last executing test programs: 18.790999859s ago: executing program 2 (id=3712): r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x7, @local, 0x0, 0x3}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000340)="f4001100052b3325fe80070000000000000000000009ffffffe000"/40, 0xfd1b}], 0x1}, 0x20040000) (fail_nth: 2) 18.460439576s ago: executing program 2 (id=3714): r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f00000002c0)="e02742e86c0d85ff9782762f0800", 0x0, 0x46b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x83, &(0x7f0000000000)=r3, 0x8) r4 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r5) openat$ppp(0xffffffffffffff9c, 0x0, 0x18, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) sendmsg$inet(r4, &(0x7f00000009c0)={&(0x7f00000000c0)={0x2, 0x4001, @empty}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x2004c818) sendmsg$sock(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)='k', 0x1}], 0x1, &(0x7f0000000080)=[@timestamping={{0x14, 0x1, 0x25, 0x303}}], 0x18}, 0x4000081) recvmsg$kcm(r4, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x2042) 17.615280912s ago: executing program 2 (id=3720): r0 = perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xbd0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x5, 0x84) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xe9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x3, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000002000000000000000100008018150000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000450000001801000020756c2500000000002020207b1a00ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0xe, 0x0, &(0x7f00000002c0)="e02742e86c0d85ff9782762f0800", 0x0, 0x46b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x83, &(0x7f0000000000)=r6, 0x8) r7 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r8) openat$ppp(0xffffffffffffff9c, 0x0, 0x18, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) sendmsg$inet(r7, &(0x7f00000009c0)={&(0x7f00000000c0)={0x2, 0x4001, @empty}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x2004c818) sendmsg$sock(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)='k', 0x1}], 0x1, &(0x7f0000000080)=[@timestamping={{0x14, 0x1, 0x25, 0x303}}], 0x18}, 0x4000081) recvmsg$kcm(r7, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x2042) 17.158763251s ago: executing program 0 (id=3727): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000080000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) 17.138897411s ago: executing program 1 (id=3728): bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x14020, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="0200000000000000040000000400000002000000393ee6d0f740d873a81d19d1300d5726c0bcaf52d6b5ca847e080a35151e7cb0335ffcdb8d20a415a0a0706da4d1983c112ed19fbde51defec6f29625c4d475aaee6e6cadc6651c3444777660a812894dd35664a7e67cd5014b7833a120a5d2e55a096cb6cb4af92d0be33882d", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000c60fd49a9f21006c000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000006007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000005000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)="418b2096", &(0x7f0000000380), 0xc, r2}, 0x38) r4 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x25, &(0x7f0000000000)=r7, 0x20000010) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000580), 0x9) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r3}, 0xc) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff, 0x8000}, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xfffffffffffffffd, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8264, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x3679, 0x8000}, 0x10320, 0x0, 0x8, 0x0, 0x1, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$cgroup_subtree(r10, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000008000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x0, 0xffffffe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4}, 0x50) r11 = socket$kcm(0x11, 0x2, 0x0) sendmsg$sock(r11, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x102}}], 0x18}, 0x0) 17.037405693s ago: executing program 0 (id=3730): bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00'}, 0x18) r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000300)=0x1) r1 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x1000000, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000040000000700000006"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r3}, 0x25) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x5411, &(0x7f0000000240)) sendmsg$sock(r1, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000080)="234b96fc2b82b083c829dfdf6063112046910c98fc66e155ed0e5cb3e8f8712eb2d435a58d9f625d5f128f3e6d9f8ac681fc669c0a485d9e2e50f76cb34d3aeccc41cbfc0f50703bd18735c45bad0e57", 0x50}, {&(0x7f0000000100)="d5c4d80408718eac3fe5cf4b16136e55edf8a70b5f4d0fcbbab2fb86fbad1f57ca26a172454cc64d2ef256ddcb5333597a92b5a510164d93c28aa9e494fad40c776c67cab323d045d07fb92b86a95dd04a1ac64146373dd3ee9945ad5add15d0ceff7568a93b583d46acd87059", 0x6d}, {&(0x7f0000000180)="95ef80ec7626c32460a12d2283a1b47128d322a7a06af85ff5e933e3636cdae1b800110b2d7cfa988a459bd5d88e6c7dd55a269a036c862728f11c21b85c14f7ac6d66322513e62c4ac0e9fb1513e31977995150631daff9f2ae2330f0c082782216723fcebb3d058fee3db7dbc466d63801784b9dbd2de54df9316216dd2fb92e174515bcb45b61b0b5", 0x8a}, {&(0x7f00000003c0)="b93134b11240f6d302c3c232691dd090711c88bc134050d4517b6b0b1032f025ef9a0ea0970dd1b98ea1c0561aa8f9a0a778c55f7834b18005b3dd4a039d4eeafe2731cec54368ff0893bb3a72980610c596fa2ff9e025a347ef8539eaa6e5895d1f13ca1418a24a5a5835020921b68a7c1fa0eedfef81c7dd4867e74646617fc383b29ab6a62773740096cfcddf4364a1413b044dc89a5800c9277c28300f68785a20d72975a96cfee8b1c32707c1557ef12b6d523efc8cedea74fd6327efb1797e0dd6ee53e7aa010ea5a88d8e4188", 0xd0}], 0x4}, 0x4000) r4 = socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0xf0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x20665, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={0x0, 0x2}, 0x2018, 0x9dd, 0x81000000, 0x8, 0x9, 0x0, 0x8, 0x0, 0xfc, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00000012002f8c35093f974b21b92e0a", 0x11}], 0x1}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="1310000016"], 0xfe33) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 16.804646557s ago: executing program 4 (id=3733): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f00000002c0)="e02742e86c0d85ff9782762f0800", 0x0, 0x46b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x83, &(0x7f0000000000)=r3, 0x8) r4 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r5) openat$ppp(0xffffffffffffff9c, 0x0, 0x18, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) sendmsg$inet(r4, &(0x7f00000009c0)={&(0x7f00000000c0)={0x2, 0x4001, @empty}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x2004c818) sendmsg$sock(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)='k', 0x1}], 0x1, &(0x7f0000000080)=[@timestamping={{0x14, 0x1, 0x25, 0x303}}], 0x18}, 0x4000081) recvmsg$kcm(r4, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x2042) 16.802915117s ago: executing program 0 (id=3743): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000000c0)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='b *\b\x00 r'], 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1d, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000140)={0x0, r1}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x14, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@tail_call], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x4, 0x3f, &(0x7f0000000340)=""/63, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb}, 0x94) socket$kcm(0xa, 0x5, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="364000001a00913a"], 0x82d7) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000002200)=""/4096, 0x1000}, {&(0x7f0000003200)=""/4073, 0xfe9}], 0x2}, 0x40) recvmsg(r2, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socket$kcm(0xa, 0x2, 0x3a) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000002280)={'team0\x00', @random="2b0100004ec6"}) 16.723885719s ago: executing program 1 (id=3734): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) r1 = perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1005e2, 0x2, 0x0, 0x0, 0x2, 0x1000000}, 0xffffffffffffffff, 0x0, r1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xffff) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000002000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 16.637269391s ago: executing program 1 (id=3735): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb0, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x4d, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$kcm(0x2, 0x5, 0x84) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x43cd, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001ac0)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9b24be41a9169b740ac03d7c64cee49ee1c6eee84309e7a23c19a39484809539fca4e0b6eab1aa7d54f45a24effa077faa56d59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e59a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d0faab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0480f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad9433269af3be5fa6a9a5c24e392955f4e979ea13201bafe4f0f6ea508000000a0c548552b571bed5647223c78a992810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ede62fc28839b5301160ecec37e83efceefd7ca2533659edc8be05cc85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d35a142a9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a2946501559335781092cf8ce3c7c56cd31121624d76517fd3666276c3c0e812b28e2f30d035cee5d0e77a3c70008ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856cf24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31651e0ecea5ece8fb11a4ee288eb149f1fa33669cc8d901fa8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463baf28345bde0c195bc9f021da8f3025ee9c8e3168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262fa3f1dabeb4fc4bda345360200000001fbddeacd3adaa4d2715e21c7724e9e7e7babf61fe358ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a4601adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cc50feeb7bfad9b7be3283b6450d014e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5671820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff2418a18217747ae442e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427a7f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d17eb0000000000000000000000fa08ad0731c4b839688b22c4da2a6b00008a1949a6ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282bffff2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae05334d5a44a020000001c0d882a564d74a7c72bf9a2152b261ed1d4515f46290d5c6579b63358fea6d2f93589cfe261dc0410b5ccc92a5a0eab327a33431d62d2b7c75ce654d556c9e1817c1abca762ab53d40da51560351b673363652e1ecb56cfe4a746a45ab13c6014e9f361ab687d1cd1795ce9e05c817b83d76046bdb3709de5df7499a02d2f636a454b85b987580ada025d83bd7b8df28a540d5ec5537942e79f2f1ab25ea5f563bc77e4f9468bd309469880c7e34150ca886d1f13dff7e82dbe296c877d925c38c54cc8137b29028854b6bd57ca893927c331300e16aba792289e135589d93302fc37c73c303e383cdf8ef3f6d6265fe5ee01759d24027475c8901039a898582022bc95992b86dce0710887c8a625d9cbb897bdbfaf49a3f642a169827a9bae4fcfa5212461db000000000000e6ed75ca8fcda7ef3ee336189fef3b3ffb9f38fefc5ff39c4e69e3fa1f8b10ee97123e99b61eba065b1ad67530e7c4f11f9da7ae000002000000610101ad7f79cb9bbf64a0fc109f49fe8799fe266e2ccac80fefe750151f5ddfe51833ec65ece70e07ce8ab5d97db47da8f80000664dc0b86ae2b3ff9d4e220752a6b2f3ea9f793612386496dca5af7b8952aafa796ea7b156d19612297c63e774e940bfeb0de83f42fd565a299f741f9b00be4e8fcaf4ec85daceb16d9e8a438e3eb2556570e381b03d9e3c245728648ed9ff22dc963ed105c851c3481125b4c0c8a08a0c9930190902af109fc56b64cc952f298ebe73d7b18052e0147356228ca171b06274a871e2cf9609e0b4cdad36c3250bc8f56f95a6ed"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x480c0) sendmsg$inet(r1, &(0x7f00000029c0)={&(0x7f0000000100)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000002780)=[{&(0x7f00000006c0)='{', 0x1}], 0x1}, 0x4000040) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000001040)={0x2, 0x0, @private=0xa010102}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000140)="97", 0x1}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x7b, &(0x7f0000000000)=r6, 0x8) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0xf, 0x7, 0x1e, 0x200, r0, 0x0, '\x00', 0x0, r6, 0x2, 0x0, 0x1, 0x2}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0xd, &(0x7f00000007c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r8}, 0xc) r9 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r9, &(0x7f00000001c0)={&(0x7f0000001340)=@hci={0x1f, 0xdd86, 0x2c}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000880)="4202000000ad044202", 0x9}], 0x1}, 0x0) 16.62556909s ago: executing program 4 (id=3736): r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11300, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180)={0x0, r0}, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x5, 0x3, &(0x7f0000002040)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1190e95fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9b24be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6eab1aa7d55545a34effa077faa56d59e88254f54077f799bf168301000000bf2255d6a02413bda84cc172afd8cc2e59a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d0faab186d94af98af1da2b5952eb15855933a202304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0480f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad9433269af3be5fa6a9a5c24e392955f4e979ea13201bafe4f0f6ea508000000a0c548552b571bed5647223c78a99281000000059f425ec2f8580fe3c6f605f9a00e90ba71cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ede62fc28839b5301160ecec37e83efceefd7ca2533659edc8be05cc85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d35a142a9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e0852c8e7536bd1f018fa6be1e4de61fdccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4065903124bff29e2bdb1d0b923b272341c5e093fd66a2946501559335781092cf8ce3c7c56cd31121624d76517fd3666276c3c0e812b28e2f30d035cee5d0e77a3c70008ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856cf24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31651e0ecea5ece8fb11a4ee288eb149f1fa33669cc8d901fa8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463baf28345bde0c195bc9f021da8f3025ee9c8e3168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262fa3f1dabeb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a4601adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a8640724a5f4e12ad99012a2e01ce79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cc50feeb7bfad9b7be3283b6450d014e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5671820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff2418a18217747ae441e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427a7f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d17eb0000000000000000000000fa08ad0731c4b839688b22c4da2a6b00008a1949a6ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282bffff2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae05334d5a44a020000001c0d882a564d74a7c72bf9a2152b261e58fea6d2f93589cfe261dc0410b5ccc92a5a0eab327a33431d62d2b7c75ce654d556c9e1817c1abca762ab53d40da51560351b673363652e1ecb56cfe4a746a45ab13c6014e9f361ab687d1cd1795ce9e05c817b83d76046bdb3709de5df7499a02d2f636a454b85b987580ada025d83bd7b8df28a540d5ec5537942e79f2f1ab25ea5f563bc77e4f9468bd309469880c7e34150ca886d1f13dff7e82dbe296c877d925c38c54cc8137b29028854b6bd57ca893927c331300e16aba792289e135589d93302fc37c73c303e383cdf8ef3f6d6265fe5ee01759d24027475c8901039a898582022bc95992b86dce0710887c8a625d9cbb897bdbfaf49a3f642a169827a9bae4fcfa5212461db000000000000e6ed75ca8fcda7ef3ee336189fef3b3ffb9f38fefc5ff39c4e69e3fa1f8b10ee97123e99b61eba065b1ad67530e7c4f11f9da7ae000002000000610101ad7f79cb9bbf64a0fc109f49fe50151f5ddfe51833ec65ece70e07ce8ab5d97db47da8f80000664dc0b86ae2b3ff9d4e220752a6b2f3ea9f793612386496dca5af7b8952aafa332482e6137e994d3f5259b7f51544cdc6d8cb4becc20dd3a57545b0c2621e4c5f94a23f73ee02c22ee7e27c2cc491a85947baac523c347c9b9ede5d6265997f2ad6e9719a"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc7, &(0x7f00000004c0)=""/199}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x10, 0x2, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x14, 0xc8}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x48) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r6, 0x88, 0x68, &(0x7f00000009c0)=r5, 0x4) close(r2) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="240000001e006bcd9e3fe3dc6e08000007000000000000007ea60864160af36504005425", 0x24}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x22) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r7, &(0x7f0000000000), 0x2a979d) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0x0}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007000000b7080000000000007baaf8ff00000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000800000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r9}, 0xc) write$cgroup_pid(r7, &(0x7f0000000300), 0x12) 16.539587052s ago: executing program 2 (id=3737): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019001931a0e69ee517d34460bc06000000a701251e6182949a3651f60284c9f4d4938037e70e4509c51c268811000000000000000000002571cd53b9851b30599980bc", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x84800) recvmsg$kcm(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000001bc0)=""/270, 0x10e}, {&(0x7f0000000840)=""/230, 0xe6}, {&(0x7f0000000bc0)=""/4068, 0xfe4}, {&(0x7f0000001d00)=""/229, 0xe5}, {&(0x7f0000000940)=""/164, 0xa4}, {&(0x7f0000000740)=""/208, 0xd0}, {&(0x7f0000002e00)=""/4074, 0xfea}, {&(0x7f0000000a00)=""/196, 0xc4}, {&(0x7f0000000140)=""/196, 0xc4}], 0x9}, 0x40010120) close(r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x6) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000001c0)={0x1, 0x0, [0x0]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) openat$cgroup_type(r0, &(0x7f0000000140), 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x10000000}, 0x0, 0xc8, 0xfffd, 0x2, 0xf9, 0x0, 0x2, 0x0, 0xffffffff, 0x0, 0x1}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180), 0x82080, 0x0) r7 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="100000002d000b02d25a806f8c6394f9", 0x10}], 0x1}, 0x40000) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea032c00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 16.457922544s ago: executing program 3 (id=3738): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="2e00000010008188040f80ec59acbc040ca1800004000000000000000010003a0e0037000f001e0bbc82a91401eb", 0x2e}], 0x1}, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYRES64, @ANYRESHEX=0x0, @ANYRESDEC=r2, @ANYRESHEX=r2, @ANYRESOCT, @ANYRES8=r1, @ANYRESHEX=r1], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000000)='rxrpc_local\x00'}, 0x18) socket$kcm(0x21, 0x2, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000500), 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1a210, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x75, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x21, &(0x7f0000000200), 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003d000b08d25a80648c7494f90224fc605800024004000400050082c137153e3719ac018015ac1700d1bd", 0x33fe0}], 0x1}, 0x0) 15.818786846s ago: executing program 4 (id=3739): perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e000000100081", 0x7}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) r0 = getpid() perf_event_open(0x0, r0, 0x5, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={@map, r1, 0x29}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x20f42, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={0xffffffffffffffff}, 0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000180)={0x0, 0xa, [@empty, @random="fb6b2f3d982d", @remote, @multicast, @broadcast, @remote, @multicast, @random="3169ae4054bf", @link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}]}) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x200, 0x80220, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x411, 0x1, 0xc, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)="1f81eef4ee181e80fb2a2d9e44a2ea6c3bb91cc12e751c9611191b10c80c12a93708fa0f91eafae5c809118816a8710c24cd41ce5529bb42ae7cb04953f3b41bc1da72c434430e0e8b310ccad3ce8d") bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1e, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sk_lookup=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs$namespace(r3, 0x0) syz_open_procfs$namespace(r3, &(0x7f00000002c0)='ns/time_for_children\x00') r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003d000b08d25a80648c7494f90224fc600b0002400c000400040082c137153e3719ac018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20282, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x9000, 0x0, 0x2, 0x4, 0x1000000, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x11, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8929, &(0x7f00000005c0)={'bridge_slave_1\x00'}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x7) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x4}, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r6 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[@ANYBLOB="33fe00006a"], 0xfe33) 15.816725586s ago: executing program 0 (id=3750): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7000000}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xa0}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext={0x0, 0x7}, 0x4000, 0x0, 0x0, 0x0, 0x43cd, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xd2, &(0x7f0000000940)=""/210}, 0x94) r4 = socket$kcm(0x10, 0x2, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r4, 0x0, 0xfe33) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1f00000004000000060000000700000080130000", @ANYRESHEX=0x0, @ANYBLOB="0000000000b92ff2a869332f4300000000000000", @ANYRES32=0x0, @ANYRES64=r5, @ANYBLOB="00000000ab00000001b4955aeafc38835f4387f4203060955fd0d107ce48d40303947ff612faedb8d7b4513068aad176d38aaacd774c048f9c9207beabbcd9cb58a19c8b4c4dc1384297d10aa292eeffa3bee4d44f2aa735642fbf42ea9cd2de"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r4, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x18, &(0x7f0000000240)=ANY=[@ANYBLOB="180000e301000000000000000200000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000085000000c300000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000085100000fdffffff18110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000000000000850000008600000085200000050000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x43, '\x00', r8, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0xf, 0x4, 0x2}, 0x10, 0xed9c, 0xffffffffffffffff, 0x9, &(0x7f0000000500)=[r6, r6], &(0x7f00000005c0)=[{0x1, 0x5, 0xd, 0xc}, {0x0, 0x5, 0x4, 0x1}, {0x1, 0x3, 0x7}, {0x3, 0x1, 0x8, 0x8}, {0x5, 0x4, 0x8, 0xb}, {0x1, 0x4, 0x0, 0x6}, {0x0, 0x5, 0xa, 0xb}, {0x1, 0x4, 0x3, 0x6}, {0x2, 0x4, 0x2, 0x9}], 0x10, 0xb}, 0x94) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@decl_tag={0x4, 0x0, 0x0, 0x11, 0x4, 0x3}, @ptr, @func={0x1, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x0]}}, &(0x7f0000000340)=""/8, 0x43, 0x8, 0x1, 0x7}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f00000004c0)=""/200, 0xc8, 0x0, &(0x7f00000005c0)=""/230, 0xe6}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000740), &(0x7f0000000780)='%ps \x00'}, 0x20) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000800)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x50) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000880)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffff, '\x00', 0x0, r0, 0x2, 0x3, 0x2}, 0x50) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x1e, 0xfffffffa, 0x101, 0x7fffffff, 0x2002, r1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x5a8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x4, 0x7, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x781c939d, 0x0, 0x0, 0x0, 0xaf}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0xe8, &(0x7f00000001c0)=""/232, 0x40f00, 0x14, '\x00', r8, @fallback=0x36, r9, 0x8, &(0x7f0000000440)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000480)={0x2, 0xb, 0x4, 0xd4}, 0x10, r10, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[r11, r12, r13, r14], 0xffffffffffffffff, 0x10, 0x5}, 0x94) 15.777297907s ago: executing program 2 (id=3740): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000040)="89000000130081ae08060cdc030000017f03e3f7000000006ee2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c0001000c080c00bdad01409bbc7a46e39a8285dcdf12176679df069163ce955fed0009d78f0a947ee2b49e33538afaeb2713f450ebd010a20ff27fff", 0x89}], 0x1}, 0xff0f000020000080) 15.644073409s ago: executing program 3 (id=3741): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x5, 0x84) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xe9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x3, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000002000000000000000100008018150000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000450000001801000020756c2500000000002020207b1a00ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0xe, 0x0, &(0x7f00000002c0)="e02742e86c0d85ff9782762f0800", 0x0, 0x46b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x83, &(0x7f0000000000)=r6, 0x8) r7 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r8) openat$ppp(0xffffffffffffff9c, 0x0, 0x18, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0xec, 0x5, 0xd, 0x7, 0x0, 0x8000000000000000, 0x7a5f4, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_config_ext={0xffffffffffffffff, 0x11}, 0x2, 0x576b, 0x6, 0x8, 0xc6, 0x4, 0x5, 0x0, 0xfffffff9, 0x0, 0x8}, 0x0, 0x100000000000000b, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f0, &(0x7f0000000080)) sendmsg$inet(r7, &(0x7f00000009c0)={&(0x7f00000000c0)={0x2, 0x4001, @empty}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x2004c818) sendmsg$sock(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)='k', 0x1}], 0x1, &(0x7f0000000080)=[@timestamping={{0x14, 0x1, 0x25, 0x303}}], 0x18}, 0x4000081) recvmsg$kcm(r7, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x2042) 15.590965571s ago: executing program 1 (id=3742): perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xbd0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f00000002c0)="e02742e86c0d85ff9782762f0800", 0x0, 0x46b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x83, &(0x7f0000000000)=r2, 0x8) 15.488748382s ago: executing program 0 (id=3744): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xe, 0x3, &(0x7f0000000000)=@framed={{0x3e, 0xa, 0xa, 0x0, 0x0, 0x71, 0x10, 0x43}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081084e81f782db44b904021d080006067c09e8fe55a10a0015400800142603600e120800160000001001a8001600a400014003", 0x39}], 0x1, 0x0, 0x0, 0x6000}, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="d800000010008104687da3aa7143a0b8c81d080b25000000e8fe5538250015000600149b000000", 0x27}], 0x1}, 0x80) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfe33) 15.379431975s ago: executing program 3 (id=3745): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xa, 0x4, 0xfff, 0x6}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="1c0000001e007f", 0x7}, {&(0x7f0000000140)="78cafb73fc02010700000000ef02258f2e440ab8f9", 0x15}], 0x2}, 0x4000000) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9febfaff17070000000000000c0000000c000000020000000000000000000009000000000000"], &(0x7f0000000580)=""/245, 0x26, 0xf5, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2}, 0x94) r3 = perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0xe, 0x0, 0x0, 0x7602, 0x0, 0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x10, &(0x7f0000001280), 0x4) sendmsg$inet(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000013c0)="d0", 0x1}], 0x1}, 0x20000801) sendmsg(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)='x', 0x1}], 0x1}, 0x4) recvmsg(r5, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x1) recvmsg(r5, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x2) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x7f, 0x0, 0x0, 0x7602, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x2) sendmsg$kcm(r6, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001280)="16", 0x1}], 0x1}, 0x0) socket$kcm(0x2, 0x200000000000001, 0x106) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) close(r6) close(r3) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="d8000000180081064e81f782db4cb904021d0800fd027c05e8fe55a10a0006000140020203600e41b0000900ac00060311000000a4000500000080000004015c3b61c1d67f6f94007134cf6efb8000a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9000000008af26c8b7b55f4d3a6823a45f28fcb1d", 0xd8}], 0x1}, 0x40) 15.263061547s ago: executing program 0 (id=3746): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) socket$kcm(0x1e, 0x4, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x400, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfffffffffffffe7f) socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r0, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[@ANYBLOB=',\nN'], 0x6a) perf_event_open(&(0x7f0000000900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x6, 0x5, 0xa, 0x8001, 0x0, 0x0, 0x0, 0x4713}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000300009116144f782db44b904021d08000500142603600e120900210000000401a8001600a400014006000000036010fab94dcf4f0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e012dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5d00040000d6e4edef3d93452a92954b43370e97010000000000000000", 0xd4}], 0x1}, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x50) perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x10, 0x0, 0x0, 0x0, 0x800000000000003, 0x493, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) r3 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r3, &(0x7f00000000c0)={0x0, 0xfe, &(0x7f0000000000)=[{&(0x7f0000000040)="0207000902000000e4a17c45c8d260c9", 0x10}], 0x1}, 0x0) 15.262632977s ago: executing program 1 (id=3747): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4891, 0x0, @perf_bp={0x0, 0x7}, 0xc00, 0xc8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000340)='blkio.bfq.io_service_time_recursive\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40086602, 0x110e22fff2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1d, 0x8, &(0x7f00000031c0)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf7cf39e3100c8acaa47684f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d7559f3b14820ed58b15627c95aa0b784625704f07372c29184ff7f4a7c0000070015006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45e000000000000041201baa80b0b8ed8fb1ec577c377f627daaf787a68af2ad0810000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465a932b77a74e802a0dc6bf25d8a242bc6099ad2300000480006ef6c1ff0900ff0000000010c63a949e8b7955394ffaff03000000000000ab87b1bdeda7be586602d985430cea080000000000fb1a26abfb0767192361448279b05d96a703a660587a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aab926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb155481ef836eb0f8c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaed2b25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec0271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761036eafed1fb2b98b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab7929a57affe760e717a04becff0f719197724f4fce1093b62d7e8c7123d890cec55bf404e4e1f74b7eed82571be54c72d978cf906df08f11f1c4042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe514283707c70600000000000000b7561301bb997316db01ee601f2c9659db9bc04f7089a660d8dcc3ae83169cf331efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f871b136345cf67ca3fb5aac518a515d83129cd857c775f9e7d6101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af403269b4a39ce40293947d9a631bcbe3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f000000009191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562e00e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb2214209ed2d5d776e22a2a798de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b55ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f608ce27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e30400000000000000000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270b939b81367ac91bd627e87306703be8672d70d1ab57075228a95d32f46ed9bd1f00fb8191bbab2dc599dda61ee2010000294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf01cfaed9ef0ce21d69993e9960ff5f76015e6009756237badf4e7965bfe2777e808fcba821a00e8c5c39609ff854256cb490000000000c1fee30a3f7a85d1b2b458c77685efc0ceb1c8e5729c66018d169fc03aa188546bb2e51935ab9067ec3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f626602111b40e761fd210819203828b202779d386ed295f023c67d867014d12ca3c471c7868e7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff00004043060000005dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec743af930cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df40600000000000000e9b49a1b36d48a44ba6a4530e59bec53e876dc660dd6d89f80a4377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f00000000010000000000000000000057d77480e0345effff6413258d1f6eb190aa28cbb4bafe3436b176c7ed4b0600b805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fb03b84f63e022fe755f4007a4a899eaf52c4f491f1e97c862e29e4570600000091c691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104d74dc07748f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1202000000b59fed817072a0da60160761fd3dffda0f7c742eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c7000000000000000542954c167dd9b4acd946ffffffffffffffff1389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c9e281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b630500163aff094059e626766845fd779c9e6cdbbd64c2499ce3ffe2fef03f7cdd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426cfce471fef821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ada08f5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba3c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63e4581d5cc41cbde2ba66adc1168070c8c6e18a6e452a31bde54ad3e16304d06a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f700400fa0c61d5fe6d8ff353f631080405547d65375ae04f44f0c2543c772c5ccb137be7dc87746e1785a8214454d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b036e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e010000005a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb3985b7581bb5584c53984ba9c3340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a39938613067dbd1428c0805b4031a667e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b9e6626f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f1400010000ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1b0100448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae05025040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483d02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a9cfd80e918d685a7b099a4f8ed654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732ab9100781b9912160a3fd2a2e74dd690c57bdfdc1f069f9491bca7a8c59363799be7005c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c1227c8bed10591958c906321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b863af34bac64c247672a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2cdfb7fea73ca18874664d60a4b9423f3297bc8eb91b4ee1d73272abbef3e7a828a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece58e752b47e6f677ec97c5c568a89d6e36b165c39132a0f27080ece2a94c360b002c77f82662675a7713c7067081cac1599a998c41ff4754268ae1676384ff799783f55d7e5a1a0920300000000000000d98440c355927629f2bcf9dc215a18ca0265400abf38e90000000000000000008faf2cddffbfa66bf32eb718e88ec75603ed7c7a8825ce0f27a114bd7a4ab74d0c7b8d90ccc1c3ca6620def782e24d75aed70eb676437f62677a69e0994cd82d72e95493c830fe9515329f40b7025326dec33a527c5d999298eaa3690fd0d38a02fc6e0bc16dbe19f353027edc014411e1138087221492f5d5e5cc9d0a1acd3f581eda9a807aa0e609f935f626d96351e0ff116686cbeb8939feecd5dac8cf45101942ce18e57bb7f337df5435bcf7e504b7c427f70a10e1cb8993a661306a0576b638a0171e6800b5b35589d676eb30ed1a72e8f7b057eb281c4504195635b6b285ebaba019913a2520e43ed790231f047f7d3789c10ae7d724929f77aec1d33d9587580268ee14396f71e7ef588cb2560d6bd0795a9b97281229eb16de286553469fad7214ffc3e416f8b8e442dce1d37f9b1c88a5d8a8d9f2fe45bd8df213ecb4194c8554aea13cadcd502e51f6fec80418e772b5bd8d0228949058038b185909ee542848680f9ad43f4057d676d5e21ae3d7e0e4a28c03f112a94707f032b35915e42993ff148291b8babe026646ee41905992db217561b90811c4702a14f312fe5d2ae7257db6be1034cc1c346b76a853ce274bf0435e18f7e86c660c18c872a4882d21db2046a1893b83c62d61bfeadc1f913e4cab2b897e096dd3fe3525090410cb23bab36cdf200a36014032cf6e5121803c5a0c4a273a19f340163fc6265441d513a1294b8439276394945d94a589708e32a1cb30a8b07b391201385e0b92ecbb7b13d7a87284164018ace6ce58a82c5de321452461089cdd69259f5390f5f508646a524490583c30630bedb47e158ad41c0a653e86a4f4f255cd2a6e95f33b586823aef5564d9de1f5bdd8c80e193f0597b8003860302cd243c00bc5a82c52afb115d16258d507937966bb89409d6d47b8b652d0761d7c72875ae1efb9bc7c6807c2d783e31fd9cd7e84d3d50d8fc44ab8ac9ccd2c0d42e3bd4c029241320446bbf47e23d1320de30fbdf7ed13f80c28fb5c13fccc2e3f73509bdcddad8a2fe48cdd61f2f43611704af64eed8b0cbbd08754f93b8f3d6347aad5cde1ccc5cbd5eaa87e52cea257c856a4af5243eeb5e89f0000000000000000f420df5e4c6d856b3d55e455c08110b2ef4255a38f81555e8e1f22d59c0bc3c9013e66a1f5bda1b695e1602c0afb5c35b2f68f3b151b1e869f40ff4d1bef5e926e1ff95f6321131e4cb797f53455a093a95e67605222d6acc29c46e5db1ef3b8b07e2169fb24ced4b3ae87ebeca06df93212e465bbd1a7e41df2e1a0d508f86cfc7a469ac682685c44692877d03c34c23a65d2677acc73b5d276fdebd685c9b7a079eae228d8426188cb19b083548f5f29e493ab079f33d1965dcbb165015c46998ad410d60cc65fcfa73bd65a43fc024455c4bf530d663976cf71490577251780ab6b1cf8d397444b5be575229f687a3d95ea6b2aa62fce8acb3d4a6a130b4fefa55d0c1d6f3fa448ee24e588e2965c9a442f0baf90923dda91a6850fb7b9c7f432b63001423fedcf053fa28024cc9a178a07042dabc07176fc524032c2edb340c9c18a83565c431aeb0c869683507255254430f90f61e4eca9c8fa98c000b35fec357ee1ebd08439bd95c1ab0753dfd2603d1608bd8c589a1e160000a6ee0ad13346e08738c2d7b00b5d121d918f1dc8bceded939fa8605b54b37cdfcea0bf2bc63e655dc04a2e50212ff89d6587d49896ce18916cf3adc12839c345ca91bb232b891fae2fdd68aaa38281c0feb2c107af3e080d6cdd1c6646ec6804d7e9960c02aa0db9eda24bbcb287fd2a890fa7f9d6ae0c0b1f8dd1603c9ea2f66b572276f96a28b5b6dd9f9bf6ad4bdaa2139b90faf1f40b0f141258578bd825daaaf718d21b7ac05fe5d1b699e5422ca341fe1c944f68fe3a6d783dcf30b0e09d7688f696883b61cb64464b04d351a0a69b0733c348049b0430ed40e200f4ff0000000000000000000000996bcc1b721b152c892fab887e7d20466d90c049c0fdf51dcc16d226a2619c6f47bc25b7f5df5c09fed638922ed127ab36aa7b0c58a2ce5894b1b0f5375d340d96b69b966b05daaf585121a9c7605ed8e9964eef1f14b74cbb2ccdadc6d0b77cf0492b75e1cd11bfdcfddde91b20366715ba0cbe1041be2a65c25d7ca15ef8b71bd2ab9a4294899a1964b0152518fc2ac15a728bcb9e2bc4b551dfdf9011a2a607bc39ad2c4d7c64dcf967724e9b63c397d5265ad3f1da4395a5a800d8845257dcbf210d4f00fe0bd3deed05e506736e6bb6d40ee6cb960bcdb33633ee87f82beb665a9a4c2d4d2b06479ade3a4cd6bba765c9f52b52a0bdd0849ab92baae3775570accb5a57ee9f0035fc6d3df4eebec2e7eb4ff863d3979a20f4428ddca471037b49d4fd130743a97faa02c293b721e52bf53d64c6585e138162331ef98792e1e9b21a6a084fb7b42c64062ef1323a8a65a8ed6038f274f28ff4f78136a1ef108efbe8c4f4e347d50dcdbc33bf3ade4c3a39d316061930d7dd39b8acdecc3f27830e3eda40e648328d95a9aee65a9dd09fd4e96d5b852025dc53ec3f30cc753e6a796084b4e34f521dbb230ae0f3b79142073d437e1fd22d3b7503ffa95b1d5c7740b0ecbfd35dc0f8af895583dfcc2689f6e02c2dd4b57f3dcac54f40da013eb221fa3d65de760576031052c25a96ed4b20230b36d46d3d3fd6bb1d77cc8a48a6b10fa0149e55ccde4a2b26cca2d1ca9191c74ab006a602543fc24d1283e353cfb917620000000024bf3eed258c02a591ec4cd295212d9a98d38745f6f6c4530900000000000000f184f239098bf32551c7cf454e2865974f6520112743f73c619c3cab5609e00178f7393e53462f31559220c026bbde09837bf1b3ffe748a3247c9569f0c5e99f4494f93e0fa1badca90c888616eca97bddabd8003fc12a084d4b11d841979e161b998ddda92f194c4ec7947b7b303be11e0962d429a2c542a28c4932e14c123dfe2b8ec47a11cce134fd6e42a9f4e00ab6de6b45"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, r2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(r3) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x1b, 0x5, &(0x7f0000000500)=ANY=[@ANYRES16=r1], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext, 0x100188, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000640)="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", 0x151}, {&(0x7f0000000440)="9209eda082b86cd0f9f690a9116533077c2954b94f61fc10856060fc158b9747a9f90cde07f32f2459c62240c8b1ce33951c15099cf1b6edd5d34e83e34604b2162ae7a66a416e30b58f84fd7b8be4ebf81037b2166269b87a587c12adf4c9a5e9a80fed8c5a6ad08d2f80a3599d10b4a8d0df338ab981944eafe84de1e7bf19884c994bb7e70170c51c99c5568d207ad869145176ce35225de413e49876f20ec5e7bd66c0d9b8ef20408b09be3fce7a26f6b88328e74c43f7bbbda3b4619b", 0xbf}], 0x2, 0x0, 0x0, 0x2663}, 0x20000000) r6 = socket$kcm(0x10, 0x5, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="d8000000180081064e81f782db4cb904021d0800fd007c05e8fe55a10a0006000140020203600e4109000800ac00060311000000160009000a0002000000035c3b61c1d67f6f94007134cf6efb8000a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9000000008af26c8b7b55f4d2a6823a45f28fcb1d", 0xd8}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100033200fc08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 15.216875518s ago: executing program 2 (id=3748): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x4000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="5c00000012006bab9e3fe3d8fd8978f45225d9ee000000007ea60860160af36504000100080ec000000002009ee517c356a7b0251e61e659ad3af435cf01c937e786a6d0bdd7fcf50e4509c5cc68b7ed9c232d786c35000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x8004000) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b000000020000000000000000520356e616137f1330b6cfdf0004006b1e0f53147e82", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x6, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000040420f00b703000035ce4b3f8500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000084000000b70000000000000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="b41000000000000079f71f99"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001780)=""/4088, 0xff8}, {&(0x7f0000002a00)=""/4096, 0x1000}], 0x2}, 0x10020) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x22fe0}], 0x1}, 0x0) recvmsg$unix(r2, &(0x7f0000000480)={0x0, 0xfffffd88, &(0x7f0000000440), 0x1}, 0x2002) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x75, 0x1e10}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0xf135, 0x0, 0x0, 0x0, 0xffffffffffff7fff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r4) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r5, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0}, 0x100190, 0xc8, 0x9, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x4, 0x0, 0x200000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7902009875f37538e486dd6317ce62667f2c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa88"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) socket$kcm(0xa, 0x922000000003, 0x11) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000001c0)='D', 0x33fe0}], 0x1}, 0x20000040) sendmsg(r9, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) close(0x3) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 15.214085578s ago: executing program 4 (id=3749): r0 = perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xbd0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x5, 0x84) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xe9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x3, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000002000000000000000100008018150000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000450000001801000020756c2500000000002020207b1a00ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0xe, 0x0, &(0x7f00000002c0)="e02742e86c0d85ff9782762f0800", 0x0, 0x46b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x83, &(0x7f0000000000)=r6, 0x8) r7 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r8) openat$ppp(0xffffffffffffff9c, 0x0, 0x18, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) sendmsg$inet(r7, &(0x7f00000009c0)={&(0x7f00000000c0)={0x2, 0x4001, @empty}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x2004c818) sendmsg$sock(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)='k', 0x1}], 0x1, &(0x7f0000000080)=[@timestamping={{0x14, 0x1, 0x25, 0x303}}], 0x18}, 0x4000081) recvmsg$kcm(r7, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x2042) 15.11253423s ago: executing program 1 (id=3751): r0 = perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xbd0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x5, 0x84) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xe9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x3, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000002000000000000000100008018150000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000450000001801000020756c2500000000002020207b1a00ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0xe, 0x0, &(0x7f00000002c0)="e02742e86c0d85ff9782762f0800", 0x0, 0x46b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x83, &(0x7f0000000000)=r6, 0x8) r7 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r8) openat$ppp(0xffffffffffffff9c, 0x0, 0x18, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) sendmsg$inet(r7, &(0x7f00000009c0)={&(0x7f00000000c0)={0x2, 0x4001, @empty}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x2004c818) sendmsg$sock(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)='k', 0x1}], 0x1, &(0x7f0000000080)=[@timestamping={{0x14, 0x1, 0x25, 0x303}}], 0x18}, 0x4000081) recvmsg$kcm(r7, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x2042) 15.08920953s ago: executing program 3 (id=3752): r0 = perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xbd0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x5, 0x84) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xe9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x3, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000002000000000000000100008018150000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000450000001801000020756c2500000000002020207b1a00ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x0, 0xe, 0x0, &(0x7f00000002c0)="e02742e86c0d85ff9782762f0800", 0x0, 0x46b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x83, &(0x7f0000000000)=r6, 0x8) r7 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r8) openat$ppp(0xffffffffffffff9c, 0x0, 0x18, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0xec, 0x5, 0xd, 0x7, 0x0, 0x8000000000000000, 0x7a5f4, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_config_ext={0xffffffffffffffff, 0x11}, 0x2, 0x576b, 0x6, 0x8, 0xc6, 0x4, 0x5, 0x0, 0xfffffff9, 0x0, 0x8}, 0x0, 0x100000000000000b, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f0, &(0x7f0000000080)) sendmsg$inet(r7, &(0x7f00000009c0)={&(0x7f00000000c0)={0x2, 0x4001, @empty}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x2004c818) sendmsg$sock(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)='k', 0x1}], 0x1, &(0x7f0000000080)=[@timestamping={{0x14, 0x1, 0x25, 0x303}}], 0x18}, 0x4000081) recvmsg$kcm(r7, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x2042) 14.785349836s ago: executing program 4 (id=3753): sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3, 0x7}, 0x100800, 0xffffffffffffff7f, 0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x5450, r0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x3, 0x8c8}, 0xc14, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000002000000000000000000000400000003000000000100000604000000000000010000000d020021000000"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2}, 0x20) 14.369750174s ago: executing program 4 (id=3754): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x200, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x6}, 0x0, 0x0, 0xfffffffd, 0x4, 0x3, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0xac}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x2a}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r2, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, r3, 0xa) socketpair(0x18, 0x0, 0x1, &(0x7f0000001780)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xd, 0x9, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x5}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @exit]}, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xb9, &(0x7f00000006c0)=""/185, 0x41000, 0x33, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x4, 0x6, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000800)=[{0x3, 0x4, 0xd, 0x8}, {0x3, 0x5, 0x8, 0xa}, {0xffffffff, 0x3, 0x5, 0x8}], 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000900)={0x0, r4}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffd51, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000040)='cpu.max\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0], 0x0, 0x46, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x21, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0xc, 0xb, &(0x7f0000000080)=ANY=[@ANYRESOCT=r6], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r7, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r2, 0x0, 0x30, 0x0, 0x0) write$cgroup_subtree(r6, &(0x7f00000005c0)=ANY=[@ANYRES16=r8], 0x8) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500000050000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r9}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x20000, 0x2, 0x0, 0x0, 0xb8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xb, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)) 625.66µs ago: executing program 3 (id=3755): r0 = socket$kcm(0x10, 0x2, 0x10) recvmsg$kcm(r0, &(0x7f0000000400)={&(0x7f00000000c0)=@vsock, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/161, 0xa1}, {&(0x7f0000000200)=""/145, 0x91}], 0x2, &(0x7f0000000300)=""/251, 0xfb}, 0x10000) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x33}}, 0x10, 0x0, 0x6, &(0x7f0000000180)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra, @ra={0x94, 0x4, 0x700}]}}}], 0x18}, 0x20040000) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\n\x00\x00\x00\v\x00\x00\x00B\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000331dfbc75fd2"], 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r2, &(0x7f0000000100), 0x0}, 0x20) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020032000b35d25a806f8c6394f90524fc602f0009000a740200053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 0s ago: executing program 3 (id=3756): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000001c0)}, 0x20) close(r0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000340)={&(0x7f0000000e80)="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", &(0x7f0000000600)=""/240, 0x0, &(0x7f00000007c0)="7255898943f932a461cf955ff775303adf177553020050a05f9a313ed4e5ccdb6977ea813a31bfefbb6e8dd2d55ca9cc658de80f8f315693b05c0ef93453182e4e7e11b4e087f8ba10f8e7150900b658f12f03d2cabd2c92", 0xff, 0xffffffffffffffff, 0x4}, 0x38) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) socket$kcm(0xa, 0x5, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid\x00') ioctl$TUNSETNOCSUM(r3, 0xb702, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0100000004000000050000000b00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="020000000000000000000000000000000000000000000000000000b8"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r5}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}, 0x40) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000500)='devices.allow\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r6 = socket$kcm(0x2, 0xa, 0x2) r7 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x29, 0x21, &(0x7f0000000100), 0x120) sendmsg$kcm(r7, &(0x7f0000000000)={&(0x7f0000001640)=@l2tp6={0xa, 0x4000, 0x6, @empty}, 0x80, 0x0}, 0x20000041) ioctl$TUNSETLINK(r1, 0x400454cd, 0x336) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) close(r1) kernel console output (not intermixed with test programs): +0x18b/0x210 [ 403.739057][T12907] __se_sys_sendmsg+0x190/0x250 [ 403.743948][T12907] ? __x64_sys_sendmsg+0x80/0x80 [ 403.749092][T12907] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 403.755140][T12907] ? lockdep_hardirqs_on+0x94/0x140 [ 403.760376][T12907] do_syscall_64+0x4c/0xa0 [ 403.764823][T12907] ? clear_bhb_loop+0x30/0x80 [ 403.769524][T12907] ? clear_bhb_loop+0x30/0x80 [ 403.774239][T12907] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 403.780152][T12907] RIP: 0033:0x7f51804d9ec9 [ 403.784598][T12907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 403.804245][T12907] RSP: 002b:00007f517e741038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 403.812920][T12907] RAX: ffffffffffffffda RBX: 00007f5180730fa0 RCX: 00007f51804d9ec9 [ 403.820989][T12907] RDX: 0000000000000000 RSI: 0000200000000600 RDI: 0000000000000003 [ 403.828986][T12907] RBP: 00007f517e741090 R08: 0000000000000000 R09: 0000000000000000 [ 403.836976][T12907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 403.845207][T12907] R13: 00007f5180731038 R14: 00007f5180730fa0 R15: 00007ffd2aed6fb8 [ 403.853446][T12907] [ 403.898755][T12902] netlink: 'syz.0.3053': attribute type 10 has an invalid length. [ 404.195995][T12902] device batadv0 left promiscuous mode [ 404.210383][T12902] team0: Port device batadv0 removed [ 404.225838][T12903] netlink: 48 bytes leftover after parsing attributes in process `syz.4.3055'. [ 404.814434][T12932] FAULT_INJECTION: forcing a failure. [ 404.814434][T12932] name failslab, interval 1, probability 0, space 0, times 0 [ 404.933189][T12932] CPU: 1 PID: 12932 Comm: syz.2.3062 Not tainted syzkaller #0 [ 404.940862][T12932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 404.951199][T12932] Call Trace: [ 404.954516][T12932] [ 404.957571][T12932] dump_stack_lvl+0x168/0x230 [ 404.962287][T12932] ? show_regs_print_info+0x20/0x20 [ 404.967693][T12932] ? load_image+0x3b0/0x3b0 [ 404.972235][T12932] ? __might_sleep+0xf0/0xf0 [ 404.976945][T12932] ? __lock_acquire+0x7c60/0x7c60 [ 404.982106][T12932] should_fail+0x38c/0x4c0 [ 404.986570][T12932] should_failslab+0x5/0x20 [ 404.991375][T12932] slab_pre_alloc_hook+0x51/0xc0 [ 404.996423][T12932] kmem_cache_alloc_node+0x47/0x2d0 [ 405.001651][T12932] ? __alloc_skb+0xf4/0x750 [ 405.006185][T12932] __alloc_skb+0xf4/0x750 [ 405.010674][T12932] sk_stream_alloc_skb+0x1fa/0xa60 [ 405.015826][T12932] tcp_sendmsg_locked+0xc3e/0x3590 [ 405.020977][T12932] ? aa_sk_perm+0x8f0/0x8f0 [ 405.025500][T12932] ? perf_trace_lock+0xdf/0x370 [ 405.030378][T12932] ? mark_lock+0x94/0x320 [ 405.034957][T12932] ? tcp_free_fastopen_req+0x70/0x70 [ 405.040268][T12932] ? lock_sock_nested+0x68/0x100 [ 405.045220][T12932] ? inet6_compat_ioctl+0x380/0x380 [ 405.050432][T12932] ? inet6_compat_ioctl+0x380/0x380 [ 405.055844][T12932] tcp_sendmsg+0x2b/0x40 [ 405.060118][T12932] ____sys_sendmsg+0x5a2/0x8c0 [ 405.064908][T12932] ? memset+0x1e/0x40 [ 405.068908][T12932] ? __sys_sendmsg_sock+0x30/0x30 [ 405.073957][T12932] ? import_iovec+0x6f/0xa0 [ 405.078475][T12932] ___sys_sendmsg+0x1f0/0x260 [ 405.083172][T12932] ? __sys_sendmsg+0x250/0x250 [ 405.088001][T12932] ? __fdget+0x18b/0x210 [ 405.092289][T12932] __se_sys_sendmsg+0x190/0x250 [ 405.097153][T12932] ? __x64_sys_sendmsg+0x80/0x80 [ 405.102272][T12932] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 405.108303][T12932] ? lockdep_hardirqs_on+0x94/0x140 [ 405.113617][T12932] do_syscall_64+0x4c/0xa0 [ 405.118042][T12932] ? clear_bhb_loop+0x30/0x80 [ 405.122728][T12932] ? clear_bhb_loop+0x30/0x80 [ 405.127442][T12932] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 405.133374][T12932] RIP: 0033:0x7f8c1146aec9 [ 405.137815][T12932] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 405.157442][T12932] RSP: 002b:00007f8c0f6b1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 405.165875][T12932] RAX: ffffffffffffffda RBX: 00007f8c116c2090 RCX: 00007f8c1146aec9 [ 405.173860][T12932] RDX: 0000000000040001 RSI: 00002000000008c0 RDI: 000000000000000e [ 405.181844][T12932] RBP: 00007f8c0f6b1090 R08: 0000000000000000 R09: 0000000000000000 [ 405.190071][T12932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 405.198141][T12932] R13: 00007f8c116c2128 R14: 00007f8c116c2090 R15: 00007fff88413428 [ 405.206145][T12932] [ 406.558006][T12973] netlink: 'syz.2.3075': attribute type 10 has an invalid length. [ 406.616971][T12973] netlink: 40 bytes leftover after parsing attributes in process `syz.2.3075'. [ 406.765323][T12973] device batadv0 entered promiscuous mode [ 406.774771][T12973] bridge0: port 4(batadv0) entered blocking state [ 406.835192][T12973] bridge0: port 4(batadv0) entered disabled state [ 406.977160][ T4352] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 406.986662][ T4352] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 407.381438][T12988] FAULT_INJECTION: forcing a failure. [ 407.381438][T12988] name failslab, interval 1, probability 0, space 0, times 0 [ 407.402193][T12988] CPU: 0 PID: 12988 Comm: syz.0.3081 Not tainted syzkaller #0 [ 407.409723][T12988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 407.419855][T12988] Call Trace: [ 407.423162][T12988] [ 407.426119][T12988] dump_stack_lvl+0x168/0x230 [ 407.430842][T12988] ? show_regs_print_info+0x20/0x20 [ 407.436125][T12988] ? load_image+0x3b0/0x3b0 [ 407.440665][T12988] ? __might_sleep+0xf0/0xf0 [ 407.445396][T12988] ? __lock_acquire+0x7c60/0x7c60 [ 407.450464][T12988] ? netlink_insert+0xe7c/0x11d0 [ 407.455574][T12988] should_fail+0x38c/0x4c0 [ 407.460044][T12988] should_failslab+0x5/0x20 [ 407.464577][T12988] slab_pre_alloc_hook+0x51/0xc0 [ 407.469604][T12988] kmem_cache_alloc_node+0x47/0x2d0 [ 407.474918][T12988] ? __alloc_skb+0xf4/0x750 [ 407.479472][T12988] __alloc_skb+0xf4/0x750 [ 407.483839][T12988] netlink_sendmsg+0x645/0xbc0 [ 407.488650][T12988] ? netlink_getsockopt+0x560/0x560 [ 407.493884][T12988] ? aa_sock_msg_perm+0x94/0x150 [ 407.498859][T12988] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 407.504174][T12988] ? security_socket_sendmsg+0x7c/0xa0 [ 407.509663][T12988] ? netlink_getsockopt+0x560/0x560 [ 407.514904][T12988] ____sys_sendmsg+0x5a2/0x8c0 [ 407.519710][T12988] ? memset+0x1e/0x40 [ 407.523750][T12988] ? __sys_sendmsg_sock+0x30/0x30 [ 407.528819][T12988] ? import_iovec+0x6f/0xa0 [ 407.533371][T12988] ___sys_sendmsg+0x1f0/0x260 [ 407.538091][T12988] ? __sys_sendmsg+0x250/0x250 [ 407.542907][T12988] ? vfs_write+0x84d/0xd00 [ 407.547373][T12988] ? __fdget+0x18b/0x210 [ 407.551652][T12988] __se_sys_sendmsg+0x190/0x250 [ 407.556552][T12988] ? __x64_sys_sendmsg+0x80/0x80 [ 407.561520][T12988] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 407.567546][T12988] ? lockdep_hardirqs_on+0x94/0x140 [ 407.572779][T12988] do_syscall_64+0x4c/0xa0 [ 407.577226][T12988] ? clear_bhb_loop+0x30/0x80 [ 407.582042][T12988] ? clear_bhb_loop+0x30/0x80 [ 407.586755][T12988] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 407.592685][T12988] RIP: 0033:0x7f87f3d4bec9 [ 407.597145][T12988] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 407.616980][T12988] RSP: 002b:00007f87f1fb3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 407.625446][T12988] RAX: ffffffffffffffda RBX: 00007f87f3fa2fa0 RCX: 00007f87f3d4bec9 [ 407.634076][T12988] RDX: 0000000000000840 RSI: 00002000000000c0 RDI: 0000000000000003 [ 407.642078][T12988] RBP: 00007f87f1fb3090 R08: 0000000000000000 R09: 0000000000000000 [ 407.650077][T12988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 407.658157][T12988] R13: 00007f87f3fa3038 R14: 00007f87f3fa2fa0 R15: 00007ffc41017998 [ 407.666192][T12988] [ 408.317130][T13023] FAULT_INJECTION: forcing a failure. [ 408.317130][T13023] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 408.382806][T13023] CPU: 1 PID: 13023 Comm: syz.4.3092 Not tainted syzkaller #0 [ 408.390332][T13023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 408.400426][T13023] Call Trace: [ 408.403752][T13023] [ 408.406711][T13023] dump_stack_lvl+0x168/0x230 [ 408.411440][T13023] ? show_regs_print_info+0x20/0x20 [ 408.416685][T13023] ? load_image+0x3b0/0x3b0 [ 408.421244][T13023] ? __lock_acquire+0x7c60/0x7c60 [ 408.426337][T13023] ? vfs_write+0x84d/0xd00 [ 408.430839][T13023] should_fail+0x38c/0x4c0 [ 408.435304][T13023] _copy_from_user+0x2e/0x170 [ 408.440028][T13023] __sys_bpf+0x21b/0x670 [ 408.444312][T13023] ? bpf_link_show_fdinfo+0x340/0x340 [ 408.450074][T13023] ? rcu_nmi_exit+0x6f/0xf0 [ 408.454628][T13023] ? vtime_user_exit+0x2dc/0x400 [ 408.459609][T13023] __x64_sys_bpf+0x78/0x90 [ 408.464075][T13023] do_syscall_64+0x4c/0xa0 [ 408.468522][T13023] ? clear_bhb_loop+0x30/0x80 [ 408.473237][T13023] ? clear_bhb_loop+0x30/0x80 [ 408.477967][T13023] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 408.483895][T13023] RIP: 0033:0x7fa0211b9ec9 [ 408.488350][T13023] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 408.507994][T13023] RSP: 002b:00007fa01f421038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 408.516553][T13023] RAX: ffffffffffffffda RBX: 00007fa021410fa0 RCX: 00007fa0211b9ec9 [ 408.524600][T13023] RDX: 0000000000000080 RSI: 0000200000000340 RDI: 0000000000000005 [ 408.532620][T13023] RBP: 00007fa01f421090 R08: 0000000000000000 R09: 0000000000000000 [ 408.540625][T13023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 408.549064][T13023] R13: 00007fa021411038 R14: 00007fa021410fa0 R15: 00007ffc3ebe79b8 [ 408.557091][T13023] [ 408.588873][T13030] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3096'. [ 408.602123][T13030] netlink: 'syz.2.3096': attribute type 10 has an invalid length. [ 408.611573][T13030] netlink: 40 bytes leftover after parsing attributes in process `syz.2.3096'. [ 408.920944][T13039] FAULT_INJECTION: forcing a failure. [ 408.920944][T13039] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 408.967963][T13037] netlink: 209844 bytes leftover after parsing attributes in process `syz.4.3099'. [ 408.995906][T13039] CPU: 0 PID: 13039 Comm: syz.0.3100 Not tainted syzkaller #0 [ 409.003625][T13039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 409.013714][T13039] Call Trace: [ 409.017030][T13039] [ 409.019988][T13039] dump_stack_lvl+0x168/0x230 [ 409.024705][T13039] ? show_regs_print_info+0x20/0x20 [ 409.029929][T13039] ? load_image+0x3b0/0x3b0 [ 409.034454][T13039] ? __might_sleep+0xf0/0xf0 [ 409.039091][T13039] ? __lock_acquire+0x7c60/0x7c60 [ 409.044136][T13039] should_fail+0x38c/0x4c0 [ 409.048567][T13039] copy_page_from_iter+0x33c/0x760 [ 409.053704][T13039] pipe_write+0x971/0x1a80 [ 409.058162][T13039] ? pipe_write+0x1d1/0x1a80 [ 409.062777][T13039] ? pipe_read+0x1210/0x1210 [ 409.067374][T13039] ? end_current_label_crit_section+0x14b/0x170 [ 409.073635][T13039] ? memset+0x1e/0x40 [ 409.077636][T13039] ? iov_iter_init+0xb4/0x170 [ 409.082336][T13039] vfs_write+0x712/0xd00 [ 409.086609][T13039] ? file_end_write+0x250/0x250 [ 409.091480][T13039] ? __fget_files+0x40f/0x480 [ 409.096180][T13039] ? __fdget_pos+0x1e2/0x370 [ 409.100779][T13039] ? ksys_write+0x71/0x250 [ 409.105216][T13039] ksys_write+0x14d/0x250 [ 409.109650][T13039] ? __ia32_sys_read+0x80/0x80 [ 409.114515][T13039] ? lockdep_hardirqs_on+0x94/0x140 [ 409.119733][T13039] do_syscall_64+0x4c/0xa0 [ 409.124166][T13039] ? clear_bhb_loop+0x30/0x80 [ 409.129041][T13039] ? clear_bhb_loop+0x30/0x80 [ 409.133732][T13039] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 409.139637][T13039] RIP: 0033:0x7f87f3d4bec9 [ 409.144080][T13039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 409.163788][T13039] RSP: 002b:00007f87f1fb3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 409.172328][T13039] RAX: ffffffffffffffda RBX: 00007f87f3fa2fa0 RCX: 00007f87f3d4bec9 [ 409.180346][T13039] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 409.188339][T13039] RBP: 00007f87f1fb3090 R08: 0000000000000000 R09: 0000000000000000 [ 409.196424][T13039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 409.204419][T13039] R13: 00007f87f3fa3038 R14: 00007f87f3fa2fa0 R15: 00007ffc41017998 [ 409.212423][T13039] [ 409.352717][ T1386] device hsr_slave_0 left promiscuous mode [ 409.362297][ T1386] device hsr_slave_1 left promiscuous mode [ 409.379701][ T1386] device bridge_slave_1 left promiscuous mode [ 409.407326][ T1386] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.425460][ T1386] device bridge_slave_0 left promiscuous mode [ 409.431745][ T1386] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.458591][T13059] FAULT_INJECTION: forcing a failure. [ 409.458591][T13059] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 409.512944][T13059] CPU: 1 PID: 13059 Comm: syz.4.3106 Not tainted syzkaller #0 [ 409.520469][T13059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 409.530583][T13059] Call Trace: [ 409.533892][T13059] [ 409.536857][T13059] dump_stack_lvl+0x168/0x230 [ 409.541589][T13059] ? show_regs_print_info+0x20/0x20 [ 409.546941][T13059] ? load_image+0x3b0/0x3b0 [ 409.551552][T13059] ? __lock_acquire+0x7c60/0x7c60 [ 409.556637][T13059] should_fail+0x38c/0x4c0 [ 409.561195][T13059] _copy_to_user+0x2e/0x130 [ 409.565849][T13059] simple_read_from_buffer+0xe3/0x150 [ 409.571264][T13059] proc_fail_nth_read+0x19a/0x210 [ 409.576331][T13059] ? proc_fault_inject_write+0x2f0/0x2f0 [ 409.582022][T13059] ? fsnotify_perm+0x254/0x560 [ 409.586804][T13059] ? proc_fault_inject_write+0x2f0/0x2f0 [ 409.592502][T13059] vfs_read+0x2f6/0xcf0 [ 409.596698][T13059] ? kernel_read+0x1e0/0x1e0 [ 409.601316][T13059] ? __fget_files+0x40f/0x480 [ 409.606031][T13059] ? mutex_lock_nested+0x17/0x20 [ 409.611172][T13059] ? __fdget_pos+0x2bf/0x370 [ 409.615797][T13059] ? ksys_read+0x71/0x250 [ 409.620186][T13059] ksys_read+0x14d/0x250 [ 409.624657][T13059] ? vfs_write+0xd00/0xd00 [ 409.629116][T13059] ? lockdep_hardirqs_on+0x94/0x140 [ 409.634363][T13059] do_syscall_64+0x4c/0xa0 [ 409.638847][T13059] ? clear_bhb_loop+0x30/0x80 [ 409.643756][T13059] ? clear_bhb_loop+0x30/0x80 [ 409.648476][T13059] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 409.654473][T13059] RIP: 0033:0x7fa0211b88dc [ 409.658919][T13059] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 409.678557][T13059] RSP: 002b:00007fa01f400030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 409.687036][T13059] RAX: ffffffffffffffda RBX: 00007fa021411090 RCX: 00007fa0211b88dc [ 409.695093][T13059] RDX: 000000000000000f RSI: 00007fa01f4000a0 RDI: 0000000000000006 [ 409.703230][T13059] RBP: 00007fa01f400090 R08: 0000000000000000 R09: 0000000000000000 [ 409.711243][T13059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 409.719253][T13059] R13: 00007fa021411128 R14: 00007fa021411090 R15: 00007ffc3ebe79b8 [ 409.727284][T13059] [ 409.741737][ T1386] device veth1_macvtap left promiscuous mode [ 409.753841][ T1386] device veth0_macvtap left promiscuous mode [ 409.768247][ T1386] device veth1_vlan left promiscuous mode [ 410.122629][ T1386] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 410.131670][ T1386] device bond_slave_1 left promiscuous mode [ 410.148498][ T1386] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 410.158299][ T1386] device bond_slave_0 left promiscuous mode [ 410.237933][ T1386] bond0 (unregistering): (slave bridge0): Releasing backup interface [ 410.247653][ T1386] device bridge0 left promiscuous mode [ 410.253431][ T1386] bond0 (unregistering): Released all slaves [ 410.332774][T13067] IPv6: Can't replace route, no match found [ 410.935833][T13098] netlink: 156 bytes leftover after parsing attributes in process `syz.3.3118'. [ 411.040904][T13102] netlink: 'syz.2.3119': attribute type 21 has an invalid length. [ 411.065908][T13102] netlink: 152 bytes leftover after parsing attributes in process `syz.2.3119'. [ 411.144950][T13116] FAULT_INJECTION: forcing a failure. [ 411.144950][T13116] name failslab, interval 1, probability 0, space 0, times 0 [ 411.175152][T13116] CPU: 1 PID: 13116 Comm: syz.0.3124 Not tainted syzkaller #0 [ 411.182675][T13116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 411.192761][T13116] Call Trace: [ 411.196078][T13116] [ 411.199037][T13116] dump_stack_lvl+0x168/0x230 [ 411.203749][T13116] ? show_regs_print_info+0x20/0x20 [ 411.209009][T13116] ? load_image+0x3b0/0x3b0 [ 411.213576][T13116] should_fail+0x38c/0x4c0 [ 411.218040][T13116] should_failslab+0x5/0x20 [ 411.222565][T13116] slab_pre_alloc_hook+0x51/0xc0 [ 411.227526][T13116] ? skb_clone+0x1bd/0x350 [ 411.232072][T13116] kmem_cache_alloc+0x3d/0x290 [ 411.236883][T13116] skb_clone+0x1bd/0x350 [ 411.241155][T13116] __netlink_deliver_tap+0x3cd/0x7c0 [ 411.246486][T13116] netlink_deliver_tap+0x16c/0x180 [ 411.251634][T13116] netlink_unicast+0x74f/0x920 [ 411.256443][T13116] netlink_sendmsg+0x8ab/0xbc0 [ 411.261314][T13116] ? netlink_getsockopt+0x560/0x560 [ 411.266634][T13116] ? aa_sock_msg_perm+0x94/0x150 [ 411.271603][T13116] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 411.276916][T13116] ? security_socket_sendmsg+0x7c/0xa0 [ 411.282399][T13116] ? netlink_getsockopt+0x560/0x560 [ 411.287637][T13116] ____sys_sendmsg+0x5a2/0x8c0 [ 411.292447][T13116] ? memset+0x1e/0x40 [ 411.296462][T13116] ? __sys_sendmsg_sock+0x30/0x30 [ 411.301524][T13116] ? import_iovec+0x6f/0xa0 [ 411.306058][T13116] ___sys_sendmsg+0x1f0/0x260 [ 411.310776][T13116] ? __sys_sendmsg+0x250/0x250 [ 411.315588][T13116] ? vfs_write+0x84d/0xd00 [ 411.320051][T13116] ? __fdget+0x18b/0x210 [ 411.324321][T13116] __se_sys_sendmsg+0x190/0x250 [ 411.329201][T13116] ? __x64_sys_sendmsg+0x80/0x80 [ 411.334164][T13116] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 411.340205][T13116] ? lockdep_hardirqs_on+0x94/0x140 [ 411.345478][T13116] do_syscall_64+0x4c/0xa0 [ 411.350103][T13116] ? clear_bhb_loop+0x30/0x80 [ 411.354808][T13116] ? clear_bhb_loop+0x30/0x80 [ 411.359523][T13116] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 411.365446][T13116] RIP: 0033:0x7f87f3d4bec9 [ 411.369893][T13116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 411.389705][T13116] RSP: 002b:00007f87f1fb3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 411.398171][T13116] RAX: ffffffffffffffda RBX: 00007f87f3fa2fa0 RCX: 00007f87f3d4bec9 [ 411.406185][T13116] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 411.414190][T13116] RBP: 00007f87f1fb3090 R08: 0000000000000000 R09: 0000000000000000 [ 411.422196][T13116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 411.430200][T13116] R13: 00007f87f3fa3038 R14: 00007f87f3fa2fa0 R15: 00007ffc41017998 [ 411.438324][T13116] [ 411.872773][T13125] device bond0 entered promiscuous mode [ 411.940859][T13125] device bond_slave_0 entered promiscuous mode [ 412.075398][T13125] device bond_slave_1 entered promiscuous mode [ 412.221191][T13133] netlink: 180 bytes leftover after parsing attributes in process `syz.0.3130'. [ 412.364940][T13134] device syzkaller0 entered promiscuous mode [ 413.090975][T13162] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.3135'. [ 413.330226][T13155] device syzkaller0 entered promiscuous mode [ 413.400931][T13153] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.3135'. [ 413.668389][T13122] chnl_net:caif_netlink_parms(): no params data found [ 413.675813][ T4232] Bluetooth: hci5: command 0x0409 tx timeout [ 413.976058][T13122] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.986684][T13122] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.005805][T13122] device bridge_slave_0 entered promiscuous mode [ 414.032409][T13122] bridge0: port 2(bridge_slave_1) entered blocking state [ 414.045490][T13122] bridge0: port 2(bridge_slave_1) entered disabled state [ 414.065956][T13122] device bridge_slave_1 entered promiscuous mode [ 414.210672][T13122] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 414.270562][T13122] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 414.531788][T13122] team0: Port device team_slave_0 added [ 414.572003][T13122] team0: Port device team_slave_1 added [ 414.714224][T13122] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 414.789267][T13122] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 414.897973][T13122] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 414.937399][T13122] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 414.954878][T13122] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 415.025880][T13122] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 415.087645][T13230] FAULT_INJECTION: forcing a failure. [ 415.087645][T13230] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 415.104685][T13212] device veth1_macvtap left promiscuous mode [ 415.163914][T13230] CPU: 0 PID: 13230 Comm: syz.3.3158 Not tainted syzkaller #0 [ 415.171566][T13230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 415.181812][T13230] Call Trace: [ 415.185136][T13230] [ 415.188215][T13230] dump_stack_lvl+0x168/0x230 [ 415.193035][T13230] ? show_regs_print_info+0x20/0x20 [ 415.198288][T13230] ? load_image+0x3b0/0x3b0 [ 415.202965][T13230] ? __lock_acquire+0x7c60/0x7c60 [ 415.208056][T13230] should_fail+0x38c/0x4c0 [ 415.212526][T13230] _copy_from_user+0x2e/0x170 [ 415.217267][T13230] __copy_msghdr_from_user+0xaf/0x5e0 [ 415.222774][T13230] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 415.228551][T13230] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 415.234016][T13230] ? trace_event_raw_event_lock+0x250/0x250 [ 415.239975][T13230] ___sys_sendmsg+0x156/0x260 [ 415.244745][T13230] ? __sys_sendmsg+0x250/0x250 [ 415.249580][T13230] ? trace_event_raw_event_lock+0x250/0x250 [ 415.255557][T13230] ? __fdget+0x18b/0x210 [ 415.259847][T13230] __se_sys_sendmsg+0x190/0x250 [ 415.264845][T13230] ? __x64_sys_sendmsg+0x80/0x80 [ 415.269820][T13230] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 415.275966][T13230] ? lockdep_hardirqs_on+0x94/0x140 [ 415.281273][T13230] do_syscall_64+0x4c/0xa0 [ 415.285729][T13230] ? clear_bhb_loop+0x30/0x80 [ 415.290443][T13230] ? clear_bhb_loop+0x30/0x80 [ 415.295165][T13230] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 415.301101][T13230] RIP: 0033:0x7f51804d9ec9 [ 415.305553][T13230] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 415.325277][T13230] RSP: 002b:00007f517e741038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 415.333740][T13230] RAX: ffffffffffffffda RBX: 00007f5180730fa0 RCX: 00007f51804d9ec9 [ 415.341758][T13230] RDX: 0000000000000800 RSI: 0000200000000040 RDI: 0000000000000003 [ 415.349772][T13230] RBP: 00007f517e741090 R08: 0000000000000000 R09: 0000000000000000 [ 415.357781][T13230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 415.366017][T13230] R13: 00007f5180731038 R14: 00007f5180730fa0 R15: 00007ffd2aed6fb8 [ 415.374078][T13230] [ 415.458518][T13211] delete_channel: no stack [ 415.568751][T13122] device hsr_slave_0 entered promiscuous mode [ 415.620619][T13122] device hsr_slave_1 entered promiscuous mode [ 415.755152][ T4302] Bluetooth: hci5: command 0x041b tx timeout [ 415.825959][T13244] netlink: 'syz.2.3164': attribute type 3 has an invalid length. [ 415.833797][T13244] netlink: 105116 bytes leftover after parsing attributes in process `syz.2.3164'. [ 415.945576][T13256] netlink: 2 bytes leftover after parsing attributes in process `syz.2.3164'. [ 416.044002][T13122] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 416.160071][T13122] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 416.182295][T13260] FAULT_INJECTION: forcing a failure. [ 416.182295][T13260] name failslab, interval 1, probability 0, space 0, times 0 [ 416.255687][T13260] CPU: 1 PID: 13260 Comm: syz.3.3167 Not tainted syzkaller #0 [ 416.263230][T13260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 416.273372][T13260] Call Trace: [ 416.276678][T13260] [ 416.279648][T13260] dump_stack_lvl+0x168/0x230 [ 416.284386][T13260] ? show_regs_print_info+0x20/0x20 [ 416.289639][T13260] ? load_image+0x3b0/0x3b0 [ 416.294192][T13260] ? __might_sleep+0xf0/0xf0 [ 416.298811][T13260] ? __lock_acquire+0x7c60/0x7c60 [ 416.303865][T13260] ? netlink_insert+0xe7c/0x11d0 [ 416.308841][T13260] should_fail+0x38c/0x4c0 [ 416.313321][T13260] should_failslab+0x5/0x20 [ 416.317873][T13260] slab_pre_alloc_hook+0x51/0xc0 [ 416.322857][T13260] kmem_cache_alloc_node+0x47/0x2d0 [ 416.328091][T13260] ? __alloc_skb+0xf4/0x750 [ 416.332650][T13260] __alloc_skb+0xf4/0x750 [ 416.337032][T13260] netlink_sendmsg+0x645/0xbc0 [ 416.341863][T13260] ? netlink_getsockopt+0x560/0x560 [ 416.347113][T13260] ? aa_sock_msg_perm+0x94/0x150 [ 416.352091][T13260] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 416.357413][T13260] ? security_socket_sendmsg+0x7c/0xa0 [ 416.362916][T13260] ? netlink_getsockopt+0x560/0x560 [ 416.368166][T13260] ____sys_sendmsg+0x5a2/0x8c0 [ 416.372992][T13260] ? memset+0x1e/0x40 [ 416.377142][T13260] ? __sys_sendmsg_sock+0x30/0x30 [ 416.382233][T13260] ? import_iovec+0x6f/0xa0 [ 416.386800][T13260] ___sys_sendmsg+0x1f0/0x260 [ 416.391549][T13260] ? __sys_sendmsg+0x250/0x250 [ 416.396389][T13260] ? vfs_write+0x84d/0xd00 [ 416.400895][T13260] ? __fdget+0x18b/0x210 [ 416.405188][T13260] __se_sys_sendmsg+0x190/0x250 [ 416.410172][T13260] ? __x64_sys_sendmsg+0x80/0x80 [ 416.415160][T13260] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 416.421214][T13260] ? lockdep_hardirqs_on+0x94/0x140 [ 416.426460][T13260] do_syscall_64+0x4c/0xa0 [ 416.430919][T13260] ? clear_bhb_loop+0x30/0x80 [ 416.435631][T13260] ? clear_bhb_loop+0x30/0x80 [ 416.440349][T13260] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 416.446302][T13260] RIP: 0033:0x7f51804d9ec9 [ 416.450760][T13260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 416.470413][T13260] RSP: 002b:00007f517e741038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 416.478875][T13260] RAX: ffffffffffffffda RBX: 00007f5180730fa0 RCX: 00007f51804d9ec9 [ 416.486898][T13260] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000007 [ 416.494904][T13260] RBP: 00007f517e741090 R08: 0000000000000000 R09: 0000000000000000 [ 416.502896][T13260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 416.510886][T13260] R13: 00007f5180731038 R14: 00007f5180730fa0 R15: 00007ffd2aed6fb8 [ 416.518910][T13260] [ 416.526611][T13122] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 416.707793][T13122] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 416.944615][T13270] FAULT_INJECTION: forcing a failure. [ 416.944615][T13270] name failslab, interval 1, probability 0, space 0, times 0 [ 417.001012][T13270] CPU: 1 PID: 13270 Comm: syz.3.3171 Not tainted syzkaller #0 [ 417.008551][T13270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 417.018647][T13270] Call Trace: [ 417.021964][T13270] [ 417.024921][T13270] dump_stack_lvl+0x168/0x230 [ 417.029642][T13270] ? show_regs_print_info+0x20/0x20 [ 417.034895][T13270] ? load_image+0x3b0/0x3b0 [ 417.039499][T13270] should_fail+0x38c/0x4c0 [ 417.044068][T13270] should_failslab+0x5/0x20 [ 417.048615][T13270] slab_pre_alloc_hook+0x51/0xc0 [ 417.053621][T13270] __kmalloc_node_track_caller+0x68/0x3a0 [ 417.059385][T13270] ? tcp_send_fin+0x1ac/0xe80 [ 417.064196][T13270] ? kmem_cache_alloc_node+0x162/0x2d0 [ 417.069692][T13270] ? __alloc_skb+0xf4/0x750 [ 417.074237][T13270] ? tcp_send_fin+0x1ac/0xe80 [ 417.079080][T13270] __alloc_skb+0x22c/0x750 [ 417.083581][T13270] ? lock_chain_count+0x20/0x20 [ 417.088475][T13270] tcp_send_fin+0x1ac/0xe80 [ 417.093019][T13270] ? trace_inet_sock_set_state+0x80/0x1c0 [ 417.098789][T13270] __tcp_close+0x5b8/0xf10 [ 417.103257][T13270] tcp_close+0x24/0x110 [ 417.107554][T13270] inet_release+0x139/0x180 [ 417.112108][T13270] sock_close+0xd5/0x240 [ 417.116401][T13270] ? sock_mmap+0x90/0x90 [ 417.120956][T13270] __fput+0x234/0x930 [ 417.124977][T13270] task_work_run+0x125/0x1a0 [ 417.129685][T13270] exit_to_user_mode_loop+0x10f/0x130 [ 417.135101][T13270] exit_to_user_mode_prepare+0xee/0x180 [ 417.140673][T13270] syscall_exit_to_user_mode+0x16/0x40 [ 417.146155][T13270] do_syscall_64+0x58/0xa0 [ 417.150611][T13270] ? clear_bhb_loop+0x30/0x80 [ 417.155327][T13270] ? clear_bhb_loop+0x30/0x80 [ 417.160022][T13270] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 417.165949][T13270] RIP: 0033:0x7f51804d9ec9 [ 417.170386][T13270] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 417.190005][T13270] RSP: 002b:00007f517e741038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 417.198437][T13270] RAX: 0000000000000000 RBX: 00007f5180730fa0 RCX: 00007f51804d9ec9 [ 417.206416][T13270] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 417.214396][T13270] RBP: 00007f517e741090 R08: 0000000000000000 R09: 0000000000000000 [ 417.222391][T13270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 417.230421][T13270] R13: 00007f5180731038 R14: 00007f5180730fa0 R15: 00007ffd2aed6fb8 [ 417.238422][T13270] [ 417.287669][T13122] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 417.368603][T13122] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 417.400376][T13122] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 417.444572][T13122] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 417.825286][ T4302] Bluetooth: hci5: command 0x040f tx timeout [ 417.933767][T13122] 8021q: adding VLAN 0 to HW filter on device bond0 [ 418.043458][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 418.063220][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 418.077626][T13122] 8021q: adding VLAN 0 to HW filter on device team0 [ 418.148631][ T1184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 418.176281][ T1184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 418.229243][ T1184] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.236427][ T1184] bridge0: port 1(bridge_slave_0) entered forwarding state [ 418.259164][ T1184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 418.344468][T13306] netlink: 'syz.2.3183': attribute type 2 has an invalid length. [ 418.384126][T13306] netlink: 'syz.2.3183': attribute type 8 has an invalid length. [ 418.465494][T13306] netlink: 132 bytes leftover after parsing attributes in process `syz.2.3183'. [ 418.850386][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 418.870113][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 418.906466][ T4274] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.913599][ T4274] bridge0: port 2(bridge_slave_1) entered forwarding state [ 418.957056][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 418.976324][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 419.009128][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 419.061696][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 419.078539][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 419.095823][T13304] netlink: 'syz.3.3182': attribute type 10 has an invalid length. [ 419.123137][T13318] netlink: 126588 bytes leftover after parsing attributes in process `syz.2.3188'. [ 419.150952][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 419.171653][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 419.281625][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 419.294671][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 419.317849][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 419.340343][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 419.362543][T13122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 419.905309][ T4232] Bluetooth: hci5: command 0x0419 tx timeout [ 421.643722][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 421.655845][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 421.703272][T13122] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 421.746012][ T4248] Bluetooth: hci3: command 0x0406 tx timeout [ 421.755744][ T4302] Bluetooth: hci1: command 0x0406 tx timeout [ 421.810033][T13336] netlink: 'syz.3.3192': attribute type 10 has an invalid length. [ 421.945806][T13336] bond0: (slave bond_slave_0): Releasing backup interface [ 421.955983][T13336] device bond_slave_0 left promiscuous mode [ 422.187607][ T1386] device hsr_slave_0 left promiscuous mode [ 422.198935][ T1386] device hsr_slave_1 left promiscuous mode [ 422.228742][ T1386] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 422.281209][ T1386] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 422.295652][ T1386] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 422.310846][ T1386] device bridge_slave_1 left promiscuous mode [ 422.325252][ T1386] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.333719][ T1386] device bridge_slave_0 left promiscuous mode [ 422.340510][ T1386] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.354307][ T1386] device veth1_macvtap left promiscuous mode [ 422.360722][ T1386] device veth0_macvtap left promiscuous mode [ 422.378881][ T1386] device veth1_vlan left promiscuous mode [ 422.882247][ T1386] team0 (unregistering): Port device geneve1 removed [ 423.353937][ T1386] team0 (unregistering): Port device team_slave_1 removed [ 423.420572][ T1386] team0 (unregistering): Port device team_slave_0 removed [ 423.476134][ T1386] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 423.528009][ T1386] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 423.707047][ T1386] bond0 (unregistering): (slave batadv0): Releasing backup interface [ 423.840086][ T1386] bond0 (unregistering): (slave bridge0): Releasing backup interface [ 423.853906][ T1386] bond0 (unregistering): Released all slaves [ 424.321516][ T1184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 424.343100][ T1184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 424.464716][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 424.480709][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 424.502409][T13122] device veth0_vlan entered promiscuous mode [ 424.525474][T13383] netlink: 156 bytes leftover after parsing attributes in process `syz.2.3205'. [ 424.547366][T13384] IPv6: Can't replace route, no match found [ 424.606946][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 424.618743][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 424.654133][T13122] device veth1_vlan entered promiscuous mode [ 424.726399][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 424.742686][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 424.753910][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 424.763768][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 424.778871][T13122] device veth0_macvtap entered promiscuous mode [ 424.814290][T13122] device veth1_macvtap entered promiscuous mode [ 424.852282][T13122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 424.869429][T13122] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 424.885856][T13122] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 424.895861][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 424.917404][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 424.931379][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 424.947327][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 424.960313][T13122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 424.975929][T13122] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 424.995089][T13122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 425.006158][T13122] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.016621][T13122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 425.027799][T13122] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.038339][T13122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 425.049805][T13122] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.063305][T13122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 425.080774][T13122] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 425.101157][T13122] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 425.119688][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 425.141274][ T7626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 425.171441][T13122] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.181493][T13122] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.190975][T13122] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.201099][T13122] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.413503][ T4352] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 425.485671][ T4352] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 425.507150][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 425.521258][ T7626] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 425.545155][ T7626] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 425.640142][T13410] device syzkaller0 entered promiscuous mode [ 425.779147][T13408] netlink: 'syz.2.3213': attribute type 10 has an invalid length. [ 425.796609][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 427.025216][T13430] IPv6: Can't replace route, no match found [ 427.031258][T13430] FAULT_INJECTION: forcing a failure. [ 427.031258][T13430] name failslab, interval 1, probability 0, space 0, times 0 [ 427.092763][T13430] CPU: 1 PID: 13430 Comm: syz.4.3222 Not tainted syzkaller #0 [ 427.100291][T13430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 427.110482][T13430] Call Trace: [ 427.113797][T13430] [ 427.116792][T13430] dump_stack_lvl+0x168/0x230 [ 427.121521][T13430] ? verify_lock_unused+0x140/0x140 [ 427.126774][T13430] ? show_regs_print_info+0x20/0x20 [ 427.132019][T13430] ? load_image+0x3b0/0x3b0 [ 427.136560][T13430] ? do_syscall_64+0x4c/0xa0 [ 427.141197][T13430] should_fail+0x38c/0x4c0 [ 427.145834][T13430] should_failslab+0x5/0x20 [ 427.150378][T13430] slab_pre_alloc_hook+0x51/0xc0 [ 427.155417][T13430] ? skb_clone+0x1bd/0x350 [ 427.159871][T13430] kmem_cache_alloc+0x3d/0x290 [ 427.164674][T13430] skb_clone+0x1bd/0x350 [ 427.169043][T13430] __netlink_deliver_tap+0x3cd/0x7c0 [ 427.174387][T13430] netlink_deliver_tap+0x16c/0x180 [ 427.179629][T13430] netlink_sendskb+0x64/0x130 [ 427.184355][T13430] netlink_ack+0x888/0xb60 [ 427.189038][T13430] ? netlink_dump+0xcd0/0xcd0 [ 427.193839][T13430] ? __skb_clone+0x480/0x790 [ 427.198474][T13430] netlink_rcv_skb+0x265/0x430 [ 427.203314][T13430] ? rtnetlink_bind+0x80/0x80 [ 427.208029][T13430] ? netlink_ack+0xb60/0xb60 [ 427.212682][T13430] netlink_unicast+0x774/0x920 [ 427.217508][T13430] netlink_sendmsg+0x8ab/0xbc0 [ 427.222319][T13430] ? netlink_getsockopt+0x560/0x560 [ 427.227563][T13430] ? aa_sock_msg_perm+0x94/0x150 [ 427.232541][T13430] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 427.237862][T13430] ? security_socket_sendmsg+0x7c/0xa0 [ 427.243355][T13430] ? netlink_getsockopt+0x560/0x560 [ 427.248599][T13430] ____sys_sendmsg+0x5a2/0x8c0 [ 427.253468][T13430] ? memset+0x1e/0x40 [ 427.257491][T13430] ? __sys_sendmsg_sock+0x30/0x30 [ 427.262574][T13430] ? import_iovec+0x6f/0xa0 [ 427.267118][T13430] ___sys_sendmsg+0x1f0/0x260 [ 427.271840][T13430] ? __sys_sendmsg+0x250/0x250 [ 427.276668][T13430] ? vfs_write+0x84d/0xd00 [ 427.281144][T13430] ? __fdget+0x18b/0x210 [ 427.285444][T13430] __se_sys_sendmsg+0x190/0x250 [ 427.290343][T13430] ? __x64_sys_sendmsg+0x80/0x80 [ 427.295307][T13430] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 427.301479][T13430] ? lockdep_hardirqs_on+0x94/0x140 [ 427.306717][T13430] do_syscall_64+0x4c/0xa0 [ 427.311163][T13430] ? clear_bhb_loop+0x30/0x80 [ 427.315872][T13430] ? clear_bhb_loop+0x30/0x80 [ 427.320580][T13430] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 427.326504][T13430] RIP: 0033:0x7f0603686ec9 [ 427.330944][T13430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 427.350580][T13430] RSP: 002b:00007f06018ee038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 427.359026][T13430] RAX: ffffffffffffffda RBX: 00007f06038ddfa0 RCX: 00007f0603686ec9 [ 427.367029][T13430] RDX: 0000000020048812 RSI: 00002000000004c0 RDI: 0000000000000003 [ 427.375034][T13430] RBP: 00007f06018ee090 R08: 0000000000000000 R09: 0000000000000000 [ 427.383171][T13430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 427.391176][T13430] R13: 00007f06038de038 R14: 00007f06038ddfa0 R15: 00007ffdba1d23f8 [ 427.399204][T13430] [ 427.808750][T13449] netlink: 'syz.4.3228': attribute type 40 has an invalid length. [ 427.963747][T13457] sctp: [Deprecated]: syz.2.3229 (pid 13457) Use of struct sctp_assoc_value in delayed_ack socket option. [ 427.963747][T13457] Use struct sctp_sack_info instead [ 428.040581][T13449] bridge0: port 2(bridge_slave_1) entered disabled state [ 428.267700][T13432] chnl_net:caif_netlink_parms(): no params data found [ 428.288507][T13457] netlink: 132 bytes leftover after parsing attributes in process `syz.2.3229'. [ 428.529714][T13432] bridge0: port 1(bridge_slave_0) entered blocking state [ 428.537181][T13432] bridge0: port 1(bridge_slave_0) entered disabled state [ 428.546076][T13432] device bridge_slave_0 entered promiscuous mode [ 428.559165][T13432] bridge0: port 2(bridge_slave_1) entered blocking state [ 428.566777][T13432] bridge0: port 2(bridge_slave_1) entered disabled state [ 428.575403][T13432] device bridge_slave_1 entered promiscuous mode [ 428.611446][T13432] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 428.630667][T13432] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 428.759163][T13432] team0: Port device team_slave_0 added [ 428.782353][T13432] team0: Port device team_slave_1 added [ 428.929255][T13432] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 428.969542][T13432] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 429.132332][T13432] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 429.179936][T13432] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 429.209855][T13432] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 429.273731][T13432] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 429.427150][T13432] device hsr_slave_0 entered promiscuous mode [ 429.436074][T13432] device hsr_slave_1 entered promiscuous mode [ 429.442829][T13432] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 429.451060][T13432] Cannot create hsr debugfs directory [ 429.585547][ T4248] Bluetooth: hci4: command 0x0409 tx timeout [ 429.628461][T13503] FAULT_INJECTION: forcing a failure. [ 429.628461][T13503] name failslab, interval 1, probability 0, space 0, times 0 [ 429.651413][T13500] netlink: 'syz.1.3243': attribute type 9 has an invalid length. [ 429.658586][T13503] CPU: 0 PID: 13503 Comm: syz.2.3244 Not tainted syzkaller #0 [ 429.662846][T13500] netlink: 209836 bytes leftover after parsing attributes in process `syz.1.3243'. [ 429.667043][T13503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 429.667063][T13503] Call Trace: [ 429.667072][T13503] [ 429.667081][T13503] dump_stack_lvl+0x168/0x230 [ 429.667114][T13503] ? show_regs_print_info+0x20/0x20 [ 429.667139][T13503] ? load_image+0x3b0/0x3b0 [ 429.667165][T13503] ? __might_sleep+0xf0/0xf0 [ 429.667187][T13503] ? __lock_acquire+0x7c60/0x7c60 [ 429.667218][T13503] ? mark_lock+0x94/0x320 [ 429.667254][T13503] should_fail+0x38c/0x4c0 [ 429.667284][T13503] should_failslab+0x5/0x20 [ 429.667303][T13503] slab_pre_alloc_hook+0x51/0xc0 [ 429.667326][T13503] __kmalloc+0x6b/0x330 [ 429.667343][T13503] ? tomoyo_realpath_from_path+0x118/0x610 [ 429.667376][T13503] tomoyo_realpath_from_path+0x118/0x610 [ 429.667416][T13503] tomoyo_path_number_perm+0x1d5/0x5d0 [ 429.667441][T13503] ? verify_lock_unused+0x140/0x140 [ 429.667469][T13503] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 429.667493][T13503] ? ksys_write+0x1c7/0x250 [ 429.667564][T13503] security_file_ioctl+0x6c/0xa0 [ 429.730815][T13503] __se_sys_ioctl+0x48/0x170 [ 429.730852][T13503] do_syscall_64+0x4c/0xa0 [ 429.730873][T13503] ? clear_bhb_loop+0x30/0x80 [ 429.730893][T13503] ? clear_bhb_loop+0x30/0x80 [ 429.730915][T13503] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 429.802597][T13503] RIP: 0033:0x7f8c1146aec9 [ 429.807056][T13503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 429.814228][T13499] device wlan0 entered promiscuous mode [ 429.826742][T13503] RSP: 002b:00007f8c0f6d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 429.826776][T13503] RAX: ffffffffffffffda RBX: 00007f8c116c1fa0 RCX: 00007f8c1146aec9 [ 429.826791][T13503] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 0000000000000009 [ 429.826804][T13503] RBP: 00007f8c0f6d2090 R08: 0000000000000000 R09: 0000000000000000 [ 429.826817][T13503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 429.826828][T13503] R13: 00007f8c116c2038 R14: 00007f8c116c1fa0 R15: 00007fff88413428 [ 429.826860][T13503] [ 429.887628][T13503] ERROR: Out of memory at tomoyo_realpath_from_path. [ 430.074425][T13432] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 430.336054][T13517] FAULT_INJECTION: forcing a failure. [ 430.336054][T13517] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 430.352899][T13432] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 430.418336][T13517] CPU: 0 PID: 13517 Comm: syz.2.3250 Not tainted syzkaller #0 [ 430.425860][T13517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 430.435941][T13517] Call Trace: [ 430.439243][T13517] [ 430.442198][T13517] dump_stack_lvl+0x168/0x230 [ 430.446909][T13517] ? show_regs_print_info+0x20/0x20 [ 430.452136][T13517] ? load_image+0x3b0/0x3b0 [ 430.456689][T13517] ? __lock_acquire+0x7c60/0x7c60 [ 430.461754][T13517] should_fail+0x38c/0x4c0 [ 430.466205][T13517] _copy_from_user+0x2e/0x170 [ 430.470910][T13517] __copy_msghdr_from_user+0x448/0x5e0 [ 430.476410][T13517] ? verify_lock_unused+0x140/0x140 [ 430.481644][T13517] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 430.486635][T13512] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.3248'. [ 430.486962][T13517] ? trace_event_raw_event_lock+0x250/0x250 [ 430.486996][T13517] ___sys_sendmsg+0x156/0x260 [ 430.487029][T13517] ? __sys_sendmsg+0x250/0x250 [ 430.487064][T13517] ? trace_event_raw_event_lock+0x250/0x250 [ 430.487108][T13517] ? __fdget+0x18b/0x210 [ 430.487131][T13517] __se_sys_sendmsg+0x190/0x250 [ 430.487164][T13517] ? __x64_sys_sendmsg+0x80/0x80 [ 430.487187][T13517] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 430.487224][T13517] ? lockdep_hardirqs_on+0x94/0x140 [ 430.487256][T13517] do_syscall_64+0x4c/0xa0 [ 430.487274][T13517] ? clear_bhb_loop+0x30/0x80 [ 430.487296][T13517] ? clear_bhb_loop+0x30/0x80 [ 430.487318][T13517] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 430.487341][T13517] RIP: 0033:0x7f8c1146aec9 [ 430.487361][T13517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 430.487380][T13517] RSP: 002b:00007f8c0f6d2038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 430.487405][T13517] RAX: ffffffffffffffda RBX: 00007f8c116c1fa0 RCX: 00007f8c1146aec9 [ 430.487421][T13517] RDX: 0000000020000041 RSI: 0000200000000000 RDI: 0000000000000003 [ 430.487436][T13517] RBP: 00007f8c0f6d2090 R08: 0000000000000000 R09: 0000000000000000 [ 430.487450][T13517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 430.487464][T13517] R13: 00007f8c116c2038 R14: 00007f8c116c1fa0 R15: 00007fff88413428 [ 430.487496][T13517] [ 431.081421][T13432] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 431.119481][T13529] netlink: 144316 bytes leftover after parsing attributes in process `syz.3.3254'. [ 431.167980][T13528] netlink: 1010 bytes leftover after parsing attributes in process `syz.1.3256'. [ 431.242629][T13432] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 431.512173][T13546] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3260'. [ 431.513528][T13544] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3261'. [ 431.550835][T13546] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3260'. [ 431.588466][T13542] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3260'. [ 431.637699][T13544] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3261'. [ 431.665636][T13265] Bluetooth: hci4: command 0x041b tx timeout [ 431.687265][T13542] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3260'. [ 431.712016][T13432] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 431.731198][T13552] FAULT_INJECTION: forcing a failure. [ 431.731198][T13552] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 431.805089][T13552] CPU: 1 PID: 13552 Comm: syz.3.3261 Not tainted syzkaller #0 [ 431.812616][T13552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 431.822879][T13552] Call Trace: [ 431.826181][T13552] [ 431.829120][T13552] dump_stack_lvl+0x168/0x230 [ 431.833815][T13552] ? show_regs_print_info+0x20/0x20 [ 431.839116][T13552] ? load_image+0x3b0/0x3b0 [ 431.843852][T13552] ? __kasan_slab_alloc+0xb3/0xd0 [ 431.848898][T13552] ? slab_post_alloc_hook+0x4c/0x380 [ 431.854285][T13552] ? kmem_cache_alloc_node+0x12d/0x2d0 [ 431.859932][T13552] ? __alloc_skb+0xf4/0x750 [ 431.864452][T13552] ? netlink_recvmsg+0x653/0xdb0 [ 431.869405][T13552] ? ____sys_recvmsg+0x291/0x580 [ 431.874548][T13552] ? ___sys_recvmsg+0x1af/0x4f0 [ 431.879464][T13552] ? __x64_sys_recvmsg+0x1dd/0x2a0 [ 431.884599][T13552] should_fail+0x38c/0x4c0 [ 431.889053][T13552] prepare_alloc_pages+0x1e4/0x5f0 [ 431.894313][T13552] __alloc_pages+0x10e/0x470 [ 431.898930][T13552] ? zone_statistics+0x170/0x170 [ 431.903910][T13552] kmalloc_large_node+0x7d/0x190 [ 431.908866][T13552] __kmalloc_node_track_caller+0x22e/0x3a0 [ 431.914703][T13552] ? netlink_dump+0x18a/0xcd0 [ 431.919415][T13552] ? kmem_cache_alloc_node+0x162/0x2d0 [ 431.924885][T13552] ? __alloc_skb+0xf4/0x750 [ 431.929402][T13552] ? netlink_dump+0x18a/0xcd0 [ 431.934092][T13552] __alloc_skb+0x22c/0x750 [ 431.938519][T13552] netlink_dump+0x18a/0xcd0 [ 431.943126][T13552] ? lockdep_hardirqs_on+0x94/0x140 [ 431.948343][T13552] ? slab_free_freelist_hook+0xea/0x170 [ 431.953898][T13552] ? netlink_lookup+0x1d0/0x1d0 [ 431.958775][T13552] netlink_recvmsg+0x653/0xdb0 [ 431.963582][T13552] ? netlink_sendmsg+0xbc0/0xbc0 [ 431.968546][T13552] ? aa_sk_perm+0x7b4/0x8f0 [ 431.973064][T13552] ? __lock_acquire+0x12d9/0x7c60 [ 431.978192][T13552] ? aa_af_perm+0x2b0/0x2b0 [ 431.982712][T13552] ? bpf_lsm_socket_recvmsg+0x5/0x10 [ 431.988004][T13552] ? security_socket_recvmsg+0x85/0xb0 [ 431.993478][T13552] ? netlink_sendmsg+0xbc0/0xbc0 [ 431.998437][T13552] ____sys_recvmsg+0x291/0x580 [ 432.003224][T13552] ? __sys_recvmsg_sock+0x40/0x40 [ 432.008283][T13552] ? import_iovec+0x6f/0xa0 [ 432.012803][T13552] ___sys_recvmsg+0x1af/0x4f0 [ 432.017609][T13552] ? __sys_recvmsg+0x250/0x250 [ 432.022394][T13552] ? __lock_acquire+0x7c60/0x7c60 [ 432.027450][T13552] ? __fdget+0x18b/0x210 [ 432.031836][T13552] __x64_sys_recvmsg+0x1dd/0x2a0 [ 432.036821][T13552] ? ___sys_recvmsg+0x4f0/0x4f0 [ 432.041780][T13552] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 432.047784][T13552] ? lockdep_hardirqs_on+0x94/0x140 [ 432.052994][T13552] do_syscall_64+0x4c/0xa0 [ 432.057419][T13552] ? clear_bhb_loop+0x30/0x80 [ 432.062104][T13552] ? clear_bhb_loop+0x30/0x80 [ 432.066882][T13552] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 432.072790][T13552] RIP: 0033:0x7f51804d9ec9 [ 432.077226][T13552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 432.096938][T13552] RSP: 002b:00007f517e6ff038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 432.105369][T13552] RAX: ffffffffffffffda RBX: 00007f5180731180 RCX: 00007f51804d9ec9 [ 432.113353][T13552] RDX: 0000000000000000 RSI: 0000200000000900 RDI: 0000000000000003 [ 432.121416][T13552] RBP: 00007f517e6ff090 R08: 0000000000000000 R09: 0000000000000000 [ 432.129392][T13552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 432.137373][T13552] R13: 00007f5180731218 R14: 00007f5180731180 R15: 00007ffd2aed6fb8 [ 432.145819][T13552] [ 432.160439][T13432] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 432.223030][T13432] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 432.266977][T13432] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 432.564906][T13573] device syzkaller0 entered promiscuous mode [ 432.786888][T13432] 8021q: adding VLAN 0 to HW filter on device bond0 [ 432.889313][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 432.912009][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 432.948731][T13432] 8021q: adding VLAN 0 to HW filter on device team0 [ 433.004801][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 433.053713][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 433.146015][ T4352] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.153299][ T4352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 433.207802][T13594] FAULT_INJECTION: forcing a failure. [ 433.207802][T13594] name failslab, interval 1, probability 0, space 0, times 0 [ 433.256154][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 433.298286][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 433.314792][T13594] CPU: 1 PID: 13594 Comm: syz.1.3278 Not tainted syzkaller #0 [ 433.322329][T13594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 433.332424][T13594] Call Trace: [ 433.335728][T13594] [ 433.338800][T13594] dump_stack_lvl+0x168/0x230 [ 433.343518][T13594] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 433.349707][T13594] ? show_regs_print_info+0x20/0x20 [ 433.354936][T13594] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 433.361133][T13594] should_fail+0x38c/0x4c0 [ 433.365689][T13594] should_failslab+0x5/0x20 [ 433.370231][T13594] slab_pre_alloc_hook+0x51/0xc0 [ 433.375374][T13594] kmem_cache_alloc_node_trace+0x4a/0x300 [ 433.381116][T13594] ? __get_vm_area_node+0x119/0x2d0 [ 433.386350][T13594] __get_vm_area_node+0x119/0x2d0 [ 433.391409][T13594] __vmalloc_node_range+0xef/0x8b0 [ 433.396554][T13594] ? netlink_sendmsg+0x5dd/0xbc0 [ 433.401520][T13594] ? netlink_data_ready+0x10/0x10 [ 433.406592][T13594] ? netlink_sendmsg+0x5dd/0xbc0 [ 433.411670][T13594] vmalloc+0x75/0x80 [ 433.415594][T13594] ? netlink_sendmsg+0x5dd/0xbc0 [ 433.420562][T13594] netlink_sendmsg+0x5dd/0xbc0 [ 433.425372][T13594] ? netlink_getsockopt+0x560/0x560 [ 433.430612][T13594] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 433.435928][T13594] ? security_socket_sendmsg+0x7c/0xa0 [ 433.441422][T13594] sock_write_iter+0x29c/0x380 [ 433.446220][T13594] ? sock_read_iter+0x340/0x340 [ 433.451112][T13594] ? memset+0x1e/0x40 [ 433.455135][T13594] ? iov_iter_init+0xb4/0x170 [ 433.459853][T13594] vfs_write+0x712/0xd00 [ 433.464239][T13594] ? file_end_write+0x250/0x250 [ 433.469235][T13594] ? rcu_nmi_exit+0x6f/0xf0 [ 433.473982][T13594] ? __fget_files+0x40f/0x480 [ 433.478703][T13594] ? __fdget_pos+0x1e2/0x370 [ 433.483323][T13594] ? ksys_write+0x71/0x250 [ 433.487775][T13594] ksys_write+0x14d/0x250 [ 433.492138][T13594] ? __ia32_sys_read+0x80/0x80 [ 433.496928][T13594] ? syscall_enter_from_user_mode+0x2a/0x70 [ 433.502927][T13594] do_syscall_64+0x4c/0xa0 [ 433.507370][T13594] ? clear_bhb_loop+0x30/0x80 [ 433.512075][T13594] ? clear_bhb_loop+0x30/0x80 [ 433.516785][T13594] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 433.522714][T13594] RIP: 0033:0x7fa2ae75dec9 [ 433.527158][T13594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 433.546791][T13594] RSP: 002b:00007fa2ac9c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 433.555240][T13594] RAX: ffffffffffffffda RBX: 00007fa2ae9b4fa0 RCX: 00007fa2ae75dec9 [ 433.563334][T13594] RDX: 000000000000fe33 RSI: 0000200000000000 RDI: 0000000000000005 [ 433.571329][T13594] RBP: 00007fa2ac9c5090 R08: 0000000000000000 R09: 0000000000000000 [ 433.579330][T13594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 433.587328][T13594] R13: 00007fa2ae9b5038 R14: 00007fa2ae9b4fa0 R15: 00007ffe6cd65ef8 [ 433.595350][T13594] [ 433.631095][T13594] syz.1.3278: vmalloc error: size 65408, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz1,mems_allowed=0-1 [ 433.631776][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 433.636878][ T4352] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.661526][ T4352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 433.670226][T13594] CPU: 0 PID: 13594 Comm: syz.1.3278 Not tainted syzkaller #0 [ 433.677751][T13594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 433.687923][T13594] Call Trace: [ 433.691235][T13594] [ 433.694194][T13594] dump_stack_lvl+0x168/0x230 [ 433.698908][T13594] ? rcu_lock_release+0x5/0x20 [ 433.703704][T13594] ? show_regs_print_info+0x20/0x20 [ 433.708941][T13594] ? load_image+0x3b0/0x3b0 [ 433.713475][T13594] ? __rcu_read_unlock+0x78/0xd0 [ 433.718446][T13594] warn_alloc+0x20e/0x2f0 [ 433.722820][T13594] ? zone_watermark_ok_safe+0x240/0x240 [ 433.728401][T13594] ? kmem_cache_alloc_node_trace+0x16c/0x300 [ 433.734412][T13594] ? __get_vm_area_node+0x119/0x2d0 [ 433.739672][T13594] __vmalloc_node_range+0x2b1/0x8b0 [ 433.744905][T13594] ? netlink_data_ready+0x10/0x10 [ 433.749972][T13594] ? netlink_sendmsg+0x5dd/0xbc0 [ 433.754956][T13594] vmalloc+0x75/0x80 [ 433.758891][T13594] ? netlink_sendmsg+0x5dd/0xbc0 [ 433.763866][T13594] netlink_sendmsg+0x5dd/0xbc0 [ 433.768669][T13594] ? netlink_getsockopt+0x560/0x560 [ 433.773933][T13594] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 433.775612][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 433.779242][T13594] ? security_socket_sendmsg+0x7c/0xa0 [ 433.792628][T13594] sock_write_iter+0x29c/0x380 [ 433.797421][T13594] ? sock_read_iter+0x340/0x340 [ 433.802305][T13594] ? memset+0x1e/0x40 [ 433.806314][T13594] ? iov_iter_init+0xb4/0x170 [ 433.811028][T13594] vfs_write+0x712/0xd00 [ 433.815314][T13594] ? file_end_write+0x250/0x250 [ 433.820212][T13594] ? rcu_nmi_exit+0x6f/0xf0 [ 433.824761][T13594] ? __fget_files+0x40f/0x480 [ 433.829501][T13594] ? __fdget_pos+0x1e2/0x370 [ 433.834130][T13594] ? ksys_write+0x71/0x250 [ 433.838691][T13594] ksys_write+0x14d/0x250 [ 433.843062][T13594] ? __ia32_sys_read+0x80/0x80 [ 433.845162][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 433.847871][T13594] ? syscall_enter_from_user_mode+0x2a/0x70 [ 433.861709][T13594] do_syscall_64+0x4c/0xa0 [ 433.866173][T13594] ? clear_bhb_loop+0x30/0x80 [ 433.870876][T13594] ? clear_bhb_loop+0x30/0x80 [ 433.875580][T13594] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 433.876835][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 433.881584][T13594] RIP: 0033:0x7fa2ae75dec9 [ 433.893922][T13594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 433.913559][T13594] RSP: 002b:00007fa2ac9c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 433.922048][T13594] RAX: ffffffffffffffda RBX: 00007fa2ae9b4fa0 RCX: 00007fa2ae75dec9 [ 433.925776][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 433.930045][T13594] RDX: 000000000000fe33 RSI: 0000200000000000 RDI: 0000000000000005 [ 433.945849][T13594] RBP: 00007fa2ac9c5090 R08: 0000000000000000 R09: 0000000000000000 [ 433.953888][T13594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 433.956399][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 433.961883][T13594] R13: 00007fa2ae9b5038 R14: 00007fa2ae9b4fa0 R15: 00007ffe6cd65ef8 [ 433.977798][T13594] [ 434.006433][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 434.007958][ T7] Bluetooth: hci4: command 0x040f tx timeout [ 434.041282][T13594] Mem-Info: [ 434.044775][T13594] active_anon:271 inactive_anon:8619 isolated_anon:0 [ 434.044775][T13594] active_file:23905 inactive_file:37507 isolated_file:0 [ 434.044775][T13594] unevictable:768 dirty:15 writeback:0 [ 434.044775][T13594] slab_reclaimable:20719 slab_unreclaimable:100417 [ 434.044775][T13594] mapped:30237 shmem:1629 pagetables:605 bounce:0 [ 434.044775][T13594] kernel_misc_reclaimable:0 [ 434.044775][T13594] free:1358729 free_pcp:13687 free_cma:0 [ 434.065849][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 434.136125][T13594] Node 0 active_anon:1052kB inactive_anon:33968kB active_file:95420kB inactive_file:150028kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:120948kB dirty:60kB writeback:0kB shmem:4440kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:11700kB pagetables:2420kB all_unreclaimable? no [ 434.156409][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 434.171497][T13594] Node 1 active_anon:32kB inactive_anon:508kB active_file:200kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:2076kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB all_unreclaimable? no [ 434.214676][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 434.231593][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 434.273279][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 434.280462][T13610] FAULT_INJECTION: forcing a failure. [ 434.280462][T13610] name failslab, interval 1, probability 0, space 0, times 0 [ 434.301859][T13432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 434.303798][T13594] Node 0 DMA free:15360kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 434.355523][T13610] CPU: 0 PID: 13610 Comm: syz.4.3283 Not tainted syzkaller #0 [ 434.363053][T13610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 434.373186][T13610] Call Trace: [ 434.376496][T13610] [ 434.379451][T13610] dump_stack_lvl+0x168/0x230 [ 434.384160][T13610] ? show_regs_print_info+0x20/0x20 [ 434.389391][T13610] ? load_image+0x3b0/0x3b0 [ 434.393945][T13610] ? __might_sleep+0xf0/0xf0 [ 434.398584][T13610] ? __lock_acquire+0x7c60/0x7c60 [ 434.403742][T13610] should_fail+0x38c/0x4c0 [ 434.408208][T13610] should_failslab+0x5/0x20 [ 434.412874][T13610] slab_pre_alloc_hook+0x51/0xc0 [ 434.417847][T13610] __kmalloc_node+0x6e/0x3b0 [ 434.422508][T13610] ? kvmalloc_node+0x84/0x130 [ 434.427221][T13610] kvmalloc_node+0x84/0x130 [ 434.431764][T13610] btf_parse_type_sec+0x1aa/0x1ad0 [ 434.437059][T13610] ? btf_check_sec_info+0x27a/0x330 [ 434.442303][T13610] ? btf_verifier_log+0x2a0/0x2a0 [ 434.447360][T13610] ? btf_parse_hdr+0x5f1/0x7e0 [ 434.452165][T13610] ? btf_parse_str_sec+0x20a/0x2a0 [ 434.457403][T13610] btf_new_fd+0x4a7/0x910 [ 434.461861][T13610] __sys_bpf+0x51c/0x670 [ 434.466136][T13610] ? bpf_link_show_fdinfo+0x340/0x340 [ 434.471544][T13610] ? rcu_nmi_exit+0x6f/0xf0 [ 434.476095][T13610] ? vtime_user_exit+0x2dc/0x400 [ 434.481072][T13610] __x64_sys_bpf+0x78/0x90 [ 434.485720][T13610] do_syscall_64+0x4c/0xa0 [ 434.490202][T13610] ? clear_bhb_loop+0x30/0x80 [ 434.495108][T13610] ? clear_bhb_loop+0x30/0x80 [ 434.499914][T13610] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 434.505827][T13610] RIP: 0033:0x7f0603686ec9 [ 434.510266][T13610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 434.530686][T13610] RSP: 002b:00007f06018ee038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 434.539749][T13610] RAX: ffffffffffffffda RBX: 00007f06038ddfa0 RCX: 00007f0603686ec9 [ 434.547758][T13610] RDX: 0000000000000020 RSI: 0000200000000140 RDI: 0000000000000012 [ 434.555759][T13610] RBP: 00007f06018ee090 R08: 0000000000000000 R09: 0000000000000000 [ 434.564287][T13610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 434.572289][T13610] R13: 00007f06038de038 R14: 00007f06038ddfa0 R15: 00007ffdba1d23f8 [ 434.580312][T13610] [ 434.675323][T13594] lowmem_reserve[]: 0 2541 2542 2542 2542 [ 434.697599][T13594] Node 0 DMA32 free:1504732kB min:34800kB low:43500kB high:52200kB reserved_highatomic:0KB active_anon:1052kB inactive_anon:33868kB active_file:95420kB inactive_file:150028kB unevictable:1536kB writepending:60kB present:3129332kB managed:2608992kB mlocked:0kB bounce:0kB free_pcp:42308kB local_pcp:21160kB free_cma:0kB [ 434.807342][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 434.843648][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 434.855128][T13594] lowmem_reserve[]: 0 0 0 0 0 [ 434.860217][T13594] Node 0 Normal free:4kB min:12kB low:12kB high:12kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:916kB mlocked:0kB bounce:0kB free_pcp:24kB local_pcp:12kB free_cma:0kB [ 434.922405][T13432] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 434.966573][T13594] lowmem_reserve[]: 0 0 0 0 0 [ 434.971454][T13594] Node 1 Normal free:3912780kB min:55088kB low:68860kB high:82632kB reserved_highatomic:0KB active_anon:32kB inactive_anon:508kB active_file:200kB inactive_file:0kB unevictable:1536kB writepending:0kB present:4194304kB managed:4119672kB mlocked:0kB bounce:0kB free_pcp:12700kB local_pcp:5524kB free_cma:0kB [ 435.015280][ T7628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 435.034579][ T7628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 435.108126][T13432] device veth0_vlan entered promiscuous mode [ 435.127379][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 435.136914][T13594] lowmem_reserve[]: 0 0 0 0 0 [ 435.141697][T13594] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 435.157520][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 435.199001][T13432] device veth1_vlan entered promiscuous mode [ 435.217548][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 435.239618][T13594] Node 0 DMA32: 2282*4kB (UME) 1393*8kB (UME) 867*16kB (UME) 412*32kB (UME) 589*64kB (UME) 338*128kB (UME) 137*256kB (UM) 88*512kB (UM) 39*1024kB (UME) 12*2048kB (UM) 301*4096kB (UM) = 1505824kB [ 435.260890][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 435.284719][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 435.307204][T13628] netlink: 'syz.2.3288': attribute type 39 has an invalid length. [ 435.324303][T13594] Node 0 Normal: 1*4kB (U) 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4kB [ 435.354990][T13635] FAULT_INJECTION: forcing a failure. [ 435.354990][T13635] name failslab, interval 1, probability 0, space 0, times 0 [ 435.394347][T13594] Node 1 Normal: 71*4kB (U) 20*8kB (UM) 19*16kB (UME) 37*32kB (UE) 31*64kB (UME) 16*128kB (UM) 9*256kB (UM) 2*512kB (U) 0*1024kB 2*2048kB (UM) 952*4096kB (ME) = 3912780kB [ 435.423660][T13635] CPU: 1 PID: 13635 Comm: syz.4.3290 Not tainted syzkaller #0 [ 435.431201][T13635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 435.441300][T13635] Call Trace: [ 435.444615][T13635] [ 435.447583][T13635] dump_stack_lvl+0x168/0x230 [ 435.452315][T13635] ? show_regs_print_info+0x20/0x20 [ 435.457559][T13635] ? load_image+0x3b0/0x3b0 [ 435.462207][T13635] ? __might_sleep+0xf0/0xf0 [ 435.466843][T13635] ? __lock_acquire+0x7c60/0x7c60 [ 435.471923][T13635] should_fail+0x38c/0x4c0 [ 435.476406][T13635] should_failslab+0x5/0x20 [ 435.480949][T13635] slab_pre_alloc_hook+0x51/0xc0 [ 435.485935][T13635] ? security_file_alloc+0x30/0x110 [ 435.491186][T13635] kmem_cache_alloc+0x3d/0x290 [ 435.496007][T13635] ? rcu_is_watching+0x11/0xa0 [ 435.500827][T13635] security_file_alloc+0x30/0x110 [ 435.505913][T13635] __alloc_file+0xc2/0x240 [ 435.510394][T13635] alloc_empty_file+0x90/0x180 [ 435.515213][T13635] alloc_file+0x5b/0x4f0 [ 435.519510][T13635] ? do_raw_spin_unlock+0x11d/0x230 [ 435.524771][T13635] alloc_file_pseudo+0x17a/0x1f0 [ 435.529760][T13635] ? alloc_empty_file_noaccount+0x80/0x80 [ 435.535537][T13635] ? __lock_acquire+0x7c60/0x7c60 [ 435.540625][T13635] ? __local_bh_enable_ip+0x12a/0x1b0 [ 435.546138][T13635] ? _local_bh_enable+0xa0/0xa0 [ 435.551060][T13635] anon_inode_getfile+0xc1/0x1a0 [ 435.556057][T13635] bpf_link_prime+0x125/0x270 [ 435.560786][T13635] bpf_raw_tracepoint_open+0x4bc/0x780 [ 435.566308][T13635] ? bpf_obj_get_info_by_fd+0x2a80/0x2a80 [ 435.572097][T13635] ? __might_fault+0xb3/0x110 [ 435.576826][T13635] ? bpf_lsm_bpf+0x5/0x10 [ 435.581216][T13635] ? security_bpf+0x7a/0xa0 [ 435.585770][T13635] __sys_bpf+0x48b/0x670 [ 435.590066][T13635] ? bpf_link_show_fdinfo+0x340/0x340 [ 435.595511][T13635] ? vtime_user_exit+0x2dc/0x400 [ 435.600512][T13635] __x64_sys_bpf+0x78/0x90 [ 435.604988][T13635] do_syscall_64+0x4c/0xa0 [ 435.609466][T13635] ? clear_bhb_loop+0x30/0x80 [ 435.614181][T13635] ? clear_bhb_loop+0x30/0x80 [ 435.618908][T13635] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 435.624856][T13635] RIP: 0033:0x7f0603686ec9 [ 435.629316][T13635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 435.645234][T13594] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 435.649056][T13635] RSP: 002b:00007f06018ee038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 435.649086][T13635] RAX: ffffffffffffffda RBX: 00007f06038ddfa0 RCX: 00007f0603686ec9 [ 435.649104][T13635] RDX: 0000000000000010 RSI: 0000200000000480 RDI: 0000000000000011 [ 435.649118][T13635] RBP: 00007f06018ee090 R08: 0000000000000000 R09: 0000000000000000 [ 435.649134][T13635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 435.664375][T13594] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 435.667196][T13635] R13: 00007f06038de038 R14: 00007f06038ddfa0 R15: 00007ffdba1d23f8 [ 435.667253][T13635] [ 435.799510][T13594] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 435.814653][T13594] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 435.833410][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 435.845968][T13594] 63043 total pagecache pages [ 435.850922][T13594] 0 pages in swap cache [ 435.863892][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 435.883613][T13594] Swap cache stats: add 0, delete 0, find 0/0 [ 435.896124][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 435.901142][T13594] Free swap = 124996kB [ 435.913541][T13594] Total swap = 124996kB [ 435.932958][T13432] device veth0_macvtap entered promiscuous mode [ 435.941663][T13594] 2097051 pages RAM [ 435.958821][T13594] 0 pages HighMem/MovableOnly [ 435.973833][T13594] 410816 pages reserved [ 435.978447][T13594] 0 pages cma reserved [ 435.998777][ T4274] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 436.014262][T13432] device veth1_macvtap entered promiscuous mode [ 436.065685][ T4248] Bluetooth: hci4: command 0x0419 tx timeout [ 436.136529][T13432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 436.190902][T13432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 436.225415][T13432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 436.254148][T13432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 436.282814][T13432] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 436.450450][ T7624] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 436.489240][ T7624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 436.558740][T13432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 436.571142][T13432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 436.635175][T13432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 436.675843][T13432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 436.715360][T13432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 436.741781][T13432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 436.858405][T13432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 436.891186][T13432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 436.916475][T13432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 436.943298][T13432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 436.969185][T13432] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 436.998107][T13432] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 437.029443][T13432] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 437.066886][T13667] FAULT_INJECTION: forcing a failure. [ 437.066886][T13667] name failslab, interval 1, probability 0, space 0, times 0 [ 437.086063][T13667] CPU: 0 PID: 13667 Comm: syz.2.3301 Not tainted syzkaller #0 [ 437.093651][T13667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 437.103775][T13667] Call Trace: [ 437.107108][T13667] [ 437.110204][T13667] dump_stack_lvl+0x168/0x230 [ 437.114960][T13667] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 437.121258][T13667] ? show_regs_print_info+0x20/0x20 [ 437.126514][T13667] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 437.132777][T13667] should_fail+0x38c/0x4c0 [ 437.137260][T13667] should_failslab+0x5/0x20 [ 437.141798][T13667] slab_pre_alloc_hook+0x51/0xc0 [ 437.146862][T13667] kmem_cache_alloc_trace+0x47/0x2a0 [ 437.152281][T13667] ? sctp_inet6addr_event+0x37b/0x730 [ 437.157699][T13667] sctp_inet6addr_event+0x37b/0x730 [ 437.162946][T13667] ? masq_inet6_event+0xf0/0x130 [ 437.167929][T13667] atomic_notifier_call_chain+0x15d/0x280 [ 437.173692][T13667] ipv6_add_addr+0xb30/0xde0 [ 437.178350][T13667] ? ipv6_count_addresses+0x170/0x170 [ 437.183770][T13667] ? __sanitizer_cov_trace_const_cmp8+0x80/0x80 [ 437.190060][T13667] inet6_addr_add+0x43a/0x9c0 [ 437.194894][T13667] addrconf_add_ifaddr+0x148/0x1a0 [ 437.200056][T13667] ? addrconf_set_dstaddr+0x2d0/0x2d0 [ 437.205468][T13667] ? __lock_acquire+0x7c60/0x7c60 [ 437.210539][T13667] inet6_ioctl+0x15e/0x240 [ 437.215032][T13667] ? inet6_getname+0x640/0x640 [ 437.219856][T13667] ? tomoyo_path_number_perm+0x4d4/0x5d0 [ 437.225534][T13667] ? perf_trace_run_bpf_submit+0x124/0x1c0 [ 437.231410][T13667] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 437.237034][T13667] sock_do_ioctl+0xd3/0x2f0 [ 437.241583][T13667] ? sock_show_fdinfo+0xb0/0xb0 [ 437.246536][T13667] sock_ioctl+0x4ed/0x6e0 [ 437.250920][T13667] ? sock_poll+0x3f0/0x3f0 [ 437.255410][T13667] ? bpf_lsm_file_ioctl+0x5/0x10 [ 437.260368][T13667] ? security_file_ioctl+0x7c/0xa0 [ 437.265512][T13667] ? sock_poll+0x3f0/0x3f0 [ 437.269961][T13667] __se_sys_ioctl+0xfa/0x170 [ 437.274633][T13667] do_syscall_64+0x4c/0xa0 [ 437.279108][T13667] ? clear_bhb_loop+0x30/0x80 [ 437.283809][T13667] ? clear_bhb_loop+0x30/0x80 [ 437.288611][T13667] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 437.294544][T13667] RIP: 0033:0x7f8c1146aec9 [ 437.299072][T13667] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 437.318898][T13667] RSP: 002b:00007f8c0f6d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 437.327344][T13667] RAX: ffffffffffffffda RBX: 00007f8c116c1fa0 RCX: 00007f8c1146aec9 [ 437.335354][T13667] RDX: 0000200000000000 RSI: 0000000000008916 RDI: 0000000000000008 [ 437.343353][T13667] RBP: 00007f8c0f6d2090 R08: 0000000000000000 R09: 0000000000000000 [ 437.351353][T13667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 437.359350][T13667] R13: 00007f8c116c2038 R14: 00007f8c116c1fa0 R15: 00007fff88413428 [ 437.367395][T13667] [ 437.399225][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 437.440866][ T4352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 437.501436][T13432] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 437.521317][T13432] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 437.543025][T13432] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 437.556372][T13432] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 437.573963][T13677] __nla_validate_parse: 7 callbacks suppressed [ 437.574023][T13677] netlink: 40 bytes leftover after parsing attributes in process `syz.1.3304'. [ 437.836949][T13689] FAULT_INJECTION: forcing a failure. [ 437.836949][T13689] name failslab, interval 1, probability 0, space 0, times 0 [ 437.956796][T13689] CPU: 0 PID: 13689 Comm: syz.4.3308 Not tainted syzkaller #0 [ 437.964356][T13689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 437.974469][T13689] Call Trace: [ 437.977796][T13689] [ 437.980780][T13689] dump_stack_lvl+0x168/0x230 [ 437.985520][T13689] ? show_regs_print_info+0x20/0x20 [ 437.990817][T13689] ? load_image+0x3b0/0x3b0 [ 437.995409][T13689] ? __might_sleep+0xf0/0xf0 [ 438.000056][T13689] ? __lock_acquire+0x7c60/0x7c60 [ 438.005167][T13689] should_fail+0x38c/0x4c0 [ 438.009758][T13689] should_failslab+0x5/0x20 [ 438.014298][T13689] slab_pre_alloc_hook+0x51/0xc0 [ 438.019293][T13689] ? ptlock_alloc+0x1c/0x60 [ 438.023869][T13689] kmem_cache_alloc+0x3d/0x290 [ 438.028816][T13689] ptlock_alloc+0x1c/0x60 [ 438.033207][T13689] pte_alloc_one+0xc5/0x2f0 [ 438.037790][T13689] ? rcu_lock_release+0x20/0x20 [ 438.042819][T13689] handle_mm_fault+0x2518/0x43c0 [ 438.047876][T13689] ? get_page+0xe0/0xe0 [ 438.052087][T13689] ? mark_lock+0x94/0x320 [ 438.056515][T13689] ? vmacache_find+0x4e3/0x590 [ 438.061389][T13689] ? vmacache_update+0xa0/0x100 [ 438.066306][T13689] ? find_vma+0x1df/0x230 [ 438.070726][T13689] do_user_addr_fault+0x489/0xc80 [ 438.075864][T13689] exc_page_fault+0x60/0x100 [ 438.080563][T13689] ? __might_fault+0xb7/0x110 [ 438.085292][T13689] asm_exc_page_fault+0x22/0x30 [ 438.090211][T13689] RIP: 0010:__get_user_4+0x1c/0x30 [ 438.095476][T13689] Code: 01 ca c3 90 90 90 90 90 90 90 90 90 90 90 48 ba fd ef ff ff ff 7f 00 00 48 39 d0 0f 83 90 00 00 00 48 19 d2 48 21 d0 0f 01 cb <8b> 10 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 90 90 48 ba [ 438.115317][T13689] RSP: 0018:ffffc9000340fd98 EFLAGS: 00050206 [ 438.121580][T13689] RAX: 000000110c230000 RBX: ffff888019591a80 RCX: 8bdc954e38a93c00 [ 438.129614][T13689] RDX: ffffffffffffffff RSI: ffffffff8a0b2ac0 RDI: ffffffff8a59a480 [ 438.137754][T13689] RBP: ffffc9000340fed8 R08: dffffc0000000000 R09: fffffbfff1ad323e [ 438.145927][T13689] R10: fffffbfff1ad323e R11: 1ffffffff1ad323d R12: 00000000c004743e [ 438.153962][T13689] R13: ffff888024484930 R14: ffff888024484780 R15: 1ffff11004890926 [ 438.162214][T13689] ppp_ioctl+0x377/0x1960 [ 438.166757][T13689] ? ppp_poll+0x250/0x250 [ 438.171202][T13689] ? bpf_lsm_file_ioctl+0x5/0x10 [ 438.176282][T13689] ? security_file_ioctl+0x7c/0xa0 [ 438.181456][T13689] ? ppp_poll+0x250/0x250 [ 438.185844][T13689] __se_sys_ioctl+0xfa/0x170 [ 438.190511][T13689] do_syscall_64+0x4c/0xa0 [ 438.194984][T13689] ? clear_bhb_loop+0x30/0x80 [ 438.199796][T13689] ? clear_bhb_loop+0x30/0x80 [ 438.204533][T13689] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 438.210493][T13689] RIP: 0033:0x7f0603686ec9 [ 438.214989][T13689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 438.234821][T13689] RSP: 002b:00007f06018ee038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 438.243549][T13689] RAX: ffffffffffffffda RBX: 00007f06038ddfa0 RCX: 00007f0603686ec9 [ 438.251571][T13689] RDX: 000000110c230000 RSI: 00000000c004743e RDI: 0000000000000005 [ 438.259701][T13689] RBP: 00007f06018ee090 R08: 0000000000000000 R09: 0000000000000000 [ 438.267706][T13689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 438.275705][T13689] R13: 00007f06038de038 R14: 00007f06038ddfa0 R15: 00007ffdba1d23f8 [ 438.283764][T13689] [ 438.424490][ T7626] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 438.454500][ T7626] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 438.485375][ T1184] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 438.575407][T13701] netlink: 'syz.3.3311': attribute type 1 has an invalid length. [ 438.604056][T13701] netlink: 112860 bytes leftover after parsing attributes in process `syz.3.3311'. [ 438.634237][T13701] netlink: 9 bytes leftover after parsing attributes in process `syz.3.3311'. [ 438.665911][ T7624] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 438.674219][ T7624] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 438.788126][ T7628] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 439.180927][T13715] netlink: 'syz.2.3315': attribute type 10 has an invalid length. [ 439.317398][T13715] device hsr0 entered promiscuous mode [ 439.910638][T13715] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 439.923081][T13715] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 439.933510][T13715] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 439.949012][T13715] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 439.970204][T13727] netlink: 40 bytes leftover after parsing attributes in process `syz.2.3315'. [ 439.987070][T13735] netlink: 'syz.1.3321': attribute type 39 has an invalid length. [ 440.147052][ T1429] ieee802154 phy0 wpan0: encryption failed: -22 [ 440.153553][ T1429] ieee802154 phy1 wpan1: encryption failed: -22 [ 440.203303][T13741] netlink: 'syz.4.3323': attribute type 2 has an invalid length. [ 440.285648][T13741] netlink: 212408 bytes leftover after parsing attributes in process `syz.4.3323'. [ 441.063860][T13752] device syzkaller0 left promiscuous mode [ 441.252154][ T1386] device hsr_slave_0 left promiscuous mode [ 441.269465][ T1386] device hsr_slave_1 left promiscuous mode [ 441.304567][ T1386] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 441.334017][ T1386] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 441.364595][ T1386] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 441.391279][ T1386] device team0 left promiscuous mode [ 441.410395][ T1386] device team_slave_0 left promiscuous mode [ 441.433256][ T1386] device team_slave_1 left promiscuous mode [ 441.491471][ T1386] device geneve1 left promiscuous mode [ 441.527171][ T1386] bridge0: port 3(team0) entered disabled state [ 441.558338][ T1386] device bridge_slave_1 left promiscuous mode [ 441.577354][ T1386] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.647106][ T1386] device bridge_slave_0 left promiscuous mode [ 441.688527][ T1386] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.787281][ T1386] device veth1_macvtap left promiscuous mode [ 441.793685][ T1386] device veth0_macvtap left promiscuous mode [ 442.222159][ T1386] team0 (unregistering): Port device geneve1 removed [ 442.533685][ T1386] team0 (unregistering): Port device team_slave_1 removed [ 442.574911][ T1386] team0 (unregistering): Port device team_slave_0 removed [ 442.871062][T13815] netlink: 'syz.3.3351': attribute type 10 has an invalid length. [ 442.954542][T13815] device batadv0 left promiscuous mode [ 442.960927][T13815] bridge0: port 3(batadv0) entered disabled state [ 442.969591][T13822] FAULT_INJECTION: forcing a failure. [ 442.969591][T13822] name failslab, interval 1, probability 0, space 0, times 0 [ 442.988478][T13815] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 442.996195][T13822] CPU: 1 PID: 13822 Comm: syz.3.3351 Not tainted syzkaller #0 [ 443.003802][T13822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 443.013893][T13822] Call Trace: [ 443.017187][T13822] [ 443.020129][T13822] dump_stack_lvl+0x168/0x230 [ 443.024824][T13822] ? show_regs_print_info+0x20/0x20 [ 443.030046][T13822] ? load_image+0x3b0/0x3b0 [ 443.034586][T13822] ? __might_sleep+0xf0/0xf0 [ 443.039193][T13822] ? __lock_acquire+0x7c60/0x7c60 [ 443.044239][T13822] ? netlink_insert+0xe7c/0x11d0 [ 443.049204][T13822] should_fail+0x38c/0x4c0 [ 443.053659][T13822] should_failslab+0x5/0x20 [ 443.058181][T13822] slab_pre_alloc_hook+0x51/0xc0 [ 443.063134][T13822] kmem_cache_alloc_node+0x47/0x2d0 [ 443.068535][T13822] ? __alloc_skb+0xf4/0x750 [ 443.073078][T13822] __alloc_skb+0xf4/0x750 [ 443.077433][T13822] netlink_sendmsg+0x645/0xbc0 [ 443.082236][T13822] ? netlink_getsockopt+0x560/0x560 [ 443.087566][T13822] ? aa_sock_msg_perm+0x94/0x150 [ 443.092525][T13822] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 443.097827][T13822] ? security_socket_sendmsg+0x7c/0xa0 [ 443.103330][T13822] ? netlink_getsockopt+0x560/0x560 [ 443.108552][T13822] ____sys_sendmsg+0x5a2/0x8c0 [ 443.113333][T13822] ? memset+0x1e/0x40 [ 443.117338][T13822] ? __sys_sendmsg_sock+0x30/0x30 [ 443.122388][T13822] ? import_iovec+0x6f/0xa0 [ 443.126922][T13822] ___sys_sendmsg+0x1f0/0x260 [ 443.131625][T13822] ? __sys_sendmsg+0x250/0x250 [ 443.136609][T13822] ? vfs_write+0x84d/0xd00 [ 443.141092][T13822] ? __fdget+0x18b/0x210 [ 443.145378][T13822] __se_sys_sendmsg+0x190/0x250 [ 443.150341][T13822] ? __x64_sys_sendmsg+0x80/0x80 [ 443.155328][T13822] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 443.161880][T13822] ? lockdep_hardirqs_on+0x94/0x140 [ 443.167110][T13822] do_syscall_64+0x4c/0xa0 [ 443.171544][T13822] ? clear_bhb_loop+0x30/0x80 [ 443.176462][T13822] ? clear_bhb_loop+0x30/0x80 [ 443.181207][T13822] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 443.187125][T13822] RIP: 0033:0x7f51804d9ec9 [ 443.191561][T13822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 443.211183][T13822] RSP: 002b:00007f517e6ff038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 443.219641][T13822] RAX: ffffffffffffffda RBX: 00007f5180731180 RCX: 00007f51804d9ec9 [ 443.227625][T13822] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000006 [ 443.235613][T13822] RBP: 00007f517e6ff090 R08: 0000000000000000 R09: 0000000000000000 [ 443.243600][T13822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 443.251591][T13822] R13: 00007f5180731218 R14: 00007f5180731180 R15: 00007ffd2aed6fb8 [ 443.259599][T13822] [ 443.287678][T13815] device batadv0 entered promiscuous mode [ 443.303635][T13815] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 443.422730][T13819] netlink: 'syz.0.3353': attribute type 13 has an invalid length. [ 443.443799][T13819] netlink: 160 bytes leftover after parsing attributes in process `syz.0.3353'. [ 443.497068][T13819] erspan0: refused to change device tx_queue_len [ 443.525896][T13819] A link change request failed with some changes committed already. Interface erspan0 may have been left with an inconsistent configuration, please check. [ 443.568717][T13829] netlink: 'syz.2.3355': attribute type 10 has an invalid length. [ 443.596919][T13829] device batadv0 left promiscuous mode [ 443.608861][T13829] bridge0: port 4(batadv0) entered disabled state [ 443.652199][T13829] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 443.686173][T13829] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 443.792092][T13832] device bond0 entered promiscuous mode [ 443.878519][T13832] device bond_slave_0 entered promiscuous mode [ 443.884909][T13832] device bond_slave_1 entered promiscuous mode [ 443.953053][T13832] device bridge0 entered promiscuous mode [ 443.968294][T13832] device batadv_slave_0 entered promiscuous mode [ 443.976718][T13832] device batadv0 entered promiscuous mode [ 443.998809][T13847] netlink: 'syz.4.3362': attribute type 10 has an invalid length. [ 444.045773][T13847] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 444.068255][T13847] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 444.160381][T13852] device bond0 entered promiscuous mode [ 444.175226][T13852] device bond_slave_0 entered promiscuous mode [ 444.195419][T13852] device bond_slave_1 entered promiscuous mode [ 444.204213][T13852] device batadv0 entered promiscuous mode [ 444.598754][T13865] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 444.655659][T13865] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 445.606058][T13905] netlink: 181828 bytes leftover after parsing attributes in process `syz.2.3384'. [ 445.817537][T13906] syzkaller0: create flow: hash 1622992039 index 1 [ 445.839503][ T1110] syzkaller0: tun_net_xmit 76 [ 445.845618][ T1110] syzkaller0: tun_net_xmit 48 [ 445.851782][T13913] netlink: 'syz.1.3387': attribute type 1 has an invalid length. [ 445.865428][ T4302] syzkaller0: tun_net_xmit 76 [ 445.871408][T13913] netlink: 181400 bytes leftover after parsing attributes in process `syz.1.3387'. [ 445.946761][ T1110] syzkaller0: tun_net_xmit 76 [ 446.135361][ T1110] syzkaller0: tun_net_xmit 76 [ 446.190313][T13923] mac80211_hwsim hwsim16 »»»»»»: renamed from wlan0 [ 446.397367][T13900] syzkaller0: delete flow: hash 1622992039 index 1 [ 446.755397][T13948] netlink: 'syz.4.3402': attribute type 10 has an invalid length. [ 446.765244][T13948] netlink: 40 bytes leftover after parsing attributes in process `syz.4.3402'. [ 446.777072][T13948] bridge0: port 3(veth0_vlan) entered blocking state [ 446.784111][T13948] bridge0: port 3(veth0_vlan) entered disabled state [ 446.797499][T13948] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 446.861134][T13954] FAULT_INJECTION: forcing a failure. [ 446.861134][T13954] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 446.923014][T13954] CPU: 1 PID: 13954 Comm: syz.0.3404 Not tainted syzkaller #0 [ 446.930553][T13954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 446.940766][T13954] Call Trace: [ 446.944081][T13954] [ 446.947062][T13954] dump_stack_lvl+0x168/0x230 [ 446.951788][T13954] ? show_regs_print_info+0x20/0x20 [ 446.957032][T13954] ? load_image+0x3b0/0x3b0 [ 446.961575][T13954] ? __lock_acquire+0x7c60/0x7c60 [ 446.966646][T13954] should_fail+0x38c/0x4c0 [ 446.971112][T13954] _copy_from_user+0x2e/0x170 [ 446.975840][T13954] __copy_msghdr_from_user+0xaf/0x5e0 [ 446.981257][T13954] ? verify_lock_unused+0x140/0x140 [ 446.986506][T13954] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 446.991924][T13954] ? trace_event_raw_event_lock+0x250/0x250 [ 446.997866][T13954] ___sys_sendmsg+0x156/0x260 [ 447.002601][T13954] ? __sys_sendmsg+0x250/0x250 [ 447.007430][T13954] ? trace_event_raw_event_lock+0x250/0x250 [ 447.013480][T13954] ? vfs_write+0x84d/0xd00 [ 447.017961][T13954] ? __fdget+0x18b/0x210 [ 447.021340][T13959] netlink: 64 bytes leftover after parsing attributes in process `syz.2.3405'. [ 447.022244][T13954] __se_sys_sendmsg+0x190/0x250 [ 447.036168][T13954] ? __x64_sys_sendmsg+0x80/0x80 [ 447.041166][T13954] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 447.047299][T13954] ? lockdep_hardirqs_on+0x94/0x140 [ 447.052560][T13954] do_syscall_64+0x4c/0xa0 [ 447.057016][T13954] ? clear_bhb_loop+0x30/0x80 [ 447.061717][T13954] ? clear_bhb_loop+0x30/0x80 [ 447.066423][T13954] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 447.072343][T13954] RIP: 0033:0x7f9e2da3dec9 [ 447.076783][T13954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 447.096416][T13954] RSP: 002b:00007f9e2bca5038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 447.104916][T13954] RAX: ffffffffffffffda RBX: 00007f9e2dc94fa0 RCX: 00007f9e2da3dec9 [ 447.112913][T13954] RDX: 0000000020004002 RSI: 0000200000000400 RDI: 0000000000000004 [ 447.121044][T13954] RBP: 00007f9e2bca5090 R08: 0000000000000000 R09: 0000000000000000 [ 447.129031][T13954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 447.137042][T13954] R13: 00007f9e2dc95038 R14: 00007f9e2dc94fa0 R15: 00007ffcd3cb9a28 [ 447.145065][T13954] [ 447.214737][T13956] netlink: 132 bytes leftover after parsing attributes in process `syz.2.3405'. [ 447.248917][T13956] netlink: 'syz.2.3405': attribute type 17 has an invalid length. [ 447.262382][T13956] netlink: 152 bytes leftover after parsing attributes in process `syz.2.3405'. [ 447.275946][T13956] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 447.283889][T13966] netlink: 16211 bytes leftover after parsing attributes in process `syz.3.3408'. [ 447.319701][T13963] netlink: 'syz.4.3406': attribute type 10 has an invalid length. [ 447.328208][T13963] netlink: 40 bytes leftover after parsing attributes in process `syz.4.3406'. [ 447.347519][T13963] bridge0: port 3(veth0_vlan) entered blocking state [ 447.363877][T13963] bridge0: port 3(veth0_vlan) entered disabled state [ 447.428916][T13963] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 447.494799][T13973] netlink: 'syz.0.3409': attribute type 10 has an invalid length. [ 447.528595][T13973] netlink: 2 bytes leftover after parsing attributes in process `syz.0.3409'. [ 447.553107][T13973] device team0 entered promiscuous mode [ 447.582319][T13973] device team_slave_0 entered promiscuous mode [ 447.598329][T13973] device team_slave_1 entered promiscuous mode [ 447.651890][T13973] bridge0: port 3(team0) entered blocking state [ 447.724793][T13973] bridge0: port 3(team0) entered disabled state [ 448.114986][T13973] bridge0: port 3(team0) entered blocking state [ 448.123107][T13973] bridge0: port 3(team0) entered forwarding state [ 448.222133][T13990] netlink: 'syz.1.3417': attribute type 3 has an invalid length. [ 448.354944][T13997] netlink: 'syz.3.3419': attribute type 10 has an invalid length. [ 448.415992][T13997] bond0: (slave batadv0): Releasing backup interface [ 448.477690][T13997] device batadv0 left promiscuous mode [ 448.960126][T14013] __nla_validate_parse: 2 callbacks suppressed [ 448.960147][T14013] netlink: 830 bytes leftover after parsing attributes in process `syz.2.3424'. [ 449.126157][T14017] FAULT_INJECTION: forcing a failure. [ 449.126157][T14017] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 449.206831][T14017] CPU: 1 PID: 14017 Comm: syz.2.3427 Not tainted syzkaller #0 [ 449.214411][T14017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 449.224506][T14017] Call Trace: [ 449.227820][T14017] [ 449.230780][T14017] dump_stack_lvl+0x168/0x230 [ 449.235502][T14017] ? show_regs_print_info+0x20/0x20 [ 449.240732][T14017] ? load_image+0x3b0/0x3b0 [ 449.245281][T14017] ? __lock_acquire+0x7c60/0x7c60 [ 449.250356][T14017] should_fail+0x38c/0x4c0 [ 449.254819][T14017] _copy_from_iter+0x22a/0x1150 [ 449.259732][T14017] ? __lock_acquire+0x7c60/0x7c60 [ 449.264806][T14017] ? copy_mc_pipe_to_iter+0x7d0/0x7d0 [ 449.270277][T14017] ? __virt_addr_valid+0x3c6/0x470 [ 449.275430][T14017] ? __phys_addr+0xb6/0x170 [ 449.279990][T14017] ? __phys_addr_symbol+0x2b/0x70 [ 449.285152][T14017] ? __check_object_size+0x30c/0x410 [ 449.290479][T14017] netlink_sendmsg+0x749/0xbc0 [ 449.295293][T14017] ? netlink_getsockopt+0x560/0x560 [ 449.300537][T14017] ? aa_sock_msg_perm+0x94/0x150 [ 449.305521][T14017] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 449.310857][T14017] ? security_socket_sendmsg+0x7c/0xa0 [ 449.316349][T14017] ? netlink_getsockopt+0x560/0x560 [ 449.321590][T14017] ____sys_sendmsg+0x5a2/0x8c0 [ 449.326400][T14017] ? memset+0x1e/0x40 [ 449.330500][T14017] ? __sys_sendmsg_sock+0x30/0x30 [ 449.335567][T14017] ? import_iovec+0x6f/0xa0 [ 449.340194][T14017] ___sys_sendmsg+0x1f0/0x260 [ 449.344934][T14017] ? __sys_sendmsg+0x250/0x250 [ 449.349817][T14017] ? vfs_write+0x84d/0xd00 [ 449.354371][T14017] ? __fdget+0x18b/0x210 [ 449.358643][T14017] __se_sys_sendmsg+0x190/0x250 [ 449.363547][T14017] ? __x64_sys_sendmsg+0x80/0x80 [ 449.368519][T14017] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 449.374550][T14017] ? lockdep_hardirqs_on+0x94/0x140 [ 449.379796][T14017] do_syscall_64+0x4c/0xa0 [ 449.384245][T14017] ? clear_bhb_loop+0x30/0x80 [ 449.388950][T14017] ? clear_bhb_loop+0x30/0x80 [ 449.393663][T14017] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 449.399583][T14017] RIP: 0033:0x7f8c1146aec9 [ 449.404380][T14017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 449.424119][T14017] RSP: 002b:00007f8c0f6d2038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 449.432573][T14017] RAX: ffffffffffffffda RBX: 00007f8c116c1fa0 RCX: 00007f8c1146aec9 [ 449.440620][T14017] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 000000000000000b [ 449.448622][T14017] RBP: 00007f8c0f6d2090 R08: 0000000000000000 R09: 0000000000000000 [ 449.456629][T14017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 449.464630][T14017] R13: 00007f8c116c2038 R14: 00007f8c116c1fa0 R15: 00007fff88413428 [ 449.472654][T14017] [ 450.307987][T14065] netlink: 'syz.3.3446': attribute type 21 has an invalid length. [ 450.341003][T14065] netlink: 156 bytes leftover after parsing attributes in process `syz.3.3446'. [ 450.838597][T14081] netlink: 'syz.2.3451': attribute type 29 has an invalid length. [ 450.889824][T14081] netlink: 'syz.2.3451': attribute type 29 has an invalid length. [ 451.080906][T14093] FAULT_INJECTION: forcing a failure. [ 451.080906][T14093] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 451.138960][T14093] CPU: 0 PID: 14093 Comm: syz.2.3456 Not tainted syzkaller #0 [ 451.146487][T14093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 451.156666][T14093] Call Trace: [ 451.159987][T14093] [ 451.162956][T14093] dump_stack_lvl+0x168/0x230 [ 451.167681][T14093] ? show_regs_print_info+0x20/0x20 [ 451.173013][T14093] ? load_image+0x3b0/0x3b0 [ 451.177666][T14093] ? __lock_acquire+0x7c60/0x7c60 [ 451.182740][T14093] should_fail+0x38c/0x4c0 [ 451.187362][T14093] _copy_from_user+0x2e/0x170 [ 451.192087][T14093] __copy_msghdr_from_user+0xaf/0x5e0 [ 451.197501][T14093] ? verify_lock_unused+0x140/0x140 [ 451.202755][T14093] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 451.208143][T14093] ___sys_sendmsg+0x156/0x260 [ 451.213043][T14093] ? __sys_sendmsg+0x250/0x250 [ 451.218012][T14093] ? vfs_write+0x84d/0xd00 [ 451.222500][T14093] ? __fdget+0x18b/0x210 [ 451.226781][T14093] __se_sys_sendmsg+0x190/0x250 [ 451.231669][T14093] ? __x64_sys_sendmsg+0x80/0x80 [ 451.236636][T14093] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 451.242671][T14093] ? lockdep_hardirqs_on+0x94/0x140 [ 451.248014][T14093] do_syscall_64+0x4c/0xa0 [ 451.252466][T14093] ? clear_bhb_loop+0x30/0x80 [ 451.257183][T14093] ? clear_bhb_loop+0x30/0x80 [ 451.261892][T14093] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 451.267816][T14093] RIP: 0033:0x7f8c1146aec9 [ 451.272253][T14093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 451.292148][T14093] RSP: 002b:00007f8c0f6d2038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 451.300697][T14093] RAX: ffffffffffffffda RBX: 00007f8c116c1fa0 RCX: 00007f8c1146aec9 [ 451.308706][T14093] RDX: 0000000000000004 RSI: 0000200000000100 RDI: 0000000000000004 [ 451.316709][T14093] RBP: 00007f8c0f6d2090 R08: 0000000000000000 R09: 0000000000000000 [ 451.324717][T14093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 451.332833][T14093] R13: 00007f8c116c2038 R14: 00007f8c116c1fa0 R15: 00007fff88413428 [ 451.340854][T14093] [ 451.413153][T14095] netlink: 'syz.0.3457': attribute type 27 has an invalid length. [ 452.104604][T14126] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.3467'. [ 452.140770][T14123] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.3467'. [ 452.625923][T14147] netlink: 'syz.2.3476': attribute type 12 has an invalid length. [ 452.637549][T14147] netlink: 132 bytes leftover after parsing attributes in process `syz.2.3476'. [ 453.124964][T14129] delete_channel: no stack [ 453.607251][T14183] netlink: 'syz.0.3487': attribute type 10 has an invalid length. [ 453.747287][T14183] device veth0_vlan left promiscuous mode [ 453.786387][T14183] device veth0_vlan entered promiscuous mode [ 453.814508][T14183] team0: Device veth0_vlan failed to register rx_handler [ 454.154159][T14194] netlink: 'syz.1.3491': attribute type 10 has an invalid length. [ 454.165316][T14194] team0: Device veth0_vlan is up. Set it down before adding it as a team port [ 455.196197][T14202] netlink: 'syz.2.3494': attribute type 10 has an invalid length. [ 455.927772][T14216] netlink: 132 bytes leftover after parsing attributes in process `syz.2.3499'. [ 456.088092][T14226] netlink: 'syz.4.3503': attribute type 21 has an invalid length. [ 456.137304][T14226] netlink: 132 bytes leftover after parsing attributes in process `syz.4.3503'. [ 456.206376][T14222] netlink: 'syz.3.3501': attribute type 1 has an invalid length. [ 456.214200][T14222] netlink: 199820 bytes leftover after parsing attributes in process `syz.3.3501'. [ 456.302230][T14233] FAULT_INJECTION: forcing a failure. [ 456.302230][T14233] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 456.331768][T14233] CPU: 1 PID: 14233 Comm: syz.2.3504 Not tainted syzkaller #0 [ 456.339308][T14233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 456.349582][T14233] Call Trace: [ 456.352881][T14233] [ 456.355838][T14233] dump_stack_lvl+0x168/0x230 [ 456.360540][T14233] ? show_regs_print_info+0x20/0x20 [ 456.365763][T14233] ? load_image+0x3b0/0x3b0 [ 456.370495][T14233] ? __lock_acquire+0x7c60/0x7c60 [ 456.375536][T14233] should_fail+0x38c/0x4c0 [ 456.379970][T14233] _copy_to_user+0x2e/0x130 [ 456.384489][T14233] bpf_test_finish+0x20a/0x2d0 [ 456.389266][T14233] ? convert_skb_to___skb+0x360/0x360 [ 456.394662][T14233] bpf_prog_test_run_skb+0xb8f/0x1180 [ 456.400149][T14233] ? cpu_online+0x60/0x60 [ 456.404492][T14233] bpf_prog_test_run+0x31e/0x390 [ 456.409446][T14233] __sys_bpf+0x535/0x670 [ 456.413707][T14233] ? bpf_link_show_fdinfo+0x340/0x340 [ 456.419144][T14233] ? rcu_nmi_exit+0x6f/0xf0 [ 456.423666][T14233] ? vtime_user_exit+0x2dc/0x400 [ 456.428625][T14233] __x64_sys_bpf+0x78/0x90 [ 456.433053][T14233] do_syscall_64+0x4c/0xa0 [ 456.437486][T14233] ? clear_bhb_loop+0x30/0x80 [ 456.442215][T14233] ? clear_bhb_loop+0x30/0x80 [ 456.446910][T14233] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 456.452815][T14233] RIP: 0033:0x7f8c1146aec9 [ 456.457240][T14233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 456.476942][T14233] RSP: 002b:00007f8c0f6d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 456.485373][T14233] RAX: ffffffffffffffda RBX: 00007f8c116c1fa0 RCX: 00007f8c1146aec9 [ 456.493360][T14233] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 456.501445][T14233] RBP: 00007f8c0f6d2090 R08: 0000000000000000 R09: 0000000000000000 [ 456.509425][T14233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 456.517405][T14233] R13: 00007f8c116c2038 R14: 00007f8c116c1fa0 R15: 00007fff88413428 [ 456.525400][T14233] [ 456.940196][T14246] netlink: 'syz.0.3507': attribute type 10 has an invalid length. [ 456.996470][T14246] device geneve1 entered promiscuous mode [ 457.029735][T14246] team0: Port device geneve1 added [ 457.117918][T14262] netlink: 16410 bytes leftover after parsing attributes in process `syz.4.3514'. [ 458.793995][T14317] sock: sock_timestamping_bind_phc: sock not bind to device [ 459.704971][T14335] netlink: 176 bytes leftover after parsing attributes in process `syz.3.3543'. [ 460.006585][T14356] FAULT_INJECTION: forcing a failure. [ 460.006585][T14356] name failslab, interval 1, probability 0, space 0, times 0 [ 460.058287][T14356] CPU: 1 PID: 14356 Comm: syz.1.3547 Not tainted syzkaller #0 [ 460.065917][T14356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 460.076010][T14356] Call Trace: [ 460.079312][T14356] [ 460.082263][T14356] dump_stack_lvl+0x168/0x230 [ 460.086977][T14356] ? show_regs_print_info+0x20/0x20 [ 460.092224][T14356] ? load_image+0x3b0/0x3b0 [ 460.096822][T14356] ? __might_sleep+0xf0/0xf0 [ 460.101571][T14356] ? __lock_acquire+0x7c60/0x7c60 [ 460.106731][T14356] should_fail+0x38c/0x4c0 [ 460.111179][T14356] should_failslab+0x5/0x20 [ 460.115703][T14356] slab_pre_alloc_hook+0x51/0xc0 [ 460.120666][T14356] __kmalloc_node_track_caller+0x68/0x3a0 [ 460.126414][T14356] ? __ip_append_data+0x2050/0x3230 [ 460.131659][T14356] ? kmem_cache_alloc_node+0x162/0x2d0 [ 460.137140][T14356] ? __alloc_skb+0xf4/0x750 [ 460.141670][T14356] ? __ip_append_data+0x2050/0x3230 [ 460.146887][T14356] __alloc_skb+0x22c/0x750 [ 460.151362][T14356] __ip_append_data+0x2050/0x3230 [ 460.156421][T14356] ? udp_sendmsg+0x2340/0x2340 [ 460.161201][T14356] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 460.167219][T14356] ? ip_setup_cork+0x890/0x890 [ 460.171997][T14356] ? __local_bh_enable_ip+0x12a/0x1b0 [ 460.177379][T14356] ip_append_data+0x132/0x1a0 [ 460.182068][T14356] ? udp_sendmsg+0x2340/0x2340 [ 460.186844][T14356] udp_sendmsg+0x3e2/0x2340 [ 460.191364][T14356] ? mark_lock+0x94/0x320 [ 460.195801][T14356] ? udp_sendmsg+0x2340/0x2340 [ 460.200664][T14356] ? __lock_acquire+0x12d9/0x7c60 [ 460.205728][T14356] ? udp_cmsg_send+0x350/0x350 [ 460.210551][T14356] ? mark_lock+0x94/0x320 [ 460.214922][T14356] ? mark_lock+0x94/0x320 [ 460.219271][T14356] ? __lock_acquire+0x13ad/0x7c60 [ 460.224325][T14356] udpv6_sendmsg+0x722/0x2320 [ 460.229027][T14356] ? verify_lock_unused+0x140/0x140 [ 460.234237][T14356] ? udp_v6_early_demux+0xe90/0xe90 [ 460.239458][T14356] ? __lock_acquire+0x12d9/0x7c60 [ 460.244536][T14356] ? aa_sk_perm+0x7b4/0x8f0 [ 460.249054][T14356] ? aa_af_perm+0x2b0/0x2b0 [ 460.253566][T14356] ? tomoyo_socket_sendmsg_permission+0x1dd/0x2f0 [ 460.260000][T14356] ? sock_rps_record_flow+0x17/0x3b0 [ 460.265315][T14356] ? inet_send_prepare+0x58/0x260 [ 460.270522][T14356] ? inet6_compat_ioctl+0x380/0x380 [ 460.275751][T14356] ? inet6_sendmsg+0x5b/0xd0 [ 460.280367][T14356] ? inet6_compat_ioctl+0x380/0x380 [ 460.285593][T14356] ____sys_sendmsg+0x5a2/0x8c0 [ 460.290388][T14356] ? memset+0x1e/0x40 [ 460.294390][T14356] ? __sys_sendmsg_sock+0x30/0x30 [ 460.299442][T14356] ? import_iovec+0x6f/0xa0 [ 460.303971][T14356] ___sys_sendmsg+0x1f0/0x260 [ 460.308691][T14356] ? __sys_sendmsg+0x250/0x250 [ 460.313536][T14356] ? vfs_write+0x84d/0xd00 [ 460.318000][T14356] ? __fdget+0x18b/0x210 [ 460.322257][T14356] __se_sys_sendmsg+0x190/0x250 [ 460.327136][T14356] ? __x64_sys_sendmsg+0x80/0x80 [ 460.332116][T14356] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 460.338139][T14356] ? lockdep_hardirqs_on+0x94/0x140 [ 460.343367][T14356] do_syscall_64+0x4c/0xa0 [ 460.347793][T14356] ? clear_bhb_loop+0x30/0x80 [ 460.352480][T14356] ? clear_bhb_loop+0x30/0x80 [ 460.357171][T14356] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 460.363324][T14356] RIP: 0033:0x7fa2ae75dec9 [ 460.367762][T14356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 460.387395][T14356] RSP: 002b:00007fa2ac9c5038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 460.395839][T14356] RAX: ffffffffffffffda RBX: 00007fa2ae9b4fa0 RCX: 00007fa2ae75dec9 [ 460.403831][T14356] RDX: 0000000000048800 RSI: 0000200000000880 RDI: 0000000000000003 [ 460.411816][T14356] RBP: 00007fa2ac9c5090 R08: 0000000000000000 R09: 0000000000000000 [ 460.419887][T14356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 460.427869][T14356] R13: 00007fa2ae9b5038 R14: 00007fa2ae9b4fa0 R15: 00007ffe6cd65ef8 [ 460.435866][T14356] [ 460.465799][T14359] netlink: 16222 bytes leftover after parsing attributes in process `syz.4.3549'. [ 461.655425][T14399] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3564'. [ 461.726037][T14399] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3564'. [ 461.795783][T14407] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3564'. [ 461.866882][T14410] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3564'. [ 463.131325][T14461] netlink: 13307 bytes leftover after parsing attributes in process `syz.3.3587'. [ 463.236481][T14462] netlink: 144316 bytes leftover after parsing attributes in process `syz.0.3584'. [ 464.523916][T14517] FAULT_INJECTION: forcing a failure. [ 464.523916][T14517] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 464.639115][T14517] CPU: 1 PID: 14517 Comm: syz.0.3605 Not tainted syzkaller #0 [ 464.646663][T14517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 464.656752][T14517] Call Trace: [ 464.660073][T14517] [ 464.663023][T14517] dump_stack_lvl+0x168/0x230 [ 464.667932][T14517] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 464.674120][T14517] ? show_regs_print_info+0x20/0x20 [ 464.679345][T14517] ? _printk+0xfd/0x110 [ 464.683526][T14517] should_fail+0x38c/0x4c0 [ 464.687986][T14517] _copy_from_user+0x2e/0x170 [ 464.692787][T14517] bpf_prog_test_run_flow_dissector+0x282/0x5e0 [ 464.699047][T14517] ? __lock_acquire+0x7c60/0x7c60 [ 464.704227][T14517] ? xdp_convert_buff_to_md+0x1e0/0x1e0 [ 464.709803][T14517] ? __fget_files+0x40f/0x480 [ 464.714507][T14517] ? xdp_convert_buff_to_md+0x1e0/0x1e0 [ 464.720066][T14517] bpf_prog_test_run+0x31e/0x390 [ 464.725021][T14517] __sys_bpf+0x535/0x670 [ 464.729368][T14517] ? bpf_link_show_fdinfo+0x340/0x340 [ 464.734756][T14517] ? vtime_user_exit+0x2dc/0x400 [ 464.739732][T14517] __x64_sys_bpf+0x78/0x90 [ 464.744282][T14517] do_syscall_64+0x4c/0xa0 [ 464.748708][T14517] ? clear_bhb_loop+0x30/0x80 [ 464.753390][T14517] ? clear_bhb_loop+0x30/0x80 [ 464.758078][T14517] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 464.764005][T14517] RIP: 0033:0x7f9e2da3dec9 [ 464.768450][T14517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 464.788079][T14517] RSP: 002b:00007f9e2bca5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 464.796526][T14517] RAX: ffffffffffffffda RBX: 00007f9e2dc94fa0 RCX: 00007f9e2da3dec9 [ 464.804541][T14517] RDX: 0000000000000050 RSI: 0000200000000340 RDI: 000000000000000a [ 464.812520][T14517] RBP: 00007f9e2bca5090 R08: 0000000000000000 R09: 0000000000000000 [ 464.820503][T14517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 464.828680][T14517] R13: 00007f9e2dc95038 R14: 00007f9e2dc94fa0 R15: 00007ffcd3cb9a28 [ 464.836707][T14517] [ 468.926069][T14635] netlink: 'syz.3.3662': attribute type 10 has an invalid length. [ 470.512404][T14692] FAULT_INJECTION: forcing a failure. [ 470.512404][T14692] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 470.592451][T14692] CPU: 0 PID: 14692 Comm: syz.2.3669 Not tainted syzkaller #0 [ 470.600063][T14692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 470.610162][T14692] Call Trace: [ 470.613466][T14692] [ 470.616417][T14692] dump_stack_lvl+0x168/0x230 [ 470.621136][T14692] ? show_regs_print_info+0x20/0x20 [ 470.626378][T14692] ? load_image+0x3b0/0x3b0 [ 470.631003][T14692] ? __lock_acquire+0x7c60/0x7c60 [ 470.636063][T14692] should_fail+0x38c/0x4c0 [ 470.640515][T14692] _copy_from_iter+0x22a/0x1150 [ 470.645392][T14692] ? __lock_acquire+0x7c60/0x7c60 [ 470.650570][T14692] ? copy_mc_pipe_to_iter+0x7d0/0x7d0 [ 470.655978][T14692] ? __virt_addr_valid+0x3c6/0x470 [ 470.661123][T14692] ? __phys_addr+0xb6/0x170 [ 470.665644][T14692] ? __phys_addr_symbol+0x2b/0x70 [ 470.670680][T14692] ? __check_object_size+0x30c/0x410 [ 470.675995][T14692] netlink_sendmsg+0x749/0xbc0 [ 470.680791][T14692] ? netlink_getsockopt+0x560/0x560 [ 470.686018][T14692] ? aa_sock_msg_perm+0x94/0x150 [ 470.690977][T14692] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 470.696399][T14692] ? security_socket_sendmsg+0x7c/0xa0 [ 470.701884][T14692] ? netlink_getsockopt+0x560/0x560 [ 470.707151][T14692] ____sys_sendmsg+0x5a2/0x8c0 [ 470.712065][T14692] ? memset+0x1e/0x40 [ 470.716283][T14692] ? __sys_sendmsg_sock+0x30/0x30 [ 470.721345][T14692] ? import_iovec+0x6f/0xa0 [ 470.725873][T14692] ___sys_sendmsg+0x1f0/0x260 [ 470.730572][T14692] ? __sys_sendmsg+0x250/0x250 [ 470.735353][T14692] ? vfs_write+0x84d/0xd00 [ 470.739795][T14692] ? __fdget+0x18b/0x210 [ 470.744052][T14692] __se_sys_sendmsg+0x190/0x250 [ 470.748951][T14692] ? __x64_sys_sendmsg+0x80/0x80 [ 470.753915][T14692] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 470.759918][T14692] ? lockdep_hardirqs_on+0x94/0x140 [ 470.765135][T14692] do_syscall_64+0x4c/0xa0 [ 470.769555][T14692] ? clear_bhb_loop+0x30/0x80 [ 470.774327][T14692] ? clear_bhb_loop+0x30/0x80 [ 470.779109][T14692] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 470.785095][T14692] RIP: 0033:0x7f8c1146aec9 [ 470.789519][T14692] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 470.809152][T14692] RSP: 002b:00007f8c0f6b1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 470.817578][T14692] RAX: ffffffffffffffda RBX: 00007f8c116c2090 RCX: 00007f8c1146aec9 [ 470.825559][T14692] RDX: 0000000020000800 RSI: 0000200000000600 RDI: 0000000000000006 [ 470.833538][T14692] RBP: 00007f8c0f6b1090 R08: 0000000000000000 R09: 0000000000000000 [ 470.841515][T14692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 470.849501][T14692] R13: 00007f8c116c2128 R14: 00007f8c116c2090 R15: 00007fff88413428 [ 470.857512][T14692] [ 471.717743][T14725] netlink: 'syz.3.3685': attribute type 1 has an invalid length. [ 471.751675][T14725] netlink: 168864 bytes leftover after parsing attributes in process `syz.3.3685'. [ 472.570028][T14750] netlink: 196 bytes leftover after parsing attributes in process `syz.0.3696'. [ 473.657085][T14789] FAULT_INJECTION: forcing a failure. [ 473.657085][T14789] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 473.683465][T14789] CPU: 1 PID: 14789 Comm: syz.2.3712 Not tainted syzkaller #0 [ 473.690999][T14789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 473.701090][T14789] Call Trace: [ 473.704401][T14789] [ 473.707354][T14789] dump_stack_lvl+0x168/0x230 [ 473.712065][T14789] ? show_regs_print_info+0x20/0x20 [ 473.717596][T14789] ? load_image+0x3b0/0x3b0 [ 473.722227][T14789] ? __lock_acquire+0x7c60/0x7c60 [ 473.727284][T14789] should_fail+0x38c/0x4c0 [ 473.731992][T14789] _copy_from_user+0x2e/0x170 [ 473.736689][T14789] __copy_msghdr_from_user+0x448/0x5e0 [ 473.742202][T14789] ? verify_lock_unused+0x140/0x140 [ 473.747429][T14789] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 473.752796][T14789] ___sys_sendmsg+0x156/0x260 [ 473.757494][T14789] ? __sys_sendmsg+0x250/0x250 [ 473.762299][T14789] ? vfs_write+0x84d/0xd00 [ 473.766738][T14789] ? __fdget+0x18b/0x210 [ 473.771007][T14789] __se_sys_sendmsg+0x190/0x250 [ 473.775959][T14789] ? __x64_sys_sendmsg+0x80/0x80 [ 473.780999][T14789] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 473.786999][T14789] ? lockdep_hardirqs_on+0x94/0x140 [ 473.792208][T14789] do_syscall_64+0x4c/0xa0 [ 473.796627][T14789] ? clear_bhb_loop+0x30/0x80 [ 473.801323][T14789] ? clear_bhb_loop+0x30/0x80 [ 473.806006][T14789] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 473.811924][T14789] RIP: 0033:0x7f8c1146aec9 [ 473.816347][T14789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 473.835958][T14789] RSP: 002b:00007f8c0f6d2038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 473.844379][T14789] RAX: ffffffffffffffda RBX: 00007f8c116c1fa0 RCX: 00007f8c1146aec9 [ 473.852479][T14789] RDX: 0000000020040000 RSI: 0000200000000240 RDI: 0000000000000003 [ 473.860464][T14789] RBP: 00007f8c0f6d2090 R08: 0000000000000000 R09: 0000000000000000 [ 473.868453][T14789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 473.876434][T14789] R13: 00007f8c116c2038 R14: 00007f8c116c1fa0 R15: 00007fff88413428 [ 473.884431][T14789] [ 474.983534][T14824] netlink: 'syz.0.3731': attribute type 1 has an invalid length. [ 475.070671][T14824] netlink: 168864 bytes leftover after parsing attributes in process `syz.0.3731'. [ 475.461978][T14847] netlink: 2451 bytes leftover after parsing attributes in process `syz.0.3730'. [ 476.073092][T14866] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3737'. [ 476.327953][T14866] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3737'. [ 476.463949][T14871] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3737'. [ 476.847428][T14881] netlink: 'syz.4.3739': attribute type 1 has an invalid length. [ 476.875335][T14881] netlink: 168864 bytes leftover after parsing attributes in process `syz.4.3739'. [ 477.127498][T14891] netlink: 160 bytes leftover after parsing attributes in process `syz.0.3744'. [ 477.192606][T14893] netlink: 'syz.3.3745': attribute type 6 has an invalid length. [ 478.247281][T14926] netlink: 'syz.3.3755': attribute type 9 has an invalid length. [ 478.287402][T14926] netlink: 126588 bytes leftover after parsing attributes in process `syz.3.3755'. [ 479.985484][ T7628] wlan1: Trigger new scan to find an IBSS to join [ 495.135843][T13641] Bluetooth: hci2: command 0x0409 tx timeout [ 495.285307][T13641] Bluetooth: hci7: command 0x0409 tx timeout [ 495.291655][T13641] Bluetooth: hci6: command 0x0409 tx timeout [ 496.085385][T13641] Bluetooth: hci8: command 0x0409 tx timeout [ 496.185515][T13641] Bluetooth: hci9: command 0x0409 tx timeout [ 497.186694][T13641] Bluetooth: hci2: command 0x041b tx timeout [ 497.385292][T13641] Bluetooth: hci6: command 0x041b tx timeout [ 497.391501][T13641] Bluetooth: hci7: command 0x041b tx timeout [ 498.185308][T13641] Bluetooth: hci8: command 0x041b tx timeout [ 498.236738][T13641] Bluetooth: hci9: command 0x041b tx timeout [ 499.286794][ T4247] Bluetooth: hci2: command 0x040f tx timeout [ 499.436791][ T4247] Bluetooth: hci7: command 0x040f tx timeout [ 499.445305][ T4247] Bluetooth: hci6: command 0x040f tx timeout [ 500.235375][ T4247] Bluetooth: hci8: command 0x040f tx timeout [ 500.337173][ T4247] Bluetooth: hci9: command 0x040f tx timeout [ 501.385461][ T4247] Bluetooth: hci2: command 0x0419 tx timeout [ 501.536854][ T4247] Bluetooth: hci6: command 0x0419 tx timeout [ 501.545316][ T4247] Bluetooth: hci7: command 0x0419 tx timeout [ 502.335449][ T4247] Bluetooth: hci8: command 0x0419 tx timeout [ 502.385381][ T4247] Bluetooth: hci9: command 0x0419 tx timeout [ 508.785302][T13641] Bluetooth: hci0: command 0x0406 tx timeout [ 534.386730][T13641] Bluetooth: hci5: command 0x0406 tx timeout [ 555.585278][ T4247] Bluetooth: hci10: command 0x0409 tx timeout [ 555.686738][ T4247] Bluetooth: hci11: command 0x0409 tx timeout [ 556.185342][ T4247] Bluetooth: hci12: command 0x0409 tx timeout [ 556.585305][ T4247] Bluetooth: hci14: command 0x0409 tx timeout [ 556.593112][ T4247] Bluetooth: hci13: command 0x0409 tx timeout [ 557.685354][ T4247] Bluetooth: hci10: command 0x041b tx timeout [ 557.785340][ T4247] Bluetooth: hci11: command 0x041b tx timeout [ 558.236700][ T4247] Bluetooth: hci12: command 0x041b tx timeout [ 558.635324][ T4247] Bluetooth: hci13: command 0x041b tx timeout [ 558.641578][ T4247] Bluetooth: hci14: command 0x041b tx timeout [ 559.785307][ T4247] Bluetooth: hci10: command 0x040f tx timeout [ 559.835341][ T4247] Bluetooth: hci11: command 0x040f tx timeout [ 560.336596][ T4247] Bluetooth: hci12: command 0x040f tx timeout [ 560.735264][ T4247] Bluetooth: hci14: command 0x040f tx timeout [ 560.741597][ T4247] Bluetooth: hci13: command 0x040f tx timeout [ 561.836666][ T4247] Bluetooth: hci10: command 0x0419 tx timeout [ 561.935268][ T4247] Bluetooth: hci11: command 0x0419 tx timeout [ 562.385381][ T4247] Bluetooth: hci12: command 0x0419 tx timeout [ 562.785313][ T4247] Bluetooth: hci13: command 0x0419 tx timeout [ 562.796331][ T4247] Bluetooth: hci14: command 0x0419 tx timeout [ 583.134982][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 583.141971][ C1] rcu: 0-....: (1 GPs behind) idle=7ef/1/0x4000000000000002 softirq=43719/43720 fqs=2105 [ 583.153330][ C1] (detected by 1, t=10502 jiffies, g=62305, q=1242) [ 583.160076][ C1] Sending NMI from CPU 1 to CPUs 0: [ 583.165313][ C0] NMI backtrace for cpu 0 [ 583.165324][ C0] CPU: 0 PID: 14901 Comm: syz.2.3748 Not tainted syzkaller #0 [ 583.165342][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 583.165353][ C0] RIP: 0010:__kasan_check_write+0x2/0x10 [ 583.165382][ C0] Code: 0a 48 c7 c7 b5 97 a2 8b 48 89 de e8 48 3a e2 07 31 ed eb d7 00 00 cc cc 89 f6 48 8b 0c 24 31 d2 e9 43 ef ff ff 0f 1f 00 89 f6 <48> 8b 0c 24 ba 01 00 00 00 e9 30 ef ff ff 55 41 56 53 48 89 d3 89 [ 583.165397][ C0] RSP: 0018:ffffc90000007018 EFLAGS: 00000046 [ 583.165412][ C0] RAX: 0000000000000101 RBX: 1ffff92000000e08 RCX: dffffc0000000000 [ 583.165424][ C0] RDX: 0000000000000100 RSI: 0000000000000008 RDI: ffff888021010000 [ 583.165435][ C0] RBP: ffffc90000007100 R08: dffffc0000000000 R09: fffffbfff1ad323e [ 583.165448][ C0] R10: fffffbfff1ad323e R11: 1ffffffff1ad323d R12: ffffffff8c120b00 [ 583.165461][ C0] R13: 0000000000000000 R14: 0000000000000046 R15: ffff888021010000 [ 583.165472][ C0] FS: 00007f8c0f6d26c0(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 [ 583.165487][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 583.165499][ C0] CR2: 0000001b3320eff8 CR3: 0000000074b1c000 CR4: 00000000003506f0 [ 583.165514][ C0] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 583.165526][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 583.165536][ C0] Call Trace: [ 583.165543][ C0] [ 583.165549][ C0] rcu_read_unlock_special+0x25f/0x480 [ 583.165574][ C0] ? perf_prepare_sample+0x1680/0x1cb0 [ 583.165591][ C0] ? __rcu_read_unlock+0xd0/0xd0 [ 583.165609][ C0] ? __perf_cgroup_move+0x140/0x140 [ 583.165629][ C0] ? perf_callchain+0x190/0x190 [ 583.165647][ C0] __rcu_read_unlock+0x78/0xd0 [ 583.165664][ C0] perf_event_output_forward+0x216/0x280 [ 583.165681][ C0] ? __lock_acquire+0x7c60/0x7c60 [ 583.165701][ C0] ? perf_get_page_size+0x420/0x420 [ 583.165720][ C0] ? tracing_gen_ctx_irq_test+0xb3/0x130 [ 583.165741][ C0] ? __perf_event_account_interrupt+0x187/0x280 [ 583.165760][ C0] __perf_event_overflow+0x364/0x530 [ 583.165781][ C0] perf_tp_event+0x32c/0xb50 [ 583.165800][ C0] ? perf_trace_run_bpf_submit+0x1c0/0x1c0 [ 583.165816][ C0] ? __perf_event_overflow+0x415/0x530 [ 583.165860][ C0] perf_trace_run_bpf_submit+0xf3/0x1c0 [ 583.165880][ C0] perf_trace_preemptirq_template+0x2be/0x380 [ 583.165901][ C0] ? asm_sysvec_irq_work+0x16/0x20 [ 583.165920][ C0] ? trace_event_raw_event_preemptirq_template+0x270/0x270 [ 583.165940][ C0] ? __irq_exit_rcu+0x13b/0x220 [ 583.165957][ C0] ? irq_exit_rcu+0x20/0x20 [ 583.165974][ C0] ? asm_sysvec_irq_work+0x16/0x20 [ 583.165989][ C0] trace_irq_enable_rcuidle+0x108/0x180 [ 583.166009][ C0] trace_hardirqs_on+0x57/0x80 [ 583.166025][ C0] asm_sysvec_irq_work+0x16/0x20 [ 583.166041][ C0] RIP: 0010:rcu_read_unlock_special+0x84/0x480 [ 583.166058][ C0] Code: f1 f1 f1 00 f2 f2 f2 4a 89 04 2b 66 42 c7 44 2b 09 f3 f3 42 c6 44 2b 0b f3 65 44 8b 35 ad 13 9e 7e 41 f7 c6 00 00 f0 00 74 45 <48> c7 44 24 20 0e 36 e0 45 4a c7 04 2b 00 00 00 00 66 42 c7 44 2b [ 583.166073][ C0] RSP: 0018:ffffc900000077a0 EFLAGS: 00000206 [ 583.166086][ C0] RAX: 15f55f01db57c100 RBX: 1ffff92000000ef8 RCX: 15f55f01db57c100 [ 583.166099][ C0] RDX: dffffc0000000000 RSI: ffffffff8a0b1820 RDI: ffffffff8a59a480 [ 583.166111][ C0] RBP: ffffc90000007880 R08: dffffc0000000000 R09: fffffbfff1ff782b [ 583.166124][ C0] R10: fffffbfff1ff782b R11: 1ffffffff1ff782a R12: ffffffff8c120b00 [ 583.166136][ C0] R13: dffffc0000000000 R14: 0000000000000246 R15: 0000000000000001 [ 583.166160][ C0] ? __rcu_read_unlock+0xd0/0xd0 [ 583.166180][ C0] ? __netif_receive_skb+0x290/0x290 [ 583.166203][ C0] __rcu_read_unlock+0x78/0xd0 [ 583.166220][ C0] netif_receive_skb_list_internal+0x93a/0xb90 [ 583.166243][ C0] ? netif_receive_skb_list+0x3e0/0x3e0 [ 583.166258][ C0] ? mark_lock+0x94/0x320 [ 583.166287][ C0] ? detach_buf_split+0x8a9/0xab0 [ 583.166308][ C0] napi_complete_done+0x37d/0x830 [ 583.166326][ C0] ? __lock_acquire+0x7c60/0x7c60 [ 583.166345][ C0] ? __napi_schedule_irqoff+0x230/0x230 [ 583.166363][ C0] ? virtqueue_get_buf_ctx+0x4a7/0xfd0 [ 583.166383][ C0] ? virtqueue_enable_cb_prepare+0x22e/0x560 [ 583.166403][ C0] virtnet_poll+0x912/0xef0 [ 583.166433][ C0] ? refill_work+0x210/0x210 [ 583.166450][ C0] ? lockdep_hardirqs_on+0x94/0x140 [ 583.166468][ C0] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 583.166489][ C0] __napi_poll+0xc0/0x430 [ 583.166509][ C0] net_rx_action+0x4a8/0x9c0 [ 583.166529][ C0] ? lock_chain_count+0x20/0x20 [ 583.166551][ C0] ? net_tx_action+0x870/0x870 [ 583.166569][ C0] ? lockdep_hardirqs_on+0x94/0x140 [ 583.166586][ C0] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 583.166611][ C0] handle_softirqs+0x328/0x820 [ 583.166629][ C0] ? __irq_exit_rcu+0x12f/0x220 [ 583.166648][ C0] ? do_softirq+0x200/0x200 [ 583.166668][ C0] __irq_exit_rcu+0x12f/0x220 [ 583.166684][ C0] ? irq_exit_rcu+0x20/0x20 [ 583.166706][ C0] irq_exit_rcu+0x5/0x20 [ 583.166720][ C0] sysvec_apic_timer_interrupt+0xa0/0xc0 [ 583.166738][ C0] [ 583.166743][ C0] [ 583.166749][ C0] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 583.166766][ C0] RIP: 0010:inet_diag_dump_icsk+0x80c/0x13c0 [ 583.166794][ C0] Code: b6 04 28 84 c0 0f 85 25 0a 00 00 48 8b 44 24 68 8b 18 23 5c 24 28 ba 80 00 00 00 48 8d bc 24 10 01 00 00 31 f6 e8 24 a6 42 f9 40 00 00 00 48 8d bc 24 b0 01 00 00 31 f6 e8 10 a6 42 f9 4c 89 [ 583.166807][ C0] RSP: 0018:ffffc900034bf020 EFLAGS: 00000202 [ 583.166820][ C0] RAX: ffffc900034bf130 RBX: 000000000000006f RCX: 0000000000000000 [ 583.166831][ C0] RDX: 0000000000000080 RSI: 0000000000000000 RDI: ffffc900034bf1b0 [ 583.166842][ C0] RBP: ffffc900034bf2a0 R08: dffffc0000000000 R09: ffffc900034bf130 [ 583.166855][ C0] R10: fffff52000697e36 R11: 1ffff92000697e26 R12: ffff88807cad65f0 [ 583.166868][ C0] R13: dffffc0000000000 R14: ffffc9000194b778 R15: ffff888019593500 [ 583.166903][ C0] ? inet_diag_bc_sk+0x10c0/0x10c0 [ 583.166941][ C0] __inet_diag_dump+0x1f6/0x380 [ 583.166962][ C0] inet_diag_dump_compat+0x161/0x200 [ 583.166979][ C0] ? __phys_addr+0x95/0x170 [ 583.166995][ C0] ? inet_diag_dump_start_compat+0x20/0x20 [ 583.167012][ C0] ? __sanitizer_cov_trace_pc+0x55/0x60 [ 583.167032][ C0] ? memset+0x1e/0x40 [ 583.167049][ C0] ? __alloc_skb+0x473/0x750 [ 583.167069][ C0] netlink_dump+0x676/0xcd0 [ 583.167095][ C0] ? netlink_lookup+0x1d0/0x1d0 [ 583.167117][ C0] ? __inet_diag_dump_start+0x805/0x970 [ 583.167139][ C0] __netlink_dump_start+0x523/0x700 [ 583.167164][ C0] inet_diag_rcv_msg_compat+0x1e9/0x3c0 [ 583.167183][ C0] ? inet_diag_unregister+0xb0/0xb0 [ 583.167199][ C0] ? __mutex_trylock_common+0x9d/0x250 [ 583.167219][ C0] ? mutex_lock_io_nested+0x60/0x60 [ 583.167239][ C0] ? __inet_diag_dump+0x380/0x380 [ 583.167254][ C0] ? inet_diag_dump_start_compat+0x20/0x20 [ 583.167270][ C0] ? inet_diag_dump+0x50/0x50 [ 583.167291][ C0] ? dev_queue_xmit+0x20/0x20 [ 583.167304][ C0] ? memcpy+0x3c/0x60 [ 583.167324][ C0] ? sock_diag_rcv+0x17/0x40 [ 583.167344][ C0] ? sock_diag_rcv+0x17/0x40 [ 583.167363][ C0] ? inet_diag_unregister+0xb0/0xb0 [ 583.167379][ C0] sock_diag_rcv_msg+0x164/0x3e0 [ 583.167397][ C0] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 583.167418][ C0] netlink_rcv_skb+0x1e0/0x430 [ 583.167437][ C0] ? sock_diag_bind+0xa0/0xa0 [ 583.167457][ C0] ? netlink_ack+0xb60/0xb60 [ 583.167473][ C0] ? lockdep_hardirqs_on+0x94/0x140 [ 583.167499][ C0] sock_diag_rcv+0x26/0x40 [ 583.167517][ C0] netlink_unicast+0x774/0x920 [ 583.167542][ C0] netlink_sendmsg+0x8ab/0xbc0 [ 583.167560][ C0] ? lockdep_hardirqs_on+0x94/0x140 [ 583.167582][ C0] ? netlink_getsockopt+0x560/0x560 [ 583.167603][ C0] ? bpf_lsm_socket_accept+0x10/0x10 [ 583.167622][ C0] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 583.167639][ C0] ? security_socket_sendmsg+0x7c/0xa0 [ 583.167655][ C0] ? netlink_getsockopt+0x560/0x560 [ 583.167675][ C0] ____sys_sendmsg+0x5a2/0x8c0 [ 583.167697][ C0] ? memset+0x1e/0x40 [ 583.167714][ C0] ? __sys_sendmsg_sock+0x30/0x30 [ 583.167737][ C0] ? import_iovec+0x6f/0xa0 [ 583.167758][ C0] ___sys_sendmsg+0x1f0/0x260 [ 583.167780][ C0] ? __sys_sendmsg+0x250/0x250 [ 583.167820][ C0] __se_sys_sendmsg+0x190/0x250 [ 583.167838][ C0] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 583.167856][ C0] ? __x64_sys_sendmsg+0x80/0x80 [ 583.167882][ C0] ? syscall_enter_from_user_mode+0x2a/0x70 [ 583.167902][ C0] do_syscall_64+0x4c/0xa0 [ 583.167917][ C0] ? clear_bhb_loop+0x30/0x80 [ 583.167931][ C0] ? clear_bhb_loop+0x30/0x80 [ 583.167947][ C0] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 583.167964][ C0] RIP: 0033:0x7f8c1146aec9 [ 583.167982][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 583.167995][ C0] RSP: 002b:00007f8c0f6d2038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 583.168011][ C0] RAX: ffffffffffffffda RBX: 00007f8c116c1fa0 RCX: 00007f8c1146aec9 [ 583.168023][ C0] RDX: 0000000008004000 RSI: 0000200000000000 RDI: 0000000000000004 [ 583.168034][ C0] RBP: 00007f8c114edf91 R08: 0000000000000000 R09: 0000000000000000 [ 583.168044][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 583.168054][ C0] R13: 00007f8c116c2038 R14: 00007f8c116c1fa0 R15: 00007fff88413428 [ 583.168076][ C0] [ 583.508780][T14224] rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 0-... } 10593 jiffies s: 31545 root: 0x1/. [ 584.111577][T14224] rcu: blocking rcu_node structures (internal RCU debug): [ 584.119007][T14224] Task dump for CPU 0: [ 584.123204][T14224] task:syz.2.3748 state:R running task stack:23904 pid:14901 ppid: 9861 flags:0x0000400c [ 584.134356][T14224] Call Trace: [ 584.137768][T14224] [ 584.140725][T14224] ? __schedule+0x11c3/0x4390 [ 584.145478][T14224] ? lock_chain_count+0x20/0x20 [ 584.150383][T14224] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 584.156170][T14224] ? perf_trace_preemptirq_template+0x2be/0x380 [ 584.162711][T14224] ? mark_lock+0x94/0x320 [ 584.167170][T14224] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 584.173190][T14224] ? lock_chain_count+0x20/0x20 [ 584.178108][T14224] ? rcu_is_watching+0x11/0xa0 [ 584.182909][T14224] ? sysvec_apic_timer_interrupt+0x80/0xc0 [ 584.188778][T14224] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 584.195003][T14224] ? inet_diag_dump_icsk+0x80c/0x13c0 [ 584.200434][T14224] ? inet_diag_bc_sk+0x10c0/0x10c0 [ 584.205642][T14224] ? __inet_diag_dump+0x1f6/0x380 [ 584.210706][T14224] ? inet_diag_dump_compat+0x161/0x200 [ 584.216219][T14224] ? __phys_addr+0x95/0x170 [ 584.220779][T14224] ? inet_diag_dump_start_compat+0x20/0x20 [ 584.226645][T14224] ? __sanitizer_cov_trace_pc+0x55/0x60 [ 584.232240][T14224] ? memset+0x1e/0x40 [ 584.236287][T14224] ? __alloc_skb+0x473/0x750 [ 584.240907][T14224] ? netlink_dump+0x676/0xcd0 [ 584.245666][T14224] ? netlink_lookup+0x1d0/0x1d0 [ 584.250551][T14224] ? __inet_diag_dump_start+0x805/0x970 [ 584.256154][T14224] ? __netlink_dump_start+0x523/0x700 [ 584.261703][T14224] ? inet_diag_rcv_msg_compat+0x1e9/0x3c0 [ 584.267482][T14224] ? inet_diag_unregister+0xb0/0xb0 [ 584.272714][T14224] ? __mutex_trylock_common+0x9d/0x250 [ 584.278246][T14224] ? mutex_lock_io_nested+0x60/0x60 [ 584.283476][T14224] ? __inet_diag_dump+0x380/0x380 [ 584.288653][T14224] ? inet_diag_dump_start_compat+0x20/0x20 [ 584.294491][T14224] ? inet_diag_dump+0x50/0x50 [ 584.299487][T14224] ? dev_queue_xmit+0x20/0x20 [ 584.304187][T14224] ? memcpy+0x3c/0x60 [ 584.308222][T14224] ? sock_diag_rcv+0x17/0x40 [ 584.312843][T14224] ? sock_diag_rcv+0x17/0x40 [ 584.317497][T14224] ? inet_diag_unregister+0xb0/0xb0 [ 584.322722][T14224] ? sock_diag_rcv_msg+0x164/0x3e0 [ 584.327899][T14224] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 584.333913][T14224] ? netlink_rcv_skb+0x1e0/0x430 [ 584.338911][T14224] ? sock_diag_bind+0xa0/0xa0 [ 584.343621][T14224] ? netlink_ack+0xb60/0xb60 [ 584.348277][T14224] ? lockdep_hardirqs_on+0x94/0x140 [ 584.353526][T14224] ? sock_diag_rcv+0x26/0x40 [ 584.358169][T14224] ? netlink_unicast+0x774/0x920 [ 584.363147][T14224] ? netlink_sendmsg+0x8ab/0xbc0 [ 584.368146][T14224] ? lockdep_hardirqs_on+0x94/0x140 [ 584.373390][T14224] ? netlink_getsockopt+0x560/0x560 [ 584.378686][T14224] ? bpf_lsm_socket_accept+0x10/0x10 [ 584.384008][T14224] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 584.389439][T14224] ? security_socket_sendmsg+0x7c/0xa0 [ 584.394927][T14224] ? netlink_getsockopt+0x560/0x560 [ 584.400180][T14224] ? ____sys_sendmsg+0x5a2/0x8c0 [ 584.405184][T14224] ? memset+0x1e/0x40 [ 584.409192][T14224] ? __sys_sendmsg_sock+0x30/0x30 [ 584.414257][T14224] ? import_iovec+0x6f/0xa0 [ 584.418820][T14224] ? ___sys_sendmsg+0x1f0/0x260 [ 584.423711][T14224] ? __sys_sendmsg+0x250/0x250 [ 584.428601][T14224] ? __se_sys_sendmsg+0x190/0x250 [ 584.433657][T14224] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 584.439949][T14224] ? __x64_sys_sendmsg+0x80/0x80 [ 584.444927][T14224] ? syscall_enter_from_user_mode+0x2a/0x70 [ 584.450881][T14224] ? do_syscall_64+0x4c/0xa0 [ 584.455520][T14224] ? clear_bhb_loop+0x30/0x80 [ 584.460220][T14224] ? clear_bhb_loop+0x30/0x80 [ 584.464931][T14224] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 584.471089][T14224]