last executing test programs: 1m7.377287572s ago: executing program 2 (id=351): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000002100)='syzkaller\x00', 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='contention_end\x00', r1}, 0x10) r2 = socket$kcm(0x25, 0x1, 0x0) recvmsg$kcm(r2, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x160) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000300)='tlb_flush\x00', r0}, 0x18) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000cc0)=""/254, 0x39, 0xfe, 0x1}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x20, 0x4, 0x4, 0x8}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0xf) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r5, &(0x7f00000000c0)={&(0x7f0000000080)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000140)='i-3', 0x3}], 0x1, &(0x7f0000000280)=ANY=[@ANYRESOCT=r4, @ANYRES8=r5, @ANYBLOB="ac14140dffffffff00000000380000000000000000000000070000000727c0e0000002e0000001ac14143c0000c5676f221e130000e00000027f000001000000000a0101"], 0x58}, 0x20000000) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') r6 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800"/12], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x4, 0x8, 0xce5c4e9, 0x2, 0x511a, 0x1, 0x2, '\x00', 0x0, r6, 0x3, 0x2, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r7, 0x0, 0x0, 0xc9, &(0x7f00000005c0), &(0x7f00000006c0)=""/201, 0x2, 0x0, 0x65, 0x59, &(0x7f00000007c0)="d81417e0d91a6aefb5666309a0837f1dfdea8242f823f10df1b9f7a494e62aaf91f43b06cf0e87e750ea989a0cd59e321c8aac62bb5662de5902bb164a78b0b144e113a3993655de0a042d5b7edca51dce61360fecdfc2b7a0cb367e657e5ef1cb6402ff10", &(0x7f0000000880)="7bc29ed6c8acdbf74b295b2b7c02a7f573391f39746752db07a731ec4bfbfbdfb6351df1d821ab05b89fc68705235d73c73d2c63f2a1f7b0eaba3aef55c6e6a71b32399277764457dbd9b410bd644585b1738846295790a81a", 0x6, 0x0, 0x1}, 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) 1m6.33749073s ago: executing program 2 (id=354): r0 = socket$kcm(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events.local\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2106, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xe}, 0x94) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYRES8=r1], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000980)='tlb_flush\x00', r3}, 0x18) socket$kcm(0x10, 0x2, 0x10) r4 = socket$kcm(0x10, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='sched_switch\x00', r5, 0x0, 0x100a}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000000c0)={r7}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r6}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x111000, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2001) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000000c0)={'netpci0\x00', 0x800}) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848110000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/time\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000"], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[@cred={{0x1c}}, @rights={{0x10}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1d, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x4}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) 1m6.065036908s ago: executing program 2 (id=358): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x10000, {{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x29}, {0x8, 0x0, 0x100000001, 0x0, 0x0, 0xffffffffffffb473, 0xffffffffffffffff}, {0x1000000000, 0x2000000000000000, 0x0, 0xffffffffffffffff}, 0xfffffffe}}, 0xb8}}, 0x4004) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="b8000000190001000000000000000000e000000200000000000000000000000000000000000000010000000000000000"], 0xb8}, 0x1, 0x0, 0x0, 0x404c830}, 0x0) 1m5.973105423s ago: executing program 2 (id=359): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x58412, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7bffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) socket$kcm(0xa, 0x3, 0x3a) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0xf242, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) r3 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x6, &(0x7f0000000040), 0x3) setsockopt$sock_attach_bpf(r3, 0x29, 0x3b, 0x0, 0x0) socket(0x10, 0x80002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r4 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x6040810) socket$kcm(0x2, 0x1000000000000005, 0x0) socket$kcm(0x23, 0x5, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4048957}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmsg(r6, &(0x7f0000001700)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x7, 0x6, 0x801, 0x0, 0x0, {0xa, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000005}, 0x80) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="021800001b000000000000000000000005000600000000000a000000000000000000000000000000000000000000000000000000000000000800120000000000000000800000000006000000000000000000000000000000ac1e0001000000000000000000000000fc01000000000000000000000000000105000500000000000a00000000000000fc0000000000000000000000000000000000000000000000070019"], 0xd8}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00'}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40010) 1m5.764232994s ago: executing program 2 (id=360): socket$kcm(0x11, 0x200000000000002, 0x300) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000004c0)="d8", 0x1}], 0x1}, 0x0) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r2 = getpid() perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0xa, 0xf, 0x3, 0xfb, 0x0, 0x7, 0x1000, 0xa, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xffffff52, 0x0, @perf_bp={&(0x7f0000000480), 0x2}, 0x2e8a, 0x100000001, 0x1, 0x8, 0x2, 0x7, 0x3, 0x0, 0x51, 0x0, 0x1}, r2, 0x80000000001, r1, 0x8) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[], 0x1c}}, 0x44010) ioctl$SIOCSIFHWADDR(r3, 0x541b, &(0x7f0000000180)={'veth0_virt_wifi\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x41}}) recvmsg$can_j1939(r3, &(0x7f00000003c0)={&(0x7f0000000240)=@l2tp={0x2, 0x0, @local}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000080)=""/2, 0x2}, {&(0x7f00000002c0)=""/94, 0x5e}, {&(0x7f0000000340)=""/72, 0x48}, {&(0x7f0000000100)}, {&(0x7f0000000500)=""/127, 0x7f}, {&(0x7f0000000580)=""/150, 0x96}], 0x6}, 0x12002) mount$bpf(0x200000000000, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x989046, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2040, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x2, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$kcm(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d080006007c09e8fe55a10a0015400100142603600e1208000600", 0x2c}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x200000000000000}, 0x18) r8 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[@ANYBLOB="2539000020000365f507f62aa6172f7881"], 0x33fe0) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r5, 0x6, 0x10, &(0x7f0000000200)=r9, 0x4) mount$bpf(0x200000000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x225451, 0x0) 1m5.633498586s ago: executing program 2 (id=361): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0x6d}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_bp={0x0, 0x4}, 0x14105, 0x2e, 0x6, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={r2}, 0x4) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) 50.242931777s ago: executing program 32 (id=361): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0x6d}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_bp={0x0, 0x4}, 0x14105, 0x2e, 0x6, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={r2}, 0x4) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) 7.405011021s ago: executing program 4 (id=791): r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="030000000400"], 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x7, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x2c000010) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f00000002c0), &(0x7f0000000240)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x4048884) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="1c0000002d00090027bd7000000000000600000008"], 0x1c}}, 0x84) recvmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000480)=""/266, 0x10a}, {&(0x7f0000000740)=""/190, 0xbe}, {0x0}, {&(0x7f0000000ac0)=""/309, 0x135}, {&(0x7f00000012c0)=""/4154, 0x103a}], 0x6}, 0x40002002) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000140)={&(0x7f00000005c0)="e9ba329e494cabad2f8087d52670b2d07eb4b2f952b495e04001c5f60e1a9a40fe13526d8f6cad28438b286517c3647a7dc72b6d5f28e7a337346b8669c8a2091aaaeb23b7e89063ff7206c31adcabec56ad95329b8d53ac65884f9be6e900609440801ca5439d163152e6de70151c76b23f4d0ea9a17d13c743404f92392af94dfdf35b4615b4967a15be564eae5f26f69f615df36a8908415da89b06fc1388662a01b8713a762278226efcb433d45bd29691", &(0x7f0000000840)=""/184, &(0x7f0000000900)="0f090078b729e49631a276b23707681fcd3db09b7a6a5dc8b84308250f01fea680630f74035a24ccc12867e787bebc9a33c1e96a2adb7f29e47e84103066d09e2e271b9c83a31c9bf70e7e19d8d0b39fd26a09894a14bdc708106a175c71a9ed5e8c14ef8ee1c25d46216f70bda9c311ad649b218303e0caf39d9448ad6e31324b9274c7fcfd4742fd3c39745bd096ae0ffd4d13100e56a300a5b15258b2ada6286c82a8285744538e95a2341609dce0f92eee74d7c6779e8f5647078ca053f28d7871a8e07bf9a8cd9c", &(0x7f0000000040)="35069ec82a94e986da18236f2168d11667e263bf043e95035a5cb21dece50a965fe7700382943652ea103433095d4359a337b248b165e9c8e8d4c996aae2929cd60a7b8afa657d6b21ad972a7d6f8e7abb94273b4f46ef3f3f5e41bebc1a9caac3722c8f16e03510598bfa57052befa205b9abf8269d65a432d3f0833d7c3d0d", 0x800, r1}, 0x38) r5 = socket$kcm(0x2, 0x1, 0x84) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24040008) r6 = socket$kcm(0x2, 0x922000000001, 0x106) setsockopt$sock_attach_bpf(r6, 0x1, 0xd, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x84, 0x84, &(0x7f0000000000), 0x90) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000700)="14000000350094fb0100fc6022f388", 0xf}], 0x1}, 0x4000800) 7.169735722s ago: executing program 1 (id=795): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x40, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}, 0x4010, 0x4, 0xfffffffe, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x88e}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081084e81f782db44b904021d080006067c09e8fe55a10a0015400800142603600e120800160000001001a8001600a40001", 0x37}], 0x1, 0x0, 0x0, 0x6000}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="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"/1076], 0x434}, 0x1, 0x0, 0x0, 0x40800}, 0x44) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r2, &(0x7f0000000e80)={&(0x7f0000000d80), 0xc, &(0x7f0000000e40)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="50000000020801080000000000000000010000040900010073797a3100000000090001027303000000000000090001007e797a3100000000060002408906000005000300840000000600024000100000"], 0x50}, 0x1, 0x0, 0x0, 0x50}, 0x20004000) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x0, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x5000, 0x0, 0x0, 0x0, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) close(r3) r4 = socket$kcm(0x1e, 0x4, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x8003}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0x9c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x74, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_LEN={0x8, 0x4, 0x1, 0x0, 0x22}, @NFTA_EXTHDR_TYPE={0x5, 0x2, 0x7}]}}}, {0x3c, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x12}, @NFTA_BITWISE_XOR={0x4}, @NFTA_BITWISE_MASK={0xc, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x7, 0x1, "9897e0"}]}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x110}}, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f00000008c0), 0x43) socket$kcm(0x10, 0x3, 0x10) r6 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext={0x1, 0xc}, 0x14440, 0x5bc, 0x0, 0x2, 0x3, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x2, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffebc) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) r8 = socket$kcm(0xa, 0x922000000003, 0x11) perf_event_open(&(0x7f00000003c0)={0x1, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r8, &(0x7f0000000000)={&(0x7f0000000cc0)=@l2tp6={0xa, 0x0, 0x1000, @mcast1, 0x7, 0x83}, 0x80, 0x0}, 0x800) r9 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f00000008c0), 0x43) write$cgroup_subtree(r9, &(0x7f0000000040)=ANY=[], 0xfdef) close(r9) recvmsg(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000002a80)=""/4096, 0xfdef}], 0x1}, 0x10021) 6.49283471s ago: executing program 1 (id=803): r0 = socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="0007000042009103"], 0xfe33) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/4125, 0x101d}], 0x1}, 0x40002022) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r3, &(0x7f0000001240)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001200)={&(0x7f00000011c0)={0x30, 0x140f, 0x800, 0x70bd28, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x7, 0x45, 'cm\x00'}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x24) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001d008104e00f80ecdb4cb9f207c804a020000000880802fb0a0002000a0ada1b40d80800c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$sock(r4, &(0x7f00000044c0)={0x0, 0x0, &(0x7f0000004440)=[{&(0x7f00000043c0)="c3fec44c", 0x4}], 0x1, &(0x7f0000004480)=[@mark={{0x14, 0x1, 0x24, 0xde8}}], 0x18}, 0x40000) setsockopt$sock_attach_bpf(r0, 0x0, 0x6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x53}, [@ldst={0x4}]}, &(0x7f00000002c0)='GPL\x00', 0x5, 0xbc, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) 6.492512714s ago: executing program 4 (id=804): socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7ffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000004d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000001000000000000000000000085000000870000001801000020786c2500000000002020207b1af8ff00000000bfa108000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000180)='syzkaller\x00'}, 0x90) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000003a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003a00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1}}}], 0x20}, 0x4008804) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x5000, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000600)="e0b9547ed387db3b8691d2c0e201", 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) 6.414494908s ago: executing program 4 (id=805): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000480)='syzkaller\x00', 0x5}, 0x94) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe, 0x5}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000bf000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x40804) r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x17, &(0x7f0000000200)=r0, 0x21) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 3.946962271s ago: executing program 4 (id=806): sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d080006007c09e8fe55a10a0015000900142603600e1208000f0000000401a80016002000014003", 0x39}], 0x1}, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x4, 0x0, 0x3, 0xfffff26f, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x1000, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, 0x0, &(0x7f0000000700)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='syzkaller\x00'}, 0x94) r5 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r5, &(0x7f0000000080)={0x0, 0x175c, &(0x7f0000003080)=[{&(0x7f0000000040)="1400000024000b94f01013e175b7bd7d7edd7504", 0x14}], 0x1}, 0x0) ioctl$TUNGETVNETLE(r3, 0x4008744b, &(0x7f0000000180)) r6 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x0, 0x4, 0x0, 0x0) sendmsg$inet(r6, &(0x7f0000000340)={&(0x7f0000000140)={0x2, 0x4e22, @dev}, 0x10, 0x0}, 0x400c080) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7902009875f37538e486dd6317ce62667f2c"], 0xfdef) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4d, 0x1, 0x0, 0x0, 0x0, 0x40000b5a, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0, 0x1}, 0x2008, 0xfffffffffffffffd, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x31f5}, 0x0, 0x3, 0xffffffffffffffff, 0x8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200"], 0xcfa4) 3.906731101s ago: executing program 3 (id=807): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x22a82, 0x0) socket$kcm(0xa, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1943}, 0x5000, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x1042, 0x2, 0xfffffffe, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r3, &(0x7f0000013fc0)={0x0, 0x0, &(0x7f0000013f80)={&(0x7f00000006c0)=ANY=[@ANYBLOB="24000000070601020000000000000000050000050500010007000000080006"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x48000) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20048800) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1943}, 0x5000, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r7) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000680)=ANY=[], 0x48) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f00000035c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000006c0)=ANY=[], 0x20) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[], 0x1c}}, 0x84) r9 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r9, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, &(0x7f0000001140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x15}, @multicast1}}}, @ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}]}}}], 0x38}, 0x0) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x3, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc}}, &(0x7f0000000300)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='contention_end\x00', r10}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) 2.688780321s ago: executing program 3 (id=808): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92010, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0xffffffffffffffff, 0xffffffff7fffffff}, 0x0, 0xca, 0x3, 0x0, 0x4, 0x3ff, 0x0, 0x0, 0x7, 0x0, 0xde}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newtaction={0x64, 0x30, 0x9, 0x0, 0x0, {}, [{0x50, 0x1, [@m_mpls={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_MPLS_TTL={0x0, 0x7, 0x4}]}, {0x4, 0x4}, {0xc}, {0xffffffffffffffce}}}]}]}, 0x64}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$unix(0x1, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=ANY=[@ANYBLOB="4c0000003c0007010000000000000000017c00001c00fc80180008800e0031002a27262d2e2b2a7b2e0000000400a7800c00018006000600800a00000800028004001580080007"], 0x4c}, 0x1, 0x0, 0x0, 0x4c094}, 0x4040) recvmsg$unix(r3, &(0x7f0000000240)={&(0x7f0000000000), 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/124, 0x7c}, {&(0x7f0000000100)=""/164, 0xa4}], 0x2, &(0x7f0000000200)=[@cred={{0x1c}}], 0x20}, 0x101) r5 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1800000007140100000000000000000005006000ff"], 0x18}}, 0x0) close(r2) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x27, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, {}, {}, [@map_idx={0x18, 0x6, 0x5, 0x0, 0xc}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @jmp={0x5, 0x1, 0x9, 0x0, 0x4, 0x80, 0x94e52fe277042924}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000300)='syzkaller\x00', 0x4, 0xc, &(0x7f0000000340)=""/12, 0x41000, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x2, 0xc, 0xb15}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000500)=[0x1, 0x1, 0xffffffffffffffff], &(0x7f00000006c0)=[{0x1, 0x4, 0xb, 0x4}, {0x1, 0x2, 0x1, 0xa}, {0x2, 0x5, 0x2, 0x1}, {0x1, 0x4, 0x4, 0x2}, {0x0, 0x3, 0x2, 0xa}, {0x0, 0x3, 0xa, 0x5}, {0x0, 0x4, 0xb, 0x7}]}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d40)={r6, 0x0, 0xa3, 0x5b, &(0x7f0000000a40)="be10a0bc2b4c93fcc08142b0cb3a45ff4b861a04ebdb29ebc218745f0074b4a88f4d34f30d332a7a3aee0cc0ba3aa8496eed5eb6ee8090cfab055e628a40f7d7b3b43db3d1cd039c6301c1263bc03647fbf0f8742eb777de3123ab21b2fb8da104ccf0cdf31aa71cadcd4cff70745965c269ec7c302fe62e492370478ebb826de1e930636da00fdb95b7dfe6b40ace8b45300db237210fed6cba1ddd28d727e4c32696", &(0x7f0000000b00)=""/91, 0x80000000, 0x0, 0xae, 0xf4, &(0x7f0000000b80)="74d89173643556cc27dddf5e0fde2d6d92b16ff52f3bcb9f80a1fde2db9c38d5153b9b36934c075ea4e1bcd0cda8a28416237c272522d19a08821de357ba38d8a97fc78a1149f01bd137fff7f29ecbefcd5f7428e4840bd7d89ca0e604275626698544a28f6d322038f5db50255b476fbad00e42939e7ae82d7e96f65ccdceefa973e099fafb7367d433af2f346b51fcbf506fdd7d369547277ef904ca8b1977ad6ad8ab774e7a2c2588671514ec", &(0x7f0000000c40)="96e6cb10ca78c25f00e419e59dc4419135ca64957a633886acea1ae287de4535147a07aca2919db04e66b5e5092c862433c6ca70d6cc1e0d28301f67344a7cfeb5e2ab264c36018813439f677178411a60869f847c9a1ddb823a005e68b796efc3ed543def5fe5347717c47eeb7d946e1fe4f74661fc71654cbe5201adae2cb0d1c8db521dd3704f5ca8e7aba2a8c65c46210e4755307ff424955787da67d7d66805dc89a8732aa3ce59dcf80eb9d0a6e14b971b4ce6fbd37dc6f3452179a9df88c06bd596dd603095a5e904bff40ee65ff132be428ea85bb23d53a3abe0e78e62cb832b4be1fea0774c79a6ed61db94c3532771", 0x2, 0x0, 0x8}, 0x50) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xaf}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x800000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x5}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0300000004000000040000004a"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x10, 0xb, &(0x7f00000009c0)=@framed={{0x18, 0x2}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit]}, &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0xa}, 0x94) r9 = socket$kcm(0x28, 0x5, 0x0) setsockopt$sock_attach_bpf(r9, 0x28, 0x8, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0xc5bf) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f00000002c0)=ANY=[@ANYRES8=r2], 0x12) 1.818921942s ago: executing program 1 (id=809): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000cd0000"], 0x48) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newchain={0x2c, 0x1e, 0x1, 0x0, 0x8000, {0x0, 0x0, 0x0, 0x0, {0x0, 0x8}, {0xe, 0x1}, {0x10, 0x2}}, [@TCA_CHAIN={0x8, 0xb, 0x3}]}, 0x2c}}, 0x44004) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000"], 0x128}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb010018000012000000000c0000000c000000020000000000000000000002"], 0x0, 0x26}, 0x28) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8f1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x6, 0x8, 0xae, 0x0, 0x1, 0x20727ff}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4006, 0x5, r6, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000000}, 0x50) close(r5) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @cgroup_sockopt=0x16}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) 1.756012061s ago: executing program 0 (id=810): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) (async) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="180200000400000000000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYRES16=r3], 0x50) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[], 0x0, 0x26}, 0x28) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000100)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1313f, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000480)=[{0x5, 0x4, 0x8, 0x7}, {0x5, 0x5, 0x2, 0x2}], 0x10, 0x746}, 0x94) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) (async) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) (async) ioctl$TUNGETVNETLE(r4, 0x4010744d, &(0x7f0000000180)) (async) close(0xffffffffffffffff) (async) socket$kcm(0x2, 0x1000000000000002, 0x0) (async, rerun: 32) socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xfa, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x71, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r8 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000500)={0x0, r1}, 0x8) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1e0000000a00000001000000f4ffffffb6120100", @ANYRES32, @ANYBLOB="ff0100"/20, @ANYRES32=r7, @ANYRES32, @ANYBLOB="ff7f0000650a", @ANYRES32=r8, @ANYBLOB], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r9, &(0x7f0000000300), &(0x7f0000000000)=""/10, 0x2}, 0x20) (async) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x6c, 0x2, 0x6, 0x801, 0x0, 0x0, {0xa, 0x0, 0xfffe}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8, 0x13, 0x0, 0x0, 0x1001}, @IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x9}, @IPSET_ATTR_MAXELEM={0x8, 0x13, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0xfffffffffffffe67}, 0x1, 0x0, 0x0, 0xc090}, 0x4000) 1.516014778s ago: executing program 3 (id=811): r0 = socket$kcm(0xf, 0x3, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events.local\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2106, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xe}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7040000010000008500000078000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000980)='tlb_flush\x00', r2}, 0x18) socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='sched_switch\x00', r4, 0x0, 0x100a}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000000c0)={r6}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r5}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'netpci0\x00', 0x800}) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848110000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000380)={r0}) sendmsg$inet(r8, &(0x7f00000000c0)={0x0, 0x24, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}], 0xc8}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1d, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x4}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) 1.515514061s ago: executing program 5 (id=812): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="18001b9f00000000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x100}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000140)='contention_end\x00', r0}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socket$kcm(0x10, 0x3, 0x10) write$cgroup_int(r1, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0016000c0000000200000000cfffffba68a0993b5400000000000006feffe54f0000"], 0x0, 0x26}, 0x28) 1.285531822s ago: executing program 5 (id=813): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 1.234415812s ago: executing program 1 (id=814): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001024010000000000000000000a00000a78000000060a010400000000000000000200000038000480340001800a0001006d617463680000002400028008000100756470000e0003007acc6338a900020000d9000008000240000000000900010073797a30000000000900020073797a3200000000140005800800014000000011080002"], 0xa0}, 0x1, 0x0, 0x0, 0x24002801}, 0x0) 1.130230426s ago: executing program 0 (id=815): socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7ffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000004d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000001000000000000000000000085000000870000001801000020786c2500000000002020207b1af8ff00000000bfa108000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000180)='syzkaller\x00'}, 0x90) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000003a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003a00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1}}}], 0x20}, 0x4008804) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x5000, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000600)="e0b9547ed387db3b8691d2c0e201", 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) 1.127723969s ago: executing program 3 (id=816): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=@newtaction={0x68, 0x30, 0xffff, 0x0, 0x0, {}, [{0x54, 0x1, [@m_ife={0x50, 0x1, 0x0, 0x0, {{0x8}, {0x28, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0xffffffff, 0x0, 0x0, 0xa}}}, @TCA_IFE_METALST={0x8, 0x6, [@IFE_META_TCINDEX={0x4, 0x2, @void}]}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x48c0}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x804, 0x4c9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x4, @perf_bp={0x0, 0x4}, 0xa0, 0x58, 0x8, 0x6, 0x2, 0x2c9, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @local}, 0x1, 0x34}}, 0x80, 0x0}, 0x20000044) r3 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="563f00001900599c6d0e000091d028ef8020ab0700040005234538ba55"], 0xfe33) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x40001}, 0x4000000) sendmsg$NFT_BATCH(r4, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000030a0fdb00000000000000000a0000050900010073797a31000000000900030073797a300000000014000480080002403cb140bb08000140000000030a0007"], 0x74}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00', r5}, 0x18) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r6 = perf_event_open(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x3, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, r6, 0xa) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x202, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) bpf$MAP_CREATE(0x0, 0x0, 0x48) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000a40)=@newtaction={0x84, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x70, 0x1, [@m_tunnel_key={0x6c, 0x1, 0x0, 0x0, {{0xf}, {0x3c, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0xb, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e21}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x40050}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b7030000000000008500000033000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r9}, &(0x7f0000000080), 0x0}, 0x20) 1.123979542s ago: executing program 4 (id=817): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000480)='syzkaller\x00', 0x5}, 0x94) r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe, 0x5}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000bf000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r2, 0x6, 0x17, &(0x7f0000000200)=r2, 0x21) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 1.064736903s ago: executing program 1 (id=818): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000733255f250000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99ee}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x4110, 0x0, 0x0, 0x8, 0x37e, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x81, 0x6}, 0x0, 0x2, 0x4, 0x6, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000110a"}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x50) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x20e, 0x102, 0x0, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000}, 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x3, 0x5, 0x0, 0x0}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) r2 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000280)=""/216, 0xd8}, {&(0x7f0000000f40)=""/185, 0xb9}, {&(0x7f0000000380)=""/221, 0xdd}, {&(0x7f0000000e40)=""/217, 0xd9}, {&(0x7f0000000b00)=""/213, 0xd5}], 0x5}, 0x40012000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x85, &(0x7f0000000ac0), 0x90) sendmsg$inet(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000080)={0x2, 0x0, @private=0xa010100}, 0x10, &(0x7f0000000300)=[{&(0x7f00000000c0)="83", 0x1}], 0x1}, 0xe0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x6b) 1.062151085s ago: executing program 5 (id=819): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x101042, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000140)={'pimreg\x00'}) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=@newsa={0x144, 0x10, 0x1, 0xbffffffe, 0x100, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@local, 0x1, 0x794, 0x4e23, 0x5, 0x0, 0x0, 0x0, 0x3a}, {@in6=@mcast2, 0x4d4, 0x6c}, @in=@loopback, {0x0, 0x9, 0x6, 0xffff, 0x8251c, 0x2, 0xfffffffffffffff8}, {0xffffffffffffffff, 0x0, 0x1f, 0x1ff}, {0x2, 0xfffffffc}, 0x70bd2a, 0x3504, 0x2, 0x1, 0xfd, 0x20}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @mark={0xc, 0x15, {0x35075a, 0x3}}]}, 0x144}, 0x1, 0x0, 0x0, 0x8801}, 0x10) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000016c0)=@newsa={0x138, 0x10, 0x1, 0xfff7fffe, 0x100, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x1, 0x714, 0x4e23, 0x5, 0x0, 0x0, 0x0, 0x3a}, {@in6=@remote, 0x4d4, 0x6c}, @in=@loopback, {0x0, 0x192, 0x6, 0xffff, 0x8251c, 0x2, 0xfffffffffffffff8}, {0xffffffffffffffff, 0x0, 0x1f, 0xfffffffffffffffe}, {0x2, 0xfffffffc, 0x40}, 0x70bd2a, 0x3504, 0x2, 0x1, 0x0, 0x20}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newsa={0x138, 0x10, 0x1, 0xfffffffe, 0x100, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x1, 0x714, 0x4e23, 0x5, 0x0, 0x0, 0x0, 0x3a}, {@in6=@mcast2, 0x4d4, 0x6c}, @in=@loopback, {0x0, 0x192, 0x6, 0xffff, 0x8251c, 0x2, 0xfffffffffffffff8}, {0xffffffffffffffff, 0x0, 0x1f, 0xfffffffffffffffe}, {0x2, 0xfffffffc}, 0x70bd2a, 0x3504, 0x2, 0x1, 0x0, 0x20}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = socket$kcm(0x10, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@generic={0x0, 0x0, 0x18}, 0x18) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)="d800000019008111e00212ba0d8105040a610200ff0f040b067c55a1bc000900b800069903000000b0000500fe808178a8001500030001400200000901ac040000d67f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f00000e970300"/216, 0xd8}], 0x1}, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f90324fc60", 0x14}], 0x1}, 0x0) recvmsg$kcm(r3, 0x0, 0x0) r5 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r5, &(0x7f00000025c0)={&(0x7f0000000180)={0x10, 0x0, 0x4000, 0x1000}, 0xc, &(0x7f00000014c0)={&(0x7f00000001c0)={0x10, 0x3ed, 0x8, 0x70bd2c, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000881}, 0x8000) 952.673748ms ago: executing program 0 (id=820): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f00000002c0)}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x50) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x14ac3, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0xfffffffc, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4d31, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x2, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x100000000000000c, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x11f2, 0x4}, 0x104101, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b06, &(0x7f0000000080)={'vxcan1\x00', @remote}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext={0x2000000, 0x7}, 0x0, 0x9, 0xacd9, 0x0, 0xfffffffffff7bbfe, 0x0, 0x5, 0x0, 0xffffffff, 0x0, 0x3}, 0x0, 0x4000000000e, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=0xffffffffffffffff, 0x4) r3 = socket$kcm(0x2c, 0x3, 0x0) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) socketpair(0x9, 0x6, 0x6, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x11b, 0x6, &(0x7f0000000000)=r4, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000980)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0500000000000000", @ANYRES32, @ANYBLOB="2e3b2736cfdbbfa32910c9dbf7d9ca5c5b908b2774e9fcee878e67bfd79065d0590b7400cac863fff0824bb8cc4c6705d46df26f95ce94e833f66e2eb1b0b24270cc6094cde44045f7dfbaae1bd9481204344af6b58a50405e6f78e3346c5b7a85f71bf8b18af9a6a8df35fbed7454f83ca86406e6ee3d81181c99dfbc5cd68d96c03185ce216407573ba419c9aca9009cbc410bd0cd21f28d4dd5552154e8faa61a3d2d3706ef1c764e23c5caac49cc376c6ba20403ad8cfa6c74dbf78271c395959f", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x20) recvmsg$unix(r4, &(0x7f0000000340)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000880)=[{&(0x7f0000000800)=""/13, 0xd}, {&(0x7f00000002c0)=""/28, 0x1c}, {&(0x7f0000000640)=""/237, 0xed}, {&(0x7f0000000740)=""/174, 0xae}, {&(0x7f0000000bc0)=""/129, 0x81}], 0x5, &(0x7f0000000900)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x58}, 0x1) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000140)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000000400000000000000c0000000852000000100000018190000", @ANYRES32=r0, @ANYBLOB="00000000000000001811060075b4cbe6377d8c2fd55bcd2bda9fe6ce79f2c9fb7b535d4e75287401e027ef7d3798b8127cad1bf1cbbaca81704af9de15a93f9e2675a8a2f9340fcb28588a70f81013e853ef375eccbe6e1dd3ae0f4161cf09192cf750b18690985cd46c0149dd11bbf6e5712a67f6d0039fc70e774513f37a9659908e81abc40ca989b1b6260e1f1c16e11dac17ef9f50c10e4bd95b772f5e059a850a04224eec0173788d14738ab5fb8a3666bbcbe43dc3d640db0b462cd9a3eb6501410884f3d8c044b6c8e3", @ANYRES32=r0, @ANYRES64, @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180000000100000000000000dc000000183700000300000000000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0xfffffff8, 0xa0, &(0x7f0000000300)=""/160, 0x82100, 0x0, '\x00', r1, 0x25, r2, 0x8, &(0x7f0000000400)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0x4, 0xc00, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000480)=[r0, r0, r4], &(0x7f00000004c0), 0x10, 0x5df5}, 0x94) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000600), 0x4) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000000)) 945.306724ms ago: executing program 5 (id=821): socket$kcm(0xa, 0x1, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1a, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_crypto(0x10, 0x3, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x16, 0x0, &(0x7f00000000c0)="e460cdfbef2408002900119386dd6a00000000072feb", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef42b000000e3bd6efb010511000b0002000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 864.761413ms ago: executing program 4 (id=822): r0 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10, 0x0}, 0x300060c1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000016c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x18) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_bp={&(0x7f0000001700), 0xd}, 0x1dff8, 0x4, 0x98, 0x0, 0x82, 0xffdff271, 0xfffc, 0x0, 0x200, 0x0, 0x20}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="640000000206010800000000000000000000fffd14000780080011400000000805001500200900000500010006000000050005000a00000005000400000000000900020073797a3000000000150003"], 0x64}}, 0x80) setsockopt$sock_attach_bpf(r0, 0x6, 0x3, &(0x7f00000000c0), 0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xb, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000015c0)=ANY=[@ANYBLOB="340000003e000900000000000008000003000000040000001c0001801800108014000d"], 0x34}}, 0x0) sendmsg$inet(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000005c0)='=', 0x1}], 0x1}, 0x41) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99ee}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000002380)={r6, 0x0, 0x2d, 0x0, @val=@netfilter={0x2, 0x4, 0x600, 0x1}}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)=r6}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1, 0x8, 0x0, 0x0}}, 0x10) r10 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffa}, [@call={0x85, 0x0, 0x0, 0x36}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r12, 0x0, 0xe, 0x0, &(0x7f0000000100)="178d048604bf0bfb1945d7430008", 0x0, 0x501, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) close(r11) write$cgroup_pid(r11, &(0x7f00000005c0), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x1a, 0x9, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000079ff0100000000000000004080722000f0ffffff180000000600000000000000060000008510000004100000180000000100000000000000040000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x7, 0x1000, &(0x7f0000000600)=""/4096, 0x41000, 0x2, '\x00', r8, @tracing, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x2, 0x10, 0x9, 0x8}, 0x10, r9, r11, 0x9, &(0x7f00000004c0)=[r10, r11], &(0x7f0000000500)=[{0x4, 0x5, 0x1}, {0x5, 0x1, 0xf, 0xa}, {0x4, 0x1, 0xe, 0xb}, {0x1, 0x5, 0x8, 0x8}, {0x5, 0x3, 0x3, 0x9}, {0x1, 0x5, 0x8, 0xc}, {0x4, 0x5, 0xb, 0x1}, {0x4, 0x5, 0xa, 0x3}, {0x1, 0x1, 0x5, 0x9}], 0x10, 0x8}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) recvmsg$unix(r13, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x4d}, 0x0) write$cgroup_subtree(r14, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102032908000000000000000000000000ac14140a000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xe, 0x5, 0xd0, 0x6, 0x1008, r7, 0x47, '\x00', r8, r14, 0x2, 0x4, 0x5}, 0x50) close(r0) 435.412705ms ago: executing program 5 (id=823): r0 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000580)}], 0x1}, 0x20000000) perf_event_open(&(0x7f0000000280)={0x826b6be9b9579a0, 0x80, 0x52, 0x1, 0x3, 0x9, 0x0, 0x7fef, 0x84, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_config_ext={0x984}, 0x10630d, 0x9, 0xfffffbfd, 0x3, 0x8000, 0x0, 0xfff7, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x400000002, 0x0) socketpair(0x1, 0x1, 0x800, &(0x7f00000001c0)) close(0xffffffffffffffff) r1 = socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x17, 0x8, &(0x7f0000000680)=ANY=[@ANYBLOB="1808000000000000000000000000000085000000ba0000006d0000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x33}, 0x94) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) r2 = perf_event_open(0x0, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x8, 0x50, 0x28, 0x6, 0x0, 0x27, 0x2004, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xf0b, 0x0, @perf_bp={0x0, 0x4}, 0x101, 0xffffffffff7ffffe, 0xb38b, 0x8, 0x9, 0x6, 0x136, 0x0, 0x66989206, 0x0, 0xffffffffffffffff}, 0x0, 0xa, r2, 0xf) r3 = getpid() bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x5d32, 0x30, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x100, 0x0, 0x0, 0x7}, 0x0, 0x6, 0xffffffffffffffff, 0x8) syz_open_procfs$namespace(r3, &(0x7f0000000200)='ns/ipc\x00') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) close(r4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) r5 = socket$kcm(0x10, 0x2, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$inet(r5, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)="c7", 0x1}], 0x1, &(0x7f0000000200)=ANY=[], 0x20}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c3830323131"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x40050) recvmsg(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000140)=""/104, 0x68}, {&(0x7f0000000700)=""/71, 0x47}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000004200)=""/4098, 0x1002}, {&(0x7f00000031c0)=""/4110, 0x100e}, {&(0x7f0000000240)=""/129, 0x81}], 0x6}, 0x10100) recvmsg(r6, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x12040) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff7) ioctl$TUNGETVNETLE(r4, 0x40047451, &(0x7f0000000180)) close(r4) socket$kcm(0x21, 0x2, 0x2) 356.541164ms ago: executing program 0 (id=824): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x89f6, &(0x7f0000000900)={'sit0\x00', @random="1e40002000"}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x282, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff, 0x4, 0x18}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xfffff000, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0xfffffffe}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="0b000000b9000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="b8502700000000003ac17cc9f6c10e01f70e0000000700"/38], 0x48) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001900)=ANY=[@ANYBLOB="180000002d0009002dbd70000000000004c7e90004001d004f1bfc1e42796152d5556b4f283dcc9cca1a724a80946e1a5f039d3d5cf2a3419178dc82da79a4d3103b69ac56e2b383b8ce0062776970741079cf22959d08ddf42820a18c22ae24732c1d2afe328aadccf2b2905457d6ffb737f6a78ee36f0e6444f6b8ec546eb7c3c048f72e11e30232c245caa7a58c5caea366a9fd24c806"], 0x18}, 0x1, 0x0, 0x0, 0x42804}, 0x84) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b00000007000000020001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000705a56db2a5130ce0528c1ee810dd37e4da4715e25e83b68374e6533af2ad50a48bd3346c19e2fa2"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000400)={0xd1c}, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = socket$key(0xf, 0x3, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$key(r4, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000080)={&(0x7f0000000300)={0x2, 0x5, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0xe, @in6={0xa, 0x4e20, 0xe3d, @remote, 0x7}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x31, 0x0, 0x0, @in6={0xa, 0x4e20, 0x3ff, @remote, 0x4}}]}, 0x70}}, 0x8014) 345.847708ms ago: executing program 3 (id=825): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24040041}, 0x4080) socket$kcm(0x2, 0x1, 0x84) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x7}}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @match={{0xa}, @val={0x18, 0x2, 0x0, 0x1, [@NFTA_MATCH_REV={0x8}, @NFTA_MATCH_INFO={0x4}, @NFTA_MATCH_NAME={0x8, 0x1, 'u32\x00'}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}, 0x1, 0x0, 0x0, 0x8010}, 0x4000800) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$RDMA_NLDEV_CMD_RES_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000600)=ANY=[@ANYBLOB="20000000000700010000000800010001000000ea0b59bcd758c00c780c2f1616f0f45c0e1cae1dab46ed3c388c1bd526806a14e7f2defa52f4388ab520adb4060417103fd99a3ded0a3847190af2ad29ebfd0aa5cc3297bf8e04d1829d58f0f01a1b98859f83996b2a380ec1a4054c559ed528cf10d0643894d07096148e84ba79c7f4c83a99c96849f0e6b3ba44ba4f0c2c9b7df8ec101eeb44bddf7ef2e67baf1df5930f15f617ff47868aa8521f73c36fbf21f5d66500"/196], 0x20}, 0x1, 0x0, 0x0, 0x44}, 0x8001) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2040, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x80002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xeb, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x8, 0xffffffffffffffff}, 0x4, 0x0, 0x5, 0x1, 0x9, 0x800000, 0xffff, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x64) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) r3 = socket$kcm(0x2a, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x541b, &(0x7f0000000140)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000040)='percpu_free_percpu\x00'}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0xa, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0x4}, [@NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x26}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x80}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000800}, 0xc015) socket$kcm(0xa, 0x5, 0x0) write$cgroup_int(r4, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1943}, 0x5000, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r5, 0x0, 0x29, 0x0, 0x20000) 166.846369ms ago: executing program 3 (id=826): r0 = socket$kcm(0xf, 0x3, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events.local\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2106, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xe}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7040000010000008500000078000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000980)='tlb_flush\x00', r2}, 0x18) socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='sched_switch\x00', r4, 0x0, 0x100a}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000000c0)={r6}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r5}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'netpci0\x00', 0x800}) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848110000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000380)={r0}) sendmsg$inet(r8, &(0x7f00000000c0)={0x0, 0x24, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}], 0xc8}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1d, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x4}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) 158.388322ms ago: executing program 1 (id=827): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="c3aa00fe0100000071101a000000000095"], &(0x7f0000000480)='syzkaller\x00'}, 0x94) socket$kcm(0x10, 0x2, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x23c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x2071, 0xfffffffffffffffc, 0x0, 0x0, 0x40000, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x5, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000340)='FREEZING\x00', 0x9) close(0xffffffffffffffff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0xfffffffffffffffd) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x17, &(0x7f0000000700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}, {}, {}, [@alu={0x7, 0x1, 0x5, 0xa, 0x0, 0x20}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @jmp={0x5, 0x1, 0x3, 0x5, 0x7, 0x2, 0x4}, @jmp={0x5, 0x0, 0xd, 0x4, 0x6, 0xffffffffffffffa0, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000580)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0xe, 0xfffffffc, 0x68f}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000800)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000840)=[{0x3, 0x2, 0xe, 0x8}, {0x2, 0x5, 0x4, 0x6}], 0x10, 0x8}, 0x94) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000940)=r1) setsockopt$sock_attach_bpf(r0, 0x84, 0x18, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000600)=""/216, 0xd8}], 0x1}, 0x23) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbff}, 0x94) socket$igmp(0x2, 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8b0f, &(0x7f0000000080)={'wlan1\x00', @random="0600"}) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r3, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0x7c, 0x2, 0x8, 0x301, 0x0, 0x0, {0x5, 0x0, 0x4}, [@CTA_TIMEOUT_DATA={0x24, 0x4, 0x0, 0x1, @icmp=[@CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x542f}, @CTA_TIMEOUT_ICMP_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x400}]}, @CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x24, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0xffffffc0}, @CTA_TIMEOUT_DCCP_REQUEST={0x8, 0x1, 0x1, 0x0, 0x8d}, @CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0xfffffffc}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4c800}, 0x40040) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x3400c0c1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 104.703284ms ago: executing program 5 (id=828): r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext={0x1, 0x1944}, 0x14440, 0x5bc, 0x0, 0x8, 0x3, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="160a0000000000006110ac000000000095"], &(0x7f0000000000)='GPL\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4) socket$kcm(0x10, 0x2, 0x0) (async) socket$kcm(0x10, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) (async) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x8003}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0x94, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x6c, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_LEN={0x8, 0x4, 0x1, 0x0, 0x22}, @NFTA_EXTHDR_TYPE={0x5, 0x2, 0x7}]}}}, {0x34, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x14}, @NFTA_BITWISE_MASK={0x8, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}]}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x108}, 0x1, 0x0, 0x0, 0x80}, 0x0) socket$kcm(0x22, 0x2, 0x21) (async) r4 = socket$kcm(0x22, 0x2, 0x21) setsockopt$sock_attach_bpf(r4, 0x10e, 0xa, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) socket$kcm(0x10, 0x400000002, 0x0) (async) r5 = socket$kcm(0x10, 0x400000002, 0x0) r6 = socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0x12, &(0x7f00000008c0)=r8, 0x4) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) (async) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) write$cgroup_subtree(r5, 0x0, 0xfe33) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xa6c}, 0x104020}, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xa6c}, 0x104020}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r9 = getpid() syz_open_procfs$namespace(r9, 0x0) 78.671018ms ago: executing program 0 (id=829): r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000001580)=@l2tp6={0xa, 0x0, 0x0, @remote, 0x41}, 0x80, &(0x7f0000000140)=[{&(0x7f0000001d80)="e4", 0x1}], 0x1}, 0x44850) (fail_nth: 11) 0s ago: executing program 0 (id=830): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) kernel console output (not intermixed with test programs): hci3: unexpected cc 0x0c38 length: 249 > 2 [ 72.524458][ T5862] chnl_net:caif_netlink_parms(): no params data found [ 72.597693][ T5872] chnl_net:caif_netlink_parms(): no params data found [ 72.803321][ T5862] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.811200][ T5862] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.818593][ T5862] bridge_slave_0: entered allmulticast mode [ 72.826185][ T5862] bridge_slave_0: entered promiscuous mode [ 72.838280][ T5862] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.845952][ T5862] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.853222][ T5862] bridge_slave_1: entered allmulticast mode [ 72.861006][ T5862] bridge_slave_1: entered promiscuous mode [ 72.937207][ T5877] chnl_net:caif_netlink_parms(): no params data found [ 72.969124][ T5872] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.976714][ T5872] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.984055][ T5872] bridge_slave_0: entered allmulticast mode [ 72.991080][ T5872] bridge_slave_0: entered promiscuous mode [ 73.036936][ T5862] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.054261][ T5864] chnl_net:caif_netlink_parms(): no params data found [ 73.066579][ T5872] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.074508][ T5872] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.081857][ T5872] bridge_slave_1: entered allmulticast mode [ 73.088787][ T5872] bridge_slave_1: entered promiscuous mode [ 73.110663][ T5862] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.194288][ T5874] chnl_net:caif_netlink_parms(): no params data found [ 73.220055][ T5872] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.235828][ T5862] team0: Port device team_slave_0 added [ 73.255615][ T5872] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.287882][ T5862] team0: Port device team_slave_1 added [ 73.388282][ T5872] team0: Port device team_slave_0 added [ 73.407918][ T5862] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 73.415458][ T5862] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 73.442685][ T5862] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 73.476371][ T5872] team0: Port device team_slave_1 added [ 73.482625][ T5877] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.489988][ T5877] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.497195][ T5877] bridge_slave_0: entered allmulticast mode [ 73.504801][ T5877] bridge_slave_0: entered promiscuous mode [ 73.512823][ T5862] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 73.520239][ T5862] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 73.546425][ T5862] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 73.563991][ T5864] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.571254][ T5864] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.578509][ T5864] bridge_slave_0: entered allmulticast mode [ 73.586906][ T5864] bridge_slave_0: entered promiscuous mode [ 73.607272][ T5877] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.615657][ T5877] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.622970][ T5877] bridge_slave_1: entered allmulticast mode [ 73.630290][ T5877] bridge_slave_1: entered promiscuous mode [ 73.647316][ T5864] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.655294][ T5864] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.662919][ T5864] bridge_slave_1: entered allmulticast mode [ 73.670369][ T5864] bridge_slave_1: entered promiscuous mode [ 73.748835][ T5872] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 73.756319][ T5872] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 73.782952][ T5872] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 73.810612][ T5877] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.823356][ T5877] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.846382][ T5864] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.856478][ T5872] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 73.863843][ T5872] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 73.890169][ T5872] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 73.933557][ T5874] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.940814][ T5874] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.948094][ T5874] bridge_slave_0: entered allmulticast mode [ 73.956001][ T5874] bridge_slave_0: entered promiscuous mode [ 73.964712][ T5864] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.001952][ T5864] team0: Port device team_slave_0 added [ 74.014451][ T5870] Bluetooth: hci0: command tx timeout [ 74.021124][ T51] Bluetooth: hci2: command tx timeout [ 74.034203][ T5862] hsr_slave_0: entered promiscuous mode [ 74.040904][ T5862] hsr_slave_1: entered promiscuous mode [ 74.060708][ T5874] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.068456][ T5874] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.076965][ T5874] bridge_slave_1: entered allmulticast mode [ 74.084447][ T5874] bridge_slave_1: entered promiscuous mode [ 74.090170][ T5870] Bluetooth: hci3: command tx timeout [ 74.096144][ T5184] Bluetooth: hci4: command tx timeout [ 74.102513][ T51] Bluetooth: hci1: command tx timeout [ 74.111342][ T5864] team0: Port device team_slave_1 added [ 74.135739][ T5872] hsr_slave_0: entered promiscuous mode [ 74.143148][ T5872] hsr_slave_1: entered promiscuous mode [ 74.149349][ T5872] debugfs: 'hsr0' already exists in 'hsr' [ 74.155955][ T5872] Cannot create hsr debugfs directory [ 74.164465][ T5877] team0: Port device team_slave_0 added [ 74.209986][ T5864] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 74.217034][ T5864] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 74.243740][ T5864] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 74.256334][ T5877] team0: Port device team_slave_1 added [ 74.265077][ T5874] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.278560][ T5874] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.310307][ T5864] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 74.317273][ T5864] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 74.343617][ T5864] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 74.472821][ T5877] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 74.481475][ T5877] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 74.509000][ T5877] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 74.522474][ T5874] team0: Port device team_slave_0 added [ 74.529136][ T5877] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 74.537460][ T5877] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 74.563688][ T5877] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 74.596778][ T5874] team0: Port device team_slave_1 added [ 74.677851][ T5864] hsr_slave_0: entered promiscuous mode [ 74.684461][ T5864] hsr_slave_1: entered promiscuous mode [ 74.691790][ T5864] debugfs: 'hsr0' already exists in 'hsr' [ 74.697537][ T5864] Cannot create hsr debugfs directory [ 74.715855][ T5874] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 74.722935][ T5874] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 74.754082][ T5874] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 74.789247][ T5874] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 74.796551][ T5874] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 74.823329][ T5874] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 74.899093][ T5877] hsr_slave_0: entered promiscuous mode [ 74.905417][ T5877] hsr_slave_1: entered promiscuous mode [ 74.912216][ T5877] debugfs: 'hsr0' already exists in 'hsr' [ 74.917985][ T5877] Cannot create hsr debugfs directory [ 75.098876][ T5874] hsr_slave_0: entered promiscuous mode [ 75.105538][ T5874] hsr_slave_1: entered promiscuous mode [ 75.112414][ T5874] debugfs: 'hsr0' already exists in 'hsr' [ 75.118145][ T5874] Cannot create hsr debugfs directory [ 75.298266][ T5862] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 75.330046][ T5862] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 75.368559][ T5862] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 75.386367][ T5862] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 75.497760][ T5872] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 75.512604][ T5872] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 75.524696][ T5872] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 75.548551][ T5872] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 75.622579][ T5864] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 75.638060][ T5864] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 75.653586][ T5864] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 75.680290][ T5864] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 75.746409][ T5877] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 75.761420][ T5877] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 75.773265][ T5877] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 75.787445][ T5877] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 75.907115][ T5874] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 75.926998][ T5874] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 75.962545][ T5862] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.969456][ T5874] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 75.984234][ T5874] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 76.043237][ T5862] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.077824][ T61] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.085157][ T61] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.090902][ T51] Bluetooth: hci0: command tx timeout [ 76.098478][ T5184] Bluetooth: hci2: command tx timeout [ 76.124681][ T5872] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.137744][ T61] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.144889][ T61] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.169071][ T5864] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.170420][ T51] Bluetooth: hci1: command tx timeout [ 76.176298][ T5870] Bluetooth: hci3: command tx timeout [ 76.181782][ T5184] Bluetooth: hci4: command tx timeout [ 76.258523][ T5864] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.277125][ T5872] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.307415][ T1100] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.314590][ T1100] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.324097][ T1100] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.331207][ T1100] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.353808][ T5877] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.379125][ T1100] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.386382][ T1100] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.396512][ T1100] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.403664][ T1100] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.497355][ T5877] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.514168][ T5874] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.537045][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.544320][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.623247][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.630466][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.658728][ T5874] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.692829][ T5872] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 76.717863][ T1100] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.725156][ T1100] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.791424][ T1100] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.798582][ T1100] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.986553][ T5862] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.105919][ T5864] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.259931][ T5864] veth0_vlan: entered promiscuous mode [ 77.305250][ T5864] veth1_vlan: entered promiscuous mode [ 77.374008][ T5872] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.425797][ T5877] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.497624][ T5874] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.535509][ T5864] veth0_macvtap: entered promiscuous mode [ 77.573591][ T5864] veth1_macvtap: entered promiscuous mode [ 77.608158][ T5872] veth0_vlan: entered promiscuous mode [ 77.626122][ T5864] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 77.650366][ T5864] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 77.668917][ T1100] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.678974][ T1100] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.693682][ T5877] veth0_vlan: entered promiscuous mode [ 77.708618][ T1100] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.717586][ T1100] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.731058][ T5872] veth1_vlan: entered promiscuous mode [ 77.773100][ T5877] veth1_vlan: entered promiscuous mode [ 77.831547][ T5874] veth0_vlan: entered promiscuous mode [ 77.855278][ T5874] veth1_vlan: entered promiscuous mode [ 77.872828][ T5862] veth0_vlan: entered promiscuous mode [ 77.918635][ T5872] veth0_macvtap: entered promiscuous mode [ 77.929293][ T5970] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 77.938928][ T5862] veth1_vlan: entered promiscuous mode [ 77.947538][ T5970] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 77.992072][ T5877] veth0_macvtap: entered promiscuous mode [ 78.008315][ T5872] veth1_macvtap: entered promiscuous mode [ 78.025840][ T3525] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 78.027138][ T5877] veth1_macvtap: entered promiscuous mode [ 78.040689][ T3525] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 78.093597][ T5874] veth0_macvtap: entered promiscuous mode [ 78.116105][ T5862] veth0_macvtap: entered promiscuous mode [ 78.125375][ T5874] veth1_macvtap: entered promiscuous mode [ 78.128838][ T5864] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 78.148331][ T5874] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 78.162672][ T5877] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 78.173396][ T51] Bluetooth: hci0: command tx timeout [ 78.181150][ T5184] Bluetooth: hci2: command tx timeout [ 78.186013][ T5872] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 78.218676][ T5877] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 78.241015][ T5862] veth1_macvtap: entered promiscuous mode [ 78.251176][ T5184] Bluetooth: hci3: command tx timeout [ 78.256633][ T51] Bluetooth: hci4: command tx timeout [ 78.257148][ T5870] Bluetooth: hci1: command tx timeout [ 78.283905][ T5872] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 78.315981][ T3525] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.331187][ T5874] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 78.339238][ T3525] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.352147][ T3525] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.370787][ T3525] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.380682][ T36] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.390863][ T36] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.400928][ T36] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.444217][ T36] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.492894][ T36] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.518660][ T36] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.542587][ T5984] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 78.567903][ T5862] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 78.569520][ C1] hrtimer: interrupt took 56329 ns [ 78.589728][ T5862] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 78.611820][ T36] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.621227][ T36] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.709360][ T36] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.735990][ T1100] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 78.744305][ T1100] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 78.755016][ T36] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.766415][ T36] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.785774][ T36] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.811612][ T1100] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 78.826289][ T1100] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 78.897571][ T1100] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 78.911317][ T1100] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 78.978057][ T36] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 79.001256][ T61] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 79.002584][ T36] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 79.012469][ T5989] netlink: 'syz.3.7': attribute type 10 has an invalid length. [ 79.029075][ T61] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 79.108586][ T5989] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 79.150957][ T1100] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 79.169691][ T1100] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 79.226800][ T1100] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 79.274724][ T1100] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 79.405972][ T36] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 79.425257][ T36] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 79.682288][ T6000] netlink: 32 bytes leftover after parsing attributes in process `syz.2.3'. [ 79.892909][ T6009] netlink: 'syz.1.9': attribute type 2 has an invalid length. [ 80.012242][ T6009] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.9'. [ 80.165870][ T6009] nbd: must specify a device to reconfigure [ 80.250093][ T5870] Bluetooth: hci2: command tx timeout [ 80.252462][ T51] Bluetooth: hci0: command tx timeout [ 80.331997][ T51] Bluetooth: hci1: command tx timeout [ 80.332020][ T5870] Bluetooth: hci4: command tx timeout [ 80.337521][ T51] Bluetooth: hci3: command tx timeout [ 80.464688][ T6013] netlink: 'syz.4.5': attribute type 10 has an invalid length. [ 80.619158][ T6013] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 80.915966][ T6027] netlink: 32 bytes leftover after parsing attributes in process `syz.2.12'. [ 81.117664][ T6032] openvswitch: netlink: IP tunnel dst address not specified [ 81.605319][ T6040] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.17'. [ 81.821763][ T6045] netlink: 32 bytes leftover after parsing attributes in process `syz.3.16'. [ 82.334883][ T6058] IPv6: Can't replace route, no match found [ 82.383150][ T6056] netlink: 'syz.4.21': attribute type 39 has an invalid length. [ 82.521159][ T6060] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.22'. [ 83.077306][ T6070] netlink: 3 bytes leftover after parsing attributes in process `syz.1.25'. [ 83.938334][ T6080] netlink: 32 bytes leftover after parsing attributes in process `syz.4.27'. [ 84.754284][ T6089] netlink: 4 bytes leftover after parsing attributes in process `syz.3.28'. [ 84.815079][ T6093] netlink: 580 bytes leftover after parsing attributes in process `syz.4.30'. [ 85.484865][ T6107] openvswitch: netlink: IP tunnel dst address not specified [ 85.495190][ T6108] IPv6: Can't replace route, no match found [ 85.503418][ T6108] netlink: 'syz.1.35': attribute type 39 has an invalid length. [ 85.726631][ T6112] blkio.reset_stats is deprecated [ 86.277313][ T6131] openvswitch: netlink: IP tunnel dst address not specified [ 86.412591][ T6134] IPv6: Can't replace route, no match found [ 86.447579][ T6134] netlink: 'syz.2.44': attribute type 39 has an invalid length. [ 86.550385][ T6142] netlink: 'syz.1.43': attribute type 39 has an invalid length. [ 86.597670][ T6146] IPv6: Can't replace route, no match found [ 92.283482][ C1] sched: DL replenish lagged too much [ 100.094888][ T982] cfg80211: failed to load regulatory.db [ 100.121243][ T6136] warning: `syz.1.43' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 [ 101.236721][ T6168] Zero length message leads to an empty skb [ 101.543431][ T6172] netlink: 'syz.1.53': attribute type 10 has an invalid length. [ 101.574900][ T6172] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.596942][ T6172] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.663721][ T6179] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.56'. [ 101.718443][ T6180] netlink: 'syz.0.55': attribute type 10 has an invalid length. [ 101.758789][ T6172] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.768151][ T6172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.782647][ T6172] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.791832][ T6172] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.032682][ T6172] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 102.066430][ T6180] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 103.199198][ T6197] netlink: 'syz.4.58': attribute type 2 has an invalid length. [ 103.233092][ T6197] netlink: 132 bytes leftover after parsing attributes in process `syz.4.58'. [ 104.356565][ T6210] netlink: 580 bytes leftover after parsing attributes in process `syz.0.63'. [ 104.660596][ T6214] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.66'. [ 105.550589][ T6236] netlink: 'syz.0.81': attribute type 2 has an invalid length. [ 105.563306][ T6236] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.81'. [ 105.573056][ T6236] nbd: must specify a device to reconfigure [ 106.227865][ T6252] netlink: 'syz.4.75': attribute type 10 has an invalid length. [ 106.237423][ T6252] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.253811][ T6252] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.388663][ T6252] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.398404][ T6252] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.412112][ T6252] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.420121][ T6252] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.743350][ T6263] netlink: 'syz.3.79': attribute type 10 has an invalid length. [ 107.046024][ T6252] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 107.491022][ T6277] openvswitch: netlink: IP tunnel dst address not specified [ 108.038412][ T6286] netlink: 32 bytes leftover after parsing attributes in process `syz.1.83'. [ 108.307870][ T6295] netlink: 'syz.1.87': attribute type 2 has an invalid length. [ 108.323106][ T6295] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.87'. [ 108.359363][ T6295] nbd: must specify a device to reconfigure [ 109.175850][ T6315] netlink: 'syz.0.93': attribute type 10 has an invalid length. [ 109.207542][ T6315] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.225961][ T6315] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.731722][ T6315] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.742084][ T6315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.752092][ T6315] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.760095][ T6315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.866909][ T6325] IPv6: Can't replace route, no match found [ 109.917309][ T6325] netlink: 'syz.2.97': attribute type 39 has an invalid length. [ 110.017896][ T6315] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 110.185073][ T6335] IPv6: Can't replace route, no match found [ 110.663991][ T6338] netlink: 32 bytes leftover after parsing attributes in process `syz.1.98'. [ 110.676179][ T6339] netlink: 'syz.0.101': attribute type 2 has an invalid length. [ 110.704796][ T6339] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.101'. [ 110.721339][ T6339] nbd: must specify a device to reconfigure [ 111.354569][ T6361] netlink: 'syz.0.110': attribute type 10 has an invalid length. [ 111.365177][ T6364] netlink: 'syz.4.109': attribute type 2 has an invalid length. [ 111.439657][ T6364] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.109'. [ 111.485009][ T6364] nbd: must specify a device to reconfigure [ 111.950483][ T6375] netlink: 'syz.0.111': attribute type 10 has an invalid length. [ 111.965754][ T6380] netlink: 132 bytes leftover after parsing attributes in process `syz.2.114'. [ 112.191424][ T6376] Illegal XDP return value 3896002841 on prog (id 129) dev N/A, expect packet loss! [ 112.302886][ T6385] IPv6: Can't replace route, no match found [ 112.542845][ T6399] netlink: 'syz.0.119': attribute type 2 has an invalid length. [ 112.589541][ T6399] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.119'. [ 112.658858][ T6399] nbd: must specify a device to reconfigure [ 112.810786][ T6412] netlink: 'syz.1.123': attribute type 10 has an invalid length. [ 112.841198][ T6412] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 113.022826][ T6414] netlink: 'syz.2.124': attribute type 10 has an invalid length. [ 113.107919][ T6414] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 113.348261][ T6421] netlink: 'syz.2.126': attribute type 10 has an invalid length. [ 113.974453][ T6431] openvswitch: netlink: IP tunnel dst address not specified [ 114.325574][ T6436] netlink: 4 bytes leftover after parsing attributes in process `syz.1.130'. [ 114.721525][ T6447] openvswitch: netlink: IP tunnel dst address not specified [ 114.908766][ T6455] netlink: 'syz.0.137': attribute type 10 has an invalid length. [ 115.763216][ T6477] netlink: 32 bytes leftover after parsing attributes in process `syz.3.142'. [ 116.423392][ T6493] IPv6: Can't replace route, no match found [ 116.496297][ T6497] openvswitch: netlink: IP tunnel dst address not specified [ 117.722099][ T6517] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.158'. [ 117.831520][ T6519] netlink: 4 bytes leftover after parsing attributes in process `syz.4.159'. [ 120.219141][ T6536] netlink: 32 bytes leftover after parsing attributes in process `syz.2.161'. [ 123.951184][ T6553] IPv6: Can't replace route, no match found [ 124.174078][ T6559] openvswitch: netlink: IP tunnel dst address not specified [ 124.753759][ T6573] netlink: 4 bytes leftover after parsing attributes in process `syz.1.173'. [ 125.097608][ T6593] netlink: 'syz.4.182': attribute type 10 has an invalid length. [ 125.386382][ T6601] netlink: 16 bytes leftover after parsing attributes in process `syz.1.184'. [ 125.406426][ T6601] wlan0 speed is unknown, defaulting to 1000 [ 125.424680][ T6601] wlan0 speed is unknown, defaulting to 1000 [ 125.443617][ T6601] wlan0 speed is unknown, defaulting to 1000 [ 125.911307][ T6613] openvswitch: netlink: IP tunnel dst address not specified [ 125.939327][ T6601] infiniband syz1: set active [ 125.945332][ T10] wlan0 speed is unknown, defaulting to 1000 [ 126.029578][ T6601] infiniband syz1: added wlan0 [ 126.134802][ T6617] netlink: 4 bytes leftover after parsing attributes in process `syz.4.190'. [ 126.226597][ T6601] RDS/IB: syz1: added [ 126.284009][ T6601] smc: adding ib device syz1 with port count 1 [ 126.322693][ T6601] smc: ib device syz1 port 1 has pnetid [ 126.351189][ T10] wlan0 speed is unknown, defaulting to 1000 [ 126.365817][ T6601] wlan0 speed is unknown, defaulting to 1000 [ 126.784821][ T6601] wlan0 speed is unknown, defaulting to 1000 [ 127.298087][ T6656] netlink: 16 bytes leftover after parsing attributes in process `syz.0.203'. [ 127.503365][ T6659] netlink: 4 bytes leftover after parsing attributes in process `syz.2.204'. [ 127.523330][ T6664] FAULT_INJECTION: forcing a failure. [ 127.523330][ T6664] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 127.567942][ T6601] wlan0 speed is unknown, defaulting to 1000 [ 127.569663][ T6664] CPU: 1 UID: 0 PID: 6664 Comm: syz.0.206 Not tainted syzkaller #0 PREEMPT(full) [ 127.569683][ T6664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 127.569702][ T6664] Call Trace: [ 127.569709][ T6664] [ 127.569717][ T6664] dump_stack_lvl+0x189/0x250 [ 127.569749][ T6664] ? __pfx____ratelimit+0x10/0x10 [ 127.569768][ T6664] ? __pfx_dump_stack_lvl+0x10/0x10 [ 127.569793][ T6664] ? __pfx__printk+0x10/0x10 [ 127.569815][ T6664] ? __might_fault+0xb0/0x130 [ 127.569840][ T6664] ? __might_fault+0xb0/0x130 [ 127.569867][ T6664] should_fail_ex+0x414/0x560 [ 127.569898][ T6664] _copy_from_user+0x2d/0xb0 [ 127.569920][ T6664] csum_and_copy_from_iter_full+0x4a1/0x1ed0 [ 127.569941][ T6664] ? rcu_is_watching+0x15/0xb0 [ 127.569980][ T6664] ? __pfx_csum_and_copy_from_iter_full+0x10/0x10 [ 127.570005][ T6664] ? policy_nodemask+0x27c/0x720 [ 127.570025][ T6664] ? __pfx_perf_trace_lock+0x10/0x10 [ 127.570053][ T6664] ip_generic_getfrag+0x12f/0x2b0 [ 127.570080][ T6664] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 127.570100][ T6664] ? skb_page_frag_refill+0x199/0x320 [ 127.570133][ T6664] __ip6_append_data+0x205e/0x3f30 [ 127.570178][ T6664] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 127.570221][ T6664] ? __pfx___ip6_append_data+0x10/0x10 [ 127.570241][ T6664] ? __local_bh_enable_ip+0x12d/0x1c0 [ 127.570264][ T6664] ip6_append_data+0x1c4/0x380 [ 127.570285][ T6664] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 127.570309][ T6664] udpv6_sendmsg+0xcec/0x24b0 [ 127.570348][ T6664] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 127.570376][ T6664] ? __pfx_udpv6_sendmsg+0x10/0x10 [ 127.570403][ T6664] ? __pfx___might_resched+0x10/0x10 [ 127.570440][ T6664] ? aa_sk_perm+0x81e/0x950 [ 127.570459][ T6664] ? perf_trace_lock_acquire+0xf5/0x410 [ 127.570485][ T6664] ? inet_send_prepare+0x5c/0x270 [ 127.570512][ T6664] ? inet6_sendmsg+0xe4/0x120 [ 127.570534][ T6664] __sock_sendmsg+0xe5/0x270 [ 127.570561][ T6664] ____sys_sendmsg+0x505/0x830 [ 127.570588][ T6664] ? __pfx_____sys_sendmsg+0x10/0x10 [ 127.570620][ T6664] ? import_iovec+0x74/0xa0 [ 127.570646][ T6664] ___sys_sendmsg+0x21f/0x2a0 [ 127.570669][ T6664] ? __pfx____sys_sendmsg+0x10/0x10 [ 127.570716][ T6664] ? __fget_files+0x2a/0x420 [ 127.570745][ T6664] ? __fget_files+0x2a/0x420 [ 127.570758][ T6664] ? __fget_files+0x3a0/0x420 [ 127.570791][ T6664] __x64_sys_sendmsg+0x19b/0x260 [ 127.570815][ T6664] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 127.570846][ T6664] ? __pfx_ksys_write+0x10/0x10 [ 127.570865][ T6664] ? rcu_is_watching+0x15/0xb0 [ 127.570887][ T6664] ? do_syscall_64+0xbe/0x3b0 [ 127.570910][ T6664] do_syscall_64+0xfa/0x3b0 [ 127.570925][ T6664] ? lockdep_hardirqs_on+0x9c/0x150 [ 127.570942][ T6664] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 127.570958][ T6664] ? clear_bhb_loop+0x60/0xb0 [ 127.570978][ T6664] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 127.570994][ T6664] RIP: 0033:0x7efcf8d8ec29 [ 127.571013][ T6664] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 127.571026][ T6664] RSP: 002b:00007efcf6ff6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 127.571046][ T6664] RAX: ffffffffffffffda RBX: 00007efcf8fd5fa0 RCX: 00007efcf8d8ec29 [ 127.571057][ T6664] RDX: 0000000000000080 RSI: 0000200000000240 RDI: 0000000000000006 [ 127.571066][ T6664] RBP: 00007efcf6ff6090 R08: 0000000000000000 R09: 0000000000000000 [ 127.571076][ T6664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 127.571085][ T6664] R13: 00007efcf8fd6038 R14: 00007efcf8fd5fa0 R15: 00007ffc1e3745b8 [ 127.571116][ T6664] [ 127.776896][ T6669] openvswitch: netlink: IP tunnel dst address not specified [ 127.981095][ T6671] netlink: 32 bytes leftover after parsing attributes in process `syz.0.208'. [ 128.578354][ T6601] wlan0 speed is unknown, defaulting to 1000 [ 128.964756][ T6601] wlan0 speed is unknown, defaulting to 1000 [ 129.073825][ T6690] netlink: 32 bytes leftover after parsing attributes in process `syz.2.211'. [ 129.196779][ T6693] TCP: TCP_TX_DELAY enabled [ 129.415042][ T6699] xt_socket: unknown flags 0x6 [ 129.438300][ T6700] netlink: 'syz.0.217': attribute type 10 has an invalid length. [ 129.698558][ T6709] netlink: 32 bytes leftover after parsing attributes in process `syz.0.220'. [ 129.890865][ T6716] netlink: 4 bytes leftover after parsing attributes in process `syz.4.221'. [ 130.109346][ T6720] netlink: 32 bytes leftover after parsing attributes in process `syz.1.223'. [ 130.558220][ T6727] openvswitch: netlink: IP tunnel dst address not specified [ 130.719387][ T6728] netlink: 32 bytes leftover after parsing attributes in process `syz.3.226'. [ 131.137582][ T6745] xt_socket: unknown flags 0x6 [ 131.162782][ T6744] netlink: 'syz.0.230': attribute type 10 has an invalid length. [ 131.662032][ T6749] IPv6: Can't replace route, no match found [ 131.801567][ T6757] netlink: 'syz.3.233': attribute type 39 has an invalid length. [ 131.910333][ T6760] netlink: 32 bytes leftover after parsing attributes in process `syz.4.235'. [ 132.208357][ T6765] netlink: 4 bytes leftover after parsing attributes in process `syz.2.238'. [ 132.895978][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.904266][ T1303] ieee802154 phy1 wpan1: encryption failed: -22 [ 132.959698][ T6781] netlink: 32 bytes leftover after parsing attributes in process `syz.4.239'. [ 133.758938][ T6797] netlink: 32 bytes leftover after parsing attributes in process `syz.0.250'. [ 134.011375][ T6814] netlink: 'syz.0.256': attribute type 1 has an invalid length. [ 134.012885][ T6818] FAULT_INJECTION: forcing a failure. [ 134.012885][ T6818] name failslab, interval 1, probability 0, space 0, times 0 [ 134.035662][ T6818] CPU: 1 UID: 0 PID: 6818 Comm: syz.3.258 Not tainted syzkaller #0 PREEMPT(full) [ 134.035683][ T6818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 134.035693][ T6818] Call Trace: [ 134.035699][ T6818] [ 134.035706][ T6818] dump_stack_lvl+0x189/0x250 [ 134.035729][ T6818] ? __pfx____ratelimit+0x10/0x10 [ 134.035747][ T6818] ? __pfx_dump_stack_lvl+0x10/0x10 [ 134.035765][ T6818] ? __pfx__printk+0x10/0x10 [ 134.035780][ T6818] ? irqentry_exit+0x74/0x90 [ 134.035806][ T6818] should_fail_ex+0x414/0x560 [ 134.035835][ T6818] should_failslab+0xa8/0x100 [ 134.035861][ T6818] kmem_cache_alloc_noprof+0x73/0x3c0 [ 134.035881][ T6818] ? skb_clone+0x212/0x3a0 [ 134.035907][ T6818] skb_clone+0x212/0x3a0 [ 134.035932][ T6818] __netlink_deliver_tap+0x404/0x850 [ 134.035964][ T6818] ? netlink_deliver_tap+0x2e/0x1b0 [ 134.035984][ T6818] netlink_deliver_tap+0x19c/0x1b0 [ 134.036004][ T6818] netlink_unicast+0x7fa/0x9e0 [ 134.036030][ T6818] ? __pfx_netlink_unicast+0x10/0x10 [ 134.036047][ T6818] ? netlink_sendmsg+0x642/0xb30 [ 134.036063][ T6818] ? skb_put+0x11b/0x210 [ 134.036085][ T6818] netlink_sendmsg+0x805/0xb30 [ 134.036113][ T6818] ? __pfx_netlink_sendmsg+0x10/0x10 [ 134.036135][ T6818] ? aa_sock_msg_perm+0xf1/0x1d0 [ 134.036153][ T6818] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 134.036171][ T6818] ? __pfx_netlink_sendmsg+0x10/0x10 [ 134.036190][ T6818] __sock_sendmsg+0x219/0x270 [ 134.036217][ T6818] ____sys_sendmsg+0x505/0x830 [ 134.036251][ T6818] ? __pfx_____sys_sendmsg+0x10/0x10 [ 134.036281][ T6818] ? import_iovec+0x74/0xa0 [ 134.036306][ T6818] ___sys_sendmsg+0x21f/0x2a0 [ 134.036329][ T6818] ? __pfx____sys_sendmsg+0x10/0x10 [ 134.036382][ T6818] ? __fget_files+0x2a/0x420 [ 134.036396][ T6818] ? __fget_files+0x3a0/0x420 [ 134.036420][ T6818] __x64_sys_sendmsg+0x19b/0x260 [ 134.036440][ T6818] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 134.036480][ T6818] ? do_syscall_64+0xbe/0x3b0 [ 134.036502][ T6818] do_syscall_64+0xfa/0x3b0 [ 134.036520][ T6818] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 134.036535][ T6818] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 134.036551][ T6818] ? clear_bhb_loop+0x60/0xb0 [ 134.036571][ T6818] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 134.036586][ T6818] RIP: 0033:0x7f0686b8ec29 [ 134.036601][ T6818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 134.036614][ T6818] RSP: 002b:00007f06879ce038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 134.036632][ T6818] RAX: ffffffffffffffda RBX: 00007f0686dd5fa0 RCX: 00007f0686b8ec29 [ 134.036643][ T6818] RDX: 0000000000000040 RSI: 00002000000037c0 RDI: 0000000000000007 [ 134.036653][ T6818] RBP: 00007f06879ce090 R08: 0000000000000000 R09: 0000000000000000 [ 134.036663][ T6818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 134.036673][ T6818] R13: 00007f0686dd6038 R14: 00007f0686dd5fa0 R15: 00007ffe29161ba8 [ 134.036701][ T6818] [ 134.610944][ T6827] netlink: 4 bytes leftover after parsing attributes in process `syz.1.261'. [ 134.949097][ T6838] netlink: 14601 bytes leftover after parsing attributes in process `syz.2.265'. [ 135.136643][ T6849] FAULT_INJECTION: forcing a failure. [ 135.136643][ T6849] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 135.156958][ T6849] CPU: 1 UID: 0 PID: 6849 Comm: syz.1.268 Not tainted syzkaller #0 PREEMPT(full) [ 135.156982][ T6849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 135.156992][ T6849] Call Trace: [ 135.156999][ T6849] [ 135.157006][ T6849] dump_stack_lvl+0x189/0x250 [ 135.157030][ T6849] ? __pfx____ratelimit+0x10/0x10 [ 135.157049][ T6849] ? __pfx_dump_stack_lvl+0x10/0x10 [ 135.157068][ T6849] ? __pfx__printk+0x10/0x10 [ 135.157102][ T6849] should_fail_ex+0x414/0x560 [ 135.157132][ T6849] _copy_to_user+0x31/0xb0 [ 135.157155][ T6849] simple_read_from_buffer+0xe1/0x170 [ 135.157184][ T6849] proc_fail_nth_read+0x1b3/0x220 [ 135.157206][ T6849] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 135.157228][ T6849] ? rw_verify_area+0x2a6/0x4d0 [ 135.157248][ T6849] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 135.157268][ T6849] vfs_read+0x200/0xa30 [ 135.157288][ T6849] ? fdget_pos+0x247/0x320 [ 135.157307][ T6849] ? __pfx___mutex_lock+0x10/0x10 [ 135.157327][ T6849] ? __pfx_vfs_read+0x10/0x10 [ 135.157349][ T6849] ? __fget_files+0x2a/0x420 [ 135.157369][ T6849] ? __fget_files+0x3a0/0x420 [ 135.157382][ T6849] ? __fget_files+0x2a/0x420 [ 135.157412][ T6849] ksys_read+0x145/0x250 [ 135.157436][ T6849] ? __pfx_ksys_read+0x10/0x10 [ 135.157463][ T6849] ? do_syscall_64+0xbe/0x3b0 [ 135.157485][ T6849] do_syscall_64+0xfa/0x3b0 [ 135.157504][ T6849] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 135.157519][ T6849] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 135.157535][ T6849] ? clear_bhb_loop+0x60/0xb0 [ 135.157555][ T6849] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 135.157571][ T6849] RIP: 0033:0x7f264b18d63c [ 135.157587][ T6849] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 135.157599][ T6849] RSP: 002b:00007f264c03e030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 135.157617][ T6849] RAX: ffffffffffffffda RBX: 00007f264b3d6090 RCX: 00007f264b18d63c [ 135.157628][ T6849] RDX: 000000000000000f RSI: 00007f264c03e0a0 RDI: 0000000000000007 [ 135.157638][ T6849] RBP: 00007f264c03e090 R08: 0000000000000000 R09: 0000000000000000 [ 135.157648][ T6849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 135.157657][ T6849] R13: 00007f264b3d6128 R14: 00007f264b3d6090 R15: 00007fff2e7e1808 [ 135.157686][ T6849] [ 135.399226][ T6841] netlink: 32 bytes leftover after parsing attributes in process `syz.4.266'. [ 135.541944][ T6854] openvswitch: netlink: Unexpected mask (mask=200040, allowed=10048) [ 135.907911][ T6872] netlink: 64 bytes leftover after parsing attributes in process `syz.4.277'. [ 135.918984][ T6873] netlink: 132 bytes leftover after parsing attributes in process `syz.2.276'. [ 136.035309][ T6876] netlink: 4 bytes leftover after parsing attributes in process `syz.3.278'. [ 136.343522][ T6887] FAULT_INJECTION: forcing a failure. [ 136.343522][ T6887] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 136.362260][ T6887] CPU: 1 UID: 0 PID: 6887 Comm: syz.3.283 Not tainted syzkaller #0 PREEMPT(full) [ 136.362282][ T6887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 136.362292][ T6887] Call Trace: [ 136.362299][ T6887] [ 136.362306][ T6887] dump_stack_lvl+0x189/0x250 [ 136.362330][ T6887] ? __pfx____ratelimit+0x10/0x10 [ 136.362348][ T6887] ? __pfx_dump_stack_lvl+0x10/0x10 [ 136.362367][ T6887] ? __pfx__printk+0x10/0x10 [ 136.362402][ T6887] should_fail_ex+0x414/0x560 [ 136.362431][ T6887] _copy_from_user+0x2d/0xb0 [ 136.362453][ T6887] bpf_test_init+0xf8/0x170 [ 136.362475][ T6887] bpf_prog_test_run_skb+0x1e9/0x1560 [ 136.362490][ T6887] ? __fget_files+0x2a/0x420 [ 136.362508][ T6887] ? __fget_files+0x2a/0x420 [ 136.362529][ T6887] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 136.362547][ T6887] bpf_prog_test_run+0x2c4/0x340 [ 136.362573][ T6887] __sys_bpf+0x55a/0x850 [ 136.362595][ T6887] ? __pfx___sys_bpf+0x10/0x10 [ 136.362630][ T6887] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 136.362652][ T6887] ? __pfx_ksys_write+0x10/0x10 [ 136.362670][ T6887] ? rcu_is_watching+0x15/0xb0 [ 136.362694][ T6887] __x64_sys_bpf+0x7c/0x90 [ 136.362714][ T6887] do_syscall_64+0xfa/0x3b0 [ 136.362730][ T6887] ? lockdep_hardirqs_on+0x9c/0x150 [ 136.362747][ T6887] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 136.362762][ T6887] ? clear_bhb_loop+0x60/0xb0 [ 136.362782][ T6887] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 136.362798][ T6887] RIP: 0033:0x7f0686b8ec29 [ 136.362814][ T6887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 136.362827][ T6887] RSP: 002b:00007f06879ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 136.362843][ T6887] RAX: ffffffffffffffda RBX: 00007f0686dd5fa0 RCX: 00007f0686b8ec29 [ 136.362855][ T6887] RDX: 0000000000000048 RSI: 0000200000000340 RDI: 000000000000000a [ 136.362864][ T6887] RBP: 00007f06879ce090 R08: 0000000000000000 R09: 0000000000000000 [ 136.362874][ T6887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 136.362883][ T6887] R13: 00007f0686dd6038 R14: 00007f0686dd5fa0 R15: 00007ffe29161ba8 [ 136.362911][ T6887] [ 136.801609][ T6896] openvswitch: netlink: IP tunnel dst address not specified [ 137.062728][ T6910] openvswitch: netlink: IP tunnel dst address not specified [ 137.221627][ T6912] IPv6: Can't replace route, no match found [ 137.236158][ T6912] netlink: 'syz.4.292': attribute type 39 has an invalid length. [ 137.317815][ T6921] netlink: 'syz.3.295': attribute type 12 has an invalid length. [ 137.336914][ T6921] netlink: 9472 bytes leftover after parsing attributes in process `syz.3.295'. [ 137.545638][ T6931] netlink: 'syz.4.298': attribute type 10 has an invalid length. [ 137.674303][ T6937] FAULT_INJECTION: forcing a failure. [ 137.674303][ T6937] name failslab, interval 1, probability 0, space 0, times 0 [ 137.693179][ T6937] CPU: 1 UID: 0 PID: 6937 Comm: syz.3.301 Not tainted syzkaller #0 PREEMPT(full) [ 137.693202][ T6937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 137.693212][ T6937] Call Trace: [ 137.693219][ T6937] [ 137.693227][ T6937] dump_stack_lvl+0x189/0x250 [ 137.693252][ T6937] ? __pfx____ratelimit+0x10/0x10 [ 137.693271][ T6937] ? __pfx_dump_stack_lvl+0x10/0x10 [ 137.693288][ T6937] ? __pfx__printk+0x10/0x10 [ 137.693327][ T6937] should_fail_ex+0x414/0x560 [ 137.693357][ T6937] should_failslab+0xa8/0x100 [ 137.693382][ T6937] __kmalloc_cache_noprof+0x70/0x3d0 [ 137.693404][ T6937] ? sctp_add_bind_addr+0x8c/0x370 [ 137.693426][ T6937] sctp_add_bind_addr+0x8c/0x370 [ 137.693448][ T6937] sctp_copy_local_addr_list+0x30b/0x4e0 [ 137.693475][ T6937] ? sctp_copy_local_addr_list+0x9b/0x4e0 [ 137.693492][ T6937] ? __pfx_sctp_copy_local_addr_list+0x10/0x10 [ 137.693514][ T6937] ? sctp_v4_is_any+0x35/0x60 [ 137.693530][ T6937] ? sctp_copy_one_addr+0x93/0x360 [ 137.693550][ T6937] sctp_bind_addr_copy+0xb3/0x3c0 [ 137.693568][ T6937] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 137.693595][ T6937] sctp_connect_new_asoc+0x2e0/0x690 [ 137.693619][ T6937] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 137.693641][ T6937] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 137.693661][ T6937] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 137.693679][ T6937] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 137.693699][ T6937] ? bpf_lsm_sctp_bind_connect+0x9/0x20 [ 137.693718][ T6937] ? security_sctp_bind_connect+0x7e/0x2e0 [ 137.693743][ T6937] sctp_sendmsg+0x155c/0x2810 [ 137.693776][ T6937] ? __pfx_sctp_sendmsg+0x10/0x10 [ 137.693800][ T6937] ? aa_sk_perm+0x81e/0x950 [ 137.693822][ T6937] ? __pfx_aa_sk_perm+0x10/0x10 [ 137.693842][ T6937] ? sock_rps_record_flow+0x19/0x410 [ 137.693869][ T6937] ? inet_sendmsg+0x2f4/0x370 [ 137.693896][ T6937] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 137.693918][ T6937] __sock_sendmsg+0x19c/0x270 [ 137.693945][ T6937] ____sys_sendmsg+0x505/0x830 [ 137.693971][ T6937] ? __pfx_____sys_sendmsg+0x10/0x10 [ 137.694001][ T6937] ? import_iovec+0x74/0xa0 [ 137.694028][ T6937] ___sys_sendmsg+0x21f/0x2a0 [ 137.694050][ T6937] ? __pfx____sys_sendmsg+0x10/0x10 [ 137.694102][ T6937] ? __fget_files+0x2a/0x420 [ 137.694116][ T6937] ? __fget_files+0x3a0/0x420 [ 137.694142][ T6937] __x64_sys_sendmsg+0x19b/0x260 [ 137.694165][ T6937] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 137.694194][ T6937] ? __pfx_ksys_write+0x10/0x10 [ 137.694213][ T6937] ? rcu_is_watching+0x15/0xb0 [ 137.694236][ T6937] ? do_syscall_64+0xbe/0x3b0 [ 137.694258][ T6937] do_syscall_64+0xfa/0x3b0 [ 137.694274][ T6937] ? lockdep_hardirqs_on+0x9c/0x150 [ 137.694290][ T6937] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 137.694305][ T6937] ? clear_bhb_loop+0x60/0xb0 [ 137.694324][ T6937] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 137.694338][ T6937] RIP: 0033:0x7f0686b8ec29 [ 137.694353][ T6937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.694366][ T6937] RSP: 002b:00007f06879ce038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 137.694383][ T6937] RAX: ffffffffffffffda RBX: 00007f0686dd5fa0 RCX: 00007f0686b8ec29 [ 137.694394][ T6937] RDX: 0000000000000010 RSI: 0000200000000ac0 RDI: 0000000000000004 [ 137.694404][ T6937] RBP: 00007f06879ce090 R08: 0000000000000000 R09: 0000000000000000 [ 137.694412][ T6937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 137.694421][ T6937] R13: 00007f0686dd6038 R14: 00007f0686dd5fa0 R15: 00007ffe29161ba8 [ 137.694451][ T6937] [ 138.073099][ T6940] netlink: 'syz.2.302': attribute type 1 has an invalid length. [ 138.288416][ T6953] openvswitch: netlink: IP tunnel dst address not specified [ 138.567140][ T6966] netlink: 'syz.1.308': attribute type 10 has an invalid length. [ 138.627418][ T6966] geneve0: entered promiscuous mode [ 138.683344][ T6965] netlink: 'syz.4.309': attribute type 13 has an invalid length. [ 138.718932][ T6966] bond0: (slave geneve0): Enslaving as an active interface with an up link [ 138.729800][ T6965] netlink: 'syz.4.309': attribute type 17 has an invalid length. [ 138.773809][ T6967] netlink: 'syz.4.309': attribute type 39 has an invalid length. [ 139.247505][ T6983] netlink: 'syz.2.314': attribute type 1 has an invalid length. [ 139.407711][ T6991] netlink: 12 bytes leftover after parsing attributes in process `syz.1.316'. [ 139.417221][ T6991] openvswitch: netlink: Flow actions attr not present in new flow. [ 139.537048][ T6999] netlink: 'syz.2.319': attribute type 10 has an invalid length. [ 140.283779][ T7015] netlink: 132 bytes leftover after parsing attributes in process `syz.2.326'. [ 140.344740][ T7013] netlink: 130984 bytes leftover after parsing attributes in process `syz.4.325'. [ 140.420001][ T7015] bond0: (slave netdevsim0): Enslaving as an active interface with an up link [ 140.452070][ T7022] FAULT_INJECTION: forcing a failure. [ 140.452070][ T7022] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 140.473859][ T7022] CPU: 1 UID: 0 PID: 7022 Comm: syz.3.328 Not tainted syzkaller #0 PREEMPT(full) [ 140.473883][ T7022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 140.473893][ T7022] Call Trace: [ 140.473900][ T7022] [ 140.473908][ T7022] dump_stack_lvl+0x189/0x250 [ 140.473932][ T7022] ? __pfx____ratelimit+0x10/0x10 [ 140.473951][ T7022] ? __pfx_dump_stack_lvl+0x10/0x10 [ 140.473971][ T7022] ? __pfx__printk+0x10/0x10 [ 140.473993][ T7022] ? __might_fault+0xb0/0x130 [ 140.474020][ T7022] ? __might_fault+0xb0/0x130 [ 140.474048][ T7022] should_fail_ex+0x414/0x560 [ 140.474079][ T7022] _copy_from_iter+0x1de/0x1790 [ 140.474118][ T7022] ? __pfx__copy_from_iter+0x10/0x10 [ 140.474140][ T7022] ? __build_skb_around+0x257/0x3e0 [ 140.474161][ T7022] ? netlink_sendmsg+0x642/0xb30 [ 140.474177][ T7022] ? skb_put+0x11b/0x210 [ 140.474199][ T7022] netlink_sendmsg+0x6b2/0xb30 [ 140.474230][ T7022] ? __pfx_netlink_sendmsg+0x10/0x10 [ 140.474253][ T7022] ? aa_sock_msg_perm+0xf1/0x1d0 [ 140.474273][ T7022] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 140.474292][ T7022] ? __pfx_netlink_sendmsg+0x10/0x10 [ 140.474311][ T7022] __sock_sendmsg+0x219/0x270 [ 140.474340][ T7022] ____sys_sendmsg+0x505/0x830 [ 140.474368][ T7022] ? __pfx_____sys_sendmsg+0x10/0x10 [ 140.474401][ T7022] ? import_iovec+0x74/0xa0 [ 140.474427][ T7022] ___sys_sendmsg+0x21f/0x2a0 [ 140.474451][ T7022] ? __pfx____sys_sendmsg+0x10/0x10 [ 140.474498][ T7022] ? __fget_files+0x2a/0x420 [ 140.474529][ T7022] ? __fget_files+0x2a/0x420 [ 140.474543][ T7022] ? __fget_files+0x3a0/0x420 [ 140.474572][ T7022] __x64_sys_sendmsg+0x19b/0x260 [ 140.474597][ T7022] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 140.474629][ T7022] ? __pfx_ksys_write+0x10/0x10 [ 140.474648][ T7022] ? rcu_is_watching+0x15/0xb0 [ 140.474672][ T7022] ? do_syscall_64+0xbe/0x3b0 [ 140.474696][ T7022] do_syscall_64+0xfa/0x3b0 [ 140.474712][ T7022] ? lockdep_hardirqs_on+0x9c/0x150 [ 140.474729][ T7022] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 140.474745][ T7022] ? clear_bhb_loop+0x60/0xb0 [ 140.474767][ T7022] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 140.474780][ T7022] RIP: 0033:0x7f0686b8ec29 [ 140.474795][ T7022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.474807][ T7022] RSP: 002b:00007f06879ce038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 140.474823][ T7022] RAX: ffffffffffffffda RBX: 00007f0686dd5fa0 RCX: 00007f0686b8ec29 [ 140.474833][ T7022] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000004 [ 140.474842][ T7022] RBP: 00007f06879ce090 R08: 0000000000000000 R09: 0000000000000000 [ 140.474851][ T7022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.474867][ T7022] R13: 00007f0686dd6038 R14: 00007f0686dd5fa0 R15: 00007ffe29161ba8 [ 140.474895][ T7022] [ 141.459021][ T7053] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 141.541516][ T7059] wlan0 speed is unknown, defaulting to 1000 [ 142.823068][ T7084] validate_nla: 5 callbacks suppressed [ 142.823087][ T7084] netlink: 'syz.0.349': attribute type 39 has an invalid length. [ 142.893489][ T7087] netlink: 68 bytes leftover after parsing attributes in process `syz.0.349'. [ 143.025290][ T7091] netlink: 32 bytes leftover after parsing attributes in process `syz.1.348'. [ 143.995821][ T7106] netlink: 'syz.2.354': attribute type 10 has an invalid length. [ 144.456817][ T7120] ======================================================= [ 144.456817][ T7120] WARNING: The mand mount option has been deprecated and [ 144.456817][ T7120] and is ignored by this kernel. Remove the mand [ 144.456817][ T7120] option from the mount to silence this warning. [ 144.456817][ T7120] ======================================================= [ 144.506755][ T7120] netlink: 'syz.2.360': attribute type 21 has an invalid length. [ 144.515614][ T7120] netlink: 14581 bytes leftover after parsing attributes in process `syz.2.360'. [ 144.754398][ T7122] netlink: 56 bytes leftover after parsing attributes in process `syz.4.362'. [ 145.005311][ T7126] netlink: 12 bytes leftover after parsing attributes in process `syz.0.364'. [ 145.157088][ T7136] IPv6: Can't replace route, no match found [ 145.181542][ T7136] netlink: 'syz.4.367': attribute type 39 has an invalid length. [ 145.501737][ T7142] netlink: 'syz.0.369': attribute type 10 has an invalid length. [ 146.216263][ T7159] FAULT_INJECTION: forcing a failure. [ 146.216263][ T7159] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 146.230025][ T7159] CPU: 0 UID: 0 PID: 7159 Comm: syz.1.375 Not tainted syzkaller #0 PREEMPT(full) [ 146.230054][ T7159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 146.230064][ T7159] Call Trace: [ 146.230071][ T7159] [ 146.230078][ T7159] dump_stack_lvl+0x189/0x250 [ 146.230101][ T7159] ? irqentry_exit+0x74/0x90 [ 146.230121][ T7159] ? __pfx_dump_stack_lvl+0x10/0x10 [ 146.230164][ T7159] should_fail_ex+0x414/0x560 [ 146.230196][ T7159] _copy_from_user+0x2d/0xb0 [ 146.230218][ T7159] ___sys_sendmsg+0x158/0x2a0 [ 146.230243][ T7159] ? __pfx____sys_sendmsg+0x10/0x10 [ 146.230289][ T7159] ? __fget_files+0x2a/0x420 [ 146.230315][ T7159] ? __fget_files+0x2a/0x420 [ 146.230329][ T7159] ? __fget_files+0x3a0/0x420 [ 146.230355][ T7159] __x64_sys_sendmsg+0x19b/0x260 [ 146.230378][ T7159] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 146.230409][ T7159] ? __pfx_ksys_write+0x10/0x10 [ 146.230436][ T7159] ? do_syscall_64+0xbe/0x3b0 [ 146.230459][ T7159] do_syscall_64+0xfa/0x3b0 [ 146.230478][ T7159] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 146.230493][ T7159] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 146.230507][ T7159] ? clear_bhb_loop+0x60/0xb0 [ 146.230527][ T7159] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 146.230541][ T7159] RIP: 0033:0x7f264b18ec29 [ 146.230556][ T7159] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 146.230570][ T7159] RSP: 002b:00007f264c03e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 146.230587][ T7159] RAX: ffffffffffffffda RBX: 00007f264b3d6090 RCX: 00007f264b18ec29 [ 146.230599][ T7159] RDX: 0000000028040000 RSI: 00002000000002c0 RDI: 0000000000000009 [ 146.230609][ T7159] RBP: 00007f264c03e090 R08: 0000000000000000 R09: 0000000000000000 [ 146.230619][ T7159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 146.230628][ T7159] R13: 00007f264b3d6128 R14: 00007f264b3d6090 R15: 00007fff2e7e1808 [ 146.230660][ T7159] [ 146.985801][ T7167] IPv6: Can't replace route, no match found [ 146.999846][ T7167] netlink: 'syz.0.378': attribute type 39 has an invalid length. [ 147.194136][ T7171] netlink: 'syz.1.380': attribute type 10 has an invalid length. [ 147.252077][ T7173] netlink: 12 bytes leftover after parsing attributes in process `syz.0.381'. [ 147.706665][ T7183] netlink: 14601 bytes leftover after parsing attributes in process `syz.0.385'. [ 148.321211][ T7195] netlink: 220 bytes leftover after parsing attributes in process `syz.3.390'. [ 148.332106][ T7195] FAULT_INJECTION: forcing a failure. [ 148.332106][ T7195] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 148.347496][ T7195] CPU: 0 UID: 0 PID: 7195 Comm: syz.3.390 Not tainted syzkaller #0 PREEMPT(full) [ 148.347518][ T7195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 148.347528][ T7195] Call Trace: [ 148.347538][ T7195] [ 148.347548][ T7195] dump_stack_lvl+0x189/0x250 [ 148.347579][ T7195] ? __pfx____ratelimit+0x10/0x10 [ 148.347606][ T7195] ? __pfx_dump_stack_lvl+0x10/0x10 [ 148.347634][ T7195] ? __pfx__printk+0x10/0x10 [ 148.347682][ T7195] ? __might_fault+0xb0/0x130 [ 148.347738][ T7195] should_fail_ex+0x414/0x560 [ 148.347795][ T7195] _copy_to_user+0x31/0xb0 [ 148.347834][ T7195] simple_read_from_buffer+0xe1/0x170 [ 148.347885][ T7195] proc_fail_nth_read+0x1b3/0x220 [ 148.347926][ T7195] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 148.347967][ T7195] ? rw_verify_area+0x2a6/0x4d0 [ 148.347993][ T7195] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 148.348028][ T7195] vfs_read+0x200/0xa30 [ 148.348054][ T7195] ? fdget_pos+0x247/0x320 [ 148.348094][ T7195] ? __pfx___mutex_lock+0x10/0x10 [ 148.348130][ T7195] ? __pfx_vfs_read+0x10/0x10 [ 148.348170][ T7195] ? __fget_files+0x2a/0x420 [ 148.348212][ T7195] ? __fget_files+0x3a0/0x420 [ 148.348228][ T7195] ? __fget_files+0x2a/0x420 [ 148.348290][ T7195] ksys_read+0x145/0x250 [ 148.348330][ T7195] ? __pfx_ksys_read+0x10/0x10 [ 148.348348][ T7195] ? rcu_is_watching+0x15/0xb0 [ 148.348400][ T7195] ? do_syscall_64+0xbe/0x3b0 [ 148.348443][ T7195] do_syscall_64+0xfa/0x3b0 [ 148.348461][ T7195] ? lockdep_hardirqs_on+0x9c/0x150 [ 148.348484][ T7195] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 148.348503][ T7195] ? clear_bhb_loop+0x60/0xb0 [ 148.348542][ T7195] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 148.348559][ T7195] RIP: 0033:0x7f0686b8d63c [ 148.348581][ T7195] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 148.348594][ T7195] RSP: 002b:00007f06879ce030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 148.348611][ T7195] RAX: ffffffffffffffda RBX: 00007f0686dd5fa0 RCX: 00007f0686b8d63c [ 148.348623][ T7195] RDX: 000000000000000f RSI: 00007f06879ce0a0 RDI: 0000000000000004 [ 148.348634][ T7195] RBP: 00007f06879ce090 R08: 0000000000000000 R09: 0000000000000000 [ 148.348643][ T7195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 148.348653][ T7195] R13: 00007f0686dd6038 R14: 00007f0686dd5fa0 R15: 00007ffe29161ba8 [ 148.348742][ T7195] [ 148.742876][ T7197] netlink: 14601 bytes leftover after parsing attributes in process `syz.3.391'. [ 149.378809][ T7219] netlink: 160 bytes leftover after parsing attributes in process `syz.0.401'. [ 149.525002][ T7222] netlink: 332 bytes leftover after parsing attributes in process `syz.0.402'. [ 151.440178][ T7248] netlink: 16 bytes leftover after parsing attributes in process `syz.0.410'. [ 152.213290][ T7250] IPv6: Can't replace route, no match found [ 152.254527][ T7254] netlink: 160 bytes leftover after parsing attributes in process `syz.3.412'. [ 152.271666][ T7250] netlink: 'syz.4.411': attribute type 39 has an invalid length. [ 152.323211][ T7256] netlink: 'syz.0.414': attribute type 10 has an invalid length. [ 152.485318][ T7262] FAULT_INJECTION: forcing a failure. [ 152.485318][ T7262] name failslab, interval 1, probability 0, space 0, times 0 [ 152.511057][ T7262] CPU: 1 UID: 0 PID: 7262 Comm: syz.3.416 Not tainted syzkaller #0 PREEMPT(full) [ 152.511080][ T7262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 152.511089][ T7262] Call Trace: [ 152.511097][ T7262] [ 152.511105][ T7262] dump_stack_lvl+0x189/0x250 [ 152.511130][ T7262] ? __pfx____ratelimit+0x10/0x10 [ 152.511149][ T7262] ? __pfx_dump_stack_lvl+0x10/0x10 [ 152.511169][ T7262] ? __pfx__printk+0x10/0x10 [ 152.511199][ T7262] ? __pfx___might_resched+0x10/0x10 [ 152.511222][ T7262] should_fail_ex+0x414/0x560 [ 152.511253][ T7262] ? alloc_netdev_mqs+0xa3/0x11b0 [ 152.511273][ T7262] should_failslab+0xa8/0x100 [ 152.511299][ T7262] __kvmalloc_node_noprof+0x161/0x5f0 [ 152.511323][ T7262] ? alloc_netdev_mqs+0xa3/0x11b0 [ 152.511352][ T7262] alloc_netdev_mqs+0xa3/0x11b0 [ 152.511372][ T7262] ? __pfx_do_setup+0x10/0x10 [ 152.511400][ T7262] internal_dev_create+0x8b/0x470 [ 152.511429][ T7262] ovs_vport_add+0x113/0x370 [ 152.511446][ T7262] ? new_vport+0x12/0x190 [ 152.511465][ T7262] new_vport+0x1a/0x190 [ 152.511486][ T7262] ovs_dp_cmd_new+0x69f/0xaf0 [ 152.511520][ T7262] ? __pfx_ovs_dp_cmd_new+0x10/0x10 [ 152.511548][ T7262] ? genl_family_rcv_msg_attrs_parse+0x1c9/0x2a0 [ 152.511581][ T7262] genl_family_rcv_msg_doit+0x215/0x300 [ 152.511613][ T7262] ? __pfx_genl_family_rcv_msg_doit+0x10/0x10 [ 152.511652][ T7262] ? bpf_lsm_capable+0x9/0x20 [ 152.511672][ T7262] ? security_capable+0x7e/0x2e0 [ 152.511704][ T7262] genl_rcv_msg+0x60e/0x790 [ 152.511735][ T7262] ? __pfx_genl_rcv_msg+0x10/0x10 [ 152.511756][ T7262] ? __pfx_ovs_dp_cmd_new+0x10/0x10 [ 152.511775][ T7262] ? __asan_memcpy+0x40/0x70 [ 152.511793][ T7262] ? __pfx_ref_tracker_free+0x10/0x10 [ 152.511820][ T7262] netlink_rcv_skb+0x208/0x470 [ 152.511836][ T7262] ? __lock_acquire+0xab9/0xd20 [ 152.511860][ T7262] ? __pfx_genl_rcv_msg+0x10/0x10 [ 152.511884][ T7262] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 152.511927][ T7262] ? down_read+0x1ad/0x2e0 [ 152.511951][ T7262] genl_rcv+0x28/0x40 [ 152.511970][ T7262] netlink_unicast+0x82f/0x9e0 [ 152.511999][ T7262] ? __pfx_netlink_unicast+0x10/0x10 [ 152.512019][ T7262] ? netlink_sendmsg+0x642/0xb30 [ 152.512035][ T7262] ? skb_put+0x11b/0x210 [ 152.512059][ T7262] netlink_sendmsg+0x805/0xb30 [ 152.512091][ T7262] ? __pfx_netlink_sendmsg+0x10/0x10 [ 152.512114][ T7262] ? aa_sock_msg_perm+0xf1/0x1d0 [ 152.512135][ T7262] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 152.512152][ T7262] ? __pfx_netlink_sendmsg+0x10/0x10 [ 152.512172][ T7262] __sock_sendmsg+0x219/0x270 [ 152.512201][ T7262] ____sys_sendmsg+0x505/0x830 [ 152.512230][ T7262] ? __pfx_____sys_sendmsg+0x10/0x10 [ 152.512264][ T7262] ? import_iovec+0x74/0xa0 [ 152.512291][ T7262] ___sys_sendmsg+0x21f/0x2a0 [ 152.512315][ T7262] ? __pfx____sys_sendmsg+0x10/0x10 [ 152.512365][ T7262] ? __fget_files+0x2a/0x420 [ 152.512398][ T7262] ? __fget_files+0x2a/0x420 [ 152.512412][ T7262] ? __fget_files+0x3a0/0x420 [ 152.512441][ T7262] __x64_sys_sendmsg+0x19b/0x260 [ 152.512467][ T7262] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 152.512501][ T7262] ? __pfx_ksys_write+0x10/0x10 [ 152.512519][ T7262] ? rcu_is_watching+0x15/0xb0 [ 152.512543][ T7262] ? do_syscall_64+0xbe/0x3b0 [ 152.512567][ T7262] do_syscall_64+0xfa/0x3b0 [ 152.512583][ T7262] ? lockdep_hardirqs_on+0x9c/0x150 [ 152.512601][ T7262] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 152.512617][ T7262] ? clear_bhb_loop+0x60/0xb0 [ 152.512639][ T7262] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 152.512654][ T7262] RIP: 0033:0x7f0686b8ec29 [ 152.512670][ T7262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 152.512689][ T7262] RSP: 002b:00007f06879ce038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 152.512706][ T7262] RAX: ffffffffffffffda RBX: 00007f0686dd5fa0 RCX: 00007f0686b8ec29 [ 152.512718][ T7262] RDX: 0000000000004040 RSI: 0000200000000000 RDI: 0000000000000003 [ 152.512728][ T7262] RBP: 00007f06879ce090 R08: 0000000000000000 R09: 0000000000000000 [ 152.512738][ T7262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 152.512747][ T7262] R13: 00007f0686dd6038 R14: 00007f0686dd5fa0 R15: 00007ffe29161ba8 [ 152.512781][ T7262] [ 154.174874][ T7286] netlink: 168 bytes leftover after parsing attributes in process `syz.0.424'. [ 154.862795][ T7291] IPv6: Can't replace route, no match found [ 154.892073][ T7291] netlink: 'syz.3.425': attribute type 39 has an invalid length. [ 155.105215][ T7293] FAULT_INJECTION: forcing a failure. [ 155.105215][ T7293] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 155.175143][ T7293] CPU: 0 UID: 0 PID: 7293 Comm: syz.4.426 Not tainted syzkaller #0 PREEMPT(full) [ 155.175167][ T7293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 155.175177][ T7293] Call Trace: [ 155.175186][ T7293] [ 155.175195][ T7293] dump_stack_lvl+0x189/0x250 [ 155.175220][ T7293] ? __pfx____ratelimit+0x10/0x10 [ 155.175241][ T7293] ? __pfx_dump_stack_lvl+0x10/0x10 [ 155.175263][ T7293] ? __pfx__printk+0x10/0x10 [ 155.175297][ T7293] ? __might_fault+0xb0/0x130 [ 155.175341][ T7293] ? __might_fault+0xb0/0x130 [ 155.175400][ T7293] should_fail_ex+0x414/0x560 [ 155.175466][ T7293] _copy_from_iter+0x1de/0x1790 [ 155.175533][ T7293] ? rcu_is_watching+0x15/0xb0 [ 155.175565][ T7293] ? kmem_cache_alloc_node_noprof+0x217/0x3c0 [ 155.175601][ T7293] ? __pfx__copy_from_iter+0x10/0x10 [ 155.175642][ T7293] ? __build_skb_around+0x257/0x3e0 [ 155.175687][ T7293] ? netlink_sendmsg+0x642/0xb30 [ 155.175703][ T7293] ? skb_put+0x11b/0x210 [ 155.175751][ T7293] netlink_sendmsg+0x6b2/0xb30 [ 155.175824][ T7293] ? __pfx_netlink_sendmsg+0x10/0x10 [ 155.175860][ T7293] ? perf_trace_run_bpf_submit+0xf9/0x170 [ 155.175881][ T7293] ? aa_sock_msg_perm+0xf1/0x1d0 [ 155.175916][ T7293] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 155.175937][ T7293] ? __pfx_netlink_sendmsg+0x10/0x10 [ 155.175969][ T7293] __sock_sendmsg+0x219/0x270 [ 155.176023][ T7293] ____sys_sendmsg+0x505/0x830 [ 155.176082][ T7293] ? __pfx_____sys_sendmsg+0x10/0x10 [ 155.176159][ T7293] ? import_iovec+0x74/0xa0 [ 155.176207][ T7293] ___sys_sendmsg+0x21f/0x2a0 [ 155.176251][ T7293] ? __pfx____sys_sendmsg+0x10/0x10 [ 155.176388][ T7293] ? __fget_files+0x2a/0x420 [ 155.176479][ T7293] ? __fget_files+0x2a/0x420 [ 155.176496][ T7293] ? __fget_files+0x3a0/0x420 [ 155.176572][ T7293] __x64_sys_sendmsg+0x19b/0x260 [ 155.176616][ T7293] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 155.176693][ T7293] ? __pfx_ksys_write+0x10/0x10 [ 155.176712][ T7293] ? rcu_is_watching+0x15/0xb0 [ 155.176762][ T7293] ? do_syscall_64+0xbe/0x3b0 [ 155.176806][ T7293] do_syscall_64+0xfa/0x3b0 [ 155.176825][ T7293] ? lockdep_hardirqs_on+0x9c/0x150 [ 155.176848][ T7293] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 155.176867][ T7293] ? clear_bhb_loop+0x60/0xb0 [ 155.176906][ T7293] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 155.176924][ T7293] RIP: 0033:0x7f6a6ed8ec29 [ 155.176946][ T7293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 155.176960][ T7293] RSP: 002b:00007f6a6fc95038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 155.176978][ T7293] RAX: ffffffffffffffda RBX: 00007f6a6efd5fa0 RCX: 00007f6a6ed8ec29 [ 155.176989][ T7293] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000004 [ 155.176999][ T7293] RBP: 00007f6a6fc95090 R08: 0000000000000000 R09: 0000000000000000 [ 155.177009][ T7293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 155.177018][ T7293] R13: 00007f6a6efd6038 R14: 00007f6a6efd5fa0 R15: 00007ffdcf5b68d8 [ 155.177113][ T7293] [ 157.548074][ T7301] netlink: 'syz.1.427': attribute type 10 has an invalid length. [ 158.070774][ T7312] netlink: 'syz.4.433': attribute type 3 has an invalid length. [ 158.110677][ T7312] netlink: 201372 bytes leftover after parsing attributes in process `syz.4.433'. [ 158.222075][ T7312] netlink: 2 bytes leftover after parsing attributes in process `syz.4.433'. [ 158.246747][ T7312] batadv_slave_1: entered promiscuous mode [ 158.365571][ T7318] syz.1.436 uses obsolete (PF_INET,SOCK_PACKET) [ 158.772637][ T7325] netlink: 10 bytes leftover after parsing attributes in process `syz.1.439'. [ 158.795886][ T7330] netlink: 'syz.3.440': attribute type 39 has an invalid length. [ 158.816764][ T7325] netlink: 'syz.1.439': attribute type 6 has an invalid length. [ 158.824915][ T7325] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.439'. [ 159.618287][ T7337] netlink: 'syz.3.442': attribute type 10 has an invalid length. [ 159.670451][ T7333] netlink: 28 bytes leftover after parsing attributes in process `syz.0.441'. [ 159.686800][ T7333] netlink: 28 bytes leftover after parsing attributes in process `syz.0.441'. [ 159.833354][ T7340] netlink: 132 bytes leftover after parsing attributes in process `syz.4.444'. [ 159.939020][ T7346] openvswitch: netlink: IP tunnel dst address not specified [ 160.082056][ T7351] netlink: 16 bytes leftover after parsing attributes in process `syz.4.448'. [ 160.123642][ T7351] rdma_rxe: rxe_newlink: failed to add wlan0 [ 161.066091][ T5184] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 161.075097][ T5184] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 161.089584][ T5184] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 161.104049][ T5184] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 161.125526][ T7368] netlink: 'syz.3.452': attribute type 39 has an invalid length. [ 161.142583][ T5184] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 161.329040][ T36] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 161.393674][ T7373] netlink: 'syz.1.453': attribute type 1 has an invalid length. [ 161.467540][ T7367] wlan0 speed is unknown, defaulting to 1000 [ 161.480739][ T7378] netlink: 'syz.3.456': attribute type 10 has an invalid length. [ 161.523134][ T36] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 161.772870][ T36] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 161.885211][ T36] bond0: (slave netdevsim0): Releasing backup interface [ 161.911245][ T7390] netlink: 104 bytes leftover after parsing attributes in process `syz.1.460'. [ 161.925305][ T36] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 162.365664][ T36] bridge_slave_1: left allmulticast mode [ 162.398488][ T36] bridge_slave_1: left promiscuous mode [ 162.437082][ T36] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.472299][ T7405] netlink: 64523 bytes leftover after parsing attributes in process `syz.1.464'. [ 162.534266][ T36] bridge_slave_0: left allmulticast mode [ 162.548216][ T36] bridge_slave_0: left promiscuous mode [ 162.561767][ T36] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.944788][ T7411] netlink: 'syz.0.465': attribute type 39 has an invalid length. [ 163.210051][ T5870] Bluetooth: hci2: command tx timeout [ 163.556605][ T36] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 163.578096][ T36] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 163.596998][ T36] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 163.610870][ T36] bond0 (unregistering): Released all slaves [ 163.666431][ T7406] netlink: 4083 bytes leftover after parsing attributes in process `syz.3.463'. [ 163.720938][ T7367] chnl_net:caif_netlink_parms(): no params data found [ 164.014135][ T7420] netlink: 'syz.3.468': attribute type 10 has an invalid length. [ 164.157910][ T7424] netlink: 'syz.0.469': attribute type 1 has an invalid length. [ 164.421797][ T7441] netlink: 'syz.4.471': attribute type 10 has an invalid length. [ 164.756278][ T7461] netlink: 'syz.1.476': attribute type 21 has an invalid length. [ 164.809370][ T7367] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.859003][ T7367] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.896155][ T7367] bridge_slave_0: entered allmulticast mode [ 164.914891][ T7367] bridge_slave_0: entered promiscuous mode [ 164.926180][ T7461] netlink: 'syz.1.476': attribute type 6 has an invalid length. [ 164.956430][ T7461] netlink: 132 bytes leftover after parsing attributes in process `syz.1.476'. [ 165.061403][ T7367] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.068595][ T7367] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.139743][ T7367] bridge_slave_1: entered allmulticast mode [ 165.151464][ T7367] bridge_slave_1: entered promiscuous mode [ 165.300260][ T5870] Bluetooth: hci2: command tx timeout [ 165.531668][ T7367] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 165.548499][ T36] hsr_slave_0: left promiscuous mode [ 165.562162][ T36] hsr_slave_1: left promiscuous mode [ 165.568727][ T36] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 165.582220][ T36] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 165.592833][ T36] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 165.605822][ T36] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 165.644268][ T36] veth1_macvtap: left promiscuous mode [ 165.660589][ T36] veth0_macvtap: left promiscuous mode [ 165.673743][ T36] veth1_vlan: left promiscuous mode [ 165.688855][ T36] veth0_vlan: left promiscuous mode [ 165.711957][ T7476] netlink: 104 bytes leftover after parsing attributes in process `syz.3.481'. [ 166.556612][ T7489] netlink: 'syz.0.486': attribute type 10 has an invalid length. [ 166.625581][ T36] team0 (unregistering): Port device team_slave_1 removed [ 166.666306][ T36] team0 (unregistering): Port device team_slave_0 removed [ 167.021723][ T7367] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 167.036918][ T7481] netlink: 'syz.3.483': attribute type 1 has an invalid length. [ 167.327508][ T7367] team0: Port device team_slave_0 added [ 167.370243][ T5870] Bluetooth: hci2: command tx timeout [ 167.422620][ T7367] team0: Port device team_slave_1 added [ 167.785113][ T7367] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 167.797632][ T7367] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 167.833687][ T7367] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 167.957270][ T7367] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 167.996184][ T7367] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 168.106235][ T7367] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 168.153910][ T7512] FAULT_INJECTION: forcing a failure. [ 168.153910][ T7512] name failslab, interval 1, probability 0, space 0, times 0 [ 168.219690][ T7512] CPU: 1 UID: 0 PID: 7512 Comm: syz.1.494 Not tainted syzkaller #0 PREEMPT(full) [ 168.219715][ T7512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 168.219725][ T7512] Call Trace: [ 168.219732][ T7512] [ 168.219739][ T7512] dump_stack_lvl+0x189/0x250 [ 168.219764][ T7512] ? __pfx____ratelimit+0x10/0x10 [ 168.219790][ T7512] ? __pfx_dump_stack_lvl+0x10/0x10 [ 168.219809][ T7512] ? __pfx__printk+0x10/0x10 [ 168.219828][ T7512] ? netlink_unicast+0x82f/0x9e0 [ 168.219863][ T7512] should_fail_ex+0x414/0x560 [ 168.219895][ T7512] should_failslab+0xa8/0x100 [ 168.219922][ T7512] kmem_cache_alloc_noprof+0x73/0x3c0 [ 168.219942][ T7512] ? skb_clone+0x212/0x3a0 [ 168.219962][ T7512] skb_clone+0x212/0x3a0 [ 168.219982][ T7512] __netlink_deliver_tap+0x404/0x850 [ 168.220008][ T7512] ? netlink_deliver_tap+0x2e/0x1b0 [ 168.220023][ T7512] netlink_deliver_tap+0x19c/0x1b0 [ 168.220038][ T7512] netlink_sendskb+0x68/0x140 [ 168.220056][ T7512] netlink_unicast+0x397/0x9e0 [ 168.220070][ T7512] ? __asan_memcpy+0x40/0x70 [ 168.220100][ T7512] ? __pfx_netlink_unicast+0x10/0x10 [ 168.220130][ T7512] netlink_rcv_skb+0x28c/0x470 [ 168.220150][ T7512] ? __pfx_sock_diag_rcv_msg+0x10/0x10 [ 168.220170][ T7512] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 168.220247][ T7512] ? netlink_deliver_tap+0x2e/0x1b0 [ 168.220275][ T7512] netlink_unicast+0x82f/0x9e0 [ 168.220303][ T7512] ? __pfx_netlink_unicast+0x10/0x10 [ 168.220322][ T7512] ? netlink_sendmsg+0x642/0xb30 [ 168.220336][ T7512] ? skb_put+0x11b/0x210 [ 168.220360][ T7512] netlink_sendmsg+0x805/0xb30 [ 168.220391][ T7512] ? __pfx_netlink_sendmsg+0x10/0x10 [ 168.220414][ T7512] ? aa_sock_msg_perm+0xf1/0x1d0 [ 168.220434][ T7512] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 168.220453][ T7512] ? __pfx_netlink_sendmsg+0x10/0x10 [ 168.220473][ T7512] __sock_sendmsg+0x219/0x270 [ 168.220502][ T7512] ____sys_sendmsg+0x505/0x830 [ 168.220530][ T7512] ? __pfx_____sys_sendmsg+0x10/0x10 [ 168.220563][ T7512] ? import_iovec+0x74/0xa0 [ 168.220591][ T7512] ___sys_sendmsg+0x21f/0x2a0 [ 168.220614][ T7512] ? __pfx____sys_sendmsg+0x10/0x10 [ 168.220688][ T7512] ? __fget_files+0x2a/0x420 [ 168.220703][ T7512] ? __fget_files+0x3a0/0x420 [ 168.220732][ T7512] __x64_sys_sendmsg+0x19b/0x260 [ 168.220757][ T7512] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 168.220810][ T7512] do_syscall_64+0xfa/0x3b0 [ 168.220831][ T7512] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 168.220847][ T7512] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 168.220863][ T7512] ? clear_bhb_loop+0x60/0xb0 [ 168.220884][ T7512] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 168.220900][ T7512] RIP: 0033:0x7f264b18ec29 [ 168.220916][ T7512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 168.220929][ T7512] RSP: 002b:00007f264c05f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 168.220947][ T7512] RAX: ffffffffffffffda RBX: 00007f264b3d5fa0 RCX: 00007f264b18ec29 [ 168.220958][ T7512] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000008 [ 168.220968][ T7512] RBP: 00007f264c05f090 R08: 0000000000000000 R09: 0000000000000000 [ 168.220978][ T7512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 168.220987][ T7512] R13: 00007f264b3d6038 R14: 00007f264b3d5fa0 R15: 00007fff2e7e1808 [ 168.221019][ T7512] [ 168.709110][ T7523] netlink: 188 bytes leftover after parsing attributes in process `syz.4.495'. [ 169.027705][ T7367] hsr_slave_0: entered promiscuous mode [ 169.058088][ T7367] hsr_slave_1: entered promiscuous mode [ 169.067457][ T7531] netlink: 'syz.4.499': attribute type 10 has an invalid length. [ 169.081882][ T7367] debugfs: 'hsr0' already exists in 'hsr' [ 169.101176][ T7367] Cannot create hsr debugfs directory [ 169.122135][ T7527] netlink: 'syz.0.497': attribute type 1 has an invalid length. [ 169.449613][ T5870] Bluetooth: hci2: command tx timeout [ 169.685493][ T7550] wg2: entered promiscuous mode [ 169.703030][ T7550] wg2: entered allmulticast mode [ 169.756637][ T7546] netlink: 'syz.3.502': attribute type 10 has an invalid length. [ 169.883349][ T7546] veth1_macvtap: left promiscuous mode [ 170.691066][ T7565] netlink: 104 bytes leftover after parsing attributes in process `syz.3.509'. [ 170.744751][ T7367] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 170.765279][ T7367] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 170.778059][ T7367] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 170.793853][ T7367] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 170.876916][ T7567] netlink: 'syz.0.510': attribute type 39 has an invalid length. [ 171.066161][ T7581] netlink: 'syz.3.512': attribute type 1 has an invalid length. [ 171.216726][ T7367] 8021q: adding VLAN 0 to HW filter on device bond0 [ 171.347326][ T7367] 8021q: adding VLAN 0 to HW filter on device team0 [ 171.400279][ T3525] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.407461][ T3525] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.455589][ T5970] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.462831][ T5970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.117666][ T7607] netlink: 'syz.3.519': attribute type 10 has an invalid length. [ 172.131357][ T7607] netlink: 168 bytes leftover after parsing attributes in process `syz.3.519'. [ 172.476795][ T7617] netlink: 56 bytes leftover after parsing attributes in process `syz.1.521'. [ 172.706330][ T7367] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.893399][ T7626] netlink: 'syz.0.523': attribute type 39 has an invalid length. [ 172.965142][ T7635] netlink: 60 bytes leftover after parsing attributes in process `syz.3.525'. [ 172.994661][ T7632] netlink: 60 bytes leftover after parsing attributes in process `syz.3.525'. [ 173.201553][ T7644] netlink: 'syz.3.528': attribute type 1 has an invalid length. [ 173.345602][ T7647] netlink: 'syz.1.529': attribute type 39 has an invalid length. [ 173.666005][ T7367] veth0_vlan: entered promiscuous mode [ 173.746111][ T7367] veth1_vlan: entered promiscuous mode [ 173.955347][ T7367] veth0_macvtap: entered promiscuous mode [ 173.988987][ T7367] veth1_macvtap: entered promiscuous mode [ 174.047014][ T7367] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 174.212344][ T7367] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 174.337039][ T5970] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 174.367807][ T5970] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 174.495532][ T5970] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 174.534812][ T5970] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 174.641189][ T7678] netlink: 'syz.4.536': attribute type 39 has an invalid length. [ 175.097017][ T5970] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 175.123145][ T5970] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 175.185593][ T5970] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 175.194621][ T5970] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 175.356475][ T7697] netlink: 'syz.0.542': attribute type 1 has an invalid length. [ 175.577788][ T7701] netlink: zone id is out of range [ 175.613489][ T7701] netlink: zone id is out of range [ 175.649674][ T7701] netlink: zone id is out of range [ 175.660716][ T7710] netlink: 830 bytes leftover after parsing attributes in process `syz.5.544'. [ 175.673576][ T7701] netlink: zone id is out of range [ 175.681474][ T7701] netlink: zone id is out of range [ 175.686807][ T7710] FAULT_INJECTION: forcing a failure. [ 175.686807][ T7710] name failslab, interval 1, probability 0, space 0, times 0 [ 175.699789][ T7710] CPU: 0 UID: 0 PID: 7710 Comm: syz.5.544 Not tainted syzkaller #0 PREEMPT(full) [ 175.699811][ T7710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 175.699818][ T7710] Call Trace: [ 175.699824][ T7710] [ 175.699831][ T7710] dump_stack_lvl+0x189/0x250 [ 175.699853][ T7710] ? __pfx____ratelimit+0x10/0x10 [ 175.699872][ T7710] ? __pfx_dump_stack_lvl+0x10/0x10 [ 175.699890][ T7710] ? __pfx__printk+0x10/0x10 [ 175.699914][ T7710] ? irq_work_queue+0xc3/0x140 [ 175.699938][ T7710] ? __wake_up_klogd+0xd9/0x110 [ 175.699961][ T7710] should_fail_ex+0x414/0x560 [ 175.699990][ T7710] should_failslab+0xa8/0x100 [ 175.700014][ T7710] kmem_cache_alloc_noprof+0x73/0x3c0 [ 175.700035][ T7710] ? fdb_create+0x1b8/0x14c0 [ 175.700057][ T7710] fdb_create+0x1b8/0x14c0 [ 175.700080][ T7710] ? fdb_find_rcu+0x6e3/0x770 [ 175.700108][ T7710] ? br_fdb_find+0x82/0x210 [ 175.700131][ T7710] ? __pfx_fdb_create+0x10/0x10 [ 175.700147][ T7710] ? br_fdb_find+0x82/0x210 [ 175.700167][ T7710] ? br_fdb_find+0x82/0x210 [ 175.700194][ T7710] br_fdb_external_learn_add+0x249/0x680 [ 175.700217][ T7710] __br_fdb_add+0x3fb/0xcb0 [ 175.700241][ T7710] br_fdb_add+0x73a/0xc20 [ 175.700268][ T7710] ? __pfx_br_fdb_add+0x10/0x10 [ 175.700282][ T7710] ? _raw_spin_unlock_irqrestore+0x85/0x110 [ 175.700309][ T7710] ? __nla_parse+0x40/0x60 [ 175.700328][ T7710] ? __pfx_br_fdb_add+0x10/0x10 [ 175.700342][ T7710] rtnl_fdb_add+0x6a6/0xa50 [ 175.700368][ T7710] ? __pfx_rtnl_fdb_add+0x10/0x10 [ 175.700412][ T7710] ? __pfx_rtnl_fdb_add+0x10/0x10 [ 175.700429][ T7710] rtnetlink_rcv_msg+0x779/0xb70 [ 175.700450][ T7710] ? rtnetlink_rcv_msg+0x1ab/0xb70 [ 175.700466][ T7710] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 175.700479][ T7710] ? ref_tracker_free+0x63a/0x7d0 [ 175.700497][ T7710] ? __asan_memcpy+0x40/0x70 [ 175.700524][ T7710] ? __pfx_ref_tracker_free+0x10/0x10 [ 175.700536][ T7710] ? __skb_clone+0x63/0x7a0 [ 175.700562][ T7710] netlink_rcv_skb+0x208/0x470 [ 175.700580][ T7710] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 175.700597][ T7710] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 175.700624][ T7710] ? netlink_deliver_tap+0x2e/0x1b0 [ 175.700649][ T7710] netlink_unicast+0x82f/0x9e0 [ 175.700672][ T7710] ? __pfx_netlink_unicast+0x10/0x10 [ 175.700688][ T7710] ? netlink_sendmsg+0x642/0xb30 [ 175.700702][ T7710] ? skb_put+0x11b/0x210 [ 175.700722][ T7710] netlink_sendmsg+0x805/0xb30 [ 175.700748][ T7710] ? __pfx_netlink_sendmsg+0x10/0x10 [ 175.700767][ T7710] ? aa_sock_msg_perm+0xf1/0x1d0 [ 175.700788][ T7710] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 175.700806][ T7710] ? __pfx_netlink_sendmsg+0x10/0x10 [ 175.700825][ T7710] __sock_sendmsg+0x219/0x270 [ 175.700854][ T7710] ____sys_sendmsg+0x505/0x830 [ 175.700881][ T7710] ? __pfx_____sys_sendmsg+0x10/0x10 [ 175.700907][ T7710] ? import_iovec+0x74/0xa0 [ 175.700928][ T7710] ___sys_sendmsg+0x21f/0x2a0 [ 175.700949][ T7710] ? __pfx____sys_sendmsg+0x10/0x10 [ 175.701000][ T7710] ? __fget_files+0x2a/0x420 [ 175.701013][ T7710] ? __fget_files+0x3a0/0x420 [ 175.701038][ T7710] __x64_sys_sendmsg+0x19b/0x260 [ 175.701057][ T7710] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 175.701086][ T7710] ? __pfx_ksys_write+0x10/0x10 [ 175.701104][ T7710] ? rcu_is_watching+0x15/0xb0 [ 175.701126][ T7710] ? do_syscall_64+0xbe/0x3b0 [ 175.701147][ T7710] do_syscall_64+0xfa/0x3b0 [ 175.701164][ T7710] ? lockdep_hardirqs_on+0x9c/0x150 [ 175.701180][ T7710] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 175.701195][ T7710] ? clear_bhb_loop+0x60/0xb0 [ 175.701215][ T7710] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 175.701230][ T7710] RIP: 0033:0x7ffb39d8ec29 [ 175.701245][ T7710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.701257][ T7710] RSP: 002b:00007ffb3ab36038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 175.701274][ T7710] RAX: ffffffffffffffda RBX: 00007ffb39fd5fa0 RCX: 00007ffb39d8ec29 [ 175.701286][ T7710] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000004 [ 175.701295][ T7710] RBP: 00007ffb3ab36090 R08: 0000000000000000 R09: 0000000000000000 [ 175.701305][ T7710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.701313][ T7710] R13: 00007ffb39fd6038 R14: 00007ffb39fd5fa0 R15: 00007ffe62547328 [ 175.701342][ T7710] [ 175.790868][ T7701] netlink: zone id is out of range [ 176.006263][ T7712] netlink: 20 bytes leftover after parsing attributes in process `syz.3.546'. [ 176.049516][ T7701] netlink: zone id is out of range [ 176.217880][ T7714] netlink: 4 bytes leftover after parsing attributes in process `syz.3.546'. [ 176.225132][ T7701] netlink: zone id is out of range [ 176.257051][ T7714] netlink: 4 bytes leftover after parsing attributes in process `syz.3.546'. [ 176.263283][ T7701] netlink: zone id is out of range [ 176.273086][ T7701] netlink: zone id is out of range [ 176.281624][ T7714] netlink: 8 bytes leftover after parsing attributes in process `syz.3.546'. [ 176.532053][ T5234] udevd[5234]: worker [7407] terminated by signal 33 (Unknown signal 33) [ 176.543381][ T5234] udevd[5234]: worker [7407] failed while handling '/devices/virtual/block/loop5' [ 176.618480][ T7734] netlink: 'syz.5.554': attribute type 3 has an invalid length. [ 176.661234][ T7734] netlink: 201372 bytes leftover after parsing attributes in process `syz.5.554'. [ 176.863797][ T7743] netlink: 'syz.4.558': attribute type 1 has an invalid length. [ 176.893423][ T7744] netlink: 'syz.0.556': attribute type 5 has an invalid length. [ 176.901610][ T7744] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.556'. [ 177.362661][ T7764] netlink: 12 bytes leftover after parsing attributes in process `syz.5.567'. [ 177.734849][ T7781] rdma_rxe: rxe_newlink: failed to add wlan0 [ 177.934927][ T7783] netlink: 'syz.4.572': attribute type 3 has an invalid length. [ 177.961591][ T7783] netlink: 201372 bytes leftover after parsing attributes in process `syz.4.572'. [ 178.081279][ T7788] netlink: 130984 bytes leftover after parsing attributes in process `syz.0.574'. [ 178.312469][ T7801] netlink: 8 bytes leftover after parsing attributes in process `syz.3.577'. [ 178.314202][ T7802] netlink: 'syz.1.578': attribute type 1 has an invalid length. [ 178.404269][ T7805] FAULT_INJECTION: forcing a failure. [ 178.404269][ T7805] name failslab, interval 1, probability 0, space 0, times 0 [ 178.444263][ T7805] CPU: 0 UID: 0 PID: 7805 Comm: syz.4.580 Not tainted syzkaller #0 PREEMPT(full) [ 178.444287][ T7805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 178.444296][ T7805] Call Trace: [ 178.444304][ T7805] [ 178.444311][ T7805] dump_stack_lvl+0x189/0x250 [ 178.444336][ T7805] ? __pfx____ratelimit+0x10/0x10 [ 178.444354][ T7805] ? __pfx_dump_stack_lvl+0x10/0x10 [ 178.444374][ T7805] ? __pfx__printk+0x10/0x10 [ 178.444396][ T7805] ? __mutex_trylock_common+0x153/0x260 [ 178.444419][ T7805] ? ref_tracker_alloc+0x318/0x460 [ 178.444440][ T7805] should_fail_ex+0x414/0x560 [ 178.444469][ T7805] should_failslab+0xa8/0x100 [ 178.444494][ T7805] kmem_cache_alloc_noprof+0x73/0x3c0 [ 178.444515][ T7805] ? skb_clone+0x212/0x3a0 [ 178.444540][ T7805] skb_clone+0x212/0x3a0 [ 178.444564][ T7805] __netlink_deliver_tap+0x404/0x850 [ 178.444596][ T7805] ? netlink_deliver_tap+0x2e/0x1b0 [ 178.444616][ T7805] netlink_deliver_tap+0x19c/0x1b0 [ 178.444636][ T7805] __netlink_sendskb+0x47/0x90 [ 178.444653][ T7805] netlink_dump+0xa84/0xe90 [ 178.444684][ T7805] ? __pfx_netlink_dump+0x10/0x10 [ 178.444719][ T7805] ? netlink_lookup+0x30/0x200 [ 178.444733][ T7805] ? netlink_lookup+0x30/0x200 [ 178.444756][ T7805] __netlink_dump_start+0x5cb/0x7e0 [ 178.444780][ T7805] ? nft_netlink_dump_start_rcu+0xb6/0x1a0 [ 178.444804][ T7805] nft_netlink_dump_start_rcu+0xdb/0x1a0 [ 178.444831][ T7805] nf_tables_getrule_reset+0x1c8/0x600 [ 178.444856][ T7805] ? __pfx_nf_tables_getrule_reset+0x10/0x10 [ 178.444877][ T7805] ? __pfx_nf_tables_dumpreset_rules_start+0x10/0x10 [ 178.444896][ T7805] ? __pfx_nf_tables_dumpreset_rules+0x10/0x10 [ 178.444914][ T7805] ? __pfx_nf_tables_dump_rules_done+0x10/0x10 [ 178.444938][ T7805] ? __nla_parse+0x40/0x60 [ 178.444956][ T7805] ? __pfx_nf_tables_getrule_reset+0x10/0x10 [ 178.444980][ T7805] nfnetlink_rcv_msg+0x80e/0x1130 [ 178.445005][ T7805] ? nfnetlink_rcv_msg+0x20d/0x1130 [ 178.445049][ T7805] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 178.445070][ T7805] ? kasan_save_free_info+0x46/0x50 [ 178.445141][ T7805] netlink_rcv_skb+0x208/0x470 [ 178.445160][ T7805] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 178.445185][ T7805] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 178.445217][ T7805] ? bpf_lsm_capable+0x9/0x20 [ 178.445243][ T7805] ? security_capable+0x7e/0x2e0 [ 178.445267][ T7805] nfnetlink_rcv+0x26a/0x2520 [ 178.445295][ T7805] ? __dev_queue_xmit+0x1d79/0x3b50 [ 178.445328][ T7805] ? __dev_queue_xmit+0x27b/0x3b50 [ 178.445363][ T7805] ? __pfx_nfnetlink_rcv+0x10/0x10 [ 178.445386][ T7805] ? __pfx___dev_queue_xmit+0x10/0x10 [ 178.445423][ T7805] ? ref_tracker_free+0x63a/0x7d0 [ 178.445440][ T7805] ? __asan_memcpy+0x40/0x70 [ 178.445458][ T7805] ? __pfx_ref_tracker_free+0x10/0x10 [ 178.445472][ T7805] ? __skb_clone+0x63/0x7a0 [ 178.445498][ T7805] ? __skb_clone+0x483/0x7a0 [ 178.445526][ T7805] ? skb_clone+0x246/0x3a0 [ 178.445549][ T7805] ? __netlink_deliver_tap+0x807/0x850 [ 178.445567][ T7805] ? netlink_deliver_tap+0x2e/0x1b0 [ 178.445591][ T7805] ? netlink_deliver_tap+0x2e/0x1b0 [ 178.445617][ T7805] netlink_unicast+0x82f/0x9e0 [ 178.445642][ T7805] ? __pfx_netlink_unicast+0x10/0x10 [ 178.445661][ T7805] ? netlink_sendmsg+0x642/0xb30 [ 178.445677][ T7805] ? skb_put+0x11b/0x210 [ 178.445700][ T7805] netlink_sendmsg+0x805/0xb30 [ 178.445729][ T7805] ? __pfx_netlink_sendmsg+0x10/0x10 [ 178.445751][ T7805] ? aa_sock_msg_perm+0xf1/0x1d0 [ 178.445771][ T7805] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 178.445788][ T7805] ? __pfx_netlink_sendmsg+0x10/0x10 [ 178.445808][ T7805] __sock_sendmsg+0x219/0x270 [ 178.445835][ T7805] ____sys_sendmsg+0x505/0x830 [ 178.445862][ T7805] ? __pfx_____sys_sendmsg+0x10/0x10 [ 178.445893][ T7805] ? import_iovec+0x74/0xa0 [ 178.445918][ T7805] ___sys_sendmsg+0x21f/0x2a0 [ 178.445941][ T7805] ? __pfx____sys_sendmsg+0x10/0x10 [ 178.446002][ T7805] ? __fget_files+0x2a/0x420 [ 178.446016][ T7805] ? __fget_files+0x3a0/0x420 [ 178.446043][ T7805] __x64_sys_sendmsg+0x19b/0x260 [ 178.446067][ T7805] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 178.446099][ T7805] ? __pfx_ksys_write+0x10/0x10 [ 178.446117][ T7805] ? rcu_is_watching+0x15/0xb0 [ 178.446140][ T7805] ? do_syscall_64+0xbe/0x3b0 [ 178.446163][ T7805] do_syscall_64+0xfa/0x3b0 [ 178.446179][ T7805] ? lockdep_hardirqs_on+0x9c/0x150 [ 178.446196][ T7805] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 178.446213][ T7805] ? clear_bhb_loop+0x60/0xb0 [ 178.446239][ T7805] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 178.446255][ T7805] RIP: 0033:0x7f6a6ed8ec29 [ 178.446270][ T7805] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 178.446283][ T7805] RSP: 002b:00007f6a6fc95038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 178.446301][ T7805] RAX: ffffffffffffffda RBX: 00007f6a6efd5fa0 RCX: 00007f6a6ed8ec29 [ 178.446313][ T7805] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000003 [ 178.446323][ T7805] RBP: 00007f6a6fc95090 R08: 0000000000000000 R09: 0000000000000000 [ 178.446333][ T7805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 178.446343][ T7805] R13: 00007f6a6efd6038 R14: 00007f6a6efd5fa0 R15: 00007ffdcf5b68d8 [ 178.446373][ T7805] [ 179.055687][ T7811] rdma_rxe: rxe_newlink: failed to add wlan0 [ 179.090229][ T7813] netlink: 'syz.3.582': attribute type 21 has an invalid length. [ 179.782747][ T7833] netlink: 'syz.3.590': attribute type 3 has an invalid length. [ 179.872878][ T7833] batadv_slave_1: entered promiscuous mode [ 180.203401][ T7844] netlink: 'syz.3.594': attribute type 2 has an invalid length. [ 180.262169][ T7847] netlink: 'syz.0.595': attribute type 1 has an invalid length. [ 180.301933][ T7850] rdma_rxe: rxe_newlink: failed to add wlan0 [ 180.399262][ T7844] : entered promiscuous mode [ 180.478259][ T7855] netlink: 'syz.1.597': attribute type 1 has an invalid length. [ 180.736341][ T7863] netlink: 'syz.3.601': attribute type 39 has an invalid length. [ 181.726860][ T7889] rdma_rxe: rxe_newlink: failed to add wlan0 [ 181.892880][ T7893] __nla_validate_parse: 72 callbacks suppressed [ 181.892901][ T7893] netlink: 48 bytes leftover after parsing attributes in process `syz.0.611'. [ 181.944276][ T7896] netlink: 'syz.5.612': attribute type 1 has an invalid length. [ 182.107583][ T7893] syz.0.611 (7893) used greatest stack depth: 17616 bytes left [ 182.351104][ T7906] netlink: 48 bytes leftover after parsing attributes in process `syz.0.616'. [ 182.361636][ T7907] netlink: 'syz.4.615': attribute type 22 has an invalid length. [ 182.386441][ T7907] netlink: 4 bytes leftover after parsing attributes in process `syz.4.615'. [ 182.558179][ T7909] netlink: 'syz.3.617': attribute type 39 has an invalid length. [ 182.870956][ T7931] rdma_rxe: rxe_newlink: failed to add wlan0 [ 183.380456][ T7938] FAULT_INJECTION: forcing a failure. [ 183.380456][ T7938] name failslab, interval 1, probability 0, space 0, times 0 [ 183.418826][ T7938] CPU: 0 UID: 0 PID: 7938 Comm: syz.0.626 Not tainted syzkaller #0 PREEMPT(full) [ 183.418851][ T7938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 183.418861][ T7938] Call Trace: [ 183.418871][ T7938] [ 183.418882][ T7938] dump_stack_lvl+0x189/0x250 [ 183.418913][ T7938] ? __pfx____ratelimit+0x10/0x10 [ 183.418940][ T7938] ? __pfx_dump_stack_lvl+0x10/0x10 [ 183.418968][ T7938] ? __pfx__printk+0x10/0x10 [ 183.419067][ T7938] should_fail_ex+0x414/0x560 [ 183.419123][ T7938] should_failslab+0xa8/0x100 [ 183.419161][ T7938] __kmalloc_node_track_caller_noprof+0xcc/0x4e0 [ 183.419190][ T7938] ? nf_ct_ext_add+0x1ab/0x450 [ 183.419235][ T7938] ? nf_ct_ext_add+0x1ab/0x450 [ 183.419258][ T7938] krealloc_noprof+0x124/0x340 [ 183.419304][ T7938] nf_ct_ext_add+0x1ab/0x450 [ 183.419362][ T7938] ctnetlink_new_conntrack+0x11e7/0x2070 [ 183.419401][ T7938] ? ctnetlink_new_conntrack+0x6d3/0x2070 [ 183.419464][ T7938] ? __pfx_ctnetlink_new_conntrack+0x10/0x10 [ 183.419480][ T7938] ? trace_contention_end+0x39/0x120 [ 183.419508][ T7938] ? __mutex_lock+0x335/0x1350 [ 183.419523][ T7938] ? perf_trace_run_bpf_submit+0xf9/0x170 [ 183.419568][ T7938] ? perf_trace_lock+0x2f8/0x3b0 [ 183.419610][ T7938] ? nfnetlink_rcv_msg+0x9dc/0x1130 [ 183.419763][ T7938] nfnetlink_rcv_msg+0xb4d/0x1130 [ 183.419790][ T7938] ? perf_swevent_get_recursion_context+0xa6/0x100 [ 183.419817][ T7938] ? nfnetlink_rcv_msg+0x20d/0x1130 [ 183.419933][ T7938] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 183.420188][ T7938] netlink_rcv_skb+0x208/0x470 [ 183.420221][ T7938] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 183.420260][ T7938] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 183.420340][ T7938] ? bpf_lsm_capable+0x9/0x20 [ 183.420360][ T7938] ? security_capable+0x7e/0x2e0 [ 183.420417][ T7938] nfnetlink_rcv+0x26a/0x2520 [ 183.420461][ T7938] ? __pfx_perf_trace_lock+0x10/0x10 [ 183.420475][ T7938] ? migrate_enable+0x29c/0x3c0 [ 183.420509][ T7938] ? trace_call_bpf+0xb7/0x850 [ 183.420537][ T7938] ? trace_call_bpf+0xb7/0x850 [ 183.420589][ T7938] ? trace_call_bpf+0xb7/0x850 [ 183.420619][ T7938] ? trace_call_bpf+0xb7/0x850 [ 183.420650][ T7938] ? __pfx_nfnetlink_rcv+0x10/0x10 [ 183.420670][ T7938] ? trace_call_bpf+0xb7/0x850 [ 183.420690][ T7938] ? __pfx___dev_queue_xmit+0x10/0x10 [ 183.420736][ T7938] ? __pfx_trace_call_bpf+0x10/0x10 [ 183.420815][ T7938] ? perf_trace_run_bpf_submit+0xf9/0x170 [ 183.420860][ T7938] ? perf_trace_lock+0x2f8/0x3b0 [ 183.420885][ T7938] ? __skb_clone+0x483/0x7a0 [ 183.420932][ T7938] ? __pfx_perf_trace_lock+0x10/0x10 [ 183.420957][ T7938] ? skb_clone+0x246/0x3a0 [ 183.421000][ T7938] ? __netlink_deliver_tap+0x807/0x850 [ 183.421024][ T7938] ? netlink_deliver_tap+0x2e/0x1b0 [ 183.421079][ T7938] ? netlink_deliver_tap+0x2e/0x1b0 [ 183.421150][ T7938] netlink_unicast+0x82f/0x9e0 [ 183.421216][ T7938] ? __pfx_netlink_unicast+0x10/0x10 [ 183.421252][ T7938] ? netlink_sendmsg+0x642/0xb30 [ 183.421268][ T7938] ? skb_put+0x11b/0x210 [ 183.421313][ T7938] netlink_sendmsg+0x805/0xb30 [ 183.421381][ T7938] ? __pfx_netlink_sendmsg+0x10/0x10 [ 183.421416][ T7938] ? perf_trace_run_bpf_submit+0xf9/0x170 [ 183.421436][ T7938] ? aa_sock_msg_perm+0xf1/0x1d0 [ 183.421469][ T7938] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 183.421490][ T7938] ? __pfx_netlink_sendmsg+0x10/0x10 [ 183.421520][ T7938] __sock_sendmsg+0x219/0x270 [ 183.421568][ T7938] ____sys_sendmsg+0x505/0x830 [ 183.421624][ T7938] ? __pfx_____sys_sendmsg+0x10/0x10 [ 183.421697][ T7938] ? import_iovec+0x74/0xa0 [ 183.421745][ T7938] ___sys_sendmsg+0x21f/0x2a0 [ 183.421787][ T7938] ? __pfx____sys_sendmsg+0x10/0x10 [ 183.421919][ T7938] ? __fget_files+0x2a/0x420 [ 183.421998][ T7938] ? __fget_files+0x2a/0x420 [ 183.422014][ T7938] ? __fget_files+0x3a0/0x420 [ 183.422085][ T7938] __x64_sys_sendmsg+0x19b/0x260 [ 183.422127][ T7938] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 183.422200][ T7938] ? __pfx_ksys_write+0x10/0x10 [ 183.422218][ T7938] ? rcu_is_watching+0x15/0xb0 [ 183.422266][ T7938] ? do_syscall_64+0xbe/0x3b0 [ 183.422307][ T7938] do_syscall_64+0xfa/0x3b0 [ 183.422325][ T7938] ? lockdep_hardirqs_on+0x9c/0x150 [ 183.422348][ T7938] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 183.422366][ T7938] ? clear_bhb_loop+0x60/0xb0 [ 183.422404][ T7938] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 183.422421][ T7938] RIP: 0033:0x7efcf8d8ec29 [ 183.422443][ T7938] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 183.422456][ T7938] RSP: 002b:00007efcf6ff6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 183.422474][ T7938] RAX: ffffffffffffffda RBX: 00007efcf8fd5fa0 RCX: 00007efcf8d8ec29 [ 183.422485][ T7938] RDX: 0000000000000000 RSI: 0000200000000300 RDI: 0000000000000005 [ 183.422495][ T7938] RBP: 00007efcf6ff6090 R08: 0000000000000000 R09: 0000000000000000 [ 183.422505][ T7938] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 183.422515][ T7938] R13: 00007efcf8fd6038 R14: 00007efcf8fd5fa0 R15: 00007ffc1e3745b8 [ 183.422601][ T7938] [ 184.143969][ T7946] net_ratelimit: 358 callbacks suppressed [ 184.144001][ T7946] openvswitch: netlink: IP tunnel dst address not specified [ 184.647605][ T5870] Bluetooth: hci4: ISO packet for unknown connection handle 2622 [ 184.772096][ T7964] netlink: 'syz.4.634': attribute type 39 has an invalid length. [ 184.780115][ T7966] netlink: 48 bytes leftover after parsing attributes in process `syz.1.636'. [ 184.823933][ T7968] rdma_rxe: rxe_newlink: failed to add wlan0 [ 185.093639][ T7977] netlink: 140 bytes leftover after parsing attributes in process `syz.3.639'. [ 185.258503][ T7979] wlan0 speed is unknown, defaulting to 1000 [ 185.277124][ T7979] netlink: 5 bytes leftover after parsing attributes in process `syz.5.641'. [ 186.046013][ T7990] netlink: 64691 bytes leftover after parsing attributes in process `syz.5.645'. [ 186.112631][ T7991] openvswitch: netlink: IP tunnel dst address not specified [ 186.247909][ T7990] netlink: 12 bytes leftover after parsing attributes in process `syz.5.645'. [ 186.647898][ T7994] netlink: 104 bytes leftover after parsing attributes in process `syz.1.647'. [ 186.967053][ T8011] netlink: 'syz.0.651': attribute type 39 has an invalid length. [ 186.980960][ T8010] netlink: 182 bytes leftover after parsing attributes in process `syz.5.650'. [ 187.134019][ T8017] netlink: 'syz.3.654': attribute type 10 has an invalid length. [ 187.321126][ T8021] netlink: 'syz.0.656': attribute type 10 has an invalid length. [ 187.431813][ T8028] netlink: 16 bytes leftover after parsing attributes in process `syz.0.659'. [ 187.445655][ T8028] rdma_rxe: rxe_newlink: failed to add wlan0 [ 187.584474][ T8033] netlink: 32 bytes leftover after parsing attributes in process `syz.0.661'. [ 187.728108][ T8036] netlink: 208192 bytes leftover after parsing attributes in process `syz.1.662'. [ 187.738735][ T8036] netlink: 'syz.1.662': attribute type 1 has an invalid length. [ 187.747137][ T8036] netlink: 'syz.1.662': attribute type 2 has an invalid length. [ 187.762265][ T8036] netlink: 104 bytes leftover after parsing attributes in process `syz.1.662'. [ 187.963325][ T8045] netlink: 'syz.0.666': attribute type 39 has an invalid length. [ 188.312319][ T8057] netlink: 16 bytes leftover after parsing attributes in process `syz.3.671'. [ 188.328153][ T8057] rdma_rxe: rxe_newlink: failed to add wlan0 [ 188.404801][ T8060] FAULT_INJECTION: forcing a failure. [ 188.404801][ T8060] name failslab, interval 1, probability 0, space 0, times 0 [ 188.421042][ T8060] CPU: 1 UID: 0 PID: 8060 Comm: syz.3.672 Not tainted syzkaller #0 PREEMPT(full) [ 188.421065][ T8060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 188.421075][ T8060] Call Trace: [ 188.421082][ T8060] [ 188.421089][ T8060] dump_stack_lvl+0x189/0x250 [ 188.421114][ T8060] ? __pfx____ratelimit+0x10/0x10 [ 188.421133][ T8060] ? __pfx_dump_stack_lvl+0x10/0x10 [ 188.421153][ T8060] ? __pfx__printk+0x10/0x10 [ 188.421182][ T8060] ? __pfx___might_resched+0x10/0x10 [ 188.421197][ T8060] ? fs_reclaim_acquire+0x7d/0x100 [ 188.421220][ T8060] should_fail_ex+0x414/0x560 [ 188.421251][ T8060] should_failslab+0xa8/0x100 [ 188.421276][ T8060] __kmalloc_noprof+0xcb/0x4f0 [ 188.421305][ T8060] ? bpf_test_init+0xc2/0x170 [ 188.421329][ T8060] bpf_test_init+0xc2/0x170 [ 188.421352][ T8060] bpf_prog_test_run_xdp+0x37c/0x1000 [ 188.421391][ T8060] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 188.421416][ T8060] ? __fget_files+0x2a/0x420 [ 188.421439][ T8060] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 188.421459][ T8060] bpf_prog_test_run+0x2c4/0x340 [ 188.421487][ T8060] __sys_bpf+0x55a/0x850 [ 188.421514][ T8060] ? __pfx___sys_bpf+0x10/0x10 [ 188.421555][ T8060] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 188.421579][ T8060] ? __pfx_ksys_write+0x10/0x10 [ 188.421597][ T8060] ? rcu_is_watching+0x15/0xb0 [ 188.421623][ T8060] __x64_sys_bpf+0x7c/0x90 [ 188.421643][ T8060] do_syscall_64+0xfa/0x3b0 [ 188.421660][ T8060] ? lockdep_hardirqs_on+0x9c/0x150 [ 188.421677][ T8060] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 188.421692][ T8060] ? clear_bhb_loop+0x60/0xb0 [ 188.421714][ T8060] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 188.421729][ T8060] RIP: 0033:0x7f0686b8ec29 [ 188.421744][ T8060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 188.421758][ T8060] RSP: 002b:00007f06879ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 188.421775][ T8060] RAX: ffffffffffffffda RBX: 00007f0686dd5fa0 RCX: 00007f0686b8ec29 [ 188.421787][ T8060] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 188.421797][ T8060] RBP: 00007f06879ce090 R08: 0000000000000000 R09: 0000000000000000 [ 188.421806][ T8060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 188.421816][ T8060] R13: 00007f0686dd6038 R14: 00007f0686dd5fa0 R15: 00007ffe29161ba8 [ 188.421849][ T8060] [ 189.206960][ T8084] netlink: 'syz.5.680': attribute type 10 has an invalid length. [ 189.296718][ T8087] netlink: 'syz.0.678': attribute type 39 has an invalid length. [ 189.375477][ T8084] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 189.694092][ T8090] netlink: 16178 bytes leftover after parsing attributes in process `syz.1.681'. [ 189.718175][ T8097] netlink: 16 bytes leftover after parsing attributes in process `syz.5.683'. [ 189.745597][ T8097] rdma_rxe: rxe_newlink: failed to add wlan0 [ 189.830861][ T8102] veth1_macvtap: left promiscuous mode [ 190.512184][ T8109] ip6tnl0: entered allmulticast mode [ 190.660839][ T8108] FAULT_INJECTION: forcing a failure. [ 190.660839][ T8108] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 190.757387][ T8108] CPU: 1 UID: 0 PID: 8108 Comm: syz.3.688 Not tainted syzkaller #0 PREEMPT(full) [ 190.757410][ T8108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 190.757420][ T8108] Call Trace: [ 190.757427][ T8108] [ 190.757434][ T8108] dump_stack_lvl+0x189/0x250 [ 190.757458][ T8108] ? __pfx____ratelimit+0x10/0x10 [ 190.757477][ T8108] ? __pfx_dump_stack_lvl+0x10/0x10 [ 190.757495][ T8108] ? __pfx__printk+0x10/0x10 [ 190.757517][ T8108] ? __might_fault+0xb0/0x130 [ 190.757541][ T8108] ? __might_fault+0xb0/0x130 [ 190.757568][ T8108] should_fail_ex+0x414/0x560 [ 190.757596][ T8108] _copy_from_user+0x2d/0xb0 [ 190.757618][ T8108] __sys_bpf+0x1db/0x850 [ 190.757643][ T8108] ? __pfx___sys_bpf+0x10/0x10 [ 190.757660][ T8108] ? sched_clock_cpu+0x74/0x430 [ 190.757703][ T8108] __x64_sys_bpf+0x7c/0x90 [ 190.757721][ T8108] do_syscall_64+0xfa/0x3b0 [ 190.757739][ T8108] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 190.757753][ T8108] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 190.757767][ T8108] ? clear_bhb_loop+0x60/0xb0 [ 190.757785][ T8108] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 190.757806][ T8108] RIP: 0033:0x7f0686b8ec29 [ 190.757821][ T8108] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 190.757833][ T8108] RSP: 002b:00007f06879ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 190.757851][ T8108] RAX: ffffffffffffffda RBX: 00007f0686dd5fa0 RCX: 00007f0686b8ec29 [ 190.757863][ T8108] RDX: 0000000000000030 RSI: 0000200000000140 RDI: 0000000000000014 [ 190.757873][ T8108] RBP: 00007f06879ce090 R08: 0000000000000000 R09: 0000000000000000 [ 190.757883][ T8108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 190.757892][ T8108] R13: 00007f0686dd6038 R14: 00007f0686dd5fa0 R15: 00007ffe29161ba8 [ 190.757921][ T8108] [ 191.562495][ T8127] netlink: 'syz.3.694': attribute type 39 has an invalid length. [ 191.701828][ T8137] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 191.968612][ T8145] netlink: 'syz.1.700': attribute type 10 has an invalid length. [ 192.932861][ T8155] netlink: 16 bytes leftover after parsing attributes in process `syz.1.703'. [ 193.153841][ T8170] FAULT_INJECTION: forcing a failure. [ 193.153841][ T8170] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 193.177949][ T8170] CPU: 0 UID: 0 PID: 8170 Comm: syz.0.709 Not tainted syzkaller #0 PREEMPT(full) [ 193.177970][ T8170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 193.177977][ T8170] Call Trace: [ 193.177983][ T8170] [ 193.177990][ T8170] dump_stack_lvl+0x189/0x250 [ 193.178013][ T8170] ? __pfx____ratelimit+0x10/0x10 [ 193.178030][ T8170] ? __pfx_dump_stack_lvl+0x10/0x10 [ 193.178048][ T8170] ? __pfx__printk+0x10/0x10 [ 193.178068][ T8170] ? __might_fault+0xb0/0x130 [ 193.178108][ T8170] should_fail_ex+0x414/0x560 [ 193.178138][ T8170] _copy_from_iter+0x404/0x1790 [ 193.178177][ T8170] ? rcu_is_watching+0x15/0xb0 [ 193.178209][ T8170] ? __pfx__copy_from_iter+0x10/0x10 [ 193.178234][ T8170] ? __build_skb_around+0x257/0x3e0 [ 193.178264][ T8170] ? netlink_sendmsg+0x642/0xb30 [ 193.178278][ T8170] ? skb_put+0x11b/0x210 [ 193.178305][ T8170] netlink_sendmsg+0x6b2/0xb30 [ 193.178347][ T8170] ? __pfx_netlink_sendmsg+0x10/0x10 [ 193.178374][ T8170] ? aa_sock_msg_perm+0xf1/0x1d0 [ 193.178395][ T8170] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 193.178411][ T8170] ? __pfx_netlink_sendmsg+0x10/0x10 [ 193.178432][ T8170] __sock_sendmsg+0x219/0x270 [ 193.178465][ T8170] ____sys_sendmsg+0x505/0x830 [ 193.178501][ T8170] ? __pfx_____sys_sendmsg+0x10/0x10 [ 193.178542][ T8170] ? import_iovec+0x74/0xa0 [ 193.178571][ T8170] ___sys_sendmsg+0x21f/0x2a0 [ 193.178613][ T8170] ? __pfx____sys_sendmsg+0x10/0x10 [ 193.178723][ T8170] ? __fget_files+0x2a/0x420 [ 193.178739][ T8170] ? __fget_files+0x3a0/0x420 [ 193.178781][ T8170] __x64_sys_sendmsg+0x19b/0x260 [ 193.178798][ T8170] ? perf_trace_run_bpf_submit+0x100/0x170 [ 193.178823][ T8170] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 193.178869][ T8170] ? __pfx_ksys_write+0x10/0x10 [ 193.178887][ T8170] ? rcu_is_watching+0x15/0xb0 [ 193.178921][ T8170] ? do_syscall_64+0xbe/0x3b0 [ 193.178952][ T8170] do_syscall_64+0xfa/0x3b0 [ 193.178969][ T8170] ? lockdep_hardirqs_on+0x9c/0x150 [ 193.178988][ T8170] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 193.179006][ T8170] ? clear_bhb_loop+0x60/0xb0 [ 193.179033][ T8170] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 193.179049][ T8170] RIP: 0033:0x7efcf8d8ec29 [ 193.179068][ T8170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 193.179082][ T8170] RSP: 002b:00007efcf6ff6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 193.179100][ T8170] RAX: ffffffffffffffda RBX: 00007efcf8fd5fa0 RCX: 00007efcf8d8ec29 [ 193.179111][ T8170] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000004 [ 193.179121][ T8170] RBP: 00007efcf6ff6090 R08: 0000000000000000 R09: 0000000000000000 [ 193.179131][ T8170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 193.179140][ T8170] R13: 00007efcf8fd6038 R14: 00007efcf8fd5fa0 R15: 00007ffc1e3745b8 [ 193.179195][ T8170] [ 193.266546][ T8173] lo: entered allmulticast mode [ 193.496062][ T8175] ÿ: renamed from bond_slave_0 (while UP) [ 193.980633][ T8180] netlink: 'syz.5.712': attribute type 10 has an invalid length. [ 194.174901][ T8184] netlink: 'syz.0.714': attribute type 10 has an invalid length. [ 194.360065][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.368302][ T1303] ieee802154 phy1 wpan1: encryption failed: -22 [ 194.924295][ T8205] netlink: 'syz.0.718': attribute type 39 has an invalid length. [ 195.051546][ T8206] netlink: 60 bytes leftover after parsing attributes in process `syz.3.720'. [ 195.110357][ T8206] netlink: 60 bytes leftover after parsing attributes in process `syz.3.720'. [ 195.128790][ T8204] netlink: 60 bytes leftover after parsing attributes in process `syz.3.720'. [ 196.171332][ T8224] netlink: 16 bytes leftover after parsing attributes in process `syz.4.726'. [ 196.227335][ T8228] rdma_rxe: rxe_newlink: failed to add wlan0 [ 196.303082][ T8229] netlink: 156 bytes leftover after parsing attributes in process `syz.3.727'. [ 196.486639][ T8237] netlink: 104 bytes leftover after parsing attributes in process `syz.0.729'. [ 196.564201][ T8236] netlink: 'syz.1.728': attribute type 10 has an invalid length. [ 196.579765][ T8227] netlink: 8 bytes leftover after parsing attributes in process `syz.3.727'. [ 196.592971][ T8227] netlink: 4 bytes leftover after parsing attributes in process `syz.3.727'. [ 196.602237][ T8227] netlink: 2 bytes leftover after parsing attributes in process `syz.3.727'. [ 196.649638][ T5870] Bluetooth: hci0: command 0x0406 tx timeout [ 196.655760][ T51] Bluetooth: hci3: command 0x0406 tx timeout [ 196.657274][ T5184] Bluetooth: hci1: command 0x0406 tx timeout [ 196.729716][ T5184] Bluetooth: hci4: command 0x0406 tx timeout [ 196.870526][ T8253] netlink: 'syz.5.736': attribute type 1 has an invalid length. [ 196.992518][ T8249] netlink: 'syz.4.732': attribute type 10 has an invalid length. [ 197.008626][ T8249] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 197.591377][ T8269] netlink: 'syz.5.740': attribute type 10 has an invalid length. [ 197.624515][ T8269] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.656274][ T8269] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.257859][ T8269] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.265114][ T8269] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.272703][ T8269] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.279936][ T8269] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.292497][ T8269] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 198.364286][ T8279] __nla_validate_parse: 3 callbacks suppressed [ 198.364302][ T8279] netlink: 16 bytes leftover after parsing attributes in process `syz.3.742'. [ 198.404138][ T8279] rdma_rxe: rxe_newlink: failed to add wlan0 [ 198.899380][ T8294] netlink: 'syz.3.750': attribute type 21 has an invalid length. [ 199.022958][ T8282] netlink: 'syz.5.744': attribute type 1 has an invalid length. [ 199.039915][ T8282] netlink: 'syz.5.744': attribute type 2 has an invalid length. [ 199.398866][ T8307] netlink: 'syz.1.754': attribute type 29 has an invalid length. [ 199.412338][ T8307] netlink: 'syz.1.754': attribute type 29 has an invalid length. [ 199.441508][ T8307] netlink: 'syz.1.754': attribute type 29 has an invalid length. [ 199.478499][ T8307] netlink: 'syz.1.754': attribute type 29 has an invalid length. [ 199.646788][ T8321] netlink: 16 bytes leftover after parsing attributes in process `syz.5.759'. [ 199.672028][ T8322] netlink: 340 bytes leftover after parsing attributes in process `syz.0.758'. [ 199.696824][ T8321] rdma_rxe: rxe_newlink: failed to add wlan0 [ 200.009979][ T8338] netlink: 40 bytes leftover after parsing attributes in process `syz.3.761'. [ 200.189766][ T8338] netlink: 'syz.3.761': attribute type 21 has an invalid length. [ 200.288114][ T8338] IPv6: NLM_F_CREATE should be specified when creating new route [ 200.531029][ T8346] netlink: 72 bytes leftover after parsing attributes in process `syz.1.766'. [ 200.693082][ T8350] netlink: 'syz.0.767': attribute type 21 has an invalid length. [ 200.924927][ T8356] netlink: 'syz.3.768': attribute type 19 has an invalid length. [ 201.189793][ T8368] netlink: 16 bytes leftover after parsing attributes in process `syz.1.773'. [ 201.199313][ T8369] netlink: 4083 bytes leftover after parsing attributes in process `syz.3.770'. [ 201.215925][ T8361] netlink: 4083 bytes leftover after parsing attributes in process `syz.3.770'. [ 201.239379][ T8369] netlink: 4083 bytes leftover after parsing attributes in process `syz.3.770'. [ 201.244652][ T8372] openvswitch: netlink: Geneve option length err (len 256, max 255). [ 201.268042][ T8373] syz1: rxe_newlink: already configured on wlan0 [ 201.516269][ T8380] netlink: 'syz.0.777': attribute type 3 has an invalid length. [ 201.530856][ T8380] netlink: 201372 bytes leftover after parsing attributes in process `syz.0.777'. [ 201.609168][ T8389] batadv_slave_1: entered promiscuous mode [ 202.725684][ T8411] syz1: rxe_newlink: already configured on wlan0 [ 203.501770][ T8440] syzkaller0: entered promiscuous mode [ 203.511105][ T8440] syzkaller0: entered allmulticast mode [ 203.570053][ T8435] __nla_validate_parse: 4 callbacks suppressed [ 203.570082][ T8435] netlink: 14 bytes leftover after parsing attributes in process `syz.5.798'. [ 207.663597][ T5882] Bluetooth: hci1: ISO packet for unknown connection handle 0 [ 208.286039][ T8435] bond0: (slave dummy0): Releasing backup interface [ 208.297526][ T8456] netlink: 830 bytes leftover after parsing attributes in process `syz.1.803'. [ 208.308889][ T8465] faux_driver regulatory: loading /lib/firmware/regulatory.db failed with error -12 [ 208.327118][ T8471] netlink: 28 bytes leftover after parsing attributes in process `syz.3.808'. [ 208.337397][ T8471] netlink: 28 bytes leftover after parsing attributes in process `syz.3.808'. [ 208.349597][ T8465] faux_driver regulatory: Direct firmware load for regulatory.db failed with error -12 [ 208.372586][ T8471] netlink: 28 bytes leftover after parsing attributes in process `syz.3.808'. [ 208.382894][ T8465] faux_driver regulatory: Falling back to sysfs fallback for: regulatory.db [ 208.638473][ T8485] validate_nla: 2 callbacks suppressed [ 208.638505][ T8485] netlink: 'syz.3.811': attribute type 10 has an invalid length. [ 209.295517][ T8509] netlink: 'syz.3.816': attribute type 1 has an invalid length. [ 209.315872][ T8509] netlink: 16098 bytes leftover after parsing attributes in process `syz.3.816'. [ 209.377032][ T8514] netlink: 2 bytes leftover after parsing attributes in process `syz.5.821'. [ 209.395381][ T8514] batadv_slave_1: entered promiscuous mode [ 209.466909][ T8509] netlink: 16 bytes leftover after parsing attributes in process `syz.3.816'. [ 209.913890][ T8517] openvswitch: netlink: IP tunnel TTL not specified. [ 210.113213][ T8535] FAULT_INJECTION: forcing a failure. [ 210.113213][ T8535] name failslab, interval 1, probability 0, space 0, times 0 [ 210.134311][ T8535] CPU: 1 UID: 0 PID: 8535 Comm: syz.0.829 Not tainted syzkaller #0 PREEMPT(full) [ 210.134342][ T8535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 210.134351][ T8535] Call Trace: [ 210.134358][ T8535] [ 210.134365][ T8535] dump_stack_lvl+0x189/0x250 [ 210.134388][ T8535] ? __pfx____ratelimit+0x10/0x10 [ 210.134406][ T8535] ? __pfx_dump_stack_lvl+0x10/0x10 [ 210.134424][ T8535] ? __pfx__printk+0x10/0x10 [ 210.134460][ T8535] should_fail_ex+0x414/0x560 [ 210.134489][ T8535] should_failslab+0xa8/0x100 [ 210.134514][ T8535] __kmalloc_cache_noprof+0x70/0x3d0 [ 210.134535][ T8535] ? sctp_add_bind_addr+0x8c/0x370 [ 210.134557][ T8535] sctp_add_bind_addr+0x8c/0x370 [ 210.134579][ T8535] sctp_copy_local_addr_list+0x30b/0x4e0 [ 210.134600][ T8535] ? sctp_copy_local_addr_list+0x9b/0x4e0 [ 210.134616][ T8535] ? __pfx_sctp_copy_local_addr_list+0x10/0x10 [ 210.134634][ T8535] ? sctp_v6_is_any+0x64/0x80 [ 210.134653][ T8535] ? sctp_copy_one_addr+0x93/0x360 [ 210.134673][ T8535] sctp_bind_addr_copy+0xb3/0x3c0 [ 210.134692][ T8535] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 210.134717][ T8535] sctp_connect_new_asoc+0x2e0/0x690 [ 210.134738][ T8535] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 210.134755][ T8535] ? __local_bh_enable_ip+0x12d/0x1c0 [ 210.134776][ T8535] ? bpf_lsm_sctp_bind_connect+0x9/0x20 [ 210.134793][ T8535] ? security_sctp_bind_connect+0x7e/0x2e0 [ 210.134818][ T8535] sctp_sendmsg+0x155c/0x2810 [ 210.134847][ T8535] ? __pfx_sctp_sendmsg+0x10/0x10 [ 210.134870][ T8535] ? aa_sk_perm+0x81e/0x950 [ 210.134890][ T8535] ? __pfx_aa_sk_perm+0x10/0x10 [ 210.134909][ T8535] ? sock_rps_record_flow+0x19/0x410 [ 210.134931][ T8535] ? inet_sendmsg+0x2f4/0x370 [ 210.134956][ T8535] __sock_sendmsg+0x19c/0x270 [ 210.134981][ T8535] ____sys_sendmsg+0x505/0x830 [ 210.135006][ T8535] ? __pfx_____sys_sendmsg+0x10/0x10 [ 210.135035][ T8535] ? import_iovec+0x74/0xa0 [ 210.135059][ T8535] ___sys_sendmsg+0x21f/0x2a0 [ 210.135081][ T8535] ? __pfx____sys_sendmsg+0x10/0x10 [ 210.135139][ T8535] ? __fget_files+0x2a/0x420 [ 210.135153][ T8535] ? __fget_files+0x3a0/0x420 [ 210.135180][ T8535] __x64_sys_sendmsg+0x19b/0x260 [ 210.135204][ T8535] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 210.135235][ T8535] ? __pfx_ksys_write+0x10/0x10 [ 210.135262][ T8535] ? do_syscall_64+0xbe/0x3b0 [ 210.135285][ T8535] do_syscall_64+0xfa/0x3b0 [ 210.135301][ T8535] ? lockdep_hardirqs_on+0x9c/0x150 [ 210.135324][ T8535] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 210.135341][ T8535] ? clear_bhb_loop+0x60/0xb0 [ 210.135362][ T8535] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 210.135377][ T8535] RIP: 0033:0x7efcf8d8ec29 [ 210.135393][ T8535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 210.135408][ T8535] RSP: 002b:00007efcf6ff6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 210.135426][ T8535] RAX: ffffffffffffffda RBX: 00007efcf8fd5fa0 RCX: 00007efcf8d8ec29 [ 210.135438][ T8535] RDX: 0000000000044850 RSI: 0000200000000000 RDI: 0000000000000003 [ 210.135448][ T8535] RBP: 00007efcf6ff6090 R08: 0000000000000000 R09: 0000000000000000 [ 210.135458][ T8535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 210.135468][ T8535] R13: 00007efcf8fd6038 R14: 00007efcf8fd5fa0 R15: 00007ffc1e3745b8 [ 210.135498][ T8535] [ 210.138480][ T8536] netlink: 'syz.3.826': attribute type 10 has an invalid length. [ 317.219912][ C0] ------------[ cut here ]------------ [ 317.226148][ C0] WARNING: CPU: 0 PID: 8543 at kernel/rcu/tree_stall.h:1050 rcu_check_gp_start_stall+0x2e4/0x470 [ 317.236681][ C0] Modules linked in: [ 317.241149][ C0] CPU: 0 UID: 0 PID: 8543 Comm: syz.5.828 Not tainted syzkaller #0 PREEMPT(full) [ 317.250356][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 317.260410][ C0] RIP: 0010:rcu_check_gp_start_stall+0x2e4/0x470 [ 317.266763][ C0] Code: ff ff 48 c7 c7 20 34 b0 99 be 04 00 00 00 e8 d3 43 7c 00 4c 89 f7 b8 01 00 00 00 87 05 55 2b 09 18 85 c0 0f 85 17 ff ff ff 90 <0f> 0b 90 48 81 ff 40 f4 13 8e 74 47 48 c7 c0 60 da a3 8f 48 c1 e8 [ 317.286377][ C0] RSP: 0018:ffffc90000007bb8 EFLAGS: 00010046 [ 317.292528][ C0] RAX: 0000000000000000 RBX: 0000000000000a02 RCX: ffffffff81a708bd [ 317.300496][ C0] RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffffff8e13f440 [ 317.308636][ C0] RBP: ffffc90000007e30 R08: 0000000000000003 R09: 0000000000000004 [ 317.316618][ C0] R10: dffffc0000000000 R11: fffffbfff3360684 R12: 0000000000002904 [ 317.324583][ C0] R13: 1ffff110170c75f2 R14: ffffffff8e13f440 R15: dffffc0000000000 [ 317.332560][ C0] FS: 0000000000000000(0000) GS:ffff888125c15000(0000) knlGS:0000000000000000 [ 317.341492][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 317.348069][ C0] CR2: 0000000000000000 CR3: 000000000df36000 CR4: 00000000003526f0 [ 317.356038][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 317.364087][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 317.372049][ C0] Call Trace: [ 317.375325][ C0] [ 317.378173][ C0] rcu_core+0x5fa/0x1770 [ 317.382455][ C0] ? __pfx_rcu_core+0x10/0x10 [ 317.387142][ C0] ? kvm_sched_clock_read+0x11/0x20 [ 317.392437][ C0] ? __pfx_sched_clock_cpu+0x10/0x10 [ 317.397739][ C0] handle_softirqs+0x283/0x870 [ 317.402501][ C0] ? __irq_exit_rcu+0xca/0x1f0 [ 317.407266][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 317.412550][ C0] ? irqtime_account_irq+0xb6/0x1c0 [ 317.417757][ C0] __irq_exit_rcu+0xca/0x1f0 [ 317.422342][ C0] ? __pfx___irq_exit_rcu+0x10/0x10 [ 317.427542][ C0] irq_exit_rcu+0x9/0x30 [ 317.431775][ C0] sysvec_apic_timer_interrupt+0xa6/0xc0 [ 317.437403][ C0] [ 317.440326][ C0] [ 317.443250][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 317.449228][ C0] RIP: 0010:smp_call_function_many_cond+0xd33/0x12d0 [ 317.455904][ C0] Code: 45 8b 2c 24 44 89 ee 83 e6 01 31 ff e8 b6 63 0b 00 41 83 e5 01 49 bd 00 00 00 00 00 fc ff df 75 07 e8 61 5f 0b 00 eb 38 f3 90 <42> 0f b6 04 2b 84 c0 75 11 41 f7 04 24 01 00 00 00 74 1e e8 45 5f [ 317.475767][ C0] RSP: 0018:ffffc9000482f2e0 EFLAGS: 00000293 [ 317.481837][ C0] RAX: ffffffff81b4621b RBX: 1ffff110170e7f61 RCX: ffff888026b21e00 [ 317.489805][ C0] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 317.497768][ C0] RBP: ffffc9000482f460 R08: ffffffff8fa3a937 R09: 1ffffffff1f47526 [ 317.505733][ C0] R10: dffffc0000000000 R11: fffffbfff1f47527 R12: ffff8880b873fb08 [ 317.513703][ C0] R13: dffffc0000000000 R14: ffff8880b863b1c0 R15: 0000000000000001 [ 317.521687][ C0] ? smp_call_function_many_cond+0xd4b/0x12d0 [ 317.528027][ C0] ? __pfx_flush_tlb_func+0x10/0x10 [ 317.533245][ C0] ? __pfx_smp_call_function_many_cond+0x10/0x10 [ 317.539755][ C0] ? rcu_is_watching+0x15/0xb0 [ 317.544516][ C0] ? __pfx_flush_tlb_func+0x10/0x10 [ 317.549804][ C0] on_each_cpu_cond_mask+0x3f/0x80 [ 317.554915][ C0] flush_tlb_mm_range+0x6b1/0x12d0 [ 317.560046][ C0] ? free_pgd_range+0x144b/0x14c0 [ 317.565074][ C0] ? __pfx_flush_tlb_mm_range+0x10/0x10 [ 317.570635][ C0] tlb_flush_mmu+0x1a7/0x680 [ 317.575403][ C0] tlb_finish_mmu+0xc3/0x1d0 [ 317.580010][ C0] ? free_pgd_range+0x144b/0x14c0 [ 317.585031][ C0] free_ldt_pgtables+0x17b/0x320 [ 317.589973][ C0] ? __pfx_free_ldt_pgtables+0x10/0x10 [ 317.595452][ C0] ? down_read+0x1ad/0x2e0 [ 317.599914][ C0] exit_mmap+0x17c/0xb50 [ 317.604247][ C0] ? uprobe_clear_state+0x20f/0x290 [ 317.609534][ C0] ? __pfx_exit_mmap+0x10/0x10 [ 317.614303][ C0] ? __mutex_unlock_slowpath+0x1a1/0x740 [ 317.619961][ C0] ? __pfx_exit_aio+0x10/0x10 [ 317.624794][ C0] ? uprobe_clear_state+0x274/0x290 [ 317.630188][ C0] __mmput+0x118/0x430 [ 317.634276][ C0] exit_mm+0x1da/0x2c0 [ 317.638356][ C0] ? __pfx_exit_mm+0x10/0x10 [ 317.642955][ C0] ? rcu_is_watching+0x15/0xb0 [ 317.647721][ C0] do_exit+0x648/0x2300 [ 317.651952][ C0] ? do_raw_spin_lock+0x121/0x290 [ 317.657001][ C0] ? __pfx_do_exit+0x10/0x10 [ 317.661625][ C0] do_group_exit+0x21c/0x2d0 [ 317.666219][ C0] ? lockdep_hardirqs_on+0x9c/0x150 [ 317.671420][ C0] get_signal+0x1286/0x1340 [ 317.675947][ C0] arch_do_signal_or_restart+0x9a/0x750 [ 317.681513][ C0] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 317.687005][ C0] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 317.693167][ C0] ? perf_trace_preemptirq_template+0xa3/0x340 [ 317.699425][ C0] ? exit_to_user_mode_loop+0x40/0x110 [ 317.704982][ C0] exit_to_user_mode_loop+0x75/0x110 [ 317.710268][ C0] ? ret_from_fork+0x4af/0x7d0 [ 317.715031][ C0] ret_from_fork+0x4bc/0x7d0 [ 317.719631][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 317.724746][ C0] ? __switch_to_asm+0x39/0x70 [ 317.729510][ C0] ? __switch_to_asm+0x33/0x70 [ 317.734276][ C0] ret_from_fork_asm+0x1a/0x30 [ 317.739071][ C0] [ 317.742095][ C0] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 317.749372][ C0] CPU: 0 UID: 0 PID: 8543 Comm: syz.5.828 Not tainted syzkaller #0 PREEMPT(full) [ 317.758560][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 317.768606][ C0] Call Trace: [ 317.771879][ C0] [ 317.774716][ C0] dump_stack_lvl+0x99/0x250 [ 317.779307][ C0] ? __asan_memcpy+0x40/0x70 [ 317.783903][ C0] ? __pfx_dump_stack_lvl+0x10/0x10 [ 317.789099][ C0] ? __pfx__printk+0x10/0x10 [ 317.793826][ C0] vpanic+0x281/0x750 [ 317.797807][ C0] ? __pfx__printk+0x10/0x10 [ 317.802397][ C0] ? __pfx_vpanic+0x10/0x10 [ 317.806899][ C0] ? is_bpf_text_address+0x292/0x2b0 [ 317.812198][ C0] panic+0xb9/0xc0 [ 317.816009][ C0] ? __pfx_panic+0x10/0x10 [ 317.820453][ C0] __warn+0x31b/0x4b0 [ 317.824436][ C0] ? rcu_check_gp_start_stall+0x2e4/0x470 [ 317.830156][ C0] ? rcu_check_gp_start_stall+0x2e4/0x470 [ 317.835879][ C0] report_bug+0x2be/0x4f0 [ 317.840216][ C0] ? rcu_check_gp_start_stall+0x2e4/0x470 [ 317.846039][ C0] ? rcu_check_gp_start_stall+0x2e4/0x470 [ 317.851940][ C0] ? rcu_check_gp_start_stall+0x2e6/0x470 [ 317.857665][ C0] handle_bug+0x84/0x160 [ 317.861996][ C0] exc_invalid_op+0x1a/0x50 [ 317.866502][ C0] asm_exc_invalid_op+0x1a/0x20 [ 317.871348][ C0] RIP: 0010:rcu_check_gp_start_stall+0x2e4/0x470 [ 317.877685][ C0] Code: ff ff 48 c7 c7 20 34 b0 99 be 04 00 00 00 e8 d3 43 7c 00 4c 89 f7 b8 01 00 00 00 87 05 55 2b 09 18 85 c0 0f 85 17 ff ff ff 90 <0f> 0b 90 48 81 ff 40 f4 13 8e 74 47 48 c7 c0 60 da a3 8f 48 c1 e8 [ 317.897286][ C0] RSP: 0018:ffffc90000007bb8 EFLAGS: 00010046 [ 317.903373][ C0] RAX: 0000000000000000 RBX: 0000000000000a02 RCX: ffffffff81a708bd [ 317.911336][ C0] RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffffff8e13f440 [ 317.919315][ C0] RBP: ffffc90000007e30 R08: 0000000000000003 R09: 0000000000000004 [ 317.927294][ C0] R10: dffffc0000000000 R11: fffffbfff3360684 R12: 0000000000002904 [ 317.935267][ C0] R13: 1ffff110170c75f2 R14: ffffffff8e13f440 R15: dffffc0000000000 [ 317.943265][ C0] ? rcu_check_gp_start_stall+0x2cd/0x470 [ 317.949008][ C0] ? rcu_check_gp_start_stall+0x2cd/0x470 [ 317.954754][ C0] rcu_core+0x5fa/0x1770 [ 317.959053][ C0] ? __pfx_rcu_core+0x10/0x10 [ 317.963747][ C0] ? kvm_sched_clock_read+0x11/0x20 [ 317.968962][ C0] ? __pfx_sched_clock_cpu+0x10/0x10 [ 317.974283][ C0] handle_softirqs+0x283/0x870 [ 317.979069][ C0] ? __irq_exit_rcu+0xca/0x1f0 [ 317.983856][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 317.989163][ C0] ? irqtime_account_irq+0xb6/0x1c0 [ 317.994371][ C0] __irq_exit_rcu+0xca/0x1f0 [ 317.998970][ C0] ? __pfx___irq_exit_rcu+0x10/0x10 [ 318.004197][ C0] irq_exit_rcu+0x9/0x30 [ 318.008449][ C0] sysvec_apic_timer_interrupt+0xa6/0xc0 [ 318.014099][ C0] [ 318.017036][ C0] [ 318.019963][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 318.025957][ C0] RIP: 0010:smp_call_function_many_cond+0xd33/0x12d0 [ 318.032634][ C0] Code: 45 8b 2c 24 44 89 ee 83 e6 01 31 ff e8 b6 63 0b 00 41 83 e5 01 49 bd 00 00 00 00 00 fc ff df 75 07 e8 61 5f 0b 00 eb 38 f3 90 <42> 0f b6 04 2b 84 c0 75 11 41 f7 04 24 01 00 00 00 74 1e e8 45 5f [ 318.052239][ C0] RSP: 0018:ffffc9000482f2e0 EFLAGS: 00000293 [ 318.058308][ C0] RAX: ffffffff81b4621b RBX: 1ffff110170e7f61 RCX: ffff888026b21e00 [ 318.066367][ C0] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 318.074340][ C0] RBP: ffffc9000482f460 R08: ffffffff8fa3a937 R09: 1ffffffff1f47526 [ 318.082311][ C0] R10: dffffc0000000000 R11: fffffbfff1f47527 R12: ffff8880b873fb08 [ 318.090312][ C0] R13: dffffc0000000000 R14: ffff8880b863b1c0 R15: 0000000000000001 [ 318.098294][ C0] ? smp_call_function_many_cond+0xd4b/0x12d0 [ 318.104391][ C0] ? __pfx_flush_tlb_func+0x10/0x10 [ 318.109606][ C0] ? __pfx_smp_call_function_many_cond+0x10/0x10 [ 318.115942][ C0] ? rcu_is_watching+0x15/0xb0 [ 318.120703][ C0] ? __pfx_flush_tlb_func+0x10/0x10 [ 318.125904][ C0] on_each_cpu_cond_mask+0x3f/0x80 [ 318.131018][ C0] flush_tlb_mm_range+0x6b1/0x12d0 [ 318.136138][ C0] ? free_pgd_range+0x144b/0x14c0 [ 318.141165][ C0] ? __pfx_flush_tlb_mm_range+0x10/0x10 [ 318.146725][ C0] tlb_flush_mmu+0x1a7/0x680 [ 318.151323][ C0] tlb_finish_mmu+0xc3/0x1d0 [ 318.155906][ C0] ? free_pgd_range+0x144b/0x14c0 [ 318.160931][ C0] free_ldt_pgtables+0x17b/0x320 [ 318.165877][ C0] ? __pfx_free_ldt_pgtables+0x10/0x10 [ 318.171367][ C0] ? down_read+0x1ad/0x2e0 [ 318.175875][ C0] exit_mmap+0x17c/0xb50 [ 318.180123][ C0] ? uprobe_clear_state+0x20f/0x290 [ 318.185323][ C0] ? __pfx_exit_mmap+0x10/0x10 [ 318.190174][ C0] ? __mutex_unlock_slowpath+0x1a1/0x740 [ 318.195820][ C0] ? __pfx_exit_aio+0x10/0x10 [ 318.200526][ C0] ? uprobe_clear_state+0x274/0x290 [ 318.205734][ C0] __mmput+0x118/0x430 [ 318.209808][ C0] exit_mm+0x1da/0x2c0 [ 318.214070][ C0] ? __pfx_exit_mm+0x10/0x10 [ 318.218754][ C0] ? rcu_is_watching+0x15/0xb0 [ 318.223518][ C0] do_exit+0x648/0x2300 [ 318.227681][ C0] ? do_raw_spin_lock+0x121/0x290 [ 318.232707][ C0] ? __pfx_do_exit+0x10/0x10 [ 318.237314][ C0] do_group_exit+0x21c/0x2d0 [ 318.242001][ C0] ? lockdep_hardirqs_on+0x9c/0x150 [ 318.247208][ C0] get_signal+0x1286/0x1340 [ 318.251728][ C0] arch_do_signal_or_restart+0x9a/0x750 [ 318.257291][ C0] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 318.262667][ C0] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 318.268822][ C0] ? perf_trace_preemptirq_template+0xa3/0x340 [ 318.275005][ C0] ? exit_to_user_mode_loop+0x40/0x110 [ 318.280469][ C0] exit_to_user_mode_loop+0x75/0x110 [ 318.285759][ C0] ? ret_from_fork+0x4af/0x7d0 [ 318.290527][ C0] ret_from_fork+0x4bc/0x7d0 [ 318.295123][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 318.300322][ C0] ? __switch_to_asm+0x39/0x70 [ 318.305084][ C0] ? __switch_to_asm+0x33/0x70 [ 318.309853][ C0] ret_from_fork_asm+0x1a/0x30 [ 318.314649][ C0] [ 319.440788][ C0] Shutting down cpus with NMI [ 319.445812][ C0] Kernel Offset: disabled [ 319.450130][ C0] Rebooting in 86400 seconds..