last executing test programs: 8m19.628039748s ago: executing program 0 (id=746): socket$kcm(0x1e, 0x2, 0x0) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r1 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x8, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x100600, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r2, 0x3000000, 0xe, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68886dd", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 8m18.275536824s ago: executing program 0 (id=758): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000180000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000110b0008850000006d00000095"], &(0x7f0000000500)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000180)="c1188e99b95d02ff4284860186dd", 0x0, 0x7fe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 8m18.084236473s ago: executing program 0 (id=760): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000000000400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x2, 0x1, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="06000000", @ANYRES32], 0x48) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair(0x25, 0x80000, 0x6, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000004c0)={0x3, 0x80, 0x40, 0x53, 0x5, 0x2, 0x0, 0x79, 0x49400, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x2, 0x1}, 0x400, 0xffffffffffffff02, 0x7fff, 0x9, 0x3ff, 0xb6, 0xbc7, 0x0, 0xffff75c8, 0x0, 0x6}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000080)=""/236, 0x26, 0xec, 0x1}, 0x28) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000007c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@const={0x0, 0x0, 0x0, 0x9, 0x3}, @fwd={0x1}]}, {0x0, [0x61]}}, 0x0, 0x33}, 0x28) close(r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1200000004000000080000000280"], 0x50) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x4, 0x0, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3eb4}, 0x94) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x86, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 8m16.842087235s ago: executing program 0 (id=771): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000300000000000000020000a2"], 0x0, 0x37, 0x0, 0x1}, 0x28) 8m16.449163794s ago: executing program 0 (id=775): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180700000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 8m16.273260243s ago: executing program 0 (id=779): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b0000008000000001000000ffff000001"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x200000ca, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 8m1.203341604s ago: executing program 32 (id=779): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b0000008000000001000000ffff000001"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x200000ca, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 11.932089143s ago: executing program 5 (id=3504): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000007d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x1, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xc, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x84140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x10c002, 0xac5d, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = socket$kcm(0x2, 0x3, 0x84) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000700)={&(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="280000000000000000000000070000000717a87f000001ac141400e0000001ac1e0001ac1414bb011c000000000000000000000008", @ANYRES64=r1], 0x48}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x541b, &(0x7f0000000640)) r2 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r2, &(0x7f00000010c0)={&(0x7f0000000140)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000480)='\\', 0x1}], 0x1}, 0x4000040) sendmsg$inet(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000180)="84", 0x33c00}], 0x1}, 0x8040) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0xffffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0xc, 0x42, 0x40, 0x42}, 0x50) r5 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r6, 0x2000012, 0x100e, 0x2, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="d8000000180081064e81f782db4cb904021d0800fd007c05e8fe55a10a000400110000000a600e41b0000900ac00060411000000160012000a0003150248035c3b61c1d67f6f94207134cf6efb8000a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f900000000e32cfa8af26c8b7b55f4d2a6823a45f2", 0xd8}], 0x1}, 0x0) 10.463104185s ago: executing program 5 (id=3510): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000031000b03d25a806f8c6394f90424fc60", 0x14}], 0x1}, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00'}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@map=r1, 0x2f, 0x0, 0xffffffc0, &(0x7f0000000140)=[0x0], 0x1, 0x0, &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500000000000000660a020000000000180100006020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x25) 10.175811879s ago: executing program 5 (id=3512): socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x4, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r0 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x6, 0x1, &(0x7f0000000000)=@raw=[@alu={0x7, 0x1, 0x5, 0x0, 0x5, 0x8, 0xfffffffffffffffc}], 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x49, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1000}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0xfffffffc}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r3, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b1a, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="0f02000039000511d25a80648c63940d0324fc600b003540280009000200002037153e37eb010280060410000a00", 0x33fe0}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x24, 0x0, &(0x7f0000000100)="b9ff0b078059268cb89e14f088a82de0ffff200000000002000aac14140ce000000d49e8", 0x0, 0x28e, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) 9.895186703s ago: executing program 1 (id=3516): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_LOOKUP_ELEM(0x2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001100)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={&(0x7f0000000400)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0, 0x0, &(0x7f00000005c0)=""/23, 0x17}, 0x153) bpf$OBJ_GET_PROG(0x7, 0x0, 0xffb5) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/net\x00') r2 = socket$kcm(0xa, 0x6, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYRES16=r2, @ANYRES64], 0x0, 0x26}, 0x28) socket$kcm(0x10, 0x3, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={&(0x7f0000000540), &(0x7f0000000600)=""/207, 0x0, 0x0, 0x780, 0x1}, 0x38) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x35ef}, 0x400, 0x0, 0x0, 0x8, 0x2, 0xfffffffc, 0x0, 0x0, 0x2}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) close(r5) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071102300000000009569ba8548000007"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) 8.604089896s ago: executing program 5 (id=3522): sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f903", 0x11}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd4242"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffac}, 0x48) 8.53796177s ago: executing program 1 (id=3523): socketpair(0x25, 0x80000, 0x2004, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8933, &(0x7f0000000080)) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0xfffffffffffffffe, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000300)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='&\x00'/12, @ANYRES32, @ANYBLOB="4099da2e7848052ca42f25a328d8a26a4f9123825ffaf4b207f0b832eae1474196f9f23a7701a5bb1c93b6dbca66b4", @ANYRES64=0x0], 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="fcffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00a4aa0000000000000000000500"/28], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x14, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000100000000008b000000001801000020786c2500000000002020207b1af8ff00000000bfa100130000000007010000f8ffffffb702000008000000b70300000800000085000004c1335adee80b6565b1c3bcc637b1000600000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b70400000000000085000000330000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b80)={r7, 0x2000012, 0xe, 0x0, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xb}, 0x50) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000022003505d25a806f8c6394f97e24fc60", 0x14}], 0x1, 0x0, 0x0, 0x74000000}, 0x10) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89b1, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={0x0, 0x9}, 0xc280, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYRESOCT=r5, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000100200"/28], 0x50) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180)=r10, 0x4) r11 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r11, 0x10f, 0x87, &(0x7f00000008c0), 0x43) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1ff, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x210}) 8.522913381s ago: executing program 2 (id=3524): perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x20, 0x10000, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x10c002, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000000653949b00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x24}, 0x94) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r4 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r3}, 0x8) close(r4) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r3, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r6, 0x84, 0x10, &(0x7f0000000000), 0xc) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r5, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) r7 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="5c00000012006b04000000d86e6c1d0002887ea6ea65670000000000000090f9c3dc90f8f41f8ecff32c6e020075e300250045586c8da718ad4b4460bc24eab55600000000000000bf9367b4fa51f60a64c9f4d4938037e786a6d0bd", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 8.399609686s ago: executing program 3 (id=3526): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x1f, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, [@call={0x85, 0x0, 0x0, 0xd0}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x11}, 0x94) (rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002a0, 0x2e, 0x0, &(0x7f0000000500)="b9fa030711a5f32e019e14f088a847e0ffff00124000632177fbac141416e000030a94029f03030180b706000000", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 5.225355993s ago: executing program 2 (id=3528): socket$kcm(0xa, 0x922000000003, 0x11) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x14, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x100) socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x86bf2056334f3ae6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0xa, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x7, 0x9, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x0, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x3, 0x66, &(0x7f00000002c0)=""/102, 0x41100, 0x64, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000640)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r0], &(0x7f0000000700)=[{0x5, 0x404, 0x10, 0x6}, {0x5, 0x1, 0x10, 0xb}, {0x0, 0x2, 0xd, 0x6}], 0x10, 0x5}, 0x94) socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r1, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x4, 0x2000000000000063, &(0x7f0000000480)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0), 0xc) socket$kcm(0xa, 0x1, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) r4 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r4, 0x890c, &(0x7f0000000000)={'xfrm0\x00', @random="0200"}) (async) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000600)={r5}) (async) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x7db) (async, rerun: 64) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x2}, 0x20) (rerun: 64) ioctl$SIOCSIFHWADDR(r6, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @remote}) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f0000000080), 0x4) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 5.149149196s ago: executing program 5 (id=3529): r0 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x5, 0x0, 0xa}, {0x10000002, 0x2, 0x8000000, 0xc}]}, 0x94) close(0x3) socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x100808, 0x0, 0x8000, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1b30}, 0x48) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r4 = getpid() r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x9}, 0x4010}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r6, &(0x7f0000000040), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) socket$kcm(0x10, 0x2, 0x4) socket$kcm(0x25, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x4, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x0, @perf_config_ext={0x3, 0x8001}, 0x0, 0x2e, 0xfffffbff, 0x4, 0x2, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xe}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r7 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r7, &(0x7f0000000700)={&(0x7f0000000000)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000000540)=[{&(0x7f00000001c0)="97cafebcb71250cb5d687d010e088fee0f13fd7ddde44c52cc8a5ee41e78", 0x1e}], 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="280000000000000000000000070000000717a87f000001ac141400e0000001ac1e0001ac1414bb011c000000000000000000000008000000", @ANYRES64=r7], 0x48}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000100)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000300)="61886ece319619e79557bf3daffaa26a93f826db1b00dc2230d278d75a5e6211a6c836f816f19f2d621d7ac5339945d56c88eb72fd0e4a3dd110719f214ced7dd696ef1099", 0x45}], 0x1, 0x0, 0x0, 0x2000000}, 0x4000495) 5.147054876s ago: executing program 4 (id=3530): r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030020000b12d25a80648c2594f90124fc60100c074002000000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001a80)={0x1b, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x3}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001b00)=@generic={&(0x7f0000001a40)='./file0\x00', r1}, 0x18) recvmsg$kcm(r0, &(0x7f0000001740)={&(0x7f00000000c0)=@caif=@dbg, 0x80, &(0x7f00000015c0)=[{&(0x7f0000000140)=""/129, 0x81}, {&(0x7f0000000200)=""/109, 0x6d}, {&(0x7f0000000280)=""/111, 0x6f}, {&(0x7f0000000300)=""/76, 0x4c}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/219, 0xdb}, {&(0x7f0000001480)=""/56, 0x38}, {&(0x7f00000014c0)=""/73, 0x49}, {&(0x7f0000001540)=""/82, 0x52}], 0x9, &(0x7f0000001680)=""/148, 0x94}, 0x40000003) recvmsg$kcm(r0, &(0x7f0000001a00)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001900)=[{&(0x7f0000001800)=""/18, 0x12}, {&(0x7f0000001840)=""/11, 0xb}, {&(0x7f0000001880)=""/33, 0x21}, {&(0x7f00000018c0)=""/48, 0x30}], 0x4, &(0x7f0000001940)=""/134, 0x86}, 0x2002) 5.100282529s ago: executing program 3 (id=3531): socketpair(0x2, 0x3, 0x1, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000}, 0x94) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x0, 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r1, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000640)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, &(0x7f0000000680)=[0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb, &(0x7f0000000700), 0x0, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0x4c, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x2000000000000063, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r2, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000000)=r2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xc2ba, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1f, 0x0, 0x0, 0x0, 0x280000, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, @fallback=0x7}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x9, 0x5, 0xff, 0x7, 0x0, 0x7fffffff, 0x700, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffffffff, 0x2, @perf_bp={0x0, 0x7}, 0x20a, 0x1, 0x7, 0x3, 0x81, 0x7, 0x8, 0x0, 0x58, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f0, &(0x7f0000000080)) 5.048905671s ago: executing program 1 (id=3532): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000007d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x1, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xc, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x84140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x10c002, 0xac5d, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = socket$kcm(0x2, 0x3, 0x84) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000700)={&(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="280000000000000000000000070000000717a87f000001ac141400e0000001ac1e0001ac1414bb011c0000000000000000000000080000", @ANYRES64=r1], 0x48}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x541b, &(0x7f0000000640)) r2 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r2, &(0x7f00000010c0)={&(0x7f0000000140)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000480)='\\', 0x1}], 0x1}, 0x4000040) sendmsg$inet(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000180)="84", 0x33c00}], 0x1}, 0x8040) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0xffffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0xc, 0x42, 0x40, 0x42}, 0x50) r5 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r6, 0x2000012, 0x100e, 0x2, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="d8000000180081064e81f782db4cb904021d0800fd007c05e8fe55a10a000400110000000a600e41b0000900ac00060411000000160012000a0003150248035c3b61c1d67f6f94207134cf6efb8000a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f900000000e32cfa8af26c8b7b55f4d2a6823a45f2", 0xd8}], 0x1}, 0x0) 4.680830169s ago: executing program 4 (id=3533): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_LOOKUP_ELEM(0x2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001100)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={&(0x7f0000000400)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0, 0x0, &(0x7f00000005c0)=""/23, 0x17}, 0x153) bpf$OBJ_GET_PROG(0x7, 0x0, 0xffb5) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/net\x00') r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYRES16, @ANYRES64], 0x0, 0x26}, 0x28) socket$kcm(0x10, 0x3, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={&(0x7f0000000540), &(0x7f0000000600)=""/207, 0x0, 0x0, 0x780, 0x1}, 0x38) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x35ef}, 0x400, 0x0, 0x0, 0x8, 0x2, 0xfffffffc, 0x0, 0x0, 0x2}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) close(r5) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071102300000000009569ba8548000007"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) 4.215316142s ago: executing program 2 (id=3534): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x13, 0x3, &(0x7f0000000000)=@framed={{0x4e, 0xa, 0xa, 0x0, 0x0, 0x71, 0x10, 0x82}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x4}, 0x0, 0x0, 0x0, 0x8, 0x2, 0xfffffffc}, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r3 = getpid() sendmsg$unix(r2, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, 0xee01}}}], 0x20, 0x8010}, 0x80) sendmsg$sock(0xffffffffffffffff, 0x0, 0x20004040) socket$kcm(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="fc", 0x1}], 0x1}, 0x20040d4) sendmsg$kcm(r4, &(0x7f00000062c0)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f00000012c0)="f6", 0x1}], 0x1}, 0x4004045) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x9, 0x5, 0xff, 0x7, 0x0, 0x7fffffff, 0x700, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffffffff, 0x2, @perf_bp={0x0, 0x4}, 0x20a, 0x1, 0x7, 0x3, 0x81, 0x7, 0x8, 0x0, 0x58, 0x0, 0x2}, 0x0, 0xffffffffbfffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f0, &(0x7f0000000080)) 4.213742062s ago: executing program 4 (id=3535): socket$kcm(0xa, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0xd}, 0x10c006, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xd, 0x17, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000007000000000000000000000018110000ec727dae7071", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf09000000000000650901000000000066000000060000001801000020756c2500000000002020207b9af8ff000000005d9100000000000037010000f8ffffffb702000008000000b70300000000ffff56000000060000002c93000000000000b5030000000000008500000076000000b7000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = getpid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="5f1a20b5bda8", 0x6}], 0x1, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xee01}}}], 0x20, 0x20008000}, 0x20008800) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, r0, 0x0, 0x2, &(0x7f0000000240)='@\x00'}, 0x30) 4.072864959s ago: executing program 3 (id=3536): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) (async) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000740)=@generic={&(0x7f00000000c0)='./file0\x00', r1}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000004000000020000000000000802000000000000000000000900000000000000000100008400000000000000000100000000000000000061"], &(0x7f00000000c0)=""/209, 0x4c, 0xd1, 0x1, 0x0, 0x10000, @value=r1}, 0x28) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000004000000020000000000000802000000000000000000000900000000000000000100008400000000000000000100000000000000000061"], &(0x7f00000000c0)=""/209, 0x4c, 0xd1, 0x1, 0x0, 0x10000, @value=r1}, 0x28) 3.763672684s ago: executing program 5 (id=3537): perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x4156, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc, 0x1}, 0x18404, 0x0, 0xfffffffe, 0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="090000000500000008040000840000"], 0x50) r1 = socket$kcm(0xa, 0x2, 0x11) sendmsg$sock(r1, &(0x7f0000000840)={&(0x7f0000000240)=@in6={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x19}}, 0x7}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[@mark={{0x14, 0x1, 0x24, 0x1}}], 0x18}, 0x8840) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r0}, 0x38) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000680)="d9dab3", 0x3}], 0x1}, 0x40000) recvmsg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000005c0)=""/151, 0x84}, {&(0x7f00000003c0)=""/114}, {&(0x7f0000000240)=""/22}], 0x1, &(0x7f0000002f40)=""/244, 0x17}, 0x0) close(r3) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), 0x0, 0x6c, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x9, 0x4, &(0x7f00000001c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext={0x9ae0067}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000004, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) close(0xffffffffffffffff) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0xd, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00'}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x4, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r4) syz_clone(0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1f, 0x4, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xfffffffb}, [@ldst={0x3, 0x1, 0x0, 0x7, 0x9, 0x4, 0xfffffffffffffff0}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8a4, 0x8000}, 0x10000, 0xc8, 0x200, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socket$kcm(0xa, 0x2, 0x3a) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 3.418064271s ago: executing program 4 (id=3538): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x800, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) syz_clone(0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x6050100, 0x0, 0x0, 0x0, 0x0, 0x0) 3.320352726s ago: executing program 1 (id=3539): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000280)="89000000120081ae08060cdc030000007f1be3f74001000000e2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00122800014008080c000a0000009bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x80, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x40}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x7}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r3, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f00000003c0)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x2c, 0x0, 0x0, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x1f, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x7fff, 0x3, 0x0, 0x800, r5, 0x7fffffff, '\x00', r6, 0xffffffffffffffff, 0x1, 0x1, 0x3, 0x9}, 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x21, 0x3ff, 0xffffffff, 0x3, 0x2220, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x50) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x7f, 0x0, 0xffffffffffffffff, 0xf, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0xd, 0x4, 0x4, 0x4, 0x0, r9}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x15, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@call={0x85, 0x0, 0x0, 0xbc}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x26}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x59}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41100, 0x64, '\x00', r6, 0x0, r1, 0x8, &(0x7f00000001c0)={0xa, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000380)=[r7, r8, r9], &(0x7f00000003c0)=[{0x0, 0x2, 0xf, 0x6}, {0x0, 0x4, 0x10, 0x9}], 0x10, 0x5c3d}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f00000004c0)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4}, 0x94) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, 0x0, &(0x7f0000000240)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='(pu\t&0&&\t') 3.219935961s ago: executing program 3 (id=3540): sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f903", 0x11}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd4242"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x48) 3.071243098s ago: executing program 2 (id=3541): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b18, &(0x7f0000000000)={'wlan1\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f903", 0x11}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd4242"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffac}, 0x48) 2.24269686s ago: executing program 1 (id=3542): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x1, 0x9, 0x6, 0x6, 0x0, 0x9, 0x842, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}, 0x4258, 0xae78, 0xfffffff7, 0x7, 0x5, 0x80, 0x300, 0x0, 0xef3, 0x0, 0x9}, 0xffffffffffffffff, 0x9, r0, 0x2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7f, 0x5, 0x39, 0xa, 0x0, 0x81, 0x10408, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000300), 0x2}, 0x420, 0xe6a6, 0x2, 0x2, 0x7, 0x5, 0x0, 0x0, 0x9, 0x0, 0x8}, r1, 0xc, r2, 0x1) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x23}, 0x94) r3 = socket$kcm(0x2, 0x1, 0x84) sendmsg$kcm(r3, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[{0x30, 0x84, 0x1, "45aa2d35ae9705d6cb50e70e429e7713ef24bf05b97621efc92a"}], 0x30}, 0x8040) socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f2, &(0x7f0000000080)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x21124, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46a, 0x4, @perf_bp={0x0}, 0x81, 0x3, 0x0, 0x0, 0x1, 0x1fd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_retopts={{0xb0, 0x0, 0x7, {[@noop, @timestamp={0x44, 0x18, 0x5c, 0x0, 0x6, [0xa, 0xfffffffd, 0x3, 0x5, 0x7]}, @ra={0x94, 0x4}, @noop, @timestamp_prespec={0x44, 0x3c, 0x96, 0x3, 0x2, [{@local, 0xc}, {@empty, 0x6}, {@multicast2}, {@loopback, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x88}, {@multicast1, 0x9}, {@empty, 0xfa}]}, @lsrr={0x83, 0x1f, 0xad, [@private=0xa010101, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x33}, @empty, @loopback]}, @ssrr={0x89, 0xb, 0x9f, [@local, @empty]}, @rr={0x7, 0xb, 0x2f, [@multicast1, @dev={0xac, 0x14, 0x14, 0x16}]}, @rr={0x7, 0xf, 0x6, [@remote, @multicast2, @broadcast]}, @end]}}}], 0xe0}, 0x5c7ed6a7891c1b62) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='/proc///\x00\x82q\xee\x00!\xbd\xc2\x98#YP\xee\x9c2G\xf0\x81x\x97'}, 0x30) socketpair(0x23, 0x800, 0x94, &(0x7f00000001c0)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r7, 0x84, 0x64, &(0x7f0000000000)=r10, 0x10) openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) 1.999493331s ago: executing program 4 (id=3543): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000007d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x1, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xc, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x84140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x10c002, 0xac5d, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = socket$kcm(0x2, 0x3, 0x84) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000700)={&(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="280000000000000000000000070000000717a87f000001ac141400e0000001ac1e0001ac1414bb011c000000000000000000000008000000", @ANYRES64=r1], 0x48}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x541b, 0x0) r2 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r2, &(0x7f00000010c0)={&(0x7f0000000140)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000480)='\\', 0x1}], 0x1}, 0x4000040) sendmsg$inet(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000180)="84", 0x33c00}], 0x1}, 0x8040) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0xffffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0xc, 0x42, 0x40, 0x42}, 0x50) r5 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b7020000000d6000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000006f6400000000000045040400010000001704000001000a00b7040000ff0100006a0a00fe0000000085000000be000000b70000000000000095000000000000009e17f199a68b06d83298a8cdc21ce784909b849d5550ad857d0454d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4eeceb9971e43405d621ffbc9ce000000d8ca56b50d0c010d631f6dde53a9a53608c10556e5734eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6fbaa187b81d1106000000000fd60000fd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7e43c5cbd80450f859ce8122a79c3e40000b59b0fc46d6cec3c0802882add4e3179bd4a44f231b6d753a7be428ba953df4aece69311687f4122073a236c3a32efa04137d4524847d2638da3261c8162bb7c7824be6195a66d2e17e122040e1100000000928612a29fc691e4f1f7bd053abb885f39381f1759410b1059f05684261f332d606834669b49ec99320ca7712d7e79bd5bf5ed818ecc7640917f6a559a47db608fcf9f6c131b84e41c354c66838f72b9e12d36e996f316f0812ca83efb30c7f6c6d57c4a64590401eec22523dd712c680013e87f649a1ede7142ca9d5d8a8c9f9b440fe4331ad5532c74d9a31a5d737537f7a2caa30581253d14dd3e92af7dc836686365ae01bdec561c0402b67801267a8df97d2f85426a5963d4fa3e26cc05972c162f223f000000d999e80de00fcbcc02d0aed7bb8f7ba337d59c14f39dcd4aad4139ef6425a9367f1bd1467fc6b95a4df7669839771ce9d5788029901e5a79d8b9990ace8f74087f25ad50c46088000000008000"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r6, 0x2000012, 0x100e, 0x2, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="d8000000180081064e81f782db4cb904021d0800fd007c05e8fe55a10a000400110000000a600e41b0000900ac00060411000000160012000a0003150248035c3b61c1d67f6f94207134cf6efb8000a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f900000000e32cfa8af26c8b7b55f4d2a6823a45f2", 0xd8}], 0x1}, 0x0) 1.511199445s ago: executing program 3 (id=3544): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) socket$kcm(0x10, 0x5, 0x4) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0xec, 0x0, 0x5, 0x1, 0x0, 0x1, 0x659e, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x1, @perf_config_ext={0xfffffffffffffffe, 0x800}, 0x11efa, 0x4, 0x98, 0x6, 0x2, 0xfffff271, 0xfff8, 0x0, 0x0, 0x0, 0x1d}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x4001, @empty}, 0x10, 0x0}, 0x300060c1) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x12, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x5, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4000}, 0x18) socket$kcm(0x10, 0x400000002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="140000002a000b0f5ddf00"/20, 0x14}, {&(0x7f0000000100)="160628706c8ac8302adc1df89021fe5793bdee46574ac0dc73f3bc9768ddf6ad5b956b592a75", 0x26}, {&(0x7f0000000280)="361821115e14f86a63bdc82263fd025352b745c5ccb9b02f4d23c84f4d0533b4a85028bf5f6a28b9c85deb209dabc7fc9b614415c1a4116328902eb5066272b1644dc7dbc6dcbf59f83ab6e1b197a0f974047367c76aaa4de011f7bd56531a4701cef33e77e9dbeacff1e259793baae10c0f33f9295f22e893f8df29aeb213854669f2d449397b3c0e79e421ee2b8f870af0922ec6f3630c23017e5691652712383300c6c3ee12b61148510eab6a18fb8263f52bb535f1a6e5d695672b2611f099b9452ffcc5a5b97b327cb53e7e3346a13df96a4d928ab5a280d71979d143dfa32bf4ec66cc28", 0xe7}], 0x3}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0xef, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188e6b62aa73772cc9f1ba1f848480000005e140602000000000e000a0010000000028000031294", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000001340)=@hci={0x1f, 0x0, 0x2}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000006c0)="62042700180f01000001ad2f1eafbcf706e12b30087f5c582d26116642c47a5f8786ee601e65ab3c06d4b8bf4a81cb3e247345af215542f41ddf82f618438a34f90186cee8441e2305e495d04ad68ab8fef69df82de6456fbb48b63f60c9c9097be968ea872c4801e5d0711b4373c7224ed7a9cbd49d40f82bdb6afc0036824be26fc96e49a70e90797e6caa1b38ddacb3cb2b3eac7c068a185b644582f25edfa3d6a46e2a894ca809a422a6a29bd7145bb6e7992570484d6a710292ea0c3f97b7cbff701684b13c5593262534a7af9eab48f2ca2d74d9a4de33", 0xda}, {&(0x7f0000000840)="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", 0x10b}, {&(0x7f0000000480)="8eefedd1a9f7b60541fce923f584d6024263fb5df6219db166dd03702720153500359a0f63da5eb51e0e3b2396bd0dad6e336fedaed6d76cb3757e0b3abd7e5e71f570dd8e1d07f5dc66924e40a252203517fb66257809d53fb6e11103369c65ad619beb1be4a15fb213f41503abc543aee819016b73cc911c12ffd82b84b83618f78f309d088b33dab7dc40d2b06479efabad4695d3a100c48c3193c273b3e8cc0464cb59986bed8dd8575424435b36dd96e44889ce908f6a7c13de66ceeddf2192974f37b00b7b7f8b2f8ab295", 0xce}, {&(0x7f0000000580)="0eeb7647ee1336b753440a5a8272c74cf8608336c81e0c2157150ce34235cb7d212342705d96fcc035e313b3ca35bcfdcce2332073b4bdf4a417a9a5fcd0e7d598b2a16cc214224e4e8761d635fd331abc1aaedfbdde64adfb6342d9b5449051d6b39517b0970cffc64148089ee99ecdc75ab1d05c7dd7d77fdd135f01fdae76310c4f3cd3a724b1e907ba685c4f5a60a43e7cd1b32e00017de4c7aaccaf80e11b1ff4da1f8fcb8a377c9986c0b67be9e85d0f7fc8a8998198ef488d5ae7351db452ea673632ca7a410b186463f687b278329fdbd82e6f271f50fec34bf4dcd478970e868c7ab79e1e2181ea8ac5e0", 0xef}, {&(0x7f00000013c0)="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", 0xbc8}], 0x5}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f90324fc60", 0x14}], 0x1}, 0x40810) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050a"], 0x0, 0x2}, 0x94) recvmsg(r5, &(0x7f0000004300)={0x0, 0x0, 0x0}, 0x0) r6 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r6, 0x0, 0x22, 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000000380)={0x0, 0x61, &(0x7f00000027c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1}, 0x10100) 1.461275108s ago: executing program 2 (id=3545): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_LOOKUP_ELEM(0x2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001100)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={&(0x7f0000000400)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0, 0x0, &(0x7f00000005c0)=""/23, 0x17}, 0x153) bpf$OBJ_GET_PROG(0x7, 0x0, 0xffb5) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/net\x00') r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYRES16, @ANYRES64], 0x0, 0x26}, 0x28) socket$kcm(0x10, 0x3, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={&(0x7f0000000540), &(0x7f0000000600)=""/207, 0x0, 0x0, 0x780, 0x1}, 0x38) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x35ef}, 0x400, 0x0, 0x0, 0x8, 0x2, 0xfffffffc, 0x0, 0x0, 0x2}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) close(r5) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071102300000000009569ba8548000007"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) 963.528192ms ago: executing program 1 (id=3546): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) r1 = socket$kcm(0x21, 0x2, 0xa) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{0x18, 0x110, 0x1, '\x00'}, {0x10, 0x110, 0xe}, {0x10, 0x6, 0x2}], 0x38}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) close(r2) ioctl$SIOCSIFHWADDR(r2, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100008d8dff"}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000000c0)={0x0, 0x0}, 0x8) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f3, &(0x7f0000000080)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xb, 0xc, &(0x7f0000000340)=ANY=[@ANYRESOCT=r1, @ANYRESOCT=0x0, @ANYRESDEC=r4, @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000400000006"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x10000, 0x0, r7, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4000000, 0x3}, 0x48) 864.614977ms ago: executing program 4 (id=3547): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x15, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000010000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000860000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000001b00850000008200000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b80)={r4, 0x2000012, 0xe, 0x0, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xb}, 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_clone(0x45004400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="89000000120081ae08060cdc030000007f1be3f74001000000e2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e281ad6e747033a0093b837dc6cc01e32efaec80000ec00120c00014006040400090404009bbc7a46e3988285dcdf12f213e6f768fe", 0x69}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x21b, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000720000001801"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="33fe0000180091c8b14a0778a8123d181d"], 0xfe33) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 755.038722ms ago: executing program 2 (id=3548): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00'}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r0, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x1, &(0x7f0000000080)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}], &(0x7f00000000c0)='GPL\x00', 0x8000, 0x0, 0x0, 0x41000, 0xb, '\x00', r1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1c, '\x00', r1, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x2, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {}, {}, {0x7, 0x0, 0xb, 0x7}}, @printk]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f00000005c0), 0x12) openat$cgroup_ro(r5, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) r7 = openat$cgroup_freezer_state(r3, &(0x7f0000000080), 0x2, 0x0) write$cgroup_freezer_state(r7, &(0x7f00000000c0)='THAWED\x00', 0x7) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="000000658ce81f79e8cda6670000020000b703000000000000850000000c000000b7000000000000009500000000000000e36a8c0c01dc1182e783856fcbc645e6bb3ac0f59832ec68f3fed88329da4e5870e53bf9b71a96321c6dc9ab21e6705d1af34c3124e6698ed6d0"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8b20, &(0x7f0000000080)={'wlan1\x00', @random='\x00\x00]\x00N\v'}) 0s ago: executing program 3 (id=3549): socket$kcm(0xa, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0xd}, 0x10c006, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xd, 0x17, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000007000000000000000000000018110000ec727dae7071", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf09000000000000650901000000000066000000060000001801000020756c2500000000002020207b9af8ff000000005d9100000000000037010000f8ffffffb702000008000000b70300000000ffff56000000060000002c93000000000000b5030000000000008500000076000000b7000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = getpid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="5f1a20b5bda8", 0x6}], 0x1, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xee01}}}], 0x20, 0x20008000}, 0x20008800) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, r0, 0x0, 0x2, &(0x7f0000000240)='@\x00'}, 0x30) kernel console output (not intermixed with test programs): 'syz.4.2213': attribute type 3 has an invalid length. [ 440.543069][T10358] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2213'. [ 440.930922][T10361] netlink: 'syz.3.2214': attribute type 4 has an invalid length. [ 441.042355][T10368] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2215'. [ 441.120908][T10368] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2215'. [ 441.167235][T10372] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2215'. [ 441.271260][T10368] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2215'. [ 441.593189][T10379] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 441.600102][T10379] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 442.219955][T10391] Dead loop on virtual device ip6_vti0, fix it urgently! [ 442.669873][T10394] netlink: 'syz.2.2224': attribute type 4 has an invalid length. [ 443.144408][T10408] netlink: 'syz.5.2229': attribute type 39 has an invalid length. [ 444.699224][T10408] device hsr_slave_1 left promiscuous mode [ 444.986660][T10417] FAULT_INJECTION: forcing a failure. [ 444.986660][T10417] name failslab, interval 1, probability 0, space 0, times 0 [ 445.046980][T10417] CPU: 1 PID: 10417 Comm: syz.3.2233 Not tainted syzkaller #0 [ 445.054721][T10417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 445.065184][T10417] Call Trace: [ 445.068643][T10417] [ 445.071816][T10417] dump_stack_lvl+0x188/0x24e [ 445.076831][T10417] ? sctp_sendmsg+0x15b0/0x2940 [ 445.082526][T10417] ? ___sys_sendmsg+0x2a2/0x360 [ 445.087515][T10417] ? show_regs_print_info+0x12/0x12 [ 445.092756][T10417] ? load_image+0x400/0x400 [ 445.097331][T10417] should_fail_ex+0x399/0x4d0 [ 445.102168][T10417] should_failslab+0x5/0x20 [ 445.106728][T10417] slab_pre_alloc_hook+0x59/0x310 [ 445.112167][T10417] ? sctp_add_bind_addr+0x89/0x350 [ 445.117511][T10417] __kmem_cache_alloc_node+0x4f/0x260 [ 445.123033][T10417] ? sctp_add_bind_addr+0x89/0x350 [ 445.128408][T10417] kmalloc_trace+0x26/0xe0 [ 445.132894][T10417] sctp_add_bind_addr+0x89/0x350 [ 445.138021][T10417] sctp_copy_local_addr_list+0x311/0x4e0 [ 445.143887][T10417] ? sctp_copy_local_addr_list+0xa1/0x4e0 [ 445.149754][T10417] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 445.155868][T10417] ? sctp_v4_is_any+0x31/0x50 [ 445.161023][T10417] ? sctp_copy_one_addr+0x93/0x660 [ 445.166271][T10417] sctp_bind_addr_copy+0xaf/0x3c0 [ 445.171682][T10417] ? sctp_assoc_set_bind_addr_from_ep+0xa1/0x190 [ 445.178564][T10417] sctp_connect_new_asoc+0x2f5/0x6a0 [ 445.184090][T10417] ? __sctp_connect+0xd80/0xd80 [ 445.188981][T10417] ? __local_bh_enable_ip+0x136/0x1c0 [ 445.194932][T10417] ? _local_bh_enable+0xa0/0xa0 [ 445.200266][T10417] ? sctp_endpoint_lookup_assoc+0x77/0x260 [ 445.206313][T10417] ? sctp_endpoint_lookup_assoc+0x77/0x260 [ 445.212259][T10417] ? bpf_lsm_sctp_bind_connect+0x5/0x10 [ 445.217924][T10417] ? security_sctp_bind_connect+0x85/0xb0 [ 445.223854][T10417] sctp_sendmsg+0x15b0/0x2940 [ 445.228605][T10417] ? aa_sk_perm+0x781/0x950 [ 445.233234][T10417] ? sctp_getsockopt+0x8a0/0x8a0 [ 445.238292][T10417] ? __might_fault+0xa6/0x120 [ 445.243095][T10417] ? aa_af_perm+0x340/0x340 [ 445.247820][T10417] ? tomoyo_socket_sendmsg_permission+0x1dd/0x2f0 [ 445.254453][T10417] ? inet_sendmsg+0x78/0x2f0 [ 445.259254][T10417] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 445.264929][T10417] ? security_socket_sendmsg+0x7c/0xa0 [ 445.270694][T10417] ? inet_send_prepare+0x260/0x260 [ 445.276260][T10417] ____sys_sendmsg+0x5be/0x970 [ 445.281161][T10417] ? __sys_sendmsg_sock+0x30/0x30 [ 445.286219][T10417] ? __import_iovec+0x315/0x500 [ 445.291223][T10417] ? import_iovec+0x6f/0xa0 [ 445.295853][T10417] ___sys_sendmsg+0x2a2/0x360 [ 445.300860][T10417] ? __sys_sendmsg+0x290/0x290 [ 445.305963][T10417] ? __lock_acquire+0x7d10/0x7d10 [ 445.311434][T10417] __se_sys_sendmsg+0x1bb/0x2a0 [ 445.316515][T10417] ? __x64_sys_sendmsg+0x80/0x80 [ 445.321512][T10417] ? lockdep_hardirqs_on+0x94/0x140 [ 445.326938][T10417] do_syscall_64+0x4c/0xa0 [ 445.331493][T10417] ? clear_bhb_loop+0x60/0xb0 [ 445.336291][T10417] ? clear_bhb_loop+0x60/0xb0 [ 445.341217][T10417] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 445.347249][T10417] RIP: 0033:0x7f028619c799 [ 445.351890][T10417] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 445.371892][T10417] RSP: 002b:00007f02870ba028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 445.380357][T10417] RAX: ffffffffffffffda RBX: 00007f0286415fa0 RCX: 00007f028619c799 [ 445.388366][T10417] RDX: 00000000000080d1 RSI: 0000200000000140 RDI: 0000000000000003 [ 445.396765][T10417] RBP: 00007f02870ba090 R08: 0000000000000000 R09: 0000000000000000 [ 445.404860][T10417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 445.413131][T10417] R13: 00007f0286416038 R14: 00007f0286415fa0 R15: 00007ffc95846ef8 [ 445.421245][T10417] [ 445.440970][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 445.447605][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 445.503493][T10421] netlink: 92148 bytes leftover after parsing attributes in process `syz.4.2234'. [ 446.056645][T10423] netlink: 'syz.1.2232': attribute type 4 has an invalid length. [ 446.501936][T10434] netlink: 'syz.5.2238': attribute type 27 has an invalid length. [ 446.595890][T10434] netlink: 2418 bytes leftover after parsing attributes in process `syz.5.2238'. [ 448.588584][T10470] netlink: 'syz.4.2250': attribute type 3 has an invalid length. [ 448.645112][T10473] netlink: 'syz.4.2250': attribute type 3 has an invalid length. [ 448.696019][T10470] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.2250'. [ 448.756045][T10473] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.2250'. [ 449.758596][T10484] Dead loop on virtual device ip6_vti0, fix it urgently! [ 450.795405][T10511] netlink: 'syz.4.2261': attribute type 22 has an invalid length. [ 450.838865][T10511] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2261'. [ 452.929025][T10542] netlink: 161700 bytes leftover after parsing attributes in process `syz.3.2272'. [ 453.195643][T10542] openvswitch: netlink: Key 2 has unexpected len 41210 expected 4 [ 454.135943][T10548] netlink: 'syz.5.2275': attribute type 4 has an invalid length. [ 454.953396][T10583] netlink: 126632 bytes leftover after parsing attributes in process `syz.1.2286'. [ 456.897133][T10616] netlink: 'syz.2.2300': attribute type 1 has an invalid length. [ 457.476266][T10625] tipc: Started in network mode [ 457.489024][T10625] tipc: Node identity 9215a268, cluster identity 4711 [ 457.515364][T10625] tipc: Node number set to 2450891368 [ 458.609365][T10630] device syzkaller0 entered promiscuous mode [ 459.080508][T10640] netlink: 'syz.3.2305': attribute type 10 has an invalid length. [ 459.119004][T10640] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2305'. [ 459.171635][T10640] device team0 entered promiscuous mode [ 459.218186][T10640] device team_slave_0 entered promiscuous mode [ 459.257031][T10640] device team_slave_1 entered promiscuous mode [ 459.281396][T10640] bridge0: port 3(team0) entered blocking state [ 459.356778][T10640] bridge0: port 3(team0) entered disabled state [ 460.310405][T10667] sctp: [Deprecated]: syz.2.2315 (pid 10667) Use of struct sctp_assoc_value in delayed_ack socket option. [ 460.310405][T10667] Use struct sctp_sack_info instead [ 461.379717][T10674] cgroup: fork rejected by pids controller in /syz2 [ 464.763461][T10684] device syzkaller0 entered promiscuous mode [ 465.335736][ T4283] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 465.345814][ T4283] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 465.357982][ T4283] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 465.375005][ T4283] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 465.384826][ T4283] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 465.396229][ T4283] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 467.510306][ T4280] Bluetooth: hci1: command 0x0409 tx timeout [ 468.376791][T10705] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 468.391834][T10705] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 468.408492][T10705] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 468.416727][T10705] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 468.535418][T10709] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 468.555800][T10709] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 468.585625][T10709] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 469.001051][T10698] chnl_net:caif_netlink_parms(): no params data found [ 469.398853][T10698] bridge0: port 1(bridge_slave_0) entered blocking state [ 469.411406][T10698] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.424528][T10698] device bridge_slave_0 entered promiscuous mode [ 469.444184][T10698] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.452638][ T4280] Bluetooth: hci0: ISO packet for unknown connection handle 1 [ 469.470048][T10698] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.482919][T10698] device bridge_slave_1 entered promiscuous mode [ 469.576902][T10698] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 469.586207][ T4280] Bluetooth: hci1: command 0x041b tx timeout [ 469.605420][T10698] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 469.738759][T10698] team0: Port device team_slave_0 added [ 469.760529][T10698] team0: Port device team_slave_1 added [ 469.829799][T10698] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 469.846606][T10698] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 469.918817][T10698] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 469.984940][T10698] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 470.011525][T10698] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 470.059316][T10698] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 470.193407][T10698] device hsr_slave_0 entered promiscuous mode [ 470.210711][T10698] device hsr_slave_1 entered promiscuous mode [ 470.220310][T10698] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 470.235605][T10698] Cannot create hsr debugfs directory [ 470.279041][T10762] netlink: 763 bytes leftover after parsing attributes in process `syz.3.2347'. [ 470.862375][T10698] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 471.407857][T10788] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2355'. [ 471.670223][ T4280] Bluetooth: hci1: command 0x040f tx timeout [ 472.078240][T10698] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 472.263338][T10698] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 472.423191][T10796] netlink: 60 bytes leftover after parsing attributes in process `syz.5.2357'. [ 472.656047][T10698] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 472.699495][T10796] netlink: 60 bytes leftover after parsing attributes in process `syz.5.2357'. [ 472.758685][T10802] netlink: 60 bytes leftover after parsing attributes in process `syz.5.2357'. [ 472.792341][T10806] netlink: 60 bytes leftover after parsing attributes in process `syz.5.2357'. [ 473.191304][T10698] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 473.243666][T10698] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 473.306042][T10698] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 473.322028][T10698] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 473.596783][T10698] 8021q: adding VLAN 0 to HW filter on device bond0 [ 473.644380][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 473.662153][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 473.691083][T10698] 8021q: adding VLAN 0 to HW filter on device team0 [ 473.710567][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 473.732373][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 473.746273][ T4280] Bluetooth: hci1: command 0x0419 tx timeout [ 473.753746][ T8150] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.761530][ T8150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 473.828434][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 473.867612][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 473.904726][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 473.959774][ T8150] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.967257][ T8150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 474.042816][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 474.083874][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 474.128635][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 474.158165][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 474.218187][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 474.231494][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 474.280382][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 474.318829][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 474.336751][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 474.354894][T10698] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 474.373136][T10698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 474.505937][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 474.538049][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 475.998243][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 476.019706][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 476.056601][T10698] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 476.143191][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 476.158397][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 476.224653][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 476.252803][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 476.292493][T10698] device veth0_vlan entered promiscuous mode [ 476.309666][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 476.326576][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 476.359788][T10698] device veth1_vlan entered promiscuous mode [ 476.473919][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 476.498540][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 476.538383][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 476.583637][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 476.612675][T10698] device veth0_macvtap entered promiscuous mode [ 476.641519][T10698] device veth1_macvtap entered promiscuous mode [ 476.671596][T10698] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 476.683811][T10698] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 476.700758][T10698] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 476.732911][T10698] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 476.776971][T10698] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 476.785073][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 476.815684][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 476.856236][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 476.896572][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 476.932661][T10698] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 476.985919][T10698] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.012005][T10698] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 477.045647][T10698] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.079386][T10698] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 477.100886][T10698] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.127082][T10698] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 477.168259][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 477.192601][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 477.219835][T10698] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 477.243526][T10698] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 477.273363][T10698] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 477.303824][T10698] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 477.375673][T10871] netlink: 'syz.1.2381': attribute type 17 has an invalid length. [ 477.384398][T10871] netlink: 'syz.1.2381': attribute type 41 has an invalid length. [ 477.401402][T10871] netlink: 152 bytes leftover after parsing attributes in process `syz.1.2381'. [ 477.535446][ T8146] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 477.557727][ T8146] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 477.601419][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 477.629724][ T8150] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 477.641456][ T8150] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 477.673413][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 478.103973][T10887] netlink: 'syz.2.2320': attribute type 4 has an invalid length. [ 479.320229][T10911] nr0: port 1(hsr0) entered blocking state [ 479.336779][T10911] nr0: port 1(hsr0) entered disabled state [ 479.377536][T10911] device hsr0 entered promiscuous mode [ 479.824556][T10929] netlink: 'syz.3.2398': attribute type 17 has an invalid length. [ 479.856166][T10929] netlink: 'syz.3.2398': attribute type 41 has an invalid length. [ 479.925885][T10929] netlink: 152 bytes leftover after parsing attributes in process `syz.3.2398'. [ 480.331421][T10943] netlink: 'syz.4.2402': attribute type 4 has an invalid length. [ 481.187011][T10957] netlink: 'syz.5.2417': attribute type 4 has an invalid length. [ 481.386387][T10958] delete_channel: no stack [ 484.313489][T11017] netlink: 8 bytes leftover after parsing attributes in process `syz.5.2430'. [ 484.499020][T11020] netlink: 'syz.5.2430': attribute type 2 has an invalid length. [ 484.547472][T11020] netlink: 10 bytes leftover after parsing attributes in process `syz.5.2430'. [ 485.270307][T11024] netlink: 'syz.4.2433': attribute type 21 has an invalid length. [ 485.299812][T11024] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2433'. [ 485.731896][T11032] netlink: 'syz.2.2426': attribute type 2 has an invalid length. [ 485.822626][T11032] netlink: 'syz.2.2426': attribute type 8 has an invalid length. [ 485.904924][T11032] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2426'. [ 486.254723][T11042] netlink: 'syz.3.2438': attribute type 2 has an invalid length. [ 486.272619][T11042] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.2438'. [ 487.347666][T11056] netlink: 'syz.1.2442': attribute type 4 has an invalid length. [ 489.084723][T11094] netlink: 'syz.1.2456': attribute type 2 has an invalid length. [ 489.190867][T11094] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.2456'. [ 489.296907][T11104] netlink: 'syz.2.2458': attribute type 3 has an invalid length. [ 489.337419][T11104] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2458'. [ 490.718796][T11119] delete_channel: no stack [ 491.998249][T11153] netlink: 'syz.2.2476': attribute type 2 has an invalid length. [ 492.031364][T11153] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.2476'. [ 493.078449][T11185] netlink: 'syz.2.2489': attribute type 1 has an invalid length. [ 493.153793][T11185] netlink: 83992 bytes leftover after parsing attributes in process `syz.2.2489'. [ 493.418334][T11194] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.2491'. [ 494.617553][T11223] netlink: 166356 bytes leftover after parsing attributes in process `syz.4.2504'. [ 496.291220][T11263] netlink: 'syz.2.2517': attribute type 25 has an invalid length. [ 496.313153][T11263] netlink: 'syz.2.2517': attribute type 29 has an invalid length. [ 496.330717][T11265] netlink: 'syz.2.2517': attribute type 25 has an invalid length. [ 496.375264][T11265] netlink: 'syz.2.2517': attribute type 29 has an invalid length. [ 496.472595][T11268] netlink: 'syz.1.2519': attribute type 4 has an invalid length. [ 496.721910][T11276] netlink: 'syz.4.2522': attribute type 3 has an invalid length. [ 496.787814][T11276] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.2522'. [ 496.984774][T11270] netlink: 166356 bytes leftover after parsing attributes in process `syz.3.2520'. [ 499.808569][T11324] netlink: 166356 bytes leftover after parsing attributes in process `syz.2.2536'. [ 502.373576][T11373] device macvlan1 entered promiscuous mode [ 502.581327][T11383] netlink: 65039 bytes leftover after parsing attributes in process `syz.4.2555'. [ 503.174547][T11403] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 503.290291][T11403] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 504.182420][T11416] device pim6reg1 entered promiscuous mode [ 504.674516][T11423] netlink: 'syz.1.2564': attribute type 39 has an invalid length. [ 505.443313][T11437] netlink: 'syz.5.2569': attribute type 2 has an invalid length. [ 505.463544][T11437] netlink: 164 bytes leftover after parsing attributes in process `syz.5.2569'. [ 505.504955][T11440] netlink: 'syz.2.2571': attribute type 1 has an invalid length. [ 505.525643][T11440] netlink: 105120 bytes leftover after parsing attributes in process `syz.2.2571'. [ 506.011395][T11459] netlink: 'syz.2.2575': attribute type 27 has an invalid length. [ 506.801713][T11459] bond0: (slave bond_slave_0): Releasing backup interface [ 506.876062][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 506.882587][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 508.187677][T11504] netlink: 11954 bytes leftover after parsing attributes in process `syz.4.2589'. [ 508.243923][ T8105] GPL: port 1(erspan0) entered disabled state [ 508.369269][ T8105] device erspan0 left promiscuous mode [ 508.375566][ T8105] GPL: port 1(erspan0) entered disabled state [ 508.470521][T11516] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2593'. [ 508.720683][T11516] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2593'. [ 508.751336][T11524] netlink: 'syz.1.2595': attribute type 5 has an invalid length. [ 508.902035][T11529] netlink: 'syz.2.2597': attribute type 39 has an invalid length. [ 509.260423][T11529] device hsr_slave_1 left promiscuous mode [ 509.984238][T11542] netlink: 'syz.5.2600': attribute type 1 has an invalid length. [ 510.001447][T11542] netlink: 105120 bytes leftover after parsing attributes in process `syz.5.2600'. [ 512.147475][T11590] netlink: 'syz.4.2611': attribute type 4 has an invalid length. [ 512.169832][T11589] netlink: 'syz.1.2612': attribute type 4 has an invalid length. [ 512.516720][ T8105] device hsr_slave_0 left promiscuous mode [ 512.537898][ T8105] device hsr_slave_1 left promiscuous mode [ 512.569420][ T8105] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 512.582535][ T8105] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 512.606971][ T8105] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 512.643401][ T8105] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 512.719922][ T8105] device dummy0 left promiscuous mode [ 512.728520][ T8105] bridge0: port 3(dummy0) entered disabled state [ 512.757262][ T8105] device bridge_slave_1 left promiscuous mode [ 512.782573][ T8105] bridge0: port 2(bridge_slave_1) entered disabled state [ 512.812195][ T8105] device bridge_slave_0 left promiscuous mode [ 512.833899][ T8105] bridge0: port 1(bridge_slave_0) entered disabled state [ 512.970150][ T8105] device veth1_macvtap left promiscuous mode [ 512.989605][ T8105] device veth0_macvtap left promiscuous mode [ 513.004438][ T8105] device veth1_vlan left promiscuous mode [ 513.018042][ T8105] device veth0_vlan left promiscuous mode [ 514.751008][ T8105] team0 (unregistering): Port device team_slave_1 removed [ 514.816161][ T8105] team0 (unregistering): Port device team_slave_0 removed [ 514.871149][ T8105] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 514.923982][ T8105] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 515.302317][ T8105] bond0 (unregistering): Released all slaves [ 515.400483][T11621] netlink: 'syz.4.2621': attribute type 12 has an invalid length. [ 515.436034][T11621] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2621'. [ 515.461904][T11622] netlink: 'syz.1.2623': attribute type 4 has an invalid length. [ 515.527842][T11637] netlink: 'syz.3.2627': attribute type 4 has an invalid length. [ 517.291079][T11680] netlink: 'syz.3.2640': attribute type 4 has an invalid length. [ 517.486159][T11689] netlink: 'syz.2.2642': attribute type 4 has an invalid length. [ 518.474915][T11705] netlink: 'syz.3.2650': attribute type 30 has an invalid length. [ 519.424231][T11728] netlink: 156 bytes leftover after parsing attributes in process `syz.2.2657'. [ 519.778739][T11737] netlink: 196 bytes leftover after parsing attributes in process `syz.3.2661'. [ 519.833524][T11736] netlink: 'syz.1.2660': attribute type 4 has an invalid length. [ 519.952214][T11748] netlink: 'syz.5.2659': attribute type 4 has an invalid length. [ 521.743317][T11780] batadv_slave_1: mtu less than device minimum [ 522.149526][T11790] netlink: 'syz.1.2675': attribute type 4 has an invalid length. [ 522.504322][T11801] netlink: 'syz.4.2679': attribute type 21 has an invalid length. [ 522.570196][T11801] netlink: 'syz.4.2679': attribute type 10 has an invalid length. [ 522.633997][T11801] netlink: 13070 bytes leftover after parsing attributes in process `syz.4.2679'. [ 523.039073][T11813] netlink: 180900 bytes leftover after parsing attributes in process `syz.4.2683'. [ 523.050165][T11813] openvswitch: netlink: Flow actions attr not present in new flow. [ 523.112389][T11814] netlink: 'syz.1.2682': attribute type 10 has an invalid length. [ 523.466599][T11814] team0: Port device wlan1 added [ 525.104420][T11844] netlink: 'syz.5.2692': attribute type 4 has an invalid length. [ 525.894470][T11872] netlink: 'syz.5.2701': attribute type 10 has an invalid length. [ 526.130759][T11878] FAULT_INJECTION: forcing a failure. [ 526.130759][T11878] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 526.198677][T11878] CPU: 0 PID: 11878 Comm: syz.4.2702 Not tainted syzkaller #0 [ 526.206647][T11878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 526.217986][T11878] Call Trace: [ 526.221957][T11878] [ 526.225298][T11878] dump_stack_lvl+0x188/0x24e [ 526.230398][T11878] ? show_regs_print_info+0x12/0x12 [ 526.236297][T11878] ? load_image+0x400/0x400 [ 526.241050][T11878] ? __lock_acquire+0x7d10/0x7d10 [ 526.247300][T11878] should_fail_ex+0x399/0x4d0 [ 526.253379][T11878] _copy_from_user+0x2c/0x170 [ 526.258410][T11878] ___sys_sendmsg+0x1c3/0x360 [ 526.263425][T11878] ? __sys_sendmsg+0x290/0x290 [ 526.268548][T11878] ? __lock_acquire+0x7d10/0x7d10 [ 526.274043][T11878] __se_sys_sendmsg+0x1bb/0x2a0 [ 526.279230][T11878] ? __x64_sys_sendmsg+0x80/0x80 [ 526.284801][T11878] ? lockdep_hardirqs_on+0x94/0x140 [ 526.291126][T11878] do_syscall_64+0x4c/0xa0 [ 526.296047][T11878] ? clear_bhb_loop+0x60/0xb0 [ 526.301147][T11878] ? clear_bhb_loop+0x60/0xb0 [ 526.306013][T11878] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 526.312344][T11878] RIP: 0033:0x7ff5e499c799 [ 526.317444][T11878] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 526.337905][T11878] RSP: 002b:00007ff5e584c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 526.346632][T11878] RAX: ffffffffffffffda RBX: 00007ff5e4c15fa0 RCX: 00007ff5e499c799 [ 526.355626][T11878] RDX: 0000000000000000 RSI: 0000200000001180 RDI: 0000000000000005 [ 526.364278][T11878] RBP: 00007ff5e584c090 R08: 0000000000000000 R09: 0000000000000000 [ 526.372798][T11878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 526.381729][T11878] R13: 00007ff5e4c16038 R14: 00007ff5e4c15fa0 R15: 00007fffcf5c04d8 [ 526.389935][T11878] [ 526.470124][T11880] FAULT_INJECTION: forcing a failure. [ 526.470124][T11880] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 526.549623][T11880] CPU: 0 PID: 11880 Comm: syz.1.2705 Not tainted syzkaller #0 [ 526.557631][T11880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 526.568248][T11880] Call Trace: [ 526.571561][T11880] [ 526.574869][T11880] dump_stack_lvl+0x188/0x24e [ 526.580288][T11880] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 526.586741][T11880] ? show_regs_print_info+0x12/0x12 [ 526.591983][T11880] ? load_image+0x400/0x400 [ 526.597071][T11880] should_fail_ex+0x399/0x4d0 [ 526.601959][T11880] _copy_from_user+0x2c/0x170 [ 526.607067][T11880] __sys_bpf+0x2ea/0x780 [ 526.612070][T11880] ? bpf_link_show_fdinfo+0x380/0x380 [ 526.618053][T11880] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 526.624527][T11880] __x64_sys_bpf+0x78/0x90 [ 526.629626][T11880] do_syscall_64+0x4c/0xa0 [ 526.634117][T11880] ? clear_bhb_loop+0x60/0xb0 [ 526.639193][T11880] ? clear_bhb_loop+0x60/0xb0 [ 526.644258][T11880] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 526.650356][T11880] RIP: 0033:0x7fd5ae19c799 [ 526.654983][T11880] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 526.675319][T11880] RSP: 002b:00007fd5af03c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 526.684142][T11880] RAX: ffffffffffffffda RBX: 00007fd5ae415fa0 RCX: 00007fd5ae19c799 [ 526.692788][T11880] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 526.700887][T11880] RBP: 00007fd5af03c090 R08: 0000000000000000 R09: 0000000000000000 [ 526.709156][T11880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 526.717265][T11880] R13: 00007fd5ae416038 R14: 00007fd5ae415fa0 R15: 00007ffc46758628 [ 526.725293][T11880] [ 526.896721][T11895] netlink: 'syz.2.2709': attribute type 13 has an invalid length. [ 526.904952][T11895] netlink: 24643 bytes leftover after parsing attributes in process `syz.2.2709'. [ 527.491622][T11904] netlink: 'syz.1.2713': attribute type 4 has an invalid length. [ 527.523169][T11904] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.2713'. [ 527.569667][T11913] netlink: 'syz.3.2716': attribute type 33 has an invalid length. [ 527.609870][T11913] netlink: 152 bytes leftover after parsing attributes in process `syz.3.2716'. [ 527.839641][T11927] netlink: 60 bytes leftover after parsing attributes in process `syz.5.2717'. [ 527.858062][T11927] netlink: 60 bytes leftover after parsing attributes in process `syz.5.2717'. [ 527.881013][T11927] netlink: 60 bytes leftover after parsing attributes in process `syz.5.2717'. [ 527.908510][T11927] netlink: 60 bytes leftover after parsing attributes in process `syz.5.2717'. [ 528.492265][T11937] FAULT_INJECTION: forcing a failure. [ 528.492265][T11937] name failslab, interval 1, probability 0, space 0, times 0 [ 528.531491][T11937] CPU: 1 PID: 11937 Comm: syz.2.2721 Not tainted syzkaller #0 [ 528.539224][T11937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 528.549947][T11937] Call Trace: [ 528.553543][T11937] [ 528.556805][T11937] dump_stack_lvl+0x188/0x24e [ 528.562001][T11937] ? show_regs_print_info+0x12/0x12 [ 528.567547][T11937] ? load_image+0x400/0x400 [ 528.572313][T11937] ? __might_sleep+0xd0/0xd0 [ 528.577410][T11937] ? __lock_acquire+0x7d10/0x7d10 [ 528.583211][T11937] should_fail_ex+0x399/0x4d0 [ 528.588134][T11937] should_failslab+0x5/0x20 [ 528.593969][T11937] slab_pre_alloc_hook+0x59/0x310 [ 528.600924][T11937] ? bpf_prog_test_run_skb+0x234/0x12a0 [ 528.607949][T11937] __kmem_cache_alloc_node+0x4f/0x260 [ 528.613916][T11937] ? bpf_prog_test_run_skb+0x234/0x12a0 [ 528.620258][T11937] __kmalloc+0xa0/0x240 [ 528.624995][T11937] bpf_prog_test_run_skb+0x234/0x12a0 [ 528.630853][T11937] ? __fget_files+0x28/0x4b0 [ 528.636040][T11937] ? __fget_files+0x28/0x4b0 [ 528.640778][T11937] ? __fget_files+0x43d/0x4b0 [ 528.645681][T11937] ? cpu_online+0xa0/0xa0 [ 528.650320][T11937] bpf_prog_test_run+0x31e/0x390 [ 528.655665][T11937] __sys_bpf+0x62b/0x780 [ 528.659961][T11937] ? bpf_link_show_fdinfo+0x380/0x380 [ 528.665605][T11937] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 528.672222][T11937] __x64_sys_bpf+0x78/0x90 [ 528.676857][T11937] do_syscall_64+0x4c/0xa0 [ 528.681326][T11937] ? clear_bhb_loop+0x60/0xb0 [ 528.686307][T11937] ? clear_bhb_loop+0x60/0xb0 [ 528.691213][T11937] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 528.697349][T11937] RIP: 0033:0x7f67a339c799 [ 528.702075][T11937] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 528.722425][T11937] RSP: 002b:00007f67a42d6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 528.731157][T11937] RAX: ffffffffffffffda RBX: 00007f67a3615fa0 RCX: 00007f67a339c799 [ 528.739869][T11937] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 528.748057][T11937] RBP: 00007f67a42d6090 R08: 0000000000000000 R09: 0000000000000000 [ 528.756603][T11937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 528.764610][T11937] R13: 00007f67a3616038 R14: 00007f67a3615fa0 R15: 00007ffea10d3288 [ 528.772920][T11937] [ 529.327630][T11951] device bridge_slave_1 left promiscuous mode [ 529.335594][T11951] bridge0: port 2(bridge_slave_1) entered disabled state [ 529.516764][T11951] device bridge_slave_0 left promiscuous mode [ 529.574758][T11951] bridge0: port 1(bridge_slave_0) entered disabled state [ 530.002753][T11971] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2735'. [ 530.620067][T11971] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2735'. [ 530.782856][T11984] FAULT_INJECTION: forcing a failure. [ 530.782856][T11984] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 530.825276][T11984] CPU: 0 PID: 11984 Comm: syz.3.2740 Not tainted syzkaller #0 [ 530.833101][T11984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 530.843280][T11984] Call Trace: [ 530.846711][T11984] [ 530.850001][T11984] dump_stack_lvl+0x188/0x24e [ 530.855029][T11984] ? show_regs_print_info+0x12/0x12 [ 530.860821][T11984] ? load_image+0x400/0x400 [ 530.865689][T11984] ? __lock_acquire+0x7d10/0x7d10 [ 530.871113][T11984] should_fail_ex+0x399/0x4d0 [ 530.876165][T11984] _copy_from_user+0x2c/0x170 [ 530.880916][T11984] iovec_from_user+0x143/0x360 [ 530.886211][T11984] __import_iovec+0x6d/0x500 [ 530.891308][T11984] ? __might_fault+0xc2/0x120 [ 530.896219][T11984] import_iovec+0x6f/0xa0 [ 530.901048][T11984] ___sys_sendmsg+0x252/0x360 [ 530.905985][T11984] ? __sys_sendmsg+0x290/0x290 [ 530.910930][T11984] ? __lock_acquire+0x7d10/0x7d10 [ 530.916311][T11984] __se_sys_sendmsg+0x1bb/0x2a0 [ 530.921842][T11984] ? ct_nmi_exit+0x145/0x1c0 [ 530.926842][T11984] ? __x64_sys_sendmsg+0x80/0x80 [ 530.931991][T11984] ? lockdep_hardirqs_on+0x94/0x140 [ 530.937598][T11984] do_syscall_64+0x4c/0xa0 [ 530.942124][T11984] ? clear_bhb_loop+0x60/0xb0 [ 530.946948][T11984] ? clear_bhb_loop+0x60/0xb0 [ 530.951951][T11984] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 530.958280][T11984] RIP: 0033:0x7f028619c799 [ 530.963149][T11984] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 530.984227][T11984] RSP: 002b:00007f02870ba028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 530.992703][T11984] RAX: ffffffffffffffda RBX: 00007f0286415fa0 RCX: 00007f028619c799 [ 531.000831][T11984] RDX: 0000000000000000 RSI: 0000200000001180 RDI: 0000000000000005 [ 531.009237][T11984] RBP: 00007f02870ba090 R08: 0000000000000000 R09: 0000000000000000 [ 531.017576][T11984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 531.025861][T11984] R13: 00007f0286416038 R14: 00007f0286415fa0 R15: 00007ffc95846ef8 [ 531.033994][T11984] [ 531.205299][T11989] netlink: 'syz.2.2742': attribute type 10 has an invalid length. [ 531.292357][T11989] team0: Port device wlan1 added [ 532.093746][T12009] netlink: 'syz.4.2747': attribute type 4 has an invalid length. [ 532.750385][T12021] netlink: 'syz.1.2752': attribute type 10 has an invalid length. [ 533.024550][T12024] netlink: 'syz.1.2752': attribute type 3 has an invalid length. [ 533.131782][T12028] FAULT_INJECTION: forcing a failure. [ 533.131782][T12028] name failslab, interval 1, probability 0, space 0, times 0 [ 533.158655][T12021] team0: Device hsr_slave_0 failed to register rx_handler [ 533.160045][T12028] CPU: 1 PID: 12028 Comm: syz.4.2755 Not tainted syzkaller #0 [ 533.173712][T12028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 533.183996][T12028] Call Trace: [ 533.187695][T12028] [ 533.190763][T12028] dump_stack_lvl+0x188/0x24e [ 533.196013][T12028] ? show_regs_print_info+0x12/0x12 [ 533.201532][T12028] ? load_image+0x400/0x400 [ 533.206722][T12028] ? __might_sleep+0xd0/0xd0 [ 533.211629][T12028] ? __lock_acquire+0x7d10/0x7d10 [ 533.217170][T12028] should_fail_ex+0x399/0x4d0 [ 533.222024][T12028] should_failslab+0x5/0x20 [ 533.227114][T12028] slab_pre_alloc_hook+0x59/0x310 [ 533.232456][T12028] ? sock_kmalloc+0x92/0xf0 [ 533.237294][T12028] __kmem_cache_alloc_node+0x4f/0x260 [ 533.243251][T12028] ? sock_kmalloc+0x92/0xf0 [ 533.248067][T12028] __kmalloc+0xa0/0x240 [ 533.252998][T12028] sock_kmalloc+0x92/0xf0 [ 533.257492][T12028] ____sys_sendmsg+0x1bb/0x970 [ 533.262605][T12028] ? __sys_sendmsg_sock+0x30/0x30 [ 533.267939][T12028] ? __import_iovec+0x315/0x500 [ 533.273121][T12028] ? import_iovec+0x6f/0xa0 [ 533.278046][T12028] ___sys_sendmsg+0x2a2/0x360 [ 533.282990][T12024] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.2752'. [ 533.283581][T12028] ? __sys_sendmsg+0x290/0x290 [ 533.299146][T12028] ? __lock_acquire+0x7d10/0x7d10 [ 533.304745][T12028] __se_sys_sendmsg+0x1bb/0x2a0 [ 533.310241][T12028] ? __x64_sys_sendmsg+0x80/0x80 [ 533.315807][T12028] ? lockdep_hardirqs_on+0x94/0x140 [ 533.321701][T12028] do_syscall_64+0x4c/0xa0 [ 533.326398][T12028] ? clear_bhb_loop+0x60/0xb0 [ 533.331421][T12028] ? clear_bhb_loop+0x60/0xb0 [ 533.336883][T12028] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 533.345390][T12028] RIP: 0033:0x7ff5e499c799 [ 533.352980][T12028] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 533.381899][T12028] RSP: 002b:00007ff5e584c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 533.393357][T12028] RAX: ffffffffffffffda RBX: 00007ff5e4c15fa0 RCX: 00007ff5e499c799 [ 533.402001][T12028] RDX: 0000000000000000 RSI: 0000200000001180 RDI: 0000000000000005 [ 533.411036][T12028] RBP: 00007ff5e584c090 R08: 0000000000000000 R09: 0000000000000000 [ 533.419878][T12028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 533.428814][T12028] R13: 00007ff5e4c16038 R14: 00007ff5e4c15fa0 R15: 00007fffcf5c04d8 [ 533.437312][T12028] [ 535.049727][T12070] FAULT_INJECTION: forcing a failure. [ 535.049727][T12070] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 535.064371][T12066] netlink: 'syz.1.2765': attribute type 4 has an invalid length. [ 535.106027][T12070] CPU: 0 PID: 12070 Comm: syz.4.2768 Not tainted syzkaller #0 [ 535.114034][T12070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 535.125199][T12070] Call Trace: [ 535.128624][T12070] [ 535.132099][T12070] dump_stack_lvl+0x188/0x24e [ 535.137289][T12070] ? show_regs_print_info+0x12/0x12 [ 535.142851][T12070] ? load_image+0x400/0x400 [ 535.147553][T12070] ? __lock_acquire+0x7d10/0x7d10 [ 535.152926][T12070] should_fail_ex+0x399/0x4d0 [ 535.157919][T12070] _copy_from_user+0x2c/0x170 [ 535.162955][T12070] ____sys_sendmsg+0x30a/0x970 [ 535.167801][T12070] ? __sys_sendmsg_sock+0x30/0x30 [ 535.173218][T12070] ? __import_iovec+0x315/0x500 [ 535.178417][T12070] ? import_iovec+0x6f/0xa0 [ 535.183077][T12070] ___sys_sendmsg+0x2a2/0x360 [ 535.187948][T12070] ? __sys_sendmsg+0x290/0x290 [ 535.193198][T12070] ? __lock_acquire+0x7d10/0x7d10 [ 535.198433][T12070] __se_sys_sendmsg+0x1bb/0x2a0 [ 535.203463][T12070] ? __x64_sys_sendmsg+0x80/0x80 [ 535.209129][T12070] ? lockdep_hardirqs_on+0x94/0x140 [ 535.214760][T12070] do_syscall_64+0x4c/0xa0 [ 535.219356][T12070] ? clear_bhb_loop+0x60/0xb0 [ 535.224588][T12070] ? clear_bhb_loop+0x60/0xb0 [ 535.229631][T12070] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 535.235966][T12070] RIP: 0033:0x7ff5e499c799 [ 535.240542][T12070] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 535.256974][T12067] netlink: 'syz.5.2766': attribute type 10 has an invalid length. [ 535.261140][T12070] RSP: 002b:00007ff5e584c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 535.278010][T12070] RAX: ffffffffffffffda RBX: 00007ff5e4c15fa0 RCX: 00007ff5e499c799 [ 535.286228][T12070] RDX: 0000000000000000 RSI: 0000200000001180 RDI: 0000000000000005 [ 535.294883][T12070] RBP: 00007ff5e584c090 R08: 0000000000000000 R09: 0000000000000000 [ 535.303429][T12070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 535.311549][T12070] R13: 00007ff5e4c16038 R14: 00007ff5e4c15fa0 R15: 00007fffcf5c04d8 [ 535.319683][T12070] [ 535.382721][T12067] device wlan1 entered promiscuous mode [ 535.448543][T12067] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 536.897490][T12107] bridge0: port 3(team0) entered disabled state [ 537.322908][T12113] FAULT_INJECTION: forcing a failure. [ 537.322908][T12113] name failslab, interval 1, probability 0, space 0, times 0 [ 537.428215][T12113] CPU: 0 PID: 12113 Comm: syz.4.2782 Not tainted syzkaller #0 [ 537.436783][T12113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 537.447392][T12113] Call Trace: [ 537.451098][T12113] [ 537.454572][T12113] dump_stack_lvl+0x188/0x24e [ 537.459602][T12113] ? show_regs_print_info+0x12/0x12 [ 537.465048][T12113] ? load_image+0x400/0x400 [ 537.470071][T12113] ? __might_sleep+0xd0/0xd0 [ 537.474909][T12113] ? __lock_acquire+0x7d10/0x7d10 [ 537.480637][T12113] should_fail_ex+0x399/0x4d0 [ 537.485661][T12113] should_failslab+0x5/0x20 [ 537.490333][T12113] slab_pre_alloc_hook+0x59/0x310 [ 537.495714][T12113] ? ip6_setup_cork+0x1d7/0xfe0 [ 537.500732][T12113] __kmem_cache_alloc_node+0x4f/0x260 [ 537.506633][T12113] ? ip6_setup_cork+0x1d7/0xfe0 [ 537.511753][T12113] kmalloc_trace+0x26/0xe0 [ 537.516581][T12113] ip6_setup_cork+0x1d7/0xfe0 [ 537.521611][T12113] ip6_append_data+0x29e/0x3e0 [ 537.526607][T12113] ? ip_skb_dst_mtu+0x9c0/0x9c0 [ 537.531660][T12113] l2tp_ip6_sendmsg+0x1208/0x1670 [ 537.537247][T12113] ? l2tp_ip6_destroy_sock+0x50/0x50 [ 537.542822][T12113] ? aa_af_perm+0x340/0x340 [ 537.547573][T12113] ? tomoyo_socket_sendmsg_permission+0x212/0x2f0 [ 537.554367][T12113] ? sock_rps_record_flow+0x19/0x3f0 [ 537.559843][T12113] ? inet_sendmsg+0x78/0x2f0 [ 537.564714][T12113] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 537.570240][T12113] ? security_socket_sendmsg+0x7c/0xa0 [ 537.576337][T12113] ? inet_send_prepare+0x260/0x260 [ 537.582082][T12113] ____sys_sendmsg+0x5be/0x970 [ 537.587259][T12113] ? __sys_sendmsg_sock+0x30/0x30 [ 537.592542][T12113] ? __import_iovec+0x315/0x500 [ 537.597725][T12113] ? import_iovec+0x6f/0xa0 [ 537.602474][T12113] ___sys_sendmsg+0x2a2/0x360 [ 537.607524][T12113] ? __sys_sendmsg+0x290/0x290 [ 537.612709][T12113] ? __lock_acquire+0x7d10/0x7d10 [ 537.618111][T12113] __se_sys_sendmsg+0x1bb/0x2a0 [ 537.623041][T12113] ? __x64_sys_sendmsg+0x80/0x80 [ 537.628153][T12113] ? lockdep_hardirqs_on+0x94/0x140 [ 537.633410][T12113] do_syscall_64+0x4c/0xa0 [ 537.637884][T12113] ? clear_bhb_loop+0x60/0xb0 [ 537.642679][T12113] ? clear_bhb_loop+0x60/0xb0 [ 537.647863][T12113] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 537.654279][T12113] RIP: 0033:0x7ff5e499c799 [ 537.658794][T12113] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 537.679860][T12113] RSP: 002b:00007ff5e584c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 537.688985][T12113] RAX: ffffffffffffffda RBX: 00007ff5e4c15fa0 RCX: 00007ff5e499c799 [ 537.697301][T12113] RDX: 0000000000000000 RSI: 0000200000001180 RDI: 0000000000000005 [ 537.705556][T12113] RBP: 00007ff5e584c090 R08: 0000000000000000 R09: 0000000000000000 [ 537.713887][T12113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 537.722263][T12113] R13: 00007ff5e4c16038 R14: 00007ff5e4c15fa0 R15: 00007fffcf5c04d8 [ 537.730584][T12113] [ 537.889448][T12107] device dummy0 left promiscuous mode [ 537.958951][T12107] bridge0: port 1(dummy0) entered disabled state [ 538.020327][T12107] device bridge_slave_1 left promiscuous mode [ 538.047598][T12107] bridge0: port 2(bridge_slave_1) entered disabled state [ 538.530528][T12121] netlink: 'syz.2.2785': attribute type 4 has an invalid length. [ 539.711800][T12142] netlink: 'syz.2.2788': attribute type 3 has an invalid length. [ 539.788569][T12142] netlink: 16066 bytes leftover after parsing attributes in process `syz.2.2788'. [ 539.893011][T12143] netlink: 63503 bytes leftover after parsing attributes in process `syz.5.2793'. [ 540.210969][T12153] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 540.232735][T12153] syzkaller1: linktype set to 780 [ 540.417215][T12157] IPv6: Can't replace route, no match found [ 540.541110][T12162] FAULT_INJECTION: forcing a failure. [ 540.541110][T12162] name failslab, interval 1, probability 0, space 0, times 0 [ 540.578248][T12162] CPU: 0 PID: 12162 Comm: syz.5.2799 Not tainted syzkaller #0 [ 540.586509][T12162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 540.597051][T12162] Call Trace: [ 540.600373][T12162] [ 540.603437][T12162] dump_stack_lvl+0x188/0x24e [ 540.608295][T12162] ? show_regs_print_info+0x12/0x12 [ 540.613655][T12162] ? load_image+0x400/0x400 [ 540.618315][T12162] ? __might_sleep+0xd0/0xd0 [ 540.623482][T12162] ? __lock_acquire+0x7d10/0x7d10 [ 540.628662][T12162] ? mark_lock+0x94/0x320 [ 540.633290][T12162] should_fail_ex+0x399/0x4d0 [ 540.638208][T12162] should_failslab+0x5/0x20 [ 540.642921][T12162] slab_pre_alloc_hook+0x59/0x310 [ 540.648289][T12162] ? is_bpf_text_address+0x22/0x2a0 [ 540.653724][T12162] kmem_cache_alloc_node+0x5a/0x320 [ 540.659270][T12162] ? __alloc_skb+0xfc/0x7e0 [ 540.664045][T12162] __alloc_skb+0xfc/0x7e0 [ 540.668570][T12162] alloc_skb_with_frags+0xa7/0x710 [ 540.674117][T12162] ? mark_lock+0x94/0x320 [ 540.678625][T12162] ? __lock_acquire+0x12f4/0x7d10 [ 540.684005][T12162] sock_alloc_send_pskb+0x87f/0x9a0 [ 540.689587][T12162] ? sock_kzfree_s+0x50/0x50 [ 540.694533][T12162] ? verify_lock_unused+0x140/0x140 [ 540.699910][T12162] ? perf_trace_lock+0xf8/0x390 [ 540.705108][T12162] __ip6_append_data+0x2ae9/0x3d40 [ 540.710508][T12162] ? ip_skb_dst_mtu+0x9c0/0x9c0 [ 540.715888][T12162] ? ip6_mtu+0x79/0x3f0 [ 540.720197][T12162] ? ip6_setup_cork+0xfe0/0xfe0 [ 540.725212][T12162] ? ip6_setup_cork+0xa30/0xfe0 [ 540.730390][T12162] ip6_append_data+0x1ea/0x3e0 [ 540.735389][T12162] ? ip_skb_dst_mtu+0x9c0/0x9c0 [ 540.740548][T12162] l2tp_ip6_sendmsg+0x1208/0x1670 [ 540.745914][T12162] ? l2tp_ip6_destroy_sock+0x50/0x50 [ 540.751396][T12162] ? aa_af_perm+0x340/0x340 [ 540.756059][T12162] ? tomoyo_socket_sendmsg_permission+0x212/0x2f0 [ 540.762874][T12162] ? sock_rps_record_flow+0x19/0x3f0 [ 540.768321][T12162] ? inet_sendmsg+0x78/0x2f0 [ 540.773306][T12162] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 540.778821][T12162] ? security_socket_sendmsg+0x7c/0xa0 [ 540.784780][T12162] ? inet_send_prepare+0x260/0x260 [ 540.790035][T12162] ____sys_sendmsg+0x5be/0x970 [ 540.794982][T12162] ? __sys_sendmsg_sock+0x30/0x30 [ 540.800200][T12162] ? __import_iovec+0x315/0x500 [ 540.805106][T12162] ? import_iovec+0x6f/0xa0 [ 540.809784][T12162] ___sys_sendmsg+0x2a2/0x360 [ 540.814745][T12162] ? __sys_sendmsg+0x290/0x290 [ 540.819603][T12162] ? __lock_acquire+0x7d10/0x7d10 [ 540.824791][T12162] __se_sys_sendmsg+0x1bb/0x2a0 [ 540.829704][T12162] ? __x64_sys_sendmsg+0x80/0x80 [ 540.834808][T12162] ? lockdep_hardirqs_on+0x94/0x140 [ 540.840590][T12162] do_syscall_64+0x4c/0xa0 [ 540.845156][T12162] ? clear_bhb_loop+0x60/0xb0 [ 540.850031][T12162] ? clear_bhb_loop+0x60/0xb0 [ 540.854942][T12162] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 540.860998][T12162] RIP: 0033:0x7f58ff19c799 [ 540.865722][T12162] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 540.886252][T12162] RSP: 002b:00007f5900066028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 540.894967][T12162] RAX: ffffffffffffffda RBX: 00007f58ff415fa0 RCX: 00007f58ff19c799 [ 540.903331][T12162] RDX: 0000000000000000 RSI: 0000200000001180 RDI: 0000000000000005 [ 540.911885][T12162] RBP: 00007f5900066090 R08: 0000000000000000 R09: 0000000000000000 [ 540.920256][T12162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 540.928536][T12162] R13: 00007f58ff416038 R14: 00007f58ff415fa0 R15: 00007ffe113fd028 [ 540.936566][T12162] [ 541.054301][T12164] netlink: 'syz.4.2798': attribute type 4 has an invalid length. [ 541.671140][T12175] netlink: 126588 bytes leftover after parsing attributes in process `syz.4.2803'. [ 541.749481][T12175] netlink: 43 bytes leftover after parsing attributes in process `syz.4.2803'. [ 544.192256][T12215] netlink: 'syz.2.2813': attribute type 4 has an invalid length. [ 547.596502][T12244] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 547.615169][ T4283] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 547.624009][T12244] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 547.633299][T12244] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 547.642641][T12244] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 547.651411][ T4283] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 549.069765][T12246] netlink: 'syz.3.2826': attribute type 2 has an invalid length. [ 549.092222][T12246] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2826'. [ 549.675878][T12244] Bluetooth: hci2: command 0x0409 tx timeout [ 549.851763][T12266] netlink: 'syz.3.2831': attribute type 4 has an invalid length. [ 550.045032][ T8150] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 550.280789][ T8150] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 550.626914][T12285] FAULT_INJECTION: forcing a failure. [ 550.626914][T12285] name failslab, interval 1, probability 0, space 0, times 0 [ 550.655641][T12285] CPU: 1 PID: 12285 Comm: syz.1.2838 Not tainted syzkaller #0 [ 550.663372][T12285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 550.673667][T12285] Call Trace: [ 550.677082][T12285] [ 550.680055][T12285] dump_stack_lvl+0x188/0x24e [ 550.684975][T12285] ? show_regs_print_info+0x12/0x12 [ 550.690621][T12285] ? load_image+0x400/0x400 [ 550.695280][T12285] ? __might_sleep+0xd0/0xd0 [ 550.699936][T12285] ? __lock_acquire+0x7d10/0x7d10 [ 550.705030][T12285] should_fail_ex+0x399/0x4d0 [ 550.709870][T12285] should_failslab+0x5/0x20 [ 550.714519][T12285] slab_pre_alloc_hook+0x59/0x310 [ 550.719783][T12285] kmem_cache_alloc_node+0x5a/0x320 [ 550.725241][T12285] ? __alloc_skb+0xfc/0x7e0 [ 550.729892][T12285] __alloc_skb+0xfc/0x7e0 [ 550.734262][T12285] ? __kasan_kmalloc+0x8e/0xa0 [ 550.739100][T12285] __ip6_append_data+0x2bb8/0x3d40 [ 550.744455][T12285] ? ip_skb_dst_mtu+0x9c0/0x9c0 [ 550.749441][T12285] ? ip6_setup_cork+0xfe0/0xfe0 [ 550.754427][T12285] ? ip6_setup_cork+0xa30/0xfe0 [ 550.759418][T12285] ip6_append_data+0x1ea/0x3e0 [ 550.764403][T12285] ? ip_skb_dst_mtu+0x9c0/0x9c0 [ 550.769294][T12285] l2tp_ip6_sendmsg+0x1208/0x1670 [ 550.774549][T12285] ? l2tp_ip6_destroy_sock+0x50/0x50 [ 550.779989][T12285] ? aa_af_perm+0x340/0x340 [ 550.784724][T12285] ? tomoyo_socket_sendmsg_permission+0x212/0x2f0 [ 550.791301][T12285] ? sock_rps_record_flow+0x19/0x3f0 [ 550.796722][T12285] ? inet_sendmsg+0x78/0x2f0 [ 550.801837][T12285] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 550.807588][T12285] ? security_socket_sendmsg+0x7c/0xa0 [ 550.813533][T12285] ? inet_send_prepare+0x260/0x260 [ 550.818768][T12285] ____sys_sendmsg+0x5be/0x970 [ 550.823748][T12285] ? __sys_sendmsg_sock+0x30/0x30 [ 550.828905][T12285] ? __import_iovec+0x315/0x500 [ 550.833974][T12285] ? import_iovec+0x6f/0xa0 [ 550.838598][T12285] ___sys_sendmsg+0x2a2/0x360 [ 550.843505][T12285] ? __sys_sendmsg+0x290/0x290 [ 550.848582][T12285] ? __lock_acquire+0x7d10/0x7d10 [ 550.853670][T12285] __se_sys_sendmsg+0x1bb/0x2a0 [ 550.858659][T12285] ? __x64_sys_sendmsg+0x80/0x80 [ 550.863830][T12285] ? lockdep_hardirqs_on+0x94/0x140 [ 550.869328][T12285] do_syscall_64+0x4c/0xa0 [ 550.873792][T12285] ? clear_bhb_loop+0x60/0xb0 [ 550.878760][T12285] ? clear_bhb_loop+0x60/0xb0 [ 550.883651][T12285] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 550.889924][T12285] RIP: 0033:0x7fd5ae19c799 [ 550.894569][T12285] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 550.915868][T12285] RSP: 002b:00007fd5af03c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 550.924695][T12285] RAX: ffffffffffffffda RBX: 00007fd5ae415fa0 RCX: 00007fd5ae19c799 [ 550.932977][T12285] RDX: 0000000000000000 RSI: 0000200000001180 RDI: 0000000000000005 [ 550.941258][T12285] RBP: 00007fd5af03c090 R08: 0000000000000000 R09: 0000000000000000 [ 550.949866][T12285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 550.958494][T12285] R13: 00007fd5ae416038 R14: 00007fd5ae415fa0 R15: 00007ffc46758628 [ 550.966709][T12285] [ 551.301056][T12297] netlink: 'syz.5.2841': attribute type 11 has an invalid length. [ 551.318827][T12297] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.2841'. [ 551.427265][ T8150] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 551.484536][T12243] chnl_net:caif_netlink_parms(): no params data found [ 551.750032][T12244] Bluetooth: hci2: command 0x041b tx timeout [ 551.983990][ T8150] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 552.146737][T12243] bridge0: port 1(bridge_slave_0) entered blocking state [ 552.154807][T12243] bridge0: port 1(bridge_slave_0) entered disabled state [ 552.163593][T12243] device bridge_slave_0 entered promiscuous mode [ 552.185226][T12243] bridge0: port 2(bridge_slave_1) entered blocking state [ 552.203508][T12243] bridge0: port 2(bridge_slave_1) entered disabled state [ 552.231423][T12243] device bridge_slave_1 entered promiscuous mode [ 552.312444][T12295] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 552.374127][T12310] netlink: 'syz.1.2844': attribute type 2 has an invalid length. [ 552.578052][T12243] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 552.698341][T12243] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 552.890695][T12317] netlink: 'syz.3.2847': attribute type 4 has an invalid length. [ 552.955421][T12243] team0: Port device team_slave_0 added [ 553.494024][T12243] team0: Port device team_slave_1 added [ 553.835697][T12244] Bluetooth: hci2: command 0x040f tx timeout [ 554.894481][T12243] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 554.920636][T12243] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 554.978396][T12243] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 555.020204][T12243] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 555.031459][T12243] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 555.107370][T12243] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 555.350357][T12243] device hsr_slave_0 entered promiscuous mode [ 555.453538][T12374] netlink: 126588 bytes leftover after parsing attributes in process `syz.3.2862'. [ 555.573212][T12374] netlink: 43 bytes leftover after parsing attributes in process `syz.3.2862'. [ 555.622447][T12243] device hsr_slave_1 entered promiscuous mode [ 555.713837][T12372] netlink: 'syz.3.2862': attribute type 12 has an invalid length. [ 555.734856][T12372] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2862'. [ 555.778922][T12374] netlink: 188 bytes leftover after parsing attributes in process `syz.3.2862'. [ 555.905692][T12244] Bluetooth: hci2: command 0x0419 tx timeout [ 556.894176][T12373] netlink: 'syz.2.2861': attribute type 4 has an invalid length. [ 557.082472][T12393] FAULT_INJECTION: forcing a failure. [ 557.082472][T12393] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 557.136611][T12393] CPU: 0 PID: 12393 Comm: syz.5.2866 Not tainted syzkaller #0 [ 557.144252][T12393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 557.154711][T12393] Call Trace: [ 557.158148][T12393] [ 557.161125][T12393] dump_stack_lvl+0x188/0x24e [ 557.166140][T12393] ? show_regs_print_info+0x12/0x12 [ 557.171578][T12393] ? load_image+0x400/0x400 [ 557.176225][T12393] ? __lock_acquire+0x7d10/0x7d10 [ 557.181560][T12393] should_fail_ex+0x399/0x4d0 [ 557.186620][T12393] _copy_from_user+0x2c/0x170 [ 557.191717][T12393] csum_and_copy_from_iter+0x493/0x1350 [ 557.197460][T12393] ? iov_iter_get_pages_alloc2+0xc0/0xc0 [ 557.203433][T12393] ? __alloc_pages+0x294/0x4f0 [ 557.208271][T12393] ? zone_statistics+0x170/0x170 [ 557.213277][T12393] ip_generic_getfrag+0x150/0x2e0 [ 557.218369][T12393] ? ip_skb_dst_mtu+0x9c0/0x9c0 [ 557.223360][T12393] ? skb_page_frag_refill+0x195/0x310 [ 557.228810][T12393] __ip6_append_data+0x1dfc/0x3d40 [ 557.234025][T12393] ? ip_skb_dst_mtu+0x9c0/0x9c0 [ 557.239247][T12393] ? ip6_setup_cork+0xfe0/0xfe0 [ 557.244437][T12393] ? ip6_setup_cork+0xa30/0xfe0 [ 557.249619][T12393] ip6_append_data+0x1ea/0x3e0 [ 557.254641][T12393] ? ip_skb_dst_mtu+0x9c0/0x9c0 [ 557.259821][T12393] l2tp_ip6_sendmsg+0x1208/0x1670 [ 557.265106][T12393] ? l2tp_ip6_destroy_sock+0x50/0x50 [ 557.270659][T12393] ? aa_af_perm+0x340/0x340 [ 557.275670][T12393] ? tomoyo_socket_sendmsg_permission+0x212/0x2f0 [ 557.283127][T12393] ? sock_rps_record_flow+0x19/0x3f0 [ 557.288589][T12393] ? inet_sendmsg+0x78/0x2f0 [ 557.293682][T12393] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 557.299121][T12393] ? security_socket_sendmsg+0x7c/0xa0 [ 557.304760][T12393] ? inet_send_prepare+0x260/0x260 [ 557.310099][T12393] ____sys_sendmsg+0x5be/0x970 [ 557.314996][T12393] ? __sys_sendmsg_sock+0x30/0x30 [ 557.320241][T12393] ? __import_iovec+0x315/0x500 [ 557.325424][T12393] ? import_iovec+0x6f/0xa0 [ 557.330133][T12393] ___sys_sendmsg+0x2a2/0x360 [ 557.334977][T12393] ? __sys_sendmsg+0x290/0x290 [ 557.340093][T12393] ? __lock_acquire+0x7d10/0x7d10 [ 557.345284][T12393] __se_sys_sendmsg+0x1bb/0x2a0 [ 557.350962][T12393] ? __x64_sys_sendmsg+0x80/0x80 [ 557.356484][T12393] ? lockdep_hardirqs_on+0x94/0x140 [ 557.361976][T12393] do_syscall_64+0x4c/0xa0 [ 557.366789][T12393] ? clear_bhb_loop+0x60/0xb0 [ 557.371587][T12393] ? clear_bhb_loop+0x60/0xb0 [ 557.376495][T12393] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 557.382445][T12393] RIP: 0033:0x7f58ff19c799 [ 557.386991][T12393] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 557.407073][T12393] RSP: 002b:00007f5900066028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 557.415537][T12393] RAX: ffffffffffffffda RBX: 00007f58ff415fa0 RCX: 00007f58ff19c799 [ 557.423842][T12393] RDX: 0000000000000000 RSI: 0000200000001180 RDI: 0000000000000005 [ 557.432637][T12393] RBP: 00007f5900066090 R08: 0000000000000000 R09: 0000000000000000 [ 557.441095][T12393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 557.449658][T12393] R13: 00007f58ff416038 R14: 00007f58ff415fa0 R15: 00007ffe113fd028 [ 557.458968][T12393] [ 559.543519][T12446] netlink: 194236 bytes leftover after parsing attributes in process `syz.2.2878'. [ 559.565613][T12441] netlink: 'syz.3.2877': attribute type 4 has an invalid length. [ 559.585125][ T8150] device hsr0 left promiscuous mode [ 559.613642][ T8150] nr0: port 1(hsr0) entered disabled state [ 559.642521][T12446] netlink: zone id is out of range [ 559.663337][T12446] netlink: zone id is out of range [ 559.684805][T12446] netlink: zone id is out of range [ 559.721057][T12446] netlink: zone id is out of range [ 559.734711][T12446] netlink: zone id is out of range [ 559.742768][T12446] netlink: get zone limit has 8 unknown bytes [ 559.767865][T12450] netlink: 'syz.1.2880': attribute type 4 has an invalid length. [ 559.783291][T12450] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2880'. [ 559.882244][ T8150] device hsr_slave_0 left promiscuous mode [ 559.908183][ T8150] device hsr_slave_1 left promiscuous mode [ 559.935456][ T8150] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 559.944099][ T8150] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 559.987553][ T8150] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 560.035840][ T8150] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 560.054064][ T8150] device bridge_slave_1 left promiscuous mode [ 560.076128][ T8150] bridge0: port 2(bridge_slave_1) entered disabled state [ 560.105937][ T8150] bridge0: port 1(bridge_slave_0) entered disabled state [ 560.314715][ T8150] device veth1_macvtap left promiscuous mode [ 560.355448][ T8150] device veth0_macvtap left promiscuous mode [ 560.559454][T12466] netlink: 'syz.1.2885': attribute type 2 has an invalid length. [ 561.519616][ T8150] team0 (unregistering): Port device team_slave_1 removed [ 561.576003][ T8150] team0 (unregistering): Port device team_slave_0 removed [ 561.632604][ T8150] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 561.688322][ T8150] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 562.092985][ T8150] bond0 (unregistering): Released all slaves [ 562.200361][T12461] bridge0: port 1(team0) entered blocking state [ 562.214752][T12461] bridge0: port 1(team0) entered disabled state [ 562.250406][T12466] device 0 entered promiscuous mode [ 562.451929][T12243] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 562.520268][T12243] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 562.535107][T12243] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 562.554802][T12243] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 564.463800][T12496] netlink: 'syz.3.2891': attribute type 4 has an invalid length. [ 564.716272][T12507] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2892'. [ 564.751392][T12511] FAULT_INJECTION: forcing a failure. [ 564.751392][T12511] name failslab, interval 1, probability 0, space 0, times 0 [ 564.754076][T12507] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2892'. [ 564.783855][T12511] CPU: 0 PID: 12511 Comm: syz.2.2893 Not tainted syzkaller #0 [ 564.792492][T12511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 564.803339][T12511] Call Trace: [ 564.806718][T12511] [ 564.809799][T12511] dump_stack_lvl+0x188/0x24e [ 564.814644][T12511] ? show_regs_print_info+0x12/0x12 [ 564.816276][T12513] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2892'. [ 564.820058][T12511] ? load_image+0x400/0x400 [ 564.834537][T12511] ? __might_sleep+0xd0/0xd0 [ 564.839358][T12511] ? __lock_acquire+0x7d10/0x7d10 [ 564.844711][T12511] should_fail_ex+0x399/0x4d0 [ 564.849796][T12511] should_failslab+0x5/0x20 [ 564.854365][T12511] slab_pre_alloc_hook+0x59/0x310 [ 564.859555][T12511] kmem_cache_alloc_node+0x5a/0x320 [ 564.865607][T12511] ? __alloc_skb+0xfc/0x7e0 [ 564.870531][T12511] __alloc_skb+0xfc/0x7e0 [ 564.875200][T12511] __ip6_append_data+0x2bb8/0x3d40 [ 564.880512][T12511] ? ip_skb_dst_mtu+0x9c0/0x9c0 [ 564.885628][T12511] ? ip6_setup_cork+0xfe0/0xfe0 [ 564.890822][T12511] ? ip6_setup_cork+0xa30/0xfe0 [ 564.896008][T12511] ip6_append_data+0x1ea/0x3e0 [ 564.902827][T12511] ? ip_skb_dst_mtu+0x9c0/0x9c0 [ 564.908320][T12511] l2tp_ip6_sendmsg+0x1208/0x1670 [ 564.913474][T12511] ? l2tp_ip6_destroy_sock+0x50/0x50 [ 564.919015][T12511] ? aa_af_perm+0x340/0x340 [ 564.923663][T12511] ? tomoyo_socket_sendmsg_permission+0x212/0x2f0 [ 564.930209][T12511] ? sock_rps_record_flow+0x19/0x3f0 [ 564.935798][T12511] ? inet_sendmsg+0x78/0x2f0 [ 564.940801][T12511] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 564.946198][T12511] ? security_socket_sendmsg+0x7c/0xa0 [ 564.952047][T12511] ? inet_send_prepare+0x260/0x260 [ 564.957651][T12511] ____sys_sendmsg+0x5be/0x970 [ 564.962709][T12511] ? __sys_sendmsg_sock+0x30/0x30 [ 564.968255][T12511] ? __import_iovec+0x315/0x500 [ 564.974491][T12511] ? import_iovec+0x6f/0xa0 [ 564.980306][T12511] ___sys_sendmsg+0x2a2/0x360 [ 564.985126][T12511] ? __sys_sendmsg+0x290/0x290 [ 564.990253][T12511] ? __lock_acquire+0x7d10/0x7d10 [ 564.996135][T12511] __se_sys_sendmsg+0x1bb/0x2a0 [ 565.001474][T12511] ? __x64_sys_sendmsg+0x80/0x80 [ 565.006736][T12511] ? lockdep_hardirqs_on+0x94/0x140 [ 565.012140][T12511] do_syscall_64+0x4c/0xa0 [ 565.016852][T12511] ? clear_bhb_loop+0x60/0xb0 [ 565.021651][T12511] ? clear_bhb_loop+0x60/0xb0 [ 565.028711][T12511] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 565.035000][T12511] RIP: 0033:0x7f67a339c799 [ 565.039536][T12511] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 565.060457][T12511] RSP: 002b:00007f67a42d6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 565.069449][T12511] RAX: ffffffffffffffda RBX: 00007f67a3615fa0 RCX: 00007f67a339c799 [ 565.078027][T12511] RDX: 0000000000000000 RSI: 0000200000001180 RDI: 0000000000000005 [ 565.086558][T12511] RBP: 00007f67a42d6090 R08: 0000000000000000 R09: 0000000000000000 [ 565.095186][T12511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 565.103492][T12511] R13: 00007f67a3616038 R14: 00007f67a3615fa0 R15: 00007ffea10d3288 [ 565.111714][T12511] [ 565.143663][T12243] 8021q: adding VLAN 0 to HW filter on device bond0 [ 565.164285][T12507] netlink: 40 bytes leftover after parsing attributes in process `syz.1.2892'. [ 565.219605][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 565.249575][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 565.284350][T12243] 8021q: adding VLAN 0 to HW filter on device team0 [ 565.319262][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 565.374911][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 565.386626][ T8146] bridge0: port 1(bridge_slave_0) entered blocking state [ 565.394586][ T8146] bridge0: port 1(bridge_slave_0) entered forwarding state [ 565.403573][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 565.421737][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 565.445291][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 565.486367][ T8138] bridge0: port 2(bridge_slave_1) entered blocking state [ 565.495041][ T8138] bridge0: port 2(bridge_slave_1) entered forwarding state [ 565.596189][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 565.621681][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 565.682398][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 565.713565][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 565.769822][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 565.802944][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 565.851903][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 565.909802][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 565.954344][T12243] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 566.020387][T12243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 566.078470][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 566.097491][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 566.136807][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 566.185985][T12537] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2899'. [ 566.211621][T12537] netlink: 152 bytes leftover after parsing attributes in process `syz.5.2899'. [ 566.296583][T12538] netlink: 44 bytes leftover after parsing attributes in process `syz.5.2899'. [ 567.033745][T12560] netlink: 'syz.1.2903': attribute type 4 has an invalid length. [ 567.394843][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 567.433413][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 567.477196][T12243] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 567.832840][T12576] netlink: 146340 bytes leftover after parsing attributes in process `syz.1.2909'. [ 567.909449][T12576] openvswitch: netlink: Key type 386 is out of range max 32 [ 568.310179][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 568.316798][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 568.708983][T12244] Bluetooth: hci0: unexpected event 0x05 length: 15 > 4 [ 568.724765][T12608] FAULT_INJECTION: forcing a failure. [ 568.724765][T12608] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 568.872571][T12608] CPU: 0 PID: 12608 Comm: syz.5.2916 Not tainted syzkaller #0 [ 568.880410][T12608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 568.890903][T12608] Call Trace: [ 568.894602][T12608] [ 568.898228][T12608] dump_stack_lvl+0x188/0x24e [ 568.903088][T12608] ? show_regs_print_info+0x12/0x12 [ 568.908599][T12608] ? load_image+0x400/0x400 [ 568.913455][T12608] ? __lock_acquire+0x7d10/0x7d10 [ 568.919383][T12608] should_fail_ex+0x399/0x4d0 [ 568.924698][T12608] _copy_from_user+0x2c/0x170 [ 568.929713][T12608] csum_and_copy_from_iter+0x493/0x1350 [ 568.935620][T12608] ? iov_iter_get_pages_alloc2+0xc0/0xc0 [ 568.941591][T12608] ? __kmem_cache_alloc_node+0x140/0x260 [ 568.947558][T12608] ip_generic_getfrag+0x150/0x2e0 [ 568.952879][T12608] ? ip_skb_dst_mtu+0x9c0/0x9c0 [ 568.958336][T12608] ? skb_put+0x117/0x210 [ 568.963099][T12608] __ip6_append_data+0x300b/0x3d40 [ 568.968404][T12608] ? ip_skb_dst_mtu+0x9c0/0x9c0 [ 568.973530][T12608] ? ip6_setup_cork+0xfe0/0xfe0 [ 568.978775][T12608] ? ip6_setup_cork+0xa30/0xfe0 [ 568.983791][T12608] ip6_append_data+0x1ea/0x3e0 [ 568.989299][T12608] ? ip_skb_dst_mtu+0x9c0/0x9c0 [ 568.994304][T12608] l2tp_ip6_sendmsg+0x1208/0x1670 [ 568.999680][T12608] ? l2tp_ip6_destroy_sock+0x50/0x50 [ 569.005642][T12608] ? aa_af_perm+0x340/0x340 [ 569.010531][T12608] ? tomoyo_socket_sendmsg_permission+0x212/0x2f0 [ 569.017315][T12608] ? sock_rps_record_flow+0x19/0x3f0 [ 569.022844][T12608] ? inet_sendmsg+0x78/0x2f0 [ 569.027757][T12608] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 569.033508][T12608] ? security_socket_sendmsg+0x7c/0xa0 [ 569.039391][T12608] ? inet_send_prepare+0x260/0x260 [ 569.045127][T12608] ____sys_sendmsg+0x5be/0x970 [ 569.050042][T12608] ? __sys_sendmsg_sock+0x30/0x30 [ 569.055323][T12608] ? __import_iovec+0x315/0x500 [ 569.061116][T12608] ? import_iovec+0x6f/0xa0 [ 569.065685][T12608] ___sys_sendmsg+0x2a2/0x360 [ 569.070523][T12608] ? __sys_sendmsg+0x290/0x290 [ 569.075635][T12608] ? __lock_acquire+0x7d10/0x7d10 [ 569.081188][T12608] __se_sys_sendmsg+0x1bb/0x2a0 [ 569.086292][T12608] ? __x64_sys_sendmsg+0x80/0x80 [ 569.091649][T12608] ? lockdep_hardirqs_on+0x94/0x140 [ 569.097163][T12608] do_syscall_64+0x4c/0xa0 [ 569.101833][T12608] ? clear_bhb_loop+0x60/0xb0 [ 569.106924][T12608] ? clear_bhb_loop+0x60/0xb0 [ 569.111833][T12608] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 569.118202][T12608] RIP: 0033:0x7f58ff19c799 [ 569.123145][T12608] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 569.144279][T12608] RSP: 002b:00007f5900066028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 569.153368][T12608] RAX: ffffffffffffffda RBX: 00007f58ff415fa0 RCX: 00007f58ff19c799 [ 569.161816][T12608] RDX: 0000000000000000 RSI: 0000200000001180 RDI: 0000000000000005 [ 569.170094][T12608] RBP: 00007f5900066090 R08: 0000000000000000 R09: 0000000000000000 [ 569.178538][T12608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 569.186803][T12608] R13: 00007f58ff416038 R14: 00007f58ff415fa0 R15: 00007ffe113fd028 [ 569.195263][T12608] [ 569.421074][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 569.441062][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 569.494286][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 569.506544][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 569.530487][T12243] device veth0_vlan entered promiscuous mode [ 569.553133][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 569.572915][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 569.611861][T12243] device veth1_vlan entered promiscuous mode [ 569.765757][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 569.810823][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 569.833923][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 569.863541][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 569.897433][T12631] netlink: 146340 bytes leftover after parsing attributes in process `syz.5.2921'. [ 569.934206][T12243] device veth0_macvtap entered promiscuous mode [ 569.942474][T12631] openvswitch: netlink: Key type 386 is out of range max 32 [ 569.962526][T12630] netlink: 'syz.3.2919': attribute type 4 has an invalid length. [ 569.996004][T12243] device veth1_macvtap entered promiscuous mode [ 570.033999][T12243] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 570.044969][T12243] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 570.062797][T12243] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 570.071711][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 570.082679][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 570.092327][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 570.102019][ T8138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 570.115881][T12243] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 570.131284][T12243] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 570.148162][T12243] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 570.161224][T12243] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 570.177524][T12243] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 570.188565][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 570.200207][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 570.214780][T12243] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 570.230632][T12243] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 570.247041][T12243] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 570.259234][T12243] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 570.537712][ T8150] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 570.562506][ T8150] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 570.602325][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 570.652225][ T8150] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 570.661445][ T8150] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 570.704258][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 571.239959][T12655] FAULT_INJECTION: forcing a failure. [ 571.239959][T12655] name failslab, interval 1, probability 0, space 0, times 0 [ 571.253550][T12655] CPU: 0 PID: 12655 Comm: syz.3.2930 Not tainted syzkaller #0 [ 571.261630][T12655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 571.272360][T12655] Call Trace: [ 571.276206][T12655] [ 571.279360][T12655] dump_stack_lvl+0x188/0x24e [ 571.284283][T12655] ? show_regs_print_info+0x12/0x12 [ 571.289826][T12655] ? load_image+0x400/0x400 [ 571.294666][T12655] ? skb_network_protocol+0x525/0x780 [ 571.301074][T12655] should_fail_ex+0x399/0x4d0 [ 571.306175][T12655] should_failslab+0x5/0x20 [ 571.310898][T12655] slab_pre_alloc_hook+0x59/0x310 [ 571.316000][T12655] kmem_cache_alloc+0x56/0x2f0 [ 571.321183][T12655] ? skb_clone+0x1e7/0x370 [ 571.325673][T12655] skb_clone+0x1e7/0x370 [ 571.330159][T12655] ? dev_queue_xmit_nit+0x231/0xbb0 [ 571.335858][T12655] dev_queue_xmit_nit+0x249/0xbb0 [ 571.341372][T12655] ? dev_queue_xmit_nit+0x29/0xbb0 [ 571.346705][T12655] dev_hard_start_xmit+0x154/0x870 [ 571.352521][T12655] __dev_queue_xmit+0x1aa3/0x37c0 [ 571.358326][T12655] ? __dev_queue_xmit+0x26b/0x37c0 [ 571.363948][T12655] ? netdev_core_pick_tx+0x340/0x340 [ 571.369875][T12655] ? mark_lock+0x94/0x320 [ 571.374518][T12655] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 571.380802][T12655] ? lock_chain_count+0x20/0x20 [ 571.385963][T12655] ? ip6_finish_output2+0xba2/0x15d0 [ 571.391476][T12655] ip6_finish_output2+0xd9f/0x15d0 [ 571.396900][T12655] ? ip6_finish_output2+0x58f/0x15d0 [ 571.402491][T12655] ? nf_hook+0x390/0x390 [ 571.406868][T12655] ? ip6_send_skb+0x10b/0x380 [ 571.411764][T12655] ip6_send_skb+0x1d1/0x380 [ 571.416487][T12655] l2tp_ip6_sendmsg+0x126c/0x1670 [ 571.421580][T12655] ? l2tp_ip6_destroy_sock+0x50/0x50 [ 571.427043][T12655] ? aa_af_perm+0x340/0x340 [ 571.431759][T12655] ? tomoyo_socket_sendmsg_permission+0x212/0x2f0 [ 571.438686][T12655] ? sock_rps_record_flow+0x19/0x3f0 [ 571.444344][T12655] ? inet_sendmsg+0x78/0x2f0 [ 571.449079][T12655] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 571.454869][T12655] ? security_socket_sendmsg+0x7c/0xa0 [ 571.460766][T12655] ? inet_send_prepare+0x260/0x260 [ 571.466345][T12655] ____sys_sendmsg+0x5be/0x970 [ 571.471465][T12655] ? __sys_sendmsg_sock+0x30/0x30 [ 571.477860][T12655] ? __import_iovec+0x315/0x500 [ 571.483107][T12655] ? import_iovec+0x6f/0xa0 [ 571.487738][T12655] ___sys_sendmsg+0x2a2/0x360 [ 571.492787][T12655] ? __sys_sendmsg+0x290/0x290 [ 571.498297][T12655] ? __lock_acquire+0x7d10/0x7d10 [ 571.503869][T12655] __se_sys_sendmsg+0x1bb/0x2a0 [ 571.509323][T12655] ? __x64_sys_sendmsg+0x80/0x80 [ 571.514639][T12655] ? lockdep_hardirqs_on+0x94/0x140 [ 571.520418][T12655] do_syscall_64+0x4c/0xa0 [ 571.525378][T12655] ? clear_bhb_loop+0x60/0xb0 [ 571.530282][T12655] ? clear_bhb_loop+0x60/0xb0 [ 571.535109][T12655] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 571.541128][T12655] RIP: 0033:0x7f028619c799 [ 571.545780][T12655] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 571.566494][T12655] RSP: 002b:00007f02870ba028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 571.575034][T12655] RAX: ffffffffffffffda RBX: 00007f0286415fa0 RCX: 00007f028619c799 [ 571.583420][T12655] RDX: 0000000000000000 RSI: 0000200000001180 RDI: 0000000000000005 [ 571.591950][T12655] RBP: 00007f02870ba090 R08: 0000000000000000 R09: 0000000000000000 [ 571.600692][T12655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 571.609138][T12655] R13: 00007f0286416038 R14: 00007f0286415fa0 R15: 00007ffc95846ef8 [ 571.617247][T12655] [ 572.454369][T12670] netlink: 'syz.2.2933': attribute type 4 has an invalid length. [ 573.009954][ T4280] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 573.020290][ T4280] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 573.029360][ T4280] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 573.051520][ T4280] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 573.068404][ T4280] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 573.080524][ T4280] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 573.584403][ T8154] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 573.648951][T12689] netlink: 15999 bytes leftover after parsing attributes in process `syz.3.2940'. [ 573.795155][ T8154] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 574.030892][ T8154] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 574.240873][ T8154] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 574.315192][T12703] netlink: 'syz.2.2945': attribute type 4 has an invalid length. [ 574.448910][T12672] chnl_net:caif_netlink_parms(): no params data found [ 575.185846][T12244] Bluetooth: hci4: command 0x0409 tx timeout [ 575.731927][T12672] bridge0: port 1(bridge_slave_0) entered blocking state [ 575.755707][T12672] bridge0: port 1(bridge_slave_0) entered disabled state [ 575.789919][T12672] device bridge_slave_0 entered promiscuous mode [ 575.816748][T12672] bridge0: port 2(bridge_slave_1) entered blocking state [ 575.824425][T12672] bridge0: port 2(bridge_slave_1) entered disabled state [ 575.846291][T12672] device bridge_slave_1 entered promiscuous mode [ 576.003683][T12672] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 576.109383][T12672] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 576.139926][ T8154] device 0 left promiscuous mode [ 576.383435][T12672] team0: Port device team_slave_0 added [ 576.404880][T12672] team0: Port device team_slave_1 added [ 576.432302][ T8154] tipc: Left network mode [ 576.717019][T12672] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 576.734713][T12672] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 576.851949][T12672] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 576.888014][T12672] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 576.914825][T12672] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 576.987347][T12672] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 577.102538][T12741] netlink: 'syz.5.2958': attribute type 4 has an invalid length. [ 577.269983][T12244] Bluetooth: hci4: command 0x041b tx timeout [ 577.385749][T12672] device hsr_slave_0 entered promiscuous mode [ 577.406340][T12672] device hsr_slave_1 entered promiscuous mode [ 577.420720][T12672] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 577.445651][T12672] Cannot create hsr debugfs directory [ 577.709101][T12769] netlink: 154788 bytes leftover after parsing attributes in process `syz.3.2964'. [ 577.754383][T12769] openvswitch: netlink: Message has 48126 unknown bytes. [ 578.760254][ T8154] device erspan0 left promiscuous mode [ 578.776582][ T8154] GPL: port 1(erspan0) entered disabled state [ 578.833260][T12784] netlink: 'syz.5.2966': attribute type 4 has an invalid length. [ 579.345636][T12244] Bluetooth: hci4: command 0x040f tx timeout [ 580.000855][ T8154] team0: Port device wlan1 removed [ 580.566737][ T8154] device hsr_slave_0 left promiscuous mode [ 580.582215][ T8154] device hsr_slave_1 left promiscuous mode [ 580.614334][ T8154] device dummy0 left promiscuous mode [ 580.624517][ T8154] bridge0: port 3(dummy0) entered disabled state [ 580.657037][ T8154] device bridge_slave_1 left promiscuous mode [ 580.663362][ T8154] bridge0: port 2(bridge_slave_1) entered disabled state [ 580.906504][ T8154] device bridge_slave_0 left promiscuous mode [ 580.913724][ T8154] bridge0: port 1(bridge_slave_0) entered disabled state [ 580.940568][ T8154] device veth1_vlan left promiscuous mode [ 581.425820][T12244] Bluetooth: hci4: command 0x0419 tx timeout [ 581.651431][ T8154] team0 (unregistering): Port device team_slave_1 removed [ 581.702761][ T8154] team0 (unregistering): Port device team_slave_0 removed [ 581.759037][ T8154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 581.813089][ T8154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 582.166603][ T8154] bond0 (unregistering): Released all slaves [ 582.650803][T12672] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 582.744144][T12672] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 582.774279][T12672] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 582.824204][T12672] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 583.219059][T12869] netlink: 'syz.5.2987': attribute type 3 has an invalid length. [ 583.235362][T12869] netlink: 105116 bytes leftover after parsing attributes in process `syz.5.2987'. [ 583.527080][T12672] 8021q: adding VLAN 0 to HW filter on device bond0 [ 583.539380][T12878] netlink: 16222 bytes leftover after parsing attributes in process `syz.4.2990'. [ 583.579739][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 583.600002][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 583.642836][T12672] 8021q: adding VLAN 0 to HW filter on device team0 [ 583.668223][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 583.711463][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 583.732130][ T8160] bridge0: port 1(bridge_slave_0) entered blocking state [ 583.739918][ T8160] bridge0: port 1(bridge_slave_0) entered forwarding state [ 583.969726][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 584.006619][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 584.046839][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 584.097836][ T8160] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.105279][ T8160] bridge0: port 2(bridge_slave_1) entered forwarding state [ 584.200971][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 584.264873][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 584.332720][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 584.370531][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 584.413612][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 584.528656][ T8140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 584.547793][ T8140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 584.596573][ T8140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 584.631818][ T8140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 584.680728][T12672] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 584.733595][ T8140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 584.754630][ T8140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 586.212670][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 586.237186][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 586.277658][T12672] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 586.582325][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 586.617020][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 586.654536][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 586.664964][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 586.687868][T12672] device veth0_vlan entered promiscuous mode [ 586.699867][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 586.720433][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 586.747661][T12672] device veth1_vlan entered promiscuous mode [ 586.811618][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 586.830959][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 586.842369][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 586.861839][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 586.877367][T12672] device veth0_macvtap entered promiscuous mode [ 586.901558][T12672] device veth1_macvtap entered promiscuous mode [ 586.963014][T12672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 586.990375][T12672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 587.034375][T12672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 587.140688][T12672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 587.211686][T12672] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 587.252835][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 587.282760][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 587.320845][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 587.384584][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 587.448603][T12672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 587.477493][T12672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 587.503007][T12672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 587.565417][T12672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 587.602985][T12672] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 587.624919][T12672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 587.678473][T12672] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 587.745940][T12977] netlink: 'syz.5.3012': attribute type 2 has an invalid length. [ 587.785813][T12977] netlink: 'syz.5.3012': attribute type 11 has an invalid length. [ 587.825715][T12977] netlink: 132 bytes leftover after parsing attributes in process `syz.5.3012'. [ 587.904199][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 587.941354][ T8160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 587.982037][T12672] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 588.005733][T12672] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 588.071181][T12672] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 588.085291][T12672] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 588.451085][ T8140] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 588.467077][ T8140] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 588.527542][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 589.189571][T12998] netlink: 16186 bytes leftover after parsing attributes in process `syz.4.3017'. [ 589.265403][T12999] netlink: 'syz.2.3018': attribute type 21 has an invalid length. [ 589.375086][T12999] netlink: 'syz.2.3018': attribute type 10 has an invalid length. [ 589.500221][T12999] netlink: 'syz.2.3018': attribute type 12 has an invalid length. [ 589.546224][T12999] netlink: 'syz.2.3018': attribute type 13 has an invalid length. [ 589.613810][T12999] netlink: 'syz.2.3018': attribute type 14 has an invalid length. [ 589.664021][T12999] netlink: 'syz.2.3018': attribute type 15 has an invalid length. [ 589.746186][T12999] netlink: 'syz.2.3018': attribute type 16 has an invalid length. [ 589.834809][T12999] netlink: 'syz.2.3018': attribute type 19 has an invalid length. [ 589.888425][T12999] netlink: 'syz.2.3018': attribute type 21 has an invalid length. [ 589.942261][T12999] netlink: 'syz.2.3018': attribute type 22 has an invalid length. [ 589.986269][T12999] netlink: 12226 bytes leftover after parsing attributes in process `syz.2.3018'. [ 590.055756][ T8152] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 590.072144][ T8152] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 590.114802][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 590.854100][T13037] IPv6: Can't replace route, no match found [ 590.865865][ T4280] Bluetooth: hci1: command 0x0406 tx timeout [ 590.962390][T13039] mac80211_hwsim hwsim17 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 591.160498][T13037] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3026'. [ 591.966945][T12244] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 591.978484][T12244] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 592.012141][T12244] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 592.021504][ T4283] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 592.029403][ T4283] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 592.037269][ T4283] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 592.888971][T13078] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3036'. [ 593.206157][ T8146] wlan1: Trigger new scan to find an IBSS to join [ 594.082137][T13056] chnl_net:caif_netlink_parms(): no params data found [ 594.161734][T12244] Bluetooth: hci0: command 0x0409 tx timeout [ 594.456444][T13056] bridge0: port 1(bridge_slave_0) entered blocking state [ 594.484332][T13056] bridge0: port 1(bridge_slave_0) entered disabled state [ 594.504230][T13056] device bridge_slave_0 entered promiscuous mode [ 594.585940][T13056] bridge0: port 2(bridge_slave_1) entered blocking state [ 594.593847][T13056] bridge0: port 2(bridge_slave_1) entered disabled state [ 594.696612][T13056] device bridge_slave_1 entered promiscuous mode [ 594.863706][T13126] device syzkaller0 entered promiscuous mode [ 594.940141][T13056] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 594.981059][T13056] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 596.231307][T12244] Bluetooth: hci0: command 0x041b tx timeout [ 597.120819][ T8105] wlan1: Trigger new scan to find an IBSS to join [ 598.017863][ T8154] wlan1: Creating new IBSS network, BSSID ee:f0:5a:26:48:e3 [ 598.305625][T12244] Bluetooth: hci0: command 0x040f tx timeout [ 598.322685][T13146] validate_nla: 3 callbacks suppressed [ 598.322700][T13146] netlink: 'syz.1.3053': attribute type 4 has an invalid length. [ 598.345025][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 598.434854][T13056] team0: Port device team_slave_0 added [ 598.498077][T13056] team0: Port device team_slave_1 added [ 598.584835][T13056] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 598.610006][T13056] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 598.742024][T13056] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 598.796036][T13056] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 598.803187][T13056] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 598.957723][T13056] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 599.136009][T13056] device hsr_slave_0 entered promiscuous mode [ 599.156296][T13056] device hsr_slave_1 entered promiscuous mode [ 599.193118][T13056] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 599.255645][T13056] Cannot create hsr debugfs directory [ 599.448957][T13186] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3066'. [ 599.464013][T13186] netlink: 152 bytes leftover after parsing attributes in process `syz.5.3066'. [ 599.551033][T13189] netlink: 122896 bytes leftover after parsing attributes in process `syz.5.3066'. [ 600.006715][T13196] netlink: 'syz.4.3068': attribute type 4 has an invalid length. [ 600.218405][T13056] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 600.385755][T12244] Bluetooth: hci0: command 0x0419 tx timeout [ 600.867799][T13211] netlink: 'syz.2.3071': attribute type 4 has an invalid length. [ 602.088190][T13056] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 602.294941][T13056] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 603.247781][T13236] netlink: 65039 bytes leftover after parsing attributes in process `syz.2.3083'. [ 603.269894][T13231] netlink: 20 bytes leftover after parsing attributes in process `syz.5.3079'. [ 603.448692][T13056] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 603.952923][T13056] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 604.014239][T13056] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 604.125330][T13056] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 604.169431][T13056] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 604.468086][T13056] 8021q: adding VLAN 0 to HW filter on device bond0 [ 604.534081][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 604.567566][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 604.611591][T13056] 8021q: adding VLAN 0 to HW filter on device team0 [ 604.656415][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 604.693700][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 604.747517][ T8154] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.755013][ T8154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 604.828996][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 605.035331][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 605.054803][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 605.156943][ T8105] bridge0: port 2(bridge_slave_1) entered blocking state [ 605.164126][ T8105] bridge0: port 2(bridge_slave_1) entered forwarding state [ 605.196326][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 605.217456][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 605.259294][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 605.286003][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 605.306859][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 605.334332][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 605.436554][T13056] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 605.506185][T13056] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 605.537541][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 605.582319][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 605.633951][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 605.677552][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 605.703574][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 605.721497][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 605.803491][T13309] netlink: 'syz.5.3101': attribute type 4 has an invalid length. [ 606.561249][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 606.576788][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 606.610228][T13056] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 606.691533][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 606.701679][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 606.777939][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 606.798111][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 606.831695][T13056] device veth0_vlan entered promiscuous mode [ 606.868172][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 606.883594][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 606.914733][T13056] device veth1_vlan entered promiscuous mode [ 607.003625][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 607.021049][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 607.059949][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 607.081778][ T8105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 607.129320][T13056] device veth0_macvtap entered promiscuous mode [ 607.164233][T13056] device veth1_macvtap entered promiscuous mode [ 607.281597][T13056] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 607.301638][T13056] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 607.316223][T13056] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 607.339764][T13056] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 607.363234][T13056] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 607.374498][T13056] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 607.424741][T13056] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 607.434404][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 607.454924][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 607.464378][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 607.487445][ T8150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 607.537712][T13056] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 607.575530][T13056] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 607.622295][T13056] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 607.671506][T13056] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 607.691237][T13056] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 607.727381][T13056] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 607.779241][T13056] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 607.815508][T13056] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 607.858686][T13056] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 607.916477][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 607.955954][ T8152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 608.001361][T13056] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 608.060623][T13056] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 608.156326][T13056] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 608.195996][T13056] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 610.229443][T13358] netlink: 'syz.1.3118': attribute type 4 has an invalid length. [ 610.607177][T13366] netlink: 'syz.2.3120': attribute type 3 has an invalid length. [ 610.615355][T13366] netlink: 105116 bytes leftover after parsing attributes in process `syz.2.3120'. [ 610.728781][T13375] netlink: 'syz.2.3120': attribute type 1 has an invalid length. [ 610.748473][T13375] netlink: 112865 bytes leftover after parsing attributes in process `syz.2.3120'. [ 610.800050][T13371] netlink: 4595 bytes leftover after parsing attributes in process `syz.4.3122'. [ 610.903031][ T8146] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 610.952153][ T8146] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 611.174837][ T8154] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 611.313738][ T8105] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 611.343024][ T8105] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 611.406679][ T8146] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 611.512557][T13387] netlink: 'syz.5.3128': attribute type 3 has an invalid length. [ 611.563030][T13387] netlink: 105116 bytes leftover after parsing attributes in process `syz.5.3128'. [ 611.711349][T13393] netlink: 'syz.1.3130': attribute type 46 has an invalid length. [ 611.782738][T13393] netlink: 36 bytes leftover after parsing attributes in process `syz.1.3130'. [ 612.715847][T13402] delete_channel: no stack [ 612.808763][T13415] netlink: 'syz.2.3135': attribute type 21 has an invalid length. [ 612.841532][T13415] IPv6: NLM_F_CREATE should be specified when creating new route [ 612.868020][T13415] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 612.876200][T13415] IPv6: NLM_F_CREATE should be set when creating new route [ 612.883919][T13415] IPv6: NLM_F_CREATE should be set when creating new route [ 612.891535][T13415] IPv6: NLM_F_CREATE should be set when creating new route [ 613.186073][T13424] netlink: 176 bytes leftover after parsing attributes in process `syz.5.3133'. [ 613.697290][ T8140] bridge0: port 1(team0) entered disabled state [ 613.776379][ T8140] device hsr_slave_0 left promiscuous mode [ 613.880186][ T8140] device hsr_slave_1 left promiscuous mode [ 613.935691][ T8140] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 614.048055][ T8140] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 614.108432][ T8140] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 614.126036][ T8140] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 614.221907][ T8140] device veth1_macvtap left promiscuous mode [ 614.236729][ T8140] device veth0_macvtap left promiscuous mode [ 614.266290][ T8140] device veth1_vlan left promiscuous mode [ 614.293521][ T8140] device veth0_vlan left promiscuous mode [ 616.192795][ T8140] device team_slave_1 left promiscuous mode [ 616.203131][ T8140] team0 (unregistering): Port device team_slave_1 removed [ 616.271226][ T8140] device team_slave_0 left promiscuous mode [ 616.281409][ T8140] team0 (unregistering): Port device team_slave_0 removed [ 616.859450][T13457] netlink: 'syz.3.3148': attribute type 13 has an invalid length. [ 616.878195][T13457] netlink: 24643 bytes leftover after parsing attributes in process `syz.3.3148'. [ 617.198935][T13484] netlink: 'syz.3.3156': attribute type 11 has an invalid length. [ 617.257385][T13484] netlink: 168 bytes leftover after parsing attributes in process `syz.3.3156'. [ 618.053555][T13494] netlink: 'syz.2.3159': attribute type 17 has an invalid length. [ 618.075660][T13494] netlink: 'syz.2.3159': attribute type 41 has an invalid length. [ 618.084183][T13494] netlink: 152 bytes leftover after parsing attributes in process `syz.2.3159'. [ 620.659522][T13538] netlink: 'syz.1.3173': attribute type 39 has an invalid length. [ 622.422454][T13571] netlink: 55631 bytes leftover after parsing attributes in process `syz.5.3184'. [ 622.712776][T13578] FAULT_INJECTION: forcing a failure. [ 622.712776][T13578] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 622.726708][T13578] CPU: 0 PID: 13578 Comm: syz.5.3188 Not tainted syzkaller #0 [ 622.734489][T13578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 622.744693][T13578] Call Trace: [ 622.748035][T13578] [ 622.751025][T13578] dump_stack_lvl+0x188/0x24e [ 622.756063][T13578] ? show_regs_print_info+0x12/0x12 [ 622.761856][T13578] ? load_image+0x400/0x400 [ 622.766694][T13578] ? __lock_acquire+0x7d10/0x7d10 [ 622.772247][T13578] should_fail_ex+0x399/0x4d0 [ 622.777307][T13578] _copy_from_user+0x2c/0x170 [ 622.782361][T13578] ___sys_sendmsg+0x1c3/0x360 [ 622.787660][T13578] ? __sys_sendmsg+0x290/0x290 [ 622.793156][T13578] ? __lock_acquire+0x7d10/0x7d10 [ 622.798721][T13578] __se_sys_sendmsg+0x1bb/0x2a0 [ 622.804213][T13578] ? __x64_sys_sendmsg+0x80/0x80 [ 622.809505][T13578] ? lockdep_hardirqs_on+0x94/0x140 [ 622.815170][T13578] do_syscall_64+0x4c/0xa0 [ 622.819925][T13578] ? clear_bhb_loop+0x60/0xb0 [ 622.824852][T13578] ? clear_bhb_loop+0x60/0xb0 [ 622.829624][T13578] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 622.835616][T13578] RIP: 0033:0x7f58ff19c799 [ 622.840527][T13578] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 622.860887][T13578] RSP: 002b:00007f5900066028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 622.869503][T13578] RAX: ffffffffffffffda RBX: 00007f58ff415fa0 RCX: 00007f58ff19c799 [ 622.877976][T13578] RDX: 00000000000080d1 RSI: 0000200000000140 RDI: 0000000000000003 [ 622.886265][T13578] RBP: 00007f5900066090 R08: 0000000000000000 R09: 0000000000000000 [ 622.894459][T13578] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 622.902598][T13578] R13: 00007f58ff416038 R14: 00007f58ff415fa0 R15: 00007ffe113fd028 [ 622.911756][T13578] [ 623.451702][T13592] netlink: 'syz.1.3193': attribute type 39 has an invalid length. [ 623.533958][T13599] netlink: 13695 bytes leftover after parsing attributes in process `syz.1.3193'. [ 624.014348][T13592] device hsr_slave_1 left promiscuous mode [ 624.441243][T13611] FAULT_INJECTION: forcing a failure. [ 624.441243][T13611] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 624.461314][T13609] netlink: 'syz.3.3199': attribute type 21 has an invalid length. [ 624.485319][T13609] netlink: 'syz.3.3199': attribute type 20 has an invalid length. [ 624.499177][T13611] CPU: 0 PID: 13611 Comm: syz.4.3200 Not tainted syzkaller #0 [ 624.507160][T13611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 624.517795][T13611] Call Trace: [ 624.521580][T13611] [ 624.524840][T13611] dump_stack_lvl+0x188/0x24e [ 624.530042][T13611] ? show_regs_print_info+0x12/0x12 [ 624.535487][T13611] ? load_image+0x400/0x400 [ 624.540141][T13611] ? __lock_acquire+0x7d10/0x7d10 [ 624.545324][T13611] should_fail_ex+0x399/0x4d0 [ 624.550338][T13611] _copy_from_user+0x2c/0x170 [ 624.555253][T13611] __copy_msghdr+0x3b7/0x580 [ 624.560162][T13611] ___sys_sendmsg+0x210/0x360 [ 624.565207][T13611] ? __sys_sendmsg+0x290/0x290 [ 624.570251][T13611] ? __lock_acquire+0x7d10/0x7d10 [ 624.575621][T13611] __se_sys_sendmsg+0x1bb/0x2a0 [ 624.581166][T13611] ? __x64_sys_sendmsg+0x80/0x80 [ 624.586282][T13611] ? lockdep_hardirqs_on+0x94/0x140 [ 624.591839][T13611] do_syscall_64+0x4c/0xa0 [ 624.596407][T13611] ? clear_bhb_loop+0x60/0xb0 [ 624.601350][T13611] ? clear_bhb_loop+0x60/0xb0 [ 624.606413][T13611] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 624.612656][T13611] RIP: 0033:0x7fdff5b9c799 [ 624.617561][T13611] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 624.637837][T13611] RSP: 002b:00007fdff69b4028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 624.646774][T13611] RAX: ffffffffffffffda RBX: 00007fdff5e15fa0 RCX: 00007fdff5b9c799 [ 624.654981][T13611] RDX: 00000000000080d1 RSI: 0000200000000140 RDI: 0000000000000003 [ 624.663450][T13611] RBP: 00007fdff69b4090 R08: 0000000000000000 R09: 0000000000000000 [ 624.671741][T13611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 624.680375][T13611] R13: 00007fdff5e16038 R14: 00007fdff5e15fa0 R15: 00007ffdf244ce28 [ 624.688679][T13611] [ 624.757095][T13609] netlink: 'syz.3.3199': attribute type 10 has an invalid length. [ 624.797140][T13609] device veth0_macvtap left promiscuous mode [ 625.501173][T13628] netlink: 'syz.2.3203': attribute type 4 has an invalid length. [ 628.093593][ T8152] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 628.968352][T13667] netlink: 'syz.3.3214': attribute type 9 has an invalid length. [ 629.021716][T13667] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.3214'. [ 629.750904][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 629.757925][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 629.885529][T13686] netlink: 'syz.3.3222': attribute type 4 has an invalid length. [ 630.138796][T13691] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3224'. [ 630.274873][T13689] netlink: 'syz.2.3223': attribute type 39 has an invalid length. [ 631.523600][T13740] netlink: 'syz.5.3236': attribute type 4 has an invalid length. [ 632.355038][T13758] netlink: 14 bytes leftover after parsing attributes in process `syz.5.3246'. [ 632.441591][T13758] openvswitch: netlink: Flow key attr not present in new flow. [ 632.664455][T13765] netlink: 'syz.3.3248': attribute type 39 has an invalid length. [ 633.221517][T13778] netlink: 60 bytes leftover after parsing attributes in process `syz.4.3252'. [ 633.693152][T13777] netlink: 'syz.2.3250': attribute type 10 has an invalid length. [ 633.713475][T13778] netlink: 60 bytes leftover after parsing attributes in process `syz.4.3252'. [ 633.759259][T13784] netlink: 'syz.5.3253': attribute type 4 has an invalid length. [ 633.768703][T13780] netlink: 60 bytes leftover after parsing attributes in process `syz.4.3252'. [ 634.412668][T13795] device syzkaller0 entered promiscuous mode [ 637.864712][T13830] netlink: 'syz.3.3267': attribute type 3 has an invalid length. [ 637.995568][T13830] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.3267'. [ 638.106450][T13838] netlink: 'syz.1.3268': attribute type 4 has an invalid length. [ 638.341095][T13841] device syzkaller0 entered promiscuous mode [ 638.703391][T13851] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3275'. [ 644.175561][T13871] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 644.183312][T13871] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 644.226313][T13871] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 644.233989][T13871] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 645.642412][T13897] netlink: 'syz.4.3290': attribute type 9 has an invalid length. [ 645.735592][T13897] netlink: 399 bytes leftover after parsing attributes in process `syz.4.3290'. [ 647.448141][T13941] netlink: 'syz.4.3304': attribute type 3 has an invalid length. [ 647.461030][T13942] netlink: 'syz.1.3302': attribute type 21 has an invalid length. [ 647.526465][T13941] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.3304'. [ 647.541712][T13942] netlink: 156 bytes leftover after parsing attributes in process `syz.1.3302'. [ 647.695944][T13951] syzkaller1: tun_chr_ioctl cmd 1074025694 [ 647.746253][T13951] syzkaller1: tun_chr_ioctl cmd 1074812117 [ 647.932143][T13946] netlink: 127868 bytes leftover after parsing attributes in process `syz.5.3306'. [ 648.005649][T13946] netlink: 'syz.5.3306': attribute type 3 has an invalid length. [ 648.151748][T13946] netlink: 105116 bytes leftover after parsing attributes in process `syz.5.3306'. [ 651.339412][T13973] delete_channel: no stack [ 652.258321][T14002] device veth1_macvtap left promiscuous mode [ 652.288317][T14002] device macsec0 entered promiscuous mode [ 653.288005][T14019] device syzkaller0 entered promiscuous mode [ 658.225019][T14026] netlink: 'syz.4.3327': attribute type 22 has an invalid length. [ 658.234157][T14026] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3327'. [ 658.244610][T14043] netlink: 'syz.1.3330': attribute type 4 has an invalid length. [ 659.120352][T14106] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 659.874480][T14171] netlink: 'syz.5.3348': attribute type 4 has an invalid length. [ 660.536926][T14193] netlink: 14601 bytes leftover after parsing attributes in process `syz.5.3358'. [ 660.572038][T14194] netlink: 14 bytes leftover after parsing attributes in process `syz.5.3358'. [ 660.795742][T14194] device hsr_slave_0 left promiscuous mode [ 660.863795][T14197] netlink: 2639 bytes leftover after parsing attributes in process `syz.1.3359'. [ 661.007741][T14195] netlink: 14 bytes leftover after parsing attributes in process `syz.5.3358'. [ 661.308966][T14214] netlink: 'syz.5.3364': attribute type 1 has an invalid length. [ 662.105923][T14240] netlink: 'syz.2.3370': attribute type 4 has an invalid length. [ 663.519927][T14258] netlink: 'syz.3.3378': attribute type 10 has an invalid length. [ 663.562550][T14258] netlink: 65015 bytes leftover after parsing attributes in process `syz.3.3378'. [ 663.614425][T14259] netlink: 'syz.4.3379': attribute type 41 has an invalid length. [ 664.179116][T14267] syzkaller0: tun_chr_ioctl cmd 2148553947 [ 665.482069][T14282] netlink: 132 bytes leftover after parsing attributes in process `syz.4.3388'. [ 665.817592][T14291] device veth1_macvtap left promiscuous mode [ 665.858615][T14291] device macsec0 entered promiscuous mode [ 666.128611][T14295] netlink: 'syz.1.3394': attribute type 27 has an invalid length. [ 666.172536][T14295] netlink: 'syz.1.3394': attribute type 4 has an invalid length. [ 666.210094][T14295] netlink: 152 bytes leftover after parsing attributes in process `syz.1.3394'. [ 666.653440][T14301] netlink: 'syz.4.3395': attribute type 21 has an invalid length. [ 666.675820][T14301] netlink: 164 bytes leftover after parsing attributes in process `syz.4.3395'. [ 667.188826][T14310] netlink: 14 bytes leftover after parsing attributes in process `syz.2.3397'. [ 667.292043][T14310] device hsr_slave_0 left promiscuous mode [ 667.539978][T14324] netlink: 'syz.1.3401': attribute type 21 has an invalid length. [ 667.878902][T14332] device syzkaller0 entered promiscuous mode [ 668.130235][T14343] netlink: 'syz.2.3409': attribute type 21 has an invalid length. [ 668.141681][T14343] netlink: 'syz.2.3409': attribute type 2 has an invalid length. [ 668.162889][T14343] netlink: 132 bytes leftover after parsing attributes in process `syz.2.3409'. [ 668.174715][T14349] netlink: 'syz.5.3411': attribute type 10 has an invalid length. [ 668.733226][T14349] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.741031][T14349] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.769084][T14349] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.776663][T14349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 668.784625][T14349] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.792133][T14349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 668.827684][T14349] device bridge0 entered promiscuous mode [ 668.834712][T14349] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 668.844415][T14350] netlink: 'syz.5.3411': attribute type 10 has an invalid length. [ 668.859209][T14350] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.866808][T14350] bridge0: port 1(bridge_slave_0) entered disabled state [ 669.348215][T14377] sock: sock_set_timeout: `syz.4.3416' (pid 14377) tries to set negative timeout [ 671.476214][T14370] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 672.785953][ T4283] Bluetooth: hci2: command 0x0406 tx timeout [ 673.217363][T14430] netlink: 'syz.5.3432': attribute type 10 has an invalid length. [ 673.598558][T14445] netlink: 65047 bytes leftover after parsing attributes in process `syz.3.3441'. [ 675.353413][T14478] netlink: 'syz.2.3452': attribute type 21 has an invalid length. [ 675.379755][T14478] netlink: 'syz.2.3452': attribute type 20 has an invalid length. [ 677.334826][T14494] netlink: 'syz.1.3456': attribute type 2 has an invalid length. [ 677.384392][T14495] netlink: 'syz.2.3455': attribute type 9 has an invalid length. [ 677.416421][T14494] netlink: 10 bytes leftover after parsing attributes in process `syz.1.3456'. [ 677.445350][T14495] netlink: 379 bytes leftover after parsing attributes in process `syz.2.3455'. [ 678.514748][T14517] device macsec0 left promiscuous mode [ 679.085082][T14534] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3467'. [ 679.181314][T14534] tc_dump_action: action bad kind [ 679.858157][T14545] netlink: 'syz.3.3469': attribute type 4 has an invalid length. [ 680.650623][T14562] netlink: 'syz.3.3473': attribute type 1 has an invalid length. [ 680.680826][T14562] netlink: 15998 bytes leftover after parsing attributes in process `syz.3.3473'. [ 681.060290][T14581] netlink: 4079 bytes leftover after parsing attributes in process `syz.1.3489'. [ 681.164672][T14586] netlink: 'syz.2.3480': attribute type 29 has an invalid length. [ 681.505378][T14586] netlink: 'syz.2.3480': attribute type 29 has an invalid length. [ 681.521442][T14588] netlink: 'syz.2.3480': attribute type 29 has an invalid length. [ 681.538212][T14591] netlink: 'syz.2.3480': attribute type 29 has an invalid length. [ 681.911548][T14593] netlink: 'syz.2.3480': attribute type 29 has an invalid length. [ 682.581262][T14604] netlink: 'syz.1.3483': attribute type 3 has an invalid length. [ 682.599678][T14604] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.3483'. [ 683.194908][T14609] netlink: 'syz.4.3485': attribute type 39 has an invalid length. [ 683.641546][T14615] netlink: 'syz.2.3484': attribute type 4 has an invalid length. [ 684.498977][T14639] netlink: 'syz.5.3492': attribute type 4 has an invalid length. [ 686.180917][T14669] netlink: 122896 bytes leftover after parsing attributes in process `syz.4.3503'. [ 686.585272][T14681] validate_nla: 2 callbacks suppressed [ 686.585295][T14681] netlink: 'syz.5.3504': attribute type 4 has an invalid length. [ 687.807640][T14711] netlink: 'syz.5.3512': attribute type 9 has an invalid length. [ 687.835955][T14711] netlink: 379 bytes leftover after parsing attributes in process `syz.5.3512'. [ 690.156729][T14097] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 691.189473][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 691.196402][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 692.727227][T14763] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.3530'. [ 693.538707][T14778] netlink: 'syz.1.3532': attribute type 4 has an invalid length. [ 696.495499][T14819] netlink: 'syz.4.3543': attribute type 4 has an invalid length. [ 696.827325][T14822] netlink: 'syz.3.3544': attribute type 10 has an invalid length. [ 697.013553][T14822] team0: Port device wlan1 added [ 697.587912][T14831] netlink: 64019 bytes leftover after parsing attributes in process `syz.4.3547'. [ 697.790083][T14791] ------------[ cut here ]------------ [ 697.796175][T14791] WARNING: CPU: 1 PID: 14791 at kernel/events/core.c:6592 perf_pending_task+0x358/0x470 [ 697.806598][T14791] Modules linked in: [ 697.810812][T14791] CPU: 1 PID: 14791 Comm: syz.5.3537 Not tainted syzkaller #0 [ 697.818608][T14791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 697.829565][T14791] RIP: 0010:perf_pending_task+0x358/0x470 [ 697.835951][T14791] Code: ff 84 db 75 14 e8 e8 7f da ff 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d4 7f da ff e8 d7 90 58 ff eb e5 e8 c8 7f da ff <0f> 0b e9 f3 fe ff ff e8 bc 7f da ff 48 c7 c7 50 2d bc 8c 4c 89 f6 [ 697.856389][T14791] RSP: 0018:ffffc9000477f8e0 EFLAGS: 00010293 [ 697.862730][T14791] RAX: ffffffff81a7f2e8 RBX: ffff8880280c5858 RCX: ffff88802a1b9dc0 [ 697.871088][T14791] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 697.879442][T14791] RBP: 0000000000000001 R08: ffff88802a1ba7c3 R09: 1ffff110054374f8 [ 697.887793][T14791] R10: dffffc0000000000 R11: ffffed10054374f9 R12: ffff88802a1b9dc0 [ 697.896052][T14791] R13: ffff8880563d5960 R14: ffff8880280c5620 R15: 1ffff11005018ac4 [ 697.904602][T14791] FS: 0000000000000000(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 [ 697.913643][T14791] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 697.920605][T14791] CR2: 00007f9cfa936a10 CR3: 000000005bc11000 CR4: 00000000003506e0 [ 697.929163][T14791] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 697.937610][T14791] DR3: 0000000000000000 DR6: 00000000ffff0ff1 DR7: 0000000000000600 [ 697.945864][T14791] Call Trace: [ 697.949282][T14791] [ 697.952357][T14791] task_work_run+0x1d0/0x260 [ 697.957700][T14791] ? task_work_cancel+0x220/0x220 [ 697.962793][T14791] ? do_raw_spin_unlock+0x11d/0x230 [ 697.968281][T14791] do_exit+0x982/0x2480 [ 697.972519][T14791] ? lock_chain_count+0x20/0x20 [ 697.977572][T14791] ? put_task_struct+0x80/0x80 [ 697.982504][T14791] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 697.988958][T14791] ? lockdep_hardirqs_on+0x94/0x140 [ 697.994858][T14791] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 698.001259][T14791] do_group_exit+0x217/0x2d0 [ 698.006056][T14791] ? _raw_spin_unlock_irq+0x25/0x40 [ 698.011508][T14791] get_signal+0x1272/0x1350 [ 698.016861][T14791] arch_do_signal_or_restart+0xc4/0x1350 [ 698.022751][T14791] ? perf_trace_run_bpf_submit+0x124/0x1c0 [ 698.028818][T14791] ? perf_trace_preemptirq_template+0x268/0x320 [ 698.035141][T14791] ? irqentry_enter+0x33/0x50 [ 698.039934][T14791] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 698.046126][T14791] ? get_sigframe_size+0x10/0x10 [ 698.051309][T14791] ? lock_chain_count+0x20/0x20 [ 698.056481][T14791] ? rcu_is_watching+0x11/0xa0 [ 698.061429][T14791] exit_to_user_mode_loop+0x70/0x110 [ 698.066961][T14791] exit_to_user_mode_prepare+0xee/0x180 [ 698.072948][T14791] syscall_exit_to_user_mode+0x16/0x40 [ 698.079094][T14791] do_syscall_64+0x58/0xa0 [ 698.083756][T14791] ? clear_bhb_loop+0x60/0xb0 [ 698.088898][T14791] ? clear_bhb_loop+0x60/0xb0 [ 698.094003][T14791] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 698.100631][T14791] RIP: 0033:0x7f58ff19c799 [ 698.105383][T14791] Code: Unable to access opcode bytes at 0x7f58ff19c76f. [ 698.112863][T14791] RSP: 002b:00007f59000660e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 698.121571][T14791] RAX: fffffffffffffe00 RBX: 00007f58ff415fa8 RCX: 00007f58ff19c799 [ 698.130021][T14791] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f58ff415fa8 [ 698.138220][T14791] RBP: 00007f58ff415fa0 R08: 0000000000000000 R09: 0000000000000000 [ 698.146493][T14791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 698.154790][T14791] R13: 00007f58ff416038 R14: 00007ffe113fcf40 R15: 00007ffe113fd028 [ 698.163014][T14791] [ 698.166221][T14791] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 698.173815][T14791] CPU: 1 PID: 14791 Comm: syz.5.3537 Not tainted syzkaller #0 [ 698.181400][T14791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 698.191689][T14791] Call Trace: [ 698.195107][T14791] [ 698.198281][T14791] dump_stack_lvl+0x188/0x24e [ 698.203527][T14791] ? memcpy+0x3c/0x60 [ 698.207815][T14791] ? show_regs_print_info+0x12/0x12 [ 698.213152][T14791] ? load_image+0x400/0x400 [ 698.217868][T14791] panic+0x2e5/0x730 [ 698.221883][T14791] ? bpf_jit_dump+0xd0/0xd0 [ 698.226903][T14791] __warn+0x2f8/0x4f0 [ 698.231188][T14791] ? perf_pending_task+0x358/0x470 [ 698.236974][T14791] ? perf_pending_task+0x358/0x470 [ 698.242702][T14791] report_bug+0x2ba/0x4f0 [ 698.247445][T14791] ? perf_pending_task+0x358/0x470 [ 698.252780][T14791] handle_bug+0x3a/0x70 [ 698.257324][T14791] exc_invalid_op+0x16/0x40 [ 698.262039][T14791] asm_exc_invalid_op+0x16/0x20 [ 698.267036][T14791] RIP: 0010:perf_pending_task+0x358/0x470 [ 698.273061][T14791] Code: ff 84 db 75 14 e8 e8 7f da ff 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d4 7f da ff e8 d7 90 58 ff eb e5 e8 c8 7f da ff <0f> 0b e9 f3 fe ff ff e8 bc 7f da ff 48 c7 c7 50 2d bc 8c 4c 89 f6 [ 698.293392][T14791] RSP: 0018:ffffc9000477f8e0 EFLAGS: 00010293 [ 698.299847][T14791] RAX: ffffffff81a7f2e8 RBX: ffff8880280c5858 RCX: ffff88802a1b9dc0 [ 698.308041][T14791] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 698.316222][T14791] RBP: 0000000000000001 R08: ffff88802a1ba7c3 R09: 1ffff110054374f8 [ 698.324332][T14791] R10: dffffc0000000000 R11: ffffed10054374f9 R12: ffff88802a1b9dc0 [ 698.332722][T14791] R13: ffff8880563d5960 R14: ffff8880280c5620 R15: 1ffff11005018ac4 [ 698.341203][T14791] ? perf_pending_task+0x358/0x470 [ 698.346475][T14791] task_work_run+0x1d0/0x260 [ 698.351280][T14791] ? task_work_cancel+0x220/0x220 [ 698.356546][T14791] ? do_raw_spin_unlock+0x11d/0x230 [ 698.362238][T14791] do_exit+0x982/0x2480 [ 698.366727][T14791] ? lock_chain_count+0x20/0x20 [ 698.372065][T14791] ? put_task_struct+0x80/0x80 [ 698.377139][T14791] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 698.383791][T14791] ? lockdep_hardirqs_on+0x94/0x140 [ 698.389146][T14791] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 698.395706][T14791] do_group_exit+0x217/0x2d0 [ 698.400528][T14791] ? _raw_spin_unlock_irq+0x25/0x40 [ 698.405940][T14791] get_signal+0x1272/0x1350 [ 698.410676][T14791] arch_do_signal_or_restart+0xc4/0x1350 [ 698.416866][T14791] ? perf_trace_run_bpf_submit+0x124/0x1c0 [ 698.422718][T14791] ? perf_trace_preemptirq_template+0x268/0x320 [ 698.429337][T14791] ? irqentry_enter+0x33/0x50 [ 698.434995][T14791] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 698.441011][T14791] ? get_sigframe_size+0x10/0x10 [ 698.446163][T14791] ? lock_chain_count+0x20/0x20 [ 698.451227][T14791] ? rcu_is_watching+0x11/0xa0 [ 698.456629][T14791] exit_to_user_mode_loop+0x70/0x110 [ 698.463181][T14791] exit_to_user_mode_prepare+0xee/0x180 [ 698.469376][T14791] syscall_exit_to_user_mode+0x16/0x40 [ 698.475057][T14791] do_syscall_64+0x58/0xa0 [ 698.479610][T14791] ? clear_bhb_loop+0x60/0xb0 [ 698.484592][T14791] ? clear_bhb_loop+0x60/0xb0 [ 698.489318][T14791] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 698.495348][T14791] RIP: 0033:0x7f58ff19c799 [ 698.500067][T14791] Code: Unable to access opcode bytes at 0x7f58ff19c76f. [ 698.507421][T14791] RSP: 002b:00007f59000660e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 698.516394][T14791] RAX: fffffffffffffe00 RBX: 00007f58ff415fa8 RCX: 00007f58ff19c799 [ 698.524752][T14791] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f58ff415fa8 [ 698.533219][T14791] RBP: 00007f58ff415fa0 R08: 0000000000000000 R09: 0000000000000000 [ 698.541409][T14791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 698.549674][T14791] R13: 00007f58ff416038 R14: 00007ffe113fcf40 R15: 00007ffe113fd028 [ 698.558334][T14791] [ 698.562039][T14791] Kernel Offset: disabled [ 698.566489][T14791] Rebooting in 86400 seconds..