last executing test programs: 6m21.514366413s ago: executing program 1 (id=1701): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317"], 0xfdef) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x66) 6m19.592903516s ago: executing program 1 (id=1710): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x10040, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000100)='./file0\x00', 0x0, 0x8, r3}, 0x18) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb0100180000000000000050d2f6b69800000002000000090000000000000e03000000010000000a0000000000000203000000000000000500000d00000000060000000100000000000000000000000000000000000000090000000000000001000000030010"], 0x0, 0x6a, 0x0, 0x0, 0x7fffffff}, 0x28) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000010040), 0x0, 0xffffffffffffffff, 0x4}, 0x38) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b87, 0x2, @perf_config_ext={0x8, 0x7}, 0x8000, 0x5, 0x43a1bd76, 0x1, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200d}, 0x0, 0xffffffffffefffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x10, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007baaf8ff00000000b7080000341200007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000008"], 0x0, 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000c40)="c106020022003505d25a806f8c6394f90435fc60040011000a740100053582c137153e37024801", 0x27}], 0x1}, 0x4044810) r5 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030030000b12d25a80648c2594f90124fc60100c034002040000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0xa, 0x0, 0x0, 0x4000}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x2, 0x2, 0x1, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=ANY=[@ANYRES16=r4, @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000046090100000003e71600000006000000180100002020702500000000002020207b9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000024090000060000005c09000000000000b5030000000000008500000076000000b70000000000000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x14) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x100904, 0x0, 0x0, 0x0, 0x200000, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNGETDEVNETNS(r6, 0x54e3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000000c0)=r0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8264, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x367b, 0x8000}, 0x10320, 0x0, 0x8, 0x0, 0x1, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000018, &(0x7f0000000880)=ANY=[@ANYBLOB="0a00000016000000b40000007f00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000002000000000000001040000000000000000000000000000d32c3b6fbf652b562082049b6e2f17476b69681709f2b8c4dd98233dd7f07f406ae9d14479c50fe54a9f91bcda6f77c3b39c0e78c38c199ad611916094a61111e3c0138fd0bb9266175c2858a90415741026c936bbe7c0edd044d2d68fb71e46d3220a9558d9950208dede061056e8289e97ef5b6c7a8ba78e9a1d1c37e1aab2ab9633c7521cbc293c113aa2357f182c7a8e9448289c5024160e468815e6ebe4"], 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1e000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r7], 0x0}, 0x94) 6m17.338629149s ago: executing program 1 (id=1715): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x22}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, 0x0, 0x0) close(0x3) socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xe) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000100)={0x0, r3}, 0x8) close(r1) ioctl$SIOCSIFHWADDR(r0, 0x8922, &(0x7f0000002280)={'hsr0\x00', @random="000000000004"}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x40}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x16, 0x17, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7020000000000008500000008000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x7fffffff, 0x20000}, 0x4001, 0x0, 0x0, 0x6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x9fd, 0x84, 0x105}, 0x48) socketpair(0x11, 0x4, 0x4fb, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r7, &(0x7f00000008c0)={&(0x7f0000000340)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x41, 0x3, 0x3}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000580)="ca041a0ca06aaaaa5a30a274551a15b0fc8e79bdaa449da1ca3522aa170b545643d7535dd042e79c8631d14f932ae304b75858d4825972850e255bbd07e662d5af571326323afc7a487e40d144640f9e3eedd62347de4821f95760e4aa91489e47f51cd0ae", 0x65}, {&(0x7f0000000180)="796faa9678f907ab848cbe94c96578fb08437e9bfe18c6fed6bbe299b231f646e5eeda88e3f2ce44ca01e864613a79d63cced1", 0x33}, {&(0x7f0000000600)="3a1347484c551db7f4f4ca79296c50e414224798cdd6145edf0218c64669cdba0c349f189caf14906485b55cb8aa7cde1d2640e21716725a1b3dc549cbd87cf448a48a3c25f6bb8288168dcab51a59e98475c27bf3243721c6436c781d11d4506e26446a8c693356c676018046d2c7b4ff771620caf5e6bae942965e5a9df9cf1459ece7c9f06b9eb4af5c0bfd85bb3904ee5a6f292d3e7e34c778b306cb7b002bcd1cc64424822a713376fb7c6a5b7a672b37bd8a74", 0xb6}, {&(0x7f00000006c0)="b028d79fa87fb427de3847814f215a1e09574e901d8ae097a741506b53d1786b6db1d9fac5a14180548b1ce6ad7d2ce81d404be835ae5d0ec21feeca4dfe11d35c74eb3beb62f2e858ae7b978d0cbbf20e071a17ca3e00c75505704229bf187c52d5384e9d68618e4a0a3c2d381ce91174007ecacc4bf5ff6aee7fb7061b24e77d", 0x81}, {&(0x7f00000003c0)="0a3507ba71f94dc82753fdaad9fc609c2ffac3edaac4a5aefd", 0x19}], 0x5, &(0x7f0000000800)=[{0x38, 0x10b, 0x5, "4df6e6e9720d413e9ec1d83da04f1e3618320cfce198b5b1bf6162fb1da6e5eaa427"}, {0x50, 0x107, 0x8, "8c0bc399c7c5ab676b464722362b8de35711784a4cbd552be5d5aaacf756cd9e414008e11019d9e3ec085b452f9acd9194df323051ca2adecf36"}, {0x18, 0x88, 0x2, "2c94befb"}], 0xa0}, 0x4004010) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r6}, 0x38) 6m15.665828136s ago: executing program 1 (id=1719): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) mkdir(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7538e475dd6317cebb03c23c00fe80000000000000875a65969ff57b0000040000000000000004"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850200000000000018100000", @ANYRES32], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)) 6m14.07733968s ago: executing program 1 (id=1724): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8181, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce2200182f00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa35f088"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) 6m13.969444496s ago: executing program 1 (id=1726): openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000"], 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r2, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x5, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'\x00', 0x202}) ioctl$TUNSETPERSIST(r4, 0x400454c9, 0x1) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000700)) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000200)=r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="080000000000000000000000000014009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) mkdir(0x0, 0x0) r5 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x44208400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4, 0x0, 0x0, 0x504}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) 5m58.576111459s ago: executing program 32 (id=1726): openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000"], 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r2, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x5, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'\x00', 0x202}) ioctl$TUNSETPERSIST(r4, 0x400454c9, 0x1) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000700)) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000200)=r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="080000000000000000000000000014009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) mkdir(0x0, 0x0) r5 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x44208400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4, 0x0, 0x0, 0x504}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) 16.69196429s ago: executing program 3 (id=2504): r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x300440c4) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x541b, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0xfffff7be, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x6, 0xf, 0x8, 0x41}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0xffffffffffffffd4, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe5}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0xffffffffffffffd4, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe5}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0xce, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 16.371014499s ago: executing program 3 (id=2507): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400", @ANYRES32=0x1, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x66) 11.205660602s ago: executing program 3 (id=2520): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06"], 0x48) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000300)=r5) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 8.669577601s ago: executing program 3 (id=2530): r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000010000000, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0xa, 0x2) socket$kcm(0x2, 0xa, 0x73) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2, 0xffffffffffffffff}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000027000000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000001a00000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000100)="76389e6a65585578f830e9000000", 0x0, 0x10001, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) close(0x3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000bc0)=ANY=[@ANYBLOB="ad72632d61202d6d656d6f7240a8f325945089caa46fc7f2c667e88c6ece1f2bfbcf51e63cc6460c3a5b3493be9aeb37ed5fca0687c448657141a53cce7307389b4ed2528c120cfe6c8707f079ffcea7889ed41057bf847762a81cadca9f84b0ec723805acbcc781f699376abe31f83490e706474238870d068c7674368b451529a9ed4d150cfb0fb86ea3269b4ab4a76e212920093b9303a7adc5d6599be49c0b2207083e4189500a13fd7c798db0dfb85b99c1ac1323a19bf2ae748bc70fb38deabfd7c7c6ccc5a1c51ec3eae3259294"], 0xe) write$cgroup_subtree(r5, &(0x7f0000000000)={[{0x2d, 'net_prio'}, {0x2d, 'cpuset'}, {0x2d, 'net'}, {0x2b, 'rlimit'}, {0x2b, 'io'}, {0x2b, 'rdma'}, {0x2d, 'cpu'}]}, 0x2e) 8.363048929s ago: executing program 3 (id=2533): r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x0, 0xe2}) 8.221283407s ago: executing program 3 (id=2534): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x16, 0x0, 0x4, 0xffff, 0x0, 0x1}, 0x50) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xd, 0x5a87, 0x4, 0x3, 0x0, r0}, 0x48) bpf$MAP_UPDATE_BATCH(0x1b, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x2, r3}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0100180000000000000028ffff0028000000030000000100000000000098767e98ad0dcc640e08e613b98d15319dd9f6de65bdb00c020000000000090000000000"], 0x0, 0x43}, 0x28) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x42008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x17}, 0x0, 0xc8, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) 8.015450739s ago: executing program 0 (id=2424): sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="d8000000200081044e81f782db44b9040a1d080211000000401280a1180002000000000000000e1208000f0100810401a8001600200001400300000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c11503c6bbace8017cb090000001fb791643a5ee4001b146218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f5aeb4edbb57a5025ccca9e00360db701", 0x9b}], 0x1, 0x0, 0x0, 0x7400}, 0x40041) r0 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="33fe000071009154090893b3520ba54a07"], 0xfe33) 7.756297054s ago: executing program 0 (id=2535): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x16, 0x0, 0x4, 0xffff, 0x0, 0x1}, 0x50) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xd, 0x5a87, 0x4, 0x3, 0x0, r0}, 0x48) bpf$MAP_UPDATE_BATCH(0x1b, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x2, r3}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0100180000000000000028ffff0028000000030000000100000000000098767e98ad0dcc640e08e613b98d15319dd9f6de65bdb00c020000000000090000000000"], 0x0, 0x43}, 0x28) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x42008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x17}, 0x0, 0xc8, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) socketpair(0x1a, 0x800, 0x7, &(0x7f0000000400)) perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 7.360768568s ago: executing program 0 (id=2538): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000004000000040000000200000000000000", @ANYRES32=0x1], 0x50) ioctl$SIOCSIFHWADDR(r1, 0x8914, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317"], 0xfdef) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x66) 6.992159169s ago: executing program 0 (id=2540): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400", @ANYRES32=0x1, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x66) 4.996293236s ago: executing program 0 (id=2548): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4110, 0x0, 0x0, 0x5, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYRESOCT=r1], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, @lirc_mode2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000000)="378303076844268cb89e14f008004ee0ffff00febabec41177fb86dd1402e000030c", 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="160000000400000004000000ff00000000020000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000faff0000000000000000334d96fe8101584ab03abb4532e2a3ca8548201125ba4645183df762bc4fd61ede8d1bdc3a895221a66ddf3fae573281f721db089db1e51734369fa6963880631caddcab07d04f6f289eb288839fa3d4988aef220acff92513a66dd0223e4f011a3bb22899c0d5a89a47b028b1dd1eb6e0a8c060a8a00e9b6dd5d9233f6c0dbb20ba86ac01711e25652eef4f9265808c8aedfa23001164f81ffeed69c3d7d4800480635a4f3ac2b2dc5f9692b7e4907d9b730f54c86f6dabddfac45b013e2401d2fa47b239ee8bef5e22fcaaffc3df508397"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r4, 0x8918, &(0x7f0000000000)={'ipvlan0\x00', @random="0200ff7fffff"}) r5 = socket$kcm(0x15, 0x5, 0x0) sendmsg$inet(r5, &(0x7f0000001180)={&(0x7f0000000000)={0xa, 0xffff, @empty}, 0x10, 0x0, 0x0, &(0x7f00000011c0)=ANY=[], 0x6b}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r6, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0xfc, 0x0}, 0x30004001) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9f0) 4.888025853s ago: executing program 2 (id=2549): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x16, 0x0, 0x4, 0xffff, 0x0, 0x1}, 0x50) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xd, 0x5a87, 0x4, 0x3, 0x0, r0}, 0x48) bpf$MAP_UPDATE_BATCH(0x1b, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x2, r3}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0100180000000000000028ffff0028000000030000000100000000000098767e98ad0dcc640e08e613b98d15319dd9f6de65bdb00c020000000000090000000000"], 0x0, 0x43}, 0x28) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x42008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x17}, 0x0, 0xc8, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) socketpair(0x1a, 0x800, 0x7, &(0x7f0000000400)) r7 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x0, 0xe2}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x6, 0x5, &(0x7f0000000040)=@framed={{0x56, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0xc}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0, 0x2}, 0x104141, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102032908000000000000000000000000ac14140a000000000000000000000000ac1414aa"], 0xfdef) 4.279808978s ago: executing program 2 (id=2552): r0 = getpid() r1 = perf_event_open(&(0x7f0000000980)={0x2, 0x80, 0x6, 0x3, 0x51, 0xff, 0x0, 0x81, 0x100, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xad, 0x1, @perf_config_ext={0x7f, 0x81}, 0x11010, 0x9, 0x1, 0x6, 0xfffffffffffffff8, 0xfffffffd, 0x0, 0x0, 0x2, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0xa7, 0xcc, 0x2, 0xeb, 0x0, 0x2, 0x600e, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc0000, 0x1, @perf_bp={&(0x7f00000004c0), 0x8}, 0xa004, 0x6, 0xffff5d7b, 0x4, 0x1, 0x3ff, 0x9, 0x0, 0x7, 0x0, 0x8}, r0, 0x2, r1, 0x8) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x2, [@struct={0x7, 0x8, 0x0, 0x4, 0x0, 0x3ff, [{0x0, 0x2, 0x2}, {0x0, 0x0, 0x2b}, {0x8, 0x1, 0x7}, {0x1, 0x4, 0x6}, {0xf, 0x4, 0x5}, {0xe, 0x3, 0x9}, {0xf, 0x5, 0xc}, {0x7, 0x3}]}, @func_proto, @struct={0x0, 0x0, 0x0, 0x9, 0x0, 0x2}]}}, &(0x7f00000005c0)=""/240, 0x9e, 0xf0, 0x1}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xfffffff2, '\x00', 0x0, r2, 0x0, 0x3}, 0x50) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="0400000004000001000000000500010000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r3, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r4}, 0xc) close(r5) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x9, 0x8, 0x3, 0x3, 0x116, 0xffffffffffffffff, 0xffffffff}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r3}, &(0x7f0000000300), &(0x7f00000003c0)=r5}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000006c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x55, &(0x7f00000002c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0xf8, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580)=r6, 0x4) r7 = socket$kcm(0x10, 0x2, 0x0) r8 = socket$kcm(0x28, 0x1, 0x0) sendmsg$kcm(r8, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x20040001) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="1c0000001a0081044e81f782db4cb9040a1d0800fe007ca20e0000a1", 0x1c}], 0x1}, 0x0) 4.048251052s ago: executing program 2 (id=2553): r0 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r0, &(0x7f0000000900)={&(0x7f0000000380)={0x2, 0x4e24, @rand_addr=0x64010100}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000440)='Z', 0x1}], 0x1}, 0x10) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000200)=[{0x0}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="5c00000014006b03000000d86e6c1d0002847ea622fb564500004e23e3f58e76110165f450e71b0075e3002500028d459e37000f0000000000bf9367b47e51f60a64c9f4d4938037e786a6d0bdd700"/92, 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000340)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0], 0x0, 0xfc, &(0x7f0000000780)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x5e, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) sendmsg$inet(r0, &(0x7f00000008c0)={&(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000000640)=[{&(0x7f00000000c0)="854591e8a8b4a98dbdc62fdc1cf48cd2f766e6197568caa7f6d512e327e8ca67fc01463f0d49f5d1a0f87d1608b1214e80825b86cd3daa36c42e7b4aea00cbd30df836682f6b3dc139e535447211516a780b9dd3daa0305b541fb36e33629e061b625d", 0x63}, {&(0x7f00000003c0)="1d93ca9bc9e1e3d6510e664bc152e71ab0f5d1e3c4cc04b4d48af35186b931ac808f910663d0a99fdeed36695e90b990b0181fa3863d6548861262030a7b17cf5fe1cd0a2e34723ee47e29cc24dd40c863ecc99254ce2b8bd7b7e8ce25230dcb620cb42f4817c8dfaaf90adf11593895d42c1e2f65dec45f24db31f7", 0x7c}, {&(0x7f00000002c0)="a2731bad77cc4f493552f8bfa560502e822f935aa91c621a2b953fdb135734aa981b3fb19ca176ea5d28a6f414ac1b6f6e06e5b4c4f248045f69ed06d8", 0x3d}, {&(0x7f0000000480)="b2a3c465be3ccb3e99a491e5b8652ec88b1ce1d1b1731e3e72d224ebc9815c95eb9c36e8850ab75c87a5727d5f4d2db88b3e5ebebc0e1ca5b2a058f367a4a407984251f712494e760466f03b3a2f1a2c957ed305c422ecd1f500fec4346930fa903a370530d25b48f6e435978be13516297e379e2c51bcb65326723976150937dd589bbf8c591ccbe9c62457deeb640d1ad906552859514b218d724c8ea341d8f462390c63aa767ddc5744537cc779a5a208bdffb599d6d961d1df2c8d7fe532e1a707d2e6299b7ef2e08f6d3a1cd2b2d158d36b09b20b5db7b9a13883d9e0155d807dd59672", 0xe6}, {&(0x7f0000000580)="d636f509b9fed4ff30b5f1123e7a5bc31d5f82daf377c759f1bc08515023511bedc8a3e4fff032e690f8b1114b1a93053d81b45bce1076dc6d45e2df299c0d3e8e9b8b9b7d690b29d7934d7bc2d59c39ea2bb70e48f6e26219fc25ee982a10318597beda801a0dd13f38260af57137416c62f282793c6422661fcc82da2a9ef24481801fbb376da5c7ff65807abc5b13caf12dcef311a054eab81cd471c3cd08be9f7ed74aefa96738acba72fb8c", 0xae}], 0x5, &(0x7f0000000a40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @local}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3ff}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x28}}, @ip_tos_int={{0x14}}], 0x88}, 0x20004000) 3.110271287s ago: executing program 2 (id=2555): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400", @ANYRES32=0x1, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x66) 2.768152027s ago: executing program 4 (id=2556): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x2a040, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffbf, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0e000000040000000400000003"], 0x48) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x15, 0x1c, &(0x7f0000000400)=ANY=[@ANYBLOB="1808000060000000000000000000008018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bc0908000000000035090100000000009500000000070000b7020000000000007b9a00fe000000006609000000000000dbaaf0ff50000000bf8620000000000007080000f8ffffffbfa400000000000007040000f0ffffff770000000800000018220000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7050000180000084609f0ff76000000bf9800000000000056080000000000008500000007000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'rose0\x00', 0x112}) (async) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) (async) socket$kcm(0x11, 0x200000000000002, 0x300) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x4, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002e000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007b00000095"], &(0x7f0000000140)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000680)="5f3a2f830ad298b15b9dbcfbf6f1", 0x0, 0x440, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) (async, rerun: 32) r6 = socket$kcm(0x10, 0x3, 0x10) (rerun: 32) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="1400000037000b0fd25a806c8c6f94f90d24fc60", 0x14}], 0x1, 0x0, 0x0, 0x20000000}, 0x200000c0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0xfd, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) (async) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x1}, 0x8084) (async) r8 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$kcm(r8, &(0x7f00000004c0)={&(0x7f0000000800)=@in6={0xa, 0xfffe, 0x0, @mcast2, 0x1a}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000500)="80005b020eaa4da2", 0x8}], 0x57, 0x0, 0x0, 0x900}, 0x0) r9 = socket$kcm(0x29, 0x2, 0x0) write$cgroup_pressure(r9, &(0x7f0000000140)={'full'}, 0xfffffdef) sendmsg$inet(r9, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x48840) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xff, 0xff, 0x5, 0xf9, 0x0, 0x1, 0x4062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x5}, 0x8400, 0xfffffffffffffff3, 0x6, 0x7, 0x800000003, 0xfff7ffff, 0x10, 0x0, 0x4, 0x0, 0xdf}, 0x0, 0x6, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x8, 0xf, 0x80, 0x5, 0x0, 0x3b5c, 0x41020, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x1, 0x10001}, 0x102000, 0x8, 0x6, 0x6, 0x7, 0xfffffffc, 0x1, 0x0, 0x2, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r5, 0xa) 2.612971936s ago: executing program 4 (id=2557): bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x8000) recvmsg$unix(r0, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x7, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0x10, 0x400000002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c80)={0x11, 0x2a, &(0x7f0000000a80)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xa}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffff9}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}], &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x69, &(0x7f0000000c00)=""/105, 0x41000, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0xa, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r2]}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x63, 0x2, 0x8, 0x0, 0x0, 0x2, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x4, 0x3, 0xffffffffffffbbfe, 0x0, 0x0, 0x0, 0x6fd}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000d40)='xz\x8b\xfd\x8bn\x13\f\x03\x89\x94\xf5\xbe\xce\xcf5G\xd0\xf3\xe8\x1eM\bY\xb3\x96\xdd\xa8&0\\\xb1\x16g\xa7\xc4\x9b\x1e\x88\x8a\xfdh\x19\xe3\x94\xae\xcc\xe2\x80\xf58/&T\x84bj\xc2\x88 \xa7\xefm\vAa\x9e8\xff\xe4\xf8\xa8h\x1fq\xc7\xb1\xac\x9a\xd3\xab\xe1\x00\x14\x96J\xfc\x92<\xb1\fD\xab\x0f\xa8\xef\x96\x98\xbf\x9e\xf7\xe9\a\xf9\xec\x03\x83\xc2\xe4\\Ak\x9c\xd2E\xfbc\x7f\xabA\xbb+)\x9bo\x04\x10\xd8\xf1\xd9\xf5\xbb5\xa1\xc4\xeb\x8f\xb3\x02Cb\x05\xb8r\xe0J\xfa\x15\xdd)\x12D\xb5\t\x99\x00'/169) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="110000005200338f65277b9b108b4ab51c"], 0xfe33) recvmsg(r3, &(0x7f0000000440)={&(0x7f0000000100)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000300)=""/20, 0x14}, {&(0x7f0000000340)=""/114, 0x72}, {&(0x7f00000003c0)=""/81, 0x51}, {&(0x7f0000000500)=""/118, 0x76}, {&(0x7f0000000580)=""/160, 0xa0}], 0x5}, 0x2023) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000640)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0], 0x0, 0x88, &(0x7f00000007c0)=[{}], 0x8, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0xeb, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r7}, &(0x7f0000000380), &(0x7f00000003c0)=r8}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@map=r2, r2, 0x17, 0x2025}, 0x20) 788.982453ms ago: executing program 2 (id=2558): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000004000000040000000200000000000000", @ANYRES32=0x1], 0x50) ioctl$SIOCSIFHWADDR(r1, 0x8914, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317"], 0xfdef) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x66) 736.351456ms ago: executing program 4 (id=2559): sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000000)="2e00000012008188040f46ecdb4cb9d8a7480ef410000000e3bd6e00000000000b0029000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) (async, rerun: 32) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) socket$kcm(0x29, 0x5, 0x0) (async) r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0xc3cd, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYBLOB='\x00'/12, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000f604db94a10cc1088c5ecac1e4fe00afd063ba0b3b"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0xc, &(0x7f00000003c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x2, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) (async) r7 = perf_event_open$cgroup(&(0x7f00000003c0)={0x3, 0x80, 0x8, 0x96, 0xb, 0x7, 0x0, 0xb2, 0x20, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xd58c, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x1020, 0x8, 0x25f, 0x3, 0x80000001, 0x1, 0x3046, 0x0, 0xff3, 0x0, 0x7}, 0xffffffffffffffff, 0x5, r2, 0x5) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0x9) (async) sendmsg$inet(r6, &(0x7f0000000680)={&(0x7f0000000040)={0x2, 0x4e21, @rand_addr=0x64010102}, 0x10, 0x0, 0x0, &(0x7f0000000800)=[@ip_retopts={{0x14, 0x0, 0x7, {[@timestamp={0x44, 0x4, 0x3, 0x0, 0x5}]}}}], 0x18}, 0x40) (async) r8 = socket$kcm(0x10, 0x2, 0x4) close(r8) socket$kcm(0x10, 0x2, 0x0) (async) sendmsg$inet(r8, &(0x7f0000000040)={0x0, 0xffffffffffffffa6, &(0x7f00000001c0)=[{&(0x7f0000000100)="1c00000021006bcd210000006e04000081000000000000007aa60864", 0x1c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) (async, rerun: 32) socket$kcm(0xa, 0x2, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000002540)=ANY=[@ANYBLOB="611534000000000061134c0000000000bfa000000000000007000000080000002d0301000000000095000000000000006916000000000000bf67000000000000350607000fff07206706000003000000160300000ee60060bf050000000000000f650000000000006507f9ff01000000070700004ddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f674629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5480a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff139604faf0453bedf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a57ff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000005574d074fa7e93447a88c0fbab48660aae7cdf367ef0e4538279b6113de5b94e1056f443305145c9"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) (async, rerun: 64) socket$kcm(0x10, 0x3, 0x10) (async, rerun: 64) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x8, 0x0, r5, 0x6, '\x00', 0x0, r9, 0x5, 0x3, 0x4}, 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)=@o_path={&(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x4000, r10}, 0x18) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x15, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfc}, [@ringbuf_output={{}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x33}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x86}}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) 699.091269ms ago: executing program 0 (id=2560): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x16, 0x0, 0x4, 0xffff, 0x0, 0x1}, 0x50) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xd, 0x5a87, 0x4, 0x3, 0x0, r0}, 0x48) bpf$MAP_UPDATE_BATCH(0x1b, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x2, r3}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0100180000000000000028ffff0028000000030000000100000000000098767e98ad0dcc640e08e613b98d15319dd9f6de65bdb00c020000000000090000000000"], 0x0, 0x43}, 0x28) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x42008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x17}, 0x0, 0xc8, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) socketpair(0x1a, 0x800, 0x7, &(0x7f0000000400)) r7 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x0, 0xe2}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x6, 0x5, &(0x7f0000000040)=@framed={{0x56, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0xc}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0, 0x2}, 0x104141, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102032908000000000000000000000000ac14140a000000000000000000000000ac1414aa"], 0xfdef) 613.180214ms ago: executing program 4 (id=2561): socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[{0x10000002, 0x0, 0x0, 0xc}]}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x2}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x4, 0x2, 0x0, 0xfffffffd, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000700000000000400ffffffff9500000000000000e858451488f3dfc9908b867f78a7fc9c0018ab2fe8de7b1fa369da80048d9e9df1abb50b"], 0x0, 0x9, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(0xffffffffffffffff) close(0xffffffffffffffff) r2 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f00000008c0), 0x43) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = socket$kcm(0x2, 0x0, 0x0) r5 = bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0)={0x0, r3}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000280)=""/165, 0x0, 0xa5, 0x0, 0xffffff8f, 0x10000, @value=r5}, 0x28) socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x7, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000000000009500000000000000000000000400"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0xfffffffffffff159) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=0x0], 0x50) r8 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$kcm(r8, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000780)}], 0x1, 0x0, 0x0, 0x900}, 0x0) sendmsg$kcm(r4, &(0x7f0000000340)={&(0x7f0000000000)=@l2={0x1f, 0x4009, @any, 0x1}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x88}, 0x1) 458.555493ms ago: executing program 2 (id=2562): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000000}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r3}, 0x0, &(0x7f0000000040)}, 0x20) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000300)=r5) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 84.358165ms ago: executing program 4 (id=2563): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) 0s ago: executing program 4 (id=2564): sendmsg$kcm(0xffffffffffffffff, 0x0, 0x95) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x2}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000540)="d8000000180081034e81f783db4cb9040a1d020006007c09e8fc55a10a0015000400142603600efd0700060000000441a8000800a4001040040000000c5c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace2bb981e64c2ee5a7f659cef4090000001fb71b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd4e1ffffffffc1c9b6278754ca397c388b0dd6e4edef3d9300"/216, 0xd8}], 0x1}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) sendmsg(0xffffffffffffffff, 0x0, 0x40000) r1 = socket$kcm(0x11, 0x200000000000007, 0x300) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x115905, 0x4, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x1, 0xffffffffffffffff, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) ioctl$SIOCSIFHWADDR(r3, 0x541b, &(0x7f0000000180)={'veth0_virt_wifi\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x41}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="fbe6bd8dfcdda5a210b8cfefbd66f459c7261b927d25d3cf74d2f7c97735eba47f606a290d184925922333211d168ab0f6e1081fdbd921ed4db0e67c9d5ab1452445a1e0da5ac68b13f4afe2712eeaad35ef06", 0x53}], 0x1, 0x0, 0x3298}, 0x0) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0x12, &(0x7f00000008c0)=r6, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r6, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xcf, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000700), &(0x7f00000001c0), 0x8, 0x7f, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r7, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001f80)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2e6405000000000065060400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7956244cef7baf48e6d2885a09a87507ebfc75b5b0f4e4309ebcdac5f7a860c008cbdd3b4c3b7f28754860c9c781f6410457253e89ad528d985636a86ec0f68f59cd1159a2c2e85d726859a919cc9548a349980d1ccdce27f94bc074c27f81078545c146a0857153b7b8f00034debae58a4ab415b0d7ff0575cc272cd3d7e8d974927676468ff2d86e0ffac94792ed9cf6b40b3cf252a47c05ae8a70d57cc3e067d1867b54d24e20000000000000020009ebf84d3b042d6e432cd080e3b57239f0127473e6ba922aff649609d40b47ec331ccba3cf96f9483ff19a6471bf5abc742d9cbcfb964b11b31034694a6aad86cf08a6c7b2235dc99de9aa3e6b77c7a2877261ed32da90864987f30926c9013eec3b86836ae50447aa5a79f40c235000000453302712c3d8fc4e2b61adb0695e800000000d4f4e91f0000002c33df424d1bafe5725c8a404724f8a4f1cda7997b65954f74097560b91da309b887af2485c2d9ab09b523000000000000000bf7b2ff4602aec1eea200000064881c5630521a08e051374cf05c921a06fb7818000000009dc8d95e0e5b365d10e1004dae58b3b5b89709b0ff47b200000000004000cbef88811dc8c1b27ac7d9a6bb70f60eb9c01dd2fc79b85e4d961498f3a80131d21d856177a2189f45d011ef1da5c6d57bb8fd387ccea9c3899a914e47e82f040000009d81003f927355408f87264797d3fa970949793b94329d580500d1f91c0d22587e05a61e3d8576ca168e88d7a9af95b04a37c27bfffab9abbb31fa8c0080258cfa6d3f166e695f3c56490aeef464d9965d70a50f1282619344f223548e750339643adac1322c87ca253ff2fb1882760d6feab16bacdf83c11816dbe959ebc5ec479c8319f73e2249eab0486b110702a481d3b51976a52303056e800b4ae5acc2dfae60ab958e9f3ef9b4aaa4e8d6166f636a65eb1d672bf2000000cda8462cc9b16624998be65683321e970000000009b8e20762c1bf4a3eb6769f2b23e842bacd9c685edea0ffa3e975424f8ede49e61a4de808a38ba3512d64dc71867df4eee3f1ff791cf7c9862f98b45852e4b2f78721b978a2df2f2a29a387c6f0576b36038f819286eca99a6a434811cf2a117d775fe986a49fb82cf5f15972d5ab18f1045384501adabb20f7b0e15ff47f1744e2341b59034959a1289ba6e243668e6735305707e3de7652bfc5b60c76deff43a1d6fd6a4180ab723735abbeffe7f2ec3a0bb86f9eddfc0f3d1d503d7a54b49e1ae6c5aa620d27e91aa0aa0ed6fcacfc91fbb4c256409e54daefbb107c381fa729ff5f3907d93430da178d685d7730f5e129438a5214f722096d2986334c2576bef69145d3fbd78a9059e454474f92e65828b018174a9f4738b8c71fbdeac26ab95e02f9a847182766964976b1fccdb9f35721e43e33883cf16ed1343fb7429eb395123b0a4262b7023c22039b9002589a378ed4c6267965af78b861bd025312538cec97966b8973d4e299d9802264d06e40ae118e1d242d1128dcedeb44030df12ef68f78215d65f96eb55db8cbcb060008000d988374f85451a694ffe38a1d03916ff10dc82b31c98d42e1a1bda1290de1a499a5a385b31112a48ba3e6d6849914c1788a7aca37177cc341fff44fec5c5e0abae01c439a1b0311e074e81ae9993b5b3459553e4ece78d4c1501c70f5d81e0725d5b273755c0000000000000000aa4234ff82182952a76233d18e7d49638aeb04e7a9e9e7eafb7c255372795d2d192a0a33cab0f5bf2e93e0544fcdf2df2bc6ce96e5a11993d54f97a23754ac828674dbb93c0ad345715be4a13678b01edf76d8a923655800a2c88cce004505ab45d8f5f88aa887bbce5c18970428516f6099bdbb2cd7a2356397f1a0a23e662e2a6c4834400cbaa41c3c574e6e6aefb7a68da5ec1ae49f968bbe0e0bf9878516f553639f5b4828e92019b61f5874be1c7cdd9482df50bc24b8a1fa10d291390eb84e26a2e8dbeaa45604b05a116c1210a7540bf81005044273f5a8ffc538db289350eb248e483bd8920efcf30a798c2b636243e0a37262ca47dfeefa753ba528f7ba77e825051ce69b4475d7d714ba0c636e6ae9f710411d30ef424aeaabe057c7df6ff8f767bcd9012e1047c686f5ccb76ab3a5df53cbc22ba7ea8f6a8e220bb4d83de1e4dc19d6c1be841503850803bc2c2d5e0e34270a7f1cca0c6c53a8e5f891f7a793a70da62d6d88fbb90d220acc687931b42d6be83ab870da3c0a567f5e65ec0457f4ad2a4ec0b671b36388afd5520a8483a4b11f7d02a409315f0f9e59f47668d68a74838d6976e12fd45200014041dffacbf60892ec8bd7560686f137a806d3dfaba900b47cac62f828342fff009adb5b2251461a1b9d6ba625b8fe04e69a1a4be2696f0000000086e172932e03000000000000005942e1b9d6dc28ab8e19e1111dd893e801015642faf21eef40d6e7de3ef62c4bc5ff17e7aeb2841098f845d1cc9ec4eee79c298fb0ba939b13707044e2e9cc0d350438c1c8c6bb9a38c6ac5ca0d9cf1f3d6915f25cb26edfc28b3079b97df32601240e454db103fb0c4a143673a3f160d3a7b83ecd0509ce9eba0c7bf7843799b1b56a234f9eaab8a3f14f1472bb6aaeb8ac9ee4054605558ab31f339f6a4caf2ee2fd01f34dca3300000000000000000000000000000000f59f8e6e00000000c44130098d833a24000000000095e6f945ba9a941cef5e70b8c152321e24b5b29bcf374dcf5a29a35d76e6e2bf8df95462690a4fc9ec8129e92b6ebb4b40a992a75d3c595426ae40d0bfc87db24d856359079b29b3c374d081c300b2cfaa596d24e800ef8e2201f2fb7a9946f89f9f31f7cbd603fd7f8898c70b5c65f2e28f22e1a79a6af3a54861b07f124642e98389557affbdede09b5566a4a1ee73b20846810030a754acddcdafe3ceeeebc0b5f2fedfe7d198e3067f3dbac9441a9ab8409cbbb7e15b9ae3944097de34de2001c8533a3766e6e4c4c4702ccb932a27a3962814cd6aa8fc684beeaa3932efae3a9052be8eec1e95f6ad8d41dd34829503ba4b66e27154cb6e34aa13450522df1723130b6fe347c93f00e40e293c98d849a33f773c743728992f40faccd5c23130a1c6bfd6fc661bca1598137ddd1090ded672f5a48a40cab3f640c8241a364cbdd3f188eec7da7bccafbd5bf28a46f0eecc6b550471b0b0770c6a5a411c0e0b19e15a461e7c6833ba936e214b013f2819ec6572a43b5cd32b11d7e4f8dcf8f7820a17b7b2ee6178a03351dd25091e46bfd82a3979b9cad109fd6217cd52aa81bdabd50826a674bd16b8f7e6aed12a305366599f5f029a7b24558c027518c669760500002f1c19d16a6f391906000000cc0bbbfb8c698ecc137d96711100e0108d3bd2afed0b279ebf0527552a9331e646c424b14ffbb815622bfd2f635855bed1b164d0a56bd104be069854111c5b26ec3c652b5f0a6b9676dae987ec23456ba05a4dfb15321ef6b76e7e547a688c67ab531cfc784c9f940d9fb0464a6cce635e14b80dc5c1c64e75e6bd5355d84f8df272f18f58c570e7afd83ee77f157c146aa747b728969aeb4aba1d8f9de1b3fb8ab6ea50e884c2ea98e6400bf0c5ae2887cd1da0e57ccfdf5eca2b455247efcc13102846c0a85f20c80007c0ce6efce627b95b8ad3003385de97101678fb2163ecea6e70a77a6fbc089e31a5ccece932229b8f79faa6863d6857c3d9a9710f9f8ad16eeb8342278f311cbc226498028234d21466892983378fe64acbb44f694cd78e43c74aa75505cb1c91b189f8f89f233a05f5cd4e173a373178557843dd705268f74a9e5429945503195aefd6706b584d8408c9652b3fe68500747f7ee8375fa559c3ad195d3795df1a8364cd13acc3256ee4634c73eeb6954d0fcf09ab84df0b8900e0c6fea2ccb600ae7a4b128cae19df160e7c207b89132d1d5bdc9ffc79f0549b82df521817651d5fead5128205b92ccdccc69407ab556217af277af911dbd456dfc43dd061b6c91485dcc208cf0b3d0bf851de413f5de5ec015e296914afab6411109355e027ce04990d9aae251b9deb11b7db45b9f15b7b55d8fdbedd9e6cf891205694f02be8b9ea8ecd41308a0e1b93ae3435bfa88b440b1f701b4d0fc49c82193f27f8023b630ea97edbf3bf421a0a1a2b4ac7bb30bcd1cdd172c0df37408fd6827bb03e8742fc1c7a2befd1299928c5f79e846a8dc7ca648d960a759e6711b69776896a9656d59af6d44bc5348229fa84ae78af8421a22c4b4c17a3d24a4a0104000000000000d77cc4eef51c2b417c8c7458ddd7dd9d1a863bf0a9e1a30a19020490038017a5c7e474c83302a2c2b5c976dacf3dda7191c757f208000000000000005f7ed983f65723fbb36b9b51abb0dbcd335700000000000000000000000000000086666201251aa4f139d0485ffcf89f01639fd1579a3802f720a0215c720a97071f5065a23642a58275dbca444b00e2e5835185d5d5b2796eb0fe32cf3b0633f58ecc7648c3c6efe82f93a3008052416512eea30ea9472e0b456a652883c0907323cf03be193a05008cdef7a98a1671a1918df310dc4bfd61c3db4819ab1c57b348a8ff1ed36364a20fe846f1cd086058d139ce528425b31c5d08b433562ffb318c1285011f9b78b2401989384311101e452f54661ecdb2514a6ae50dbdd422de0f0f8c670000000000390be79688f80c47314cb1b14afcaa5d23f9032e0ec51f45f447d6a7c798fcf7e60e2180e289410801e4f03a0e140f388f25b92da1025d8409e171a2336ed71cca86eb4658fe06df286e0e20276b0618eeffd05774f15686cd9d3182ca2fec863875f305fed6baf48a594db12582a38cfdffffffffffffff0cf8d920517835fe7d09cfcb624f6931f1cc6f6b71f58de9ddc38e0c43992f6bc57a718d0cfd197b5324b4e05ef1caa96db3ae1f2f2e5791faba2ebbe1a6faf21f2748fb1fb6743c3ca8af4e6b02518c9b7fdc1b5721eb1c3ed98db25536f74ac7861afc94544e52dcb5c60460a05802e3b437ac977bfa26b887a2443e8d559c58187f004eb82b07937df6e96f77ed551926bec4e0188fae10a35d1c5f1768ac6be829bea46f1babc3d74adc31ca71bdab9079e4288881b434484eadde9da6b81802842abd462d546c59d87acc014f81d3414759bda12d2a2c6bc1bfa807bd3101eb227184a61107b6d0618e2a3b842671e084ac3f0ff94dc48b51601247318ab4d1c5106458000000000008000000000000cfee0107e6c2fe8639d926829fdbbd86bf591a8c3c235d8939af9d923f648165881a6c29997234406400b3b1c321cc158dbe17123eace30000000000009ea77cb4d3ca892600000000796de6ae4ae40bdf9a6e8c5dc29562262af9cd54e8e3ecc7e3c8cba0ecc791683496c4e5c1a5729714d9f9031f49b400cd2667b4ea6df54809615a4f973f93e6ccec72f16ff998e29ed99df733680a9d5cea57f99cc139b6ea9014f3000000000000000000000000000000000000feeab45a4046a622b0dceb413e4e39b7317e92cbed46b41ab5115bfb542c933783d750852dfdc6656aaf15e10615a88821f2f1bc53969b52d6852755e7681ad5beda80b38ccd34116b99f50b4fdd967b3f20f260455412b67563e40e323bde9d673fceda0ad6981565c8a183d928903b4f4472dde41b6dcd75314c31e704dfcb222c8359fe88944f852242270c932abfaeece0843d708f5cd25b2a63ae1e79723c1c3c013836b47da0a35d0f34c070000000000000422ae2c148d444dd437a7d2f5e575009bc2d17a199802409329dae8baa58d3de63ad45328a9d4dc1ace543dfe11913c6c6413f8f7a15657d012fea460bb4656a20df1ba26932b0ef49f8ea88d7b4c1289314ba789661640f1b5d7cbae103fa95b0035f1e8e866307d4796eab0992704f9e00be4b1af8dfa9e94ad74e607ea9d7d7a95ed5a15429426abbed8d2c657018305c6f9e5159a5453f958991a908ff4cb2e8cbccb1d3c8daf754e4b01b2edd023e5bfdf293bd28fc1f8885f6edd5a715df4d180247feb08e9e2e5126c48be6098e711f0d86de5d76fdccae34eef9197c32ab4e6fcb52eb9ce18fdb621a75913a97254d783778203ec0bd1a8859683e1d01da4e81fb73bb3b358340a0310bf5ae17b917208da607fd7b125cf99fd3e9056f5184df7570ede94b736ae354b5b8ae2cc473b455f2f86d47c69027676bf1141f316b0f278f1692406572ee82766f8e5ff1cfec2a7a6cab7d0f2582a877c9bd4ca81089373f738d02e6bb4d3df30ac0f041e51ad36e1ff140812baf54b80635cc80963c8f69fa4506f7a30c99d3e538cc0aeafcad86ead38ed949aa3c204aea50e5e0039f01b82595b7dc921a8acc1f76340f060cc9a3acad3451c17dc9b5ca5d10a0cb1708592d1900a046f33761d50895febd9fd58cb132989766cf7c252daac259576ec218e3857e6fa97fe445d1fab51d87302a4bb28a4cfe462ee4849cc6832650188ca187d85509d8beccf9d9cf752368985804195b9fd2faf1aff8248f3981bd55cbbf514cd8365fee72cc7af053e5388ceadadb967ef735181df6a90cab13f58f6d563c9ab4ad37297aecffd8446cb2b14ec36a99af8393e3760d5970ba1debdcbccd54012c559ee2797ff962328aa6a252c0756e396ce4d52937546675203bdf1d6b120acac576523f8b1daa922188bf61536312f90dba92fb380c3c6fb5f9883a2c4dd99a1bac9b7cb25ff2ef9bd58ff97ddfdd2d4bcc371ee82245b57cd91a7fa3479cd339f54a5c422b753cd42d441ea881d46e419312db1f0cccced13468a188df7ab4840b9961e2a8b5202c9d9b00ee912572eea15d13abdf3b21ad680c88a513021c1d3a7b30d64960c03a01364b2324966bd89d917b15dcb4f8cbacfe05ddcc213d14189edcd9f8b828ebaaab4f56470d3abef47b6d88dc438c9b0a253c26c386464754e76c0d7bfbc1dfa7248982ec26bd725eb623bb12f96e63eb5d1a0030e58a6653247c986c7ca9f15fd84d5eb1cd5ee35c4f464dc1a789b06c6c7074fc927680eac8546b2aee2f8867d6bf36b88a99ff67c7b2dd68ae3380622653efcad276a0f4b446091b80653014e67629dfde0091c7f090a22b5c427d03ddbc"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r8, 0x20e, 0xe40, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) kernel console output (not intermixed with test programs): switch: netlink: ufid size 3064 bytes exceeds the range (1, 16) [ 626.082210][T12202] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 626.092274][T12203] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 627.316769][T12188] syzkaller0: entered promiscuous mode [ 627.322257][T12188] syzkaller0: entered allmulticast mode [ 628.980618][T12218] syzkaller0: entered promiscuous mode [ 628.999636][T12218] syzkaller0: entered allmulticast mode [ 629.417484][ T5084] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 629.449269][ T5084] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 629.457293][ T5084] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 629.472251][ T5084] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 629.492387][ T5084] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 629.501902][ T5084] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 630.867990][T12234] netlink: 'syz.0.1754': attribute type 10 has an invalid length. [ 630.876090][T12234] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1754'. [ 630.885682][T12234] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 631.153044][T12250] netlink: 'syz.2.1759': attribute type 10 has an invalid length. [ 631.578844][ T5777] Bluetooth: hci4: command tx timeout [ 631.613933][T12256] syzkaller0: entered promiscuous mode [ 631.626160][T12256] syzkaller0: entered allmulticast mode [ 633.500998][T12276] syzkaller0: entered promiscuous mode [ 633.513768][T12276] syzkaller0: entered allmulticast mode [ 633.656534][ T5777] Bluetooth: hci4: command tx timeout [ 635.638551][T12292] syzkaller0: entered promiscuous mode [ 635.650264][T12292] syzkaller0: entered allmulticast mode [ 635.733951][ T5777] Bluetooth: hci4: command tx timeout [ 637.379270][T12318] syzkaller0: entered promiscuous mode [ 637.385757][T12318] syzkaller0: entered allmulticast mode [ 637.816310][ T5777] Bluetooth: hci4: command tx timeout [ 639.293829][T12325] syzkaller0: entered promiscuous mode [ 639.299339][T12325] syzkaller0: entered allmulticast mode [ 640.797867][T12345] netlink: 'syz.2.1776': attribute type 1 has an invalid length. [ 640.805809][T12345] netlink: 'syz.2.1776': attribute type 4 has an invalid length. [ 640.813693][T12345] netlink: 9462 bytes leftover after parsing attributes in process `syz.2.1776'. [ 640.823017][T12237] chnl_net:caif_netlink_parms(): no params data found [ 640.986089][T12355] syzkaller0: entered promiscuous mode [ 640.991684][T12355] syzkaller0: entered allmulticast mode [ 642.618574][T12366] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1780'. [ 642.680777][T12237] bridge0: port 1(bridge_slave_0) entered blocking state [ 642.693824][T12237] bridge0: port 1(bridge_slave_0) entered disabled state [ 642.701067][T12237] bridge_slave_0: entered allmulticast mode [ 642.737649][T12237] bridge_slave_0: entered promiscuous mode [ 642.784954][T12237] bridge0: port 2(bridge_slave_1) entered blocking state [ 642.792097][T12237] bridge0: port 2(bridge_slave_1) entered disabled state [ 642.830783][T12237] bridge_slave_1: entered allmulticast mode [ 642.850934][T12237] bridge_slave_1: entered promiscuous mode [ 642.879233][T12382] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1782'. [ 643.042254][T12381] syzkaller0: entered promiscuous mode [ 643.063694][T12381] syzkaller0: entered allmulticast mode [ 643.070599][T12384] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1782'. [ 643.141859][T12237] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 643.181887][T12237] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 644.657747][T12395] delete_channel: no stack [ 645.032099][T12389] syzkaller0: entered promiscuous mode [ 645.038042][T12389] syzkaller0: entered allmulticast mode [ 646.485650][T12237] team0: Port device team_slave_0 added [ 646.554923][T12237] team0: Port device team_slave_1 added [ 646.629379][ T9872] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 646.741618][T12237] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 646.755250][T12237] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 646.800746][T12237] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 646.839376][T12409] syzkaller0: entered promiscuous mode [ 646.844890][T12409] syzkaller0: entered allmulticast mode [ 646.865864][ T9872] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 646.907774][T12410] syzkaller0: entered promiscuous mode [ 646.913266][T12410] syzkaller0: entered allmulticast mode [ 646.921309][T12237] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 646.928373][T12237] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 646.954506][T12237] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 647.021440][ T9872] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 648.412093][T12237] hsr_slave_0: entered promiscuous mode [ 648.418786][T12237] hsr_slave_1: entered promiscuous mode [ 648.425367][T12237] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 648.432961][T12237] Cannot create hsr debugfs directory [ 652.778572][ T9872] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 652.793206][T12421] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1790'. [ 653.118280][T12437] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1794'. [ 653.404924][T12443] syzkaller0: entered promiscuous mode [ 653.410486][T12443] syzkaller0: entered allmulticast mode [ 655.579676][T12237] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 655.601435][T12237] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 655.648274][T12463] syzkaller0: entered promiscuous mode [ 655.654339][T12463] syzkaller0: entered allmulticast mode [ 657.652076][T12237] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 657.663339][T12237] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 657.672864][T12483] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1802'. [ 661.135831][T12513] syzkaller0: entered promiscuous mode [ 661.141357][T12513] syzkaller0: entered allmulticast mode [ 662.856543][T12550] netlink: 830 bytes leftover after parsing attributes in process `syz.0.1813'. [ 664.541527][T12557] syzkaller0: entered promiscuous mode [ 664.549672][T12557] syzkaller0: entered allmulticast mode [ 664.877165][T12588] netlink: 'syz.0.1819': attribute type 28 has an invalid length. [ 664.890534][T12589] netlink: 'syz.0.1819': attribute type 28 has an invalid length. [ 664.898560][T12588] netlink: 'syz.0.1819': attribute type 3 has an invalid length. [ 664.914653][T12589] netlink: 'syz.0.1819': attribute type 3 has an invalid length. [ 664.922522][T12588] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1819'. [ 664.936699][T12589] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1819'. [ 666.578491][T12237] 8021q: adding VLAN 0 to HW filter on device bond0 [ 666.718573][T12237] 8021q: adding VLAN 0 to HW filter on device team0 [ 666.877644][T12609] syzkaller0: entered promiscuous mode [ 666.883248][T12609] syzkaller0: entered allmulticast mode [ 666.899799][ T9884] bridge0: port 1(bridge_slave_0) entered blocking state [ 666.907617][ T9884] bridge0: port 1(bridge_slave_0) entered forwarding state [ 670.192458][ T9874] bridge0: port 2(bridge_slave_1) entered blocking state [ 670.199582][ T9874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 670.538981][T12655] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1828'. [ 670.683866][ T9872] veth0_to_team: left allmulticast mode [ 670.689795][ T9872] veth0_to_team: left promiscuous mode [ 670.710811][ T9872] Ÿë: port 1(veth0_to_team) entered disabled state [ 670.862188][ T9872] hsr_slave_0: left promiscuous mode [ 670.869971][ T9872] hsr_slave_1: left promiscuous mode [ 670.921140][ T9872] veth1_macvtap: left promiscuous mode [ 670.954341][ T9872] veth0_macvtap: left promiscuous mode [ 670.960112][ T9872] veth1_vlan: left promiscuous mode [ 670.989190][ T9872] veth0_vlan: left promiscuous mode [ 671.763917][ T9872] team0 (unregistering): Port device team_slave_1 removed [ 671.836377][ T9872] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 671.879485][ T9872] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 672.134884][ T9872] bond0 (unregistering): Released all slaves [ 672.218053][T12668] syzkaller0: entered promiscuous mode [ 672.225672][T12668] syzkaller0: entered allmulticast mode [ 674.030263][T12693] syzkaller0: entered promiscuous mode [ 674.036080][T12693] syzkaller0: entered allmulticast mode [ 675.630191][T12237] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 675.913460][T12726] netlink: 'syz.2.1837': attribute type 2 has an invalid length. [ 675.922691][T12726] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.1837'. [ 678.007291][T12237] veth0_vlan: entered promiscuous mode [ 678.060410][T12237] veth1_vlan: entered promiscuous mode [ 678.157671][T12761] syzkaller0: entered promiscuous mode [ 678.163188][T12761] syzkaller0: entered allmulticast mode [ 678.228037][T12237] veth0_macvtap: entered promiscuous mode [ 678.245908][T12765] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1842'. [ 678.272740][T12765] netlink: 196 bytes leftover after parsing attributes in process `syz.3.1842'. [ 680.063097][T12237] veth1_macvtap: entered promiscuous mode [ 680.150371][T12237] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 680.188264][T12237] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.214110][T12237] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 680.229900][T12237] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.244030][T12237] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 680.254822][T12237] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.275021][T12237] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 680.291198][T12237] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 680.309983][T12237] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.321262][T12237] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 680.341006][T12237] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.369721][T12237] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 680.383797][T12237] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.397987][T12237] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 680.431877][T12237] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 680.442466][T12237] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 680.452128][T12237] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 680.461954][T12237] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 680.839755][ T9884] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 680.877974][ T9884] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 682.851600][ T9885] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 682.875769][ T9885] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 683.158116][T12840] netlink: 'syz.3.1855': attribute type 2 has an invalid length. [ 683.183938][T12840] netlink: 17267 bytes leftover after parsing attributes in process `syz.3.1855'. [ 683.298810][T12844] syzkaller0: entered promiscuous mode [ 683.304517][T12844] syzkaller0: entered allmulticast mode [ 685.991246][ T1279] ieee802154 phy0 wpan0: encryption failed: -22 [ 685.997686][ T1279] ieee802154 phy1 wpan1: encryption failed: -22 [ 687.120973][T12894] FAULT_INJECTION: forcing a failure. [ 687.120973][T12894] name failslab, interval 1, probability 0, space 0, times 0 [ 687.130578][T12892] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1865'. [ 687.160191][T12894] CPU: 1 PID: 12894 Comm: syz.2.1866 Not tainted syzkaller #0 [ 687.167715][T12894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 687.177805][T12894] Call Trace: [ 687.181115][T12894] [ 687.183798][T12897] netlink: 196 bytes leftover after parsing attributes in process `syz.0.1865'. [ 687.184053][T12894] dump_stack_lvl+0x18c/0x250 [ 687.197808][T12894] ? show_regs_print_info+0x20/0x20 [ 687.203046][T12894] ? load_image+0x400/0x400 [ 687.207591][T12894] ? __might_sleep+0xe0/0xe0 [ 687.212216][T12894] ? __lock_acquire+0x7d40/0x7d40 [ 687.217277][T12894] ? tracing_gen_ctx_irq_test+0xbc/0x140 [ 687.222961][T12894] should_fail_ex+0x39d/0x4d0 [ 687.227690][T12894] should_failslab+0x9/0x20 [ 687.232234][T12894] slab_pre_alloc_hook+0x59/0x310 [ 687.237307][T12894] kmem_cache_alloc_node+0x60/0x320 [ 687.242530][T12894] ? perf_tp_event+0x132d/0x1450 [ 687.247488][T12894] ? __alloc_skb+0x103/0x2c0 [ 687.252119][T12894] __alloc_skb+0x103/0x2c0 [ 687.256580][T12894] alloc_skb_with_frags+0xca/0x7b0 [ 687.261725][T12894] sock_alloc_send_pskb+0x883/0x9a0 [ 687.266997][T12894] ? sock_kzfree_s+0x50/0x50 [ 687.271654][T12894] tun_get_user+0x82c/0x3ca0 [ 687.276280][T12894] ? aa_file_perm+0x11b/0xee0 [ 687.281003][T12894] ? rcu_read_unlock+0xa0/0xa0 [ 687.285812][T12894] ? tun_get+0x1c/0x2e0 [ 687.289987][T12894] ? __lock_acquire+0x7d40/0x7d40 [ 687.295040][T12894] ? tun_get+0x1c/0x2e0 [ 687.299215][T12894] tun_chr_write_iter+0x119/0x200 [ 687.304251][T12894] vfs_write+0x46c/0x990 [ 687.308537][T12894] ? file_end_write+0x250/0x250 [ 687.313428][T12894] ? __fget_files+0x43d/0x4b0 [ 687.318138][T12894] ? __fdget_pos+0x1d8/0x330 [ 687.322749][T12894] ? ksys_write+0x75/0x260 [ 687.327177][T12894] ksys_write+0x150/0x260 [ 687.331519][T12894] ? __ia32_sys_read+0x90/0x90 [ 687.336335][T12894] ? lockdep_hardirqs_on+0x98/0x150 [ 687.341572][T12894] do_syscall_64+0x55/0xa0 [ 687.346010][T12894] ? clear_bhb_loop+0x40/0x90 [ 687.350693][T12894] ? clear_bhb_loop+0x40/0x90 [ 687.355373][T12894] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 687.361270][T12894] RIP: 0033:0x7ff1efb9aeb9 [ 687.365696][T12894] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 687.385312][T12894] RSP: 002b:00007ff1f0ab7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 687.393733][T12894] RAX: ffffffffffffffda RBX: 00007ff1efe15fa0 RCX: 00007ff1efb9aeb9 [ 687.401703][T12894] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 687.409675][T12894] RBP: 00007ff1f0ab7090 R08: 0000000000000000 R09: 0000000000000000 [ 687.417648][T12894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 687.425620][T12894] R13: 00007ff1efe16038 R14: 00007ff1efe15fa0 R15: 00007ffdc5115e98 [ 687.433616][T12894] [ 687.578838][T12892] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 687.673415][T12892] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 687.712387][T12892] bond0 (unregistering): Released all slaves [ 687.804986][T12908] netlink: 'syz.3.1870': attribute type 12 has an invalid length. [ 687.833258][T12908] netlink: 14585 bytes leftover after parsing attributes in process `syz.3.1870'. [ 687.880196][T12913] netlink: 'syz.3.1870': attribute type 10 has an invalid length. [ 688.260129][T12929] syzkaller0: entered promiscuous mode [ 688.272306][T12929] syzkaller0: entered allmulticast mode [ 690.013825][T12934] netlink: 'syz.0.1877': attribute type 10 has an invalid length. [ 690.058632][T12934] veth0_vlan: left promiscuous mode [ 690.091918][T12934] veth0_vlan: entered promiscuous mode [ 690.126480][T12934] team0: Device veth0_vlan failed to register rx_handler [ 690.398084][T12958] netlink: 'syz.4.1882': attribute type 12 has an invalid length. [ 690.421308][T12958] netlink: 14585 bytes leftover after parsing attributes in process `syz.4.1882'. [ 690.488009][T12961] netlink: 'syz.4.1882': attribute type 10 has an invalid length. [ 690.500071][T12961] bridge0: port 2(bridge_slave_1) entered disabled state [ 690.507891][T12961] bridge0: port 1(bridge_slave_0) entered disabled state [ 690.541627][T12961] bridge0: port 2(bridge_slave_1) entered blocking state [ 690.548898][T12961] bridge0: port 2(bridge_slave_1) entered forwarding state [ 690.556498][T12961] bridge0: port 1(bridge_slave_0) entered blocking state [ 690.563724][T12961] bridge0: port 1(bridge_slave_0) entered forwarding state [ 690.578767][T12961] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 692.610339][T12972] netlink: 16186 bytes leftover after parsing attributes in process `syz.0.1887'. [ 692.975601][T12982] syzkaller0: entered promiscuous mode [ 692.981194][T12982] syzkaller0: entered allmulticast mode [ 694.861648][T13001] netlink: 'syz.2.1891': attribute type 4 has an invalid length. [ 694.869535][T13001] netlink: 152 bytes leftover after parsing attributes in process `syz.2.1891'. [ 694.885681][T13001] A link change request failed with some changes committed already. Interface hsr_slave_1 may have been left with an inconsistent configuration, please check. [ 695.295492][T13042] netlink: 'syz.0.1899': attribute type 12 has an invalid length. [ 695.309264][T13042] netlink: 14585 bytes leftover after parsing attributes in process `syz.0.1899'. [ 695.331280][T13047] netlink: 'syz.0.1899': attribute type 10 has an invalid length. [ 697.071348][T13060] netlink: 16186 bytes leftover after parsing attributes in process `syz.0.1903'. [ 697.217146][T13057] syzkaller0: entered promiscuous mode [ 697.222787][T13057] syzkaller0: entered allmulticast mode [ 697.413402][T13068] syzkaller0: entered promiscuous mode [ 697.422762][T13068] syzkaller0: entered allmulticast mode [ 699.177813][T13090] netlink: 'syz.4.1911': attribute type 3 has an invalid length. [ 699.193665][T13090] netlink: 201336 bytes leftover after parsing attributes in process `syz.4.1911'. [ 699.727876][T13099] delete_channel: no stack [ 703.826624][T13129] netlink: 152 bytes leftover after parsing attributes in process `syz.3.1919'. [ 703.952579][T13152] netlink: 'syz.3.1922': attribute type 1 has an invalid length. [ 704.619042][T13165] syzkaller0: entered promiscuous mode [ 704.624816][T13165] syzkaller0: entered allmulticast mode [ 705.679990][T13223] netlink: 'syz.2.1934': attribute type 3 has an invalid length. [ 705.688508][T13223] netlink: 'syz.2.1934': attribute type 1 has an invalid length. [ 705.696761][T13223] netlink: 197476 bytes leftover after parsing attributes in process `syz.2.1934'. [ 707.520252][T13204] syzkaller0: entered promiscuous mode [ 707.525767][T13204] syzkaller0: entered allmulticast mode [ 709.015966][T13210] syzkaller0: entered promiscuous mode [ 709.021451][T13210] syzkaller0: entered allmulticast mode [ 710.632370][T13234] sit0: entered allmulticast mode [ 710.671002][T13235] sit0: entered promiscuous mode [ 710.781853][T13239] netlink: 'syz.3.1939': attribute type 2 has an invalid length. [ 710.800271][T13239] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1939'. [ 712.028371][T13285] syzkaller0: entered promiscuous mode [ 712.036146][T13285] syzkaller0: entered allmulticast mode [ 712.104052][T13286] syzkaller0: entered promiscuous mode [ 712.111834][T13286] syzkaller0: entered allmulticast mode [ 714.336472][T13305] netlink: 'syz.3.1949': attribute type 41 has an invalid length. [ 714.363666][T13297] syzkaller0: entered promiscuous mode [ 714.369158][T13297] syzkaller0: entered allmulticast mode [ 715.878459][T13308] netlink: 'syz.3.1949': attribute type 10 has an invalid length. [ 716.312488][T13320] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 718.038791][T13350] netlink: 'syz.0.1956': attribute type 33 has an invalid length. [ 718.052097][T13350] netlink: 152 bytes leftover after parsing attributes in process `syz.0.1956'. [ 718.279922][T13360] netlink: 'syz.4.1959': attribute type 21 has an invalid length. [ 718.296447][T13360] IPv6: NLM_F_CREATE should be specified when creating new route [ 718.316887][T13360] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 718.324211][T13360] IPv6: NLM_F_CREATE should be set when creating new route [ 718.331536][T13360] IPv6: NLM_F_CREATE should be set when creating new route [ 718.338844][T13360] IPv6: NLM_F_CREATE should be set when creating new route [ 718.589079][T13363] syzkaller0: entered promiscuous mode [ 718.608816][T13363] syzkaller0: entered allmulticast mode [ 718.662231][T13366] syzkaller0: entered promiscuous mode [ 718.668309][T13366] syzkaller0: entered allmulticast mode [ 721.892714][T13389] syzkaller0: entered promiscuous mode [ 721.898300][T13389] syzkaller0: entered allmulticast mode [ 722.042968][T13397] netlink: 'syz.2.1964': attribute type 9 has an invalid length. [ 722.050828][T13397] netlink: 209836 bytes leftover after parsing attributes in process `syz.2.1964'. [ 723.643677][T13404] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 723.817197][T13410] netlink: 'syz.2.1968': attribute type 9 has an invalid length. [ 723.862123][T13410] netlink: 209836 bytes leftover after parsing attributes in process `syz.2.1968'. [ 724.464440][T13440] syzkaller0: entered promiscuous mode [ 724.470179][T13440] syzkaller0: entered allmulticast mode [ 726.330749][T13449] syzkaller0: entered promiscuous mode [ 726.343621][T13449] syzkaller0: entered allmulticast mode [ 726.921723][T13480] netlink: 'syz.4.1981': attribute type 9 has an invalid length. [ 726.929729][T13480] netlink: 209836 bytes leftover after parsing attributes in process `syz.4.1981'. [ 728.760784][T13497] syzkaller0: entered promiscuous mode [ 728.765232][T13507] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.1990'. [ 728.769193][T13497] syzkaller0: entered allmulticast mode [ 728.790737][T13505] ±ÿ: renamed from team_slave_1 (while UP) [ 732.622964][T13527] syzkaller0: entered promiscuous mode [ 732.629613][T13527] syzkaller0: entered allmulticast mode [ 732.747649][T13529] syzkaller0: entered promiscuous mode [ 732.753169][T13529] syzkaller0: entered allmulticast mode [ 732.803000][T13545] netlink: 'syz.3.1997': attribute type 9 has an invalid length. [ 732.830693][T13545] netlink: 209836 bytes leftover after parsing attributes in process `syz.3.1997'. [ 736.587640][T13579] FAULT_INJECTION: forcing a failure. [ 736.587640][T13579] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 736.601080][T13579] CPU: 1 PID: 13579 Comm: syz.2.2007 Not tainted syzkaller #0 [ 736.608597][T13579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 736.618686][T13579] Call Trace: [ 736.621997][T13579] [ 736.624957][T13579] dump_stack_lvl+0x18c/0x250 [ 736.629684][T13579] ? show_regs_print_info+0x20/0x20 [ 736.634923][T13579] ? load_image+0x400/0x400 [ 736.639466][T13579] ? __might_fault+0xaa/0x120 [ 736.644261][T13579] ? __lock_acquire+0x7d40/0x7d40 [ 736.649310][T13579] should_fail_ex+0x39d/0x4d0 [ 736.654009][T13579] _copy_from_iter+0x1d9/0x12e0 [ 736.658865][T13579] ? __might_fault+0xaa/0x120 [ 736.663565][T13579] ? _copy_from_iter+0x24e/0x12e0 [ 736.668593][T13579] ? __virt_addr_valid+0x18c/0x540 [ 736.673706][T13579] ? __lock_acquire+0x7d40/0x7d40 [ 736.678732][T13579] ? copyout_mc+0x70/0x70 [ 736.683065][T13579] ? copyout_mc+0x70/0x70 [ 736.687398][T13579] ? __virt_addr_valid+0x18c/0x540 [ 736.692517][T13579] ? page_copy_sane+0x16a/0x270 [ 736.697377][T13579] copy_page_from_iter+0x7b/0x100 [ 736.702455][T13579] skb_copy_datagram_from_iter+0x2e4/0x6e0 [ 736.708278][T13579] tun_get_user+0x15db/0x3ca0 [ 736.712975][T13579] ? aa_file_perm+0x11b/0xee0 [ 736.717662][T13579] ? rcu_read_unlock+0xa0/0xa0 [ 736.722446][T13579] ? tun_get+0x1c/0x2e0 [ 736.726608][T13579] ? __lock_acquire+0x7d40/0x7d40 [ 736.731817][T13579] ? tun_get+0x1c/0x2e0 [ 736.735986][T13579] tun_chr_write_iter+0x119/0x200 [ 736.741015][T13579] vfs_write+0x46c/0x990 [ 736.745270][T13579] ? file_end_write+0x250/0x250 [ 736.750130][T13579] ? __fget_files+0x43d/0x4b0 [ 736.754821][T13579] ? __fdget_pos+0x1d8/0x330 [ 736.759409][T13579] ? ksys_write+0x75/0x260 [ 736.763831][T13579] ksys_write+0x150/0x260 [ 736.768168][T13579] ? __ia32_sys_read+0x90/0x90 [ 736.772936][T13579] ? lockdep_hardirqs_on+0x98/0x150 [ 736.778140][T13579] do_syscall_64+0x55/0xa0 [ 736.782560][T13579] ? clear_bhb_loop+0x40/0x90 [ 736.787237][T13579] ? clear_bhb_loop+0x40/0x90 [ 736.791920][T13579] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 736.797814][T13579] RIP: 0033:0x7ff1efb9aeb9 [ 736.802233][T13579] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 736.821840][T13579] RSP: 002b:00007ff1f0ab7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 736.830284][T13579] RAX: ffffffffffffffda RBX: 00007ff1efe15fa0 RCX: 00007ff1efb9aeb9 [ 736.838259][T13579] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 736.846319][T13579] RBP: 00007ff1f0ab7090 R08: 0000000000000000 R09: 0000000000000000 [ 736.854289][T13579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 736.862261][T13579] R13: 00007ff1efe16038 R14: 00007ff1efe15fa0 R15: 00007ffdc5115e98 [ 736.870255][T13579] [ 738.556853][T13585] syzkaller0: entered promiscuous mode [ 738.562381][T13585] syzkaller0: entered allmulticast mode [ 740.326846][T13606] syzkaller0: entered promiscuous mode [ 740.332605][T13606] syzkaller0: entered allmulticast mode [ 740.397945][T13609] syz.0.2014: vmalloc error: size 8589938688, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0-1 [ 740.420894][T13609] CPU: 1 PID: 13609 Comm: syz.0.2014 Not tainted syzkaller #0 [ 740.428407][T13609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 740.438488][T13609] Call Trace: [ 740.441784][T13609] [ 740.444731][T13609] dump_stack_lvl+0x18c/0x250 [ 740.449453][T13609] ? show_regs_print_info+0x20/0x20 [ 740.454679][T13609] ? load_image+0x400/0x400 [ 740.459209][T13609] ? cpuset_print_current_mems_allowed+0x1f/0x360 [ 740.465639][T13609] ? cpuset_print_current_mems_allowed+0x2e7/0x360 [ 740.472176][T13609] warn_alloc+0x246/0x340 [ 740.476550][T13609] ? zone_watermark_ok_safe+0x230/0x230 [ 740.482117][T13609] ? lockdep_hardirqs_on+0x98/0x150 [ 740.487321][T13609] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 740.493476][T13609] ? __vmalloc_node_range+0x110/0x1330 [ 740.498943][T13609] __vmalloc_node_range+0x126/0x1330 [ 740.504249][T13609] ? free_vm_area+0x50/0x50 [ 740.508760][T13609] vmalloc_user+0x74/0x80 [ 740.513107][T13609] ? xskq_create+0xbf/0x170 [ 740.517655][T13609] xskq_create+0xbf/0x170 [ 740.521997][T13609] xsk_init_queue+0xad/0x100 [ 740.526595][T13609] xsk_setsockopt+0x4e5/0x760 [ 740.531294][T13609] ? xsk_poll+0x680/0x680 [ 740.535625][T13609] ? __fget_files+0x28/0x4b0 [ 740.540214][T13609] ? __fget_files+0x28/0x4b0 [ 740.544808][T13609] ? aa_sock_opt_perm+0x74/0x100 [ 740.549744][T13609] ? bpf_lsm_socket_setsockopt+0x9/0x10 [ 740.555296][T13609] ? security_socket_setsockopt+0x7e/0xa0 [ 740.561035][T13609] ? xsk_poll+0x680/0x680 [ 740.565395][T13609] do_sock_setsockopt+0x175/0x1a0 [ 740.570442][T13609] ? __fdget+0x180/0x210 [ 740.574698][T13609] __x64_sys_setsockopt+0x182/0x200 [ 740.579936][T13609] do_syscall_64+0x55/0xa0 [ 740.584356][T13609] ? clear_bhb_loop+0x40/0x90 [ 740.589062][T13609] ? clear_bhb_loop+0x40/0x90 [ 740.593739][T13609] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 740.599635][T13609] RIP: 0033:0x7face839aeb9 [ 740.604048][T13609] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 740.623661][T13609] RSP: 002b:00007face9322028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 740.632076][T13609] RAX: ffffffffffffffda RBX: 00007face8615fa0 RCX: 00007face839aeb9 [ 740.640067][T13609] RDX: 0000000000000002 RSI: 000000000000011b RDI: 000000000000000b [ 740.648031][T13609] RBP: 00007face8408c1f R08: 0000000000000004 R09: 0000000000000000 [ 740.656015][T13609] R10: 0000200000000900 R11: 0000000000000246 R12: 0000000000000000 [ 740.663993][T13609] R13: 00007face8616038 R14: 00007face8615fa0 R15: 00007ffcb2a077b8 [ 740.671981][T13609] [ 740.706907][T13609] Mem-Info: [ 740.711184][T13609] active_anon:11028 inactive_anon:0 isolated_anon:0 [ 740.711184][T13609] active_file:17283 inactive_file:40171 isolated_file:0 [ 740.711184][T13609] unevictable:768 dirty:80 writeback:0 [ 740.711184][T13609] slab_reclaimable:10058 slab_unreclaimable:95605 [ 740.711184][T13609] mapped:24586 shmem:1373 pagetables:678 [ 740.711184][T13609] sec_pagetables:0 bounce:0 [ 740.711184][T13609] kernel_misc_reclaimable:0 [ 740.711184][T13609] free:1334874 free_pcp:12471 free_cma:0 [ 740.765717][T13609] Node 0 active_anon:44112kB inactive_anon:0kB active_file:69132kB inactive_file:160480kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:98444kB dirty:320kB writeback:0kB shmem:3956kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:11256kB pagetables:2712kB sec_pagetables:0kB all_unreclaimable? no [ 740.804179][T13609] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:1536kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB sec_pagetables:0kB all_unreclaimable? no [ 740.836758][T13609] Node 0 DMA free:15360kB boost:0kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 740.865147][T13609] lowmem_reserve[]: 0 2521 2522 2522 2522 [ 740.871545][T13609] Node 0 DMA32 free:1432940kB boost:0kB min:34644kB low:43304kB high:51964kB reserved_highatomic:0KB active_anon:44072kB inactive_anon:0kB active_file:69132kB inactive_file:159660kB unevictable:1536kB writepending:320kB present:3129332kB managed:2586972kB mlocked:0kB bounce:0kB free_pcp:28784kB local_pcp:13440kB free_cma:0kB [ 740.903393][T13609] lowmem_reserve[]: 0 0 0 0 0 [ 740.916500][T13609] Node 0 Normal free:4kB boost:0kB min:8kB low:8kB high:8kB reserved_highatomic:0KB active_anon:40kB inactive_anon:0kB active_file:0kB inactive_file:820kB unevictable:0kB writepending:0kB present:1048576kB managed:872kB mlocked:0kB bounce:0kB free_pcp:8kB local_pcp:0kB free_cma:0kB [ 740.946096][T13609] lowmem_reserve[]: 0 0 0 0 0 [ 740.952736][T13609] Node 1 Normal free:3890940kB boost:0kB min:55244kB low:69052kB high:82860kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB writepending:0kB present:4194304kB managed:4117312kB mlocked:0kB bounce:0kB free_pcp:22272kB local_pcp:9824kB free_cma:0kB [ 740.982854][T13609] lowmem_reserve[]: 0 0 0 0 0 [ 740.989823][T13609] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 741.008215][T13609] Node 0 DMA32: 297*4kB (UM) 443*8kB (U) 363*16kB (UM) 34*32kB (M) 418*64kB (UME) 171*128kB (UM) 28*256kB (UM) 5*512kB (UME) 3*1024kB (M) 6*2048kB (UM) 329*4096kB (UM) = 1432940kB [ 741.052190][T13609] Node 0 Normal: 1*4kB (M) 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4kB [ 741.071518][T13609] Node 1 Normal: 277*4kB (UE) 69*8kB (UME) 38*16kB (UME) 45*32kB (UME) 14*64kB (UE) 8*128kB (UME) 1*256kB (U) 2*512kB (UM) 1*1024kB (U) 2*2048kB (UE) 947*4096kB (M) = 3890940kB [ 741.093047][T13609] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 741.113484][T13609] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 741.126530][T13609] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 741.156144][T13609] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 741.173185][T13609] 58829 total pagecache pages [ 741.189953][T13609] 0 pages in swap cache [ 741.197127][T13609] Free swap = 124996kB [ 741.201662][T13609] Total swap = 124996kB [ 741.206122][T13609] 2097051 pages RAM [ 741.210302][T13609] 0 pages HighMem/MovableOnly [ 741.215700][T13609] 416922 pages reserved [ 741.220040][T13609] 0 pages cma reserved [ 741.488836][T13620] FAULT_INJECTION: forcing a failure. [ 741.488836][T13620] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 741.512954][T13620] CPU: 1 PID: 13620 Comm: syz.0.2017 Not tainted syzkaller #0 [ 741.520462][T13620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 741.530514][T13620] Call Trace: [ 741.533797][T13620] [ 741.536734][T13620] dump_stack_lvl+0x18c/0x250 [ 741.541416][T13620] ? show_regs_print_info+0x20/0x20 [ 741.547137][T13620] ? load_image+0x400/0x400 [ 741.551633][T13620] ? __might_fault+0xaa/0x120 [ 741.556304][T13620] ? __lock_acquire+0x7d40/0x7d40 [ 741.561328][T13620] should_fail_ex+0x39d/0x4d0 [ 741.566014][T13620] _copy_from_iter+0x1d9/0x12e0 [ 741.570856][T13620] ? __might_fault+0xaa/0x120 [ 741.575525][T13620] ? _copy_from_iter+0x24e/0x12e0 [ 741.580550][T13620] ? __virt_addr_valid+0x18c/0x540 [ 741.585668][T13620] ? __lock_acquire+0x7d40/0x7d40 [ 741.590697][T13620] ? copyout_mc+0x70/0x70 [ 741.595029][T13620] ? copyout_mc+0x70/0x70 [ 741.599351][T13620] ? __virt_addr_valid+0x18c/0x540 [ 741.604462][T13620] ? page_copy_sane+0x16a/0x270 [ 741.609310][T13620] copy_page_from_iter+0x7b/0x100 [ 741.614338][T13620] skb_copy_datagram_from_iter+0x2e4/0x6e0 [ 741.620151][T13620] tun_get_user+0x15db/0x3ca0 [ 741.624917][T13620] ? aa_file_perm+0x11b/0xee0 [ 741.629593][T13620] ? rcu_read_unlock+0xa0/0xa0 [ 741.634362][T13620] ? tun_get+0x1c/0x2e0 [ 741.638529][T13620] ? __lock_acquire+0x7d40/0x7d40 [ 741.643570][T13620] ? tun_get+0x1c/0x2e0 [ 741.647721][T13620] tun_chr_write_iter+0x119/0x200 [ 741.652739][T13620] vfs_write+0x46c/0x990 [ 741.656982][T13620] ? file_end_write+0x250/0x250 [ 741.661920][T13620] ? __fget_files+0x43d/0x4b0 [ 741.666596][T13620] ? __fdget_pos+0x1d8/0x330 [ 741.671177][T13620] ? ksys_write+0x75/0x260 [ 741.675587][T13620] ksys_write+0x150/0x260 [ 741.679916][T13620] ? __ia32_sys_read+0x90/0x90 [ 741.684676][T13620] ? lockdep_hardirqs_on+0x98/0x150 [ 741.689867][T13620] do_syscall_64+0x55/0xa0 [ 741.694276][T13620] ? clear_bhb_loop+0x40/0x90 [ 741.698936][T13620] ? clear_bhb_loop+0x40/0x90 [ 741.703612][T13620] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 741.709500][T13620] RIP: 0033:0x7face839aeb9 [ 741.713905][T13620] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 741.733505][T13620] RSP: 002b:00007face9322028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 741.741928][T13620] RAX: ffffffffffffffda RBX: 00007face8615fa0 RCX: 00007face839aeb9 [ 741.749893][T13620] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 741.757857][T13620] RBP: 00007face9322090 R08: 0000000000000000 R09: 0000000000000000 [ 741.765819][T13620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 741.773782][T13620] R13: 00007face8616038 R14: 00007face8615fa0 R15: 00007ffcb2a077b8 [ 741.781758][T13620] [ 744.383199][T13649] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 745.080072][T13635] syzkaller0: entered promiscuous mode [ 745.086222][T13635] syzkaller0: entered allmulticast mode [ 747.013194][T13674] syzkaller0: entered promiscuous mode [ 747.025866][T13674] syzkaller0: entered allmulticast mode [ 747.441924][ T1279] ieee802154 phy0 wpan0: encryption failed: -22 [ 747.451075][ T1279] ieee802154 phy1 wpan1: encryption failed: -22 [ 750.702635][T13716] syzkaller0: entered promiscuous mode [ 750.708431][T13716] syzkaller0: entered allmulticast mode [ 752.886985][T13746] syzkaller0: entered promiscuous mode [ 752.905707][T13754] FAULT_INJECTION: forcing a failure. [ 752.905707][T13754] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 752.919336][T13746] syzkaller0: entered allmulticast mode [ 752.923723][T13754] CPU: 0 PID: 13754 Comm: syz.4.2048 Not tainted syzkaller #0 [ 752.932372][T13754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 752.942452][T13754] Call Trace: [ 752.945762][T13754] [ 752.948711][T13754] dump_stack_lvl+0x18c/0x250 [ 752.953420][T13754] ? show_regs_print_info+0x20/0x20 [ 752.958641][T13754] ? load_image+0x400/0x400 [ 752.963172][T13754] ? __might_fault+0xaa/0x120 [ 752.967865][T13754] ? __lock_acquire+0x7d40/0x7d40 [ 752.972918][T13754] should_fail_ex+0x39d/0x4d0 [ 752.977625][T13754] _copy_from_iter+0x1d9/0x12e0 [ 752.982482][T13754] ? __might_fault+0xaa/0x120 [ 752.987171][T13754] ? _copy_from_iter+0x24e/0x12e0 [ 752.992194][T13754] ? __virt_addr_valid+0x18c/0x540 [ 752.997311][T13754] ? __lock_acquire+0x7d40/0x7d40 [ 753.002336][T13754] ? copyout_mc+0x70/0x70 [ 753.006671][T13754] ? copyout_mc+0x70/0x70 [ 753.011002][T13754] ? __virt_addr_valid+0x18c/0x540 [ 753.016119][T13754] ? page_copy_sane+0x16a/0x270 [ 753.020979][T13754] copy_page_from_iter+0x7b/0x100 [ 753.026015][T13754] skb_copy_datagram_from_iter+0x2e4/0x6e0 [ 753.031837][T13754] tun_get_user+0x15db/0x3ca0 [ 753.036530][T13754] ? aa_file_perm+0x11b/0xee0 [ 753.041216][T13754] ? rcu_read_unlock+0xa0/0xa0 [ 753.045996][T13754] ? tun_get+0x1c/0x2e0 [ 753.050157][T13754] ? __lock_acquire+0x7d40/0x7d40 [ 753.055189][T13754] ? tun_get+0x1c/0x2e0 [ 753.059352][T13754] tun_chr_write_iter+0x119/0x200 [ 753.064380][T13754] vfs_write+0x46c/0x990 [ 753.068632][T13754] ? file_end_write+0x250/0x250 [ 753.073491][T13754] ? __fget_files+0x43d/0x4b0 [ 753.078187][T13754] ? __fdget_pos+0x1d8/0x330 [ 753.082783][T13754] ? ksys_write+0x75/0x260 [ 753.087205][T13754] ksys_write+0x150/0x260 [ 753.091540][T13754] ? __ia32_sys_read+0x90/0x90 [ 753.096315][T13754] ? lockdep_hardirqs_on+0x98/0x150 [ 753.101516][T13754] do_syscall_64+0x55/0xa0 [ 753.105940][T13754] ? clear_bhb_loop+0x40/0x90 [ 753.110614][T13754] ? clear_bhb_loop+0x40/0x90 [ 753.115294][T13754] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 753.121183][T13754] RIP: 0033:0x7f701cb9aeb9 [ 753.125598][T13754] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 753.145203][T13754] RSP: 002b:00007f701db07028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 753.153617][T13754] RAX: ffffffffffffffda RBX: 00007f701ce15fa0 RCX: 00007f701cb9aeb9 [ 753.161589][T13754] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 753.169557][T13754] RBP: 00007f701db07090 R08: 0000000000000000 R09: 0000000000000000 [ 753.177525][T13754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 753.185491][T13754] R13: 00007f701ce16038 R14: 00007f701ce15fa0 R15: 00007ffe69211308 [ 753.193486][T13754] [ 753.370063][T13756] sock: sock_set_timeout: `syz.3.2049' (pid 13756) tries to set negative timeout [ 754.615420][ T5084] Bluetooth: hci4: command 0x0406 tx timeout [ 755.013078][T13761] syzkaller0: entered promiscuous mode [ 755.019530][T13761] syzkaller0: entered allmulticast mode [ 755.208021][T13776] netlink: 'syz.3.2053': attribute type 10 has an invalid length. [ 755.280579][T13776] veth0_vlan: left promiscuous mode [ 755.296191][T13776] veth0_vlan: entered promiscuous mode [ 755.308669][T13776] team0: Device veth0_vlan failed to register rx_handler [ 758.722394][T13799] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.2059'. [ 758.799650][T13799] netlink: 'syz.0.2059': attribute type 2 has an invalid length. [ 758.808922][T13797] syzkaller0: entered promiscuous mode [ 758.820216][T13797] syzkaller0: entered allmulticast mode [ 758.885776][T13803] syzkaller0: entered promiscuous mode [ 758.891297][T13803] syzkaller0: entered allmulticast mode [ 760.780233][T13802] ±ÿ;P›§5ëz˜: renamed from team_slave_1 (while UP) [ 760.945928][T13822] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.2065'. [ 762.510153][T13812] syzkaller0: entered promiscuous mode [ 762.515748][T13812] syzkaller0: entered allmulticast mode [ 764.052283][T13822] netlink: 'syz.3.2065': attribute type 46 has an invalid length. [ 764.061275][T13822] netlink: 36 bytes leftover after parsing attributes in process `syz.3.2065'. [ 764.352257][T13845] netlink: 'syz.4.2070': attribute type 11 has an invalid length. [ 764.374901][T13845] netlink: 212832 bytes leftover after parsing attributes in process `syz.4.2070'. [ 764.468449][T13846] netlink: 'syz.0.2071': attribute type 4 has an invalid length. [ 764.480810][T13846] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.2071'. [ 766.085506][T13854] syzkaller0: entered promiscuous mode [ 766.091129][T13854] syzkaller0: entered allmulticast mode [ 766.196760][T13858] A link change request failed with some changes committed already. Interface Q±6ã`Ò˜ may have been left with an inconsistent configuration, please check. [ 767.993724][T13879] syzkaller0: entered promiscuous mode [ 767.999244][T13879] syzkaller0: entered allmulticast mode [ 768.025679][T13892] FAULT_INJECTION: forcing a failure. [ 768.025679][T13892] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 768.044779][T13892] CPU: 1 PID: 13892 Comm: syz.2.2081 Not tainted syzkaller #0 [ 768.052286][T13892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 768.062370][T13892] Call Trace: [ 768.065675][T13892] [ 768.068637][T13892] dump_stack_lvl+0x18c/0x250 [ 768.073358][T13892] ? show_regs_print_info+0x20/0x20 [ 768.078588][T13892] ? load_image+0x400/0x400 [ 768.083128][T13892] ? __might_fault+0xaa/0x120 [ 768.087833][T13892] ? __lock_acquire+0x7d40/0x7d40 [ 768.092879][T13892] should_fail_ex+0x39d/0x4d0 [ 768.097579][T13892] _copy_from_iter+0x1d9/0x12e0 [ 768.102446][T13892] ? __might_fault+0xaa/0x120 [ 768.107119][T13892] ? _copy_from_iter+0x24e/0x12e0 [ 768.112140][T13892] ? __virt_addr_valid+0x18c/0x540 [ 768.117257][T13892] ? __lock_acquire+0x7d40/0x7d40 [ 768.122288][T13892] ? copyout_mc+0x70/0x70 [ 768.126621][T13892] ? copyout_mc+0x70/0x70 [ 768.130941][T13892] ? __virt_addr_valid+0x18c/0x540 [ 768.136067][T13892] ? page_copy_sane+0x4e/0x270 [ 768.140846][T13892] copy_page_from_iter+0x7b/0x100 [ 768.145869][T13892] skb_copy_datagram_from_iter+0x2e4/0x6e0 [ 768.151708][T13892] tun_get_user+0x15db/0x3ca0 [ 768.156410][T13892] ? aa_file_perm+0x11b/0xee0 [ 768.161105][T13892] ? rcu_read_unlock+0xa0/0xa0 [ 768.165876][T13892] ? tun_get+0x1c/0x2e0 [ 768.170020][T13892] ? __lock_acquire+0x7d40/0x7d40 [ 768.175063][T13892] ? tun_get+0x1c/0x2e0 [ 768.179232][T13892] tun_chr_write_iter+0x119/0x200 [ 768.184250][T13892] vfs_write+0x46c/0x990 [ 768.188519][T13892] ? file_end_write+0x250/0x250 [ 768.193372][T13892] ? __fget_files+0x43d/0x4b0 [ 768.198071][T13892] ? __fdget_pos+0x1d8/0x330 [ 768.202664][T13892] ? ksys_write+0x75/0x260 [ 768.207074][T13892] ksys_write+0x150/0x260 [ 768.211397][T13892] ? __ia32_sys_read+0x90/0x90 [ 768.216181][T13892] ? lockdep_hardirqs_on+0x98/0x150 [ 768.221389][T13892] do_syscall_64+0x55/0xa0 [ 768.225806][T13892] ? clear_bhb_loop+0x40/0x90 [ 768.230472][T13892] ? clear_bhb_loop+0x40/0x90 [ 768.235156][T13892] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 768.241115][T13892] RIP: 0033:0x7ff1efb9aeb9 [ 768.245519][T13892] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 768.265126][T13892] RSP: 002b:00007ff1f0ab7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 768.274350][T13892] RAX: ffffffffffffffda RBX: 00007ff1efe15fa0 RCX: 00007ff1efb9aeb9 [ 768.282341][T13892] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 768.290305][T13892] RBP: 00007ff1f0ab7090 R08: 0000000000000000 R09: 0000000000000000 [ 768.298290][T13892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 768.306271][T13892] R13: 00007ff1efe16038 R14: 00007ff1efe15fa0 R15: 00007ffdc5115e98 [ 768.314277][T13892] [ 769.881341][T13899] netlink: 'syz.2.2083': attribute type 1 has an invalid length. [ 769.902035][T13899] netlink: 16150 bytes leftover after parsing attributes in process `syz.2.2083'. [ 770.100429][T13906] netlink: 'syz.2.2085': attribute type 29 has an invalid length. [ 770.132704][T13906] netlink: 'syz.2.2085': attribute type 29 has an invalid length. [ 770.226842][T13910] netlink: 'syz.0.2087': attribute type 10 has an invalid length. [ 770.250343][T13910] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 770.353305][T13910] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 770.516737][T13928] FAULT_INJECTION: forcing a failure. [ 770.516737][T13928] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 770.536441][T13928] CPU: 1 PID: 13928 Comm: syz.0.2091 Not tainted syzkaller #0 [ 770.543966][T13928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 770.554070][T13928] Call Trace: [ 770.557411][T13928] [ 770.560379][T13928] dump_stack_lvl+0x18c/0x250 [ 770.565133][T13928] ? show_regs_print_info+0x20/0x20 [ 770.570394][T13928] ? load_image+0x400/0x400 [ 770.574962][T13928] ? __might_fault+0xaa/0x120 [ 770.579698][T13928] ? __lock_acquire+0x7d40/0x7d40 [ 770.584775][T13928] should_fail_ex+0x39d/0x4d0 [ 770.589488][T13928] _copy_from_iter+0x1d9/0x12e0 [ 770.594360][T13928] ? __might_fault+0xaa/0x120 [ 770.599061][T13928] ? _copy_from_iter+0x24e/0x12e0 [ 770.604110][T13928] ? __virt_addr_valid+0x18c/0x540 [ 770.609245][T13928] ? __lock_acquire+0x7d40/0x7d40 [ 770.614299][T13928] ? copyout_mc+0x70/0x70 [ 770.618656][T13928] ? copyout_mc+0x70/0x70 [ 770.623022][T13928] ? __virt_addr_valid+0x18c/0x540 [ 770.628187][T13928] ? page_copy_sane+0x4e/0x270 [ 770.632984][T13928] copy_page_from_iter+0x7b/0x100 [ 770.638041][T13928] skb_copy_datagram_from_iter+0x2e4/0x6e0 [ 770.643900][T13928] tun_get_user+0x15db/0x3ca0 [ 770.648622][T13928] ? aa_file_perm+0x11b/0xee0 [ 770.653337][T13928] ? rcu_read_unlock+0xa0/0xa0 [ 770.658149][T13928] ? tun_get+0x1c/0x2e0 [ 770.662323][T13928] ? __lock_acquire+0x7d40/0x7d40 [ 770.667395][T13928] ? tun_get+0x1c/0x2e0 [ 770.671590][T13928] tun_chr_write_iter+0x119/0x200 [ 770.676640][T13928] vfs_write+0x46c/0x990 [ 770.680920][T13928] ? file_end_write+0x250/0x250 [ 770.685805][T13928] ? __fget_files+0x43d/0x4b0 [ 770.690523][T13928] ? __fdget_pos+0x1d8/0x330 [ 770.695129][T13928] ? ksys_write+0x75/0x260 [ 770.699572][T13928] ksys_write+0x150/0x260 [ 770.703926][T13928] ? __ia32_sys_read+0x90/0x90 [ 770.708716][T13928] ? lockdep_hardirqs_on+0x98/0x150 [ 770.714022][T13928] do_syscall_64+0x55/0xa0 [ 770.718467][T13928] ? clear_bhb_loop+0x40/0x90 [ 770.723153][T13928] ? clear_bhb_loop+0x40/0x90 [ 770.727849][T13928] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 770.733753][T13928] RIP: 0033:0x7face839aeb9 [ 770.738180][T13928] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 770.757885][T13928] RSP: 002b:00007face9322028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 770.766319][T13928] RAX: ffffffffffffffda RBX: 00007face8615fa0 RCX: 00007face839aeb9 [ 770.774300][T13928] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 770.782282][T13928] RBP: 00007face9322090 R08: 0000000000000000 R09: 0000000000000000 [ 770.790263][T13928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 770.798245][T13928] R13: 00007face8616038 R14: 00007face8615fa0 R15: 00007ffcb2a077b8 [ 770.806263][T13928] [ 771.203086][T13938] syzkaller0: entered promiscuous mode [ 771.208904][T13938] syzkaller0: entered allmulticast mode [ 772.013366][T13955] netlink: 'syz.4.2101': attribute type 9 has an invalid length. [ 772.022321][T13955] netlink: 399 bytes leftover after parsing attributes in process `syz.4.2101'. [ 775.077596][T13970] FAULT_INJECTION: forcing a failure. [ 775.077596][T13970] name failslab, interval 1, probability 0, space 0, times 0 [ 775.090531][T13970] CPU: 1 PID: 13970 Comm: syz.4.2105 Not tainted syzkaller #0 [ 775.098016][T13970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 775.108073][T13970] Call Trace: [ 775.111353][T13970] [ 775.114285][T13970] dump_stack_lvl+0x18c/0x250 [ 775.118977][T13970] ? show_regs_print_info+0x20/0x20 [ 775.124184][T13970] ? load_image+0x400/0x400 [ 775.128714][T13970] should_fail_ex+0x39d/0x4d0 [ 775.133402][T13970] should_failslab+0x9/0x20 [ 775.137919][T13970] slab_pre_alloc_hook+0x59/0x310 [ 775.142954][T13970] ? nf_ct_ext_add+0x1ab/0x440 [ 775.147720][T13970] ? nf_ct_ext_add+0x1ab/0x440 [ 775.152485][T13970] __kmem_cache_alloc_node+0x53/0x250 [ 775.157955][T13970] ? nf_ct_ext_add+0x1ab/0x440 [ 775.162719][T13970] __kmalloc_node_track_caller+0xa2/0x230 [ 775.168447][T13970] krealloc+0x86/0x120 [ 775.172523][T13970] nf_ct_ext_add+0x1ab/0x440 [ 775.177124][T13970] init_conntrack+0x69c/0xf10 [ 775.181810][T13970] ? early_drop+0x7f0/0x7f0 [ 775.186318][T13970] ? nf_conntrack_find_get+0x650/0x650 [ 775.191788][T13970] ? __siphash_unaligned+0x22e/0x3a0 [ 775.197084][T13970] nf_conntrack_in+0xc06/0x15c0 [ 775.201966][T13970] ? nf_ct_pernet+0x270/0x270 [ 775.206648][T13970] ? ip6t_do_table+0x1d9/0x1510 [ 775.211511][T13970] ? ip6t_alloc_initial_table+0x640/0x640 [ 775.217249][T13970] ? ipv6_defrag+0x2d6/0x3a0 [ 775.221842][T13970] ? ipv4_conntrack_local+0x200/0x200 [ 775.227224][T13970] nf_hook_slow+0xbd/0x200 [ 775.231650][T13970] NF_HOOK+0x21d/0x3b0 [ 775.235731][T13970] ? sk_setup_caps+0xa10/0xa10 [ 775.240519][T13970] ? net_zcopy_put_abort+0x90/0x90 [ 775.245645][T13970] ? NF_HOOK+0x9f/0x3b0 [ 775.249817][T13970] ? ip6_rcv_core+0x1740/0x1740 [ 775.254683][T13970] ? net_zcopy_put_abort+0x90/0x90 [ 775.259822][T13970] ? ip6_rcv_finish_core+0x420/0x420 [ 775.265119][T13970] __netif_receive_skb+0xcc/0x290 [ 775.270156][T13970] ? netif_receive_skb+0x106/0x720 [ 775.275535][T13970] netif_receive_skb+0x1bc/0x720 [ 775.280483][T13970] ? enqueue_to_backlog+0xe30/0xe30 [ 775.285700][T13970] ? tun_rx_batched+0x186/0x790 [ 775.290560][T13970] tun_rx_batched+0x1df/0x790 [ 775.295250][T13970] ? pskb_may_pull+0xf0/0xf0 [ 775.299838][T13970] ? __local_bh_enable_ip+0x13a/0x1c0 [ 775.305215][T13970] ? lockdep_hardirqs_on+0x98/0x150 [ 775.310412][T13970] ? read_lock_is_recursive+0x20/0x20 [ 775.315786][T13970] ? __local_bh_enable_ip+0x13a/0x1c0 [ 775.321159][T13970] ? _local_bh_enable+0xa0/0xa0 [ 775.326030][T13970] ? skb_copy_datagram_from_iter+0x62e/0x6e0 [ 775.332040][T13970] tun_get_user+0x28a3/0x3ca0 [ 775.336725][T13970] ? tun_get_user+0x24d9/0x3ca0 [ 775.341585][T13970] ? aa_file_perm+0x11b/0xee0 [ 775.346275][T13970] ? rcu_read_unlock+0xa0/0xa0 [ 775.351143][T13970] ? tun_get+0x1c/0x2e0 [ 775.355305][T13970] ? __lock_acquire+0x7d40/0x7d40 [ 775.360342][T13970] ? tun_get+0x1c/0x2e0 [ 775.364510][T13970] tun_chr_write_iter+0x119/0x200 [ 775.369542][T13970] vfs_write+0x46c/0x990 [ 775.373797][T13970] ? file_end_write+0x250/0x250 [ 775.378659][T13970] ? __fget_files+0x43d/0x4b0 [ 775.383353][T13970] ? __fdget_pos+0x1d8/0x330 [ 775.387944][T13970] ? ksys_write+0x75/0x260 [ 775.392369][T13970] ksys_write+0x150/0x260 [ 775.396708][T13970] ? __ia32_sys_read+0x90/0x90 [ 775.401480][T13970] ? lockdep_hardirqs_on+0x98/0x150 [ 775.406682][T13970] do_syscall_64+0x55/0xa0 [ 775.411100][T13970] ? clear_bhb_loop+0x40/0x90 [ 775.415777][T13970] ? clear_bhb_loop+0x40/0x90 [ 775.420455][T13970] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 775.426349][T13970] RIP: 0033:0x7f701cb9aeb9 [ 775.430790][T13970] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 775.450407][T13970] RSP: 002b:00007f701db07028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 775.458838][T13970] RAX: ffffffffffffffda RBX: 00007f701ce15fa0 RCX: 00007f701cb9aeb9 [ 775.466819][T13970] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 775.474885][T13970] RBP: 00007f701db07090 R08: 0000000000000000 R09: 0000000000000000 [ 775.482858][T13970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 775.490826][T13970] R13: 00007f701ce16038 R14: 00007f701ce15fa0 R15: 00007ffe69211308 [ 775.498823][T13970] [ 775.606702][T13977] sctp: [Deprecated]: syz.0.2108 (pid 13977) Use of int in maxseg socket option. [ 775.606702][T13977] Use struct sctp_assoc_value instead [ 775.689614][T13977] netlink: 144 bytes leftover after parsing attributes in process `syz.0.2108'. [ 779.113901][T13997] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 779.120019][T13997] syzkaller0: linktype set to 804 [ 779.326798][T14004] syzkaller0: entered promiscuous mode [ 779.332325][T14004] syzkaller0: entered allmulticast mode [ 779.351456][T14011] FAULT_INJECTION: forcing a failure. [ 779.351456][T14011] name failslab, interval 1, probability 0, space 0, times 0 [ 779.364169][T14011] CPU: 1 PID: 14011 Comm: syz.3.2119 Not tainted syzkaller #0 [ 779.371649][T14011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 779.381792][T14011] Call Trace: [ 779.385070][T14011] [ 779.387993][T14011] dump_stack_lvl+0x18c/0x250 [ 779.392677][T14011] ? show_regs_print_info+0x20/0x20 [ 779.397891][T14011] ? load_image+0x400/0x400 [ 779.402459][T14011] should_fail_ex+0x39d/0x4d0 [ 779.407185][T14011] should_failslab+0x9/0x20 [ 779.411727][T14011] slab_pre_alloc_hook+0x59/0x310 [ 779.416792][T14011] ? nf_ct_ext_add+0x1ab/0x440 [ 779.421586][T14011] ? nf_ct_ext_add+0x1ab/0x440 [ 779.426386][T14011] __kmem_cache_alloc_node+0x53/0x250 [ 779.431805][T14011] ? nf_ct_ext_add+0x1ab/0x440 [ 779.436609][T14011] __kmalloc_node_track_caller+0xa2/0x230 [ 779.441660][T14013] syzkaller0: entered promiscuous mode [ 779.442368][T14011] krealloc+0x86/0x120 [ 779.450301][T14013] syzkaller0: entered allmulticast mode [ 779.451883][T14011] nf_ct_ext_add+0x1ab/0x440 [ 779.451923][T14011] init_conntrack+0x69c/0xf10 [ 779.466766][T14011] ? early_drop+0x7f0/0x7f0 [ 779.471313][T14011] ? nf_conntrack_find_get+0x650/0x650 [ 779.476814][T14011] ? __siphash_unaligned+0x22e/0x3a0 [ 779.482142][T14011] nf_conntrack_in+0xc06/0x15c0 [ 779.487066][T14011] ? nf_ct_pernet+0x270/0x270 [ 779.491774][T14011] ? ip6t_do_table+0x1d9/0x1510 [ 779.496653][T14011] ? ip6t_alloc_initial_table+0x640/0x640 [ 779.502383][T14011] ? ipv6_defrag+0x2d6/0x3a0 [ 779.506987][T14011] ? ipv4_conntrack_local+0x200/0x200 [ 779.512370][T14011] nf_hook_slow+0xbd/0x200 [ 779.516786][T14011] NF_HOOK+0x21d/0x3b0 [ 779.520850][T14011] ? sk_setup_caps+0xa10/0xa10 [ 779.525621][T14011] ? net_zcopy_put_abort+0x90/0x90 [ 779.530732][T14011] ? NF_HOOK+0x9f/0x3b0 [ 779.534883][T14011] ? ip6_rcv_core+0x1740/0x1740 [ 779.539731][T14011] ? net_zcopy_put_abort+0x90/0x90 [ 779.544850][T14011] ? ip6_rcv_finish_core+0x420/0x420 [ 779.550131][T14011] __netif_receive_skb+0xcc/0x290 [ 779.555156][T14011] ? netif_receive_skb+0x106/0x720 [ 779.560277][T14011] netif_receive_skb+0x1bc/0x720 [ 779.565221][T14011] ? enqueue_to_backlog+0xe30/0xe30 [ 779.570416][T14011] ? __lock_acquire+0x7d40/0x7d40 [ 779.575435][T14011] ? tun_rx_batched+0x186/0x790 [ 779.580295][T14011] tun_rx_batched+0x1df/0x790 [ 779.584981][T14011] ? pskb_may_pull+0xf0/0xf0 [ 779.589563][T14011] ? __local_bh_enable_ip+0x13a/0x1c0 [ 779.594927][T14011] ? lockdep_hardirqs_on+0x98/0x150 [ 779.600120][T14011] ? read_lock_is_recursive+0x20/0x20 [ 779.605486][T14011] ? __local_bh_enable_ip+0x13a/0x1c0 [ 779.610854][T14011] ? _local_bh_enable+0xa0/0xa0 [ 779.615702][T14011] ? skb_copy_datagram_from_iter+0x62e/0x6e0 [ 779.621696][T14011] tun_get_user+0x28a3/0x3ca0 [ 779.626376][T14011] ? tun_get_user+0x24d9/0x3ca0 [ 779.631239][T14011] ? aa_file_perm+0x11b/0xee0 [ 779.635922][T14011] ? rcu_read_unlock+0xa0/0xa0 [ 779.640690][T14011] ? tun_get+0x1c/0x2e0 [ 779.644844][T14011] ? __lock_acquire+0x7d40/0x7d40 [ 779.649870][T14011] ? tun_get+0x1c/0x2e0 [ 779.654030][T14011] tun_chr_write_iter+0x119/0x200 [ 779.659061][T14011] vfs_write+0x46c/0x990 [ 779.663324][T14011] ? file_end_write+0x250/0x250 [ 779.668210][T14011] ? __fget_files+0x43d/0x4b0 [ 779.672896][T14011] ? __fdget_pos+0x1d8/0x330 [ 779.677513][T14011] ? ksys_write+0x75/0x260 [ 779.681936][T14011] ksys_write+0x150/0x260 [ 779.686267][T14011] ? __ia32_sys_read+0x90/0x90 [ 779.691035][T14011] ? lockdep_hardirqs_on+0x98/0x150 [ 779.696236][T14011] do_syscall_64+0x55/0xa0 [ 779.700648][T14011] ? clear_bhb_loop+0x40/0x90 [ 779.705319][T14011] ? clear_bhb_loop+0x40/0x90 [ 779.709992][T14011] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 779.715877][T14011] RIP: 0033:0x7ffb4e39aeb9 [ 779.720285][T14011] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 779.739895][T14011] RSP: 002b:00007ffb4f1d9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 779.748315][T14011] RAX: ffffffffffffffda RBX: 00007ffb4e615fa0 RCX: 00007ffb4e39aeb9 [ 779.756293][T14011] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 779.764273][T14011] RBP: 00007ffb4f1d9090 R08: 0000000000000000 R09: 0000000000000000 [ 779.772267][T14011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 779.780245][T14011] R13: 00007ffb4e616038 R14: 00007ffb4e615fa0 R15: 00007ffea0024b08 [ 779.788238][T14011] [ 783.865324][T14027] syzkaller0: entered promiscuous mode [ 783.871993][T14027] syzkaller0: entered allmulticast mode [ 784.125068][T14051] FAULT_INJECTION: forcing a failure. [ 784.125068][T14051] name failslab, interval 1, probability 0, space 0, times 0 [ 784.138168][T14051] CPU: 0 PID: 14051 Comm: syz.3.2129 Not tainted syzkaller #0 [ 784.145630][T14051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 784.155677][T14051] Call Trace: [ 784.158948][T14051] [ 784.161876][T14051] dump_stack_lvl+0x18c/0x250 [ 784.166557][T14051] ? show_regs_print_info+0x20/0x20 [ 784.171751][T14051] ? load_image+0x400/0x400 [ 784.176252][T14051] ? perf_trace_run_bpf_submit+0xf4/0x1c0 [ 784.181971][T14051] should_fail_ex+0x39d/0x4d0 [ 784.186670][T14051] should_failslab+0x9/0x20 [ 784.191176][T14051] slab_pre_alloc_hook+0x59/0x310 [ 784.196211][T14051] ? trace_event_raw_event_lock+0x250/0x250 [ 784.202141][T14051] kmem_cache_alloc_node+0x60/0x320 [ 784.207338][T14051] ? __alloc_skb+0x103/0x2c0 [ 784.211930][T14051] __alloc_skb+0x103/0x2c0 [ 784.216347][T14051] ndisc_alloc_skb+0xa6/0x450 [ 784.221025][T14051] ndisc_ns_create+0x213/0x640 [ 784.225797][T14051] ? ndisc_alloc_skb+0x450/0x450 [ 784.230757][T14051] ? ipv6_get_lladdr+0x2b/0x3e0 [ 784.235603][T14051] ? ipv6_get_lladdr+0x2b/0x3e0 [ 784.240455][T14051] ? ipv6_get_lladdr+0x378/0x3e0 [ 784.245399][T14051] ? ipv6_get_lladdr+0x2b/0x3e0 [ 784.250274][T14051] ndisc_solicit+0x34b/0x660 [ 784.254869][T14051] ? ndisc_cleanup+0x40/0x40 [ 784.259467][T14051] ? ndisc_cleanup+0x40/0x40 [ 784.264059][T14051] __neigh_event_send+0xed1/0x1440 [ 784.269181][T14051] ? nf_hook+0xa2/0x390 [ 784.273338][T14051] neigh_resolve_output+0x19b/0x730 [ 784.278537][T14051] ? __ipv6_neigh_lookup_noref+0x61d/0x7d0 [ 784.284356][T14051] ip6_finish_output2+0xe3d/0x1630 [ 784.289473][T14051] ? ip6_finish_output2+0x645/0x1630 [ 784.294777][T14051] ? ip6_mtu+0x7d/0x3f0 [ 784.298966][T14051] ? nf_hook+0x390/0x390 [ 784.303225][T14051] ? ip6_finish_output+0x57b/0x820 [ 784.308335][T14051] ? ip6_send_skb+0x10f/0x380 [ 784.313016][T14051] ip6_send_skb+0x1d5/0x380 [ 784.317534][T14051] icmp6_send+0x142a/0x1b40 [ 784.322033][T14051] ? perf_trace_run_bpf_submit+0xf4/0x1c0 [ 784.327829][T14051] ? icmp6_send+0x233/0x1b40 [ 784.332437][T14051] ? icmpv6_push_pending_frames+0x400/0x400 [ 784.338323][T14051] ? lockdep_init_map_type+0x590/0x8e0 [ 784.343791][T14051] ? gre_parse_header+0xc3e/0x1670 [ 784.348931][T14051] ? skb_pull_rcsum+0x234/0x3f0 [ 784.353800][T14051] ? __iptunnel_pull_header+0x88d/0x8d0 [ 784.359358][T14051] gre_rcv+0xba0/0x11c0 [ 784.363544][T14051] ? erspan_build_header_v2+0x4a0/0x4a0 [ 784.369086][T14051] ? rawv6_mh_filter_unregister+0x20/0x20 [ 784.374819][T14051] ip6_protocol_deliver_rcu+0x905/0x13c0 [ 784.380470][T14051] ? ip6_input_finish+0xd9/0x2c0 [ 784.385401][T14051] ip6_input_finish+0x184/0x2c0 [ 784.390250][T14051] NF_HOOK+0x32d/0x3b0 [ 784.394335][T14051] ? ip6_input+0xa0/0xa0 [ 784.398587][T14051] ? NF_HOOK+0x9f/0x3b0 [ 784.402740][T14051] ? ip6_rcv_core+0x1740/0x1740 [ 784.407619][T14051] ? ip6_input+0xa0/0xa0 [ 784.411874][T14051] ? ip6_rcv_finish+0x19a/0x230 [ 784.416721][T14051] NF_HOOK+0x32d/0x3b0 [ 784.420782][T14051] ? sk_setup_caps+0xa10/0xa10 [ 784.425555][T14051] ? net_zcopy_put_abort+0x90/0x90 [ 784.430657][T14051] ? NF_HOOK+0x9f/0x3b0 [ 784.434809][T14051] ? ip6_rcv_core+0x1740/0x1740 [ 784.439663][T14051] ? net_zcopy_put_abort+0x90/0x90 [ 784.444804][T14051] ? ip6_rcv_finish_core+0x420/0x420 [ 784.450104][T14051] __netif_receive_skb+0xcc/0x290 [ 784.455129][T14051] ? netif_receive_skb+0x106/0x720 [ 784.460235][T14051] netif_receive_skb+0x1bc/0x720 [ 784.465173][T14051] ? enqueue_to_backlog+0xe30/0xe30 [ 784.470369][T14051] ? perf_trace_preemptirq_template+0xac/0x330 [ 784.476522][T14051] ? tun_rx_batched+0x186/0x790 [ 784.481366][T14051] tun_rx_batched+0x1df/0x790 [ 784.486044][T14051] ? pskb_may_pull+0xf0/0xf0 [ 784.490625][T14051] ? __local_bh_enable_ip+0x13a/0x1c0 [ 784.496004][T14051] ? lockdep_hardirqs_on+0x98/0x150 [ 784.501217][T14051] ? read_lock_is_recursive+0x20/0x20 [ 784.506582][T14051] ? __local_bh_enable_ip+0x13a/0x1c0 [ 784.511946][T14051] ? _local_bh_enable+0xa0/0xa0 [ 784.516787][T14051] ? skb_copy_datagram_from_iter+0x62e/0x6e0 [ 784.522773][T14051] tun_get_user+0x28a3/0x3ca0 [ 784.527466][T14051] ? tun_get_user+0x24d9/0x3ca0 [ 784.532323][T14051] ? aa_file_perm+0x11b/0xee0 [ 784.537016][T14051] ? rcu_read_unlock+0xa0/0xa0 [ 784.542222][T14051] ? tun_get+0x1c/0x2e0 [ 784.546391][T14051] ? __lock_acquire+0x7d40/0x7d40 [ 784.551437][T14051] ? tun_get+0x1c/0x2e0 [ 784.555596][T14051] tun_chr_write_iter+0x119/0x200 [ 784.560636][T14051] vfs_write+0x46c/0x990 [ 784.564900][T14051] ? file_end_write+0x250/0x250 [ 784.569751][T14051] ? __fget_files+0x43d/0x4b0 [ 784.574435][T14051] ? __fdget_pos+0x1d8/0x330 [ 784.579017][T14051] ? ksys_write+0x75/0x260 [ 784.583433][T14051] ksys_write+0x150/0x260 [ 784.587763][T14051] ? __ia32_sys_read+0x90/0x90 [ 784.592523][T14051] ? lockdep_hardirqs_on+0x98/0x150 [ 784.597739][T14051] do_syscall_64+0x55/0xa0 [ 784.602167][T14051] ? clear_bhb_loop+0x40/0x90 [ 784.606836][T14051] ? clear_bhb_loop+0x40/0x90 [ 784.611506][T14051] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 784.617388][T14051] RIP: 0033:0x7ffb4e39aeb9 [ 784.621797][T14051] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 784.641408][T14051] RSP: 002b:00007ffb4f1d9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 784.649823][T14051] RAX: ffffffffffffffda RBX: 00007ffb4e615fa0 RCX: 00007ffb4e39aeb9 [ 784.657796][T14051] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 784.665760][T14051] RBP: 00007ffb4f1d9090 R08: 0000000000000000 R09: 0000000000000000 [ 784.673725][T14051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 784.681690][T14051] R13: 00007ffb4e616038 R14: 00007ffb4e615fa0 R15: 00007ffea0024b08 [ 784.689679][T14051] [ 786.390895][T14065] syzkaller0: entered promiscuous mode [ 786.408726][T14065] syzkaller0: entered allmulticast mode [ 786.604795][T14070] netlink: 'syz.0.2135': attribute type 1 has an invalid length. [ 786.633365][T14070] netlink: 181400 bytes leftover after parsing attributes in process `syz.0.2135'. [ 786.646011][T14072] syzkaller0: entered promiscuous mode [ 786.651532][T14072] syzkaller0: entered allmulticast mode [ 786.750082][T14069] delete_channel: no stack [ 786.795740][T14067] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 790.601086][T14082] netlink: 14568 bytes leftover after parsing attributes in process `syz.0.2138'. [ 790.630285][T14090] netlink: 'syz.2.2141': attribute type 1 has an invalid length. [ 790.852242][T14097] syzkaller0: entered promiscuous mode [ 790.862797][T14097] syzkaller0: entered allmulticast mode [ 792.648111][T14115] syzkaller0: entered promiscuous mode [ 792.653720][T14115] syzkaller0: entered allmulticast mode [ 794.427566][T14132] syzkaller0: entered promiscuous mode [ 794.433092][T14132] syzkaller0: entered allmulticast mode [ 794.456238][T14139] netlink: 14568 bytes leftover after parsing attributes in process `syz.2.2153'. [ 796.116696][T14154] sit0: entered promiscuous mode [ 796.363316][T14164] syzkaller0: entered promiscuous mode [ 796.369084][T14164] syzkaller0: entered allmulticast mode [ 798.115680][T14179] netlink: 'syz.0.2165': attribute type 21 has an invalid length. [ 798.123697][T14179] netlink: 156 bytes leftover after parsing attributes in process `syz.0.2165'. [ 798.242777][ T5777] Bluetooth: hci1: unexpected event 0x04 length: 15 > 10 [ 798.244754][T14182] syzkaller0: entered promiscuous mode [ 798.257852][T14182] syzkaller0: entered allmulticast mode [ 800.308053][ T5777] Bluetooth: hci1: command 0x0406 tx timeout [ 801.543455][T14193] syzkaller0: entered promiscuous mode [ 801.549060][T14193] syzkaller0: entered allmulticast mode [ 801.689118][T14219] netlink: 209852 bytes leftover after parsing attributes in process `syz.2.2173'. [ 803.217776][T14219] debugfs: Directory '!!ô!' with parent 'ieee80211' already present! [ 803.470948][T14233] netlink: 209844 bytes leftover after parsing attributes in process `syz.3.2178'. [ 803.584474][T14237] netlink: 4595 bytes leftover after parsing attributes in process `syz.0.2177'. [ 803.618351][T14237] netlink: 4595 bytes leftover after parsing attributes in process `syz.0.2177'. [ 803.649893][T14236] netlink: 4595 bytes leftover after parsing attributes in process `syz.0.2177'. [ 803.680732][T14237] netlink: 4595 bytes leftover after parsing attributes in process `syz.0.2177'. [ 803.791513][T14243] syzkaller0: entered promiscuous mode [ 803.803800][T14243] syzkaller0: entered allmulticast mode [ 803.824884][T14237] netlink: 'syz.0.2177': attribute type 21 has an invalid length. [ 803.832967][T14237] IPv6: NLM_F_CREATE should be specified when creating new route [ 803.863224][T14236] netlink: 'syz.0.2177': attribute type 21 has an invalid length. [ 803.971757][T14244] syzkaller0: entered promiscuous mode [ 803.977755][T14244] syzkaller0: entered allmulticast mode [ 804.163128][T14259] : renamed from veth0_to_bond (while UP) [ 807.241975][T14266] syzkaller0: entered promiscuous mode [ 807.248184][T14266] syzkaller0: entered allmulticast mode [ 808.859988][ T1279] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.866401][ T1279] ieee802154 phy1 wpan1: encryption failed: -22 [ 812.081916][T14289] netlink: 'syz.4.2188': attribute type 5 has an invalid length. [ 812.229460][T14314] netlink: 10 bytes leftover after parsing attributes in process `syz.3.2194'. [ 812.368412][T14316] syzkaller0: entered promiscuous mode [ 812.389766][T14316] syzkaller0: entered allmulticast mode [ 814.576710][T14342] syzkaller0: entered promiscuous mode [ 814.582235][T14342] syzkaller0: entered allmulticast mode [ 816.241465][T14353] netlink: 'syz.4.2204': attribute type 10 has an invalid length. [ 816.249974][T14353] netlink: 156 bytes leftover after parsing attributes in process `syz.4.2204'. [ 816.278502][T14359] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2205'. [ 816.632634][T14371] : renamed from veth0_to_bond (while UP) [ 817.787808][T14372] ref_ctr_offset mismatch. inode: 0x8d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0xfe [ 819.831527][T14394] syzkaller0: entered promiscuous mode [ 819.870355][T14394] syzkaller0: entered allmulticast mode [ 819.958583][T14403] syzkaller0: entered promiscuous mode [ 819.965072][T14403] syzkaller0: entered allmulticast mode [ 820.035403][T14400] netlink: 'syz.4.2215': attribute type 10 has an invalid length. [ 820.043921][T14400] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 820.074068][T14400] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 820.091527][T14400] bond0: (slave batadv_slave_0): Enslaving as an active interface with an up link [ 820.472428][T14421] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2219'. [ 822.098520][T14421] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2219'. [ 822.107933][T14422] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2220'. [ 825.027448][T14469] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.2229'. [ 825.059618][T14469] debugfs: Directory '!!ô!' with parent 'ieee80211' already present! [ 825.145525][T14467] syzkaller0: entered promiscuous mode [ 825.152813][T14467] syzkaller0: entered allmulticast mode [ 825.537740][T14482] syzkaller0: entered promiscuous mode [ 825.543458][T14482] syzkaller0: entered allmulticast mode [ 825.891260][ T5084] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 825.906772][ T5084] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 825.916051][ T5084] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 825.927079][ T5084] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 825.940999][ T5084] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 825.956238][ T5084] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 828.054831][ T5084] Bluetooth: hci2: command tx timeout [ 829.371029][T14498] syzkaller0: entered promiscuous mode [ 829.378060][T14498] syzkaller0: entered allmulticast mode [ 829.522780][ T9885] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 830.138471][ T5084] Bluetooth: hci2: command tx timeout [ 831.251487][ T9885] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 831.276891][T14528] tap0: tun_chr_ioctl cmd 1074025677 [ 831.282497][T14528] tap0: linktype set to 0 [ 832.213748][ T5084] Bluetooth: hci2: command tx timeout [ 832.966997][ T9885] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.054739][T14537] syzkaller0: entered promiscuous mode [ 833.060649][T14537] syzkaller0: entered allmulticast mode [ 834.299858][ T5084] Bluetooth: hci2: command tx timeout [ 834.721948][ T9885] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 834.866079][T14552] syzkaller0: entered promiscuous mode [ 834.871610][T14552] syzkaller0: entered allmulticast mode [ 834.929010][T14563] TCP: TCP_TX_DELAY enabled [ 836.896297][T14570] syzkaller0: entered promiscuous mode [ 836.901847][T14570] syzkaller0: entered allmulticast mode [ 836.909246][T14573] netlink: 763 bytes leftover after parsing attributes in process `syz.0.2251'. [ 838.889369][T14590] syzkaller0: entered promiscuous mode [ 838.912651][T14590] syzkaller0: entered allmulticast mode [ 839.091539][T14602] netlink: 'syz.0.2258': attribute type 29 has an invalid length. [ 839.111043][T14603] netlink: 'syz.0.2258': attribute type 29 has an invalid length. [ 841.038659][T14602] netlink: 'syz.0.2258': attribute type 29 has an invalid length. [ 841.206770][T14609] syzkaller0: entered promiscuous mode [ 841.212312][T14609] syzkaller0: entered allmulticast mode [ 841.448294][T14488] chnl_net:caif_netlink_parms(): no params data found [ 843.480129][T14642] syzkaller0: entered promiscuous mode [ 843.493078][T14642] syzkaller0: entered allmulticast mode [ 845.497701][T14655] netlink: 76 bytes leftover after parsing attributes in process `syz.4.2266'. [ 845.732285][T14488] bridge0: port 1(bridge_slave_0) entered blocking state [ 845.739872][T14488] bridge0: port 1(bridge_slave_0) entered disabled state [ 845.747856][T14488] bridge_slave_0: entered allmulticast mode [ 845.755864][T14488] bridge_slave_0: entered promiscuous mode [ 845.765132][T14674] netlink: 'syz.4.2268': attribute type 13 has an invalid length. [ 845.773651][T14674] netlink: 24859 bytes leftover after parsing attributes in process `syz.4.2268'. [ 845.794973][T14674] netlink: 'syz.4.2268': attribute type 13 has an invalid length. [ 845.802843][T14674] netlink: 24859 bytes leftover after parsing attributes in process `syz.4.2268'. [ 845.851190][T14674] netlink: 'syz.4.2268': attribute type 13 has an invalid length. [ 845.871634][T14674] netlink: 24859 bytes leftover after parsing attributes in process `syz.4.2268'. [ 845.926767][T14488] bridge0: port 2(bridge_slave_1) entered blocking state [ 845.934731][T14488] bridge0: port 2(bridge_slave_1) entered disabled state [ 845.950245][T14488] bridge_slave_1: entered allmulticast mode [ 845.965404][T14488] bridge_slave_1: entered promiscuous mode [ 846.014715][T14488] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 846.036495][T14488] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 846.110083][T14680] syzkaller0: entered promiscuous mode [ 846.118413][T14680] syzkaller0: entered allmulticast mode [ 846.129797][T14674] netlink: 'syz.4.2268': attribute type 13 has an invalid length. [ 846.138934][T14674] netlink: 24859 bytes leftover after parsing attributes in process `syz.4.2268'. [ 846.215727][T14674] netlink: 'syz.4.2268': attribute type 13 has an invalid length. [ 846.224913][T14674] netlink: 24859 bytes leftover after parsing attributes in process `syz.4.2268'. [ 846.240636][T14674] netlink: 'syz.4.2268': attribute type 13 has an invalid length. [ 846.277091][T14674] netlink: 24859 bytes leftover after parsing attributes in process `syz.4.2268'. [ 846.329980][T14488] team0: Port device team_slave_0 added [ 846.337062][T14674] netlink: 'syz.4.2268': attribute type 13 has an invalid length. [ 846.345766][T14674] netlink: 24859 bytes leftover after parsing attributes in process `syz.4.2268'. [ 848.030511][T14488] team0: Port device team_slave_1 added [ 848.036749][T14674] netlink: 'syz.4.2268': attribute type 13 has an invalid length. [ 848.045298][T14674] netlink: 24859 bytes leftover after parsing attributes in process `syz.4.2268'. [ 848.084899][T14693] syzkaller0: entered promiscuous mode [ 848.090421][T14693] syzkaller0: entered allmulticast mode [ 850.323196][T14701] syzkaller0: entered promiscuous mode [ 850.328832][T14701] syzkaller0: entered allmulticast mode [ 850.354220][T14488] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 850.361209][T14488] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 850.396096][T14488] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 850.409710][T14488] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 850.416728][T14488] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 850.456309][T14488] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 852.509999][T14728] syzkaller0: entered promiscuous mode [ 852.516602][T14728] syzkaller0: entered allmulticast mode [ 854.301941][T14747] syzkaller0: entered promiscuous mode [ 854.307649][T14747] syzkaller0: entered allmulticast mode [ 856.592511][T14488] hsr_slave_0: entered promiscuous mode [ 856.599459][T14488] hsr_slave_1: entered promiscuous mode [ 856.605835][T14488] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 856.613412][T14488] Cannot create hsr debugfs directory [ 857.907312][ T9885] hsr_slave_0: left promiscuous mode [ 857.917410][ T9885] hsr_slave_1: left promiscuous mode [ 857.924872][ T9885] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 857.932556][ T9885] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 857.952695][ T9885] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 857.962059][ T9885] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 858.003952][ T9885] veth0_macvtap: left promiscuous mode [ 858.009958][ T9885] veth1_vlan: left promiscuous mode [ 858.706498][ T9885] team0 (unregistering): Port device 26±ÿ removed [ 858.752248][ T9885] team0 (unregistering): Port device team_slave_0 removed [ 859.252242][T14824] syzkaller0: entered promiscuous mode [ 859.257903][T14824] syzkaller0: entered allmulticast mode [ 860.834397][T14831] syzkaller0: entered promiscuous mode [ 860.839999][T14831] syzkaller0: entered allmulticast mode [ 860.969540][T14846] netlink: 'syz.4.2300': attribute type 3 has an invalid length. [ 860.977681][T14846] netlink: 13435 bytes leftover after parsing attributes in process `syz.4.2300'. [ 864.038999][T14858] syzkaller0: entered promiscuous mode [ 864.047297][T14858] syzkaller0: entered allmulticast mode [ 866.908104][T14885] netlink: 'syz.4.2304': attribute type 21 has an invalid length. [ 867.221744][T14488] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 867.242727][T14488] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 867.256781][T14488] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 867.284644][T14488] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 867.384711][T14905] syzkaller0: entered promiscuous mode [ 867.390201][T14905] syzkaller0: entered allmulticast mode [ 867.670918][ T9868] tipc: Subscription rejected, illegal request [ 869.579313][T14917] netlink: 112 bytes leftover after parsing attributes in process `syz.0.2309'. [ 869.707896][T14488] 8021q: adding VLAN 0 to HW filter on device bond0 [ 869.762229][T14488] 8021q: adding VLAN 0 to HW filter on device team0 [ 869.811541][ T9874] bridge0: port 1(bridge_slave_0) entered blocking state [ 869.818735][ T9874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 869.837191][T14937] netlink: 212940 bytes leftover after parsing attributes in process `syz.4.2314'. [ 869.850868][ T9872] bridge0: port 2(bridge_slave_1) entered blocking state [ 869.858036][ T9872] bridge0: port 2(bridge_slave_1) entered forwarding state [ 869.922357][T14936] syzkaller0: entered promiscuous mode [ 869.933420][T14936] syzkaller0: entered allmulticast mode [ 870.342281][ T1279] ieee802154 phy0 wpan0: encryption failed: -22 [ 870.368682][ T1279] ieee802154 phy1 wpan1: encryption failed: -22 [ 871.992134][T14957] syzkaller0: entered promiscuous mode [ 871.998296][T14957] syzkaller0: entered allmulticast mode [ 874.428317][T14981] netlink: 'syz.4.2317': attribute type 10 has an invalid length. [ 874.452047][T14981] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 874.482066][T14981] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 874.499511][T14986] bond0: entered promiscuous mode [ 874.504855][T14986] bond_slave_0: entered promiscuous mode [ 874.510691][T14986] bond_slave_1: entered promiscuous mode [ 874.533767][T14986] bridge0: entered promiscuous mode [ 874.542134][T14986] batadv_slave_0: entered promiscuous mode [ 874.548700][T14986] batadv0: entered promiscuous mode [ 874.640324][T14488] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 874.831684][T14488] veth0_vlan: entered promiscuous mode [ 874.889444][T15029] syzkaller0: entered promiscuous mode [ 874.897685][T15029] syzkaller0: entered allmulticast mode [ 874.923426][T15033] netlink: 6 bytes leftover after parsing attributes in process `syz.4.2323'. [ 874.943728][T15033] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 874.997136][T14488] veth1_vlan: entered promiscuous mode [ 878.321711][T15064] syzkaller0: entered promiscuous mode [ 878.361052][T15064] syzkaller0: entered allmulticast mode [ 883.116500][T14488] veth0_macvtap: entered promiscuous mode [ 883.137322][T14488] veth1_macvtap: entered promiscuous mode [ 883.219610][T14488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 883.253365][T14488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 883.285574][T14488] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 883.293008][T15098] netlink: 'syz.0.2335': attribute type 12 has an invalid length. [ 883.317341][T15098] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2335'. [ 883.364340][T14488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 883.403588][T14488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 883.425748][T15100] netlink: 205948 bytes leftover after parsing attributes in process `syz.3.2336'. [ 883.435477][T14488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 883.452123][T14488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 883.462875][T14488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 883.474463][T14488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 883.496262][T14488] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 883.580599][T14488] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 883.599101][T14488] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 883.610813][T14488] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 883.635472][T14488] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 883.877313][ T9874] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 883.908170][ T9874] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 884.028764][T15127] netlink: 'syz.4.2341': attribute type 1 has an invalid length. [ 884.042473][T15110] syzkaller0: entered promiscuous mode [ 884.051008][T15110] syzkaller0: entered allmulticast mode [ 884.054553][T15127] netlink: 112860 bytes leftover after parsing attributes in process `syz.4.2341'. [ 884.076885][T15127] netlink: 'syz.4.2341': attribute type 1 has an invalid length. [ 884.102077][ T9868] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 884.114017][ T9868] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 885.967322][ T5777] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 885.990661][ T5777] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 886.006477][ T5777] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 886.025724][ T5777] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 886.033795][ T5777] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 886.041167][ T5777] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 886.208819][T15135] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2343'. [ 886.337539][T15155] syzkaller0: entered promiscuous mode [ 886.343206][T15155] syzkaller0: entered allmulticast mode [ 886.605629][T15162] netlink: 'syz.4.2346': attribute type 3 has an invalid length. [ 886.610629][T15161] netlink: 'syz.4.2346': attribute type 3 has an invalid length. [ 886.613418][T15162] netlink: 130984 bytes leftover after parsing attributes in process `syz.4.2346'. [ 886.663805][T15161] netlink: 130984 bytes leftover after parsing attributes in process `syz.4.2346'. [ 888.147047][ T5084] Bluetooth: hci0: command tx timeout [ 888.849050][ T9876] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 888.892466][T15185] tap0: tun_chr_ioctl cmd 1074025677 [ 888.901080][T15185] tap0: linktype set to 805 [ 888.920391][T15152] chnl_net:caif_netlink_parms(): no params data found [ 888.992846][T15190] syzkaller0: entered promiscuous mode [ 888.998748][T15190] syzkaller0: entered allmulticast mode [ 889.098204][ T9876] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 889.207301][ T9876] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 890.217981][ T5084] Bluetooth: hci0: command tx timeout [ 890.874900][ T9876] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 890.908925][T15204] sit0: left promiscuous mode [ 890.983774][T15205] sit0: entered promiscuous mode [ 891.195306][T15152] bridge0: port 1(bridge_slave_0) entered blocking state [ 891.202463][T15152] bridge0: port 1(bridge_slave_0) entered disabled state [ 891.211780][T15152] bridge_slave_0: entered allmulticast mode [ 891.220932][T15152] bridge_slave_0: entered promiscuous mode [ 891.244492][T15152] bridge0: port 2(bridge_slave_1) entered blocking state [ 891.256109][T15152] bridge0: port 2(bridge_slave_1) entered disabled state [ 891.268354][T15152] bridge_slave_1: entered allmulticast mode [ 891.281436][T15152] bridge_slave_1: entered promiscuous mode [ 891.319580][T15225] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2360'. [ 891.336918][T15212] syzkaller0: entered promiscuous mode [ 891.342527][T15212] syzkaller0: entered allmulticast mode [ 891.370232][T15225] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2360'. [ 891.384118][T15221] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2360'. [ 891.517557][T15152] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 892.294188][ T5084] Bluetooth: hci0: command tx timeout [ 893.620202][T15152] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 893.645666][T15230] tap0: tun_chr_ioctl cmd 1074025677 [ 893.653903][T15230] tap0: linktype set to 805 [ 893.799000][T15152] team0: Port device team_slave_0 added [ 893.837921][T15152] team0: Port device team_slave_1 added [ 893.923259][T15152] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 893.941112][T15152] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 894.068702][T15152] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 894.125391][T15152] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 894.132369][T15152] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 894.236560][T15152] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 894.371238][T15247] syzkaller0: entered promiscuous mode [ 894.377044][ T5084] Bluetooth: hci0: command tx timeout [ 894.382578][T15247] syzkaller0: entered allmulticast mode [ 894.495560][T15268] pimreg: tun_chr_ioctl cmd 1074025677 [ 894.502306][T15268] pimreg: linktype set to 270 [ 896.337425][T15279] netlink: 3 bytes leftover after parsing attributes in process `syz.4.2370'. [ 896.427057][T15152] hsr_slave_0: entered promiscuous mode [ 896.484183][T15152] hsr_slave_1: entered promiscuous mode [ 896.504023][T15152] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 896.511630][T15152] Cannot create hsr debugfs directory [ 896.533203][T15289] netlink: 209852 bytes leftover after parsing attributes in process `syz.0.2372'. [ 896.753153][T15289] debugfs: Directory '!!ô!' with parent 'ieee80211' already present! [ 896.894227][T15291] syzkaller0: entered promiscuous mode [ 896.899942][T15291] syzkaller0: entered allmulticast mode [ 899.737583][T15320] syzkaller0: entered promiscuous mode [ 899.744751][T15320] syzkaller0: entered allmulticast mode [ 899.968228][T15341] netlink: 'syz.4.2382': attribute type 10 has an invalid length. [ 900.019917][T15341] team0: Port device geneve1 added [ 900.028490][T15345] netlink: 16186 bytes leftover after parsing attributes in process `syz.4.2382'. [ 900.041504][T15347] netlink: 'syz.4.2382': attribute type 10 has an invalid length. [ 900.148241][T15350] netlink: 48 bytes leftover after parsing attributes in process `syz.4.2382'. [ 900.307050][T15354] netlink: 144316 bytes leftover after parsing attributes in process `syz.4.2383'. [ 902.372536][T15359] syzkaller0: entered promiscuous mode [ 902.378263][T15359] syzkaller0: entered allmulticast mode [ 904.266871][T15368] syzkaller0: entered promiscuous mode [ 904.272383][T15368] syzkaller0: entered allmulticast mode [ 905.945290][ T9876] hsr_slave_0: left promiscuous mode [ 905.959322][ T9876] hsr_slave_1: left promiscuous mode [ 905.992107][ T9876] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 906.020779][ T9876] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 906.058063][ T9876] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 906.074532][ T9876] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 906.087601][ T9876] bridge_slave_1: left allmulticast mode [ 906.093680][ T9876] bridge_slave_1: left promiscuous mode [ 906.103790][ T9876] bridge0: port 2(bridge_slave_1) entered disabled state [ 906.117039][ T9876] bridge_slave_0: left allmulticast mode [ 906.130639][ T9876] bridge_slave_0: left promiscuous mode [ 906.139049][ T9876] bridge0: port 1(bridge_slave_0) entered disabled state [ 906.162825][ T9876] veth1_macvtap: left promiscuous mode [ 906.168520][ T9876] veth0_macvtap: left promiscuous mode [ 906.174195][ T9876] veth1_vlan: left promiscuous mode [ 906.180607][ T9876] veth0_vlan: left promiscuous mode [ 906.732024][ T9876] team0 (unregistering): Port device team_slave_1 removed [ 906.779212][ T9876] team0 (unregistering): Port device team_slave_0 removed [ 906.822726][ T9876] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 906.870030][ T9876] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 907.197767][ T9876] bond0 (unregistering): Released all slaves [ 907.572720][T15152] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 907.647033][T15396] netlink: 'syz.4.2391': attribute type 10 has an invalid length. [ 907.734084][T15396] netlink: 55 bytes leftover after parsing attributes in process `syz.4.2391'. [ 908.495219][T15152] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 908.523428][T15395] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2392'. [ 908.555404][T15410] netlink: 'syz.0.2394': attribute type 2 has an invalid length. [ 908.574711][T15411] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 908.601792][T15152] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 908.663361][T15152] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 908.885593][T15425] syzkaller0: entered promiscuous mode [ 908.905917][T15425] syzkaller0: entered allmulticast mode [ 910.869365][T15152] 8021q: adding VLAN 0 to HW filter on device bond0 [ 910.947251][T15152] 8021q: adding VLAN 0 to HW filter on device team0 [ 910.997349][ T9886] bridge0: port 1(bridge_slave_0) entered blocking state [ 911.004555][ T9886] bridge0: port 1(bridge_slave_0) entered forwarding state [ 911.055635][ T9876] bridge0: port 2(bridge_slave_1) entered blocking state [ 911.062855][ T9876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 911.335087][T15466] syzkaller0: entered promiscuous mode [ 911.353433][T15466] syzkaller0: entered allmulticast mode [ 913.708946][T15496] netlink: 830 bytes leftover after parsing attributes in process `syz.0.2404'. [ 913.721625][T15498] netlink: 'syz.4.2405': attribute type 21 has an invalid length. [ 913.729627][T15498] netlink: 176 bytes leftover after parsing attributes in process `syz.4.2405'. [ 915.777037][T15514] syzkaller0: entered promiscuous mode [ 915.782564][T15514] syzkaller0: entered allmulticast mode [ 917.587145][T15152] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 917.687472][T15152] veth0_vlan: entered promiscuous mode [ 917.718834][T15152] veth1_vlan: entered promiscuous mode [ 917.807975][T15152] veth0_macvtap: entered promiscuous mode [ 917.821430][T15152] veth1_macvtap: entered promiscuous mode [ 917.851388][T15541] mac80211_hwsim hwsim16 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 917.869165][T15152] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 917.880133][T15152] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 917.893815][T15152] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 917.903738][T15540] netlink: 'syz.3.2411': attribute type 39 has an invalid length. [ 917.935473][T15152] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 917.974922][T15152] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 917.987122][T15152] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 918.001052][T15152] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 918.023806][T15152] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 918.035823][T15152] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 918.049393][T15152] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 918.062815][T15152] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 918.077183][T15152] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 918.086893][T15152] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 918.096244][T15152] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 918.264927][ T9876] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 918.291436][ T9876] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 918.380363][ T9876] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 918.412378][ T9876] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 918.600697][T15564] netlink: 'syz.2.2234': attribute type 29 has an invalid length. [ 920.276364][T15564] netlink: 'syz.2.2234': attribute type 29 has an invalid length. [ 920.310047][T15565] syzkaller0: entered promiscuous mode [ 920.315562][T15565] syzkaller0: entered allmulticast mode [ 920.598939][T15583] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 920.605941][T15583] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 922.056536][ T9886] wlan1: Trigger new scan to find an IBSS to join [ 922.611187][T15592] netlink: 'syz.3.2423': attribute type 10 has an invalid length. [ 922.932114][T15596] syzkaller0: entered promiscuous mode [ 922.956967][T15596] syzkaller0: entered allmulticast mode [ 923.282771][ T5777] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 923.292178][ T5777] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 923.301447][ T5777] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 923.318030][ T5777] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 923.329936][ T5777] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 923.339634][ T5777] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 925.132713][ T9871] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 925.417635][ T5777] Bluetooth: hci1: command tx timeout [ 926.059966][ T9876] wlan1: Trigger new scan to find an IBSS to join [ 926.171150][ T9876] wlan1: Creating new IBSS network, BSSID 62:a1:e9:09:ca:33 [ 927.026093][ T9871] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 927.128787][T15621] syzkaller0: entered promiscuous mode [ 927.137777][T15621] syzkaller0: entered allmulticast mode [ 927.503861][ T5777] Bluetooth: hci1: command tx timeout [ 928.956641][ T9871] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 929.042444][T15640] syzkaller0: entered promiscuous mode [ 929.055069][T15640] syzkaller0: entered allmulticast mode [ 929.589313][ T5777] Bluetooth: hci1: command tx timeout [ 931.461649][ T9871] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 931.551546][T15651] syzkaller0: entered promiscuous mode [ 931.560015][T15651] syzkaller0: entered allmulticast mode [ 931.657073][ T5777] Bluetooth: hci1: command tx timeout [ 931.737818][ T1279] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.744294][ T1279] ieee802154 phy1 wpan1: encryption failed: -22 [ 933.869047][T15694] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 933.940118][T15694] syzkaller0: entered promiscuous mode [ 933.947782][T15694] syzkaller0: entered allmulticast mode [ 934.036126][T15692] syzkaller0: entered promiscuous mode [ 934.041700][T15692] syzkaller0: entered allmulticast mode [ 938.558311][T15604] chnl_net:caif_netlink_parms(): no params data found [ 938.643296][T15720] syzkaller0: entered promiscuous mode [ 938.670875][T15720] syzkaller0: entered allmulticast mode [ 940.576358][T15740] FAULT_INJECTION: forcing a failure. [ 940.576358][T15740] name failslab, interval 1, probability 0, space 0, times 0 [ 940.590076][T15740] CPU: 0 PID: 15740 Comm: syz.3.2453 Not tainted syzkaller #0 [ 940.597654][T15740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 940.607732][T15740] Call Trace: [ 940.611028][T15740] [ 940.613971][T15740] dump_stack_lvl+0x18c/0x250 [ 940.618668][T15740] ? show_regs_print_info+0x20/0x20 [ 940.623894][T15740] ? load_image+0x400/0x400 [ 940.628421][T15740] ? __might_sleep+0xe0/0xe0 [ 940.633034][T15740] ? __lock_acquire+0x7d40/0x7d40 [ 940.638078][T15740] should_fail_ex+0x39d/0x4d0 [ 940.642784][T15740] should_failslab+0x9/0x20 [ 940.647312][T15740] slab_pre_alloc_hook+0x59/0x310 [ 940.652359][T15740] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 940.658089][T15740] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 940.663824][T15740] __kmem_cache_alloc_node+0x53/0x250 [ 940.669223][T15740] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 940.674972][T15740] __kmalloc+0xa4/0x230 [ 940.679146][T15740] tomoyo_realpath_from_path+0xe3/0x5d0 [ 940.684720][T15740] tomoyo_path_number_perm+0x248/0x620 [ 940.690203][T15740] ? tomoyo_path_number_perm+0x217/0x620 [ 940.695856][T15740] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 940.701333][T15740] ? ksys_write+0x1c4/0x260 [ 940.705861][T15740] ? __fget_files+0x28/0x4b0 [ 940.710443][T15740] ? __fget_files+0x28/0x4b0 [ 940.715036][T15740] security_file_ioctl+0x70/0xa0 [ 940.719971][T15740] __se_sys_ioctl+0x48/0x170 [ 940.724556][T15740] do_syscall_64+0x55/0xa0 [ 940.728964][T15740] ? clear_bhb_loop+0x40/0x90 [ 940.733629][T15740] ? clear_bhb_loop+0x40/0x90 [ 940.738297][T15740] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 940.744179][T15740] RIP: 0033:0x7ffb4e39aeb9 [ 940.748587][T15740] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 940.768185][T15740] RSP: 002b:00007ffb4f1d9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 940.776592][T15740] RAX: ffffffffffffffda RBX: 00007ffb4e615fa0 RCX: 00007ffb4e39aeb9 [ 940.784559][T15740] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000004 [ 940.792522][T15740] RBP: 00007ffb4f1d9090 R08: 0000000000000000 R09: 0000000000000000 [ 940.800481][T15740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 940.808443][T15740] R13: 00007ffb4e616038 R14: 00007ffb4e615fa0 R15: 00007ffea0024b08 [ 940.816416][T15740] [ 940.854255][T15740] ERROR: Out of memory at tomoyo_realpath_from_path. [ 940.909971][T15604] bridge0: port 1(bridge_slave_0) entered blocking state [ 940.930998][T15604] bridge0: port 1(bridge_slave_0) entered disabled state [ 940.939098][T15604] bridge_slave_0: entered allmulticast mode [ 940.950413][T15604] bridge_slave_0: entered promiscuous mode [ 941.111200][T15604] bridge0: port 2(bridge_slave_1) entered blocking state [ 941.148903][T15604] bridge0: port 2(bridge_slave_1) entered disabled state [ 941.178482][T15604] bridge_slave_1: entered allmulticast mode [ 941.201091][T15604] bridge_slave_1: entered promiscuous mode [ 941.325957][T15758] syzkaller0: entered promiscuous mode [ 941.331481][T15758] syzkaller0: entered allmulticast mode [ 941.465080][T15604] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 941.511649][T15604] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 947.058991][T15788] syzkaller0: entered promiscuous mode [ 947.064646][T15788] syzkaller0: entered allmulticast mode [ 948.717759][T15604] team0: Port device team_slave_0 added [ 948.756588][T15604] team0: Port device team_slave_1 added [ 948.860043][T15604] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 948.877087][T15604] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 948.890926][T15802] FAULT_INJECTION: forcing a failure. [ 948.890926][T15802] name failslab, interval 1, probability 0, space 0, times 0 [ 948.930305][T15604] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 948.952773][T15802] CPU: 0 PID: 15802 Comm: syz.4.2463 Not tainted syzkaller #0 [ 948.960276][T15802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 948.970348][T15802] Call Trace: [ 948.973640][T15802] [ 948.976584][T15802] dump_stack_lvl+0x18c/0x250 [ 948.976880][T15604] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 948.981265][T15802] ? show_regs_print_info+0x20/0x20 [ 948.981291][T15802] ? load_image+0x400/0x400 [ 948.997928][T15802] ? __might_sleep+0xe0/0xe0 [ 949.002642][T15802] ? __lock_acquire+0x7d40/0x7d40 [ 949.007692][T15802] should_fail_ex+0x39d/0x4d0 [ 949.012379][T15802] should_failslab+0x9/0x20 [ 949.016887][T15802] slab_pre_alloc_hook+0x59/0x310 [ 949.021918][T15802] ? tomoyo_encode+0x28b/0x540 [ 949.026681][T15802] ? tomoyo_encode+0x28b/0x540 [ 949.031441][T15802] __kmem_cache_alloc_node+0x53/0x250 [ 949.036818][T15802] ? tomoyo_encode+0x28b/0x540 [ 949.041573][T15802] __kmalloc+0xa4/0x230 [ 949.045747][T15802] tomoyo_encode+0x28b/0x540 [ 949.050364][T15802] tomoyo_realpath_from_path+0x592/0x5d0 [ 949.056012][T15802] tomoyo_path_number_perm+0x248/0x620 [ 949.061474][T15802] ? tomoyo_path_number_perm+0x217/0x620 [ 949.067192][T15802] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 949.072652][T15802] ? ksys_write+0x1c4/0x260 [ 949.077174][T15802] ? __fget_files+0x28/0x4b0 [ 949.081759][T15802] ? __fget_files+0x28/0x4b0 [ 949.086352][T15802] security_file_ioctl+0x70/0xa0 [ 949.091291][T15802] __se_sys_ioctl+0x48/0x170 [ 949.095878][T15802] do_syscall_64+0x55/0xa0 [ 949.100305][T15802] ? clear_bhb_loop+0x40/0x90 [ 949.104987][T15802] ? clear_bhb_loop+0x40/0x90 [ 949.109653][T15802] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 949.115536][T15802] RIP: 0033:0x7f701cb9aeb9 [ 949.120377][T15802] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 949.139976][T15802] RSP: 002b:00007f701db07028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 949.148382][T15802] RAX: ffffffffffffffda RBX: 00007f701ce15fa0 RCX: 00007f701cb9aeb9 [ 949.156345][T15802] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000004 [ 949.164307][T15802] RBP: 00007f701db07090 R08: 0000000000000000 R09: 0000000000000000 [ 949.172269][T15802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 949.180230][T15802] R13: 00007f701ce16038 R14: 00007f701ce15fa0 R15: 00007ffe69211308 [ 949.188206][T15802] [ 949.192612][T15604] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 949.194105][T15802] ERROR: Out of memory at tomoyo_realpath_from_path. [ 949.349478][T15604] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 949.418272][ T9871] hsr_slave_0: left promiscuous mode [ 949.478073][ T9871] hsr_slave_1: left promiscuous mode [ 949.489481][ T9871] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 949.509199][ T9871] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 949.541637][ T9871] veth1_macvtap: left promiscuous mode [ 949.548184][ T9871] veth0_macvtap: left promiscuous mode [ 949.554165][ T9871] veth1_vlan: left allmulticast mode [ 949.559818][ T9871] veth1_vlan: left promiscuous mode [ 950.028792][ T9871] macvlan0 (unregistering): left promiscuous mode [ 950.037631][ T9871] macvlan0 (unregistering): left allmulticast mode [ 950.047883][ T9871] team0 (unregistering): Port device macvlan0 removed [ 950.348185][ T9871] team_slave_1 (unregistering): left promiscuous mode [ 950.355749][ T9871] team_slave_1 (unregistering): left allmulticast mode [ 950.363440][ T9871] team0 (unregistering): Port device team_slave_1 removed [ 950.406486][ T9871] C (unregistering): left promiscuous mode [ 950.412343][ T9871] C (unregistering): left allmulticast mode [ 950.420597][ T9871] team0 (unregistering): Port device C removed [ 950.811223][T15812] netlink: 830 bytes leftover after parsing attributes in process `syz.3.2464'. [ 951.027109][T15604] hsr_slave_0: entered promiscuous mode [ 951.068944][T15604] hsr_slave_1: entered promiscuous mode [ 951.083692][T15604] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 951.129939][T15604] Cannot create hsr debugfs directory [ 951.410985][T15839] syzkaller0: entered promiscuous mode [ 951.422719][T15839] syzkaller0: entered allmulticast mode [ 953.342298][T15860] FAULT_INJECTION: forcing a failure. [ 953.342298][T15860] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 953.362041][T15860] CPU: 0 PID: 15860 Comm: syz.2.2475 Not tainted syzkaller #0 [ 953.369561][T15860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 953.379628][T15860] Call Trace: [ 953.382909][T15860] [ 953.385839][T15860] dump_stack_lvl+0x18c/0x250 [ 953.390527][T15860] ? show_regs_print_info+0x20/0x20 [ 953.395728][T15860] ? load_image+0x400/0x400 [ 953.400232][T15860] ? __might_fault+0xaa/0x120 [ 953.404903][T15860] ? __lock_acquire+0x7d40/0x7d40 [ 953.409926][T15860] should_fail_ex+0x39d/0x4d0 [ 953.414607][T15860] _copy_from_user+0x2f/0xe0 [ 953.419194][T15860] get_user_ifreq+0x6b/0x180 [ 953.423788][T15860] sock_ioctl+0x6f1/0x7e0 [ 953.428112][T15860] ? sock_poll+0x3e0/0x3e0 [ 953.432532][T15860] ? bpf_lsm_file_ioctl+0x9/0x10 [ 953.437458][T15860] ? security_file_ioctl+0x80/0xa0 [ 953.442564][T15860] ? sock_poll+0x3e0/0x3e0 [ 953.446972][T15860] __se_sys_ioctl+0xfd/0x170 [ 953.451558][T15860] do_syscall_64+0x55/0xa0 [ 953.455971][T15860] ? clear_bhb_loop+0x40/0x90 [ 953.460637][T15860] ? clear_bhb_loop+0x40/0x90 [ 953.465307][T15860] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 953.471206][T15860] RIP: 0033:0x7fb87cd9aeb9 [ 953.475615][T15860] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 953.495219][T15860] RSP: 002b:00007fb87dc8e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 953.503631][T15860] RAX: ffffffffffffffda RBX: 00007fb87d015fa0 RCX: 00007fb87cd9aeb9 [ 953.511596][T15860] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000004 [ 953.519567][T15860] RBP: 00007fb87dc8e090 R08: 0000000000000000 R09: 0000000000000000 [ 953.527530][T15860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 953.535492][T15860] R13: 00007fb87d016038 R14: 00007fb87d015fa0 R15: 00007fff1d0c3448 [ 953.543475][T15860] [ 957.517061][T15875] netlink: 'syz.4.2479': attribute type 4 has an invalid length. [ 957.556097][T15875] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.2479'. [ 959.634876][T15906] FAULT_INJECTION: forcing a failure. [ 959.634876][T15906] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 959.652192][T15906] CPU: 1 PID: 15906 Comm: syz.4.2483 Not tainted syzkaller #0 [ 959.659690][T15906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 959.669762][T15906] Call Trace: [ 959.673040][T15906] [ 959.675982][T15906] dump_stack_lvl+0x18c/0x250 [ 959.680678][T15906] ? show_regs_print_info+0x20/0x20 [ 959.685881][T15906] ? load_image+0x400/0x400 [ 959.690378][T15906] ? __might_fault+0xaa/0x120 [ 959.695059][T15906] ? __lock_acquire+0x7d40/0x7d40 [ 959.700096][T15906] ? __schedule+0x155b/0x45a0 [ 959.704781][T15906] should_fail_ex+0x39d/0x4d0 [ 959.709471][T15906] _copy_from_user+0x2f/0xe0 [ 959.714067][T15906] ip_tunnel_siocdevprivate+0xc2/0x1f0 [ 959.719541][T15906] ? ip_tunnel_update+0xb10/0xb10 [ 959.724576][T15906] ? __mutex_lock+0x94c/0xcc0 [ 959.729265][T15906] ? __lock_acquire+0x7d40/0x7d40 [ 959.734284][T15906] ? do_raw_spin_lock+0x11f/0x2c0 [ 959.739318][T15906] ipip6_tunnel_siocdevprivate+0x363/0x16f0 [ 959.745206][T15906] ? do_raw_spin_unlock+0x121/0x230 [ 959.750398][T15906] ? sit_tunnel_xmit+0x2010/0x2010 [ 959.755515][T15906] ? __mutex_lock+0x956/0xcc0 [ 959.760203][T15906] ? __mutex_lock+0x4f9/0xcc0 [ 959.764891][T15906] ? dev_ioctl+0x83c/0x1140 [ 959.769406][T15906] ? mutex_lock_nested+0x20/0x20 [ 959.774350][T15906] ? full_name_hash+0x92/0xe0 [ 959.779038][T15906] ? dev_ifsioc+0x958/0xc40 [ 959.783550][T15906] dev_ioctl+0x84c/0x1140 [ 959.787902][T15906] sock_ioctl+0x74c/0x7e0 [ 959.792253][T15906] ? sock_poll+0x3e0/0x3e0 [ 959.796702][T15906] ? bpf_lsm_file_ioctl+0x9/0x10 [ 959.801663][T15906] ? security_file_ioctl+0x80/0xa0 [ 959.806791][T15906] ? sock_poll+0x3e0/0x3e0 [ 959.811213][T15906] __se_sys_ioctl+0xfd/0x170 [ 959.815819][T15906] do_syscall_64+0x55/0xa0 [ 959.820246][T15906] ? clear_bhb_loop+0x40/0x90 [ 959.824914][T15906] ? clear_bhb_loop+0x40/0x90 [ 959.829599][T15906] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 959.835496][T15906] RIP: 0033:0x7f701cb9aeb9 [ 959.839921][T15906] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 959.859525][T15906] RSP: 002b:00007f701db07028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 959.867937][T15906] RAX: ffffffffffffffda RBX: 00007f701ce15fa0 RCX: 00007f701cb9aeb9 [ 959.875919][T15906] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000004 [ 959.883912][T15906] RBP: 00007f701db07090 R08: 0000000000000000 R09: 0000000000000000 [ 959.891892][T15906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 959.899861][T15906] R13: 00007f701ce16038 R14: 00007f701ce15fa0 R15: 00007ffe69211308 [ 959.907844][T15906] [ 961.967251][T15919] syzkaller0: entered promiscuous mode [ 961.972777][T15919] syzkaller0: entered allmulticast mode [ 963.835623][T15604] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 963.849017][T15604] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 963.867441][T15604] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 963.895214][T15604] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 964.002196][T15944] netlink: 'syz.3.2491': attribute type 29 has an invalid length. [ 964.039415][T15944] netlink: 'syz.3.2491': attribute type 29 has an invalid length. [ 964.199025][T15953] syzkaller0: entered promiscuous mode [ 964.213899][T15953] syzkaller0: entered allmulticast mode [ 964.232932][T15960] FAULT_INJECTION: forcing a failure. [ 964.232932][T15960] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 964.256809][T15960] CPU: 1 PID: 15960 Comm: syz.3.2492 Not tainted syzkaller #0 [ 964.264322][T15960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 964.274397][T15960] Call Trace: [ 964.277704][T15960] [ 964.280648][T15960] dump_stack_lvl+0x18c/0x250 [ 964.285352][T15960] ? show_regs_print_info+0x20/0x20 [ 964.290579][T15960] ? load_image+0x400/0x400 [ 964.295106][T15960] ? __might_fault+0xaa/0x120 [ 964.299821][T15960] ? __lock_acquire+0x7d40/0x7d40 [ 964.304865][T15960] should_fail_ex+0x39d/0x4d0 [ 964.309602][T15960] _copy_to_user+0x2f/0xa0 [ 964.314044][T15960] ip_tunnel_siocdevprivate+0x162/0x1f0 [ 964.319715][T15960] ? ip_tunnel_update+0xb10/0xb10 [ 964.324767][T15960] ? __mutex_lock+0x94c/0xcc0 [ 964.329463][T15960] ? __lock_acquire+0x7d40/0x7d40 [ 964.334506][T15960] ? do_raw_spin_lock+0x11f/0x2c0 [ 964.339557][T15960] ipip6_tunnel_siocdevprivate+0x363/0x16f0 [ 964.345480][T15960] ? do_raw_spin_unlock+0x121/0x230 [ 964.350702][T15960] ? sit_tunnel_xmit+0x2010/0x2010 [ 964.355833][T15960] ? __mutex_lock+0x956/0xcc0 [ 964.360529][T15960] ? __mutex_lock+0x4f9/0xcc0 [ 964.365230][T15960] ? dev_ioctl+0x83c/0x1140 [ 964.369750][T15960] ? mutex_lock_nested+0x20/0x20 [ 964.374702][T15960] ? full_name_hash+0x92/0xe0 [ 964.379414][T15960] ? dev_ifsioc+0x958/0xc40 [ 964.383942][T15960] dev_ioctl+0x84c/0x1140 [ 964.388311][T15960] sock_ioctl+0x74c/0x7e0 [ 964.392675][T15960] ? sock_poll+0x3e0/0x3e0 [ 964.397106][T15960] ? bpf_lsm_file_ioctl+0x9/0x10 [ 964.402047][T15960] ? security_file_ioctl+0x80/0xa0 [ 964.407178][T15960] ? sock_poll+0x3e0/0x3e0 [ 964.411598][T15960] __se_sys_ioctl+0xfd/0x170 [ 964.416198][T15960] do_syscall_64+0x55/0xa0 [ 964.420614][T15960] ? clear_bhb_loop+0x40/0x90 [ 964.425286][T15960] ? clear_bhb_loop+0x40/0x90 [ 964.429959][T15960] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 964.435857][T15960] RIP: 0033:0x7ffb4e39aeb9 [ 964.440278][T15960] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 964.459881][T15960] RSP: 002b:00007ffb4f1d9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 964.468292][T15960] RAX: ffffffffffffffda RBX: 00007ffb4e615fa0 RCX: 00007ffb4e39aeb9 [ 964.476259][T15960] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000004 [ 964.484361][T15960] RBP: 00007ffb4f1d9090 R08: 0000000000000000 R09: 0000000000000000 [ 964.492330][T15960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 964.500335][T15960] R13: 00007ffb4e616038 R14: 00007ffb4e615fa0 R15: 00007ffea0024b08 [ 964.508318][T15960] [ 964.615419][T15604] 8021q: adding VLAN 0 to HW filter on device bond0 [ 966.760968][T15604] 8021q: adding VLAN 0 to HW filter on device team0 [ 966.799105][ T9871] bridge0: port 1(bridge_slave_0) entered blocking state [ 966.806405][ T9871] bridge0: port 1(bridge_slave_0) entered forwarding state [ 966.910517][ T9871] bridge0: port 2(bridge_slave_1) entered blocking state [ 966.917718][ T9871] bridge0: port 2(bridge_slave_1) entered forwarding state [ 966.977207][T15994] netlink: 'syz.2.2498': attribute type 10 has an invalid length. [ 967.061784][T15994] team0: Port device dummy0 added [ 967.260926][T15999] netlink: 'syz.4.2499': attribute type 1 has an invalid length. [ 970.624623][T16022] FAULT_INJECTION: forcing a failure. [ 970.624623][T16022] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 970.653625][T16022] CPU: 0 PID: 16022 Comm: syz.2.2503 Not tainted syzkaller #0 [ 970.656095][T15604] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 970.661129][T16022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 970.681504][T16022] Call Trace: [ 970.684778][T16022] [ 970.687701][T16022] dump_stack_lvl+0x18c/0x250 [ 970.692379][T16022] ? show_regs_print_info+0x20/0x20 [ 970.697572][T16022] ? load_image+0x400/0x400 [ 970.702070][T16022] ? __lock_acquire+0x7d40/0x7d40 [ 970.707091][T16022] should_fail_ex+0x39d/0x4d0 [ 970.711766][T16022] _copy_to_user+0x2f/0xa0 [ 970.716177][T16022] put_user_ifreq+0x78/0xb0 [ 970.720673][T16022] sock_ioctl+0x77b/0x7e0 [ 970.724999][T16022] ? sock_poll+0x3e0/0x3e0 [ 970.729413][T16022] ? bpf_lsm_file_ioctl+0x9/0x10 [ 970.734340][T16022] ? security_file_ioctl+0x80/0xa0 [ 970.739448][T16022] ? sock_poll+0x3e0/0x3e0 [ 970.743854][T16022] __se_sys_ioctl+0xfd/0x170 [ 970.748523][T16022] do_syscall_64+0x55/0xa0 [ 970.752931][T16022] ? clear_bhb_loop+0x40/0x90 [ 970.757604][T16022] ? clear_bhb_loop+0x40/0x90 [ 970.762284][T16022] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 970.768169][T16022] RIP: 0033:0x7fb87cd9aeb9 [ 970.772577][T16022] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 970.792189][T16022] RSP: 002b:00007fb87dc8e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 970.800689][T16022] RAX: ffffffffffffffda RBX: 00007fb87d015fa0 RCX: 00007fb87cd9aeb9 [ 970.808656][T16022] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000004 [ 970.816620][T16022] RBP: 00007fb87dc8e090 R08: 0000000000000000 R09: 0000000000000000 [ 970.824594][T16022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 970.832558][T16022] R13: 00007fb87d016038 R14: 00007fb87d015fa0 R15: 00007fff1d0c3448 [ 970.840534][T16022] [ 971.215726][T16038] syzkaller0: entered promiscuous mode [ 971.221501][T16038] syzkaller0: entered allmulticast mode [ 974.730340][T16095] netlink: 201392 bytes leftover after parsing attributes in process `syz.4.2514'. [ 974.745338][T16094] netlink: 201392 bytes leftover after parsing attributes in process `syz.4.2514'. [ 974.753807][T16095] netlink: zone id is out of range [ 974.755577][T16094] netlink: zone id is out of range [ 974.765897][T16094] netlink: zone id is out of range [ 974.771585][T16094] netlink: zone id is out of range [ 974.774828][T16095] netlink: zone id is out of range [ 974.777455][T16094] netlink: zone id is out of range [ 974.782020][T16095] netlink: zone id is out of range [ 974.790485][T16094] netlink: zone id is out of range [ 974.798119][T16094] netlink: zone id is out of range [ 974.803972][T16094] netlink: zone id is out of range [ 976.314637][T16108] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.2518'. [ 976.358404][T15604] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 976.500701][T15604] veth0_vlan: entered promiscuous mode [ 976.576521][T16118] syzkaller0: entered promiscuous mode [ 976.587278][T16118] syzkaller0: entered allmulticast mode [ 976.602030][T15604] veth1_vlan: entered promiscuous mode [ 976.725295][T16121] netlink: 'syz.2.2521': attribute type 21 has an invalid length. [ 976.738280][T16121] netlink: 156 bytes leftover after parsing attributes in process `syz.2.2521'. [ 977.477164][T16135] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 978.892103][T15604] veth0_macvtap: entered promiscuous mode [ 978.902193][T15604] veth1_macvtap: entered promiscuous mode [ 978.931827][T15604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 978.943175][T15604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 978.953261][T15604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 978.966661][T15604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 978.988477][T15604] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 979.016349][T15604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 979.053556][T15604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 979.063417][T15604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 979.096440][T15604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 979.106964][T15604] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 979.118848][T15604] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 979.131660][T15604] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 979.148413][T15604] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 979.161840][T15604] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 979.172066][T15604] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 979.187115][T15604] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 979.208090][T16154] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2532'. [ 979.387410][ T9889] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 979.413546][ T9889] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 979.481959][ T9886] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 979.493798][ T9886] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 979.694593][T16171] netlink: 18187 bytes leftover after parsing attributes in process `syz.0.2424'. [ 980.402196][T16181] syzkaller0: entered promiscuous mode [ 980.408364][T16181] syzkaller0: entered allmulticast mode [ 980.796947][T16197] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 980.820720][T16197] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 980.838816][T16197] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 980.873861][T16197] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 980.899790][T16197] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 980.914401][T16197] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 982.832574][ T9871] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 982.920792][T16196] chnl_net:caif_netlink_parms(): no params data found [ 983.014907][T16197] Bluetooth: hci2: command tx timeout [ 983.081237][ T9871] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 983.231206][ T9871] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 983.413067][ T9871] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 983.502911][T16196] bridge0: port 1(bridge_slave_0) entered blocking state [ 983.518315][T16196] bridge0: port 1(bridge_slave_0) entered disabled state [ 983.531465][T16196] bridge_slave_0: entered allmulticast mode [ 983.543174][T16196] bridge_slave_0: entered promiscuous mode [ 983.601232][T16196] bridge0: port 2(bridge_slave_1) entered blocking state [ 983.608752][T16196] bridge0: port 2(bridge_slave_1) entered disabled state [ 983.617439][T16196] bridge_slave_1: entered allmulticast mode [ 983.625643][T16196] bridge_slave_1: entered promiscuous mode [ 983.682676][T16196] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 983.700650][T16196] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 983.849420][T16196] team0: Port device team_slave_0 added [ 983.859781][T16196] team0: Port device team_slave_1 added [ 983.982242][T16196] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 983.990126][T16196] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 984.017255][T16196] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 984.107663][T16196] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 984.116625][T16196] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 984.148513][T16196] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 984.346754][T16196] hsr_slave_0: entered promiscuous mode [ 984.366216][T16196] hsr_slave_1: entered promiscuous mode [ 984.373398][T16196] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 984.395132][T16196] Cannot create hsr debugfs directory [ 985.107528][T16197] Bluetooth: hci2: command tx timeout [ 986.892480][T16274] netlink: 'syz.4.2559': attribute type 41 has an invalid length. [ 987.183744][T16197] Bluetooth: hci2: command tx timeout [ 987.729318][T16288] syzkaller0: entered promiscuous mode [ 987.740207][T16288] syzkaller0: entered allmulticast mode [ 987.905765][ T9871] [ 987.908144][ T9871] ====================================================== [ 987.915176][ T9871] WARNING: possible circular locking dependency detected [ 987.922218][ T9871] syzkaller #0 Not tainted [ 987.926639][ T9871] ------------------------------------------------------ [ 987.933659][ T9871] kworker/u4:16/9871 is trying to acquire lock: [ 987.939896][ T9871] ffff888060a1cd00 (team->team_lock_key){+.+.}-{3:3}, at: team_del_slave+0x32/0x1c0 [ 987.949325][ T9871] [ 987.949325][ T9871] but task is already holding lock: [ 987.956681][ T9871] ffff88801bb10768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: ieee80211_remove_interfaces+0x29a/0x690 [ 987.967045][ T9871] [ 987.967045][ T9871] which lock already depends on the new lock. [ 987.967045][ T9871] [ 987.977448][ T9871] [ 987.977448][ T9871] the existing dependency chain (in reverse order) is: [ 987.986470][ T9871] [ 987.986470][ T9871] -> #1 (&rdev->wiphy.mtx){+.+.}-{3:3}: [ 987.994209][ T9871] __mutex_lock+0x136/0xcc0 [ 987.999243][ T9871] ieee80211_open+0x144/0x200 [ 988.004441][ T9871] __dev_open+0x2cb/0x430 [ 988.009291][ T9871] dev_open+0xab/0x190 [ 988.013883][ T9871] team_add_slave+0x75f/0x29a0 [ 988.019205][ T9871] do_setlink+0xdfe/0x4130 [ 988.024159][ T9871] rtnl_newlink+0x17da/0x20a0 [ 988.029383][ T9871] rtnetlink_rcv_msg+0x869/0xfa0 [ 988.034854][ T9871] netlink_rcv_skb+0x241/0x4d0 [ 988.040152][ T9871] netlink_unicast+0x751/0x8d0 [ 988.045452][ T9871] netlink_sendmsg+0x8d0/0xbf0 [ 988.050745][ T9871] ____sys_sendmsg+0x5ba/0x960 [ 988.056042][ T9871] ___sys_sendmsg+0x2a6/0x360 [ 988.061249][ T9871] __se_sys_sendmsg+0x1c2/0x2b0 [ 988.066625][ T9871] do_syscall_64+0x55/0xa0 [ 988.071573][ T9871] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 988.078004][ T9871] [ 988.078004][ T9871] -> #0 (team->team_lock_key){+.+.}-{3:3}: [ 988.086101][ T9871] __lock_acquire+0x2df1/0x7d40 [ 988.091490][ T9871] lock_acquire+0x19e/0x420 [ 988.096524][ T9871] __mutex_lock+0x136/0xcc0 [ 988.101563][ T9871] team_del_slave+0x32/0x1c0 [ 988.106680][ T9871] team_device_event+0x28d/0xa20 [ 988.112139][ T9871] notifier_call_chain+0x197/0x380 [ 988.117780][ T9871] unregister_netdevice_many_notify+0x100d/0x1900 [ 988.124811][ T9871] unregister_netdevice_queue+0x32c/0x370 [ 988.131061][ T9871] _cfg80211_unregister_wdev+0x16b/0x580 [ 988.137220][ T9871] ieee80211_remove_interfaces+0x49e/0x690 [ 988.143554][ T9871] ieee80211_unregister_hw+0x5d/0x2a0 [ 988.149450][ T9871] mac80211_hwsim_del_radio+0x289/0x480 [ 988.155518][ T9871] hwsim_exit_net+0x58d/0x650 [ 988.160715][ T9871] cleanup_net+0x70a/0xbb0 [ 988.165660][ T9871] process_scheduled_works+0xa5d/0x15d0 [ 988.171729][ T9871] worker_thread+0xa55/0xfc0 [ 988.176844][ T9871] kthread+0x2fa/0x390 [ 988.181429][ T9871] ret_from_fork+0x48/0x80 [ 988.186365][ T9871] ret_from_fork_asm+0x11/0x20 [ 988.191650][ T9871] [ 988.191650][ T9871] other info that might help us debug this: [ 988.191650][ T9871] [ 988.201874][ T9871] Possible unsafe locking scenario: [ 988.201874][ T9871] [ 988.209328][ T9871] CPU0 CPU1 [ 988.214703][ T9871] ---- ---- [ 988.220068][ T9871] lock(&rdev->wiphy.mtx); [ 988.224579][ T9871] lock(team->team_lock_key); [ 988.231872][ T9871] lock(&rdev->wiphy.mtx); [ 988.238908][ T9871] lock(team->team_lock_key); [ 988.243678][ T9871] [ 988.243678][ T9871] *** DEADLOCK *** [ 988.243678][ T9871] [ 988.251814][ T9871] 5 locks held by kworker/u4:16/9871: [ 988.257181][ T9871] #0: ffff888017c73938 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x96f/0x15d0 [ 988.268084][ T9871] #1: ffffc9001969fd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x96f/0x15d0 [ 988.278732][ T9871] #2: ffffffff8e3b3150 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x14c/0xbb0 [ 988.288163][ T9871] #3: ffffffff8e3c0188 (rtnl_mutex){+.+.}-{3:3}, at: ieee80211_unregister_hw+0x55/0x2a0 [ 988.298013][ T9871] #4: ffff88801bb10768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: ieee80211_remove_interfaces+0x29a/0x690 [ 988.308811][ T9871] [ 988.308811][ T9871] stack backtrace: [ 988.314700][ T9871] CPU: 1 PID: 9871 Comm: kworker/u4:16 Not tainted syzkaller #0 [ 988.322334][ T9871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 988.332389][ T9871] Workqueue: netns cleanup_net [ 988.337166][ T9871] Call Trace: [ 988.340446][ T9871] [ 988.343374][ T9871] dump_stack_lvl+0x18c/0x250 [ 988.348058][ T9871] ? load_image+0x400/0x400 [ 988.352563][ T9871] ? show_regs_print_info+0x20/0x20 [ 988.357769][ T9871] ? print_circular_bug+0x12b/0x1a0 [ 988.362969][ T9871] check_noncircular+0x2fc/0x400 [ 988.367922][ T9871] ? print_deadlock_bug+0x5d0/0x5d0 [ 988.373125][ T9871] ? lockdep_lock+0xf5/0x230 [ 988.377747][ T9871] ? perf_trace_lock_acquire+0x104/0x410 [ 988.383387][ T9871] ? _find_first_zero_bit+0xd3/0x100 [ 988.388674][ T9871] __lock_acquire+0x2df1/0x7d40 [ 988.393542][ T9871] ? verify_lock_unused+0x140/0x140 [ 988.398742][ T9871] ? perf_trace_lock_acquire+0x104/0x410 [ 988.404385][ T9871] ? trace_event_raw_event_lock_acquire+0x2c0/0x2c0 [ 988.410989][ T9871] ? perf_trace_lock_acquire+0x104/0x410 [ 988.416635][ T9871] lock_acquire+0x19e/0x420 [ 988.421143][ T9871] ? team_del_slave+0x32/0x1c0 [ 988.425921][ T9871] ? __might_sleep+0xe0/0xe0 [ 988.430521][ T9871] ? read_lock_is_recursive+0x20/0x20 [ 988.435907][ T9871] __mutex_lock+0x136/0xcc0 [ 988.440425][ T9871] ? team_del_slave+0x32/0x1c0 [ 988.445195][ T9871] ? __lock_acquire+0x7d40/0x7d40 [ 988.450220][ T9871] ? rcu_is_watching+0x15/0xb0 [ 988.454989][ T9871] ? trace_contention_end+0x39/0xe0 [ 988.460185][ T9871] ? __mutex_lock+0x315/0xcc0 [ 988.464954][ T9871] ? team_del_slave+0x32/0x1c0 [ 988.469724][ T9871] ? mutex_lock_nested+0x20/0x20 [ 988.474754][ T9871] ? bond_netdev_event+0xeb/0xf30 [ 988.479783][ T9871] ? __mutex_unlock_slowpath+0x1b4/0x6c0 [ 988.485434][ T9871] team_del_slave+0x32/0x1c0 [ 988.490030][ T9871] team_device_event+0x28d/0xa20 [ 988.494969][ T9871] notifier_call_chain+0x197/0x380 [ 988.500086][ T9871] unregister_netdevice_many_notify+0x100d/0x1900 [ 988.506507][ T9871] ? lock_chain_count+0x20/0x20 [ 988.511372][ T9871] ? unregister_netdevice_many+0x20/0x20 [ 988.517013][ T9871] ? kernfs_remove_by_name_ns+0x117/0x150 [ 988.522752][ T9871] ? __lock_acquire+0x7d40/0x7d40 [ 988.527803][ T9871] unregister_netdevice_queue+0x32c/0x370 [ 988.533545][ T9871] ? list_netdevice+0x730/0x730 [ 988.538412][ T9871] ? kernfs_remove_by_name_ns+0x117/0x150 [ 988.544150][ T9871] _cfg80211_unregister_wdev+0x16b/0x580 [ 988.549793][ T9871] ieee80211_remove_interfaces+0x49e/0x690 [ 988.555612][ T9871] ? ieee80211_do_stop+0x1e20/0x1e20 [ 988.560902][ T9871] ? rcu_is_watching+0x15/0xb0 [ 988.565675][ T9871] ieee80211_unregister_hw+0x5d/0x2a0 [ 988.571056][ T9871] mac80211_hwsim_del_radio+0x289/0x480 [ 988.576626][ T9871] ? rhashtable_remove_fast+0xc00/0xc00 [ 988.582187][ T9871] hwsim_exit_net+0x58d/0x650 [ 988.586870][ T9871] ? hwsim_init_net+0x90/0x90 [ 988.591549][ T9871] ? __ip_vs_dev_cleanup_batch+0x238/0x250 [ 988.597358][ T9871] cleanup_net+0x70a/0xbb0 [ 988.601796][ T9871] ? ops_free_list+0x3b0/0x3b0 [ 988.606581][ T9871] ? _raw_spin_unlock_irq+0x23/0x50 [ 988.611793][ T9871] ? process_scheduled_works+0x96f/0x15d0 [ 988.617536][ T9871] ? process_scheduled_works+0x96f/0x15d0 [ 988.623265][ T9871] process_scheduled_works+0xa5d/0x15d0 [ 988.628835][ T9871] ? assign_work+0x430/0x430 [ 988.633435][ T9871] ? assign_work+0x3d0/0x430 [ 988.638036][ T9871] worker_thread+0xa55/0xfc0 [ 988.642645][ T9871] kthread+0x2fa/0x390 [ 988.646712][ T9871] ? pr_cont_work+0x560/0x560 [ 988.651393][ T9871] ? kthread_blkcg+0xd0/0xd0 [ 988.655981][ T9871] ret_from_fork+0x48/0x80 [ 988.660403][ T9871] ? kthread_blkcg+0xd0/0xd0 [ 988.664992][ T9871] ret_from_fork_asm+0x11/0x20 [ 988.669766][ T9871] [ 988.735809][ T9871] team0: Port device wlan1 removed [ 988.753673][T16301] netlink: 'syz.4.2564': attribute type 21 has an invalid length. [ 988.771205][T16301] netlink: 'syz.4.2564': attribute type 6 has an invalid length. [ 989.047483][T16196] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 989.059275][T16196] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 989.076824][T16196] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 989.096534][T16196] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 989.110072][ T9871] hsr_slave_0: left promiscuous mode [ 989.115999][ T9871] hsr_slave_1: left promiscuous mode [ 989.121671][ T9871] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 989.130247][ T9871] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 989.139347][ T9871] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 989.147633][ T9871] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 989.156413][ T9871] veth1_macvtap: left promiscuous mode [ 989.161901][ T9871] veth0_macvtap: left promiscuous mode [ 989.167634][ T9871] veth1_vlan: left promiscuous mode [ 989.263973][T16197] Bluetooth: hci2: command tx timeout [ 989.410473][ T9871] team0 (unregistering): Port device team_slave_1 removed [ 989.434019][ T9871] team0 (unregistering): Port device team_slave_0 removed [ 989.673829][T16196] 8021q: adding VLAN 0 to HW filter on device bond0 [ 989.726176][T16196] 8021q: adding VLAN 0 to HW filter on device team0 [ 989.774277][ T9884] bridge0: port 1(bridge_slave_0) entered blocking state [ 989.781432][ T9884] bridge0: port 1(bridge_slave_0) entered forwarding state [ 989.807138][ T9889] bridge0: port 2(bridge_slave_1) entered blocking state [ 989.814395][ T9889] bridge0: port 2(bridge_slave_1) entered forwarding state [ 989.848672][T16196] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 989.862856][T16196] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 990.050127][T16196] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 990.092595][T16196] veth0_vlan: entered promiscuous mode [ 990.108611][T16196] veth1_vlan: entered promiscuous mode [ 990.148461][T16196] veth0_macvtap: entered promiscuous mode [ 990.159018][T16196] veth1_macvtap: entered promiscuous mode [ 990.179371][T16196] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 990.190573][T16196] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 990.201053][T16196] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 990.211948][T16196] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 990.223448][T16196] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 990.236583][T16196] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 990.247581][T16196] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 990.258026][T16196] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 990.270068][T16196] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 990.280283][T16196] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 990.292615][T16196] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 990.304400][T16196] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 990.316954][T16196] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 990.326483][T16196] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 990.335845][T16196] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 990.347073][T16196] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 990.394335][T16196] ieee80211 phy32: Selected rate control algorithm 'minstrel_ht' [ 990.426351][ T9884] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 990.428240][T16196] ieee80211 phy33: Selected rate control algorithm 'minstrel_ht' [ 990.447337][ T9884] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 990.479348][ T9874] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 990.487637][ T9874] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 993.177620][ T1279] ieee802154 phy0 wpan0: encryption failed: -22 [ 993.183967][ T1279] ieee802154 phy1 wpan1: encryption failed: -22