last executing test programs: 3.617642361s ago: executing program 1 (id=5196): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) close(0x3) close(0x4) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) close(r0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/net\x00') r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) close(0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="190000000400000004000000028000"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r2, 0x0, 0x0}, 0x20) 3.505176668s ago: executing program 0 (id=5208): bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000}, 0x0, 0x0, 0x0, 0x0, 0xf60}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) recvmsg$kcm(r0, 0x0, 0x10003) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f00000001c0)}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6erspan0\x00', 0x1000}) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x2f, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000180)}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) socket$kcm(0xa, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000500)=""/149, 0x95}, {&(0x7f00000005c0)=""/109, 0x6d}, {&(0x7f0000000240)=""/26, 0x1a}, {&(0x7f00000006c0)=""/123, 0x7b}, {&(0x7f00000009c0)=""/131, 0x83}], 0x5}, 0x2) 3.32427305s ago: executing program 1 (id=5199): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%pi6 \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x58, &(0x7f00000000c0)}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000340)="d80000001c0081044e81f782db44b904021d0802010000000500f0a1180002000000000000000e1208000f0100810401a8001600200001400300000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c11503c6bbace8017cb090000001fb791643a5ee4001b146218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e0060000000000000080bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd68adbef3d93452a00"/216, 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x20004800) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = socket$kcm(0xa, 0x7, 0x0) sendmsg$inet(r5, &(0x7f0000000340)={&(0x7f0000000140)={0x2, 0x4e22, @dev}, 0x10, 0x0}, 0x2400c894) 3.301744512s ago: executing program 3 (id=5200): perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x200048cc) setsockopt$sock_attach_bpf(r0, 0x1, 0xd, &(0x7f0000000080), 0x24) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x480783, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x6}, 0x7602, 0x3ff, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000806810ba000000000000000000000000050000000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x1c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000001940)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x50) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="2300000025008188040f80ec59acbc0913a1f84802000000000100", 0x1b}], 0x1}, 0x0) close(0x3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000580), 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) 2.726593399s ago: executing program 0 (id=5203): r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x2, 0x4e22, @dev}, 0x10, 0x0}, 0x2400c894) (fail_nth: 2) 2.308058047s ago: executing program 1 (id=5206): r0 = socket$kcm(0x10, 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000280)}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f0000000140)='\x00', 0x0, 0x4000, r1}, 0x18) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509", 0x4e}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000700)='z', 0x1}], 0x1}, 0x408d5) socket$kcm(0x11, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x14, &(0x7f0000000440), 0x3d) setsockopt$sock_attach_bpf(r3, 0x29, 0x14, &(0x7f0000000100), 0x3d) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0100000002000000a00300000500000000000000", @ANYRES32, @ANYBLOB="0000000000000000405d86327c0001"], 0x48) r4 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB='V?\x00\x00-\x00Y'], 0xfe33) sendmsg(r2, &(0x7f0000003680)={0x0, 0x0, &(0x7f0000003140)=[{&(0x7f0000000bc0)="0f95642594fdd72a0c9d559f215302dda1809cbef4c3ba92353432300fd6c48a2dec6118f3d323fa4abbb7514225c7e5363ef3eed06d183104ba251fecc734252dcc9c16fac50fdcf51ec4c4b34c25fb85e28fbe952ca908a8e32b198c50c9931f42d07cf6917e4ccb991398903a40fcaf428e0ad47c80f68eb54f376a5338451ff99d7ee0c6a9fc86fccf3e3292a042fcef4f7278d30b4a704fb78d901fdb", 0x9f}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) close(0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000040)=r5, 0x4) recvmsg$kcm(r0, &(0x7f0000000900)={0x0, 0xa, 0x0, 0x0, 0x0, 0xfffffffffffffe98}, 0x10000) recvmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 2.258645981s ago: executing program 3 (id=5207): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, r4, 0x0, 0xc, &(0x7f0000000300)='\tv\x1b\xac\x00\x00\x00\x00\x06\x00\x00\x00'}, 0x58b578c3e120b54c) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r5, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) write$cgroup_subtree(r5, &(0x7f0000000180)=ANY=[@ANYRES8=r4, @ANYRES8=r6], 0x55) r8 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r8, 0x29, 0x2a, &(0x7f0000000040), 0xcf) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x1b, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xb}, 0x125b0383fd3c2e56, 0x0, 0x0, 0x7, 0x0, 0xd09, 0x0, 0x0, 0x0, 0x0, 0x2dbd}, 0x0, 0xfffffffefffffffd, r5, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc92b18236457ee3c8", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$inet(r5, &(0x7f0000000980)={&(0x7f0000000640)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000000b00)=[{&(0x7f0000000680)="912fde6b07924017066d81d2377f76bb363514f3714579b1cd6222dc57876f65ee7ec6b193fb20b4ac5438a28b38d51e550864ede539ab8876e0cfe45fd80d71b2f868da41f729a76aca15005d203e35f0", 0x51}, {&(0x7f0000000700)="8d0ea5f5ce2c6689f8260906b4c02a74f3954e9a5dc408802b7c7311267f84a04c488121e2bfb351d6ad4f900ac074f7b897ba0d8790d03227e5ef3b268e53da894a70d647d3ef597933b56d92fd8fa27cef7a809dd22d6584e9d4fed8f221e1050b5a0ed18ebc4d549212e6365986a936f181aee450b63833249c0e4204930610a8bd93919dd1d8d60cc1f803636009d8dd286a693abc51f4b21aa31e3f41ed4cdf59c629e9eb2aeef4739e53c9ad4feffe5f5372bc7afe74c93e369da00cd4d27a452b9c5d580a8a5b1d5314deca3a7af7803cc45fd0ccc9427e529a682eb79a", 0xe1}, {&(0x7f0000000800)="25f97d997350e68c99497959d7be6df1b74ada23b0ea9bc92b0dede287a066d09ada11a7645e14b6f174559643d7df50752db2d42906f0a64c81af35929918e629736aef13c344f296443cd3939625d8e286aadcc7f1594989fa47777516dd052f0a4cb864a7dbffe021ee513ff6b60d9a15e85b57b01421e81df2b43ac8cb0f29ab3776038d86", 0x87}, {&(0x7f00000008c0)="b079c80f", 0x4}, {&(0x7f0000000900)="5d2ef91e1b08445cb4e32ca3af5d61e1623dc39f67bb413856e28bfc5f0bb6964af3150c4e6b07f8fdc42ea5432aafd136ce779c98ef8f1593c7707451d838bcfa07bc7316c3948c69", 0x49}, {&(0x7f0000000a00)="bf26569852f36e02bc77df790c8d4158fad2513d183bdb6da4681321ab76ee995c56889a233d79a919b39194060da0b2287dd13b3822d9b1d5b7c7d118088a86036aec20378f3329013b2cf90a79f474c7b86d3e1cad4826da194aeb0668c7dcbd88adb297090a5c996bde2413334231b34ec53a6215f527e8e29afafa31220d3f1e9bb9b16a0ab5d4630c42f2d5896e9fbe48cf440ba9d8a3dccbcb1a027c60e4eb843a019ee08260b6c9e11292e549886328d4312c63f3769facaa8da5fcc249318e24fcae05a76dab1204d1ac9cc35ebce4f1b29564", 0xd7}], 0x6, &(0x7f0000000b80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @dev={0xac, 0x14, 0x14, 0x3b}, @remote}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @dev={0xac, 0x14, 0x14, 0x3d}, @broadcast}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}, @ip_retopts={{0x34, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0xd4, [@multicast1]}, @timestamp={0x44, 0x1c, 0x90, 0x0, 0xa, [0x1, 0x3, 0x8, 0x8001, 0xfff, 0x8]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5c}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffffffcb}}], 0xf0}, 0x48000) 2.250102301s ago: executing program 0 (id=5209): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000}, 0x0, 0x0, 0x0, 0x0, 0xf60}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_devices(r1, 0x0, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x5}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0xb) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x94, 0x0, 0x2, 0xffffffff}, {0x6}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xe, 0x4, 0x8, 0x7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x2, 0x0, 0x0, 0xdffff963}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r5}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="36400000210091d4904a0000a8123d180a7409"], 0xfe33) ioctl$SIOCSIFHWADDR(r2, 0x8b1a, &(0x7f0000000000)={'wlan1\x00'}) 1.996116518s ago: executing program 3 (id=5212): r0 = socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="9feb010018000000000000002c0000002c00000007000000040000000000000e040000000000000006000000000b000f0100000009000000000003000f03000000e104180000002e616100"], &(0x7f0000000900)=""/179, 0x4b, 0xb3, 0x1}, 0x28) close(r0) socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x48) write$cgroup_freezer_state(r3, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r5) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r7, 0x4004743d, 0x110e22fff6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={@cgroup, 0x22, 0x0, 0x8000, &(0x7f00000001c0)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], &(0x7f0000000400)}, 0x40) r8 = socket$kcm(0x10, 0x2, 0x4) close(r8) socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000580)='devices.deny\x00') sendmsg$inet(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="5c000000130025cc9e3be35c6e17aa31076b876c1d0000007ea60864160af36514000cc00800250007000200060019c00364bc24eab556a705251e618294ff0051f60a84c9f4d4938037e786a6d0001000000e4509c5bbcd72c6c953", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0xfffffffffffffdc5, &(0x7f00000011c0)=[{&(0x7f00000000c0)="5c00000013006bcc9e3be35c6e17aa31066b876c1d0000007ea6e763160af36504001ac0080010000400020002000000ef64bc24eab556a705251e618294ff0051f60a9553adac000e4509c5bbcd72c6c953ec3ded4d8217961381fd", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 1.987831039s ago: executing program 2 (id=5214): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r0 = socket$kcm(0xa, 0x2, 0x73) recvmsg$kcm(r0, &(0x7f0000002900)={0x0, 0x0, 0x0}, 0x42) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/1952], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) close(0x3) 1.792252892s ago: executing program 2 (id=5215): bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000}, 0x0, 0x0, 0x0, 0x0, 0xf60}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) recvmsg$kcm(r0, 0x0, 0x10003) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="61123000000000006113340000000000bf1000000000000015000200091b00003d030100000000008701000000000000bc26000000000000bf67000000000000560300000ee600f06702000014000000160300000ee600f0bf050000000000000f610000000000006507f4ff02000400070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a82983d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586e3f640f9f7e9a73b761ad4f0952a70046270d2b6436fdeecd791614ed46de741eb8cf91c046ef9beca574b350021c7ec6ef130f53748068ca432dae4e248b22b9ad8b2811f67916a1764578cba4b069037bfb3362d5691ac397f7e207145d970f0d97867552629b146645c785fb77dbeca38e49a9d5221f1f45f0a25890d04d91a15a05ae7e7ed6252c3d6c1973fb858de1da70d67317e7872b0603ce47ed2c1520e71b527bb42aa2e20e1e85df73736ed0a782ab7e7278dd54358cfdf6313d40f926332623625b49626481054787ab2dff85a9bebd6b317f26c691a65aa97bb3d1506a3a565e9c7ea5ad4611d2d77ee8a5c1b23814a26b6a20061fbb65bdd03770fa849f2a29ba69f90625f42592a70ba890f7a92878ae73574c3a233ee5954119931a1905210715fa77a8795f2fbec3797cb90f59fe8a4abec25f40c87bf25b750bbaa"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f00000001c0)}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6erspan0\x00', 0x1000}) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x2f, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) socket$kcm(0xa, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000500)=""/149, 0x95}, {&(0x7f00000005c0)=""/109, 0x6d}, {&(0x7f0000000240)=""/26, 0x1a}, {&(0x7f00000006c0)=""/123, 0x7b}, {&(0x7f00000009c0)=""/131, 0x83}], 0x5}, 0x2) 1.695519858s ago: executing program 4 (id=5216): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400004005000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000c5e444a1"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='br_fdb_external_learn_add\x00', 0xffffffffffffffff, 0x0, 0xffffffff}, 0x18) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4b}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='br_fdb_external_learn_add\x00', r0, 0x0, 0x800000000000}, 0x18) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x3, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x806, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x1e, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x23, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x20000000000, r1, 0x0) socket$kcm(0x1e, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000000)=[{&(0x7f00000000c0)="d8000000140081044e81f782db44b904021f080211000000040000a118000200e014000100000e1208000f0100810401a80016ea1f000840032e5f54c92011148ed08734843cb12b00000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c0100000000000000cb090000001fb791643a5ee4001b146218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e0060000000000000080bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd68adbef", 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8922, &(0x7f0000000080)) 1.576680376s ago: executing program 3 (id=5217): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r1}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000feffffff0000000003000000850000004100000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f805ffffb702000008000006b703000003000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x11, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 1.122730646s ago: executing program 4 (id=5218): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x17, 0x0, 0x4, 0x0, 0x0, 0xfffffffc}, 0x0, 0x4000000000000000, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="05000000050000000200000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000200b70300000000ff80850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='tlb_flush\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x58, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000c00)=[{0x0}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) close(r6) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffff, 0x101}, 0x1828a6, 0xca, 0x2, 0x0, 0x4, 0x400000, 0x0, 0x0, 0xe, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) recvmsg$unix(r5, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x1c0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[@ANYRES8=r6, @ANYBLOB="3eca0d"], 0x9a) socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r4, 0x107, 0x12, &(0x7f00000008c0), 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0xd, &(0x7f00000005c0)=@raw=[@exit, @map_idx, @call={0x85, 0x0, 0x0, 0xcf}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f00000001c0)='syzkaller\x00', 0x2, 0x9b, &(0x7f0000000680)=""/155, 0x40f00, 0x5, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000840)={0x0, 0xc, 0x14, 0x5}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x1c092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0xb3e, 0xfffffffffffffff8}, 0x840, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000fc0)={{}, 0x0, &(0x7f0000000f80)='%pK \x00'}, 0x20) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x111, 0x3e}, 0x0, 0x0, 0xffffffffffffffff, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f0000000940)=@generic={0xa, "8ab77fa26849ff263ef30c98b353011a5990650042e2dacdc165ececece6be1862e2adacd2737d00ad6f9fa9f3d7145e15dd9fb1a7adc211220963ad5def53b911ba5b9da13641f982757012a7496de0b3a36f5849f260c603dbc317f54b901ee80ea6132ca6e88c776553e1833052ca376304313c5637786a36a4b83857"}, 0x80, 0x0}, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000200)='devices.allow\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func={0x1, 0x0, 0x0, 0xc, 0x2}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}, {0x0, [0x61]}}, 0x0, 0x43}, 0x28) socket$kcm(0x10, 0x3, 0x10) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e001c740100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x0) 1.113419386s ago: executing program 1 (id=5219): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x81}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x8, [{0x0, 0x3}]}, @func_proto, @restrict={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x4a}, 0x28) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x8, [{0x0, 0x3}]}, @func_proto, @restrict={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x4a}, 0x28) r2 = socket$kcm(0x10, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)="1f432d5b98", &(0x7f0000000300), 0x1003}, 0x38) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000b80)={0xffffffffffffffff, &(0x7f00000014c0), &(0x7f0000000b40)=""/31}, 0x20) openat$cgroup_devices(r3, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) (async) r4 = openat$cgroup_devices(r3, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r4, 0x0, 0x9) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x29, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb904021d08007b490d4f1e81f8d815000100ff05142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r6 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r6, &(0x7f0000000bc0)={&(0x7f00000002c0)=@l2={0x1f, 0x69ec, @any, 0x3}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000004c0)="dea07f2798c6ffb205f63c78cfb2083d76bee988b5c5cc60d15b4150473c3d3222fb0a9c4e919f830e110202af2200d9e4a7a4b407a4265f6c29302ba8d155c2bd44bd36a64f1077255494359e901cebed8d5f8c37c173a3a86e6eaab5aed6837bbb61882ccb6526a1b646", 0x6b}, {&(0x7f0000000240)="7243dcc1924c5b180fad97d8ab0cf736d5779e05760a6ef2be5c1de1facadbe860600d42022fd9e76dbe35e893817f330c7d84", 0x33}, {&(0x7f0000000340)="261934d5068a553597f0e5cc7826abdb87be27e4d69b2e9d302838c9bf0b46401b7bc099dcb453ae93", 0x29}, {&(0x7f00000003c0)="af2ee77a06a96e7443ec4e3cf39fe168bd941a3fe96f622970108c1d2d5a4e4ac4ab39712c7b88c5435770", 0x2b}, {&(0x7f0000000680)}, {&(0x7f00000006c0)}, {&(0x7f00000007c0)="2bb8189df924712ffe24404c676e519a7364929742980f2d67f644af164be6a60b6a084cad2980f10ae4ac92d0f2f79eef46eac63a691455d94fb2e7ef7a238bce0654354e8a51dc444ae85c271133d4798a6047ecdeab670c3ff0e10e7276f55b62d2dfd8c75e383094b718bbeb3596fe4121a88eebfebbbe1f816dd0e7668d41b1b539fc483484c1a50a7b098343628d81bc6154696d6cef76623d4cd2003f5b888959039273c5648851695c8695c9103bd2e01ed1f8298ff87e7b4be3e201bc07c337b2bdca5d831aa6b1d7c86299afb7cac52000aa096fa776e5b410111035506c41af34cee45050", 0xea}, {&(0x7f00000008c0)="8a1a60ba4a47e663475c2f88908c040b121e4353f968320e7b6678226a0a10fbe28535c715e13fb72dfa78ba5459d73c4c3ac9c11f3f1a566a7ce5c9959475d74f15a6b152ab24c86dc25ca55e9240f64a1ea7ccd7c0f16fa9dd5741288ba587d0e3e120e8453da5b1b4c1ecd06815b6755bf87fb2fc8cc275a3eebe7cd0d5ac33146231e029eb0dd92f969950e6f3f031348a9a531b203863d65dd0c244f9d4061fcfd8ed2d7e4d6657263a67951823de50ad0a90799b573fbcefb95338cf24bd7f02bbcef702e2ba8d498e84848e3315e457c32004bd2bd499db322d165ca5", 0xe0}], 0x8, &(0x7f0000000a40)=[{0xd8, 0x102, 0x80000000, "175ad9b9c27a94ae7edf1e6afdd1470c0fc4f4e587afd855086e250a11dc280dec5798fcf41908666782c178654b53fb1f41c67a52ebb258c39112741e93fcef19d6da76606a7dc31fe65abd25d5f8a570c0f8eaa7b6643ba3e221d00c3f49189904e9e429c33424da14581fce8045fe2c5a15df26fecf99b1e2b4e1d2ef61ac38ba0f9939853e6117e0b3e62d1ccf840710cf5c124a3e24d2a30ae5032ce72192da1fcd392dd6148dca3a7a46e2b7e6e7d024d1851955894cb8b0ad83aa3374f891"}], 0xd8}, 0x10) (async) sendmsg$kcm(r6, &(0x7f0000000bc0)={&(0x7f00000002c0)=@l2={0x1f, 0x69ec, @any, 0x3}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000004c0)="dea07f2798c6ffb205f63c78cfb2083d76bee988b5c5cc60d15b4150473c3d3222fb0a9c4e919f830e110202af2200d9e4a7a4b407a4265f6c29302ba8d155c2bd44bd36a64f1077255494359e901cebed8d5f8c37c173a3a86e6eaab5aed6837bbb61882ccb6526a1b646", 0x6b}, {&(0x7f0000000240)="7243dcc1924c5b180fad97d8ab0cf736d5779e05760a6ef2be5c1de1facadbe860600d42022fd9e76dbe35e893817f330c7d84", 0x33}, {&(0x7f0000000340)="261934d5068a553597f0e5cc7826abdb87be27e4d69b2e9d302838c9bf0b46401b7bc099dcb453ae93", 0x29}, {&(0x7f00000003c0)="af2ee77a06a96e7443ec4e3cf39fe168bd941a3fe96f622970108c1d2d5a4e4ac4ab39712c7b88c5435770", 0x2b}, {&(0x7f0000000680)}, {&(0x7f00000006c0)}, {&(0x7f00000007c0)="2bb8189df924712ffe24404c676e519a7364929742980f2d67f644af164be6a60b6a084cad2980f10ae4ac92d0f2f79eef46eac63a691455d94fb2e7ef7a238bce0654354e8a51dc444ae85c271133d4798a6047ecdeab670c3ff0e10e7276f55b62d2dfd8c75e383094b718bbeb3596fe4121a88eebfebbbe1f816dd0e7668d41b1b539fc483484c1a50a7b098343628d81bc6154696d6cef76623d4cd2003f5b888959039273c5648851695c8695c9103bd2e01ed1f8298ff87e7b4be3e201bc07c337b2bdca5d831aa6b1d7c86299afb7cac52000aa096fa776e5b410111035506c41af34cee45050", 0xea}, {&(0x7f00000008c0)="8a1a60ba4a47e663475c2f88908c040b121e4353f968320e7b6678226a0a10fbe28535c715e13fb72dfa78ba5459d73c4c3ac9c11f3f1a566a7ce5c9959475d74f15a6b152ab24c86dc25ca55e9240f64a1ea7ccd7c0f16fa9dd5741288ba587d0e3e120e8453da5b1b4c1ecd06815b6755bf87fb2fc8cc275a3eebe7cd0d5ac33146231e029eb0dd92f969950e6f3f031348a9a531b203863d65dd0c244f9d4061fcfd8ed2d7e4d6657263a67951823de50ad0a90799b573fbcefb95338cf24bd7f02bbcef702e2ba8d498e84848e3315e457c32004bd2bd499db322d165ca5", 0xe0}], 0x8, &(0x7f0000000a40)=[{0xd8, 0x102, 0x80000000, "175ad9b9c27a94ae7edf1e6afdd1470c0fc4f4e587afd855086e250a11dc280dec5798fcf41908666782c178654b53fb1f41c67a52ebb258c39112741e93fcef19d6da76606a7dc31fe65abd25d5f8a570c0f8eaa7b6643ba3e221d00c3f49189904e9e429c33424da14581fce8045fe2c5a15df26fecf99b1e2b4e1d2ef61ac38ba0f9939853e6117e0b3e62d1ccf840710cf5c124a3e24d2a30ae5032ce72192da1fcd392dd6148dca3a7a46e2b7e6e7d024d1851955894cb8b0ad83aa3374f891"}], 0xd8}, 0x10) socket$kcm(0xa, 0x5, 0x0) (async) r7 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r7, &(0x7f00000001c0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x0, @remote, 0x100003}, 0x80, &(0x7f00000029c0)=[{&(0x7f00000003c0)="9b", 0x1}], 0x1}, 0x0) (async) sendmsg$kcm(r7, &(0x7f00000001c0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x0, @remote, 0x100003}, 0x80, &(0x7f00000029c0)=[{&(0x7f00000003c0)="9b", 0x1}], 0x1}, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000005c0)={r8}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000005c0)={r8}, 0x4) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x6, 0x11, &(0x7f0000000100)=ANY=[@ANYBLOB="180200000400000000000000000000008500000017000000b7080000000000007b8af8ff00000000b7080000008000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x7f, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r9, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) 1.044909551s ago: executing program 2 (id=5220): r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x0, 0x8, 0x0, 0x0) 1.021045902s ago: executing program 3 (id=5221): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) r1 = socket$kcm(0x1e, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x8e}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000001540)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x0, 0x0, 0x1}}, 0x80, 0x0}, 0x4000000) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)=ANY=[@ANYRES32=r3, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r4, @ANYBLOB, @ANYRES64=0x0], 0x20) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000200), 0x11) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="0d00000004000000040000000700000000000000", @ANYRES32=r6, @ANYBLOB="00000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000010bf474e488b04e30000000000000000cd86fd07443cf1decc7668e938c1ad00391420ee988d927a9ba672988c1b137df9049b6b1a81066dc36376a24d6fa98a8edb00b57029084524cdaa52d148e1007fb70b8f6821a6e63397faa88bd8d1033f6ea7848772172c9c"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), 0x0}, 0x20) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x541b, 0x0) r8 = socket$kcm(0x2, 0x3, 0x84) ioctl$sock_kcm_SIOCKCMATTACH(r8, 0x890b, 0x0) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r9) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r9) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r10 = socket$kcm(0x1e, 0x5, 0x0) sendmsg$kcm(r10, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="80", 0xfdef}], 0x1}, 0x0) recvmsg(r10, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000740)=""/250, 0xfa}], 0x1, 0x0, 0x18}, 0x10000) r11 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000140)="d800000018007b29e00212ba0d8105040a601800fe0f040b067c55a1bc000900b80006990600000015000500fe800000000000000300014002000c0901ac04000bd67f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04fb95cae8c9010000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad8ffd5e1cace81ccd40dd601edef3d93452a92307ff0ff0e97031e9f05e9f16e9cb500"/216, 0xd8}], 0x1, 0x0, 0x0, 0x2663}, 0x0) sendmsg$kcm(r2, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000002c0)=""/175, 0xaf}, {&(0x7f0000000380)=""/199, 0xc7}, {&(0x7f0000000080)=""/12, 0xc}, {&(0x7f0000000680)=""/223, 0xdf}, {&(0x7f0000000780)=""/238, 0xee}], 0x5, &(0x7f0000000b40)=""/151, 0x97}, 0x0) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) socket$kcm(0x10, 0x2, 0x0) 870.328263ms ago: executing program 2 (id=5222): bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1a000000176b5013ee96a36e000001008c00000070754e40c13b72e26513a53213d4188146581df6a1f0718f890c5919cf61ffb544df20"], 0x50) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x7, 0xf9, 0x0, 0x3, 0x0, 0xffffffff, 0x0, 0x100000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'wlan1\x00', @random="0100c3201000"}) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x1, 0x1, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x12, 0x0, &(0x7f0000000000)="b9ff03076044238c9e9e15f088a84cb688a8", 0x0, 0x0, 0x60000000, 0x0, 0xfffffe99, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0xf}, {0x0, 0x0, 0x0, 0x81}]}) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea032c00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000300)=ANY=[@ANYRES8=r0, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b70400000000000085000000330000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0xd538, 0x0, 0x0, 0x21700, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b80)={r7, 0x2000012, 0xe, 0x0, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xb}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="8c38"], 0x0, 0x42, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_config_ext, 0x100080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x5b}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r8, 0x5, 0xb68, 0x1300, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c008110e00f80ecdb4cb9f207c804a018000000880803fb0a000200250ada1b40d80800c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 805.307607ms ago: executing program 4 (id=5223): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) socket$kcm(0x2, 0x3, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000008c0), 0x43) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000003c0)=ANY=[], 0xc) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r4, 0x84, 0x1e, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r5 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)=@generic={&(0x7f0000000300)='./file0\x00'}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(r3, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x40010101) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000040)=0xa) 704.132974ms ago: executing program 1 (id=5224): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) close(0x3) close(0x4) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) close(r0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/net\x00') r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) close(0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="190000000400000004000000028000"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r2, 0x0, 0x0}, 0x20) 585.812981ms ago: executing program 4 (id=5225): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r0 = socket$kcm(0xa, 0x2, 0x73) recvmsg$kcm(r0, &(0x7f0000002900)={0x0, 0x0, 0x0}, 0x42) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/1952], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) close(0x3) 533.550295ms ago: executing program 0 (id=5226): socket$kcm(0x10, 0x2, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x801, 0x0, 0x2df, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c000000"], 0x0, 0x26}, 0x28) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x2, 0x200000000000006, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000600)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) socket$kcm(0x2, 0x200000000000001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x11, 0x12, 0x0, 0x0, 0xf, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5c}, 0x94) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xef, 0x7, 0x0, 0x0, 0x0, 0x0, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffdfffc, 0x0, @perf_bp={0x0, 0x8}, 0x800, 0x2000000000, 0x0, 0x5, 0x0, 0x200000b, 0xfffd, 0x0, 0x9, 0x0, 0x3f}, 0x0, 0x400010, 0xffffffffffffffff, 0x3) (async, rerun: 64) r2 = socket$kcm(0x10, 0x2, 0x0) (rerun: 64) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="d8000000190081054e81f782db4cb9040220080000000000000000070a000a000900142603600e1208000f0000050401d559e0e0df7fc07963acc3038ebba8000400027c035c0461c1d67f6f94007134cf6efb8001a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c3f5aeb4edbb57a5025ccca9e008026f6e6ddba61f5fad95667e006dcdf639500bfeb789d00000000000000d5e1cace81ed6c117ab5d6d69bda4039e81f86f60f0bffece0b42a9ecbee5de6ccd40dd6e4ed", 0xd8}], 0x1}, 0x14) (async, rerun: 64) r3 = socket$kcm(0x10, 0x400000002, 0x0) (rerun: 64) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020023000b03d25a806f8c6394f90524fc60040f03", 0x17}], 0x1}, 0x0) (async) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="934300005a0033d4"], 0xfe33) 530.763035ms ago: executing program 2 (id=5227): bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000}, 0x0, 0x0, 0x0, 0x0, 0xf60}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) recvmsg$kcm(r0, 0x0, 0x10003) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f00000001c0)}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6erspan0\x00', 0x1000}) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x2f, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000180)}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) socket$kcm(0xa, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000500)=""/149, 0x95}, {&(0x7f00000005c0)=""/109, 0x6d}, {&(0x7f0000000240)=""/26, 0x1a}, {&(0x7f00000006c0)=""/123, 0x7b}, {&(0x7f00000009c0)=""/131, 0x83}], 0x5}, 0x2) 504.471877ms ago: executing program 1 (id=5228): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000}, 0x0, 0x0, 0x0, 0x0, 0xf60}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_devices(r1, 0x0, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x5}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0xb) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x94, 0x0, 0x2, 0xffffffff}, {0x6}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xe, 0x4, 0x8, 0x7}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r5}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="36400000210091d4904a0000a8123d180a7409"], 0xfe33) ioctl$SIOCSIFHWADDR(r2, 0x8b1a, &(0x7f0000000000)={'wlan1\x00'}) 393.114765ms ago: executing program 4 (id=5229): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400004005000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000c5e444a1"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='br_fdb_external_learn_add\x00', 0xffffffffffffffff, 0x0, 0xffffffff}, 0x18) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4b}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='br_fdb_external_learn_add\x00', r0, 0x0, 0x800000000000}, 0x18) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x3, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x806, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x1e, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x9, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x23, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x20000000000, r1, 0x0) socket$kcm(0x1e, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000000)=[{&(0x7f00000000c0)="d8000000140081044e81f782db44b904021f080211000000040000a118000200e014000100000e1208000f0100810401a80016ea1f000840032e5f54c92011148ed08734843cb12b00000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c0100000000000000cb090000001fb791643a5ee4001b146218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e0060000000000000080bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd68adbef", 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8922, &(0x7f0000000080)) 342.982858ms ago: executing program 0 (id=5230): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x10000, &(0x7f0000000a80)="f23f44c3cc03d3c19d337da7ae51f033a81c37491dbeec6f77e790ee1f9fa63a201cfc", 0x23, &(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)="4c535718508af21afa6d54e14c6cbeeafa7efb0583a082646066884aad75971ef0ebdff16546e2116db15c4eda57beb6c7aa81bd10f15f46946a9f320d571f0e3fce48955d9c2cf88e2ce1955a23bb09af6e0b93646fc66038a54db820d94753909839d46699c26c98dd11738bc6a52bbaa5") perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x1, 0x8, 0xa, 0x0, 0x4, 0x400, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_bp={0x0, 0x8}, 0x11950, 0x4854, 0x3, 0x6, 0x5, 0xb9, 0x5, 0x0, 0xc8, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='rxrpc_local\x00', r0}, 0x10) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x4}, 0x400, 0x0, 0x0, 0x0, 0x2, 0x80000001}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[], 0x18}, 0x0) 86.958655ms ago: executing program 0 (id=5231): bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000}, 0x0, 0x0, 0x0, 0x0, 0xf60}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) recvmsg$kcm(r0, 0x0, 0x10003) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f00000001c0)}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6erspan0\x00', 0x1000}) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x2f, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) socket$kcm(0xa, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000500)=""/149, 0x95}, {&(0x7f00000005c0)=""/109, 0x6d}, {&(0x7f0000000240)=""/26, 0x1a}, {&(0x7f00000006c0)=""/123, 0x7b}, {&(0x7f00000009c0)=""/131, 0x83}], 0x5}, 0x2) 76.542395ms ago: executing program 2 (id=5232): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r1}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000feffffff0000000003000000850000004100000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f805ffffb702000008000006b703000003000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x11, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 64.822206ms ago: executing program 4 (id=5233): r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1c0000000000", @ANYRES32, @ANYBLOB="ac1414bb008000000000000038000000000000000000000007000000070e43aa5889c23ef593ae6bcd1844187c8073b5c9e0000000060000000300000008000000090000140000000000000000000000010000000500000000000000140000000000000000000000070000000100000000000000140000000000000000000000010000000300"], 0xc0}, 0x4) r1 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x7, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000000}, 0x0, 0x0, 0x0, 0x0, 0xf60}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r2, 0x29, 0x8, &(0x7f0000000100), 0x120) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0xf5010000}, 0x6d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x401c5820, &(0x7f0000000000)=0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000069114b00000000008510000002000000850d8beb30e6000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) ioctl$SIOCSIFHWADDR(r5, 0x4030582b, &(0x7f0000000340)={'lo\x00', @random="3f2f94c100"}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r4, 0x0, 0x0}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.io_merged_recursive\x00', 0x26e1, 0x0) close(r6) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x40814) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x4, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x0, @perf_config_ext={0x3, 0x8001}, 0x0, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r7 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r7, &(0x7f0000000fc0)={&(0x7f0000001340)=@hci={0x1f, 0x0, 0x31}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000040)="b8b2cc1e00c1dba49d23bb66cb3a66bb0280000788fb", 0x16}], 0x1}, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x69, &(0x7f0000000100)=[{&(0x7f00000001c0)="5cffc30012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000d00)=""/242, 0xf2}, {&(0x7f0000000a00)=""/203, 0xcb}, {&(0x7f0000000380)=""/210, 0xd2}, {&(0x7f0000000540)=""/216, 0xd8}, {&(0x7f0000002100)=""/4077, 0xfed}, {&(0x7f00000007c0)=""/211, 0xd3}, {&(0x7f0000003200)=""/232, 0xe8}, {&(0x7f0000000480)=""/176, 0xb0}, {&(0x7f0000000c00)=""/195, 0xc3}, {&(0x7f0000000240)=""/163, 0xa3}, {&(0x7f0000001040)=""/4096, 0x1000}], 0xb}, 0x40010102) 0s ago: executing program 3 (id=5234): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'batadv_slave_0\x00', 0x1}) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8924, &(0x7f0000000080)) (fail_nth: 10) kernel console output (not intermixed with test programs): length. [ 1318.677364][T19517] netlink: 'syz.3.4268': attribute type 16 has an invalid length. [ 1319.324295][T19541] IPv6: Can't replace route, no match found [ 1319.396715][T13905] tipc: Subscription rejected, illegal request [ 1319.426301][T19543] IPv6: Can't replace route, no match found [ 1320.084541][T19564] FAULT_INJECTION: forcing a failure. [ 1320.084541][T19564] name failslab, interval 1, probability 0, space 0, times 0 [ 1320.186887][T19564] CPU: 0 PID: 19564 Comm: syz.1.4290 Not tainted syzkaller #0 [ 1320.194458][T19564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1320.204674][T19564] Call Trace: [ 1320.208015][T19564] [ 1320.211118][T19564] dump_stack_lvl+0x168/0x22e [ 1320.215891][T19564] ? show_regs_print_info+0x12/0x12 [ 1320.221181][T19564] ? load_image+0x3b0/0x3b0 [ 1320.225799][T19564] ? __lock_acquire+0x7c50/0x7c50 [ 1320.231121][T19564] ? memset+0x1e/0x40 [ 1320.235295][T19564] should_fail_ex+0x399/0x4d0 [ 1320.237245][T19572] IPv6: Can't replace route, no match found [ 1320.240054][T19564] should_failslab+0x5/0x20 [ 1320.240100][T19564] slab_pre_alloc_hook+0x59/0x310 [ 1320.240149][T19564] kmem_cache_alloc+0x56/0x2f0 [ 1320.260868][T19564] ? security_inode_alloc+0x30/0x110 [ 1320.266355][T19564] security_inode_alloc+0x30/0x110 [ 1320.271563][T19564] inode_init_always+0x8f8/0xc90 [ 1320.276685][T19564] new_inode_pseudo+0x91/0x1c0 [ 1320.281584][T19564] __sock_create+0x129/0x940 [ 1320.286225][T19564] ? __might_fault+0xa6/0x120 [ 1320.291024][T19564] ? __might_fault+0xc2/0x120 [ 1320.295933][T19564] __sys_socketpair+0x1bd/0x540 [ 1320.301005][T19564] __x64_sys_socketpair+0x97/0xb0 [ 1320.306125][T19564] do_syscall_64+0x4c/0xa0 [ 1320.310629][T19564] ? clear_bhb_loop+0x60/0xb0 [ 1320.315373][T19564] ? clear_bhb_loop+0x60/0xb0 [ 1320.320138][T19564] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1320.326111][T19564] RIP: 0033:0x7f1fd578eec9 [ 1320.330606][T19564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1320.350382][T19564] RSP: 002b:00007f1fd6653038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1320.358881][T19564] RAX: ffffffffffffffda RBX: 00007f1fd59e5fa0 RCX: 00007f1fd578eec9 [ 1320.367019][T19564] RDX: 0000000000000006 RSI: 0000000000000002 RDI: 000000000000001f [ 1320.375060][T19564] RBP: 00007f1fd6653090 R08: 0000000000000000 R09: 0000000000000000 [ 1320.383192][T19564] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 1320.391420][T19564] R13: 00007f1fd59e6038 R14: 00007f1fd59e5fa0 R15: 00007fff911b2038 [ 1320.399667][T19564] [ 1320.466231][T19564] socket: no more sockets [ 1320.722537][T13906] tipc: Subscription rejected, illegal request [ 1320.760472][T19584] __nla_validate_parse: 6 callbacks suppressed [ 1320.760515][T19584] netlink: 16054 bytes leftover after parsing attributes in process `syz.0.4296'. [ 1320.777909][T19586] IPv6: Can't replace route, no match found [ 1321.005379][T19590] validate_nla: 3 callbacks suppressed [ 1321.005421][T19590] netlink: 'syz.3.4300': attribute type 25 has an invalid length. [ 1321.056321][T19590] netlink: 'syz.3.4300': attribute type 16 has an invalid length. [ 1321.093586][T19590] netlink: 48 bytes leftover after parsing attributes in process `syz.3.4300'. [ 1321.833458][T19600] FAULT_INJECTION: forcing a failure. [ 1321.833458][T19600] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1321.913316][T19600] CPU: 0 PID: 19600 Comm: syz.2.4303 Not tainted syzkaller #0 [ 1321.920869][T19600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1321.931164][T19600] Call Trace: [ 1321.934489][T19600] [ 1321.937463][T19600] dump_stack_lvl+0x168/0x22e [ 1321.942215][T19600] ? show_regs_print_info+0x12/0x12 [ 1321.947483][T19600] ? load_image+0x3b0/0x3b0 [ 1321.952091][T19600] ? __lock_acquire+0x7c50/0x7c50 [ 1321.957205][T19600] should_fail_ex+0x399/0x4d0 [ 1321.961981][T19600] _copy_from_user+0x2c/0x170 [ 1321.966719][T19600] __copy_msghdr+0x3b7/0x580 [ 1321.971361][T19600] ___sys_sendmsg+0x1a2/0x290 [ 1321.976096][T19600] ? __sys_sendmsg+0x270/0x270 [ 1321.981111][T19600] ? __lock_acquire+0x7c50/0x7c50 [ 1321.986275][T19600] ? __fdget+0x17c/0x200 [ 1321.990562][T19600] __se_sys_sendmsg+0x19e/0x270 [ 1321.995457][T19600] ? __x64_sys_sendmsg+0x80/0x80 [ 1322.000545][T19600] ? lockdep_hardirqs_on+0x94/0x140 [ 1322.005891][T19600] do_syscall_64+0x4c/0xa0 [ 1322.010426][T19600] ? clear_bhb_loop+0x60/0xb0 [ 1322.015221][T19600] ? clear_bhb_loop+0x60/0xb0 [ 1322.019931][T19600] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1322.025949][T19600] RIP: 0033:0x7f08fed8eec9 [ 1322.030395][T19600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1322.050299][T19600] RSP: 002b:00007f08ffd04038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1322.058748][T19600] RAX: ffffffffffffffda RBX: 00007f08fefe5fa0 RCX: 00007f08fed8eec9 [ 1322.066748][T19600] RDX: 00000000000000c9 RSI: 0000200000002dc0 RDI: 0000000000000004 [ 1322.074927][T19600] RBP: 00007f08ffd04090 R08: 0000000000000000 R09: 0000000000000000 [ 1322.082970][T19600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1322.090993][T19600] R13: 00007f08fefe6038 R14: 00007f08fefe5fa0 R15: 00007ffe1e59f1f8 [ 1322.099544][T19600] [ 1322.199927][T19607] delete_channel: no stack [ 1322.211478][T19607] delete_channel: no stack [ 1322.274923][T19607] netlink: 'syz.0.4305': attribute type 3 has an invalid length. [ 1322.308251][T19607] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.4305'. [ 1322.643628][T19624] netlink: 'syz.2.4311': attribute type 7 has an invalid length. [ 1322.826072][T19621] can: request_module (can-proto-0) failed. [ 1323.237404][T19635] FAULT_INJECTION: forcing a failure. [ 1323.237404][T19635] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1323.364740][T19635] CPU: 1 PID: 19635 Comm: syz.2.4315 Not tainted syzkaller #0 [ 1323.372340][T19635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1323.382589][T19635] Call Trace: [ 1323.385931][T19635] [ 1323.388971][T19635] dump_stack_lvl+0x168/0x22e [ 1323.393743][T19635] ? show_regs_print_info+0x12/0x12 [ 1323.399032][T19635] ? load_image+0x3b0/0x3b0 [ 1323.403644][T19635] ? __lock_acquire+0x7c50/0x7c50 [ 1323.408775][T19635] should_fail_ex+0x399/0x4d0 [ 1323.413560][T19635] _copy_from_user+0x2c/0x170 [ 1323.418333][T19635] iovec_from_user+0x143/0x360 [ 1323.423219][T19635] __import_iovec+0x6d/0x500 [ 1323.427996][T19635] ? __might_fault+0xa6/0x120 [ 1323.432785][T19635] import_iovec+0x6f/0xa0 [ 1323.437218][T19635] ___sys_sendmsg+0x1e4/0x290 [ 1323.441989][T19635] ? __sys_sendmsg+0x270/0x270 [ 1323.447036][T19635] ? __lock_acquire+0x7c50/0x7c50 [ 1323.452213][T19635] ? __fdget+0x17c/0x200 [ 1323.455896][T19637] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4314'. [ 1323.456524][T19635] __se_sys_sendmsg+0x19e/0x270 [ 1323.470409][T19635] ? __x64_sys_sendmsg+0x80/0x80 [ 1323.475482][T19635] ? lockdep_hardirqs_on+0x94/0x140 [ 1323.480785][T19635] do_syscall_64+0x4c/0xa0 [ 1323.485277][T19635] ? clear_bhb_loop+0x60/0xb0 [ 1323.490098][T19635] ? clear_bhb_loop+0x60/0xb0 [ 1323.494882][T19635] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1323.500848][T19635] RIP: 0033:0x7f08fed8eec9 [ 1323.505330][T19635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1323.525023][T19635] RSP: 002b:00007f08ffd04038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1323.533629][T19635] RAX: ffffffffffffffda RBX: 00007f08fefe5fa0 RCX: 00007f08fed8eec9 [ 1323.541682][T19635] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000005 [ 1323.549794][T19635] RBP: 00007f08ffd04090 R08: 0000000000000000 R09: 0000000000000000 [ 1323.557841][T19635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1323.565966][T19635] R13: 00007f08fefe6038 R14: 00007f08fefe5fa0 R15: 00007ffe1e59f1f8 [ 1323.573013][T19637] tc_dump_action: action bad kind [ 1323.574088][T19635] [ 1323.663319][T19638] device wg2 left promiscuous mode [ 1323.717514][T19636] device wg2 entered promiscuous mode [ 1323.741636][T19642] netlink: 16054 bytes leftover after parsing attributes in process `syz.0.4316'. [ 1323.984263][T19648] netlink: 'syz.3.4318': attribute type 3 has an invalid length. [ 1324.031794][T19648] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.4318'. [ 1324.503586][T19663] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4324'. [ 1324.531342][T19663] tc_dump_action: action bad kind [ 1324.562341][T19664] device wg2 left promiscuous mode [ 1324.622665][T19663] device wg2 entered promiscuous mode [ 1325.361920][T19685] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4332'. [ 1325.414445][T19685] tc_dump_action: action bad kind [ 1325.450395][T19684] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4331'. [ 1325.461691][T19684] tc_dump_action: action bad kind [ 1325.567037][T19686] device wg2 left promiscuous mode [ 1325.586483][T19682] device wg2 left promiscuous mode [ 1325.614122][T19688] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4334'. [ 1325.639799][T19688] tc_dump_action: action bad kind [ 1325.654734][T19685] device wg2 entered promiscuous mode [ 1325.678804][T19691] device wg2 left promiscuous mode [ 1325.705633][T19684] device wg2 entered promiscuous mode [ 1325.733790][T19696] device wg2 entered promiscuous mode [ 1326.016378][T19701] netlink: 'syz.1.4335': attribute type 3 has an invalid length. [ 1326.032457][T19701] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.4335'. [ 1326.191408][T19714] IPv6: Can't replace route, no match found [ 1326.213341][T19715] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4348'. [ 1326.258806][T19715] tc_dump_action: action bad kind [ 1326.343689][ T3637] udevd[3637]: worker [18151] terminated by signal 33 (Unknown signal 33) [ 1326.368686][ T3637] udevd[3637]: worker [18151] failed while handling '/devices/virtual/block/loop0' [ 1326.917538][T19735] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4347'. [ 1326.992480][T19735] tc_dump_action: action bad kind [ 1327.054177][T19738] device wg2 left promiscuous mode [ 1327.099995][T19737] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4349'. [ 1327.129602][T19737] tc_dump_action: action bad kind [ 1327.144871][T19735] device wg2 entered promiscuous mode [ 1327.241691][T19745] device wg2 left promiscuous mode [ 1327.284503][T19737] device wg2 entered promiscuous mode [ 1328.195870][T19775] IPv6: Can't replace route, no match found [ 1328.558645][T19779] netlink: 60 bytes leftover after parsing attributes in process `syz.0.4363'. [ 1328.568677][T19779] netlink: 60 bytes leftover after parsing attributes in process `syz.0.4363'. [ 1328.712029][T19785] netlink: 60 bytes leftover after parsing attributes in process `syz.0.4363'. [ 1328.750172][T19779] netlink: 60 bytes leftover after parsing attributes in process `syz.0.4363'. [ 1329.089523][T19794] FAULT_INJECTION: forcing a failure. [ 1329.089523][T19794] name failslab, interval 1, probability 0, space 0, times 0 [ 1329.115322][T19794] CPU: 0 PID: 19794 Comm: syz.1.4367 Not tainted syzkaller #0 [ 1329.122875][T19794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1329.132978][T19794] Call Trace: [ 1329.136317][T19794] [ 1329.139287][T19794] dump_stack_lvl+0x168/0x22e [ 1329.140054][T19792] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4366'. [ 1329.143995][T19794] ? lock_chain_count+0x20/0x20 [ 1329.144070][T19794] ? show_regs_print_info+0x12/0x12 [ 1329.144097][T19794] ? load_image+0x3b0/0x3b0 [ 1329.144133][T19794] ? lockdep_hardirqs_on+0x94/0x140 [ 1329.144167][T19794] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 1329.144199][T19794] should_fail_ex+0x399/0x4d0 [ 1329.144239][T19794] should_failslab+0x5/0x20 [ 1329.144272][T19794] slab_pre_alloc_hook+0x59/0x310 [ 1329.144298][T19794] ? sctp_add_bind_addr+0x89/0x350 [ 1329.144327][T19794] __kmem_cache_alloc_node+0x4f/0x260 [ 1329.144354][T19794] ? sctp_add_bind_addr+0x89/0x350 [ 1329.144381][T19794] kmalloc_trace+0x26/0xe0 [ 1329.144426][T19794] sctp_add_bind_addr+0x89/0x350 [ 1329.144457][T19794] sctp_copy_local_addr_list+0x308/0x4d0 [ 1329.144488][T19794] ? sctp_copy_local_addr_list+0x98/0x4d0 [ 1329.144516][T19794] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 1329.144549][T19794] ? sctp_v4_is_any+0x31/0x50 [ 1329.144576][T19794] ? sctp_copy_one_addr+0x93/0x660 [ 1329.144607][T19794] sctp_bind_addr_copy+0xaf/0x3c0 [ 1329.144636][T19794] ? sctp_assoc_set_bind_addr_from_ep+0xa1/0x190 [ 1329.144673][T19794] sctp_connect_new_asoc+0x2d6/0x690 [ 1329.144707][T19794] ? __sctp_connect+0xd20/0xd20 [ 1329.144738][T19794] ? sctp_endpoint_lookup_assoc+0x77/0x260 [ 1329.144767][T19794] ? sctp_endpoint_lookup_assoc+0x77/0x260 [ 1329.144799][T19794] ? bpf_lsm_sctp_bind_connect+0x5/0x10 [ 1329.144822][T19794] ? security_sctp_bind_connect+0x85/0xb0 [ 1329.144861][T19794] sctp_sendmsg+0x15ff/0x2980 [ 1329.144907][T19794] ? sctp_getsockopt+0x8a0/0x8a0 [ 1329.144941][T19794] ? aa_af_perm+0x2b0/0x2b0 [ 1329.144965][T19794] ? tomoyo_socket_sendmsg_permission+0x1dd/0x2f0 [ 1329.145004][T19794] ? inet_sendmsg+0x78/0x2f0 [ 1329.145032][T19794] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1329.145053][T19794] ? security_socket_sendmsg+0x7c/0xa0 [ 1329.145088][T19794] ? inet_send_prepare+0x260/0x260 [ 1329.145116][T19794] ____sys_sendmsg+0x59b/0x970 [ 1329.145156][T19794] ? __sys_sendmsg_sock+0x30/0x30 [ 1329.145185][T19794] ? __import_iovec+0x315/0x500 [ 1329.145230][T19794] ? import_iovec+0x6f/0xa0 [ 1329.145269][T19794] ___sys_sendmsg+0x21c/0x290 [ 1329.145302][T19794] ? __sys_sendmsg+0x270/0x270 [ 1329.145355][T19794] ? rcu_is_watching+0x11/0xa0 [ 1329.145437][T19794] ? __fdget+0x17c/0x200 [ 1329.145471][T19794] __se_sys_sendmsg+0x19e/0x270 [ 1329.145500][T19794] ? perf_trace_preemptirq_template+0x287/0x330 [ 1329.145533][T19794] ? __x64_sys_sendmsg+0x80/0x80 [ 1329.145581][T19794] ? lockdep_hardirqs_on+0x94/0x140 [ 1329.145617][T19794] do_syscall_64+0x4c/0xa0 [ 1329.145641][T19794] ? clear_bhb_loop+0x60/0xb0 [ 1329.145666][T19794] ? clear_bhb_loop+0x60/0xb0 [ 1329.145694][T19794] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1329.145717][T19794] RIP: 0033:0x7f1fd578eec9 [ 1329.145739][T19794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1329.145759][T19794] RSP: 002b:00007f1fd6653038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1329.145784][T19794] RAX: ffffffffffffffda RBX: 00007f1fd59e5fa0 RCX: 00007f1fd578eec9 [ 1329.145802][T19794] RDX: 00000000000080d1 RSI: 0000200000000140 RDI: 0000000000000007 [ 1329.145818][T19794] RBP: 00007f1fd6653090 R08: 0000000000000000 R09: 0000000000000000 [ 1329.145832][T19794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1329.145846][T19794] R13: 00007f1fd59e6038 R14: 00007f1fd59e5fa0 R15: 00007fff911b2038 [ 1329.145880][T19794] [ 1329.541270][T19792] tc_dump_action: action bad kind [ 1329.563331][T19803] device wg2 left promiscuous mode [ 1329.631391][T19792] device wg2 entered promiscuous mode [ 1331.902466][T19847] device syzkaller0 entered promiscuous mode [ 1332.016678][T19854] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4385'. [ 1332.041986][T19854] tc_dump_action: action bad kind [ 1332.059357][T19856] device wg2 left promiscuous mode [ 1332.087964][T19857] device wg2 entered promiscuous mode [ 1334.929760][ T4308] Bluetooth: hci0: Malformed LE Event: 0x1b [ 1336.799161][T19898] IPv6: Can't replace route, no match found [ 1337.129851][T19915] netlink: 'syz.3.4411': attribute type 27 has an invalid length. [ 1337.138820][T19915] netlink: 'syz.3.4411': attribute type 1 has an invalid length. [ 1337.194409][T19917] netlink: 16054 bytes leftover after parsing attributes in process `syz.4.4399'. [ 1338.027898][T19935] FAULT_INJECTION: forcing a failure. [ 1338.027898][T19935] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1338.086695][T19935] CPU: 1 PID: 19935 Comm: syz.3.4408 Not tainted syzkaller #0 [ 1338.094237][T19935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1338.104325][T19935] Call Trace: [ 1338.107635][T19935] [ 1338.110592][T19935] dump_stack_lvl+0x168/0x22e [ 1338.115313][T19935] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 1338.121509][T19935] ? show_regs_print_info+0x12/0x12 [ 1338.126749][T19935] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 1338.133051][T19935] ? dump_stack+0x5/0x12 [ 1338.137342][T19935] should_fail_ex+0x399/0x4d0 [ 1338.142074][T19935] _copy_from_user+0x2c/0x170 [ 1338.146796][T19935] bpf_test_init+0xf9/0x150 [ 1338.151353][T19935] bpf_prog_test_run_xdp+0x359/0xe50 [ 1338.156686][T19935] ? dev_put+0x80/0x80 [ 1338.160799][T19935] ? dev_put+0x80/0x80 [ 1338.164930][T19935] bpf_prog_test_run+0x31e/0x390 [ 1338.169925][T19935] __sys_bpf+0x593/0x6d0 [ 1338.174216][T19935] ? bpf_link_show_fdinfo+0x340/0x340 [ 1338.179647][T19935] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 1338.185859][T19935] __x64_sys_bpf+0x78/0x90 [ 1338.190319][T19935] do_syscall_64+0x4c/0xa0 [ 1338.194770][T19935] ? clear_bhb_loop+0x60/0xb0 [ 1338.199479][T19935] ? clear_bhb_loop+0x60/0xb0 [ 1338.204196][T19935] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1338.210125][T19935] RIP: 0033:0x7ffbe9b8eec9 [ 1338.214575][T19935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1338.234238][T19935] RSP: 002b:00007ffbea9d3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1338.242692][T19935] RAX: ffffffffffffffda RBX: 00007ffbe9de5fa0 RCX: 00007ffbe9b8eec9 [ 1338.250694][T19935] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 1338.258782][T19935] RBP: 00007ffbea9d3090 R08: 0000000000000000 R09: 0000000000000000 [ 1338.266804][T19935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1338.274817][T19935] R13: 00007ffbe9de6038 R14: 00007ffbe9de5fa0 R15: 00007fffaf9d6458 [ 1338.282850][T19935] [ 1338.437926][T19940] IPv6: Can't replace route, no match found [ 1338.712922][T19950] device wg2 left promiscuous mode [ 1338.783750][T19952] device wg2 left promiscuous mode [ 1338.857992][T19950] device wg2 entered promiscuous mode [ 1338.904299][T19949] device wg2 entered promiscuous mode [ 1339.313186][T19969] netlink: 16211 bytes leftover after parsing attributes in process `syz.4.4421'. [ 1339.831782][T19982] netlink: 16054 bytes leftover after parsing attributes in process `syz.1.4424'. [ 1342.502335][T19997] device wg2 left promiscuous mode [ 1342.535270][T19994] device wg2 entered promiscuous mode [ 1342.793493][T20008] device wg2 left promiscuous mode [ 1342.855313][T20008] device wg2 entered promiscuous mode [ 1342.969508][T20014] IPv6: Can't replace route, no match found [ 1343.126228][T20021] FAULT_INJECTION: forcing a failure. [ 1343.126228][T20021] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1343.170267][T20021] CPU: 1 PID: 20021 Comm: syz.3.4439 Not tainted syzkaller #0 [ 1343.177807][T20021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1343.187901][T20021] Call Trace: [ 1343.191212][T20021] [ 1343.194175][T20021] dump_stack_lvl+0x168/0x22e [ 1343.198913][T20021] ? show_regs_print_info+0x12/0x12 [ 1343.204152][T20021] ? load_image+0x3b0/0x3b0 [ 1343.208707][T20021] ? __lock_acquire+0x7c50/0x7c50 [ 1343.213793][T20021] should_fail_ex+0x399/0x4d0 [ 1343.218527][T20021] _copy_from_user+0x2c/0x170 [ 1343.223255][T20021] addrconf_del_ifaddr+0xc6/0x160 [ 1343.228343][T20021] ? inet6_addr_add+0x9b0/0x9b0 [ 1343.233426][T20021] ? __lock_acquire+0x7c50/0x7c50 [ 1343.238499][T20021] ? slab_free_freelist_hook+0x131/0x1a0 [ 1343.244176][T20021] inet6_ioctl+0x1d2/0x240 [ 1343.248627][T20021] ? __kmem_cache_free+0xb6/0x1f0 [ 1343.253700][T20021] ? inet6_getname+0x640/0x640 [ 1343.258522][T20021] ? tomoyo_path_number_perm+0x503/0x600 [ 1343.264224][T20021] ? tomoyo_path_number_perm+0x1b6/0x600 [ 1343.269919][T20021] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 1343.275440][T20021] sock_do_ioctl+0xd3/0x2f0 [ 1343.280023][T20021] ? sock_show_fdinfo+0xb0/0xb0 [ 1343.284949][T20021] sock_ioctl+0x4ed/0x6e0 [ 1343.289349][T20021] ? sock_poll+0x3f0/0x3f0 [ 1343.293857][T20021] ? bpf_lsm_file_ioctl+0x5/0x10 [ 1343.298847][T20021] ? security_file_ioctl+0x7c/0xa0 [ 1343.304001][T20021] ? sock_poll+0x3f0/0x3f0 [ 1343.308470][T20021] __se_sys_ioctl+0xfa/0x170 [ 1343.313283][T20021] do_syscall_64+0x4c/0xa0 [ 1343.317744][T20021] ? clear_bhb_loop+0x60/0xb0 [ 1343.322457][T20021] ? clear_bhb_loop+0x60/0xb0 [ 1343.327177][T20021] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1343.333110][T20021] RIP: 0033:0x7ffbe9b8eec9 [ 1343.337787][T20021] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1343.357566][T20021] RSP: 002b:00007ffbea9d3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1343.366021][T20021] RAX: ffffffffffffffda RBX: 00007ffbe9de5fa0 RCX: 00007ffbe9b8eec9 [ 1343.374063][T20021] RDX: 0000200000000000 RSI: 0000000000008936 RDI: 0000000000000003 [ 1343.382073][T20021] RBP: 00007ffbea9d3090 R08: 0000000000000000 R09: 0000000000000000 [ 1343.390096][T20021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1343.398190][T20021] R13: 00007ffbe9de6038 R14: 00007ffbe9de5fa0 R15: 00007fffaf9d6458 [ 1343.406215][T20021] [ 1343.838810][T20032] netlink: 'syz.3.4443': attribute type 27 has an invalid length. [ 1343.852001][T20032] netlink: 'syz.3.4443': attribute type 1 has an invalid length. [ 1343.956857][T20030] netlink: 'syz.1.4442': attribute type 25 has an invalid length. [ 1344.338762][T20039] netlink: 'syz.0.4446': attribute type 8 has an invalid length. [ 1344.641000][T20056] device wg2 left promiscuous mode [ 1344.775956][T20054] device wg2 entered promiscuous mode [ 1345.037205][T20071] IPv6: Can't replace route, no match found [ 1345.171625][T20070] netlink: 'syz.0.4458': attribute type 25 has an invalid length. [ 1346.366926][T20094] device bridge0 entered promiscuous mode [ 1346.541549][T20098] bond_slave_1: mtu less than device minimum [ 1346.610145][T20102] FAULT_INJECTION: forcing a failure. [ 1346.610145][T20102] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1346.645181][T20102] CPU: 1 PID: 20102 Comm: syz.4.4469 Not tainted syzkaller #0 [ 1346.652733][T20102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1346.662833][T20102] Call Trace: [ 1346.666154][T20102] [ 1346.669152][T20102] dump_stack_lvl+0x168/0x22e [ 1346.673884][T20102] ? show_regs_print_info+0x12/0x12 [ 1346.679132][T20102] ? load_image+0x3b0/0x3b0 [ 1346.683702][T20102] ? __might_fault+0xa6/0x120 [ 1346.688452][T20102] should_fail_ex+0x399/0x4d0 [ 1346.693190][T20102] copyin+0x1b/0x120 [ 1346.697163][T20102] _copy_from_iter+0x55c/0x10c0 [ 1346.702097][T20102] ? copyout_mc+0x110/0x110 [ 1346.706647][T20102] ? __virt_addr_valid+0x188/0x540 [ 1346.711809][T20102] ? __virt_addr_valid+0x188/0x540 [ 1346.716976][T20102] ? __virt_addr_valid+0x465/0x540 [ 1346.722139][T20102] ? __check_object_size+0x500/0xa40 [ 1346.727470][T20102] netlink_sendmsg+0x746/0xbc0 [ 1346.732292][T20102] ? netlink_getsockopt+0x540/0x540 [ 1346.737534][T20102] ? aa_sock_msg_perm+0x94/0x150 [ 1346.742613][T20102] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1346.747933][T20102] ? security_socket_sendmsg+0x7c/0xa0 [ 1346.753477][T20102] ? netlink_getsockopt+0x540/0x540 [ 1346.758720][T20102] ____sys_sendmsg+0x59b/0x970 [ 1346.763544][T20102] ? __sys_sendmsg_sock+0x30/0x30 [ 1346.768696][T20102] ? __import_iovec+0x315/0x500 [ 1346.773601][T20102] ? import_iovec+0x6f/0xa0 [ 1346.778155][T20102] ___sys_sendmsg+0x21c/0x290 [ 1346.782879][T20102] ? __sys_sendmsg+0x270/0x270 [ 1346.787775][T20102] ? irqentry_enter+0x33/0x50 [ 1346.792620][T20102] __se_sys_sendmsg+0x19e/0x270 [ 1346.797509][T20102] ? perf_trace_preemptirq_template+0x287/0x330 [ 1346.803791][T20102] ? __x64_sys_sendmsg+0x80/0x80 [ 1346.808790][T20102] ? lockdep_hardirqs_on+0x94/0x140 [ 1346.814036][T20102] do_syscall_64+0x4c/0xa0 [ 1346.818485][T20102] ? clear_bhb_loop+0x60/0xb0 [ 1346.823195][T20102] ? clear_bhb_loop+0x60/0xb0 [ 1346.827918][T20102] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1346.834025][T20102] RIP: 0033:0x7fe484d8eec9 [ 1346.838478][T20102] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1346.858124][T20102] RSP: 002b:00007fe485c81038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1346.866585][T20102] RAX: ffffffffffffffda RBX: 00007fe484fe5fa0 RCX: 00007fe484d8eec9 [ 1346.874590][T20102] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000006 [ 1346.882602][T20102] RBP: 00007fe485c81090 R08: 0000000000000000 R09: 0000000000000000 [ 1346.890605][T20102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1346.898617][T20102] R13: 00007fe484fe6038 R14: 00007fe484fe5fa0 R15: 00007ffd2926ba98 [ 1346.906652][T20102] [ 1348.001484][T20125] netlink: 'syz.4.4475': attribute type 25 has an invalid length. [ 1348.024078][T20126] netlink: 'syz.4.4475': attribute type 16 has an invalid length. [ 1348.042465][T20126] netlink: 48 bytes leftover after parsing attributes in process `syz.4.4475'. [ 1348.824942][T20156] netlink: 16054 bytes leftover after parsing attributes in process `syz.2.4487'. [ 1350.267765][T20174] netlink: 'syz.0.4494': attribute type 25 has an invalid length. [ 1350.302776][T20174] netlink: 'syz.0.4494': attribute type 16 has an invalid length. [ 1350.333038][T20174] netlink: 48 bytes leftover after parsing attributes in process `syz.0.4494'. [ 1350.359589][T20183] IPv6: Can't replace route, no match found [ 1350.411521][T20187] device wg2 left promiscuous mode [ 1350.494187][T20187] device wg2 entered promiscuous mode [ 1350.703173][T20196] FAULT_INJECTION: forcing a failure. [ 1350.703173][T20196] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.744368][T20196] CPU: 0 PID: 20196 Comm: syz.0.4501 Not tainted syzkaller #0 [ 1350.751915][T20196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1350.762029][T20196] Call Trace: [ 1350.765348][T20196] [ 1350.768317][T20196] dump_stack_lvl+0x168/0x22e [ 1350.773052][T20196] ? show_regs_print_info+0x12/0x12 [ 1350.778352][T20196] ? load_image+0x3b0/0x3b0 [ 1350.782912][T20196] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 1350.789041][T20196] ? lock_chain_count+0x20/0x20 [ 1350.794108][T20196] ? _raw_spin_lock_irqsave+0x7f/0xf0 [ 1350.799545][T20196] should_fail_ex+0x399/0x4d0 [ 1350.804283][T20196] should_failslab+0x5/0x20 [ 1350.808836][T20196] slab_pre_alloc_hook+0x59/0x310 [ 1350.813911][T20196] kmem_cache_alloc+0x56/0x2f0 [ 1350.818716][T20196] ? __build_skb+0x2a/0x3c0 [ 1350.823273][T20196] __build_skb+0x2a/0x3c0 [ 1350.827653][T20196] build_skb+0x1e/0x230 [ 1350.831862][T20196] bpf_prog_test_run_skb+0x372/0x11b0 [ 1350.837292][T20196] ? __fget_files+0x28/0x4d0 [ 1350.841939][T20196] ? __fget_files+0x44a/0x4d0 [ 1350.846677][T20196] ? cpu_online+0xa0/0xa0 [ 1350.851070][T20196] bpf_prog_test_run+0x31e/0x390 [ 1350.856061][T20196] __sys_bpf+0x593/0x6d0 [ 1350.860361][T20196] ? bpf_link_show_fdinfo+0x340/0x340 [ 1350.865805][T20196] ? lock_chain_count+0x20/0x20 [ 1350.870712][T20196] __x64_sys_bpf+0x78/0x90 [ 1350.875173][T20196] do_syscall_64+0x4c/0xa0 [ 1350.879646][T20196] ? clear_bhb_loop+0x60/0xb0 [ 1350.884370][T20196] ? clear_bhb_loop+0x60/0xb0 [ 1350.889357][T20196] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1350.895297][T20196] RIP: 0033:0x7f87f638eec9 [ 1350.899745][T20196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1350.919396][T20196] RSP: 002b:00007f87f71bb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1350.927866][T20196] RAX: ffffffffffffffda RBX: 00007f87f65e5fa0 RCX: 00007f87f638eec9 [ 1350.935876][T20196] RDX: 0000000000000050 RSI: 0000200000002300 RDI: 000000000000000a [ 1350.943889][T20196] RBP: 00007f87f71bb090 R08: 0000000000000000 R09: 0000000000000000 [ 1350.951907][T20196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1350.959923][T20196] R13: 00007f87f65e6038 R14: 00007f87f65e5fa0 R15: 00007ffccd1c5678 [ 1350.967963][T20196] [ 1351.890058][T20209] netlink: 16054 bytes leftover after parsing attributes in process `syz.0.4504'. [ 1353.056336][T20216] device bridge_slave_1 left promiscuous mode [ 1353.088495][T20216] bridge0: port 2(bridge_slave_1) entered disabled state [ 1353.128603][T20216] device bridge_slave_0 left promiscuous mode [ 1353.145539][T20216] bridge0: port 1(bridge_slave_0) entered disabled state [ 1353.530203][T20239] IPv6: Can't replace route, no match found [ 1354.580221][T20253] netlink: 72 bytes leftover after parsing attributes in process `syz.3.4519'. [ 1354.672425][T20257] FAULT_INJECTION: forcing a failure. [ 1354.672425][T20257] name failslab, interval 1, probability 0, space 0, times 0 [ 1354.692371][T20257] CPU: 1 PID: 20257 Comm: syz.4.4523 Not tainted syzkaller #0 [ 1354.699940][T20257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1354.710054][T20257] Call Trace: [ 1354.713379][T20257] [ 1354.716363][T20257] dump_stack_lvl+0x168/0x22e [ 1354.721200][T20257] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 1354.727433][T20257] ? show_regs_print_info+0x12/0x12 [ 1354.732695][T20257] ? load_image+0x3b0/0x3b0 [ 1354.737291][T20257] should_fail_ex+0x399/0x4d0 [ 1354.742048][T20257] should_failslab+0x5/0x20 [ 1354.746654][T20257] slab_pre_alloc_hook+0x59/0x310 [ 1354.751748][T20257] kmem_cache_alloc+0x56/0x2f0 [ 1354.756561][T20257] ? skb_clone+0x1e7/0x370 [ 1354.761048][T20257] skb_clone+0x1e7/0x370 [ 1354.765360][T20257] __netlink_deliver_tap+0x3ed/0x800 [ 1354.770730][T20257] ? netlink_deliver_tap+0x2e/0x1b0 [ 1354.775998][T20257] netlink_deliver_tap+0x19c/0x1b0 [ 1354.781169][T20257] netlink_sendskb+0x64/0x130 [ 1354.785950][T20257] netlink_ack+0xc7a/0x1100 [ 1354.790571][T20257] ? netlink_dump+0xcd0/0xcd0 [ 1354.795347][T20257] netlink_rcv_skb+0x263/0x420 [ 1354.800183][T20257] ? genl_bind+0x350/0x350 [ 1354.804659][T20257] ? netlink_ack+0x1100/0x1100 [ 1354.809507][T20257] ? down_read+0x1a8/0x2d0 [ 1354.813996][T20257] genl_rcv+0x24/0x40 [ 1354.818035][T20257] netlink_unicast+0x74d/0x8d0 [ 1354.822905][T20257] netlink_sendmsg+0x89e/0xbc0 [ 1354.827757][T20257] ? netlink_getsockopt+0x540/0x540 [ 1354.833032][T20257] ? aa_sock_msg_perm+0x94/0x150 [ 1354.838049][T20257] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1354.843393][T20257] ? security_socket_sendmsg+0x7c/0xa0 [ 1354.848929][T20257] ? netlink_getsockopt+0x540/0x540 [ 1354.854193][T20257] ____sys_sendmsg+0x59b/0x970 [ 1354.859043][T20257] ? __sys_sendmsg_sock+0x30/0x30 [ 1354.864120][T20257] ? __import_iovec+0x315/0x500 [ 1354.869050][T20257] ? import_iovec+0x6f/0xa0 [ 1354.873617][T20257] ___sys_sendmsg+0x21c/0x290 [ 1354.878354][T20257] ? __sys_sendmsg+0x270/0x270 [ 1354.883230][T20257] ? __lock_acquire+0x7c50/0x7c50 [ 1354.888374][T20257] ? __fdget+0x17c/0x200 [ 1354.892685][T20257] __se_sys_sendmsg+0x19e/0x270 [ 1354.897597][T20257] ? __x64_sys_sendmsg+0x80/0x80 [ 1354.902984][T20257] ? lockdep_hardirqs_on+0x94/0x140 [ 1354.908253][T20257] do_syscall_64+0x4c/0xa0 [ 1354.912720][T20257] ? clear_bhb_loop+0x60/0xb0 [ 1354.917447][T20257] ? clear_bhb_loop+0x60/0xb0 [ 1354.922176][T20257] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1354.928116][T20257] RIP: 0033:0x7fe484d8eec9 [ 1354.932577][T20257] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1354.952241][T20257] RSP: 002b:00007fe485c81038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1354.960845][T20257] RAX: ffffffffffffffda RBX: 00007fe484fe5fa0 RCX: 00007fe484d8eec9 [ 1354.968905][T20257] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000006 [ 1354.976926][T20257] RBP: 00007fe485c81090 R08: 0000000000000000 R09: 0000000000000000 [ 1354.984974][T20257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1354.993001][T20257] R13: 00007fe484fe6038 R14: 00007fe484fe5fa0 R15: 00007ffd2926ba98 [ 1355.001048][T20257] [ 1355.096373][T20263] netlink: 'syz.2.4524': attribute type 10 has an invalid length. [ 1355.228230][T20263] team0: Port device dummy0 added [ 1355.235982][T20264] netlink: 'syz.2.4524': attribute type 10 has an invalid length. [ 1355.273166][T20264] team0: Port device dummy0 removed [ 1355.282416][T20264] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 1355.327600][T20269] netlink: 16054 bytes leftover after parsing attributes in process `syz.4.4527'. [ 1355.358824][T20268] netlink: 'syz.1.4526': attribute type 29 has an invalid length. [ 1355.568103][T20280] IPv6: Can't replace route, no match found [ 1355.800739][T20287] netlink: 'syz.0.4533': attribute type 27 has an invalid length. [ 1355.823621][T20287] netlink: 'syz.0.4533': attribute type 1 has an invalid length. [ 1356.293307][T20288] netlink: 28 bytes leftover after parsing attributes in process `syz.1.4532'. [ 1356.315211][T20288] netlink: 28 bytes leftover after parsing attributes in process `syz.1.4532'. [ 1356.355860][T20284] netlink: 28 bytes leftover after parsing attributes in process `syz.1.4532'. [ 1356.502726][T20293] netlink: 28 bytes leftover after parsing attributes in process `syz.1.4532'. [ 1356.709962][T20300] device macvlan0 entered promiscuous mode [ 1356.739585][T20301] netlink: 16375 bytes leftover after parsing attributes in process `syz.0.4539'. [ 1357.209002][T20307] netlink: 16375 bytes leftover after parsing attributes in process `syz.3.4541'. [ 1357.377034][T20314] device wg2 left promiscuous mode [ 1357.468172][T20317] device wg2 entered promiscuous mode [ 1357.543914][T20326] IPv6: Can't replace route, no match found [ 1357.708432][T20331] netlink: 16054 bytes leftover after parsing attributes in process `syz.4.4548'. [ 1358.511978][T20340] netlink: 'syz.1.4550': attribute type 3 has an invalid length. [ 1358.528576][T20340] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.4550'. [ 1358.889463][T20350] bridge0: port 2(bridge_slave_1) entered disabled state [ 1358.947493][T20350] device bridge0 left promiscuous mode [ 1359.057471][T20350] bridge0: port 2(bridge_slave_1) entered blocking state [ 1359.064671][T20350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1359.099218][T20350] device bridge0 entered promiscuous mode [ 1359.324183][T20356] tc_dump_action: action bad kind [ 1359.342701][T20358] netlink: 'syz.1.4556': attribute type 10 has an invalid length. [ 1359.429611][T20358] team0: Port device dummy0 added [ 1359.474347][T20356] device wg2 left promiscuous mode [ 1359.512146][T20367] FAULT_INJECTION: forcing a failure. [ 1359.512146][T20367] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1359.526313][T20367] CPU: 1 PID: 20367 Comm: syz.4.4560 Not tainted syzkaller #0 [ 1359.533817][T20367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1359.543895][T20367] Call Trace: [ 1359.547189][T20367] [ 1359.550182][T20367] dump_stack_lvl+0x168/0x22e [ 1359.554901][T20367] ? show_regs_print_info+0x12/0x12 [ 1359.560221][T20367] ? load_image+0x3b0/0x3b0 [ 1359.564761][T20367] ? ___ratelimit+0x4de/0x5f0 [ 1359.569554][T20367] should_fail_ex+0x399/0x4d0 [ 1359.574265][T20367] _copy_from_user+0x2c/0x170 [ 1359.578970][T20367] iovec_from_user+0x143/0x360 [ 1359.583769][T20367] __import_iovec+0x6d/0x500 [ 1359.588389][T20367] ? __might_fault+0xa6/0x120 [ 1359.593101][T20367] import_iovec+0x6f/0xa0 [ 1359.597464][T20367] ___sys_sendmsg+0x1e4/0x290 [ 1359.602172][T20367] ? __sys_sendmsg+0x270/0x270 [ 1359.606980][T20367] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 1359.613096][T20367] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 1359.619298][T20367] ? __se_sys_sendmsg+0xa1/0x270 [ 1359.624288][T20367] ? __se_sys_sendmsg+0xcd/0x270 [ 1359.629256][T20367] ? kasan_check_range+0x7b/0x290 [ 1359.634701][T20367] __se_sys_sendmsg+0x19e/0x270 [ 1359.639623][T20367] ? __x64_sys_sendmsg+0x80/0x80 [ 1359.644599][T20367] ? syscall_enter_from_user_mode+0x2a/0x80 [ 1359.650521][T20367] do_syscall_64+0x4c/0xa0 [ 1359.654958][T20367] ? clear_bhb_loop+0x60/0xb0 [ 1359.659660][T20367] ? clear_bhb_loop+0x60/0xb0 [ 1359.664448][T20367] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1359.670376][T20367] RIP: 0033:0x7fe484d8eec9 [ 1359.674904][T20367] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1359.694548][T20367] RSP: 002b:00007fe485c81038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1359.702987][T20367] RAX: ffffffffffffffda RBX: 00007fe484fe5fa0 RCX: 00007fe484d8eec9 [ 1359.710980][T20367] RDX: 0000000000000080 RSI: 0000200000001080 RDI: 0000000000000009 [ 1359.718977][T20367] RBP: 00007fe485c81090 R08: 0000000000000000 R09: 0000000000000000 [ 1359.727009][T20367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1359.735087][T20367] R13: 00007fe484fe6038 R14: 00007fe484fe5fa0 R15: 00007ffd2926ba98 [ 1359.743094][T20367] [ 1359.769287][T20363] device wg2 entered promiscuous mode [ 1359.799530][T20365] netlink: 'syz.3.4558': attribute type 10 has an invalid length. [ 1359.815119][T20365] __nla_validate_parse: 2 callbacks suppressed [ 1359.815139][T20365] netlink: 65015 bytes leftover after parsing attributes in process `syz.3.4558'. [ 1359.845753][T20362] netlink: 'syz.1.4556': attribute type 10 has an invalid length. [ 1359.882809][T20362] team0: Port device dummy0 removed [ 1359.902190][T20362] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 1360.096988][T20376] netlink: 'syz.0.4562': attribute type 3 has an invalid length. [ 1360.136682][T20376] netlink: 'syz.0.4562': attribute type 1 has an invalid length. [ 1360.174618][T20376] netlink: 60387 bytes leftover after parsing attributes in process `syz.0.4562'. [ 1360.525503][T20387] netlink: 16054 bytes leftover after parsing attributes in process `syz.1.4564'. [ 1360.562390][T20386] bond0: (slave dummy0): Error: Slave device does not support XDP [ 1360.871076][T20394] netlink: 122896 bytes leftover after parsing attributes in process `syz.2.4563'. [ 1361.440151][T20390] netlink: 'syz.2.4563': attribute type 10 has an invalid length. [ 1361.480379][T20390] bond0: (slave bond_slave_0): Releasing backup interface [ 1361.618410][T20397] netlink: 16410 bytes leftover after parsing attributes in process `syz.4.4566'. [ 1361.707475][ T1276] ieee802154 phy0 wpan0: encryption failed: -22 [ 1361.713963][ T1276] ieee802154 phy1 wpan1: encryption failed: -22 [ 1361.784756][T20408] FAULT_INJECTION: forcing a failure. [ 1361.784756][T20408] name failslab, interval 1, probability 0, space 0, times 0 [ 1361.836344][T20408] CPU: 0 PID: 20408 Comm: syz.0.4569 Not tainted syzkaller #0 [ 1361.843990][T20408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1361.854105][T20408] Call Trace: [ 1361.857423][T20408] [ 1361.860398][T20408] dump_stack_lvl+0x168/0x22e [ 1361.865146][T20408] ? __alloc_skb+0xfc/0x7e0 [ 1361.869706][T20408] ? show_regs_print_info+0x12/0x12 [ 1361.874952][T20408] ? load_image+0x3b0/0x3b0 [ 1361.879502][T20408] ? kasan_set_track+0x60/0x70 [ 1361.884318][T20408] ? __alloc_skb+0x22a/0x7e0 [ 1361.888974][T20408] ? verify_lock_unused+0x140/0x140 [ 1361.894224][T20408] should_fail_ex+0x399/0x4d0 [ 1361.898968][T20408] should_failslab+0x5/0x20 [ 1361.903535][T20408] slab_pre_alloc_hook+0x59/0x310 [ 1361.908628][T20408] kmem_cache_alloc+0x56/0x2f0 [ 1361.913458][T20408] ? skb_clone+0x1e7/0x370 [ 1361.917943][T20408] skb_clone+0x1e7/0x370 [ 1361.922255][T20408] __netlink_deliver_tap+0x3ed/0x800 [ 1361.927605][T20408] ? netlink_deliver_tap+0x2e/0x1b0 [ 1361.932890][T20408] netlink_deliver_tap+0x19c/0x1b0 [ 1361.938067][T20408] netlink_sendskb+0x64/0x130 [ 1361.942903][T20408] netlink_ack+0xc7a/0x1100 [ 1361.947462][T20408] ? __dev_queue_xmit+0x26f/0x3760 [ 1361.952969][T20408] ? netlink_dump+0xcd0/0xcd0 [ 1361.957678][T20408] ? __skb_clone+0x480/0x790 [ 1361.962383][T20408] netlink_rcv_skb+0x263/0x420 [ 1361.967203][T20408] ? rtnetlink_bind+0x80/0x80 [ 1361.971959][T20408] ? netlink_ack+0x1100/0x1100 [ 1361.976862][T20408] ? netlink_deliver_tap+0x2e/0x1b0 [ 1361.982208][T20408] netlink_unicast+0x74d/0x8d0 [ 1361.987003][T20408] netlink_sendmsg+0x89e/0xbc0 [ 1361.991813][T20408] ? netlink_getsockopt+0x540/0x540 [ 1361.997310][T20408] ? aa_sock_msg_perm+0x94/0x150 [ 1362.002361][T20408] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1362.007701][T20408] ? security_socket_sendmsg+0x7c/0xa0 [ 1362.013204][T20408] ? netlink_getsockopt+0x540/0x540 [ 1362.018432][T20408] ____sys_sendmsg+0x59b/0x970 [ 1362.023229][T20408] ? __sys_sendmsg_sock+0x30/0x30 [ 1362.028272][T20408] ? __import_iovec+0x315/0x500 [ 1362.033160][T20408] ? import_iovec+0x6f/0xa0 [ 1362.037688][T20408] ___sys_sendmsg+0x21c/0x290 [ 1362.042389][T20408] ? __sys_sendmsg+0x270/0x270 [ 1362.047454][T20408] ? __lock_acquire+0x7c50/0x7c50 [ 1362.052515][T20408] ? __fdget+0x17c/0x200 [ 1362.056794][T20408] __se_sys_sendmsg+0x19e/0x270 [ 1362.061674][T20408] ? __x64_sys_sendmsg+0x80/0x80 [ 1362.066649][T20408] ? lockdep_hardirqs_on+0x94/0x140 [ 1362.071876][T20408] do_syscall_64+0x4c/0xa0 [ 1362.076313][T20408] ? clear_bhb_loop+0x60/0xb0 [ 1362.081005][T20408] ? clear_bhb_loop+0x60/0xb0 [ 1362.085701][T20408] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1362.091610][T20408] RIP: 0033:0x7f87f638eec9 [ 1362.096041][T20408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1362.115666][T20408] RSP: 002b:00007f87f71bb038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1362.124210][T20408] RAX: ffffffffffffffda RBX: 00007f87f65e5fa0 RCX: 00007f87f638eec9 [ 1362.132317][T20408] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 1362.140311][T20408] RBP: 00007f87f71bb090 R08: 0000000000000000 R09: 0000000000000000 [ 1362.148401][T20408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1362.156576][T20408] R13: 00007f87f65e6038 R14: 00007f87f65e5fa0 R15: 00007ffccd1c5678 [ 1362.164599][T20408] [ 1362.232080][T20416] netlink: 'syz.2.4572': attribute type 29 has an invalid length. [ 1362.255369][T20416] netlink: 'syz.2.4572': attribute type 29 has an invalid length. [ 1362.272258][T20416] netlink: 'syz.2.4572': attribute type 29 has an invalid length. [ 1362.286584][T20416] netlink: 'syz.2.4572': attribute type 29 has an invalid length. [ 1362.486012][ T46] tipc: Subscription rejected, illegal request [ 1362.492713][T20420] IPv6: Can't replace route, no match found [ 1362.815496][ T46] tipc: Subscription rejected, illegal request [ 1362.836349][T20426] IPv6: Can't replace route, no match found [ 1362.854837][T20424] netlink: 'syz.2.4576': attribute type 25 has an invalid length. [ 1362.875432][T20424] netlink: 'syz.2.4576': attribute type 16 has an invalid length. [ 1362.893957][T20424] netlink: 48 bytes leftover after parsing attributes in process `syz.2.4576'. [ 1362.918234][T20428] netlink: 'syz.3.4575': attribute type 10 has an invalid length. [ 1363.001368][T20428] team0: Port device dummy0 added [ 1363.050712][T20431] netlink: 'syz.3.4575': attribute type 10 has an invalid length. [ 1363.108907][T20431] team0: Port device dummy0 removed [ 1363.122337][T20431] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 1363.956302][T20442] device wg2 left promiscuous mode [ 1364.004614][T20443] device wg2 entered promiscuous mode [ 1364.279016][T20454] netlink: 'syz.2.4587': attribute type 13 has an invalid length. [ 1364.296521][T20454] netlink: 164 bytes leftover after parsing attributes in process `syz.2.4587'. [ 1364.686541][T20464] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4589'. [ 1364.811725][T20464] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4589'. [ 1365.009201][T20464] netlink: 33 bytes leftover after parsing attributes in process `syz.3.4589'. [ 1365.031017][T20464] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4589'. [ 1365.077001][T20464] netlink: 33 bytes leftover after parsing attributes in process `syz.3.4589'. [ 1365.133367][T20464] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4589'. [ 1365.150239][T20464] netlink: 33 bytes leftover after parsing attributes in process `syz.3.4589'. [ 1365.509524][ T46] tipc: Subscription rejected, illegal request [ 1366.748655][T20496] netlink: 16054 bytes leftover after parsing attributes in process `syz.1.4598'. [ 1368.547857][T20480] IPv6: Can't replace route, no match found [ 1368.553969][T20482] validate_nla: 1 callbacks suppressed [ 1368.553985][T20482] netlink: 'syz.4.4596': attribute type 29 has an invalid length. [ 1368.573849][T20488] netlink: 'syz.4.4596': attribute type 10 has an invalid length. [ 1368.582155][T20488] netlink: 55 bytes leftover after parsing attributes in process `syz.4.4596'. [ 1369.069414][T20502] device wg2 left promiscuous mode [ 1369.108018][T20500] device wg2 entered promiscuous mode [ 1369.244571][T20507] netlink: 'syz.3.4602': attribute type 10 has an invalid length. [ 1369.359831][T20517] FAULT_INJECTION: forcing a failure. [ 1369.359831][T20517] name failslab, interval 1, probability 0, space 0, times 0 [ 1369.448878][T20517] CPU: 0 PID: 20517 Comm: syz.0.4605 Not tainted syzkaller #0 [ 1369.456459][T20517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1369.466614][T20517] Call Trace: [ 1369.469973][T20517] [ 1369.472966][T20517] dump_stack_lvl+0x168/0x22e [ 1369.477728][T20517] ? show_regs_print_info+0x12/0x12 [ 1369.483009][T20517] ? load_image+0x3b0/0x3b0 [ 1369.487612][T20517] ? __might_sleep+0xd0/0xd0 [ 1369.492287][T20517] ? __lock_acquire+0x7c50/0x7c50 [ 1369.497389][T20517] ? aa_file_perm+0x3ef/0xec0 [ 1369.502169][T20517] should_fail_ex+0x399/0x4d0 [ 1369.506965][T20517] should_failslab+0x5/0x20 [ 1369.511614][T20517] slab_pre_alloc_hook+0x59/0x310 [ 1369.516718][T20517] ? kernfs_fop_write_iter+0x155/0x520 [ 1369.522252][T20517] __kmem_cache_alloc_node+0x4f/0x260 [ 1369.527707][T20517] ? kernfs_fop_write_iter+0x155/0x520 [ 1369.533336][T20517] __kmalloc+0xa0/0x240 [ 1369.537594][T20517] kernfs_fop_write_iter+0x155/0x520 [ 1369.542986][T20517] vfs_write+0x44c/0x960 [ 1369.547329][T20517] ? file_end_write+0x250/0x250 [ 1369.552281][T20517] ? __fget_files+0x44a/0x4d0 [ 1369.557081][T20517] ? __fdget_pos+0x2ae/0x360 [ 1369.561745][T20517] ? ksys_write+0x71/0x240 [ 1369.566267][T20517] ksys_write+0x143/0x240 [ 1369.570691][T20517] ? __ia32_sys_read+0x80/0x80 [ 1369.575640][T20517] ? lockdep_hardirqs_on+0x94/0x140 [ 1369.580943][T20517] do_syscall_64+0x4c/0xa0 [ 1369.585445][T20517] ? clear_bhb_loop+0x60/0xb0 [ 1369.590200][T20517] ? clear_bhb_loop+0x60/0xb0 [ 1369.595094][T20517] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1369.601093][T20517] RIP: 0033:0x7f87f638eec9 [ 1369.605563][T20517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1369.625376][T20517] RSP: 002b:00007f87f719a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1369.633875][T20517] RAX: ffffffffffffffda RBX: 00007f87f65e6090 RCX: 00007f87f638eec9 [ 1369.641931][T20517] RDX: 0000000000000011 RSI: 0000200000000c40 RDI: 0000000000000007 [ 1369.649979][T20517] RBP: 00007f87f719a090 R08: 0000000000000000 R09: 0000000000000000 [ 1369.658018][T20517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1369.666048][T20517] R13: 00007f87f65e6128 R14: 00007f87f65e6090 R15: 00007ffccd1c5678 [ 1369.674134][T20517] [ 1369.947703][T20507] 8021q: adding VLAN 0 to HW filter on device team0 [ 1369.958566][T20507] bond0: (slave team0): Enslaving as an active interface with an up link [ 1370.351719][T13906] tipc: Subscription rejected, illegal request [ 1370.373647][T20530] IPv6: Can't replace route, no match found [ 1370.534257][T20542] FAULT_INJECTION: forcing a failure. [ 1370.534257][T20542] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1370.560082][T20544] netlink: 63503 bytes leftover after parsing attributes in process `syz.0.4617'. [ 1370.569790][T20542] CPU: 1 PID: 20542 Comm: syz.2.4615 Not tainted syzkaller #0 [ 1370.577316][T20542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1370.587923][T20542] Call Trace: [ 1370.591219][T20542] [ 1370.594172][T20542] dump_stack_lvl+0x168/0x22e [ 1370.598884][T20542] ? show_regs_print_info+0x12/0x12 [ 1370.604111][T20542] ? load_image+0x3b0/0x3b0 [ 1370.608651][T20542] ? __lock_acquire+0x7c50/0x7c50 [ 1370.613715][T20542] ? verify_lock_unused+0x140/0x140 [ 1370.619081][T20542] should_fail_ex+0x399/0x4d0 [ 1370.623823][T20542] _copy_from_user+0x2c/0x170 [ 1370.628538][T20542] ___sys_sendmsg+0x155/0x290 [ 1370.633244][T20542] ? __sys_sendmsg+0x270/0x270 [ 1370.638046][T20542] ? __lock_acquire+0x7c50/0x7c50 [ 1370.643106][T20542] ? __fdget+0x17c/0x200 [ 1370.647380][T20542] __se_sys_sendmsg+0x19e/0x270 [ 1370.652260][T20542] ? __x64_sys_sendmsg+0x80/0x80 [ 1370.657232][T20542] ? lockdep_hardirqs_on+0x94/0x140 [ 1370.662459][T20542] do_syscall_64+0x4c/0xa0 [ 1370.667072][T20542] ? clear_bhb_loop+0x60/0xb0 [ 1370.671850][T20542] ? clear_bhb_loop+0x60/0xb0 [ 1370.676569][T20542] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1370.682479][T20542] RIP: 0033:0x7f08fed8eec9 [ 1370.687017][T20542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1370.706918][T20542] RSP: 002b:00007f08ffd04038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1370.715355][T20542] RAX: ffffffffffffffda RBX: 00007f08fefe5fa0 RCX: 00007f08fed8eec9 [ 1370.723350][T20542] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 1370.731344][T20542] RBP: 00007f08ffd04090 R08: 0000000000000000 R09: 0000000000000000 [ 1370.739422][T20542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1370.747497][T20542] R13: 00007f08fefe6038 R14: 00007f08fefe5fa0 R15: 00007ffe1e59f1f8 [ 1370.755503][T20542] [ 1371.014629][T20554] netlink: 'syz.3.4620': attribute type 27 has an invalid length. [ 1371.051511][T20554] netlink: 'syz.3.4620': attribute type 1 has an invalid length. [ 1371.122992][T20562] device wg2 left promiscuous mode [ 1371.183430][T20562] device wg2 entered promiscuous mode [ 1371.620358][T20577] IPv6: Can't replace route, no match found [ 1371.637627][T13907] tipc: Subscription rejected, illegal request [ 1371.676607][T20578] IPv6: Can't replace route, no match found [ 1371.683569][T20578] mac80211_hwsim hwsim30 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1372.181845][T20578] netlink: 'syz.3.4628': attribute type 10 has an invalid length. [ 1372.192034][T13906] wlan1: Created IBSS using preconfigured BSSID 00:8d:8d:ff:00:00 [ 1372.228474][T13906] wlan1: Creating new IBSS network, BSSID 00:8d:8d:ff:00:00 [ 1372.287551][T20578] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 1372.294459][T13907] wlan1: Created IBSS using preconfigured BSSID 00:8d:8d:ff:00:00 [ 1372.333332][T13907] wlan1: Creating new IBSS network, BSSID 00:8d:8d:ff:00:00 [ 1372.342258][T20566] syz.1.4622 (20566) used greatest stack depth: 18176 bytes left [ 1372.597974][T20594] netlink: 'syz.2.4636': attribute type 27 has an invalid length. [ 1372.618032][T20594] netlink: 'syz.2.4636': attribute type 1 has an invalid length. [ 1372.737939][T20591] netlink: 'syz.4.4635': attribute type 25 has an invalid length. [ 1372.779468][T20591] netlink: 'syz.4.4635': attribute type 16 has an invalid length. [ 1372.805292][T20591] netlink: 48 bytes leftover after parsing attributes in process `syz.4.4635'. [ 1373.132586][T13898] tipc: Subscription rejected, illegal request [ 1373.382080][T20609] IPv6: Can't replace route, no match found [ 1373.775190][T20607] netlink: 16410 bytes leftover after parsing attributes in process `syz.2.4639'. [ 1373.857783][T20624] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4644'. [ 1373.953736][T20624] mac80211_hwsim hwsim32 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1374.005806][T20630] netlink: 'syz.3.4646': attribute type 2 has an invalid length. [ 1374.016504][T20630] netlink: 'syz.3.4646': attribute type 8 has an invalid length. [ 1374.024472][T20630] netlink: 132 bytes leftover after parsing attributes in process `syz.3.4646'. [ 1374.931809][T20651] netlink: 'syz.4.4655': attribute type 27 has an invalid length. [ 1374.945374][T13898] tipc: Subscription rejected, illegal request [ 1374.957576][T20651] netlink: 'syz.4.4655': attribute type 1 has an invalid length. [ 1374.969883][T20652] IPv6: Can't replace route, no match found [ 1375.227404][T20654] netlink: 'syz.4.4656': attribute type 29 has an invalid length. [ 1375.241545][T20654] netlink: 'syz.4.4656': attribute type 29 has an invalid length. [ 1375.262355][T20654] netlink: 'syz.4.4656': attribute type 29 has an invalid length. [ 1375.285158][T20654] netlink: 'syz.4.4656': attribute type 29 has an invalid length. [ 1375.494240][T20654] device syzkaller0 entered promiscuous mode [ 1375.525408][ T4308] Bluetooth: hci0: unexpected event 0x04 length: 15 > 10 [ 1377.230269][T13901] tipc: Subscription rejected, illegal request [ 1377.545100][ T4314] Bluetooth: hci0: command 0x0409 tx timeout [ 1378.520423][T20673] IPv6: Can't replace route, no match found [ 1378.532467][T20676] mac80211_hwsim hwsim36 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1378.542795][T20679] netlink: 'syz.3.4664': attribute type 25 has an invalid length. [ 1378.550775][T13907] wlan1: Created IBSS using preconfigured BSSID 00:8d:8d:ff:00:00 [ 1378.556074][T20680] netlink: 'syz.2.4663': attribute type 10 has an invalid length. [ 1378.566762][T13907] wlan1: Creating new IBSS network, BSSID 00:8d:8d:ff:00:00 [ 1378.595571][T13898] wlan1: Created IBSS using preconfigured BSSID 00:8d:8d:ff:00:00 [ 1378.599603][T20680] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 1378.603771][T13898] wlan1: Creating new IBSS network, BSSID 00:8d:8d:ff:00:00 [ 1378.633046][T20681] netlink: 48 bytes leftover after parsing attributes in process `syz.3.4664'. [ 1378.657048][T20688] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 1378.657431][T20691] IPv6: Can't replace route, no match found [ 1378.676131][T20688] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 1378.697791][T20688] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1378.816788][T20700] netlink: 132 bytes leftover after parsing attributes in process `syz.4.4670'. [ 1379.236072][T20713] validate_nla: 3 callbacks suppressed [ 1379.236093][T20713] netlink: 'syz.3.4675': attribute type 25 has an invalid length. [ 1380.027972][T20725] netlink: 'syz.0.4680': attribute type 2 has an invalid length. [ 1380.076635][T20725] netlink: 'syz.0.4680': attribute type 8 has an invalid length. [ 1380.084699][T20725] netlink: 132 bytes leftover after parsing attributes in process `syz.0.4680'. [ 1380.119177][T20723] netlink: 'syz.3.4679': attribute type 10 has an invalid length. [ 1380.135783][T20723] netlink: 168 bytes leftover after parsing attributes in process `syz.3.4679'. [ 1380.335257][T13901] tipc: Subscription rejected, illegal request [ 1380.343022][T20738] IPv6: Can't replace route, no match found [ 1380.519455][T20744] netlink: 830 bytes leftover after parsing attributes in process `syz.2.4687'. [ 1380.839642][T20754] netlink: 'syz.1.4691': attribute type 29 has an invalid length. [ 1380.855506][T20754] netlink: 'syz.1.4691': attribute type 29 has an invalid length. [ 1380.871984][T20754] netlink: 'syz.1.4691': attribute type 29 has an invalid length. [ 1380.882279][T20754] netlink: 'syz.1.4691': attribute type 29 has an invalid length. [ 1380.901460][T20754] netlink: 'syz.1.4691': attribute type 29 has an invalid length. [ 1381.729278][T13898] tipc: Subscription rejected, illegal request [ 1381.736755][T20771] IPv6: Can't replace route, no match found [ 1382.363780][T20778] delete_channel: no stack [ 1382.651779][T20784] netlink: 14548 bytes leftover after parsing attributes in process `syz.0.4702'. [ 1383.842507][T13907] tipc: Subscription rejected, illegal request [ 1383.882558][T20802] IPv6: Can't replace route, no match found [ 1383.922486][T20800] netlink: 'syz.1.4708': attribute type 2 has an invalid length. [ 1383.973703][T20800] netlink: 132 bytes leftover after parsing attributes in process `syz.1.4708'. [ 1384.286737][T20803] device wg2 left promiscuous mode [ 1384.338841][T20805] device wg2 entered promiscuous mode [ 1384.514022][T20814] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4712'. [ 1384.542608][T20814] tc_dump_action: action bad kind [ 1384.584271][T20814] device wg2 left promiscuous mode [ 1384.656941][T20819] device wg2 entered promiscuous mode [ 1384.886274][T20829] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4728'. [ 1384.925260][T20829] tc_dump_action: action bad kind [ 1384.953496][T20832] device wg2 left promiscuous mode [ 1385.002923][T20829] device wg2 entered promiscuous mode [ 1385.359659][T13901] tipc: Subscription rejected, illegal request [ 1386.478650][T20854] device wg2 left promiscuous mode [ 1386.508469][T20858] device wg2 entered promiscuous mode [ 1386.702666][T20866] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4731'. [ 1386.748243][T20866] tc_dump_action: action bad kind [ 1386.790760][T20872] device wg2 left promiscuous mode [ 1386.838692][T20870] validate_nla: 1 callbacks suppressed [ 1386.838713][T20870] netlink: 'syz.0.4732': attribute type 10 has an invalid length. [ 1386.972858][T20870] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 1387.039263][T20866] device wg2 entered promiscuous mode [ 1387.326159][T13898] tipc: Subscription rejected, illegal request [ 1388.321048][T20888] device wg2 left promiscuous mode [ 1388.344901][T20892] netlink: 830 bytes leftover after parsing attributes in process `syz.0.4740'. [ 1388.376592][T20893] device wg2 entered promiscuous mode [ 1388.391622][T20897] netlink: 16255 bytes leftover after parsing attributes in process `syz.3.4741'. [ 1388.446139][T20898] netlink: 16255 bytes leftover after parsing attributes in process `syz.3.4741'. [ 1388.866850][T20915] netlink: 'syz.3.4746': attribute type 10 has an invalid length. [ 1388.946347][T20913] netlink: 'syz.2.4743': attribute type 1 has an invalid length. [ 1388.954932][T20913] netlink: 176 bytes leftover after parsing attributes in process `syz.2.4743'. [ 1388.982389][T20917] device wg2 left promiscuous mode [ 1389.000298][T20904] delete_channel: no stack [ 1389.856719][T20912] device wg2 entered promiscuous mode [ 1390.058238][T13898] tipc: Subscription rejected, illegal request [ 1390.983245][T13901] wlan1: Trigger new scan to find an IBSS to join [ 1391.122518][T20946] device wg2 left promiscuous mode [ 1391.159692][T20949] device wg2 entered promiscuous mode [ 1391.337015][T20953] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4757'. [ 1391.367855][T20953] tc_dump_action: action bad kind [ 1391.414290][T20955] IPv6: Can't replace route, no match found [ 1391.458984][T20952] device wg2 left promiscuous mode [ 1391.498757][T20955] mac80211_hwsim hwsim28 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1391.529178][T20960] netlink: 'syz.4.4761': attribute type 10 has an invalid length. [ 1391.817723][T20960] team0: Port device netdevsim0 added [ 1391.824407][T20953] device wg2 entered promiscuous mode [ 1391.844268][T13902] wlan1: Created IBSS using preconfigured BSSID 00:8d:8d:ff:00:00 [ 1391.853374][T13902] wlan1: Creating new IBSS network, BSSID 00:8d:8d:ff:00:00 [ 1392.087443][T13902] tipc: Subscription rejected, illegal request [ 1392.399956][T20976] team0: Port device team_slave_0 removed [ 1392.476326][T20976] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 1392.934665][T20974] delete_channel: no stack [ 1393.371387][T20991] netlink: 'syz.3.4767': attribute type 1 has an invalid length. [ 1393.385246][T20991] netlink: 176 bytes leftover after parsing attributes in process `syz.3.4767'. [ 1393.396643][T20994] device wg2 left promiscuous mode [ 1393.423452][T20996] device wg2 entered promiscuous mode [ 1393.442282][T21000] IPv6: Can't replace route, no match found [ 1393.476432][T21000] mac80211_hwsim hwsim28 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1393.480959][T13901] wlan1: Created IBSS using preconfigured BSSID 00:8d:8d:ff:00:00 [ 1393.510291][T13901] wlan1: Creating new IBSS network, BSSID 00:8d:8d:ff:00:00 [ 1393.542587][T21000] netlink: 'syz.0.4771': attribute type 10 has an invalid length. [ 1393.739465][T21005] IPv6: Can't replace route, no match found [ 1393.761826][T21011] mac80211_hwsim hwsim34 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1393.782412][T21009] IPv6: Can't replace route, no match found [ 1393.820994][T21012] mac80211_hwsim hwsim32 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1393.895268][T13901] wlan1: Created IBSS using preconfigured BSSID 00:8d:8d:ff:00:00 [ 1393.930558][T13901] wlan1: Creating new IBSS network, BSSID 00:8d:8d:ff:00:00 [ 1393.945332][T13907] wlan1: Trigger new scan to find an IBSS to join [ 1394.106122][T21026] netlink: 16054 bytes leftover after parsing attributes in process `syz.4.4778'. [ 1394.106353][T13901] tipc: Subscription rejected, illegal request [ 1394.180733][T21030] FAULT_INJECTION: forcing a failure. [ 1394.180733][T21030] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1394.207647][T21030] CPU: 0 PID: 21030 Comm: syz.3.4781 Not tainted syzkaller #0 [ 1394.215538][T21030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1394.225636][T21030] Call Trace: [ 1394.228966][T21030] [ 1394.231940][T21030] dump_stack_lvl+0x168/0x22e [ 1394.236770][T21030] ? show_regs_print_info+0x12/0x12 [ 1394.242013][T21030] ? load_image+0x3b0/0x3b0 [ 1394.246568][T21030] ? __lock_acquire+0x7c50/0x7c50 [ 1394.251637][T21030] ? verify_lock_unused+0x140/0x140 [ 1394.256888][T21030] should_fail_ex+0x399/0x4d0 [ 1394.261629][T21030] _copy_from_user+0x2c/0x170 [ 1394.266359][T21030] ___sys_sendmsg+0x155/0x290 [ 1394.271092][T21030] ? __sys_sendmsg+0x270/0x270 [ 1394.275922][T21030] ? __lock_acquire+0x7c50/0x7c50 [ 1394.281014][T21030] ? __fdget+0x17c/0x200 [ 1394.285325][T21030] __se_sys_sendmsg+0x19e/0x270 [ 1394.290239][T21030] ? __x64_sys_sendmsg+0x80/0x80 [ 1394.295247][T21030] ? lockdep_hardirqs_on+0x94/0x140 [ 1394.300506][T21030] do_syscall_64+0x4c/0xa0 [ 1394.304971][T21030] ? clear_bhb_loop+0x60/0xb0 [ 1394.309781][T21030] ? clear_bhb_loop+0x60/0xb0 [ 1394.314548][T21030] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1394.320486][T21030] RIP: 0033:0x7ffbe9b8eec9 [ 1394.324969][T21030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1394.344604][T21030] RSP: 002b:00007ffbea9d3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1394.353037][T21030] RAX: ffffffffffffffda RBX: 00007ffbe9de5fa0 RCX: 00007ffbe9b8eec9 [ 1394.361027][T21030] RDX: 0000000000000080 RSI: 00002000000002c0 RDI: 0000000000000003 [ 1394.369034][T21030] RBP: 00007ffbea9d3090 R08: 0000000000000000 R09: 0000000000000000 [ 1394.377044][T21030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1394.385055][T21030] R13: 00007ffbe9de6038 R14: 00007ffbe9de5fa0 R15: 00007fffaf9d6458 [ 1394.393065][T21030] [ 1394.496332][T21037] device wg2 left promiscuous mode [ 1394.582166][T21035] device wg2 entered promiscuous mode [ 1394.870542][T21044] netlink: 'syz.2.4786': attribute type 25 has an invalid length. [ 1394.894802][T21044] netlink: 'syz.2.4786': attribute type 16 has an invalid length. [ 1394.966021][T21044] netlink: 48 bytes leftover after parsing attributes in process `syz.2.4786'. [ 1395.665458][T21057] IPv6: Can't replace route, no match found [ 1395.680956][T21057] mac80211_hwsim hwsim30 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1395.715801][T21060] IPv6: Can't replace route, no match found [ 1395.739490][T21060] mac80211_hwsim hwsim34 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1395.903827][T13901] tipc: Subscription rejected, illegal request [ 1395.927789][T21065] IPv6: Can't replace route, no match found [ 1395.953938][T21065] mac80211_hwsim hwsim28 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1396.471507][T21085] netlink: 16054 bytes leftover after parsing attributes in process `syz.1.4802'. [ 1396.772424][T21087] netlink: 'syz.3.4803': attribute type 25 has an invalid length. [ 1396.812402][T21087] netlink: 'syz.3.4803': attribute type 16 has an invalid length. [ 1396.849069][T21087] netlink: 48 bytes leftover after parsing attributes in process `syz.3.4803'. [ 1397.276933][T21098] team0: Port device team_slave_0 removed [ 1397.293652][T21098] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 1397.512564][T13905] tipc: Subscription rejected, illegal request [ 1397.577558][T21112] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4807'. [ 1397.645077][T21112] tc_dump_action: action bad kind [ 1397.682138][T21113] device wg2 left promiscuous mode [ 1397.766529][T21110] device wg2 entered promiscuous mode [ 1397.799338][T21115] IPv6: Can't replace route, no match found [ 1397.806747][T21117] mac80211_hwsim hwsim30 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1397.841282][T21118] IPv6: Can't replace route, no match found [ 1397.876814][T21118] mac80211_hwsim hwsim36 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1397.950895][T13902] wlan1: Trigger new scan to find an IBSS to join [ 1398.046258][T21123] netlink: 'syz.1.4813': attribute type 10 has an invalid length. [ 1398.085304][T21123] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1398.188001][T21123] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1398.417324][T21123] bond0: (slave batadv_slave_0): Enslaving as an active interface with an up link [ 1399.926351][T21136] IPv6: Can't replace route, no match found [ 1399.945606][T13905] wlan1: Trigger new scan to find an IBSS to join [ 1399.961500][T21136] mac80211_hwsim hwsim30 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1400.016105][T21136] netlink: 'syz.3.4817': attribute type 10 has an invalid length. [ 1400.276828][T21143] device wg2 left promiscuous mode [ 1400.303447][T13905] tipc: Subscription rejected, illegal request [ 1400.378667][T21143] device wg2 entered promiscuous mode [ 1400.435844][T21149] device wg2 left promiscuous mode [ 1400.494440][T21150] device wg2 entered promiscuous mode [ 1400.550887][T21152] IPv6: Can't replace route, no match found [ 1400.588062][T21152] mac80211_hwsim hwsim32 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1400.597971][T13907] wlan1: Created IBSS using preconfigured BSSID 00:8d:8d:ff:00:00 [ 1400.623522][T13907] wlan1: Creating new IBSS network, BSSID 00:8d:8d:ff:00:00 [ 1400.715576][T21152] netlink: 'syz.1.4823': attribute type 10 has an invalid length. [ 1400.810971][T13905] wlan1: Created IBSS using preconfigured BSSID 00:8d:8d:ff:00:00 [ 1400.853843][T21152] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 1400.865229][T13905] wlan1: Creating new IBSS network, BSSID 00:8d:8d:ff:00:00 [ 1400.887265][T21158] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4824'. [ 1400.925469][T21158] tc_dump_action: action bad kind [ 1400.943615][T21161] device wg2 left promiscuous mode [ 1400.963839][T21155] device wg2 entered promiscuous mode [ 1401.005457][T21167] netlink: 'syz.4.4828': attribute type 10 has an invalid length. [ 1401.058056][T21167] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1401.107628][T21167] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1401.141928][T21164] IPv6: Can't replace route, no match found [ 1401.169670][T21170] netlink: 'syz.4.4828': attribute type 10 has an invalid length. [ 1401.189138][T21179] FAULT_INJECTION: forcing a failure. [ 1401.189138][T21179] name failslab, interval 1, probability 0, space 0, times 0 [ 1401.193111][T21170] netlink: 40 bytes leftover after parsing attributes in process `syz.4.4828'. [ 1401.205200][T21179] CPU: 1 PID: 21179 Comm: syz.2.4831 Not tainted syzkaller #0 [ 1401.218678][T21179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1401.220437][T21170] device batadv0 entered promiscuous mode [ 1401.228750][T21179] Call Trace: [ 1401.228767][T21179] [ 1401.228778][T21179] dump_stack_lvl+0x168/0x22e [ 1401.228812][T21179] ? show_regs_print_info+0x12/0x12 [ 1401.228837][T21179] ? load_image+0x3b0/0x3b0 [ 1401.228878][T21179] ? __might_sleep+0xd0/0xd0 [ 1401.228911][T21179] ? __lock_acquire+0x7c50/0x7c50 [ 1401.228943][T21179] should_fail_ex+0x399/0x4d0 [ 1401.269991][T21179] should_failslab+0x5/0x20 [ 1401.274622][T21179] slab_pre_alloc_hook+0x59/0x310 [ 1401.279680][T21179] ? apparmor_sk_alloc_security+0x74/0x100 [ 1401.285548][T21179] __kmem_cache_alloc_node+0x4f/0x260 [ 1401.290958][T21179] ? apparmor_sk_alloc_security+0x74/0x100 [ 1401.296801][T21179] kmalloc_trace+0x26/0xe0 [ 1401.301244][T21179] apparmor_sk_alloc_security+0x74/0x100 [ 1401.306944][T21179] security_sk_alloc+0x6a/0xa0 [ 1401.311759][T21179] sk_prot_alloc+0x101/0x210 [ 1401.316362][T21179] ? sk_alloc+0x20/0x340 [ 1401.320619][T21179] sk_alloc+0x36/0x340 [ 1401.324700][T21179] ? bpf_ctx_init+0x163/0x1a0 [ 1401.329412][T21179] ? bpf_prog_test_run_skb+0x267/0x11b0 [ 1401.334997][T21179] bpf_prog_test_run_skb+0x350/0x11b0 [ 1401.340409][T21179] ? __fget_files+0x28/0x4d0 [ 1401.345028][T21179] ? __fget_files+0x44a/0x4d0 [ 1401.349751][T21179] ? cpu_online+0xa0/0xa0 [ 1401.354128][T21179] bpf_prog_test_run+0x31e/0x390 [ 1401.359108][T21179] __sys_bpf+0x593/0x6d0 [ 1401.363385][T21179] ? bpf_link_show_fdinfo+0x340/0x340 [ 1401.368791][T21179] ? lock_chain_count+0x20/0x20 [ 1401.373705][T21179] __x64_sys_bpf+0x78/0x90 [ 1401.378145][T21179] do_syscall_64+0x4c/0xa0 [ 1401.382581][T21179] ? clear_bhb_loop+0x60/0xb0 [ 1401.387283][T21179] ? clear_bhb_loop+0x60/0xb0 [ 1401.391978][T21179] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1401.397887][T21179] RIP: 0033:0x7f08fed8eec9 [ 1401.402365][T21179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1401.422005][T21179] RSP: 002b:00007f08ffd04038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1401.430441][T21179] RAX: ffffffffffffffda RBX: 00007f08fefe5fa0 RCX: 00007f08fed8eec9 [ 1401.438435][T21179] RDX: 0000000000000048 RSI: 0000200000000340 RDI: 000000000000000a [ 1401.446453][T21179] RBP: 00007f08ffd04090 R08: 0000000000000000 R09: 0000000000000000 [ 1401.454441][T21179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1401.462546][T21179] R13: 00007f08fefe6038 R14: 00007f08fefe5fa0 R15: 00007ffe1e59f1f8 [ 1401.470640][T21179] [ 1401.475194][T21170] bond0: (slave batadv0): Releasing backup interface [ 1401.495878][T21170] bridge0: port 3(batadv0) entered blocking state [ 1401.502589][T21170] bridge0: port 3(batadv0) entered disabled state [ 1401.511499][T21173] mac80211_hwsim hwsim30 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1401.521405][T21164] netlink: 'syz.3.4827': attribute type 10 has an invalid length. [ 1401.634577][T21181] IPv6: Can't replace route, no match found [ 1401.666111][T21181] mac80211_hwsim hwsim32 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1401.671524][T13905] wlan1: Created IBSS using preconfigured BSSID 00:8d:8d:ff:00:00 [ 1401.693417][T13905] wlan1: Creating new IBSS network, BSSID 00:8d:8d:ff:00:00 [ 1401.771450][T13902] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 1401.780822][T13902] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 1401.807012][T21181] netlink: 'syz.1.4833': attribute type 10 has an invalid length. [ 1401.845214][T13906] tipc: Subscription rejected, illegal request [ 1402.001066][T13902] wlan1: Trigger new scan to find an IBSS to join [ 1402.892417][T21204] IPv6: Can't replace route, no match found [ 1402.943302][T21204] mac80211_hwsim hwsim30 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1402.993571][T20993] wlan1: Trigger new scan to find an IBSS to join [ 1403.001780][T21209] netlink: 132 bytes leftover after parsing attributes in process `syz.4.4841'. [ 1403.938460][T21221] netlink: 'syz.1.4846': attribute type 10 has an invalid length. [ 1403.982069][T21221] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1404.001812][T21221] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1404.010736][T21226] netlink: 'syz.1.4846': attribute type 10 has an invalid length. [ 1404.055329][T21226] netlink: 40 bytes leftover after parsing attributes in process `syz.1.4846'. [ 1404.064373][T21226] device batadv0 entered promiscuous mode [ 1404.117158][T21226] bond0: (slave batadv0): Releasing backup interface [ 1404.156667][T21226] A link change request failed with some changes committed already. Interface batadv0 may have been left with an inconsistent configuration, please check. [ 1404.173396][T21223] IPv6: Can't replace route, no match found [ 1404.180327][T21227] mac80211_hwsim hwsim28 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1404.196905][T21228] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4857'. [ 1404.227292][T21228] tc_dump_action: action bad kind [ 1404.233200][T21230] IPv6: Can't replace route, no match found [ 1404.258520][T21225] device wg2 left promiscuous mode [ 1404.281071][T21234] mac80211_hwsim hwsim34 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1404.295104][T21223] netlink: 'syz.0.4847': attribute type 10 has an invalid length. [ 1404.360894][T21234] netlink: 'syz.4.4849': attribute type 10 has an invalid length. [ 1404.420042][T21234] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 1404.581072][T13899] tipc: Subscription rejected, illegal request [ 1404.757703][T21249] IPv6: Can't replace route, no match found [ 1404.792809][T21249] mac80211_hwsim hwsim30 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1404.858808][T21253] device wg2 left promiscuous mode [ 1404.981214][T21255] device wg2 entered promiscuous mode [ 1405.021099][T21259] mac80211_hwsim hwsim28 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1405.077138][T21258] IPv6: Can't replace route, no match found [ 1405.310562][T21268] netlink: 'syz.3.4862': attribute type 10 has an invalid length. [ 1405.399008][T21268] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1405.417614][T21269] netlink: 198580 bytes leftover after parsing attributes in process `syz.0.4861'. [ 1405.435694][T21268] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1405.455976][T21270] netlink: 'syz.3.4862': attribute type 10 has an invalid length. [ 1405.469282][T21270] netlink: 40 bytes leftover after parsing attributes in process `syz.3.4862'. [ 1405.496944][T21270] device batadv0 entered promiscuous mode [ 1405.515991][T21270] bond0: (slave batadv0): Releasing backup interface [ 1405.564108][T21270] bridge0: port 3(batadv0) entered blocking state [ 1405.580089][T21270] bridge0: port 3(batadv0) entered disabled state [ 1405.697216][T21275] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4863'. [ 1405.795038][T21275] tc_dump_action: action bad kind [ 1405.850628][T21279] device wg2 left promiscuous mode [ 1405.869856][T21277] IPv6: Can't replace route, no match found [ 1405.883686][T21274] device wg2 entered promiscuous mode [ 1405.923194][T21280] IPv6: Can't replace route, no match found [ 1405.945758][T20993] wlan1: Creating new IBSS network, BSSID 00:8d:8d:ff:00:00 [ 1405.956073][T21284] mac80211_hwsim hwsim28 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1405.965982][T13906] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 1405.975365][T13906] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 1406.013184][T21285] mac80211_hwsim hwsim34 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1406.036470][T21287] netlink: 'syz.0.4874': attribute type 10 has an invalid length. [ 1406.047623][T21280] netlink: 'syz.4.4864': attribute type 10 has an invalid length. [ 1406.239776][T13906] tipc: Subscription rejected, illegal request [ 1406.405548][T21298] IPv6: Can't replace route, no match found [ 1406.433105][T21298] mac80211_hwsim hwsim30 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1407.173669][T21298] netlink: 'syz.3.4870': attribute type 10 has an invalid length. [ 1407.194339][T21301] IPv6: Can't replace route, no match found [ 1407.226547][T21305] mac80211_hwsim hwsim34 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1407.297266][T21306] IPv6: Can't replace route, no match found [ 1407.308111][T21308] mac80211_hwsim hwsim36 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1407.434180][T21316] netlink: 'syz.3.4875': attribute type 10 has an invalid length. [ 1407.508633][T21316] bond0: (slave veth0_to_bridge): Enslaving as an active interface with an up link [ 1407.602915][T21317] device wg2 left promiscuous mode [ 1407.644862][T13899] bridge0: port 1(bridge_slave_0) entered blocking state [ 1407.652146][T13899] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1407.689011][T21319] device wg2 entered promiscuous mode [ 1407.946531][T21333] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4879'. [ 1407.991893][T13907] tipc: Subscription rejected, illegal request [ 1408.010105][T21333] tc_dump_action: action bad kind [ 1408.051566][T21335] IPv6: Can't replace route, no match found [ 1408.094647][T21338] device wg2 left promiscuous mode [ 1408.262912][T21339] mac80211_hwsim hwsim32 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1408.275452][T21333] device wg2 entered promiscuous mode [ 1408.287641][T21345] netlink: 'syz.1.4882': attribute type 10 has an invalid length. [ 1408.326513][T21346] device wg2 entered promiscuous mode [ 1408.336894][T21349] IPv6: Can't replace route, no match found [ 1408.344040][T21350] mac80211_hwsim hwsim28 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1408.437156][T21349] netlink: 'syz.0.4885': attribute type 10 has an invalid length. [ 1408.849500][T21360] IPv6: Can't replace route, no match found [ 1409.409904][T21360] mac80211_hwsim hwsim28 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1409.636676][T21367] netlink: 16054 bytes leftover after parsing attributes in process `syz.4.4891'. [ 1409.800836][ T46] tipc: Subscription rejected, illegal request [ 1409.883735][T21379] IPv6: Can't replace route, no match found [ 1409.907535][T21379] mac80211_hwsim hwsim28 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1409.946740][ T46] wlan1: Trigger new scan to find an IBSS to join [ 1410.000830][T21383] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4897'. [ 1410.043945][T21383] tc_dump_action: action bad kind [ 1410.065211][T21385] IPv6: Can't replace route, no match found [ 1410.080554][T21385] mac80211_hwsim hwsim32 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1410.113112][T21388] device wg2 left promiscuous mode [ 1410.186659][T21383] device wg2 entered promiscuous mode [ 1410.227183][T21391] netlink: 'syz.1.4899': attribute type 10 has an invalid length. [ 1410.239882][T21390] device wg2 left promiscuous mode [ 1410.284839][T21390] device wg2 entered promiscuous mode [ 1410.443684][T21397] IPv6: Can't replace route, no match found [ 1410.459814][T21397] mac80211_hwsim hwsim32 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1411.041092][T20993] tipc: Subscription rejected, illegal request [ 1411.568243][T21420] IPv6: Can't replace route, no match found [ 1411.598901][T21420] mac80211_hwsim hwsim32 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1411.698256][T21432] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4913'. [ 1411.796218][T21432] tc_dump_action: action bad kind [ 1411.802621][T21433] device wg2 left promiscuous mode [ 1411.865692][T21427] device wg2 entered promiscuous mode [ 1411.928111][T21439] device wg2 left promiscuous mode [ 1412.003489][T21442] netlink: 16054 bytes leftover after parsing attributes in process `syz.0.4917'. [ 1412.021613][T21439] device wg2 entered promiscuous mode [ 1412.124345][T21446] FAULT_INJECTION: forcing a failure. [ 1412.124345][T21446] name failslab, interval 1, probability 0, space 0, times 0 [ 1412.182134][T21446] CPU: 0 PID: 21446 Comm: syz.4.4919 Not tainted syzkaller #0 [ 1412.189676][T21446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1412.199780][T21446] Call Trace: [ 1412.203096][T21446] [ 1412.206064][T21446] dump_stack_lvl+0x168/0x22e [ 1412.210805][T21446] ? show_regs_print_info+0x12/0x12 [ 1412.216050][T21446] ? load_image+0x3b0/0x3b0 [ 1412.220615][T21446] ? __might_sleep+0xd0/0xd0 [ 1412.225274][T21446] ? __lock_acquire+0x7c50/0x7c50 [ 1412.230378][T21446] ? verify_lock_unused+0x140/0x140 [ 1412.235816][T21446] should_fail_ex+0x399/0x4d0 [ 1412.240536][T21446] should_failslab+0x5/0x20 [ 1412.245069][T21446] slab_pre_alloc_hook+0x59/0x310 [ 1412.250114][T21446] ? __get_vm_area_node+0x122/0x330 [ 1412.255339][T21446] __kmem_cache_alloc_node+0x4f/0x260 [ 1412.260739][T21446] ? __get_vm_area_node+0x122/0x330 [ 1412.266005][T21446] kmalloc_node_trace+0x22/0xe0 [ 1412.270881][T21446] __get_vm_area_node+0x122/0x330 [ 1412.275960][T21446] ? __local_bh_enable_ip+0x12a/0x1b0 [ 1412.281358][T21446] __vmalloc_node_range+0x357/0x1390 [ 1412.286667][T21446] ? netlink_sendmsg+0x5dd/0xbc0 [ 1412.291650][T21446] ? release_sock+0x2b/0x1b0 [ 1412.296265][T21446] ? netlink_insert+0x101f/0x13b0 [ 1412.301327][T21446] ? netlink_insert+0x274/0x13b0 [ 1412.306313][T21446] ? free_vm_area+0x50/0x50 [ 1412.310842][T21446] ? netlink_sendmsg+0x5dd/0xbc0 [ 1412.315803][T21446] vmalloc+0x75/0x80 [ 1412.319719][T21446] ? netlink_sendmsg+0x5dd/0xbc0 [ 1412.324713][T21446] netlink_sendmsg+0x5dd/0xbc0 [ 1412.329619][T21446] ? netlink_getsockopt+0x540/0x540 [ 1412.334868][T21446] ? aa_sock_msg_perm+0x94/0x150 [ 1412.339866][T21446] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1412.345202][T21446] ? security_socket_sendmsg+0x7c/0xa0 [ 1412.350690][T21446] ? netlink_getsockopt+0x540/0x540 [ 1412.355911][T21446] ____sys_sendmsg+0x59b/0x970 [ 1412.360714][T21446] ? __sys_sendmsg_sock+0x30/0x30 [ 1412.365758][T21446] ? __import_iovec+0x315/0x500 [ 1412.370644][T21446] ? import_iovec+0x6f/0xa0 [ 1412.375174][T21446] ___sys_sendmsg+0x21c/0x290 [ 1412.379878][T21446] ? __sys_sendmsg+0x270/0x270 [ 1412.384697][T21446] ? __lock_acquire+0x7c50/0x7c50 [ 1412.389762][T21446] ? __fdget+0x17c/0x200 [ 1412.394034][T21446] __se_sys_sendmsg+0x19e/0x270 [ 1412.398914][T21446] ? __x64_sys_sendmsg+0x80/0x80 [ 1412.403892][T21446] ? lockdep_hardirqs_on+0x94/0x140 [ 1412.409133][T21446] do_syscall_64+0x4c/0xa0 [ 1412.413594][T21446] ? clear_bhb_loop+0x60/0xb0 [ 1412.418301][T21446] ? clear_bhb_loop+0x60/0xb0 [ 1412.423009][T21446] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1412.428931][T21446] RIP: 0033:0x7fe484d8eec9 [ 1412.433400][T21446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1412.453033][T21446] RSP: 002b:00007fe485c81038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1412.461467][T21446] RAX: ffffffffffffffda RBX: 00007fe484fe5fa0 RCX: 00007fe484d8eec9 [ 1412.469479][T21446] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 1412.477475][T21446] RBP: 00007fe485c81090 R08: 0000000000000000 R09: 0000000000000000 [ 1412.485548][T21446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1412.493534][T21446] R13: 00007fe484fe6038 R14: 00007fe484fe5fa0 R15: 00007ffd2926ba98 [ 1412.501533][T21446] [ 1412.518655][T21446] syz.4.4919: vmalloc error: size 213312, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz4,mems_allowed=0-1 [ 1412.534668][T21446] CPU: 1 PID: 21446 Comm: syz.4.4919 Not tainted syzkaller #0 [ 1412.542187][T21446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1412.552298][T21446] Call Trace: [ 1412.555704][T21446] [ 1412.558674][T21446] dump_stack_lvl+0x168/0x22e [ 1412.563404][T21446] ? cpuset_print_current_mems_allowed+0x1b/0x360 [ 1412.569884][T21446] ? show_regs_print_info+0x12/0x12 [ 1412.575144][T21446] ? load_image+0x3b0/0x3b0 [ 1412.579717][T21446] ? cpuset_print_current_mems_allowed+0x1b/0x360 [ 1412.586189][T21446] ? cpuset_print_current_mems_allowed+0x2df/0x360 [ 1412.592845][T21446] warn_alloc+0x20c/0x300 [ 1412.597261][T21446] ? __get_vm_area_node+0x122/0x330 [ 1412.602604][T21446] ? zone_watermark_ok_safe+0x270/0x270 [ 1412.608214][T21446] ? rcu_is_watching+0x11/0xa0 [ 1412.613046][T21446] ? __get_vm_area_node+0x318/0x330 [ 1412.618296][T21446] ? __local_bh_enable_ip+0x12a/0x1b0 [ 1412.623766][T21446] __vmalloc_node_range+0x37c/0x1390 [ 1412.629199][T21446] ? release_sock+0x2b/0x1b0 [ 1412.633857][T21446] ? netlink_insert+0x101f/0x13b0 [ 1412.639012][T21446] ? netlink_insert+0x274/0x13b0 [ 1412.643987][T21446] ? free_vm_area+0x50/0x50 [ 1412.648568][T21446] ? netlink_sendmsg+0x5dd/0xbc0 [ 1412.653550][T21446] vmalloc+0x75/0x80 [ 1412.657479][T21446] ? netlink_sendmsg+0x5dd/0xbc0 [ 1412.662447][T21446] netlink_sendmsg+0x5dd/0xbc0 [ 1412.667241][T21446] ? netlink_getsockopt+0x540/0x540 [ 1412.672460][T21446] ? aa_sock_msg_perm+0x94/0x150 [ 1412.677452][T21446] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1412.682752][T21446] ? security_socket_sendmsg+0x7c/0xa0 [ 1412.688326][T21446] ? netlink_getsockopt+0x540/0x540 [ 1412.693568][T21446] ____sys_sendmsg+0x59b/0x970 [ 1412.698360][T21446] ? __sys_sendmsg_sock+0x30/0x30 [ 1412.703403][T21446] ? __import_iovec+0x315/0x500 [ 1412.708289][T21446] ? import_iovec+0x6f/0xa0 [ 1412.712821][T21446] ___sys_sendmsg+0x21c/0x290 [ 1412.717521][T21446] ? __sys_sendmsg+0x270/0x270 [ 1412.722324][T21446] ? __lock_acquire+0x7c50/0x7c50 [ 1412.727404][T21446] ? __fdget+0x17c/0x200 [ 1412.731672][T21446] __se_sys_sendmsg+0x19e/0x270 [ 1412.736548][T21446] ? __x64_sys_sendmsg+0x80/0x80 [ 1412.741516][T21446] ? lockdep_hardirqs_on+0x94/0x140 [ 1412.746737][T21446] do_syscall_64+0x4c/0xa0 [ 1412.751174][T21446] ? clear_bhb_loop+0x60/0xb0 [ 1412.755865][T21446] ? clear_bhb_loop+0x60/0xb0 [ 1412.760575][T21446] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1412.766509][T21446] RIP: 0033:0x7fe484d8eec9 [ 1412.771228][T21446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1412.790876][T21446] RSP: 002b:00007fe485c81038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1412.799313][T21446] RAX: ffffffffffffffda RBX: 00007fe484fe5fa0 RCX: 00007fe484d8eec9 [ 1412.807501][T21446] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 1412.815500][T21446] RBP: 00007fe485c81090 R08: 0000000000000000 R09: 0000000000000000 [ 1412.823492][T21446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1412.831480][T21446] R13: 00007fe484fe6038 R14: 00007fe484fe5fa0 R15: 00007ffd2926ba98 [ 1412.839485][T21446] [ 1412.860360][T21446] Mem-Info: [ 1412.863631][T21446] active_anon:5124 inactive_anon:0 isolated_anon:0 [ 1412.863631][T21446] active_file:19206 inactive_file:40302 isolated_file:0 [ 1412.863631][T21446] unevictable:768 dirty:95 writeback:0 [ 1412.863631][T21446] slab_reclaimable:21272 slab_unreclaimable:95373 [ 1412.863631][T21446] mapped:29794 shmem:1360 pagetables:477 [ 1412.863631][T21446] sec_pagetables:0 bounce:0 [ 1412.863631][T21446] kernel_misc_reclaimable:0 [ 1412.863631][T21446] free:1322649 free_pcp:10321 free_cma:0 [ 1412.917445][T13907] tipc: Subscription rejected, illegal request [ 1412.920142][T21446] Node 0 active_anon:20496kB inactive_anon:0kB active_file:76824kB inactive_file:161000kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:119264kB dirty:384kB writeback:0kB shmem:3904kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:10836kB pagetables:2036kB sec_pagetables:0kB all_unreclaimable? no [ 1412.975680][T21446] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:208kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:1536kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB sec_pagetables:0kB all_unreclaimable? no [ 1413.055327][T21446] Node 0 DMA free:15360kB boost:0kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1413.137021][T21446] lowmem_reserve[]: 0 2527 2528 2528 2528 [ 1413.153712][T21446] Node 0 DMA32 free:1379260kB boost:0kB min:34692kB low:43364kB high:52036kB reserved_highatomic:0KB active_anon:20512kB inactive_anon:0kB active_file:76824kB inactive_file:161000kB unevictable:1536kB writepending:412kB present:3129332kB managed:2593344kB mlocked:0kB bounce:0kB free_pcp:19828kB local_pcp:2524kB free_cma:0kB [ 1413.258921][T21446] lowmem_reserve[]: 0 0 1 1 1 [ 1413.263737][T21446] Node 0 Normal free:16kB boost:0kB min:16kB low:20kB high:24kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:1424kB mlocked:0kB bounce:0kB free_pcp:20kB local_pcp:12kB free_cma:0kB [ 1413.369324][T21446] lowmem_reserve[]: 0 0 0 0 0 [ 1413.385595][T21446] Node 1 Normal free:3895736kB boost:0kB min:55192kB low:68988kB high:82784kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:208kB unevictable:1536kB writepending:0kB present:4194304kB managed:4117620kB mlocked:0kB bounce:0kB free_pcp:22148kB local_pcp:14628kB free_cma:0kB [ 1413.420552][T21469] IPv6: Can't replace route, no match found [ 1413.423124][T21446] lowmem_reserve[]: 0 0 0 0 0 [ 1413.434712][T21446] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) [ 1413.437754][T21469] mac80211_hwsim hwsim32 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1413.442555][T21446] = 15360kB [ 1413.470052][T21446] Node 0 DMA32: 557*4kB (UME) 915*8kB (UM) 1599*16kB (UME) 924*32kB (UME) 214*64kB (UME) 187*128kB (UME) 94*256kB (UME) 39*512kB (UME) 16*1024kB (UM) 4*2048kB (UE) 295*4096kB (UM) = 1379260kB [ 1413.497001][T21446] Node 0 Normal: 2*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 16kB [ 1413.565268][T21446] Node 1 Normal: 260*4kB (UME) 53*8kB (UME) 30*16kB (UME) 33*32kB (UE) 22*64kB (UME) 15*128kB (UME) 5*256kB (UM) 2*512kB (ME) 2*1024kB (UE) 1*2048kB (E) 948*4096kB (M) = 3895736kB [ 1413.604055][T21446] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1413.638811][T21446] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 1413.669284][T21446] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1413.695294][T21446] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 1413.721126][T21446] 60868 total pagecache pages [ 1413.731247][T21446] 0 pages in swap cache [ 1413.741419][T21446] Free swap = 124996kB [ 1413.751593][T21446] Total swap = 124996kB [ 1413.756262][T21446] 2097051 pages RAM [ 1413.763572][T21478] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4930'. [ 1413.765481][T21446] 0 pages HighMem/MovableOnly [ 1413.783488][T21478] tc_dump_action: action bad kind [ 1413.790547][T21478] device wg2 left promiscuous mode [ 1413.812668][T21446] 415114 pages reserved [ 1413.825140][T21446] 0 pages cma reserved [ 1413.845379][T21478] device wg2 entered promiscuous mode [ 1413.945302][T13899] wlan1: Trigger new scan to find an IBSS to join [ 1413.962997][T21483] netlink: 16054 bytes leftover after parsing attributes in process `syz.0.4934'. [ 1414.045200][T13899] tipc: Subscription rejected, illegal request [ 1414.327734][T21500] netlink: 'syz.2.4941': attribute type 2 has an invalid length. [ 1414.355216][T21500] netlink: 132 bytes leftover after parsing attributes in process `syz.2.4941'. [ 1414.460975][T21502] IPv6: Can't replace route, no match found [ 1414.906794][T13899] wlan1: Creating new IBSS network, BSSID 00:8d:8d:ff:00:00 [ 1415.023816][T21519] netlink: 'syz.2.4947': attribute type 29 has an invalid length. [ 1415.045983][T21519] netlink: 'syz.2.4947': attribute type 29 has an invalid length. [ 1415.071517][T21519] netlink: 'syz.2.4947': attribute type 29 has an invalid length. [ 1415.096593][T21519] netlink: 'syz.2.4947': attribute type 29 has an invalid length. [ 1415.133799][T21519] netlink: 'syz.2.4947': attribute type 29 has an invalid length. [ 1415.185248][T21523] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4949'. [ 1415.244129][T21523] tc_dump_action: action bad kind [ 1415.257378][T21524] device wg2 left promiscuous mode [ 1415.327400][T21521] device wg2 entered promiscuous mode [ 1415.367074][T20993] tipc: Subscription rejected, illegal request [ 1415.642224][T21536] IPv6: Can't replace route, no match found [ 1415.951790][T21547] netlink: 16054 bytes leftover after parsing attributes in process `syz.3.4959'. [ 1415.965839][T21544] netlink: 'syz.1.4956': attribute type 16 has an invalid length. [ 1416.016540][T21544] netlink: 48 bytes leftover after parsing attributes in process `syz.1.4956'. [ 1416.259634][T13907] tipc: Subscription rejected, illegal request [ 1416.303867][T21561] IPv6: Can't replace route, no match found [ 1416.332426][T21562] IPv6: Can't replace route, no match found [ 1416.344404][T21562] mac80211_hwsim hwsim28 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1416.373491][T21561] mac80211_hwsim hwsim32 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1416.428341][T21562] netlink: 'syz.0.4965': attribute type 10 has an invalid length. [ 1416.443703][T21561] netlink: 'syz.1.4966': attribute type 10 has an invalid length. [ 1416.490091][T21567] IPv6: Can't replace route, no match found [ 1416.701716][T21573] IPv6: Can't replace route, no match found [ 1416.725156][T21573] mac80211_hwsim hwsim28 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1416.818796][T21573] netlink: 'syz.0.4970': attribute type 10 has an invalid length. [ 1416.969066][T21583] netlink: 48 bytes leftover after parsing attributes in process `syz.4.4976'. [ 1417.387733][T21592] IPv6: Can't replace route, no match found [ 1417.402476][T21596] mac80211_hwsim hwsim32 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1417.421053][T21597] IPv6: Can't replace route, no match found [ 1417.443050][T21597] mac80211_hwsim hwsim30 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1417.683329][T21603] mac80211_hwsim hwsim34 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1417.757897][T21610] netlink: 16054 bytes leftover after parsing attributes in process `syz.1.4985'. [ 1418.184345][T21618] device wg2 left promiscuous mode [ 1418.208338][T21627] netlink: 48 bytes leftover after parsing attributes in process `syz.2.4991'. [ 1418.227627][T21623] device wg2 entered promiscuous mode [ 1418.278054][T21625] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 1419.108602][T21639] IPv6: Can't replace route, no match found [ 1419.179276][T21640] mac80211_hwsim hwsim30 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1419.649950][T21646] mac80211_hwsim hwsim34 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1420.323011][T21666] device wg2 left promiscuous mode [ 1420.343459][T21664] validate_nla: 12 callbacks suppressed [ 1420.343500][T21664] netlink: 'syz.4.5005': attribute type 25 has an invalid length. [ 1420.374642][T21668] device wg2 entered promiscuous mode [ 1420.401095][T21667] netlink: 'syz.4.5005': attribute type 16 has an invalid length. [ 1420.425349][T21667] netlink: 48 bytes leftover after parsing attributes in process `syz.4.5005'. [ 1420.694827][T21675] netlink: 16054 bytes leftover after parsing attributes in process `syz.2.5007'. [ 1420.850684][T21677] IPv6: Can't replace route, no match found [ 1420.893726][T21677] mac80211_hwsim hwsim32 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1420.972885][T21677] netlink: 'syz.1.5009': attribute type 10 has an invalid length. [ 1421.583526][T21693] mac80211_hwsim hwsim28 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1423.147584][ T1276] ieee802154 phy0 wpan0: encryption failed: -22 [ 1423.153976][ T1276] ieee802154 phy1 wpan1: encryption failed: -22 [ 1424.159111][T21705] FAULT_INJECTION: forcing a failure. [ 1424.159111][T21705] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1424.173020][T21705] CPU: 1 PID: 21705 Comm: syz.3.5018 Not tainted syzkaller #0 [ 1424.180536][T21705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1424.190646][T21705] Call Trace: [ 1424.193983][T21705] [ 1424.196953][T21705] dump_stack_lvl+0x168/0x22e [ 1424.201717][T21705] ? show_regs_print_info+0x12/0x12 [ 1424.206954][T21705] ? load_image+0x3b0/0x3b0 [ 1424.211501][T21705] ? __lock_acquire+0x7c50/0x7c50 [ 1424.216588][T21705] should_fail_ex+0x399/0x4d0 [ 1424.221367][T21705] _copy_from_user+0x2c/0x170 [ 1424.226100][T21705] generic_map_update_batch+0x4c5/0x850 [ 1424.231785][T21705] ? rcu_read_unlock+0xa0/0xa0 [ 1424.236676][T21705] ? __fdget+0x17c/0x200 [ 1424.240964][T21705] ? rcu_read_unlock+0xa0/0xa0 [ 1424.245767][T21705] bpf_map_do_batch+0x466/0x600 [ 1424.250671][T21705] __sys_bpf+0x65f/0x6d0 [ 1424.254970][T21705] ? bpf_link_show_fdinfo+0x340/0x340 [ 1424.260585][T21705] ? lock_chain_count+0x20/0x20 [ 1424.265490][T21705] __x64_sys_bpf+0x78/0x90 [ 1424.269953][T21705] do_syscall_64+0x4c/0xa0 [ 1424.274393][T21705] ? clear_bhb_loop+0x60/0xb0 [ 1424.279090][T21705] ? clear_bhb_loop+0x60/0xb0 [ 1424.283792][T21705] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1424.289705][T21705] RIP: 0033:0x7ffbe9b8eec9 [ 1424.294134][T21705] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1424.313858][T21705] RSP: 002b:00007ffbea9b2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1424.322303][T21705] RAX: ffffffffffffffda RBX: 00007ffbe9de6090 RCX: 00007ffbe9b8eec9 [ 1424.330294][T21705] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 1424.338287][T21705] RBP: 00007ffbea9b2090 R08: 0000000000000000 R09: 0000000000000000 [ 1424.346295][T21705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1424.354287][T21705] R13: 00007ffbe9de6128 R14: 00007ffbe9de6090 R15: 00007fffaf9d6458 [ 1424.362303][T21705] [ 1424.457756][T21707] netlink: 'syz.1.5019': attribute type 16 has an invalid length. [ 1424.468480][T21707] netlink: 48 bytes leftover after parsing attributes in process `syz.1.5019'. [ 1424.738157][T21721] IPv6: Can't replace route, no match found [ 1424.812468][T21713] mac80211_hwsim hwsim28 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1424.905716][T21721] netlink: 'syz.0.5022': attribute type 10 has an invalid length. [ 1425.633940][T21735] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5026'. [ 1425.682958][T21735] tc_dump_action: action bad kind [ 1425.746381][T21732] device wg2 left promiscuous mode [ 1425.790674][T21740] netlink: 16054 bytes leftover after parsing attributes in process `syz.4.5028'. [ 1425.800484][T21735] device wg2 entered promiscuous mode [ 1425.884097][T21742] mac80211_hwsim hwsim30 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1426.553144][T21754] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1426.676862][T21756] netlink: 'syz.2.5034': attribute type 25 has an invalid length. [ 1426.704746][T21756] netlink: 'syz.2.5034': attribute type 16 has an invalid length. [ 1426.721453][T21756] netlink: 48 bytes leftover after parsing attributes in process `syz.2.5034'. [ 1426.793645][T21763] IPv6: Can't replace route, no match found [ 1426.807276][T21763] mac80211_hwsim hwsim32 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1426.836663][T21765] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5036'. [ 1426.882508][T21765] tc_dump_action: action bad kind [ 1426.926243][T21767] netlink: 'syz.1.5038': attribute type 10 has an invalid length. [ 1427.013264][T21776] mac80211_hwsim hwsim34 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1427.253713][T21782] IPv6: Can't replace route, no match found [ 1427.277501][T21782] mac80211_hwsim hwsim28 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1427.347535][T21782] netlink: 'syz.0.5054': attribute type 10 has an invalid length. [ 1427.521582][T21797] netlink: 16054 bytes leftover after parsing attributes in process `syz.2.5047'. [ 1428.506049][T21813] netlink: 'syz.2.5053': attribute type 25 has an invalid length. [ 1428.547407][T21813] netlink: 'syz.2.5053': attribute type 16 has an invalid length. [ 1428.564733][T21813] netlink: 48 bytes leftover after parsing attributes in process `syz.2.5053'. [ 1428.582407][T21817] netlink: 'syz.3.5055': attribute type 39 has an invalid length. [ 1428.621042][T21817] device veth0_macvtap left promiscuous mode [ 1429.009510][T21820] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5056'. [ 1429.018880][T21820] tc_dump_action: action bad kind [ 1429.025667][T21823] device wg2 left promiscuous mode [ 1429.039761][T21825] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5057'. [ 1429.062197][T21825] tc_dump_action: action bad kind [ 1429.075618][T21828] mac80211_hwsim hwsim34 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1432.559219][T21857] FAULT_INJECTION: forcing a failure. [ 1432.559219][T21857] name failslab, interval 1, probability 0, space 0, times 0 [ 1432.571527][T21850] netlink: 16054 bytes leftover after parsing attributes in process `syz.2.5064'. [ 1432.623112][T21857] CPU: 0 PID: 21857 Comm: syz.3.5066 Not tainted syzkaller #0 [ 1432.630653][T21857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1432.640755][T21857] Call Trace: [ 1432.644079][T21857] [ 1432.647050][T21857] dump_stack_lvl+0x168/0x22e [ 1432.651788][T21857] ? show_regs_print_info+0x12/0x12 [ 1432.657229][T21857] ? load_image+0x3b0/0x3b0 [ 1432.661804][T21857] ? __might_sleep+0xd0/0xd0 [ 1432.666459][T21857] ? __lock_acquire+0x7c50/0x7c50 [ 1432.671543][T21857] should_fail_ex+0x399/0x4d0 [ 1432.676286][T21857] should_failslab+0x5/0x20 [ 1432.680853][T21857] slab_pre_alloc_hook+0x59/0x310 [ 1432.685931][T21857] kmem_cache_alloc_node+0x5a/0x320 [ 1432.691181][T21857] ? __alloc_skb+0xfc/0x7e0 [ 1432.695776][T21857] __alloc_skb+0xfc/0x7e0 [ 1432.700175][T21857] ? netlink_autobind+0xda/0x300 [ 1432.705199][T21857] netlink_sendmsg+0x645/0xbc0 [ 1432.710037][T21857] ? lockdep_hardirqs_on+0x94/0x140 [ 1432.715322][T21857] ? netlink_getsockopt+0x540/0x540 [ 1432.720695][T21857] ? bpf_lsm_socket_accept+0x10/0x10 [ 1432.726042][T21857] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1432.731576][T21857] ? security_socket_sendmsg+0x7c/0xa0 [ 1432.737105][T21857] ? netlink_getsockopt+0x540/0x540 [ 1432.742374][T21857] ____sys_sendmsg+0x59b/0x970 [ 1432.747243][T21857] ? __sys_sendmsg_sock+0x30/0x30 [ 1432.752351][T21857] ? import_iovec+0x6f/0xa0 [ 1432.756927][T21857] ___sys_sendmsg+0x21c/0x290 [ 1432.761676][T21857] ? __sys_sendmsg+0x270/0x270 [ 1432.766562][T21857] ? __fdget+0x17c/0x200 [ 1432.770870][T21857] __se_sys_sendmsg+0x19e/0x270 [ 1432.775787][T21857] ? __x64_sys_sendmsg+0x80/0x80 [ 1432.780837][T21857] ? syscall_enter_from_user_mode+0x2a/0x80 [ 1432.786821][T21857] do_syscall_64+0x4c/0xa0 [ 1432.791309][T21857] ? clear_bhb_loop+0x60/0xb0 [ 1432.796045][T21857] ? clear_bhb_loop+0x60/0xb0 [ 1432.800814][T21857] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1432.806782][T21857] RIP: 0033:0x7ffbe9b8eec9 [ 1432.811269][T21857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1432.831040][T21857] RSP: 002b:00007ffbea9b2038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1432.839528][T21857] RAX: ffffffffffffffda RBX: 00007ffbe9de6090 RCX: 00007ffbe9b8eec9 [ 1432.847562][T21857] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000006 [ 1432.855682][T21857] RBP: 00007ffbea9b2090 R08: 0000000000000000 R09: 0000000000000000 [ 1432.863710][T21857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1432.871743][T21857] R13: 00007ffbe9de6128 R14: 00007ffbe9de6090 R15: 00007fffaf9d6458 [ 1432.879804][T21857] [ 1433.432594][T21873] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5070'. [ 1433.464267][T21873] tc_dump_action: action bad kind [ 1433.534761][T21877] device wg2 left promiscuous mode [ 1433.607659][T21878] netlink: 12 bytes leftover after parsing attributes in process `syz.3.5072'. [ 1433.668516][T21878] tc_dump_action: action bad kind [ 1433.807188][T21881] netlink: 'syz.1.5073': attribute type 3 has an invalid length. [ 1433.846777][T21881] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.5073'. [ 1434.336692][T21903] netlink: 16054 bytes leftover after parsing attributes in process `syz.1.5081'. [ 1434.371009][T21904] FAULT_INJECTION: forcing a failure. [ 1434.371009][T21904] name failslab, interval 1, probability 0, space 0, times 0 [ 1434.425259][T21904] CPU: 0 PID: 21904 Comm: syz.3.5082 Not tainted syzkaller #0 [ 1434.432804][T21904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1434.442908][T21904] Call Trace: [ 1434.446236][T21904] [ 1434.449206][T21904] dump_stack_lvl+0x168/0x22e [ 1434.453941][T21904] ? show_regs_print_info+0x12/0x12 [ 1434.459195][T21904] ? load_image+0x3b0/0x3b0 [ 1434.463764][T21904] ? __might_sleep+0xd0/0xd0 [ 1434.468415][T21904] ? __lock_acquire+0x7c50/0x7c50 [ 1434.473535][T21904] should_fail_ex+0x399/0x4d0 [ 1434.478270][T21904] should_failslab+0x5/0x20 [ 1434.482935][T21904] slab_pre_alloc_hook+0x59/0x310 [ 1434.488013][T21904] ? bpf_prog_test_run_skb+0x22b/0x11b0 [ 1434.493624][T21904] __kmem_cache_alloc_node+0x4f/0x260 [ 1434.499070][T21904] ? bpf_prog_test_run_skb+0x22b/0x11b0 [ 1434.504675][T21904] __kmalloc+0xa0/0x240 [ 1434.508899][T21904] bpf_prog_test_run_skb+0x22b/0x11b0 [ 1434.514333][T21904] ? __fget_files+0x28/0x4d0 [ 1434.518979][T21904] ? __fget_files+0x44a/0x4d0 [ 1434.523727][T21904] ? cpu_online+0xa0/0xa0 [ 1434.528129][T21904] bpf_prog_test_run+0x31e/0x390 [ 1434.533127][T21904] __sys_bpf+0x593/0x6d0 [ 1434.537426][T21904] ? bpf_link_show_fdinfo+0x340/0x340 [ 1434.542912][T21904] ? lock_chain_count+0x20/0x20 [ 1434.547831][T21904] __x64_sys_bpf+0x78/0x90 [ 1434.552315][T21904] do_syscall_64+0x4c/0xa0 [ 1434.556782][T21904] ? clear_bhb_loop+0x60/0xb0 [ 1434.561518][T21904] ? clear_bhb_loop+0x60/0xb0 [ 1434.566258][T21904] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1434.572197][T21904] RIP: 0033:0x7ffbe9b8eec9 [ 1434.576652][T21904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1434.596315][T21904] RSP: 002b:00007ffbea9d3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1434.604784][T21904] RAX: ffffffffffffffda RBX: 00007ffbe9de5fa0 RCX: 00007ffbe9b8eec9 [ 1434.612976][T21904] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 1434.620999][T21904] RBP: 00007ffbea9d3090 R08: 0000000000000000 R09: 0000000000000000 [ 1434.629282][T21904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1434.637305][T21904] R13: 00007ffbe9de6038 R14: 00007ffbe9de5fa0 R15: 00007fffaf9d6458 [ 1434.645345][T21904] [ 1434.804822][T21894] device syzkaller0 entered promiscuous mode [ 1435.219687][T21925] netlink: 16054 bytes leftover after parsing attributes in process `syz.2.5086'. [ 1437.885889][T21922] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5087'. [ 1437.895335][T21922] tc_dump_action: action bad kind [ 1438.083728][T21928] IPv6: Can't replace route, no match found [ 1438.109335][T21935] netlink: 'syz.4.5088': attribute type 39 has an invalid length. [ 1438.151504][T21935] device veth0_macvtap left promiscuous mode [ 1438.433414][T21928] mac80211_hwsim hwsim30 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1438.444306][T21939] netlink: 'syz.3.5090': attribute type 10 has an invalid length. [ 1438.672620][T21956] netlink: 'syz.1.5098': attribute type 2 has an invalid length. [ 1438.696011][T21956] netlink: 'syz.1.5098': attribute type 8 has an invalid length. [ 1438.724666][T21956] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5098'. [ 1438.806365][T21967] netlink: 60 bytes leftover after parsing attributes in process `syz.0.5101'. [ 1438.835424][T21967] netlink: 60 bytes leftover after parsing attributes in process `syz.0.5101'. [ 1438.905136][T21969] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5100'. [ 1438.934643][T21971] netlink: 16054 bytes leftover after parsing attributes in process `syz.4.5102'. [ 1438.966136][T21969] tc_dump_action: action bad kind [ 1438.993805][T21962] netlink: 60 bytes leftover after parsing attributes in process `syz.0.5101'. [ 1439.409228][T21972] device wg2 left promiscuous mode [ 1439.471534][T21969] device wg2 entered promiscuous mode [ 1439.488887][T21975] netlink: 16186 bytes leftover after parsing attributes in process `syz.3.5103'. [ 1439.764917][T21988] netlink: 122896 bytes leftover after parsing attributes in process `syz.3.5109'. [ 1439.781418][T21989] IPv6: Can't replace route, no match found [ 1439.803298][T21989] mac80211_hwsim hwsim36 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1440.233828][T22008] netlink: 'syz.2.5113': attribute type 39 has an invalid length. [ 1440.302109][T22008] device veth0_macvtap left promiscuous mode [ 1440.683568][T22022] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 1440.691224][T22022] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 1440.836259][T22022] netlink: 'syz.1.5119': attribute type 29 has an invalid length. [ 1441.053299][T22012] netlink: 'syz.4.5115': attribute type 2 has an invalid length. [ 1441.062607][T22012] netlink: 'syz.4.5115': attribute type 8 has an invalid length. [ 1441.085486][T22012] netlink: 132 bytes leftover after parsing attributes in process `syz.4.5115'. [ 1441.115594][T22022] netlink: 'syz.1.5119': attribute type 29 has an invalid length. [ 1441.156762][T22024] netlink: 'syz.1.5119': attribute type 29 has an invalid length. [ 1441.182473][T22030] tc_dump_action: action bad kind [ 1441.224345][T22030] device wg2 left promiscuous mode [ 1441.281018][T22028] device wg2 entered promiscuous mode [ 1441.365539][T22034] IPv6: Can't replace route, no match found [ 1441.406220][T22034] mac80211_hwsim hwsim36 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1441.511779][T22038] IPv6: Can't replace route, no match found [ 1441.547026][T22038] mac80211_hwsim hwsim32 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1441.760131][T22044] netlink: 'syz.3.5125': attribute type 3 has an invalid length. [ 1442.320748][T22060] IPv6: Can't replace route, no match found [ 1442.363730][T22061] device wg2 left promiscuous mode [ 1442.387065][T22060] mac80211_hwsim hwsim34 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1442.405798][T22063] netlink: 'syz.3.5134': attribute type 2 has an invalid length. [ 1442.413832][T22063] netlink: 'syz.3.5134': attribute type 8 has an invalid length. [ 1442.442111][T22058] device wg2 entered promiscuous mode [ 1442.470665][T22067] IPv6: Can't replace route, no match found [ 1442.572742][T22070] mac80211_hwsim hwsim28 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1442.592802][T22069] tc_dump_action: action bad kind [ 1442.598850][T22071] netlink: 'syz.4.5135': attribute type 10 has an invalid length. [ 1442.635760][T22072] device wg2 left promiscuous mode [ 1442.670354][T22065] device wg2 entered promiscuous mode [ 1442.825744][T22077] FAULT_INJECTION: forcing a failure. [ 1442.825744][T22077] name failslab, interval 1, probability 0, space 0, times 0 [ 1442.916900][T22082] __nla_validate_parse: 5 callbacks suppressed [ 1442.916922][T22082] netlink: 65047 bytes leftover after parsing attributes in process `syz.2.5142'. [ 1442.932960][T22077] CPU: 1 PID: 22077 Comm: syz.3.5139 Not tainted syzkaller #0 [ 1442.940489][T22077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1442.950586][T22077] Call Trace: [ 1442.953902][T22077] [ 1442.956870][T22077] dump_stack_lvl+0x168/0x22e [ 1442.961594][T22077] ? show_regs_print_info+0x12/0x12 [ 1442.966822][T22077] ? load_image+0x3b0/0x3b0 [ 1442.971356][T22077] ? __might_sleep+0xd0/0xd0 [ 1442.975983][T22077] ? __lock_acquire+0x7c50/0x7c50 [ 1442.981038][T22077] should_fail_ex+0x399/0x4d0 [ 1442.985745][T22077] should_failslab+0x5/0x20 [ 1442.990275][T22077] slab_pre_alloc_hook+0x59/0x310 [ 1442.995319][T22077] ? tomoyo_encode+0x27e/0x540 [ 1443.000119][T22077] __kmem_cache_alloc_node+0x4f/0x260 [ 1443.005545][T22077] ? tomoyo_encode+0x27e/0x540 [ 1443.010341][T22077] __kmalloc+0xa0/0x240 [ 1443.014540][T22077] tomoyo_encode+0x27e/0x540 [ 1443.019163][T22077] tomoyo_realpath_from_path+0x58e/0x5d0 [ 1443.024869][T22077] tomoyo_path_number_perm+0x1e3/0x600 [ 1443.030348][T22077] ? tomoyo_path_number_perm+0x1b6/0x600 [ 1443.036006][T22077] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 1443.041570][T22077] ? ksys_write+0x1bd/0x240 [ 1443.046094][T22077] ? common_file_perm+0x171/0x1c0 [ 1443.051265][T22077] ? __fget_files+0x28/0x4d0 [ 1443.055889][T22077] security_file_ioctl+0x6c/0xa0 [ 1443.060853][T22077] __se_sys_ioctl+0x48/0x170 [ 1443.065472][T22077] do_syscall_64+0x4c/0xa0 [ 1443.069919][T22077] ? clear_bhb_loop+0x60/0xb0 [ 1443.074617][T22077] ? clear_bhb_loop+0x60/0xb0 [ 1443.079316][T22077] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1443.085232][T22077] RIP: 0033:0x7ffbe9b8eec9 [ 1443.089688][T22077] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1443.109312][T22077] RSP: 002b:00007ffbea9d3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1443.117778][T22077] RAX: ffffffffffffffda RBX: 00007ffbe9de5fa0 RCX: 00007ffbe9b8eec9 [ 1443.125971][T22077] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000004 [ 1443.133959][T22077] RBP: 00007ffbea9d3090 R08: 0000000000000000 R09: 0000000000000000 [ 1443.141951][T22077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1443.149937][T22077] R13: 00007ffbe9de6038 R14: 00007ffbe9de5fa0 R15: 00007fffaf9d6458 [ 1443.158033][T22077] [ 1443.225294][T22077] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1443.957050][T13899] wlan1: Trigger new scan to find an IBSS to join [ 1444.169894][T22109] device wg2 entered promiscuous mode [ 1444.227447][T22112] IPv6: Can't replace route, no match found [ 1444.249285][T22112] mac80211_hwsim hwsim30 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1444.422855][T22116] netlink: 132 bytes leftover after parsing attributes in process `syz.0.5151'. [ 1445.448117][T22142] validate_nla: 4 callbacks suppressed [ 1445.448138][T22142] netlink: 'syz.1.5161': attribute type 16 has an invalid length. [ 1445.463687][T22142] netlink: 48 bytes leftover after parsing attributes in process `syz.1.5161'. [ 1445.655606][T22150] IPv6: Can't replace route, no match found [ 1445.662287][T22150] mac80211_hwsim hwsim32 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1445.745395][T22151] device wg2 left promiscuous mode [ 1445.802593][T22151] device wg2 entered promiscuous mode [ 1445.843713][T22154] netlink: 16054 bytes leftover after parsing attributes in process `syz.1.5166'. [ 1446.178813][T22164] device veth1_macvtap left promiscuous mode [ 1446.458452][T22169] FAULT_INJECTION: forcing a failure. [ 1446.458452][T22169] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1446.475157][T22169] CPU: 1 PID: 22169 Comm: syz.0.5172 Not tainted syzkaller #0 [ 1446.482725][T22169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1446.492826][T22169] Call Trace: [ 1446.496157][T22169] [ 1446.499125][T22169] dump_stack_lvl+0x168/0x22e [ 1446.503860][T22169] ? show_regs_print_info+0x12/0x12 [ 1446.509109][T22169] ? lockdep_hardirqs_on+0x94/0x140 [ 1446.514369][T22169] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 1446.520584][T22169] should_fail_ex+0x399/0x4d0 [ 1446.525342][T22169] _copy_from_user+0x2c/0x170 [ 1446.530167][T22169] iovec_from_user+0x143/0x360 [ 1446.534995][T22169] __import_iovec+0x6d/0x500 [ 1446.539645][T22169] ? __might_fault+0xa6/0x120 [ 1446.544382][T22169] import_iovec+0x6f/0xa0 [ 1446.548777][T22169] ___sys_sendmsg+0x1e4/0x290 [ 1446.553520][T22169] ? __sys_sendmsg+0x270/0x270 [ 1446.558366][T22169] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 1446.564156][T22169] ? __fdget+0x17c/0x200 [ 1446.568448][T22169] __se_sys_sendmsg+0x19e/0x270 [ 1446.573321][T22169] ? __x64_sys_sendmsg+0x80/0x80 [ 1446.578298][T22169] ? syscall_enter_from_user_mode+0x2a/0x80 [ 1446.584233][T22169] do_syscall_64+0x4c/0xa0 [ 1446.588703][T22169] ? clear_bhb_loop+0x60/0xb0 [ 1446.593423][T22169] ? clear_bhb_loop+0x60/0xb0 [ 1446.598120][T22169] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1446.604043][T22169] RIP: 0033:0x7f87f638eec9 [ 1446.608523][T22169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1446.628427][T22169] RSP: 002b:00007f87f71bb038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1446.636867][T22169] RAX: ffffffffffffffda RBX: 00007f87f65e5fa0 RCX: 00007f87f638eec9 [ 1446.644882][T22169] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000007 [ 1446.652899][T22169] RBP: 00007f87f71bb090 R08: 0000000000000000 R09: 0000000000000000 [ 1446.660916][T22169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1446.668931][T22169] R13: 00007f87f65e6038 R14: 00007f87f65e5fa0 R15: 00007ffccd1c5678 [ 1446.676962][T22169] [ 1446.986494][T13899] wlan1: Trigger new scan to find an IBSS to join [ 1446.999868][T22177] netlink: 'syz.1.5176': attribute type 16 has an invalid length. [ 1447.011948][T13907] tipc: Subscription rejected, illegal request [ 1447.030873][T22177] netlink: 48 bytes leftover after parsing attributes in process `syz.1.5176'. [ 1447.246886][T22188] netlink: 16186 bytes leftover after parsing attributes in process `syz.0.5177'. [ 1447.278684][T22185] device wg2 entered promiscuous mode [ 1447.397451][T22195] FAULT_INJECTION: forcing a failure. [ 1447.397451][T22195] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1447.421165][T22195] CPU: 1 PID: 22195 Comm: syz.3.5181 Not tainted syzkaller #0 [ 1447.428719][T22195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1447.438819][T22195] Call Trace: [ 1447.442152][T22195] [ 1447.445123][T22195] dump_stack_lvl+0x168/0x22e [ 1447.449859][T22195] ? show_regs_print_info+0x12/0x12 [ 1447.455108][T22195] ? load_image+0x3b0/0x3b0 [ 1447.459841][T22195] ? __lock_acquire+0x7c50/0x7c50 [ 1447.464931][T22195] should_fail_ex+0x399/0x4d0 [ 1447.469670][T22195] _copy_from_user+0x2c/0x170 [ 1447.474394][T22195] iovec_from_user+0x143/0x360 [ 1447.479222][T22195] __import_iovec+0x6d/0x500 [ 1447.483888][T22195] import_iovec+0x6f/0xa0 [ 1447.488272][T22195] ___sys_sendmsg+0x1e4/0x290 [ 1447.493006][T22195] ? __sys_sendmsg+0x270/0x270 [ 1447.497841][T22195] ? __lock_acquire+0x7c50/0x7c50 [ 1447.502935][T22195] ? __fdget+0x17c/0x200 [ 1447.507232][T22195] __se_sys_sendmsg+0x19e/0x270 [ 1447.512134][T22195] ? __x64_sys_sendmsg+0x80/0x80 [ 1447.517141][T22195] ? lockdep_hardirqs_on+0x94/0x140 [ 1447.522408][T22195] do_syscall_64+0x4c/0xa0 [ 1447.526871][T22195] ? clear_bhb_loop+0x60/0xb0 [ 1447.531574][T22195] ? clear_bhb_loop+0x60/0xb0 [ 1447.536273][T22195] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1447.542205][T22195] RIP: 0033:0x7ffbe9b8eec9 [ 1447.546651][T22195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1447.566371][T22195] RSP: 002b:00007ffbea9d3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1447.574826][T22195] RAX: ffffffffffffffda RBX: 00007ffbe9de5fa0 RCX: 00007ffbe9b8eec9 [ 1447.582816][T22195] RDX: 0000000000000080 RSI: 0000200000001080 RDI: 0000000000000008 [ 1447.590804][T22195] RBP: 00007ffbea9d3090 R08: 0000000000000000 R09: 0000000000000000 [ 1447.598799][T22195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1447.606803][T22195] R13: 00007ffbe9de6038 R14: 00007ffbe9de5fa0 R15: 00007fffaf9d6458 [ 1447.614984][T22195] [ 1447.957881][T22214] netlink: 16054 bytes leftover after parsing attributes in process `syz.1.5186'. [ 1448.063695][T22215] netlink: 132 bytes leftover after parsing attributes in process `syz.4.5188'. [ 1448.233954][T13907] tipc: Subscription rejected, illegal request [ 1448.643824][T22231] device wg2 left promiscuous mode [ 1448.668097][T22227] netlink: 132 bytes leftover after parsing attributes in process `syz.0.5193'. [ 1448.703698][T22232] device wg2 entered promiscuous mode [ 1448.945186][T22235] netlink: 'syz.4.5195': attribute type 25 has an invalid length. [ 1448.958894][T22235] netlink: 'syz.4.5195': attribute type 16 has an invalid length. [ 1448.967969][T22235] netlink: 48 bytes leftover after parsing attributes in process `syz.4.5195'. [ 1449.423888][T22243] device wg2 left promiscuous mode [ 1449.451809][T22244] netlink: 16186 bytes leftover after parsing attributes in process `syz.2.5198'. [ 1449.495836][T22240] device wg2 entered promiscuous mode [ 1449.530934][T22248] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5199'. [ 1449.831921][T22262] FAULT_INJECTION: forcing a failure. [ 1449.831921][T22262] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1449.872127][T13899] tipc: Subscription rejected, illegal request [ 1449.874566][T22262] CPU: 1 PID: 22262 Comm: syz.0.5203 Not tainted syzkaller #0 [ 1449.885839][T22262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1449.895947][T22262] Call Trace: [ 1449.899268][T22262] [ 1449.902237][T22262] dump_stack_lvl+0x168/0x22e [ 1449.906971][T22262] ? show_regs_print_info+0x12/0x12 [ 1449.912220][T22262] ? load_image+0x3b0/0x3b0 [ 1449.916783][T22262] ? __lock_acquire+0x7c50/0x7c50 [ 1449.921869][T22262] should_fail_ex+0x399/0x4d0 [ 1449.926631][T22262] _copy_from_user+0x2c/0x170 [ 1449.931354][T22262] __copy_msghdr+0x3b7/0x580 [ 1449.936099][T22262] ___sys_sendmsg+0x1a2/0x290 [ 1449.940815][T22262] ? __sys_sendmsg+0x270/0x270 [ 1449.945617][T22262] ? __lock_acquire+0x7c50/0x7c50 [ 1449.950669][T22262] ? __fdget+0x17c/0x200 [ 1449.954946][T22262] __se_sys_sendmsg+0x19e/0x270 [ 1449.959846][T22262] ? __x64_sys_sendmsg+0x80/0x80 [ 1449.964825][T22262] ? lockdep_hardirqs_on+0x94/0x140 [ 1449.970059][T22262] do_syscall_64+0x4c/0xa0 [ 1449.974576][T22262] ? clear_bhb_loop+0x60/0xb0 [ 1449.975405][T13907] wlan1: Creating new IBSS network, BSSID 00:8d:8d:ff:00:00 [ 1449.979265][T22262] ? clear_bhb_loop+0x60/0xb0 [ 1449.991333][T22262] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1449.997286][T22262] RIP: 0033:0x7f87f638eec9 [ 1450.001915][T22262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1450.021658][T22262] RSP: 002b:00007f87f71bb038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1450.030124][T22262] RAX: ffffffffffffffda RBX: 00007f87f65e5fa0 RCX: 00007f87f638eec9 [ 1450.038234][T22262] RDX: 000000002400c894 RSI: 0000200000000340 RDI: 0000000000000003 [ 1450.046253][T22262] RBP: 00007f87f71bb090 R08: 0000000000000000 R09: 0000000000000000 [ 1450.054275][T22262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1450.062288][T22262] R13: 00007f87f65e6038 R14: 00007f87f65e5fa0 R15: 00007ffccd1c5678 [ 1450.070363][T22262] [ 1450.202927][T22268] netlink: 16054 bytes leftover after parsing attributes in process `syz.1.5206'. [ 1450.547555][T22285] IPv6: Can't replace route, no match found [ 1450.557950][T22285] mac80211_hwsim hwsim34 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1450.622995][T22285] netlink: 'syz.4.5213': attribute type 10 has an invalid length. [ 1450.649851][T22287] netlink: 'syz.3.5212': attribute type 25 has an invalid length. [ 1450.670368][T22287] netlink: 'syz.3.5212': attribute type 16 has an invalid length. [ 1450.686258][T22287] netlink: 48 bytes leftover after parsing attributes in process `syz.3.5212'. [ 1450.704289][T22287] bridge0: port 1(bridge_slave_0) entered disabled state [ 1450.851522][T22291] device wg2 left promiscuous mode [ 1450.877236][T22292] netlink: 'syz.4.5216': attribute type 2 has an invalid length. [ 1450.901147][T22292] netlink: 'syz.4.5216': attribute type 8 has an invalid length. [ 1450.927060][T22292] netlink: 132 bytes leftover after parsing attributes in process `syz.4.5216'. [ 1451.231567][T22291] device wg2 entered promiscuous mode [ 1451.456071][T22300] netlink: 'syz.1.5219': attribute type 1 has an invalid length. [ 1451.484612][T22300] netlink: 'syz.1.5219': attribute type 3 has an invalid length. [ 1451.531247][T13907] tipc: Subscription rejected, illegal request [ 1451.550316][T22306] IPv6: Can't replace route, no match found [ 1451.575218][T22300] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5219'. [ 1452.107877][T22325] device wg2 left promiscuous mode [ 1452.149783][T22325] device wg2 entered promiscuous mode [ 1452.203673][T22330] netlink: 'syz.4.5229': attribute type 2 has an invalid length. [ 1452.221256][T22330] netlink: 'syz.4.5229': attribute type 8 has an invalid length. [ 1452.532395][T22342] FAULT_INJECTION: forcing a failure. [ 1452.532395][T22342] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1452.533668][T22342] [ 1452.533676][T22342] ====================================================== [ 1452.533684][T22342] WARNING: possible circular locking dependency detected [ 1452.533700][T22342] syzkaller #0 Not tainted [ 1452.533711][T22342] ------------------------------------------------------ [ 1452.533717][T22342] syz.3.5234/22342 is trying to acquire lock: [ 1452.533729][T22342] ffffffff8cb1eda0 (console_owner){-...}-{0:0}, at: console_emit_next_record+0x82d/0xc90 [ 1452.533789][T22342] [ 1452.533789][T22342] but task is already holding lock: [ 1452.533795][T22342] ffff8880b8f3aad8 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140 [ 1452.533840][T22342] [ 1452.533840][T22342] which lock already depends on the new lock. [ 1452.533840][T22342] [ 1452.533846][T22342] [ 1452.533846][T22342] the existing dependency chain (in reverse order) is: [ 1452.533852][T22342] [ 1452.533852][T22342] -> #4 (&rq->__lock){-.-.}-{2:2}: [ 1452.533876][T22342] _raw_spin_lock_nested+0x2e/0x40 [ 1452.533908][T22342] raw_spin_rq_lock_nested+0x26/0x140 [ 1452.533928][T22342] task_fork_fair+0x5c/0x350 [ 1452.533950][T22342] sched_cgroup_fork+0x32c/0x3c0 [ 1452.533973][T22342] copy_process+0x24b8/0x4020 [ 1452.533992][T22342] kernel_clone+0x225/0x8b0 [ 1452.534009][T22342] user_mode_thread+0xda/0x130 [ 1452.534027][T22342] rest_init+0x23/0x300 [ 1452.534053][T22342] start_kernel+0x0/0x539 [ 1452.534162][T22342] start_kernel+0x490/0x539 [ 1452.534188][T22342] secondary_startup_64_no_verify+0xcf/0xdb [ 1452.534215][T22342] [ 1452.534215][T22342] -> #3 (&p->pi_lock){-.-.}-{2:2}: [ 1452.534241][T22342] _raw_spin_lock_irqsave+0xa4/0xf0 [ 1452.534270][T22342] try_to_wake_up+0x5c/0x1080 [ 1452.534293][T22342] __wake_up_common+0x2a4/0x4e0 [ 1452.534318][T22342] __wake_up+0x10e/0x190 [ 1452.534341][T22342] tty_port_default_wakeup+0x9e/0xf0 [ 1452.534372][T22342] serial8250_tx_chars+0x629/0x830 [ 1452.534392][T22342] serial8250_handle_irq+0x516/0x6d0 [ 1452.534411][T22342] serial8250_default_handle_irq+0xb4/0x1a0 [ 1452.534439][T22342] serial8250_interrupt+0x9b/0x1c0 [ 1452.534456][T22342] __handle_irq_event_percpu+0x298/0xa30 [ 1452.534475][T22342] handle_irq_event+0x87/0x1e0 [ 1452.534492][T22342] handle_edge_irq+0x243/0xb20 [ 1452.534515][T22342] __common_interrupt+0xd7/0x1e0 [ 1452.534554][T22342] common_interrupt+0xb0/0xd0 [ 1452.534577][T22342] asm_common_interrupt+0x22/0x40 [ 1452.534597][T22342] unwind_next_frame+0x16f0/0x20b0 [ 1452.534618][T22342] arch_stack_walk+0x10c/0x140 [ 1452.534639][T22342] stack_trace_save+0x98/0xe0 [ 1452.534662][T22342] kasan_set_track+0x4b/0x70 [ 1452.534685][T22342] __kasan_slab_alloc+0x6b/0x80 [ 1452.534711][T22342] slab_post_alloc_hook+0x4b/0x480 [ 1452.534729][T22342] kmem_cache_alloc_bulk+0x3ba/0x4e0 [ 1452.534748][T22342] mas_alloc_nodes+0x449/0x890 [ 1452.534764][T22342] mas_preallocate+0x161/0x3c0 [ 1452.534794][T22342] __vma_adjust+0x2e2/0x1c60 [ 1452.534816][T22342] __split_vma+0x3a7/0x500 [ 1452.534839][T22342] do_mas_align_munmap+0x351/0x1220 [ 1452.534864][T22342] do_mas_munmap+0x240/0x2b0 [ 1452.534888][T22342] mmap_region+0x6e5/0x1c70 [ 1452.534909][T22342] do_mmap+0x958/0xfd0 [ 1452.534930][T22342] vm_mmap_pgoff+0x1b2/0x2b0 [ 1452.534955][T22342] ksys_mmap_pgoff+0x516/0x6f0 [ 1452.534977][T22342] do_syscall_64+0x4c/0xa0 [ 1452.534996][T22342] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1452.535015][T22342] [ 1452.535015][T22342] -> #2 (&tty->write_wait){-.-.}-{2:2}: [ 1452.535039][T22342] _raw_spin_lock_irqsave+0xa4/0xf0 [ 1452.535069][T22342] __wake_up+0xf4/0x190 [ 1452.535093][T22342] tty_port_default_wakeup+0x9e/0xf0 [ 1452.535122][T22342] serial8250_tx_chars+0x629/0x830 [ 1452.535141][T22342] serial8250_handle_irq+0x516/0x6d0 [ 1452.535161][T22342] serial8250_default_handle_irq+0xb4/0x1a0 [ 1452.535184][T22342] serial8250_interrupt+0x9b/0x1c0 [ 1452.535201][T22342] __handle_irq_event_percpu+0x298/0xa30 [ 1452.535219][T22342] handle_irq_event+0x87/0x1e0 [ 1452.535237][T22342] handle_edge_irq+0x243/0xb20 [ 1452.535260][T22342] __common_interrupt+0xd7/0x1e0 [ 1452.535288][T22342] common_interrupt+0xb0/0xd0 [ 1452.535311][T22342] asm_common_interrupt+0x22/0x40 [ 1452.535330][T22342] default_idle+0xb/0x10 [ 1452.535357][T22342] default_idle_call+0x84/0xc0 [ 1452.535385][T22342] do_idle+0x1fc/0x570 [ 1452.535411][T22342] cpu_startup_entry+0x3f/0x60 [ 1452.535438][T22342] rest_init+0x2dc/0x300 [ 1452.535466][T22342] start_kernel+0x0/0x539 [ 1452.535491][T22342] start_kernel+0x490/0x539 [ 1452.535517][T22342] secondary_startup_64_no_verify+0xcf/0xdb [ 1452.535548][T22342] [ 1452.535548][T22342] -> #1 (&port_lock_key){-.-.}-{2:2}: [ 1452.535573][T22342] _raw_spin_lock_irqsave+0xa4/0xf0 [ 1452.535603][T22342] serial8250_console_write+0x169/0x17a0 [ 1452.535624][T22342] console_emit_next_record+0x947/0xc90 [ 1452.535654][T22342] console_unlock+0x223/0x630 [ 1452.535680][T22342] vprintk_emit+0x489/0x680 [ 1452.535705][T22342] _printk+0xcc/0x110 [ 1452.535732][T22342] register_console+0x6c6/0x9c0 [ 1452.535759][T22342] univ8250_console_init+0x41/0x43 [ 1452.535793][T22342] console_init+0x1bc/0x78e [ 1452.535823][T22342] start_kernel+0x303/0x539 [ 1452.535849][T22342] secondary_startup_64_no_verify+0xcf/0xdb [ 1452.535874][T22342] [ 1452.535874][T22342] -> #0 (console_owner){-...}-{0:0}: [ 1452.535899][T22342] __lock_acquire+0x2cf8/0x7c50 [ 1452.535924][T22342] lock_acquire+0x1b4/0x490 [ 1452.535958][T22342] console_emit_next_record+0x84c/0xc90 [ 1452.535989][T22342] console_unlock+0x223/0x630 [ 1452.536014][T22342] vprintk_emit+0x489/0x680 [ 1452.536039][T22342] _printk+0xcc/0x110 [ 1452.536066][T22342] should_fail_ex+0x37a/0x4d0 [ 1452.536093][T22342] strncpy_from_user+0x32/0x350 [ 1452.536117][T22342] strncpy_from_user_nofault+0x6d/0x140 [ 1452.536136][T22342] bpf_probe_read_user_str+0x26/0x70 [ 1452.536162][T22342] bpf_prog_bc7c5c6b9645592f+0x35/0x37 [ 1452.536182][T22342] bpf_trace_run4+0x1f5/0x420 [ 1452.536210][T22342] __traceiter_sched_switch+0x8f/0xc0 [ 1452.536240][T22342] __schedule+0x1d18/0x40b0 [ 1452.536260][T22342] preempt_schedule_common+0x82/0xd0 [ 1452.536283][T22342] preempt_schedule+0xa7/0xb0 [ 1452.536303][T22342] preempt_schedule_thunk+0x16/0x18 [ 1452.536332][T22342] __local_bh_enable_ip+0x13b/0x1b0 [ 1452.536362][T22342] fib6_run_gc+0x1db/0x290 [ 1452.536390][T22342] ndisc_netdev_event+0x176/0x4a0 [ 1452.536408][T22342] raw_notifier_call_chain+0xcb/0x160 [ 1452.536428][T22342] dev_set_mac_address+0x2c4/0x3d0 [ 1452.536449][T22342] dev_set_mac_address_user+0x2d/0x50 [ 1452.536470][T22342] dev_ifsioc+0x770/0xe90 [ 1452.536497][T22342] dev_ioctl+0x578/0xea0 [ 1452.536523][T22342] sock_do_ioctl+0x222/0x2f0 [ 1452.536556][T22342] sock_ioctl+0x4ed/0x6e0 [ 1452.536582][T22342] __se_sys_ioctl+0xfa/0x170 [ 1452.536606][T22342] do_syscall_64+0x4c/0xa0 [ 1452.536627][T22342] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1452.536646][T22342] [ 1452.536646][T22342] other info that might help us debug this: [ 1452.536646][T22342] [ 1452.536652][T22342] Chain exists of: [ 1452.536652][T22342] console_owner --> &p->pi_lock --> &rq->__lock [ 1452.536652][T22342] [ 1452.536681][T22342] Possible unsafe locking scenario: [ 1452.536681][T22342] [ 1452.536686][T22342] CPU0 CPU1 [ 1452.536691][T22342] ---- ---- [ 1452.536696][T22342] lock(&rq->__lock); [ 1452.536708][T22342] lock(&p->pi_lock); [ 1452.536720][T22342] lock(&rq->__lock); [ 1452.536733][T22342] lock(console_owner); [ 1452.536744][T22342] [ 1452.536744][T22342] *** DEADLOCK *** [ 1452.536744][T22342] [ 1452.536749][T22342] 5 locks held by syz.3.5234/22342: [ 1452.536760][T22342] #0: ffffffff8dd41268 (rtnl_mutex){+.+.}-{3:3}, at: dev_ioctl+0x567/0xea0 [ 1452.536814][T22342] #1: ffffffff8dd38ff0 (dev_addr_sem){++++}-{3:3}, at: dev_set_mac_address_user+0x1f/0x50 [ 1452.536864][T22342] #2: ffff8880b8f3aad8 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140 [ 1452.536912][T22342] #3: ffffffff8cb2abe0 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run4+0xf9/0x420 [ 1452.536967][T22342] #4: ffffffff8cb1ee80 (console_lock){+.+.}-{0:0}, at: _printk+0xcc/0x110 [ 1452.537020][T22342] [ 1452.537020][T22342] stack backtrace: [ 1452.537026][T22342] CPU: 1 PID: 22342 Comm: syz.3.5234 Not tainted syzkaller #0 [ 1452.537045][T22342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1452.537058][T22342] Call Trace: [ 1452.537065][T22342] [ 1452.537073][T22342] dump_stack_lvl+0x168/0x22e [ 1452.537097][T22342] ? load_image+0x3b0/0x3b0 [ 1452.537127][T22342] ? show_regs_print_info+0x12/0x12 [ 1452.537155][T22342] ? print_circular_bug+0x12b/0x1a0 [ 1452.537187][T22342] check_noncircular+0x274/0x310 [ 1452.537219][T22342] ? add_chain_block+0x940/0x940 [ 1452.537246][T22342] ? lockdep_lock+0xdc/0x1e0 [ 1452.537275][T22342] ? add_lock_to_list+0x191/0x280 [ 1452.537306][T22342] ? _find_first_zero_bit+0xcf/0x100 [ 1452.537341][T22342] __lock_acquire+0x2cf8/0x7c50 [ 1452.537384][T22342] ? verify_lock_unused+0x140/0x140 [ 1452.537425][T22342] lock_acquire+0x1b4/0x490 [ 1452.537452][T22342] ? console_emit_next_record+0x82d/0xc90 [ 1452.537488][T22342] ? __lock_acquire+0x7c50/0x7c50 [ 1452.537514][T22342] ? do_raw_spin_lock+0x11d/0x280 [ 1452.537551][T22342] ? read_lock_is_recursive+0x10/0x10 [ 1452.537580][T22342] ? __rwlock_init+0x140/0x140 [ 1452.537611][T22342] ? memcpy+0x3c/0x60 [ 1452.537644][T22342] ? do_raw_spin_unlock+0x11d/0x230 [ 1452.537676][T22342] ? console_emit_next_record+0x82d/0xc90 [ 1452.537709][T22342] console_emit_next_record+0x84c/0xc90 [ 1452.537740][T22342] ? console_emit_next_record+0x82d/0xc90 [ 1452.537775][T22342] ? __lock_acquire+0x7c50/0x7c50 [ 1452.537804][T22342] ? info_print_prefix+0x300/0x300 [ 1452.537836][T22342] ? do_raw_spin_unlock+0x11d/0x230 [ 1452.537870][T22342] ? _raw_spin_unlock_irqrestore+0xaa/0x100 [ 1452.537905][T22342] ? _raw_spin_unlock+0x40/0x40 [ 1452.537943][T22342] ? __down_trylock_console_sem+0x184/0x1e0 [ 1452.537974][T22342] ? _printk+0xcc/0x110 [ 1452.538002][T22342] ? _printk+0xcc/0x110 [ 1452.538031][T22342] ? console_trylock+0x160/0x160 [ 1452.538061][T22342] console_unlock+0x223/0x630 [ 1452.538091][T22342] ? _printk+0xcc/0x110 [ 1452.538121][T22342] vprintk_emit+0x489/0x680 [ 1452.538153][T22342] ? printk_sprint+0x460/0x460 [ 1452.538185][T22342] ? verify_lock_unused+0x140/0x140 [ 1452.538216][T22342] _printk+0xcc/0x110 [ 1452.538248][T22342] ? load_image+0x3b0/0x3b0 [ 1452.538286][T22342] should_fail_ex+0x37a/0x4d0 [ 1452.538319][T22342] strncpy_from_user+0x32/0x350 [ 1452.538348][T22342] strncpy_from_user_nofault+0x6d/0x140 [ 1452.538371][T22342] bpf_probe_read_user_str+0x26/0x70 [ 1452.538400][T22342] bpf_prog_bc7c5c6b9645592f+0x35/0x37 [ 1452.538421][T22342] bpf_trace_run4+0x1f5/0x420 [ 1452.538451][T22342] ? bpf_trace_run4+0xf9/0x420 [ 1452.538483][T22342] ? bpf_trace_run3+0x400/0x400 [ 1452.538517][T22342] ? tracing_record_taskinfo_sched_switch+0x79/0x360 [ 1452.538550][T22342] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 1452.538573][T22342] __traceiter_sched_switch+0x8f/0xc0 [ 1452.538606][T22342] __schedule+0x1d18/0x40b0 [ 1452.538632][T22342] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 1452.538670][T22342] ? __sched_text_start+0x8/0x8 [ 1452.538693][T22342] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 1452.538728][T22342] ? preempt_schedule+0xa7/0xb0 [ 1452.538751][T22342] ? fib6_run_gc+0x1db/0x290 [ 1452.538781][T22342] preempt_schedule_common+0x82/0xd0 [ 1452.538806][T22342] preempt_schedule+0xa7/0xb0 [ 1452.538830][T22342] ? schedule_preempt_disabled+0x20/0x20 [ 1452.538854][T22342] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 1452.538884][T22342] ? lock_chain_count+0x20/0x20 [ 1452.538912][T22342] preempt_schedule_thunk+0x16/0x18 [ 1452.538946][T22342] __local_bh_enable_ip+0x13b/0x1b0 [ 1452.538979][T22342] ? _local_bh_enable+0xa0/0xa0 [ 1452.539014][T22342] ? fib6_run_gc+0x1db/0x290 [ 1452.539045][T22342] fib6_run_gc+0x1db/0x290 [ 1452.539077][T22342] ? fib6_clean_all_skip_notify+0x30/0x30 [ 1452.539111][T22342] ? neigh_changeaddr+0x1f/0x40 [ 1452.539145][T22342] ndisc_netdev_event+0x176/0x4a0 [ 1452.539169][T22342] raw_notifier_call_chain+0xcb/0x160 [ 1452.539194][T22342] dev_set_mac_address+0x2c4/0x3d0 [ 1452.539219][T22342] ? dev_pre_changeaddr_notify+0x100/0x100 [ 1452.539242][T22342] ? rwsem_write_trylock+0x12f/0x1b0 [ 1452.539268][T22342] ? clear_nonspinnable+0x60/0x60 [ 1452.539296][T22342] ? full_name_hash+0x8e/0xe0 [ 1452.539330][T22342] dev_set_mac_address_user+0x2d/0x50 [ 1452.539353][T22342] dev_ifsioc+0x770/0xe90 [ 1452.539387][T22342] ? dev_ioctl+0xea0/0xea0 [ 1452.539417][T22342] ? mutex_lock_nested+0x10/0x10 [ 1452.539444][T22342] ? apparmor_capable+0x12c/0x190 [ 1452.539471][T22342] ? full_name_hash+0x8e/0xe0 [ 1452.539503][T22342] ? dev_load+0x1d/0x1e0 [ 1452.539532][T22342] ? dev_load+0x1d/0x1e0 [ 1452.539568][T22342] dev_ioctl+0x578/0xea0 [ 1452.539601][T22342] sock_do_ioctl+0x222/0x2f0 [ 1452.539632][T22342] ? sock_show_fdinfo+0xb0/0xb0 [ 1452.539670][T22342] sock_ioctl+0x4ed/0x6e0 [ 1452.539701][T22342] ? sock_poll+0x3f0/0x3f0 [ 1452.539734][T22342] ? bpf_lsm_file_ioctl+0x5/0x10 [ 1452.539762][T22342] ? security_file_ioctl+0x7c/0xa0 [ 1452.539786][T22342] ? sock_poll+0x3f0/0x3f0 [ 1452.539814][T22342] __se_sys_ioctl+0xfa/0x170 [ 1452.539841][T22342] do_syscall_64+0x4c/0xa0 [ 1452.539863][T22342] ? clear_bhb_loop+0x60/0xb0 [ 1452.539884][T22342] ? clear_bhb_loop+0x60/0xb0 [ 1452.539907][T22342] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1452.539928][T22342] RIP: 0033:0x7ffbe9b8eec9 [ 1452.539946][T22342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1452.539964][T22342] RSP: 002b:00007ffbea9d3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1452.539984][T22342] RAX: ffffffffffffffda RBX: 00007ffbe9de5fa0 RCX: 00007ffbe9b8eec9 [ 1452.540000][T22342] RDX: 0000200000000080 RSI: 0000000000008924 RDI: 0000000000000007 [ 1452.540014][T22342] RBP: 00007ffbea9d3090 R08: 0000000000000000 R09: 0000000000000000 [ 1452.540026][T22342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1452.540039][T22342] R13: 00007ffbe9de6038 R14: 00007ffbe9de5fa0 R15: 00007fffaf9d6458 [ 1452.540063][T22342] [ 1453.952769][T22342] CPU: 1 PID: 22342 Comm: syz.3.5234 Not tainted syzkaller #0 [ 1453.960238][T22342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 1453.970309][T22342] Call Trace: [ 1453.973608][T22342] [ 1453.976549][T22342] dump_stack_lvl+0x168/0x22e [ 1453.981245][T22342] ? show_regs_print_info+0x12/0x12 [ 1453.986450][T22342] ? load_image+0x3b0/0x3b0 [ 1453.990964][T22342] should_fail_ex+0x399/0x4d0 [ 1453.995744][T22342] strncpy_from_user+0x32/0x350 [ 1454.000690][T22342] strncpy_from_user_nofault+0x6d/0x140 [ 1454.006359][T22342] bpf_probe_read_user_str+0x26/0x70 [ 1454.011673][T22342] bpf_prog_bc7c5c6b9645592f+0x35/0x37 [ 1454.017235][T22342] bpf_trace_run4+0x1f5/0x420 [ 1454.021942][T22342] ? bpf_trace_run4+0xf9/0x420 [ 1454.026729][T22342] ? bpf_trace_run3+0x400/0x400 [ 1454.031596][T22342] ? tracing_record_taskinfo_sched_switch+0x79/0x360 [ 1454.038281][T22342] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 1454.044622][T22342] __traceiter_sched_switch+0x8f/0xc0 [ 1454.050015][T22342] __schedule+0x1d18/0x40b0 [ 1454.054532][T22342] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 1454.060267][T22342] ? __sched_text_start+0x8/0x8 [ 1454.065227][T22342] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 1454.070971][T22342] ? preempt_schedule+0xa7/0xb0 [ 1454.075951][T22342] ? fib6_run_gc+0x1db/0x290 [ 1454.080553][T22342] preempt_schedule_common+0x82/0xd0 [ 1454.085846][T22342] preempt_schedule+0xa7/0xb0 [ 1454.090530][T22342] ? schedule_preempt_disabled+0x20/0x20 [ 1454.096166][T22342] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 1454.102158][T22342] ? lock_chain_count+0x20/0x20 [ 1454.107102][T22342] preempt_schedule_thunk+0x16/0x18 [ 1454.112399][T22342] __local_bh_enable_ip+0x13b/0x1b0 [ 1454.117701][T22342] ? _local_bh_enable+0xa0/0xa0 [ 1454.123028][T22342] ? fib6_run_gc+0x1db/0x290 [ 1454.127654][T22342] fib6_run_gc+0x1db/0x290 [ 1454.132102][T22342] ? fib6_clean_all_skip_notify+0x30/0x30 [ 1454.137842][T22342] ? neigh_changeaddr+0x1f/0x40 [ 1454.142718][T22342] ndisc_netdev_event+0x176/0x4a0 [ 1454.147772][T22342] raw_notifier_call_chain+0xcb/0x160 [ 1454.153263][T22342] dev_set_mac_address+0x2c4/0x3d0 [ 1454.158411][T22342] ? dev_pre_changeaddr_notify+0x100/0x100 [ 1454.164241][T22342] ? rwsem_write_trylock+0x12f/0x1b0 [ 1454.169560][T22342] ? clear_nonspinnable+0x60/0x60 [ 1454.174708][T22342] ? full_name_hash+0x8e/0xe0 [ 1454.179428][T22342] dev_set_mac_address_user+0x2d/0x50 [ 1454.184916][T22342] dev_ifsioc+0x770/0xe90 [ 1454.189272][T22342] ? dev_ioctl+0xea0/0xea0 [ 1454.193707][T22342] ? mutex_lock_nested+0x10/0x10 [ 1454.198652][T22342] ? apparmor_capable+0x12c/0x190 [ 1454.203692][T22342] ? full_name_hash+0x8e/0xe0 [ 1454.208559][T22342] ? dev_load+0x1d/0x1e0 [ 1454.212817][T22342] ? dev_load+0x1d/0x1e0 [ 1454.217104][T22342] dev_ioctl+0x578/0xea0 [ 1454.221368][T22342] sock_do_ioctl+0x222/0x2f0 [ 1454.226002][T22342] ? sock_show_fdinfo+0xb0/0xb0 [ 1454.230921][T22342] sock_ioctl+0x4ed/0x6e0 [ 1454.235278][T22342] ? sock_poll+0x3f0/0x3f0 [ 1454.239715][T22342] ? bpf_lsm_file_ioctl+0x5/0x10 [ 1454.244662][T22342] ? security_file_ioctl+0x7c/0xa0 [ 1454.249809][T22342] ? sock_poll+0x3f0/0x3f0 [ 1454.254237][T22342] __se_sys_ioctl+0xfa/0x170 [ 1454.258840][T22342] do_syscall_64+0x4c/0xa0 [ 1454.263258][T22342] ? clear_bhb_loop+0x60/0xb0 [ 1454.267936][T22342] ? clear_bhb_loop+0x60/0xb0 [ 1454.272709][T22342] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1454.278609][T22342] RIP: 0033:0x7ffbe9b8eec9 [ 1454.283028][T22342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1454.302903][T22342] RSP: 002b:00007ffbea9d3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1454.311503][T22342] RAX: ffffffffffffffda RBX: 00007ffbe9de5fa0 RCX: 00007ffbe9b8eec9 [ 1454.319503][T22342] RDX: 0000200000000080 RSI: 0000000000008924 RDI: 0000000000000007 [ 1454.327664][T22342] RBP: 00007ffbea9d3090 R08: 0000000000000000 R09: 0000000000000000 [ 1454.335640][T22342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1454.343614][T22342] R13: 00007ffbe9de6038 R14: 00007ffbe9de5fa0 R15: 00007fffaf9d6458 [ 1454.351601][T22342] [ 1454.423425][T22340] device wg2 left promiscuous mode [ 1454.458114][T22340] device wg2 entered promiscuous mode [ 1454.522557][T22338] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 1454.529233][T22338] hsr_slave_1: hsr_addr_subst_dest: Unknown node