': attribute type 4 has an invalid length. [ 141.866798][ T6694] netlink: 152 bytes leftover after parsing attributes in process `syz.0.231'. [ 142.003989][ T6694] .`: renamed from bond0 (while UP) [ 142.057680][ T6699] netlink: 'syz.0.231': attribute type 10 has an invalid length. [ 142.104004][ T6699] team0: Device ipvlan1 failed to register rx_handler [ 142.358436][ T6723] netlink: 'syz.2.239': attribute type 10 has an invalid length. [ 142.708028][ T6728] netlink: 16211 bytes leftover after parsing attributes in process `syz.1.243'. [ 143.381006][ T6752] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 143.941419][ T6768] FAULT_INJECTION: forcing a failure. [ 143.941419][ T6768] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 143.961743][ T6768] CPU: 0 PID: 6768 Comm: syz.0.256 Not tainted syzkaller #0 [ 143.969099][ T6768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 143.979273][ T6768] Call Trace: [ 143.982562][ T6768] [ 143.985499][ T6768] dump_stack_lvl+0x18c/0x250 [ 143.990219][ T6768] ? show_regs_print_info+0x20/0x20 [ 143.995445][ T6768] ? load_image+0x400/0x400 [ 143.999959][ T6768] ? __might_fault+0xaa/0x120 [ 144.004650][ T6768] ? __lock_acquire+0x7d40/0x7d40 [ 144.009688][ T6768] should_fail_ex+0x39d/0x4d0 [ 144.014384][ T6768] _copy_from_user+0x2f/0xe0 [ 144.018992][ T6768] generic_map_update_batch+0x59a/0x810 [ 144.024557][ T6768] ? rcu_read_unlock+0xa0/0xa0 [ 144.029361][ T6768] ? __fdget+0x180/0x210 [ 144.033638][ T6768] ? rcu_read_unlock+0xa0/0xa0 [ 144.038522][ T6768] bpf_map_do_batch+0x3d7/0x610 [ 144.043401][ T6768] __sys_bpf+0x381/0x890 [ 144.047659][ T6768] ? bpf_link_show_fdinfo+0x390/0x390 [ 144.053052][ T6768] ? lock_chain_count+0x20/0x20 [ 144.057983][ T6768] __x64_sys_bpf+0x7c/0x90 [ 144.062450][ T6768] do_syscall_64+0x55/0xa0 [ 144.066892][ T6768] ? clear_bhb_loop+0x40/0x90 [ 144.071599][ T6768] ? clear_bhb_loop+0x40/0x90 [ 144.076309][ T6768] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 144.082234][ T6768] RIP: 0033:0x7fa9c7d9c799 [ 144.086670][ T6768] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 144.106288][ T6768] RSP: 002b:00007fa9c5ff6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 144.114815][ T6768] RAX: ffffffffffffffda RBX: 00007fa9c8016180 RCX: 00007fa9c7d9c799 [ 144.122897][ T6768] RDX: 0000000000000038 RSI: 0000200000000240 RDI: 000000000000001a [ 144.130874][ T6768] RBP: 00007fa9c5ff6090 R08: 0000000000000000 R09: 0000000000000000 [ 144.138856][ T6768] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 144.146836][ T6768] R13: 00007fa9c8016218 R14: 00007fa9c8016180 R15: 00007ffc06a9e078 [ 144.154824][ T6768] [ 144.178845][ T6769] netlink: 'syz.3.257': attribute type 10 has an invalid length. [ 146.726516][ T6812] netlink: 'syz.1.273': attribute type 10 has an invalid length. [ 147.375472][ T6817] netlink: 144 bytes leftover after parsing attributes in process `syz.2.275'. [ 147.428079][ T6813] netlink: 'syz.0.274': attribute type 10 has an invalid length. [ 147.705881][ T6811] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 147.707409][ T6813] team0: Port device wlan1 added [ 148.006145][ T6833] FAULT_INJECTION: forcing a failure. [ 148.006145][ T6833] name failslab, interval 1, probability 0, space 0, times 0 [ 148.019261][ T6833] CPU: 1 PID: 6833 Comm: syz.1.280 Not tainted syzkaller #0 [ 148.026600][ T6833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 148.037071][ T6833] Call Trace: [ 148.040381][ T6833] [ 148.043332][ T6833] dump_stack_lvl+0x18c/0x250 [ 148.048035][ T6833] ? show_regs_print_info+0x20/0x20 [ 148.053250][ T6833] ? load_image+0x400/0x400 [ 148.057889][ T6833] should_fail_ex+0x39d/0x4d0 [ 148.062586][ T6833] should_failslab+0x9/0x20 [ 148.067110][ T6833] slab_pre_alloc_hook+0x59/0x310 [ 148.072157][ T6833] kmem_cache_alloc+0x5a/0x2d0 [ 148.076936][ T6833] ? skb_clone+0x1eb/0x370 [ 148.081372][ T6833] skb_clone+0x1eb/0x370 [ 148.085708][ T6833] ? dev_queue_xmit_nit+0x212/0xbb0 [ 148.090931][ T6833] dev_queue_xmit_nit+0x24d/0xbb0 [ 148.096056][ T6833] ? dev_queue_xmit_nit+0x2d/0xbb0 [ 148.101272][ T6833] ? validate_xmit_skb+0x949/0xf60 [ 148.106411][ T6833] dev_hard_start_xmit+0x148/0x740 [ 148.111549][ T6833] __dev_queue_xmit+0x19a3/0x3660 [ 148.116596][ T6833] ? __dev_queue_xmit+0x265/0x3660 [ 148.121727][ T6833] ? netdev_core_pick_tx+0x340/0x340 [ 148.127045][ T6833] ? skb_release_data+0x1cf/0x800 [ 148.132090][ T6833] ? pskb_expand_head+0xbfe/0x1230 [ 148.137253][ T6833] __bpf_tx_skb+0x189/0x250 [ 148.141859][ T6833] bpf_clone_redirect+0x30f/0x4a0 [ 148.146949][ T6833] bpf_prog_6893982b85ceadf7+0x5e/0x63 [ 148.152422][ T6833] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 148.158416][ T6833] ? preempt_schedule+0xc0/0xd0 [ 148.163289][ T6833] ? perf_trace_preemptirq_template+0xac/0x330 [ 148.169458][ T6833] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 148.175531][ T6833] ? lockdep_softirqs_on+0x580/0x580 [ 148.180827][ T6833] ? lock_chain_count+0x20/0x20 [ 148.185727][ T6833] ? __local_bh_disable_ip+0x108/0x1a0 [ 148.191240][ T6833] ? __cant_sleep+0x220/0x220 [ 148.195943][ T6833] ? __local_bh_enable_ip+0x13a/0x1c0 [ 148.201331][ T6833] ? _local_bh_enable+0xa0/0xa0 [ 148.206204][ T6833] ? bpf_test_timer_continue+0x135/0x380 [ 148.211846][ T6833] ? bpf_test_run+0x174/0x870 [ 148.216532][ T6833] bpf_test_run+0x2df/0x870 [ 148.221066][ T6833] ? bpf_test_run+0x174/0x870 [ 148.225761][ T6833] ? convert___skb_to_skb+0x590/0x590 [ 148.231144][ T6833] ? eth_get_headlen+0x210/0x210 [ 148.236104][ T6833] ? slab_build_skb+0x25f/0x3f0 [ 148.240970][ T6833] ? convert___skb_to_skb+0x3d/0x590 [ 148.246417][ T6833] bpf_prog_test_run_skb+0xad2/0x12b0 [ 148.251817][ T6833] ? cpu_online+0x60/0x60 [ 148.256182][ T6833] bpf_prog_test_run+0x321/0x390 [ 148.261247][ T6833] __sys_bpf+0x49d/0x890 [ 148.265517][ T6833] ? bpf_link_show_fdinfo+0x390/0x390 [ 148.270936][ T6833] ? lock_chain_count+0x20/0x20 [ 148.275814][ T6833] __x64_sys_bpf+0x7c/0x90 [ 148.280273][ T6833] do_syscall_64+0x55/0xa0 [ 148.284707][ T6833] ? clear_bhb_loop+0x40/0x90 [ 148.289492][ T6833] ? clear_bhb_loop+0x40/0x90 [ 148.294191][ T6833] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 148.300106][ T6833] RIP: 0033:0x7f8e8599c799 [ 148.304620][ T6833] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 148.324269][ T6833] RSP: 002b:00007f8e868c6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 148.332706][ T6833] RAX: ffffffffffffffda RBX: 00007f8e85c15fa0 RCX: 00007f8e8599c799 [ 148.340692][ T6833] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 148.348707][ T6833] RBP: 00007f8e868c6090 R08: 0000000000000000 R09: 0000000000000000 [ 148.356795][ T6833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 148.364938][ T6833] R13: 00007f8e85c16038 R14: 00007f8e85c15fa0 R15: 00007ffe76465848 [ 148.372944][ T6833] [ 149.313161][ T6853] netlink: 14 bytes leftover after parsing attributes in process `syz.2.287'. [ 149.395257][ T6853] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 149.461056][ T6853] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 149.575527][ T6853] bond0 (unregistering): Released all slaves [ 149.586919][ T6861] netlink: 'syz.2.287': attribute type 29 has an invalid length. [ 149.611695][ T6859] FAULT_INJECTION: forcing a failure. [ 149.611695][ T6859] name failslab, interval 1, probability 0, space 0, times 0 [ 149.655064][ T6859] CPU: 0 PID: 6859 Comm: syz.0.288 Not tainted syzkaller #0 [ 149.662451][ T6859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 149.672722][ T6859] Call Trace: [ 149.676060][ T6859] [ 149.679047][ T6859] dump_stack_lvl+0x18c/0x250 [ 149.683812][ T6859] ? show_regs_print_info+0x20/0x20 [ 149.689075][ T6859] ? load_image+0x400/0x400 [ 149.693621][ T6859] ? __lock_acquire+0x7d40/0x7d40 [ 149.698683][ T6859] ? perf_trace_lock+0x304/0x3b0 [ 149.703755][ T6859] should_fail_ex+0x39d/0x4d0 [ 149.708581][ T6859] should_failslab+0x9/0x20 [ 149.713135][ T6859] slab_pre_alloc_hook+0x59/0x310 [ 149.718216][ T6859] kmem_cache_alloc_lru+0x4d/0x2d0 [ 149.723357][ T6859] ? proc_alloc_inode+0x2a/0xb0 [ 149.728259][ T6859] proc_alloc_inode+0x2a/0xb0 [ 149.732968][ T6859] ? proc_invalidate_siblings_dcache+0x6c0/0x6c0 [ 149.739333][ T6859] new_inode_pseudo+0x63/0x1d0 [ 149.744135][ T6859] new_inode+0x22/0x1b0 [ 149.748345][ T6859] proc_pid_make_inode+0x24/0x190 [ 149.753418][ T6859] proc_pident_instantiate+0x6d/0x2b0 [ 149.758841][ T6859] proc_pident_lookup+0x1b3/0x290 [ 149.763922][ T6859] __lookup_slow+0x2a1/0x400 [ 149.768567][ T6859] ? lookup_one_len+0x2e0/0x2e0 [ 149.773473][ T6859] ? try_to_unlazy+0x34c/0x5a0 [ 149.778281][ T6859] ? down_read+0x1ac/0x2e0 [ 149.782749][ T6859] lookup_slow+0x53/0x70 [ 149.787037][ T6859] link_path_walk+0x990/0xe30 [ 149.791796][ T6859] ? handle_lookup_down+0x130/0x130 [ 149.797144][ T6859] path_openat+0x293/0x3230 [ 149.801688][ T6859] ? trace_call_bpf+0xc3/0x6c0 [ 149.806563][ T6859] ? do_filp_open+0x430/0x430 [ 149.811269][ T6859] ? perf_trace_lock+0x304/0x3b0 [ 149.816276][ T6859] ? trace_event_raw_event_lock+0x250/0x250 [ 149.822233][ T6859] do_filp_open+0x1f5/0x430 [ 149.826767][ T6859] ? alloc_fd+0x58f/0x630 [ 149.831147][ T6859] ? vfs_tmpfile+0x490/0x490 [ 149.835801][ T6859] ? noop_direct_IO+0x20/0x20 [ 149.840553][ T6859] ? _raw_spin_unlock+0x28/0x40 [ 149.845431][ T6859] ? alloc_fd+0x58f/0x630 [ 149.849830][ T6859] do_sys_openat2+0x134/0x1d0 [ 149.854714][ T6859] ? perf_trace_preemptirq_template+0x269/0x330 [ 149.860998][ T6859] ? do_sys_open+0xe0/0xe0 [ 149.865456][ T6859] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 149.871914][ T6859] ? lock_chain_count+0x20/0x20 [ 149.876823][ T6859] __x64_sys_openat+0x139/0x160 [ 149.881725][ T6859] do_syscall_64+0x55/0xa0 [ 149.886174][ T6859] ? clear_bhb_loop+0x40/0x90 [ 149.890882][ T6859] ? clear_bhb_loop+0x40/0x90 [ 149.895593][ T6859] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 149.901520][ T6859] RIP: 0033:0x7fa9c7d5cfce [ 149.905984][ T6859] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 149.925722][ T6859] RSP: 002b:00007fa9c8badec8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 149.934196][ T6859] RAX: ffffffffffffffda RBX: 00007fa9c8bae6c0 RCX: 00007fa9c7d5cfce [ 149.942206][ T6859] RDX: 0000000000000002 RSI: 00007fa9c8badf90 RDI: ffffffffffffff9c [ 149.950203][ T6859] RBP: 00007fa9c8bae090 R08: 0000000000000000 R09: 0000000000000000 [ 149.958207][ T6859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 149.966207][ T6859] R13: 00007fa9c8016038 R14: 00007fa9c8015fa0 R15: 00007ffc06a9e078 [ 149.974389][ T6859] [ 149.996357][ T6862] netlink: 'syz.1.286': attribute type 10 has an invalid length. [ 150.069618][ T6861] netlink: 'syz.2.287': attribute type 29 has an invalid length. [ 151.443089][ T6903] netlink: 'syz.0.300': attribute type 3 has an invalid length. [ 151.476986][ T6903] netlink: 130984 bytes leftover after parsing attributes in process `syz.0.300'. [ 151.804867][ T6910] netlink: 'syz.1.302': attribute type 1 has an invalid length. [ 151.829509][ T6910] netlink: 193500 bytes leftover after parsing attributes in process `syz.1.302'. [ 151.949249][ T6910] netlink: 203516 bytes leftover after parsing attributes in process `syz.1.302'. [ 151.997576][ T6910] openvswitch: netlink: Key 0 has unexpected len 12 expected 0 [ 152.725812][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 152.840800][ T6926] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 152.879836][ T6926] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 152.988449][ T6933] FAULT_INJECTION: forcing a failure. [ 152.988449][ T6933] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 152.998727][ T6926] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 153.011826][ T6926] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 153.065802][ T6933] CPU: 0 PID: 6933 Comm: syz.2.311 Not tainted syzkaller #0 [ 153.073177][ T6933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 153.083280][ T6933] Call Trace: [ 153.086588][ T6933] [ 153.089569][ T6933] dump_stack_lvl+0x18c/0x250 [ 153.094393][ T6933] ? show_regs_print_info+0x20/0x20 [ 153.099635][ T6933] ? load_image+0x400/0x400 [ 153.104180][ T6933] ? __might_fault+0xaa/0x120 [ 153.108900][ T6933] ? __lock_acquire+0x7d40/0x7d40 [ 153.113977][ T6933] ? unix_ioctl+0x261/0x670 [ 153.118528][ T6933] should_fail_ex+0x39d/0x4d0 [ 153.123438][ T6933] _copy_from_user+0x2f/0xe0 [ 153.128066][ T6933] sock_do_ioctl+0x190/0x310 [ 153.132698][ T6933] ? sock_show_fdinfo+0xb0/0xb0 [ 153.137611][ T6933] sock_ioctl+0x5ba/0x7e0 [ 153.142000][ T6933] ? sock_poll+0x3e0/0x3e0 [ 153.146472][ T6933] ? bpf_lsm_file_ioctl+0x9/0x10 [ 153.151456][ T6933] ? security_file_ioctl+0x80/0xa0 [ 153.156617][ T6933] ? sock_poll+0x3e0/0x3e0 [ 153.161081][ T6933] __se_sys_ioctl+0xfd/0x170 [ 153.165724][ T6933] do_syscall_64+0x55/0xa0 [ 153.170180][ T6933] ? clear_bhb_loop+0x40/0x90 [ 153.174878][ T6933] ? clear_bhb_loop+0x40/0x90 [ 153.179570][ T6933] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 153.185481][ T6933] RIP: 0033:0x7f9c70d9c799 [ 153.189911][ T6933] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 153.209533][ T6933] RSP: 002b:00007f9c71c38028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 153.217963][ T6933] RAX: ffffffffffffffda RBX: 00007f9c71015fa0 RCX: 00007f9c70d9c799 [ 153.225950][ T6933] RDX: 0000200000000080 RSI: 0000000000008924 RDI: 0000000000000009 [ 153.233958][ T6933] RBP: 00007f9c71c38090 R08: 0000000000000000 R09: 0000000000000000 [ 153.241958][ T6933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 153.249967][ T6933] R13: 00007f9c71016038 R14: 00007f9c71015fa0 R15: 00007ffe9e885988 [ 153.258006][ T6933] [ 153.456452][ T6935] netlink: 'syz.1.312': attribute type 7 has an invalid length. [ 153.464387][ T6935] netlink: 'syz.1.312': attribute type 6 has an invalid length. [ 153.742449][ T6942] netlink: 'syz.1.314': attribute type 3 has an invalid length. [ 153.759518][ T6942] netlink: 'syz.1.314': attribute type 1 has an invalid length. [ 153.773044][ T6942] netlink: 187756 bytes leftover after parsing attributes in process `syz.1.314'. [ 154.384733][ T6955] FAULT_INJECTION: forcing a failure. [ 154.384733][ T6955] name failslab, interval 1, probability 0, space 0, times 0 [ 154.401944][ T6955] CPU: 1 PID: 6955 Comm: syz.2.320 Not tainted syzkaller #0 [ 154.409373][ T6955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 154.419459][ T6955] Call Trace: [ 154.422763][ T6955] [ 154.425722][ T6955] dump_stack_lvl+0x18c/0x250 [ 154.430438][ T6955] ? sctp_sendmsg+0x1575/0x28c0 [ 154.435581][ T6955] ? ___sys_sendmsg+0x2a6/0x360 [ 154.440549][ T6955] ? show_regs_print_info+0x20/0x20 [ 154.445784][ T6955] ? load_image+0x400/0x400 [ 154.450326][ T6955] should_fail_ex+0x39d/0x4d0 [ 154.455047][ T6955] should_failslab+0x9/0x20 [ 154.459581][ T6955] slab_pre_alloc_hook+0x59/0x310 [ 154.464642][ T6955] ? sctp_add_bind_addr+0x8c/0x360 [ 154.469785][ T6955] __kmem_cache_alloc_node+0x53/0x250 [ 154.475201][ T6955] ? sctp_add_bind_addr+0x8c/0x360 [ 154.480344][ T6955] kmalloc_trace+0x2a/0xe0 [ 154.484805][ T6955] sctp_add_bind_addr+0x8c/0x360 [ 154.489793][ T6955] sctp_copy_local_addr_list+0x315/0x4f0 [ 154.495471][ T6955] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 154.501234][ T6955] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 154.507346][ T6955] ? sctp_v6_is_any+0x64/0x70 [ 154.512058][ T6955] ? sctp_copy_one_addr+0x8c/0x350 [ 154.517226][ T6955] sctp_bind_addr_copy+0xb3/0x3c0 [ 154.522377][ T6955] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 154.528741][ T6955] sctp_connect_new_asoc+0x2f9/0x6a0 [ 154.534069][ T6955] ? __sctp_connect+0xd80/0xd80 [ 154.538952][ T6955] ? __local_bh_enable_ip+0x13a/0x1c0 [ 154.544451][ T6955] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 154.550020][ T6955] ? security_sctp_bind_connect+0x89/0xb0 [ 154.555764][ T6955] sctp_sendmsg+0x1575/0x28c0 [ 154.560472][ T6955] ? sctp_getsockopt+0xb60/0xb60 [ 154.565422][ T6955] ? aa_sk_perm+0x83c/0x970 [ 154.569962][ T6955] ? aa_af_perm+0x330/0x330 [ 154.574479][ T6955] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 154.580906][ T6955] ? sock_rps_record_flow+0x19/0x3f0 [ 154.586219][ T6955] ? inet_sendmsg+0xe9/0x2f0 [ 154.590823][ T6955] ? inet_send_prepare+0x260/0x260 [ 154.595948][ T6955] ____sys_sendmsg+0x5ba/0x960 [ 154.600719][ T6955] ? __lock_acquire+0x7d40/0x7d40 [ 154.605768][ T6955] ? __asan_memset+0x22/0x40 [ 154.610374][ T6955] ? __sys_sendmsg_sock+0x30/0x30 [ 154.615403][ T6955] ? __import_iovec+0x5f2/0x850 [ 154.620303][ T6955] ? import_iovec+0x73/0xa0 [ 154.624840][ T6955] ___sys_sendmsg+0x2a6/0x360 [ 154.629555][ T6955] ? get_pid_task+0x20/0x1e0 [ 154.634268][ T6955] ? __sys_sendmsg+0x2a0/0x2a0 [ 154.639068][ T6955] ? __lock_acquire+0x7d40/0x7d40 [ 154.644129][ T6955] __se_sys_sendmsg+0x1c2/0x2b0 [ 154.648994][ T6955] ? __x64_sys_sendmsg+0x80/0x80 [ 154.653956][ T6955] ? lockdep_hardirqs_on+0x98/0x150 [ 154.659255][ T6955] do_syscall_64+0x55/0xa0 [ 154.663692][ T6955] ? clear_bhb_loop+0x40/0x90 [ 154.668390][ T6955] ? clear_bhb_loop+0x40/0x90 [ 154.673077][ T6955] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 154.678982][ T6955] RIP: 0033:0x7f9c70d9c799 [ 154.683420][ T6955] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 154.703216][ T6955] RSP: 002b:00007f9c71c38028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 154.711640][ T6955] RAX: ffffffffffffffda RBX: 00007f9c71015fa0 RCX: 00007f9c70d9c799 [ 154.719619][ T6955] RDX: 0000000000000041 RSI: 0000200000002dc0 RDI: 0000000000000003 [ 154.727609][ T6955] RBP: 00007f9c71c38090 R08: 0000000000000000 R09: 0000000000000000 [ 154.735591][ T6955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 154.743573][ T6955] R13: 00007f9c71016038 R14: 00007f9c71015fa0 R15: 00007ffe9e885988 [ 154.751572][ T6955] [ 156.113850][ T6958] netlink: 830 bytes leftover after parsing attributes in process `syz.0.319'. [ 156.178641][ T6964] netlink: 'syz.2.321': attribute type 10 has an invalid length. [ 156.260369][ T6967] netlink: 14 bytes leftover after parsing attributes in process `syz.0.322'. [ 156.301272][ T6967] .` (unregistering): (slave bond_slave_0): Releasing backup interface [ 156.378255][ T6967] .` (unregistering): (slave bond_slave_1): Releasing backup interface [ 156.400495][ T6967] .` (unregistering): Released all slaves [ 156.403355][ T6970] netlink: 'syz.0.322': attribute type 29 has an invalid length. [ 156.439605][ T6970] netlink: 'syz.0.322': attribute type 29 has an invalid length. [ 156.689317][ T6978] netlink: 'syz.2.326': attribute type 10 has an invalid length. [ 157.065075][ T6982] netlink: 128 bytes leftover after parsing attributes in process `syz.1.327'. [ 157.097508][ T6982] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 157.686451][ T6996] netlink: 'syz.2.330': attribute type 5 has an invalid length. [ 157.827308][ T6996] syzkaller0: entered promiscuous mode [ 157.848234][ T6996] syzkaller0: entered allmulticast mode [ 158.127748][ T7005] tap0: tun_chr_ioctl cmd 1074025680 [ 158.150287][ T7005] tap0: tun_chr_ioctl cmd 2148553947 [ 158.223611][ T7007] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 158.247102][ T7007] netlink: 'syz.0.336': attribute type 10 has an invalid length. [ 158.260439][ T7007] team0: Device ipvlan1 failed to register rx_handler [ 158.499253][ T7012] netlink: 14 bytes leftover after parsing attributes in process `syz.3.337'. [ 158.600378][ T7012] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 158.631629][ T7012] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 158.758002][ T7016] netlink: 'syz.3.337': attribute type 29 has an invalid length. [ 159.017858][ T7012] bond0 (unregistering): Released all slaves [ 159.194897][ T7021] netlink: 'syz.0.345': attribute type 5 has an invalid length. [ 159.226362][ T7016] netlink: 'syz.3.337': attribute type 29 has an invalid length. [ 159.242433][ T7022] netlink: 'syz.2.338': attribute type 10 has an invalid length. [ 159.268066][ T7022] team0: Device ipvlan1 failed to register rx_handler [ 159.349749][ T7014] syzkaller0: entered promiscuous mode [ 159.358491][ T7014] syzkaller0: entered allmulticast mode [ 159.498159][ T7035] FAULT_INJECTION: forcing a failure. [ 159.498159][ T7035] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 159.523790][ T7035] CPU: 0 PID: 7035 Comm: syz.3.341 Not tainted syzkaller #0 [ 159.531157][ T7035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 159.541264][ T7035] Call Trace: [ 159.544566][ T7035] [ 159.547518][ T7035] dump_stack_lvl+0x18c/0x250 [ 159.552243][ T7035] ? show_regs_print_info+0x20/0x20 [ 159.557474][ T7035] ? load_image+0x400/0x400 [ 159.562021][ T7035] ? __lock_acquire+0x7d40/0x7d40 [ 159.567066][ T7035] ? snprintf+0xe9/0x140 [ 159.571324][ T7035] should_fail_ex+0x39d/0x4d0 [ 159.576030][ T7035] _copy_to_user+0x2f/0xa0 [ 159.580466][ T7035] simple_read_from_buffer+0xe7/0x150 [ 159.585858][ T7035] proc_fail_nth_read+0x1e8/0x260 [ 159.590931][ T7035] ? proc_fault_inject_write+0x360/0x360 [ 159.596579][ T7035] ? fsnotify_perm+0x271/0x5e0 [ 159.601352][ T7035] ? proc_fault_inject_write+0x360/0x360 [ 159.607028][ T7035] vfs_read+0x28b/0x970 [ 159.611201][ T7035] ? kernel_read+0x1e0/0x1e0 [ 159.615800][ T7035] ? __fget_files+0x28/0x4b0 [ 159.620405][ T7035] ? __fget_files+0x28/0x4b0 [ 159.625007][ T7035] ? __fget_files+0x43d/0x4b0 [ 159.629712][ T7035] ? __fdget_pos+0x2a3/0x330 [ 159.634399][ T7035] ? ksys_read+0x75/0x260 [ 159.638765][ T7035] ksys_read+0x150/0x260 [ 159.643029][ T7035] ? vfs_write+0x990/0x990 [ 159.647989][ T7035] ? lockdep_hardirqs_on+0x98/0x150 [ 159.653204][ T7035] do_syscall_64+0x55/0xa0 [ 159.657719][ T7035] ? clear_bhb_loop+0x40/0x90 [ 159.662406][ T7035] ? clear_bhb_loop+0x40/0x90 [ 159.667093][ T7035] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 159.673036][ T7035] RIP: 0033:0x7fc75215cfce [ 159.677474][ T7035] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 159.697091][ T7035] RSP: 002b:00007fc752fcefe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 159.705527][ T7035] RAX: ffffffffffffffda RBX: 00007fc752fcf6c0 RCX: 00007fc75215cfce [ 159.713504][ T7035] RDX: 000000000000000f RSI: 00007fc752fcf0a0 RDI: 0000000000000005 [ 159.721481][ T7035] RBP: 00007fc752fcf090 R08: 0000000000000000 R09: 0000000000000000 [ 159.729455][ T7035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 159.737432][ T7035] R13: 00007fc752416038 R14: 00007fc752415fa0 R15: 00007ffe47aaf8b8 [ 159.745424][ T7035] [ 160.148334][ T7047] tap0: tun_chr_ioctl cmd 1074025680 [ 160.213767][ T7045] tap0: tun_chr_ioctl cmd 2148553947 [ 160.323273][ T7042] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 160.335880][ T7042] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 160.401448][ T7042] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 160.614077][ T7042] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 161.020645][ T7051] netlink: 140 bytes leftover after parsing attributes in process `syz.3.344'. [ 161.624039][ T7070] validate_nla: 1 callbacks suppressed [ 161.624061][ T7070] netlink: 'syz.0.350': attribute type 1 has an invalid length. [ 161.660599][ T5778] Bluetooth: hci1: unexpected subevent 0x0a length: 150 > 30 [ 161.668514][ T5778] Bluetooth: hci1: Invalid handle: 0x8000 > 0x0eff [ 161.682724][ T7070] netlink: 193500 bytes leftover after parsing attributes in process `syz.0.350'. [ 161.743144][ T7075] netlink: 203516 bytes leftover after parsing attributes in process `syz.0.350'. [ 161.758249][ T7075] openvswitch: netlink: Key 0 has unexpected len 12 expected 0 [ 162.093768][ T7079] netlink: 'syz.2.354': attribute type 10 has an invalid length. [ 162.162260][ T7079] team0: Device ipvlan1 failed to register rx_handler [ 162.404425][ T7080] netlink: 'syz.3.353': attribute type 5 has an invalid length. [ 162.453607][ T7082] syz.0.356 (7082) used obsolete PPPIOCDETACH ioctl [ 162.590329][ T7077] syzkaller0: entered promiscuous mode [ 162.597082][ T7077] syzkaller0: entered allmulticast mode [ 162.694181][ T7092] netlink: 128 bytes leftover after parsing attributes in process `syz.1.357'. [ 163.035308][ T5778] Bluetooth: hci3: unexpected subevent 0x0a length: 150 > 30 [ 163.043771][ T5778] Bluetooth: hci3: Invalid handle: 0x8000 > 0x0eff [ 163.087946][ T7100] IPv6: Can't replace route, no match found [ 163.310227][ T7107] netlink: 'syz.3.363': attribute type 21 has an invalid length. [ 163.334825][ T7107] netlink: 156 bytes leftover after parsing attributes in process `syz.3.363'. [ 163.369105][ T7107] netlink: 4 bytes leftover after parsing attributes in process `syz.3.363'. [ 163.767353][ T7111] netlink: 128 bytes leftover after parsing attributes in process `syz.3.363'. [ 163.790342][ T7107] bridge_slave_0: mtu less than device minimum [ 164.617498][ T7128] netlink: 'syz.3.368': attribute type 10 has an invalid length. [ 164.801960][ T7128] team0: Device ipvlan1 failed to register rx_handler [ 165.674458][ T7147] netlink: 'syz.0.374': attribute type 10 has an invalid length. [ 165.718480][ T7147] mac80211_hwsim hwsim9 wlan1: entered promiscuous mode [ 165.809583][ T7147] team0: Port device wlan1 removed [ 166.913686][ T7168] netlink: 63503 bytes leftover after parsing attributes in process `syz.3.383'. [ 166.937739][ T7168] netlink: 'syz.3.383': attribute type 12 has an invalid length. [ 166.954850][ T7168] netlink: 120 bytes leftover after parsing attributes in process `syz.3.383'. [ 167.418973][ T7179] netlink: 'syz.1.386': attribute type 10 has an invalid length. [ 167.453501][ T7183] delete_channel: no stack [ 167.481571][ T7179] team0: Device ipvlan1 failed to register rx_handler [ 167.754945][ T7177] netlink: 'syz.3.387': attribute type 10 has an invalid length. [ 167.860275][ T7177] team0: Device ipvlan1 failed to register rx_handler [ 167.909537][ T7193] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.391'. [ 168.484322][ T7195] netlink: 'syz.1.392': attribute type 1 has an invalid length. [ 168.540532][ T7195] netlink: 193500 bytes leftover after parsing attributes in process `syz.1.392'. [ 169.118064][ T7218] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.401'. [ 169.429499][ T7226] tun0: tun_chr_ioctl cmd 1074025675 [ 169.435647][ T7226] tun0: persist enabled [ 169.444375][ T7226] tun0: tun_chr_ioctl cmd 1074025675 [ 169.450581][ T7226] tun0: persist disabled [ 169.462144][ T7226] netlink: 4 bytes leftover after parsing attributes in process `syz.3.403'. [ 169.773605][ T7234] dvmrp1: tun_chr_ioctl cmd 1074812118 [ 170.415276][ T7251] netlink: 168 bytes leftover after parsing attributes in process `syz.2.411'. [ 173.718844][ T7267] tap0: tun_chr_ioctl cmd 1074025675 [ 173.724625][ T7267] tap0: persist enabled [ 173.749554][ T7267] tap0: tun_chr_ioctl cmd 21731 [ 173.758697][ T7267] tap0: tun_chr_ioctl cmd 1074025675 [ 173.765196][ T7267] tap0: persist enabled [ 174.565569][ T7276] IPv6: Can't replace route, no match found [ 175.739925][ T7309] ªªªªª0: renamed from veth0_vlan (while UP) [ 177.005197][ T7347] IPv6: Can't replace route, no match found [ 178.983428][ T7369] FAULT_INJECTION: forcing a failure. [ 178.983428][ T7369] name failslab, interval 1, probability 0, space 0, times 0 [ 179.005817][ T7369] CPU: 0 PID: 7369 Comm: syz.0.446 Not tainted syzkaller #0 [ 179.013196][ T7369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 179.023281][ T7369] Call Trace: [ 179.026584][ T7369] [ 179.029544][ T7369] dump_stack_lvl+0x18c/0x250 [ 179.034257][ T7369] ? show_regs_print_info+0x20/0x20 [ 179.039482][ T7369] ? load_image+0x400/0x400 [ 179.044023][ T7369] should_fail_ex+0x39d/0x4d0 [ 179.048823][ T7369] should_failslab+0x9/0x20 [ 179.053363][ T7369] slab_pre_alloc_hook+0x59/0x310 [ 179.058433][ T7369] kmem_cache_alloc+0x5a/0x2d0 [ 179.063308][ T7369] ? skb_clone+0x1eb/0x370 [ 179.067751][ T7369] skb_clone+0x1eb/0x370 [ 179.072023][ T7369] __netlink_deliver_tap+0x41c/0x830 [ 179.077349][ T7369] ? netlink_deliver_tap+0x2e/0x1b0 [ 179.082613][ T7369] netlink_deliver_tap+0x19c/0x1b0 [ 179.087751][ T7369] netlink_dump+0x94b/0xe50 [ 179.092293][ T7369] ? netlink_lookup+0x200/0x200 [ 179.097189][ T7369] ? ns_capable+0x89/0xe0 [ 179.101631][ T7369] ? __inet_diag_dump_start+0x886/0x9f0 [ 179.107220][ T7369] __netlink_dump_start+0x5f1/0x810 [ 179.112459][ T7369] inet_diag_rcv_msg_compat+0x215/0x440 [ 179.118042][ T7369] ? __inet_diag_dump+0x380/0x380 [ 179.123102][ T7369] ? sock_diag_rcv_msg+0xd1/0x600 [ 179.128149][ T7369] ? inet_diag_rcv_msg_compat+0x440/0x440 [ 179.133906][ T7369] ? inet_diag_dump_start_compat+0x20/0x20 [ 179.139734][ T7369] ? inet_diag_dump+0x50/0x50 [ 179.144454][ T7369] ? __inet_diag_dump+0x380/0x380 [ 179.149513][ T7369] sock_diag_rcv_msg+0x3d8/0x600 [ 179.154485][ T7369] netlink_rcv_skb+0x241/0x4d0 [ 179.159364][ T7369] ? sock_diag_bind+0xb0/0xb0 [ 179.164067][ T7369] ? netlink_ack+0x1180/0x1180 [ 179.168875][ T7369] ? __lock_acquire+0x7d40/0x7d40 [ 179.173940][ T7369] ? netlink_deliver_tap+0x2e/0x1b0 [ 179.179170][ T7369] sock_diag_rcv+0x2a/0x40 [ 179.183606][ T7369] netlink_unicast+0x751/0x8d0 [ 179.188407][ T7369] netlink_sendmsg+0x8d0/0xbf0 [ 179.193211][ T7369] ? netlink_getsockopt+0x590/0x590 [ 179.198447][ T7369] ? aa_sock_msg_perm+0x94/0x150 [ 179.203411][ T7369] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 179.208722][ T7369] ? security_socket_sendmsg+0x80/0xa0 [ 179.214199][ T7369] ? netlink_getsockopt+0x590/0x590 [ 179.219439][ T7369] ____sys_sendmsg+0x5ba/0x960 [ 179.224235][ T7369] ? __asan_memset+0x22/0x40 [ 179.228853][ T7369] ? __sys_sendmsg_sock+0x30/0x30 [ 179.233909][ T7369] ? __import_iovec+0x5f2/0x850 [ 179.238892][ T7369] ? import_iovec+0x73/0xa0 [ 179.243418][ T7369] ___sys_sendmsg+0x2a6/0x360 [ 179.248114][ T7369] ? get_pid_task+0x20/0x1e0 [ 179.252733][ T7369] ? __sys_sendmsg+0x2a0/0x2a0 [ 179.257633][ T7369] ? __lock_acquire+0x7d40/0x7d40 [ 179.262708][ T7369] __se_sys_sendmsg+0x1c2/0x2b0 [ 179.267586][ T7369] ? __x64_sys_sendmsg+0x80/0x80 [ 179.272574][ T7369] ? lockdep_hardirqs_on+0x98/0x150 [ 179.277809][ T7369] do_syscall_64+0x55/0xa0 [ 179.282257][ T7369] ? clear_bhb_loop+0x40/0x90 [ 179.286956][ T7369] ? clear_bhb_loop+0x40/0x90 [ 179.291660][ T7369] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 179.297574][ T7369] RIP: 0033:0x7fa9c7d9c799 [ 179.302017][ T7369] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 179.321734][ T7369] RSP: 002b:00007fa9c8bae028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 179.330180][ T7369] RAX: ffffffffffffffda RBX: 00007fa9c8015fa0 RCX: 00007fa9c7d9c799 [ 179.338171][ T7369] RDX: 0000000000040040 RSI: 0000200000000000 RDI: 0000000000000003 [ 179.346163][ T7369] RBP: 00007fa9c8bae090 R08: 0000000000000000 R09: 0000000000000000 [ 179.354154][ T7369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 179.362141][ T7369] R13: 00007fa9c8016038 R14: 00007fa9c8015fa0 R15: 00007ffc06a9e078 [ 179.370151][ T7369] [ 180.448844][ T7389] netlink: 199816 bytes leftover after parsing attributes in process `syz.1.452'. [ 180.715542][ T7392] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.454'. [ 180.745948][ T7390] netlink: 209852 bytes leftover after parsing attributes in process `syz.2.451'. [ 180.755448][ T7390] openvswitch: netlink: Tunnel attr 10504 out of range max 16 [ 182.086539][ T7404] macsec0: entered promiscuous mode [ 182.111757][ T7404] macsec0: entered allmulticast mode [ 182.205202][ T7404] veth1_macvtap: entered allmulticast mode [ 182.228126][ T7407] netlink: 63763 bytes leftover after parsing attributes in process `syz.0.460'. [ 183.068652][ T7421] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.464'. [ 183.751808][ T7433] netlink: 63763 bytes leftover after parsing attributes in process `syz.1.470'. [ 185.829367][ T7445] macsec0: entered promiscuous mode [ 185.834933][ T7445] macsec0: entered allmulticast mode [ 185.875829][ T7445] veth1_macvtap: entered allmulticast mode [ 187.634266][ T7458] netlink: 199816 bytes leftover after parsing attributes in process `syz.1.476'. [ 189.263330][ T7473] netlink: 199816 bytes leftover after parsing attributes in process `syz.0.481'. [ 189.723956][ T7476] netlink: 132 bytes leftover after parsing attributes in process `syz.3.482'. [ 189.810408][ T7475] netlink: 'syz.3.482': attribute type 3 has an invalid length. [ 189.826041][ T7475] netlink: 130984 bytes leftover after parsing attributes in process `syz.3.482'. [ 189.841947][ T7476] netlink: 'syz.3.482': attribute type 10 has an invalid length. [ 189.948142][ T7476] team0: Device hsr_slave_0 failed to register rx_handler [ 190.442979][ T7489] netlink: 'syz.2.487': attribute type 21 has an invalid length. [ 190.490845][ T7489] netlink: 132 bytes leftover after parsing attributes in process `syz.2.487'. [ 190.646722][ T7489] netlink: 'syz.2.487': attribute type 1 has an invalid length. [ 190.671982][ T7495] netlink: 'syz.0.488': attribute type 1 has an invalid length. [ 190.734802][ T7495] netlink: 193500 bytes leftover after parsing attributes in process `syz.0.488'. [ 192.460535][ T7526] netlink: 'syz.2.499': attribute type 10 has an invalid length. [ 192.482150][ T7526] netlink: 65015 bytes leftover after parsing attributes in process `syz.2.499'. [ 193.185531][ T7538] netlink: 'syz.1.502': attribute type 1 has an invalid length. [ 193.280153][ T7538] netlink: 193500 bytes leftover after parsing attributes in process `syz.1.502'. [ 194.146423][ T1283] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.156326][ T1283] ieee802154 phy1 wpan1: encryption failed: -22 [ 194.337709][ T7560] delete_channel: no stack [ 194.509287][ T7570] netlink: 199816 bytes leftover after parsing attributes in process `syz.1.513'. [ 194.838414][ T7574] netlink: 'syz.2.518': attribute type 1 has an invalid length. [ 195.008933][ T7574] netlink: 193500 bytes leftover after parsing attributes in process `syz.2.518'. [ 195.278371][ T7579] netlink: 199816 bytes leftover after parsing attributes in process `syz.0.519'. [ 196.231066][ T5766] Bluetooth: hci3: command 0x0406 tx timeout [ 196.231360][ T5779] Bluetooth: hci2: command 0x0406 tx timeout [ 196.237430][ T5766] Bluetooth: hci0: command 0x0406 tx timeout [ 196.251185][ T5086] Bluetooth: hci1: command 0x0406 tx timeout [ 196.253468][ T7589] netlink: 'syz.1.525': attribute type 1 has an invalid length. [ 196.276148][ T7589] netlink: 193500 bytes leftover after parsing attributes in process `syz.1.525'. [ 196.391922][ T7590] delete_channel: no stack [ 196.410034][ T7599] netlink: 'syz.2.529': attribute type 1 has an invalid length. [ 196.433062][ T7599] netlink: 4 bytes leftover after parsing attributes in process `syz.2.529'. [ 196.468955][ T7599] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.486080][ T7599] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.247222][ T7607] netlink: 'syz.3.531': attribute type 1 has an invalid length. [ 197.255050][ T7607] netlink: 193500 bytes leftover after parsing attributes in process `syz.3.531'. [ 197.312791][ T7609] netlink: 'syz.1.532': attribute type 13 has an invalid length. [ 197.392646][ T7609] netlink: 172 bytes leftover after parsing attributes in process `syz.1.532'. [ 197.496909][ T7611] netlink: 'syz.2.533': attribute type 13 has an invalid length. [ 197.533496][ T7611] netlink: 160 bytes leftover after parsing attributes in process `syz.2.533'. [ 197.601915][ T7611] erspan0: refused to change device tx_queue_len [ 197.651835][ T7611] A link change request failed with some changes committed already. Interface erspan0 may have been left with an inconsistent configuration, please check. [ 197.971069][ T7619] netlink: 'syz.3.537': attribute type 29 has an invalid length. [ 197.995059][ T7619] netlink: 'syz.3.537': attribute type 29 has an invalid length. [ 198.012261][ T7622] netlink: 'syz.3.537': attribute type 29 has an invalid length. [ 198.070081][ T7625] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.539'. [ 198.079901][ T7619] netlink: 'syz.3.537': attribute type 29 has an invalid length. [ 198.445920][ T7628] netlink: 199816 bytes leftover after parsing attributes in process `syz.1.541'. [ 198.848063][ T7641] netlink: 193500 bytes leftover after parsing attributes in process `syz.0.543'. [ 201.473243][ T7642] validate_nla: 3 callbacks suppressed [ 201.473259][ T7642] netlink: 'syz.3.545': attribute type 1 has an invalid length. [ 201.491791][ T7642] netlink: 193500 bytes leftover after parsing attributes in process `syz.3.545'. [ 202.365147][ T7674] ================================================================== [ 202.373283][ T7674] BUG: KASAN: slab-out-of-bounds in __bpf_get_stackid+0x6bf/0x900 [ 202.381112][ T7674] Write of size 56 at addr ffff888021b03710 by task syz.1.565/7674 [ 202.389094][ T7674] [ 202.391421][ T7674] CPU: 1 PID: 7674 Comm: syz.1.565 Not tainted syzkaller #0 [ 202.398736][ T7674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 202.408824][ T7674] Call Trace: [ 202.412116][ T7674] [ 202.415050][ T7674] dump_stack_lvl+0x18c/0x250 [ 202.419746][ T7674] ? __lock_acquire+0x7d40/0x7d40 [ 202.424791][ T7674] ? show_regs_print_info+0x20/0x20 [ 202.430006][ T7674] ? load_image+0x400/0x400 [ 202.434522][ T7674] ? _raw_spin_lock_irqsave+0xc0/0x100 [ 202.439992][ T7674] ? __virt_addr_valid+0x18c/0x540 [ 202.445116][ T7674] ? __virt_addr_valid+0x469/0x540 [ 202.450241][ T7674] print_report+0xa8/0x210 [ 202.454671][ T7674] ? __bpf_get_stackid+0x6bf/0x900 [ 202.459791][ T7674] kasan_report+0x117/0x150 [ 202.464305][ T7674] ? __bpf_get_stackid+0x6bf/0x900 [ 202.469427][ T7674] kasan_check_range+0x241/0x290 [ 202.474371][ T7674] ? __bpf_get_stackid+0x6bf/0x900 [ 202.479489][ T7674] __asan_memcpy+0x40/0x70 [ 202.483934][ T7674] __bpf_get_stackid+0x6bf/0x900 [ 202.488887][ T7674] bpf_get_stackid_pe+0x343/0x410 [ 202.494014][ T7674] bpf_prog_a448e89f4c9ad9d1+0x30/0x4a [ 202.499571][ T7674] bpf_overflow_handler+0x1fc/0x510 [ 202.504785][ T7674] ? perf_prepare_header+0x1e0/0x1e0 [ 202.510076][ T7674] ? bpf_overflow_handler+0xde/0x510 [ 202.515372][ T7674] ? tp_perf_event_destroy+0x20/0x20 [ 202.520668][ T7674] ? mark_lock+0x94/0x320 [ 202.525007][ T7674] ? __perf_event_account_interrupt+0x187/0x280 [ 202.531259][ T7674] __perf_event_overflow+0x447/0x630 [ 202.536553][ T7674] perf_swevent_event+0x324/0x630 [ 202.541621][ T7674] ? perf_tp_event+0x1450/0x1450 [ 202.546603][ T7674] ___perf_sw_event+0x4a7/0x730 [ 202.551507][ T7674] ? ___perf_sw_event+0x199/0x730 [ 202.556561][ T7674] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 202.562993][ T7674] ? __lock_acquire+0x1347/0x7d40 [ 202.568047][ T7674] ? strncpy_from_user+0xff/0x2d0 [ 202.573089][ T7674] ? verify_lock_unused+0x140/0x140 [ 202.578388][ T7674] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 202.584397][ T7674] ? lock_chain_count+0x20/0x20 [ 202.589272][ T7674] ? perf_trace_lock+0xfc/0x3b0 [ 202.594148][ T7674] __perf_sw_event+0x139/0x270 [ 202.598941][ T7674] do_user_addr_fault+0x123e/0x12c0 [ 202.604250][ T7674] ? rcu_is_watching+0x15/0xb0 [ 202.609034][ T7674] exc_page_fault+0x64/0x100 [ 202.613644][ T7674] asm_exc_page_fault+0x26/0x30 [ 202.618509][ T7674] RIP: 0010:strncpy_from_user+0xff/0x2d0 [ 202.624151][ T7674] Code: 4c 89 ee e8 73 dc 2a fd 49 83 fd 07 0f 86 a1 00 00 00 4c 89 74 24 08 48 c7 44 24 10 f8 ff ff ff 45 31 e4 4c 89 3c 24 49 89 de <4f> 8b 3c 27 48 b8 ff fe fe fe fe fe fe fe 49 8d 1c 07 4c 89 fd 48 [ 202.643763][ T7674] RSP: 0018:ffffc9000347fb50 EFLAGS: 00050246 [ 202.649847][ T7674] RAX: ffffffff845c442d RBX: ffffc9000347fc70 RCX: ffff88802c591e00 [ 202.657827][ T7674] RDX: 0000000000000002 RSI: 000000000000007f RDI: 0000000000000007 [ 202.665806][ T7674] RBP: ffffc9000347fd70 R08: ffff88802c591e00 R09: 0000000000000003 [ 202.673783][ T7674] R10: 0000000000000002 R11: 0000000000000002 R12: 0000000000000000 [ 202.681763][ T7674] R13: 000000000000007f R14: ffffc9000347fc70 R15: 0000000000000000 [ 202.689831][ T7674] ? strncpy_from_user+0xdd/0x2d0 [ 202.694876][ T7674] bpf_prog_load+0xcea/0x1670 [ 202.699565][ T7674] ? map_freeze+0x420/0x420 [ 202.704088][ T7674] ? __might_fault+0xaa/0x120 [ 202.708777][ T7674] ? __might_fault+0xc6/0x120 [ 202.713457][ T7674] ? __might_fault+0xaa/0x120 [ 202.718144][ T7674] ? bpf_lsm_bpf+0x9/0x10 [ 202.722485][ T7674] ? security_bpf+0x7e/0xa0 [ 202.727002][ T7674] __sys_bpf+0x5ba/0x890 [ 202.731262][ T7674] ? bpf_link_show_fdinfo+0x390/0x390 [ 202.736651][ T7674] ? lock_chain_count+0x20/0x20 [ 202.741520][ T7674] __x64_sys_bpf+0x7c/0x90 [ 202.745943][ T7674] do_syscall_64+0x55/0xa0 [ 202.750370][ T7674] ? clear_bhb_loop+0x40/0x90 [ 202.755053][ T7674] ? clear_bhb_loop+0x40/0x90 [ 202.759743][ T7674] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 202.765649][ T7674] RIP: 0033:0x7f8e8599c799 [ 202.770183][ T7674] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 202.789795][ T7674] RSP: 002b:00007f8e868c6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 202.798220][ T7674] RAX: ffffffffffffffda RBX: 00007f8e85c15fa0 RCX: 00007f8e8599c799 [ 202.806200][ T7674] RDX: 0000000000000094 RSI: 0000200000000200 RDI: 0000000000000005 [ 202.814177][ T7674] RBP: 00007f8e85a32c99 R08: 0000000000000000 R09: 0000000000000000 [ 202.822154][ T7674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 202.830133][ T7674] R13: 00007f8e85c16038 R14: 00007f8e85c15fa0 R15: 00007ffe76465848 [ 202.838210][ T7674] [ 202.841232][ T7674] [ 202.843562][ T7674] Allocated by task 7674: [ 202.847889][ T7674] kasan_set_track+0x4e/0x70 [ 202.852486][ T7674] __kasan_kmalloc+0x8f/0xa0 [ 202.857079][ T7674] __kmalloc_node+0xb4/0x230 [ 202.861681][ T7674] bpf_map_area_alloc+0x5e/0x110 [ 202.866630][ T7674] prealloc_elems_and_freelist+0x86/0x1c0 [ 202.872440][ T7674] stack_map_alloc+0x33a/0x4c0 [ 202.877210][ T7674] map_create+0x877/0x12f0 [ 202.881627][ T7674] __sys_bpf+0x651/0x890 [ 202.885873][ T7674] __x64_sys_bpf+0x7c/0x90 [ 202.890380][ T7674] do_syscall_64+0x55/0xa0 [ 202.894830][ T7674] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 202.900728][ T7674] [ 202.903106][ T7674] Last potentially related work creation: [ 202.909110][ T7674] kasan_save_stack+0x3e/0x60 [ 202.913791][ T7674] __kasan_record_aux_stack+0xaf/0xc0 [ 202.919173][ T7674] call_rcu+0x153/0x950 [ 202.923341][ T7674] __nf_register_net_hook+0x788/0x910 [ 202.928726][ T7674] nf_register_net_hook+0xb2/0x190 [ 202.933841][ T7674] nf_register_net_hooks+0x44/0x1b0 [ 202.939046][ T7674] nf_ct_netns_do_get+0x213/0x5c0 [ 202.944125][ T7674] nf_ct_netns_inet_get+0x3b/0x150 [ 202.949245][ T7674] nf_conncount_init+0x127/0x380 [ 202.954272][ T7674] ovs_ct_init+0x316/0x490 [ 202.958694][ T7674] ovs_init_net+0x1e6/0x250 [ 202.963204][ T7674] ops_init+0x397/0x640 [ 202.967369][ T7674] setup_net+0x3b6/0xa30 [ 202.971619][ T7674] copy_net_ns+0x36d/0x5e0 [ 202.976045][ T7674] create_new_namespaces+0x3d3/0x6f0 [ 202.981333][ T7674] unshare_nsproxy_namespaces+0x11a/0x160 [ 202.987057][ T7674] ksys_unshare+0x4ce/0x8b0 [ 202.991564][ T7674] __x64_sys_unshare+0x38/0x40 [ 202.996331][ T7674] do_syscall_64+0x55/0xa0 [ 203.000760][ T7674] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 203.006656][ T7674] [ 203.008976][ T7674] The buggy address belongs to the object at ffff888021b03700 [ 203.008976][ T7674] which belongs to the cache kmalloc-cg-64 of size 64 [ 203.023123][ T7674] The buggy address is located 16 bytes inside of [ 203.023123][ T7674] allocated 40-byte region [ffff888021b03700, ffff888021b03728) [ 203.037095][ T7674] [ 203.039416][ T7674] The buggy address belongs to the physical page: [ 203.045824][ T7674] page:ffffea000086c0c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888021b03f80 pfn:0x21b03 [ 203.057283][ T7674] memcg:ffff88802594c201 [ 203.061520][ T7674] ksm flags: 0xfff00000000800(slab|node=0|zone=1|lastcpupid=0x7ff) [ 203.069411][ T7674] page_type: 0xffffffff() [ 203.073829][ T7674] raw: 00fff00000000800 ffff888017c4da00 ffffea00016c1bc0 0000000000000003 [ 203.082416][ T7674] raw: ffff888021b03f80 000000008020001f 00000001ffffffff ffff88802594c201 [ 203.091009][ T7674] page dumped because: kasan: bad access detected [ 203.097420][ T7674] page_owner tracks the page as allocated [ 203.103234][ T7674] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x16cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_NORETRY), pid 5148, tgid 5148 (udevd), ts 25753437423, free_ts 25735551923 [ 203.122688][ T7674] post_alloc_hook+0x1c1/0x200 [ 203.127466][ T7674] get_page_from_freelist+0x1951/0x19e0 [ 203.133019][ T7674] __alloc_pages+0x1f0/0x460 [ 203.137609][ T7674] alloc_slab_page+0x5d/0x160 [ 203.142373][ T7674] new_slab+0x87/0x2d0 [ 203.146628][ T7674] ___slab_alloc+0xc5d/0x12f0 [ 203.151312][ T7674] __kmem_cache_alloc_node+0x19e/0x250 [ 203.156779][ T7674] __kmalloc+0xa4/0x230 [ 203.161034][ T7674] inotify_handle_inode_event+0x18a/0x560 [ 203.166793][ T7674] fsnotify+0x1353/0x17c0 [ 203.171127][ T7674] __fsnotify_parent+0x655/0x7c0 [ 203.176070][ T7674] notify_change+0xb47/0xe10 [ 203.180664][ T7674] chmod_common+0x252/0x3f0 [ 203.185170][ T7674] do_fchmodat+0x10c/0x1e0 [ 203.189594][ T7674] __x64_sys_chmod+0x62/0x70 [ 203.194192][ T7674] do_syscall_64+0x55/0xa0 [ 203.198705][ T7674] page last free stack trace: [ 203.203448][ T7674] free_unref_page_prepare+0x7b2/0x8c0 [ 203.208916][ T7674] free_unref_page+0x32/0x2e0 [ 203.213608][ T7674] __slab_free+0x35a/0x400 [ 203.218032][ T7674] qlist_free_all+0x75/0xd0 [ 203.222545][ T7674] kasan_quarantine_reduce+0x143/0x160 [ 203.228107][ T7674] __kasan_slab_alloc+0x22/0x80 [ 203.232961][ T7674] slab_post_alloc_hook+0x6e/0x4b0 [ 203.238087][ T7674] kmem_cache_alloc+0x11a/0x2d0 [ 203.242948][ T7674] getname_flags+0xbb/0x500 [ 203.247458][ T7674] do_sys_openat2+0xda/0x1d0 [ 203.252058][ T7674] __x64_sys_openat+0x139/0x160 [ 203.256916][ T7674] do_syscall_64+0x55/0xa0 [ 203.261342][ T7674] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 203.267327][ T7674] [ 203.269656][ T7674] Memory state around the buggy address: [ 203.275286][ T7674] ffff888021b03600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 203.283348][ T7674] ffff888021b03680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 203.291433][ T7674] >ffff888021b03700: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 203.299520][ T7674] ^ [ 203.304899][ T7674] ffff888021b03780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 203.312985][ T7674] ffff888021b03800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 203.321142][ T7674] ================================================================== [ 203.331121][ T7674] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 203.338355][ T7674] CPU: 1 PID: 7674 Comm: syz.1.565 Not tainted syzkaller #0 [ 203.345666][ T7674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 203.355747][ T7674] Call Trace: [ 203.359056][ T7674] [ 203.362025][ T7674] dump_stack_lvl+0x18c/0x250 [ 203.366755][ T7674] ? show_regs_print_info+0x20/0x20 [ 203.372009][ T7674] ? load_image+0x400/0x400 [ 203.376563][ T7674] panic+0x2dc/0x730 [ 203.380492][ T7674] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 203.386749][ T7674] ? bpf_jit_dump+0xd0/0xd0 [ 203.391288][ T7674] ? _raw_spin_unlock_irqrestore+0xc0/0x120 [ 203.397282][ T7674] ? _raw_spin_unlock_irqrestore+0xc5/0x120 [ 203.403267][ T7674] ? _raw_spin_unlock+0x40/0x40 [ 203.408123][ T7674] ? __bpf_get_stackid+0x6bf/0x900 [ 203.413244][ T7674] check_panic_on_warn+0x84/0xa0 [ 203.418200][ T7674] ? __bpf_get_stackid+0x6bf/0x900 [ 203.423405][ T7674] end_report+0x6f/0x130 [ 203.427664][ T7674] kasan_report+0x128/0x150 [ 203.432173][ T7674] ? __bpf_get_stackid+0x6bf/0x900 [ 203.437296][ T7674] kasan_check_range+0x241/0x290 [ 203.442237][ T7674] ? __bpf_get_stackid+0x6bf/0x900 [ 203.447358][ T7674] __asan_memcpy+0x40/0x70 [ 203.451788][ T7674] __bpf_get_stackid+0x6bf/0x900 [ 203.456746][ T7674] bpf_get_stackid_pe+0x343/0x410 [ 203.461793][ T7674] bpf_prog_a448e89f4c9ad9d1+0x30/0x4a [ 203.467270][ T7674] bpf_overflow_handler+0x1fc/0x510 [ 203.472481][ T7674] ? perf_prepare_header+0x1e0/0x1e0 [ 203.477784][ T7674] ? bpf_overflow_handler+0xde/0x510 [ 203.483079][ T7674] ? tp_perf_event_destroy+0x20/0x20 [ 203.488378][ T7674] ? mark_lock+0x94/0x320 [ 203.492717][ T7674] ? __perf_event_account_interrupt+0x187/0x280 [ 203.498968][ T7674] __perf_event_overflow+0x447/0x630 [ 203.504263][ T7674] perf_swevent_event+0x324/0x630 [ 203.509303][ T7674] ? perf_tp_event+0x1450/0x1450 [ 203.514250][ T7674] ___perf_sw_event+0x4a7/0x730 [ 203.519124][ T7674] ? ___perf_sw_event+0x199/0x730 [ 203.524241][ T7674] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 203.530750][ T7674] ? __lock_acquire+0x1347/0x7d40 [ 203.535791][ T7674] ? strncpy_from_user+0xff/0x2d0 [ 203.540842][ T7674] ? verify_lock_unused+0x140/0x140 [ 203.546137][ T7674] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 203.552127][ T7674] ? lock_chain_count+0x20/0x20 [ 203.556979][ T7674] ? perf_trace_lock+0xfc/0x3b0 [ 203.561850][ T7674] __perf_sw_event+0x139/0x270 [ 203.566718][ T7674] do_user_addr_fault+0x123e/0x12c0 [ 203.571936][ T7674] ? rcu_is_watching+0x15/0xb0 [ 203.576713][ T7674] exc_page_fault+0x64/0x100 [ 203.581395][ T7674] asm_exc_page_fault+0x26/0x30 [ 203.586338][ T7674] RIP: 0010:strncpy_from_user+0xff/0x2d0 [ 203.592156][ T7674] Code: 4c 89 ee e8 73 dc 2a fd 49 83 fd 07 0f 86 a1 00 00 00 4c 89 74 24 08 48 c7 44 24 10 f8 ff ff ff 45 31 e4 4c 89 3c 24 49 89 de <4f> 8b 3c 27 48 b8 ff fe fe fe fe fe fe fe 49 8d 1c 07 4c 89 fd 48 [ 203.611778][ T7674] RSP: 0018:ffffc9000347fb50 EFLAGS: 00050246 [ 203.617859][ T7674] RAX: ffffffff845c442d RBX: ffffc9000347fc70 RCX: ffff88802c591e00 [ 203.625835][ T7674] RDX: 0000000000000002 RSI: 000000000000007f RDI: 0000000000000007 [ 203.633810][ T7674] RBP: ffffc9000347fd70 R08: ffff88802c591e00 R09: 0000000000000003 [ 203.641794][ T7674] R10: 0000000000000002 R11: 0000000000000002 R12: 0000000000000000 [ 203.649775][ T7674] R13: 000000000000007f R14: ffffc9000347fc70 R15: 0000000000000000 [ 203.657758][ T7674] ? strncpy_from_user+0xdd/0x2d0 [ 203.662818][ T7674] bpf_prog_load+0xcea/0x1670 [ 203.667508][ T7674] ? map_freeze+0x420/0x420 [ 203.672033][ T7674] ? __might_fault+0xaa/0x120 [ 203.676731][ T7674] ? __might_fault+0xc6/0x120 [ 203.681417][ T7674] ? __might_fault+0xaa/0x120 [ 203.686097][ T7674] ? bpf_lsm_bpf+0x9/0x10 [ 203.690440][ T7674] ? security_bpf+0x7e/0xa0 [ 203.695040][ T7674] __sys_bpf+0x5ba/0x890 [ 203.699290][ T7674] ? bpf_link_show_fdinfo+0x390/0x390 [ 203.704735][ T7674] ? lock_chain_count+0x20/0x20 [ 203.709599][ T7674] __x64_sys_bpf+0x7c/0x90 [ 203.714107][ T7674] do_syscall_64+0x55/0xa0 [ 203.718542][ T7674] ? clear_bhb_loop+0x40/0x90 [ 203.723227][ T7674] ? clear_bhb_loop+0x40/0x90 [ 203.727910][ T7674] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 203.733809][ T7674] RIP: 0033:0x7f8e8599c799 [ 203.738232][ T7674] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 203.757929][ T7674] RSP: 002b:00007f8e868c6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 203.766351][ T7674] RAX: ffffffffffffffda RBX: 00007f8e85c15fa0 RCX: 00007f8e8599c799 [ 203.774323][ T7674] RDX: 0000000000000094 RSI: 0000200000000200 RDI: 0000000000000005 [ 203.782296][ T7674] RBP: 00007f8e85a32c99 R08: 0000000000000000 R09: 0000000000000000 [ 203.790267][ T7674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 203.798238][ T7674] R13: 00007f8e85c16038 R14: 00007f8e85c15fa0 R15: 00007ffe76465848 [ 203.806220][ T7674] [ 203.809563][ T7674] Kernel Offset: disabled [ 203.813879][ T7674] Rebooting in 86400 seconds..