last executing test programs: 6m45.848602795s ago: executing program 2 (id=325): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5}, 0x94) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r0, &(0x7f0000000500)={&(0x7f0000000100)={0x2, 0x4624, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000080)=ANY=[], 0x20}, 0x4004080) socket$kcm(0x2, 0x3, 0x2) r1 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x2}, 0x50) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x200048cc) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000), 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0xd, &(0x7f0000000080), 0x24) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 6m45.622354533s ago: executing program 2 (id=327): socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x3, 0x1, 0xa, 0x0, 0x0, 0x8000000004, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000001946}, 0x0, 0x0, 0x403, 0x6, 0x3fe, 0x80000004, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x830d}, 0xd900, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair(0x22, 0x8000c, 0x23, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) r5 = syz_clone(0x80100000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r5, r4, 0x0, 0x0, 0x0}, 0x30) r6 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r7 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r7, 0x29, 0x4a, 0x0, 0x0) r8 = perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r8, 0x2405, r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0xb, &(0x7f0000000840)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r10, 0x5, 0x0, 0x0, 0x0, 0x0, 0x149c, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe}, 0x50) r11 = perf_event_open$cgroup(&(0x7f0000000540)={0x4, 0x80, 0x0, 0xb3, 0x6, 0x1, 0x0, 0xfffffffffffff000, 0xa0600, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0xb, 0xd}, 0x4840, 0x5, 0x1, 0x0, 0x1, 0x9, 0x1, 0x0, 0x40a, 0x0, 0x4}, 0xffffffffffffffff, 0x4, r0, 0x5) sendmsg$unix(r2, &(0x7f00000006c0)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000240)}, {&(0x7f00000002c0)="19df6629119e38833739f71a751c2252176f52595f8338d626893e8d8f9c855d528b6b6c87b8c842dbc8723cd47b410f48d2d1620641c465da92555332eec1713c61e5f61937a20841a710f0195011d3280b676b88a9daf149d4c6e7c1d1b02214974a2346edbac984810959b89d880280bb9cc26c56676ec72acb6d13364d2ec8965a136e572abc734e48", 0x8b}, {0x0}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r2, @ANYRES32, @ANYRES32=r3, @ANYRES32=r0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r7, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r8, @ANYRES32=r10, @ANYRES32=r0, @ANYBLOB="000000800100e0ff", @ANYRES32=r11, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r2], 0xe8, 0xc000}, 0xd4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) syz_clone(0xa49a4080, 0x0, 0x700, 0x0, 0x0, 0xfffffffffffffffc) socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) 6m44.481286256s ago: executing program 2 (id=335): socket$kcm(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200008000000000000000000000008500000027000000850000007d0000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x46) 6m44.245082225s ago: executing program 2 (id=338): perf_event_open$cgroup(&(0x7f00000005c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, @perf_config_ext={0x40000000000008, 0x100000001}, 0x880, 0x800, 0x0, 0x0, 0x7, 0x4, 0xffff, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2d, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x89}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x15, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, 0xfffffffffffffffe) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x18, r0}, 0x18) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x5, 0x40, 0x7, 0x0, 0x7fffffff, 0x9d6d1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x722, 0xb}, 0x800, 0x1, 0x7, 0x4, 0x81, 0x4, 0x5, 0x0, 0x4000000, 0x0, 0x80000001}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 6m43.850535347s ago: executing program 2 (id=341): socket$kcm(0xa, 0x1, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000640)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_fd, @exit, @exit, @ringbuf_query]}, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x1}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r1) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0x12, &(0x7f00000008c0)=r4, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1b, 0xd, &(0x7f00000002c0)=ANY=[], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r5}, 0x6) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r5) r6 = socket$kcm(0xa, 0x3, 0x11) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x80108907, 0x0) r7 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)="48000000140081fb7059ae08060c04000aff0f03000004000011000000006fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f", 0x48}], 0x1}, 0x0) 6m42.472592419s ago: executing program 2 (id=346): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x29, 0x0, 0x0) (async) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 6m42.004148177s ago: executing program 32 (id=346): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x29, 0x0, 0x0) (async) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 1m20.184354075s ago: executing program 3 (id=2332): r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x200048cc) sendmsg$kcm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000140)="a3a88667", 0x4}], 0x1}, 0x4) sendmsg$inet(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x8040) sendmsg$inet(r0, 0x0, 0x20000001) 1m19.796419346s ago: executing program 3 (id=2335): socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x3, 0x1, 0xa, 0x0, 0x0, 0x8000000004, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000001946}, 0x0, 0x0, 0x403, 0x6, 0x3fe, 0x80000004, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x830d}, 0xd900, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair(0x22, 0x8000c, 0x23, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = syz_clone(0x80100000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r6, r4, 0x0, 0x0, 0x0}, 0x30) r7 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r8 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r8, 0x29, 0x4a, 0x0, 0x0) r9 = perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0xb, &(0x7f0000000840)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x149c, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe}, 0x50) r12 = perf_event_open$cgroup(&(0x7f0000000540)={0x4, 0x80, 0x0, 0xb3, 0x6, 0x1, 0x0, 0xfffffffffffff000, 0xa0600, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0xb, 0xd}, 0x4840, 0x5, 0x1, 0x0, 0x1, 0x9, 0x1, 0x0, 0x40a, 0x0, 0x4}, 0xffffffffffffffff, 0x4, r0, 0x5) sendmsg$unix(r2, &(0x7f00000006c0)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000240)="486065d61d64108ec73ef3ff44c32da9b5b45a15bac75f710a128a93b2eebd68c7b9d64465dc80177a0df15423b0c74b6344a67cd38c4905a0c2c11ead47945747b6fc456d6525a7ea1060f61ff10c2a79593661e53c1cfaad1303a1891bd80a39cb833a0713e7927e08da2c12bb9b84e0304ced69adedae189ec719c15491", 0x7f}, {&(0x7f00000002c0)="19df6629119e38833739f71a751c2252176f52595f8338d626893e8d8f9c855d528b6b6c87b8c842dbc8723cd47b410f48d2d1620641c465da92555332eec1713c61e5f61937a20841a710f0195011d3280b676b88a9daf149d4c6e7c1d1b02214974a2346edbac984810959b89d880280bb9cc26c56676ec72acb6d13364d2ec8965a136e572abc734e48", 0x8b}, {0x0}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="1c0000000000000001000000", @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r7, @ANYRES32=r2, @ANYRES32, @ANYRES32=r0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r8, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r9, @ANYRES32=r11, @ANYRES32=r0, @ANYBLOB="000000800100e0ff", @ANYRES32=r12, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r2], 0xe8, 0xc000}, 0xd4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) syz_clone(0xa49a4080, 0x0, 0x700, 0x0, 0x0, 0xfffffffffffffffc) socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) 1m18.501661061s ago: executing program 3 (id=2340): r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000980)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8923, &(0x7f0000000140)={'pim6reg1\x00', @link_local={0x1, 0x80, 0xc2, 0x25, 0x64, 0x2}}) 1m17.835297435s ago: executing program 3 (id=2348): r0 = socket$kcm(0xa, 0x5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_devices(r2, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x3, 0x73) sendmsg$inet(r3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x0, 0x0, 0x0, 0x9}, 0x48) r4 = socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.kill\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x890b, &(0x7f0000000000)) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x200, 0x80220, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x411, 0x1, 0xc, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, 0x0) mkdir(0x0, 0x12a) sendmsg$inet(r0, &(0x7f0000002100)={&(0x7f0000000200)={0x2, 0x4e20, @loopback}, 0x10, &(0x7f0000001d80)=[{&(0x7f00000007c0)="2c2c1723", 0x4}], 0x1, &(0x7f0000000000)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @local}}}], 0x38}, 0x40) 1m17.830723905s ago: executing program 5 (id=2349): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x400, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r1, &(0x7f00000031c0)={&(0x7f00000006c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000b40)="b5640a", 0x3}], 0x1, &(0x7f0000000580)=ANY=[], 0x18}, 0x8080) sendmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000100)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000240)=[{0x0}], 0x1, 0x0, 0x0, 0x900}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001b40)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) r2 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r2, 0x1, 0x41, &(0x7f0000000040), 0x4) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0x16}, 0x94) r4 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f8481f0000005e", 0x19}], 0x1}, 0x20) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="1c00ffc35e"], 0xfe33) 1m17.476742974s ago: executing program 5 (id=2353): r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='!--}\x00') perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x32, &(0x7f0000000040), 0xcf) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r2, &(0x7f0000000280)="1ebaf460b5695c6119836a99cd5bce3e160c24a5da3bfc0d96789e9074a2f0843093bd6bd8ae32f84ed46ba11b9997ba41cfc1771370f6d97e49b41f5799856aea27d315008aeca1127b3b4fd76a34a0e16f31e7d0bcdd64", &(0x7f0000000300)=""/80}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x2000000, 0x11, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1m17.292283458s ago: executing program 3 (id=2356): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x2000000, 0x5e, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0xc69a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1m16.996795672s ago: executing program 5 (id=2358): socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) socket$kcm(0x18, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socket$kcm(0x10, 0x100000000002, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="12000000070000000800000002"], 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.idle_time\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x3, 0x2) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x4) sendmsg$inet(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10, 0x0}, 0x20000040) 1m16.626576282s ago: executing program 5 (id=2362): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000000240)=@raw=[@ringbuf_query, @map_fd={0x18, 0xa}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}], 0x0, 0x95, 0x0, 0x0, 0x40f00, 0x4a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1f979, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x10000000}, 0x94) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x2, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810000850000007d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='sys_exit\x00', r0}, 0x18) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x43cd, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8910, &(0x7f0000000080)) 1m16.198401627s ago: executing program 5 (id=2365): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x14, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00'/28], 0x48) 1m15.91206725s ago: executing program 5 (id=2368): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x18082, 0x0, 0x6, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x10, 0x400000002, 0x0) syz_clone(0x10eb22f000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x2008, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0xc, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14185, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r3 = openat$cgroup_devices(r2, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r3, &(0x7f0000000000)={'a', ' *:* ', 'w\x00'}, 0x8) r4 = openat$cgroup_devices(r2, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) r5 = openat$cgroup_devices(r2, &(0x7f0000000580)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="63202a3a2a206d00c8d2b8092600abb8e0d1"], 0x8) write$cgroup_devices(r4, 0x0, 0x9) syz_clone(0x24001100, 0x0, 0x8, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000040)="100000002d000b02d25a806f8c6394f9101a04000a7401", 0x17}], 0x1}, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="934300005a0033d487277b9b108b4ab502", @ANYRES32, @ANYRES8=r0], 0xfe33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x27, 0x4, 0x3, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000180)={r7}) close(r7) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0xc, 0xfc, 0x4, 0x4, 0x0, 0x7, 0x404, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_bp={0x0, 0x3}, 0x118903, 0x100003, 0x3, 0x2, 0x7f, 0xffffffff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x1b) recvmsg$unix(r6, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x2002) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000010040), 0x0, r9, 0x4}, 0x38) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='blkio.bfq.idle_time\x00', 0x26e1, 0x0) close(r10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff229, 0x1, @perf_config_ext={0x80000005, 0x1}, 0x8041, 0x7, 0x0, 0x0, 0x0, 0x7, 0x200, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r11, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000900)="89000000120081ae08060cdc030ec0007f03e3f7feff000000e2ffca1b1f0000000004c00e72f750375ed08a56331dbf00d7815e381ad6e706033a0093b837dc6cc01e32efaec8c7a6ec08123d000200354001000400446b9bbc7a46e3988285dcdf12f21308f868fece01951fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r10, 0x7, '\x00', 0x0, r10, 0x4}, 0x50) 1m14.817779929s ago: executing program 3 (id=2373): socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x3, 0x1, 0xa, 0x0, 0x0, 0x8000000004, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000001946}, 0x0, 0x0, 0x403, 0x6, 0x3fe, 0x80000004, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x830d}, 0xd900, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair(0x22, 0x8000c, 0x23, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = syz_clone(0x80100000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r6, r4, 0x0, 0x0, 0x0}, 0x30) r7 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r8 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r8, 0x29, 0x4a, 0x0, 0x0) r9 = perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0xb, &(0x7f0000000840)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x149c, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe}, 0x50) r12 = perf_event_open$cgroup(&(0x7f0000000540)={0x4, 0x80, 0x0, 0xb3, 0x6, 0x1, 0x0, 0xfffffffffffff000, 0xa0600, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0xb, 0xd}, 0x4840, 0x5, 0x1, 0x0, 0x1, 0x9, 0x1, 0x0, 0x40a, 0x0, 0x4}, 0xffffffffffffffff, 0x4, r0, 0x5) sendmsg$unix(r2, &(0x7f00000006c0)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000240)="486065d61d64108ec73ef3ff44c32da9b5b45a15bac75f710a128a93b2eebd68c7b9d64465dc80177a0df15423b0c74b6344a67cd38c4905a0c2c11ead47945747b6fc456d6525a7ea1060f61ff10c2a79593661e53c1cfaad1303a1891bd80a39cb833a0713e7927e08da2c12bb9b84e0304ced69adedae189ec719c15491", 0x7f}, {&(0x7f00000002c0)="19df6629119e38833739f71a751c2252176f52595f8338d626893e8d8f9c855d528b6b6c87b8c842dbc8723cd47b410f48d2d1620641c465da92555332eec1713c61e5f61937a20841a710f0195011d3280b676b88a9daf149d4c6e7c1d1b02214974a2346edbac984810959b89d880280bb9cc26c56676ec72acb6d13364d2ec8965a136e572abc734e48", 0x8b}, {0x0}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="1c0000000000000001000000", @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r7, @ANYRES32=r2, @ANYRES32, @ANYRES32=r0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r8, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r9, @ANYRES32=r11, @ANYRES32=r0, @ANYBLOB="000000800100e0ff", @ANYRES32=r12, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r2], 0xe8, 0xc000}, 0xd4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) syz_clone(0xa49a4080, 0x0, 0x700, 0x0, 0x0, 0xfffffffffffffffc) socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) 1m14.335404328s ago: executing program 33 (id=2373): socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x3, 0x1, 0xa, 0x0, 0x0, 0x8000000004, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000001946}, 0x0, 0x0, 0x403, 0x6, 0x3fe, 0x80000004, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x830d}, 0xd900, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair(0x22, 0x8000c, 0x23, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = syz_clone(0x80100000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r6, r4, 0x0, 0x0, 0x0}, 0x30) r7 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r8 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r8, 0x29, 0x4a, 0x0, 0x0) r9 = perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0xb, &(0x7f0000000840)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x149c, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe}, 0x50) r12 = perf_event_open$cgroup(&(0x7f0000000540)={0x4, 0x80, 0x0, 0xb3, 0x6, 0x1, 0x0, 0xfffffffffffff000, 0xa0600, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0xb, 0xd}, 0x4840, 0x5, 0x1, 0x0, 0x1, 0x9, 0x1, 0x0, 0x40a, 0x0, 0x4}, 0xffffffffffffffff, 0x4, r0, 0x5) sendmsg$unix(r2, &(0x7f00000006c0)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000240)="486065d61d64108ec73ef3ff44c32da9b5b45a15bac75f710a128a93b2eebd68c7b9d64465dc80177a0df15423b0c74b6344a67cd38c4905a0c2c11ead47945747b6fc456d6525a7ea1060f61ff10c2a79593661e53c1cfaad1303a1891bd80a39cb833a0713e7927e08da2c12bb9b84e0304ced69adedae189ec719c15491", 0x7f}, {&(0x7f00000002c0)="19df6629119e38833739f71a751c2252176f52595f8338d626893e8d8f9c855d528b6b6c87b8c842dbc8723cd47b410f48d2d1620641c465da92555332eec1713c61e5f61937a20841a710f0195011d3280b676b88a9daf149d4c6e7c1d1b02214974a2346edbac984810959b89d880280bb9cc26c56676ec72acb6d13364d2ec8965a136e572abc734e48", 0x8b}, {0x0}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="1c0000000000000001000000", @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32=r7, @ANYRES32=r2, @ANYRES32, @ANYRES32=r0, @ANYBLOB="0000000034000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r8, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r9, @ANYRES32=r11, @ANYRES32=r0, @ANYBLOB="000000800100e0ff", @ANYRES32=r12, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r2], 0xe8, 0xc000}, 0xd4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) syz_clone(0xa49a4080, 0x0, 0x700, 0x0, 0x0, 0xfffffffffffffffc) socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) 1m0.680067682s ago: executing program 34 (id=2368): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x18082, 0x0, 0x6, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x10, 0x400000002, 0x0) syz_clone(0x10eb22f000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x2008, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0xc, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14185, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r3 = openat$cgroup_devices(r2, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r3, &(0x7f0000000000)={'a', ' *:* ', 'w\x00'}, 0x8) r4 = openat$cgroup_devices(r2, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) r5 = openat$cgroup_devices(r2, &(0x7f0000000580)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="63202a3a2a206d00c8d2b8092600abb8e0d1"], 0x8) write$cgroup_devices(r4, 0x0, 0x9) syz_clone(0x24001100, 0x0, 0x8, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000040)="100000002d000b02d25a806f8c6394f9101a04000a7401", 0x17}], 0x1}, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="934300005a0033d487277b9b108b4ab502", @ANYRES32, @ANYRES8=r0], 0xfe33) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x27, 0x4, 0x3, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000180)={r7}) close(r7) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0xc, 0xfc, 0x4, 0x4, 0x0, 0x7, 0x404, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_bp={0x0, 0x3}, 0x118903, 0x100003, 0x3, 0x2, 0x7f, 0xffffffff, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x1b) recvmsg$unix(r6, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x2002) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000010040), 0x0, r9, 0x4}, 0x38) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='blkio.bfq.idle_time\x00', 0x26e1, 0x0) close(r10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff229, 0x1, @perf_config_ext={0x80000005, 0x1}, 0x8041, 0x7, 0x0, 0x0, 0x0, 0x7, 0x200, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r11, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000900)="89000000120081ae08060cdc030ec0007f03e3f7feff000000e2ffca1b1f0000000004c00e72f750375ed08a56331dbf00d7815e381ad6e706033a0093b837dc6cc01e32efaec8c7a6ec08123d000200354001000400446b9bbc7a46e3988285dcdf12f21308f868fece01951fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r10, 0x7, '\x00', 0x0, r10, 0x4}, 0x50) 6.244459535s ago: executing program 6 (id=2800): r0 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='V?2?-\x00Y'], 0xfe33) 5.640520783s ago: executing program 6 (id=2804): ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x40086602, 0x110e22fff6) r0 = gettid() perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="d80000003200b904021d080005000400e8fe55a1180015000600142603600e120900210000090401a80016000a00014006000000036010faa000cf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbac3c7f4b497148599f9ce8017cbec4c2ee5a7cef4090000001fb791643a95e4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93450000000000000000", 0xd8}], 0x1}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="2b637075200dde1215ffb4415ffc60b774cc5aa53a98a42b22f46d48572ccaa4f4e4cd9c3f6cf9c12f1a2f95254f206f7383f7e8f3b9304be1ee5ec5f56cc547fd5ff559b3c76e89a913629d58"], 0x5) openat$cgroup_int(r2, 0x0, 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[], 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x94) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x10c2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x4, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbfd, 0x3, 0x802, 0x9, 0x8, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) socket$kcm(0x10, 0x2, 0x0) 5.205503019s ago: executing program 6 (id=2813): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000ec0)="d80000001d0081044e81f782db44b904021d080500000000040000a1180002000000000000000e1208000f0100810401a8001600200001400300000803600cfab94dcf5c0461c16f94007134cf6ee08000a0e408e8d8ef075c11503c6baace801bcb090000001fb791643a5ee4001b146218a07445d6d930dfe1d9d322fe7c9fd6bc09000000000000002483916ddf50b8b351f55551715b52facb", 0x9b}, {&(0x7f00000006c0)="54f6d4d87eb3f1c0c5", 0x9}, {&(0x7f0000000980)="027a64c0072ebbb1512b328dda11b4efd4ba07fc642b7e012bea071dbbdea51e41958755533ccce04d3e635cbe848495e723490d", 0x34}], 0x3, 0x0, 0x0, 0x7400}, 0x10) r1 = socket$kcm(0xa, 0x1, 0x106) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0a00000004000000060000000700000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="4000000008000000ffffffff"], 0x50) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000580)="d8000000140081054e81f782db44b904021d080225000000040000a118000200fcffffff00000e1208000f0100810401a80016ea1f0006", 0x37}], 0x1, 0x0, 0x0, 0x7400}, 0x0) sendmsg$inet(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000000c0)="40eea4812c6cc49c0d8d633d2a2dcef54a3c3ecab53261ef7c115562ecc609c42ba6e52853108567d364fc1ffbaf0674ba899606fde67a78a0cd4bcad09722e813b4ea1c4e4c5b3f0fd07b31972507fdb2ea7bee914f82ce16e1762fea", 0x5d}, {&(0x7f0000000000)="cdc7aac7e7ea3ba03405d722550ceaad7c436a994dc45ff7607a324ea8bbe5bea582b62df0133d", 0x27}, {&(0x7f0000000140)="3de05b590d23d1e2fd3ce1aa768457c18463b31141a14df64a1343b9aafb222b689d88ed8f621763baecd82019ed96945474b6daa5e5a47b1616545cc5bba198569e2253402f4e48c331f5a4685ffc38836bf646430b0078d1482aef1e938e9fc5cc942e3eee24fce9611352f9e24ab26f8ae4af3c8a", 0x76}, {&(0x7f00000001c0)="372fe82d012d1efa5390d62fb7791b922b82b5f1964e3fa9edbbcd3831975f8a494fb52cf51c83516df176f84a1080ffa68756a1a7966c1cd0123b6f758529928fde3a014c7b08ed07ff73a20d61fa2eb056c7a421e8281443ac3a5f81fe5c5645febcda191942cc20a0ff84939f7e8b8276087bfc59fd5cca79976802002366f2a4a7de4992f9837b6f1463ebb9726402a971e69a7570833f7f87c470615519875102b81a95cfe9f2c7711363d5eb563323c1b02510138482939731cdc9a77752c32c09fa9dd6bc617302a22e4ace1d23adea", 0xd3}, {&(0x7f00000002c0)="9037b53f7aa466a3ed04ae5a5a033ba41079bfa99979e38af94ebe12af3a415de21a791504b4ec990ac7ccf8bab25501180ce61d8fd4a42c3b027c", 0x3b}, {&(0x7f0000000300)="22047606da22724f05405eff3c90a9f2d6a704be5f45f4a85eda16f561174360fc8d7ccdefe2d1c310ed2e7b26b2ce8d73ad05b5b01f2182bb86916d1a0ffa4e25de56e4044f38d1e3fc057b5a1d1a63b1ae4c653f707b30aabd3c270c7860ac572a6ea5b8e7a9c4b03a84a6df93fc6f4e60551d587a800c238b972963d9", 0x7e}, {&(0x7f0000000380)="17ddc3531391fc769fa38fb34e05b1f66af0a21b658685775bdd43abd6d4d1cefc0cfed3ed9c98e12b7fb33d1e5f61e52ae835da8e7d44ae103341c41623236974d024651c59c148b100fb0e36eab601117870930f4d9d7549a029e558d0de5afd28732cd0eb3bc7d9d50d9177bdab5c6cc680a267a566cb5053f7a0ed12", 0x7e}, {&(0x7f0000000400)="558cc2c1c2757820435156d9c66520ba5b14282d62a29e4e038ff4e0f808ee0f2b6fb5a58900a9d7ab5f205135d7ef9c5249611e21bfe80dd68f8e79acb0d8261c909a605cac559f5ac89c023dfb7c44d8aa74db7eef4afe8e30fe100fb1b2f15839200ca8adc809488577c2a455c8da7cdc962ee0f3d4313a2a2d3635a306bb7d252f94e9f5914c1d26089dda6b9c8704e5c3c7b59f5d71cd53e57af226991f7f344f55c50783d4b2224267b1edeb11c82d9ed3722f375fb6022945995cbae387b3af72f77f45d17626e56cf56db563f84b94797f447abb1502a4801d852b7295b8f01bd3bdfeca62", 0xe9}, {&(0x7f00000005c0)="10eb742ae71b3b9de44e10b22f09315328e3bc6ff148143a99723072c7a6bbccf60c451fa5b600c464f1bf463e66ff419361a0b0f11053a2d2c9458b52b1ea4ee434acff88ea184e1f6c8ba2256a72cf8b7635d2b7cc5f65d20d58f3d5a388482c01b1f03203ad2a3401d991a1d6ca46815f00f24ab2cce72a842fa8fecbc1a702e558b6b0b77f14b50687deffa99dbb22a1e245a76cbe67f2f1e102ac60ddfbc4a8500b712d455016a57c22b9383603ec0049f26b0934fb98999b63ec287100dea4d5e584bfa4ca866fc5bffbbe9aa21308185ab680154897236abb05969626b4e8bd1000df2d2f", 0xe8}, {&(0x7f0000000500)="dcfbda00048d748493264b", 0xb}], 0xa, &(0x7f0000000540)=[@ip_tos_int={{0x14}}], 0x18}, 0x4000000) r2 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000580)=ANY=[], 0xfe33) setsockopt$sock_attach_bpf(r1, 0x29, 0x10, 0x0, 0x0) 4.666090062s ago: executing program 7 (id=2818): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000020042000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0xc, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000341200007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r3 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) close(r3) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0x0, 0x0}, 0x10) (async, rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000006, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xe) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r3, &(0x7f00000000c0)="f7dab261c05956bb933630475b19a0edc1771a55bad60bde30732604f0fe70c1a1af01b9fee3032bb84086c23b015f5ff2ce01c5143d8492db91d136bbc5fba78a4cf3745d800b49233983d8d45ebf", &(0x7f0000000180)=""/123, 0x4}, 0x20) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r5}, &(0x7f0000000000), &(0x7f0000000040)=r1}, 0x20) (rerun: 64) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x5, &(0x7f0000000180), 0x43) (async) sendmsg$inet(r6, &(0x7f0000000140)={&(0x7f0000000880)={0x2, 0x4e20, @multicast2}, 0x10, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32, @ANYBLOB="ac1414bb008000000000000038000000000000000000000007000000070e43aa5889c23ef593ae6bcd1844187c8073b5c9e00000000600000003000000080000000900001400000000000000000000000100000005000000000000001400000000000000000000000700000001000000000000001400000000000000000000000100000003000000000000001c000000000000000000000008"], 0xc0}, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x149c, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe}, 0x50) 4.596963658s ago: executing program 6 (id=2819): r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x43cd, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001ac0)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8910, &(0x7f0000000080)) 4.418097833s ago: executing program 7 (id=2821): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000004c0)="2e00000010008188e6b62aa73772cc9f1ba1f848030000005e140602000000000e000a000d000000028000001294", 0xfffffffffffffd00}, {&(0x7f0000000280)="02fcc1f2431c620c4b740f67d15d37a94d8b417360a0a0996e191adc2fbf309dd7b32b8529ddc996501391a681b8702b5ce085562a39dc8733837e8c01746a72b22ab0fe10", 0x45}, {&(0x7f0000000300)="0ccca7e76ca56af5e9bb65a788b8a2a56bdb6d142842c38a5a19d79e574b280893999fa9b35c3b8a649e8a5acbc41b13ee330cab8da1ee9a39dd474fe99aee4219077874ae0d043179591d10c47ee7baf142eb18cfa8ad71f37faa3f15234824e2731df17c7bd07bd02e37d57952094b8892207ee3a063bc1a0f77a7decf4535fddac3184c60f6e60c836371575149802d6cec83f9c8e7280ab0a7aa34c6fd7c4dd0d109b133b9d0ee485ef9bc2f9a3c5b76716f00d0703d36a606ec7f", 0xbd}], 0x3}, 0xa000000) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000400018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f00000008c0), 0x43) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x16, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="660a00000000000061114e0000000000850000001a0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x80) r5 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r6 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f00000008c0), 0x43) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[], 0xfdef) close(r6) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x7d}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x13}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d00)={r7, 0x0, 0x0, 0x99, 0x0, &(0x7f0000000b40)=""/153, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x20, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000011008b88040f80ec59acbc0413a1f8480f0000005e2900421803001825000a001400000002800000121f", 0x2e}], 0x1}, 0x0) socketpair(0x1d, 0x3, 0x1, &(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000000000)={r0}) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000002940)="2000000020008107090f9becdb4cb96b0200000000fbff010000000000000000", 0x20}], 0x1, 0x0, 0x0, 0x81000000}, 0x4) 4.285581763s ago: executing program 6 (id=2823): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="0c38f0ff10"], 0x0, 0x42, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7fb}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000c9"], 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000c9"], 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2da, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x2, @perf_config_ext={0x681d3738, 0x1efb}, 0x5, 0xc8, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7498, 0x0, 0x1000000000000}, 0x0, 0x7f8, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa067707"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) (async) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) r3 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="600000004e007f049e", 0x12}, {&(0x7f0000000180)="78cabf2dfb73fc0a7d0a0080f2dcb9fe06892544001100b8f9e6aaeb1ae2f6e8bcb5ee52dc06249798093c5102a1bca0b646a7ce904f6e6b788b3219c233e60ddc36024a99a63e729f9b06f96137c89d03234f008c5681", 0x57}], 0x2}, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000500)={0x1, 0x80, 0x3, 0x4, 0x1, 0x8, 0x0, 0x2, 0x11000, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0x1f8, 0x4b9de8f4}, 0x18, 0x4e1a, 0x10000000, 0x0, 0x231e, 0x7, 0x81, 0x0, 0xd0, 0x0, 0xffffffffffffff89}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, 0x0, 0x5}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, 0x0, 0x5}, 0x94) socket$kcm(0x2, 0x3, 0x2) (async) socket$kcm(0x2, 0x3, 0x2) r5 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r5, &(0x7f0000000640)={&(0x7f00000000c0)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x32}}, 0xff96, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x200048cd) setsockopt$sock_attach_bpf(r5, 0x1, 0xd, &(0x7f0000000080), 0x24) close(r5) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x6, 0x1, 0x80, 0xde, 0x0, 0xa83, 0xc2772, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x7}, 0x10, 0x8001, 0x4, 0x7, 0x2, 0x400, 0xffff, 0x0, 0xe, 0x0, 0x7}, 0xffffffffffffffff, 0xd, r4, 0x8) (async) r6 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x6, 0x1, 0x80, 0xde, 0x0, 0xa83, 0xc2772, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0x7}, 0x10, 0x8001, 0x4, 0x7, 0x2, 0x400, 0xffff, 0x0, 0xe, 0x0, 0x7}, 0xffffffffffffffff, 0xd, r4, 0x8) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, @perf_bp={&(0x7f0000000600), 0x4}, 0x880, 0x800, 0x0, 0x0, 0x0, 0x7, 0xffff, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r6, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x8c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800, 0x0, 0x0, 0x2}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000800000000000fcffffff8500000027000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000170000009500000000000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000}, 0x69) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r7, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r7, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a0300fef0ffffff79a4f0ff00000000b7060000ffffffff2e64050000000000750afaff07cd02020404000000247d60b7030000030a00006a0a00fe0000000c850000003f000000b70000000000002995000000000000001da5ad3548ebb63d18c5071c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f0e5eb09d38ac46e99e7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8ef534b93dcb34e1da2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa380700000000000000c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82e3568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000500000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac64d9c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccfd8b129258bb0a93cee1d44f8665172c06933d20f184b78b435462c52a85149451ffd564c56a7cbf11a1127c77242915e43b2bc"], &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r8 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r8, &(0x7f0000000080)=ANY=[@ANYBLOB="2d6e65745f7072696f202d70696473202b706572665f6576656e74202d667265657a6572202d667265657a70ea20"], 0x2e) (async) write$cgroup_subtree(r8, &(0x7f0000000080)=ANY=[@ANYBLOB="2d6e65745f7072696f202d70696473202b706572665f6576656e74202d667265657a6572202d667265657a70ea20"], 0x2e) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="00000000000200"/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r9}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r9, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000000000248a0000b7080000020000007b8a00fe0000000087080000000000007b8a83ff00000000bda100000000000027000000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70400000800000085000000490000009500000000000000"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 3.660752734s ago: executing program 6 (id=2828): socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x3, 0x1, 0xa, 0x0, 0x0, 0x8000000004, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000001946}, 0x0, 0x0, 0x403, 0x6, 0x3fe, 0x80000004, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x830d}, 0xd900, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair(0x22, 0x8000c, 0x23, &(0x7f00000000c0)={0xffffffffffffffff}) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000007c0), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = syz_clone(0x80100000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r4, r2, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r5 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r5, 0x29, 0x4a, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r7) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0xb, &(0x7f0000000840)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x149c, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe}, 0x50) perf_event_open$cgroup(&(0x7f0000000540)={0x4, 0x80, 0x0, 0xb3, 0x6, 0x1, 0x0, 0xfffffffffffff000, 0xa0600, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0xb, 0xd}, 0x4840, 0x5, 0x1, 0x0, 0x1, 0x9, 0x1, 0x0, 0x40a, 0x0, 0x4}, 0xffffffffffffffff, 0x4, r0, 0x5) sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000240)}, {&(0x7f00000002c0)="19df6629119e38833739f71a751c2252176f52595f8338d626893e8d8f9c855d528b6b6c87b8c842dbc8723cd47b410f48d2d1620641c465da92555332eec1713c61e5f61937a20841a710f0195011d3280b676b88a9daf149d4c6e7c1d1b02214974a2346edbac984810959b89d880280bb9cc26c56676ec72acb6d13364d2ec8965a136e572abc734e48", 0x8b}, {0x0}], 0x3, 0x0, 0xe8, 0xc000}, 0xd4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) syz_clone(0xa49a4080, 0x0, 0x700, 0x0, 0x0, 0xfffffffffffffffc) socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) 3.156834954s ago: executing program 7 (id=2833): perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0xe, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0xa, 0x5, 0x0) (async) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=[{0x10, 0x84, 0x8}, {0x10, 0x84, 0x2}], 0x20}, 0x41) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8912, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8912, &(0x7f0000000080)) 2.992783418s ago: executing program 7 (id=2838): r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8923, &(0x7f0000000140)={'pim6reg1\x00', @link_local={0x1, 0x80, 0xc2, 0x25, 0x64, 0x2}}) 2.694081592s ago: executing program 7 (id=2844): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0xee, 0x0, 0x210e, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={&(0x7f0000000600), 0xb}, 0x14105, 0x32, 0xfffffbff, 0x3, 0x4, 0x0, 0xfffa, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="563f00001800599c6d0e00009bd029ef8020ab070004000523a608460400", @ANYRES16=r0], 0xfe33) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0xffffffff}, 0x8) sendmsg$kcm(r2, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000011008188e6b62aa73f72cc9f0ba1f8483d0000005e140602000000000e000a0010000000028000001294", 0x2e}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x28) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r3, &(0x7f0000000140), &(0x7f0000000000)=""/6, 0x2}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000800)={r3, &(0x7f0000000780)}, 0x20) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000580)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[], 0x50) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xd, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) r5 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}, 0xf5ffffff}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="80", 0xfdef}], 0x1}, 0x0) recvmsg$unix(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000700)=""/28, 0x1c}], 0x1, &(0x7f0000000000)=[@rights={{0x10}}], 0x10}, 0x22) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r6}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 1.97685792s ago: executing program 0 (id=2846): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x14, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00'/28], 0x48) 1.85687071s ago: executing program 0 (id=2848): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000340)}, 0x20) close(0x3) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x6}, 0x0, 0x2, 0xfffffffe, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) recvmsg$kcm(r1, 0x0, 0x40) r2 = socket$kcm(0x11, 0x3, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={&(0x7f0000000000)=@hci={0x1f, 0x4, 0x4}, 0x80, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x11a8}, 0x8800) close(r3) r4 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r4, 0x29, 0x22, &(0x7f0000000100), 0x120) write$cgroup_type(r3, &(0x7f0000000080), 0x11ffffce1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848200000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, 0x0, 0x0) 1.758048677s ago: executing program 1 (id=2849): socket$kcm(0x2, 0x2, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="d8000000210081044e81f782db44b9040200000000806c0100001500100014000000001209000d2000000401a80018000e400e4006000000036010fab94dcf5c0468c1d67f6f94007134cf6ee062e1c547cbc7225e6756cfb39b0590b4800089e408e8d8ef52b49816277cf4090000001fb791643a5ee4ce1b14d6d930dfe1d9db22fe7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db701000000eafad95667e006dcdf969b3ef35ce3bb9ad809d561cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d939acd92637429397f632838", 0xd8}], 0x1}, 0x0) (async) r1 = socket$kcm(0x10, 0x2, 0x0) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) (async) unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') (async) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x100008, 0x0, 0x0, 0x4, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$kcm(0xf, 0x3, 0x2) (async) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, 0x0, 0x0) (async) r3 = socket$kcm(0xa, 0x1, 0x106) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001000), 0x78202, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x3) (async) sendmsg$inet(0xffffffffffffffff, 0x0, 0x2000488c) socket$kcm(0x10, 0x2, 0x4) (async) sendmsg(r3, &(0x7f0000001680)={&(0x7f0000001300)=@qipcrtr={0x2a, 0x3, 0x7fff}, 0x80, &(0x7f0000001540)=[{&(0x7f0000001380)="52efeecb1998b3a7cfed28041c66a442ef613133a69db50fd116a7b28a56ef73555cb3329ce44e50e09f9a19092137dc869bd7612c01b0709f9541f76095c597c65f976d37bcd32e59890899be5ca3601d", 0x51}, {&(0x7f0000001400)="4e15483f2bf5ab72f2f860acd4d4f7", 0xf}], 0x2}, 0x4) (async) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d08007b490d4f1e81f8d815001b001105142603600e12080005007a010401a800160020e0034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993b134e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db7982652", 0xa2}], 0x1}, 0x44000) recvmsg$unix(r4, &(0x7f00000012c0)={&(0x7f0000001100), 0x6e, &(0x7f0000001040)=[{&(0x7f0000001180)=""/111, 0x6f}], 0x1, &(0x7f0000001200)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x88}, 0x100) r5 = socket$kcm(0x10, 0x2, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x4020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) sendmsg$inet(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001880)="5c00000012006bab9e3de3d86e6c1dffff137e0300000000000000b68675f8001d000a00a0e69ee517d34460bc24eab556a7e6241e6182949a36c23d3b48dfd8cdbf9367b4fa51f60a64c9f408000300060100000800030011000000", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) (async) recvmsg(r5, 0x0, 0x40000020) (async) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000d"], 0x48) 1.656865156s ago: executing program 4 (id=2850): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000002940)="2000fd0020008107090f9becdb4cb96b0200000000fbff010000000000000000", 0x20}], 0x1, 0x0, 0x0, 0x81000000}, 0x4) 1.633585628s ago: executing program 7 (id=2851): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000001db685000000230000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000a000000b703000000000000850000007500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='percpu_free_percpu\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r2) ioctl$SIOCSIFHWADDR(r2, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100ffffffff"}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r1, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0xbe, &(0x7f0000000440)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000500), &(0x7f0000000640), 0x8, 0xa6, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)={@fallback=r0, 0xffffffffffffffff, 0x7, 0x38, 0x0, @void, @void, @void, @value=r3}, 0x20) r4 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r4, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r4, &(0x7f00000000c0)={&(0x7f0000000100)=@hci={0x1f, 0x0, 0x9}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000440)="63f805d7649496db7295", 0xa}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x3, 0x4, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r5}, &(0x7f00000001c0), &(0x7f00000005c0)}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x15, &(0x7f0000000140)={{r5}, &(0x7f0000000040), &(0x7f00000000c0)='%+9llu \x00'}, 0x20) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.time\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$cgroup_devices(r6, &(0x7f00000001c0)='devices.allow\x00', 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="a60a0000000000006111800000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) r7 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r7, 0x0, 0x4000010) syz_clone(0x61000600, 0x0, 0x0, 0x0, 0x0, 0x0) 1.59826073s ago: executing program 1 (id=2852): r0 = socket$kcm(0x10, 0x2, 0x4) close(r0) socket$kcm(0x10, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0xdd, 0xa}, 0x50) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x75, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x28}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) 1.464921941s ago: executing program 4 (id=2853): r0 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x5, 0x4, 0x5}, {0x10000002, 0x5, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) close(r0) r3 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x64, &(0x7f0000000000)=r6, 0x10) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0xc8802) setsockopt$sock_attach_bpf(r0, 0x84, 0x6e, &(0x7f0000000000)=r7, 0x10) 1.326861542s ago: executing program 1 (id=2854): r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000980)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21ca0000cf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c98cda2948ef0f440d7cad29567e15a7d669f381faca0f9d9b24be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6eab1aa7d55545a34effa077faa56d59e88254f54077f799bf168301000000bf225571f2487fc86acc2bff7d5664abebd6a0244d35b213bda84cc172afd8cc2e59a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d0faab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0480f94306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552d703f7f14d8b78a602ca3cdf6a9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad9433269af3be5fa6a9a5c24e392955f4e979ea13201bafe4f0f6ea508000000571bed5647223c78a992810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ede62fc28839b5301160ecec37e83efceefd7ca2533659edc8be05cc85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8498856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d35a142a9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b262341c5e093fd66a2946501559335781092cf8ce3c7c56cd31121624d76517fd3666276c3c0e812b28e2f30d035cee5d0e77a3c70008ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856cf24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31651e0ecea5ece8fb11a4ee288eb149f1fa33669cc8d901fa8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463baf28345bde0c195bc9f021da8f3025ee9c8e3168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262fa3f1dabeb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a4601adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cc50feeb7bfad9b7be3283b6450d014e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5671820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff2418a18217747ae442e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427a7f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d17eb0000000000000000000000fa086d2a39f13f60b51136a945f780687aad0731c4b839688b22c4da2a6b00008a1949a6ba49fbf981f8265e7f1f4c2d97f4680b135f91b52fc0b241c2db99a187c228ce69418a282bffff2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae05334d5a44a020000001c0d882a564d74a7c72bf9a2152b261e58fea6d2f93589cfe261dc0410b5ccc92a5a0eab327a33431d62d2b7c75ce654d556c9e1817c1abca762ab53d40da51560351b673363652e1ecb56cfe4a746a45ab13c6014e9f361ab687d1cd1795ce9e05c817b83d76046bdb3709de5df7499a02d2f636a454b85b987580ada025d83bd7b8df28a540d5ec5537942e79f2f1ab25ea5f563bc77e4f9468bd309469880c7e34150ca886d1f9ac2f7e82dbe296c877d925c38c54cc8137b29028854b6bd57ca893927c331300e16aba792289e135589d93302fc37c73c303e383cdf8ef3f6d6265fe5ee01759d24027475c8901039a898582022bc95992b86dce0710887c8a625d9cbb897bdbfaf49a3f642a169827a9bae4fcfa5212461db000000000000e6ed75ca8fcda7ef3ee336189fef3b3ffb9f38fefc5ff39c4e69e3fa1f8b10ee97123e99b61eba065b1ad67530e7c4f11f9da7ae000002000000610101ad7f79cb9bbf64a0fc109f49fe8799fe266e2ccac80fefe750151f5ddfe51833ec65ece70e07ce8ab5d97db47da8f80000664dc0b86ae2b3ff9d4e220752a6b2f3ea9f793612386496dca5af7b8952aafa796ea7b152d19612297c63bb20e1e0469f7615f67a9218cbace38f5236821314f76302b98afa93044b83989339ca10e6ae30e70e17a82f03e915b8425e8e7a91614306d2ae0bc3550d856f2d7293672b5673d264fc886b0c8bdf436a0fcd21bf9da7bdca98e34cd6e59b0a7ce4ba1b466561aaa35448dff47bb1"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8923, &(0x7f0000000140)={'pim6reg1\x00', @link_local={0x1, 0x80, 0xc2, 0x25, 0x64, 0x2}}) 1.090397152s ago: executing program 4 (id=2855): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x2f) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2d, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x578}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socket$kcm(0x29, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1d, 0x6, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff203d, 0x0, 0x0, 0x0, 0xe61}, [@call={0x85, 0x0, 0x0, 0x8c}, @map_val={0x18, 0x3, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001}]}, &(0x7f0000000180)='GPL\x00', 0xf, 0xe1, &(0x7f0000000380)=""/225, 0x41000, 0x2, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x1, 0x0, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000000500)=[{0x3, 0x1, 0x7, 0x7}], 0x10, 0xff}, 0x94) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000600)={r1, r2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x800}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000004000)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x602f, &(0x7f0000000640)="b9ff03076844268cb89e14f088a847e0ffff200000000001000aac141440e0", 0x0, 0x11, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/time_for_children\x00') r4 = socket$kcm(0x2, 0x1000000000000005, 0x0) sendmsg$inet(r4, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000040)}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r4, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, 0x0, 0x20}, 0x0) 697.355864ms ago: executing program 0 (id=2856): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000004000000040000000a"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="1802000000000000000000000000100085000000180000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500"], &(0x7f0000000080)='syzkaller\x00'}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r2, &(0x7f0000000100)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000780)="f4000900062b2c25fe80000000000000dc8b850f2384", 0x16}, {&(0x7f0000000340)="5ed0fc370c692126507f36d1a5f9318998f1517031f1680f8bf2", 0x1a}], 0x2}, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)=@o_path={&(0x7f0000000200)='./file0\x00', r2, 0x4000, r1}, 0x18) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r3, 0x0, 0x41) sendmsg$kcm(r3, &(0x7f00000001c0)={&(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x4, @local, 0x3, 0x4}, 0x80, &(0x7f0000000100)=[{0x0, 0x21}], 0x1}, 0x4804) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$kcm(0x2c, 0x3, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x11b, 0x2, &(0x7f0000000040)=r5, 0x4) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="5c00000014006b030231a6080c000af32c00009d31fc0000f800250f02000f00e5aa000017d34460bc24eab556bd05251e6182949a2756f475ce36c2d13b48df000000000000ecb8f6ec63c9f4d4938037e786a6d1bdd700e6657594", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 464.616982ms ago: executing program 4 (id=2857): r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r0, &(0x7f0000000b40)={&(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10, &(0x7f00000000c0)=[{0x0, 0x4f}], 0x1, &(0x7f0000000180)=[@ip_pktinfo={{0x2f, 0x0, 0x7, {0x0, @dev, @loopback}}}], 0x30}, 0x0) r1 = gettid() r2 = perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x80, 0x3, 0x6, 0xb, 0x2, 0x0, 0x4, 0x42024, 0xc, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x29, 0x4, @perf_config_ext={0x91c, 0x6}, 0x2000, 0x6, 0x9, 0x4, 0x7, 0x42d, 0x200, 0x0, 0xc, 0x0, 0x3}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x3, 0x5, 0x1, 0x5, 0x0, 0x5, 0x40200, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x4ead, 0x5}, 0x4100, 0x2, 0x7ff, 0x8, 0x80, 0x100, 0x2, 0x0, 0x7, 0x0, 0x75}, r1, 0x4, r2, 0x0) 459.130922ms ago: executing program 0 (id=2858): socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) socket$kcm(0x10, 0x400000002, 0x0) socket$kcm(0x18, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socket$kcm(0x10, 0x100000000002, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="12000000070000000800000002"], 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.idle_time\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x3, 0x2) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x4) sendmsg$inet(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10, 0x0}, 0x20000040) 416.300816ms ago: executing program 1 (id=2859): r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x43cd, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001ac0)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8910, &(0x7f0000000080)) 348.476291ms ago: executing program 4 (id=2860): bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000007000000020001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000006c1f768b0857131c500"/37], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000240)='tlb_flush\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r2}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x5, 0x4, 0x8, 0xb, 0x0, 0x1}, 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x2, 0x8, 0x8, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r5, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xd, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff7fff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r7}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89fd, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf\xc8>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8982, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000001080)={0x2, 0x80, 0xdf, 0xa, 0x0, 0x0, 0x0, 0x0, 0x38814, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000001040), 0x16}, 0x0, 0x0, 0x802, 0x0, 0x46fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0xffffffff, &(0x7f0000000000)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x40011) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0xf6, &(0x7f0000000000), &(0x7f0000000e80)="d5d52257e08a5c7ec861ad835eea0868461fc48c55064b6efbba7adf2a5a29ef4e1f6ff4406d754f6fc2c03b9e8260ea0800000000000000020044265f66fec76ea9ae95000000000000001a000000000000000000000000008c3726de2f5a4c6a473699e564489b8e5fb8cddea58fd8f79a0c1dbd8d3e2088406ff368c9af4f86d81e037c50ebc20662e0e5e624afbdcef862cb098ee7b52d2d04820fa0b651f8f9141c1b4da301caab64bc0760dd31bfba0a67ed9eb05f62ac4bfe1888976f9fe4d69b26aba37c5842b7070fe4d3763701e6a27975353980fc2332420cfa9ff03460bc09e15b2c795895eb3ce00000000000000000", 0x0, 0x0, 0x400}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b405000000000500b510980049db950000efff000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000380)={r1}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e40)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) openat$cgroup_devices(r1, &(0x7f00000003c0)='devices.deny\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x6, 0xd, 0x7, 0x0, 0x7fffffff, 0x420, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_bp={0x0, 0x4}, 0x26, 0x7ff, 0x5, 0x7, 0x81, 0x6, 0x5, 0x0, 0x2, 0x0, 0xe7}, 0x0, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="11000000040000000400000001"], 0x48) r4 = socket$kcm(0x2c, 0x3, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r3}, &(0x7f0000000080), &(0x7f00000001c0)=r4}, 0x20) 258.741069ms ago: executing program 1 (id=2862): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x18, &(0x7f0000000000)=[{&(0x7f00000002c0)="5c00000013006bcd9e3fe3d46e48aa31086b8703130000001f0000ab0000000001080004000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c902d1938037e7d0bdd7fcf50e4509c5bb5a00f6985300", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 114.186621ms ago: executing program 4 (id=2863): close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @cgroup_sock_addr=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$kcm(0xa, 0x6, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x801c581f, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000640), 0xb}, 0x200, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000300)="6000000022007f029e607dd75fcb520002a124b244de91f7f414adcf41bfafdd1b1e93c6292aefa3ca89563a63fb94b2584ca2faa20f2c308b0fe298acec10e3019e1e26e6efd0166e6c1b01132e5423294ac2f4d53c3870c3068461957e5357", 0x60}], 0x1, 0x0, 0x0, 0x6}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002a80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000084) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r1, 0x0, 0x1, 0xfa, &(0x7f0000000480)="ad", &(0x7f0000000940)=""/250, 0x7fff, 0x0, 0xfb, 0xa, &(0x7f0000000a40)="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", &(0x7f0000000600)="fede02522582664b9192", 0x4, 0x0, 0x8}, 0x50) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffefff}, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000040)='%ps \x00'}, 0x20) sendmsg$inet(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000580)="d268df511feb18b224217b26dc572ee2e72a19545e32eab424080f83e650a205d51489d64e1580b60c2a628c488a3c1d558c143fec9f6478cfcd87b5a4d29fd32cb3067672bb1b5241232ad7d99b2e7948f712c0fae9e514d876f624a6e6f795f079ac7475", 0x65}, {&(0x7f0000000740)="9cd88180cbbf99127112f61ab10aa1d1b9435e6f38d507f4d2a2e6a4bd93e556bfd9659d6e8af4be8be701777928b1692dbe3fc764cb49083c8cbf95226dd3ee17c9a029e1aecc83755a3d0bd02bcfa1dd4b4c98f3b451efa7246bde4e709aae0812ba40224c436cb2aba439836e1c4be66d902bb64ae129a58fa63b7c691a1586e176f8e4595ab3eda65ce0dde469652a983ae03364422425cc71c6c71d8c50ed2b7edb86f62d36148596a36175beeb8dfa98d2c07b9e58068047b153fb98090d730da8dbcbbdafe35c2e8cae0f830701f55c5b4570fcfcbb0ca8dc0fb3049f4021", 0xe2}], 0x2, &(0x7f0000000bc0)=ANY=[@ANYBLOB="c800000000000000000000000700000094040000004414075000000dbaffffffff0000000000009dc344182a30000081d10000000900000004000000fffffff80144344931ac1e000100000003e00000010000000d7f00000100000002ac1414aa000000070000000000000001e0000002000003ff94040100443499117f000001000000080a01010000000081ac1414aa000000010000000000000009e0000001000000547f00000100000003441491836401010100000001e000000200000fff070741e0000002140000000000000000000000020000000200000000000000dc7c4b0fa786bb9f634d6e3c377a3d67d570aecf556f64236acc0831f14de9ae0ce13f0685a0cb7fbd799c203195c00d182225d677adaae0695d2f622bcf909f1a416c36228bb864b3df934f9d33b34028220c5a9a6f666c552ab6cb7ced3fc5016e713d79c07692fb331d588ba58866335cf8c2adca9d915dc4b40dfc4e8c37b93695d4756fbd9a5c9f97"], 0xe0}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1100000004000000040000000100000000000000", @ANYRES32, @ANYBLOB="000000000030e800"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r5, &(0x7f0000000940)}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r4}, 0x4) 389.03µs ago: executing program 0 (id=2864): r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="020000000400000008000000010000008000", @ANYRES32=0x0, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001800"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYRESOCT=r0], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x5d) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004b74ffec850000006d000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) write$cgroup_type(r1, &(0x7f0000000140), 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000000)='mm_lru_insertion\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000009000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, '\x00', 0x0, 0xf}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0000000000000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext, 0x100000, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair(0x6, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8904, &(0x7f0000000080)) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000700000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r8) r9 = socket$kcm(0x10, 0x2, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r4, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f0000000180)=[0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x75, &(0x7f0000000340)=[{}, {}], 0x10, 0x10, &(0x7f00000003c0), &(0x7f0000000680), 0x8, 0xb6, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$inet(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="5c00000013006b04000000d86e6c1d000a887ea6ea65670000000000000090f9c3dc90f8f41f8ecff32c6e020075e300250045586c8da718ad4b4460bc24eab5", 0x40}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r6, &(0x7f0000000000)={&(0x7f00000002c0)=@rc={0x1f, @none, 0x1}, 0x80, 0x0}, 0x4048881) 0s ago: executing program 1 (id=2865): r0 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x5, 0x4, 0x5}, {0x10000002, 0x5, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) close(r0) r3 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x64, &(0x7f0000000000)=r6, 0x10) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0xc8802) setsockopt$sock_attach_bpf(r0, 0x84, 0x6e, &(0x7f0000000000)=r7, 0x10) kernel console output (not intermixed with test programs): 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 228.332193][ T7168] RSP: 002b:00007f340513f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 228.340735][ T7168] RAX: ffffffffffffffda RBX: 00007f34070fefa0 RCX: 00007f3406ed7be9 [ 228.348744][ T7168] RDX: 0000000000000040 RSI: 0000200000002100 RDI: 0000000000000003 [ 228.356743][ T7168] RBP: 00007f340513f090 R08: 0000000000000000 R09: 0000000000000000 [ 228.364893][ T7168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 228.372894][ T7168] R13: 00007f34070ff038 R14: 00007f34070fefa0 R15: 00007fffe790cd08 [ 228.381037][ T7168] [ 228.830200][ T7187] syz.1.938[7187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.830372][ T7187] syz.1.938[7187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.951484][ T7194] netlink: 'syz.3.939': attribute type 39 has an invalid length. [ 229.329840][ T7203] FAULT_INJECTION: forcing a failure. [ 229.329840][ T7203] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 229.437683][ T7203] CPU: 0 PID: 7203 Comm: syz.4.942 Not tainted 5.15.189-syzkaller #0 [ 229.445902][ T7203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 229.455999][ T7203] Call Trace: [ 229.459308][ T7203] [ 229.462260][ T7203] dump_stack_lvl+0x168/0x230 [ 229.466978][ T7203] ? show_regs_print_info+0x20/0x20 [ 229.472212][ T7203] ? load_image+0x3b0/0x3b0 [ 229.476758][ T7203] ? __lock_acquire+0x7c60/0x7c60 [ 229.481918][ T7203] should_fail+0x38c/0x4c0 [ 229.486375][ T7203] _copy_to_user+0x2e/0x130 [ 229.491440][ T7203] simple_read_from_buffer+0xe3/0x150 [ 229.496885][ T7203] proc_fail_nth_read+0x19a/0x210 [ 229.501947][ T7203] ? proc_fault_inject_write+0x2f0/0x2f0 [ 229.507625][ T7203] ? fsnotify_perm+0x254/0x560 [ 229.512733][ T7203] ? proc_fault_inject_write+0x2f0/0x2f0 [ 229.518455][ T7203] vfs_read+0x2f6/0xcf0 [ 229.522659][ T7203] ? kernel_read+0x1e0/0x1e0 [ 229.527286][ T7203] ? __fget_files+0x40f/0x480 [ 229.532009][ T7203] ? mutex_lock_nested+0x17/0x20 [ 229.537076][ T7203] ? __fdget_pos+0x2bf/0x370 [ 229.541876][ T7203] ? ksys_read+0x71/0x250 [ 229.546236][ T7203] ksys_read+0x14d/0x250 [ 229.550535][ T7203] ? vfs_write+0xd00/0xd00 [ 229.555106][ T7203] ? lockdep_hardirqs_on+0x94/0x140 [ 229.560429][ T7203] do_syscall_64+0x4c/0xa0 [ 229.564883][ T7203] ? clear_bhb_loop+0x30/0x80 [ 229.569588][ T7203] ? clear_bhb_loop+0x30/0x80 [ 229.574295][ T7203] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 229.580339][ T7203] RIP: 0033:0x7f3406ed65fc [ 229.584836][ T7203] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 229.604766][ T7203] RSP: 002b:00007f340511e030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 229.613237][ T7203] RAX: ffffffffffffffda RBX: 00007f34070ff090 RCX: 00007f3406ed65fc [ 229.621261][ T7203] RDX: 000000000000000f RSI: 00007f340511e0a0 RDI: 0000000000000004 [ 229.629277][ T7203] RBP: 00007f340511e090 R08: 0000000000000000 R09: 0000000000000000 [ 229.637366][ T7203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 229.645365][ T7203] R13: 00007f34070ff128 R14: 00007f34070ff090 R15: 00007fffe790cd08 [ 229.653395][ T7203] [ 230.955627][ T7240] netlink: 16 bytes leftover after parsing attributes in process `syz.3.952'. [ 231.078135][ T7240] netlink: 'syz.3.952': attribute type 3 has an invalid length. [ 231.382217][ T7259] syz.4.956[7259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.382382][ T7259] syz.4.956[7259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.871499][ T9] device hsr_slave_0 left promiscuous mode [ 232.009057][ T9] device hsr_slave_1 left promiscuous mode [ 232.139963][ T9] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 232.150421][ T9] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 232.181283][ T9] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 232.201537][ T9] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 232.233509][ T9] device bridge_slave_1 left promiscuous mode [ 232.250247][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.289085][ T9] device bridge_slave_0 left promiscuous mode [ 232.306691][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.366519][ T9] device veth1_macvtap left promiscuous mode [ 232.385423][ T9] device veth0_macvtap left promiscuous mode [ 232.415631][ T9] device veth1_vlan left promiscuous mode [ 232.453296][ T9] device veth0_vlan left promiscuous mode [ 232.595100][ T7274] delete_channel: no stack [ 233.369462][ T9] team0 (unregistering): Port device team_slave_1 removed [ 233.406022][ T9] team0 (unregistering): Port device team_slave_0 removed [ 233.435247][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 233.480801][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 233.809963][ T9] bond0 (unregistering): Released all slaves [ 234.456267][ T7325] FAULT_INJECTION: forcing a failure. [ 234.456267][ T7325] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 234.691636][ T7325] CPU: 1 PID: 7325 Comm: syz.4.972 Not tainted 5.15.189-syzkaller #0 [ 234.699994][ T7325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 234.710090][ T7325] Call Trace: [ 234.713505][ T7325] [ 234.716589][ T7325] dump_stack_lvl+0x168/0x230 [ 234.721305][ T7325] ? show_regs_print_info+0x20/0x20 [ 234.726557][ T7325] ? load_image+0x3b0/0x3b0 [ 234.731519][ T7325] ? __lock_acquire+0x7c60/0x7c60 [ 234.736597][ T7325] ? lockdep_hardirqs_on+0x94/0x140 [ 234.741927][ T7325] should_fail+0x38c/0x4c0 [ 234.746393][ T7325] _copy_from_user+0x2e/0x170 [ 234.751108][ T7325] perf_copy_attr+0x167/0x840 [ 234.755824][ T7325] __se_sys_perf_event_open+0xcb/0x1b80 [ 234.761533][ T7325] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 234.767210][ T7325] ? syscall_enter_from_user_mode+0x2a/0x70 [ 234.773130][ T7325] ? __x64_sys_perf_event_open+0x1c/0xc0 [ 234.778799][ T7325] do_syscall_64+0x4c/0xa0 [ 234.783242][ T7325] ? clear_bhb_loop+0x30/0x80 [ 234.788338][ T7325] ? clear_bhb_loop+0x30/0x80 [ 234.793042][ T7325] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 234.798972][ T7325] RIP: 0033:0x7f3406ed7be9 [ 234.803439][ T7325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 234.823286][ T7325] RSP: 002b:00007f340511e038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 234.831726][ T7325] RAX: ffffffffffffffda RBX: 00007f34070ff090 RCX: 00007f3406ed7be9 [ 234.839722][ T7325] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000240 [ 234.847724][ T7325] RBP: 00007f340511e090 R08: 0000000000000005 R09: 0000000000000000 [ 234.855817][ T7325] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 234.863809][ T7325] R13: 00007f34070ff128 R14: 00007f34070ff090 R15: 00007fffe790cd08 [ 234.871817][ T7325] [ 235.083871][ T7322] netlink: 'syz.4.972': attribute type 10 has an invalid length. [ 235.120176][ T7322] netlink: 40 bytes leftover after parsing attributes in process `syz.4.972'. [ 235.213209][ T7335] netlink: 'syz.1.977': attribute type 10 has an invalid length. [ 235.234412][ T7335] netlink: 40 bytes leftover after parsing attributes in process `syz.1.977'. [ 235.362189][ T7335] batman_adv: batadv0: Adding interface: virt_wifi0 [ 235.377844][ T7335] batman_adv: batadv0: The MTU of interface virt_wifi0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 235.459195][ T7335] batman_adv: batadv0: Interface activated: virt_wifi0 [ 235.682681][ T7359] netlink: 'syz.3.980': attribute type 10 has an invalid length. [ 235.756438][ T7364] syz.4.982[7364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.756600][ T7364] syz.4.982[7364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.794675][ T7359] netlink: 40 bytes leftover after parsing attributes in process `syz.3.980'. [ 236.475595][ T7359] batman_adv: batadv0: Adding interface: virt_wifi0 [ 236.560750][ T7359] batman_adv: batadv0: The MTU of interface virt_wifi0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 236.870863][ T7359] batman_adv: batadv0: Interface activated: virt_wifi0 [ 236.970176][ T7371] tap0: tun_chr_ioctl cmd 1074025672 [ 236.975623][ T7371] tap0: ignored: set checksum disabled [ 238.429824][ T7426] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.996'. [ 238.624411][ T7431] syz.4.999[7431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.624571][ T7431] syz.4.999[7431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.086541][ T7443] netlink: 'syz.1.1003': attribute type 10 has an invalid length. [ 239.269136][ T7443] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.332242][ T7443] team0: Port device bond0 added [ 239.497284][ T7455] FAULT_INJECTION: forcing a failure. [ 239.497284][ T7455] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 239.587791][ T7455] CPU: 1 PID: 7455 Comm: syz.4.1008 Not tainted 5.15.189-syzkaller #0 [ 239.596014][ T7455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 239.606243][ T7455] Call Trace: [ 239.609549][ T7455] [ 239.612499][ T7455] dump_stack_lvl+0x168/0x230 [ 239.617214][ T7455] ? show_regs_print_info+0x20/0x20 [ 239.622439][ T7455] ? load_image+0x3b0/0x3b0 [ 239.627001][ T7455] ? __lock_acquire+0x7c60/0x7c60 [ 239.632078][ T7455] should_fail+0x38c/0x4c0 [ 239.636542][ T7455] _copy_to_user+0x2e/0x130 [ 239.641623][ T7455] simple_read_from_buffer+0xe3/0x150 [ 239.647041][ T7455] proc_fail_nth_read+0x19a/0x210 [ 239.652107][ T7455] ? proc_fault_inject_write+0x2f0/0x2f0 [ 239.657787][ T7455] ? fsnotify_perm+0x254/0x560 [ 239.662592][ T7455] ? proc_fault_inject_write+0x2f0/0x2f0 [ 239.668264][ T7455] vfs_read+0x2f6/0xcf0 [ 239.672471][ T7455] ? kernel_read+0x1e0/0x1e0 [ 239.677099][ T7455] ? __fget_files+0x40f/0x480 [ 239.681812][ T7455] ? mutex_lock_nested+0x17/0x20 [ 239.686910][ T7455] ? __fdget_pos+0x2bf/0x370 [ 239.691632][ T7455] ? ksys_read+0x71/0x250 [ 239.696268][ T7455] ksys_read+0x14d/0x250 [ 239.700628][ T7455] ? vfs_write+0xd00/0xd00 [ 239.705077][ T7455] ? lockdep_hardirqs_on+0x94/0x140 [ 239.710304][ T7455] do_syscall_64+0x4c/0xa0 [ 239.714754][ T7455] ? clear_bhb_loop+0x30/0x80 [ 239.719559][ T7455] ? clear_bhb_loop+0x30/0x80 [ 239.724268][ T7455] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 239.730299][ T7455] RIP: 0033:0x7f3406ed65fc [ 239.734938][ T7455] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 239.754703][ T7455] RSP: 002b:00007f340513f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 239.763164][ T7455] RAX: ffffffffffffffda RBX: 00007f34070fefa0 RCX: 00007f3406ed65fc [ 239.771174][ T7455] RDX: 000000000000000f RSI: 00007f340513f0a0 RDI: 0000000000000004 [ 239.779180][ T7455] RBP: 00007f340513f090 R08: 0000000000000000 R09: 0000000000000000 [ 239.787180][ T7455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 239.795187][ T7455] R13: 00007f34070ff038 R14: 00007f34070fefa0 R15: 00007fffe790cd08 [ 239.803217][ T7455] [ 239.923040][ T7465] netlink: 6 bytes leftover after parsing attributes in process `syz.1.1010'. [ 239.933483][ T7465] openvswitch: netlink: Flow actions attr not present in new flow. [ 240.053625][ T7473] FAULT_INJECTION: forcing a failure. [ 240.053625][ T7473] name failslab, interval 1, probability 0, space 0, times 0 [ 240.183147][ T7473] CPU: 0 PID: 7473 Comm: syz.0.1012 Not tainted 5.15.189-syzkaller #0 [ 240.191490][ T7473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 240.201584][ T7473] Call Trace: [ 240.205080][ T7473] [ 240.208037][ T7473] dump_stack_lvl+0x168/0x230 [ 240.212774][ T7473] ? show_regs_print_info+0x20/0x20 [ 240.218010][ T7473] ? load_image+0x3b0/0x3b0 [ 240.222555][ T7473] ? __might_sleep+0xf0/0xf0 [ 240.227353][ T7473] ? __lock_acquire+0x7c60/0x7c60 [ 240.232536][ T7473] should_fail+0x38c/0x4c0 [ 240.236998][ T7473] should_failslab+0x5/0x20 [ 240.241637][ T7473] slab_pre_alloc_hook+0x51/0xc0 [ 240.246705][ T7473] __kmalloc+0x6b/0x330 [ 240.250893][ T7473] ? tomoyo_encode+0x27e/0x540 [ 240.257351][ T7473] tomoyo_encode+0x27e/0x540 [ 240.261995][ T7473] tomoyo_realpath_from_path+0x5cd/0x610 [ 240.267704][ T7473] tomoyo_path_number_perm+0x1d5/0x5d0 [ 240.273562][ T7473] ? verify_lock_unused+0x140/0x140 [ 240.278802][ T7473] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 240.284316][ T7473] ? ksys_write+0x1c7/0x250 [ 240.288907][ T7473] security_file_ioctl+0x6c/0xa0 [ 240.293983][ T7473] __se_sys_ioctl+0x48/0x170 [ 240.298606][ T7473] do_syscall_64+0x4c/0xa0 [ 240.303314][ T7473] ? clear_bhb_loop+0x30/0x80 [ 240.308006][ T7473] ? clear_bhb_loop+0x30/0x80 [ 240.312722][ T7473] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 240.318647][ T7473] RIP: 0033:0x7f04d866bbe9 [ 240.323098][ T7473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 240.342954][ T7473] RSP: 002b:00007f04d68b2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 240.351412][ T7473] RAX: ffffffffffffffda RBX: 00007f04d8893090 RCX: 00007f04d866bbe9 [ 240.359519][ T7473] RDX: 0000200000000000 RSI: 0000000000008b04 RDI: 0000000000000007 [ 240.367548][ T7473] RBP: 00007f04d68b2090 R08: 0000000000000000 R09: 0000000000000000 [ 240.375645][ T7473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 240.383647][ T7473] R13: 00007f04d8893128 R14: 00007f04d8893090 R15: 00007ffdbd6ceb58 [ 240.391674][ T7473] [ 240.415354][ T7479] syz.1.1014[7479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.415544][ T7479] syz.1.1014[7479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.278428][ T7473] ERROR: Out of memory at tomoyo_realpath_from_path. [ 242.541009][ T7530] netlink: 'syz.4.1027': attribute type 3 has an invalid length. [ 242.600527][ T7528] syz.5.1028[7528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.600721][ T7528] syz.5.1028[7528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.627716][ T7530] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.1027'. [ 242.749356][ T7535] FAULT_INJECTION: forcing a failure. [ 242.749356][ T7535] name failslab, interval 1, probability 0, space 0, times 0 [ 242.816102][ T7535] CPU: 0 PID: 7535 Comm: syz.1.1031 Not tainted 5.15.189-syzkaller #0 [ 242.824412][ T7535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 242.834513][ T7535] Call Trace: [ 242.837822][ T7535] [ 242.840785][ T7535] dump_stack_lvl+0x168/0x230 [ 242.845506][ T7535] ? show_regs_print_info+0x20/0x20 [ 242.850741][ T7535] ? load_image+0x3b0/0x3b0 [ 242.855719][ T7535] ? __might_sleep+0xf0/0xf0 [ 242.860338][ T7535] ? __lock_acquire+0x7c60/0x7c60 [ 242.865414][ T7535] should_fail+0x38c/0x4c0 [ 242.869872][ T7535] should_failslab+0x5/0x20 [ 242.874401][ T7535] slab_pre_alloc_hook+0x51/0xc0 [ 242.879377][ T7535] __kmalloc+0x6b/0x330 [ 242.883561][ T7535] ? tomoyo_encode+0x27e/0x540 [ 242.888373][ T7535] tomoyo_encode+0x27e/0x540 [ 242.893005][ T7535] tomoyo_realpath_from_path+0x5cd/0x610 [ 242.898783][ T7535] tomoyo_path_number_perm+0x1d5/0x5d0 [ 242.904282][ T7535] ? trace_event_raw_event_lock_acquire+0x2b0/0x2b0 [ 242.911095][ T7535] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 242.916652][ T7535] security_file_ioctl+0x6c/0xa0 [ 242.921725][ T7535] __se_sys_ioctl+0x48/0x170 [ 242.926361][ T7535] do_syscall_64+0x4c/0xa0 [ 242.930817][ T7535] ? clear_bhb_loop+0x30/0x80 [ 242.935619][ T7535] ? clear_bhb_loop+0x30/0x80 [ 242.940340][ T7535] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 242.946359][ T7535] RIP: 0033:0x7fdabf150be9 [ 242.950813][ T7535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 242.970592][ T7535] RSP: 002b:00007fdabd3b8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 242.979187][ T7535] RAX: ffffffffffffffda RBX: 00007fdabf377fa0 RCX: 00007fdabf150be9 [ 242.987365][ T7535] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000004 [ 242.995368][ T7535] RBP: 00007fdabd3b8090 R08: 0000000000000000 R09: 0000000000000000 [ 243.003558][ T7535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 243.011560][ T7535] R13: 00007fdabf378038 R14: 00007fdabf377fa0 R15: 00007ffe680a1c08 [ 243.019589][ T7535] [ 243.517670][ T7535] ERROR: Out of memory at tomoyo_realpath_from_path. [ 244.096925][ T7575] FAULT_INJECTION: forcing a failure. [ 244.096925][ T7575] name failslab, interval 1, probability 0, space 0, times 0 [ 244.188686][ T7575] CPU: 0 PID: 7575 Comm: syz.3.1044 Not tainted 5.15.189-syzkaller #0 [ 244.197006][ T7575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 244.207277][ T7575] Call Trace: [ 244.210643][ T7575] [ 244.213602][ T7575] dump_stack_lvl+0x168/0x230 [ 244.218338][ T7575] ? show_regs_print_info+0x20/0x20 [ 244.223597][ T7575] ? load_image+0x3b0/0x3b0 [ 244.228157][ T7575] ? __might_sleep+0xf0/0xf0 [ 244.232795][ T7575] ? __lock_acquire+0x7c60/0x7c60 [ 244.237876][ T7575] should_fail+0x38c/0x4c0 [ 244.242346][ T7575] should_failslab+0x5/0x20 [ 244.247032][ T7575] slab_pre_alloc_hook+0x51/0xc0 [ 244.252017][ T7575] __kmalloc_node_track_caller+0x68/0x3a0 [ 244.257775][ T7575] ? __ip_append_data+0x2050/0x3230 [ 244.263012][ T7575] ? kmem_cache_alloc_node+0x162/0x2d0 [ 244.268513][ T7575] ? __alloc_skb+0xf4/0x750 [ 244.273167][ T7575] ? __ip_append_data+0x2050/0x3230 [ 244.278424][ T7575] __alloc_skb+0x22c/0x750 [ 244.282888][ T7575] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 244.288666][ T7575] __ip_append_data+0x2050/0x3230 [ 244.293777][ T7575] ? __lock_acquire+0x7c60/0x7c60 [ 244.298861][ T7575] ? raw_send_hdrinc+0x11e0/0x11e0 [ 244.304009][ T7575] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 244.310032][ T7575] ? lock_chain_count+0x20/0x20 [ 244.314931][ T7575] ? ip_setup_cork+0x890/0x890 [ 244.319897][ T7575] ? ip_setup_cork+0x496/0x890 [ 244.324798][ T7575] ip_append_data+0x132/0x1a0 [ 244.329530][ T7575] ? raw_send_hdrinc+0x11e0/0x11e0 [ 244.334672][ T7575] raw_sendmsg+0x131a/0x1890 [ 244.339437][ T7575] ? compat_raw_ioctl+0x60/0x60 [ 244.344369][ T7575] ? aa_sk_perm+0x7b4/0x8f0 [ 244.348988][ T7575] ? tomoyo_socket_sendmsg_permission+0x212/0x2f0 [ 244.355517][ T7575] ? sock_rps_record_flow+0x17/0x3b0 [ 244.360823][ T7575] ? inet_send_prepare+0x260/0x260 [ 244.365973][ T7575] ? inet_sendmsg+0x78/0x2f0 [ 244.370662][ T7575] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 244.375962][ T7575] ? security_socket_sendmsg+0x7c/0xa0 [ 244.381474][ T7575] ? inet_send_prepare+0x260/0x260 [ 244.386607][ T7575] ____sys_sendmsg+0x5a2/0x8c0 [ 244.391658][ T7575] ? memset+0x1e/0x40 [ 244.395660][ T7575] ? __sys_sendmsg_sock+0x30/0x30 [ 244.400714][ T7575] ? import_iovec+0x6f/0xa0 [ 244.405378][ T7575] ___sys_sendmsg+0x1f0/0x260 [ 244.410111][ T7575] ? __sys_sendmsg+0x250/0x250 [ 244.414906][ T7575] ? vfs_write+0x84d/0xd00 [ 244.419395][ T7575] ? __fdget+0x18b/0x210 [ 244.423651][ T7575] __se_sys_sendmsg+0x190/0x250 [ 244.428519][ T7575] ? __x64_sys_sendmsg+0x80/0x80 [ 244.433474][ T7575] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 244.439493][ T7575] ? lockdep_hardirqs_on+0x94/0x140 [ 244.444712][ T7575] do_syscall_64+0x4c/0xa0 [ 244.449143][ T7575] ? clear_bhb_loop+0x30/0x80 [ 244.453920][ T7575] ? clear_bhb_loop+0x30/0x80 [ 244.458630][ T7575] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 244.464556][ T7575] RIP: 0033:0x7f38e4179be9 [ 244.468986][ T7575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 244.488781][ T7575] RSP: 002b:00007f38e23e1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 244.497220][ T7575] RAX: ffffffffffffffda RBX: 00007f38e43a0fa0 RCX: 00007f38e4179be9 [ 244.505302][ T7575] RDX: 0000000020000040 RSI: 0000200000000440 RDI: 0000000000000006 [ 244.513308][ T7575] RBP: 00007f38e23e1090 R08: 0000000000000000 R09: 0000000000000000 [ 244.521303][ T7575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 244.529284][ T7575] R13: 00007f38e43a1038 R14: 00007f38e43a0fa0 R15: 00007ffc366f34b8 [ 244.537417][ T7575] [ 244.858932][ T7589] syz.5.1047[7589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.859092][ T7589] syz.5.1047[7589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.728438][ T7595] FAULT_INJECTION: forcing a failure. [ 245.728438][ T7595] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 245.853239][ T7595] CPU: 0 PID: 7595 Comm: syz.3.1049 Not tainted 5.15.189-syzkaller #0 [ 245.861580][ T7595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 245.871705][ T7595] Call Trace: [ 245.875006][ T7595] [ 245.877956][ T7595] dump_stack_lvl+0x168/0x230 [ 245.882832][ T7595] ? show_regs_print_info+0x20/0x20 [ 245.888047][ T7595] ? load_image+0x3b0/0x3b0 [ 245.892668][ T7595] ? __lock_acquire+0x7c60/0x7c60 [ 245.897715][ T7595] ? perf_trace_run_bpf_submit+0x1c0/0x1c0 [ 245.903675][ T7595] should_fail+0x38c/0x4c0 [ 245.908146][ T7595] _copy_from_user+0x2e/0x170 [ 245.912852][ T7595] __copy_msghdr_from_user+0xaf/0x5e0 [ 245.918500][ T7595] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 245.924325][ T7595] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 245.929647][ T7595] ? trace_event_raw_event_lock+0x250/0x250 [ 245.935565][ T7595] ___sys_sendmsg+0x156/0x260 [ 245.940303][ T7595] ? __sys_sendmsg+0x250/0x250 [ 245.945225][ T7595] ? trace_event_raw_event_lock+0x250/0x250 [ 245.951154][ T7595] ? vfs_write+0x84d/0xd00 [ 245.955620][ T7595] ? __fdget+0x18b/0x210 [ 245.959888][ T7595] __se_sys_sendmsg+0x190/0x250 [ 245.964768][ T7595] ? __x64_sys_sendmsg+0x80/0x80 [ 245.969718][ T7595] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 245.975758][ T7595] ? lockdep_hardirqs_on+0x94/0x140 [ 245.980980][ T7595] do_syscall_64+0x4c/0xa0 [ 245.985411][ T7595] ? clear_bhb_loop+0x30/0x80 [ 245.990191][ T7595] ? clear_bhb_loop+0x30/0x80 [ 245.995022][ T7595] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 246.000933][ T7595] RIP: 0033:0x7f38e4179be9 [ 246.005363][ T7595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 246.024986][ T7595] RSP: 002b:00007f38e23e1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 246.033424][ T7595] RAX: ffffffffffffffda RBX: 00007f38e43a0fa0 RCX: 00007f38e4179be9 [ 246.041407][ T7595] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000004 [ 246.049391][ T7595] RBP: 00007f38e23e1090 R08: 0000000000000000 R09: 0000000000000000 [ 246.057380][ T7595] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 246.065365][ T7595] R13: 00007f38e43a1038 R14: 00007f38e43a0fa0 R15: 00007ffc366f34b8 [ 246.073382][ T7595] [ 247.841401][ T7639] syz.0.1064[7639] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.841581][ T7639] syz.0.1064[7639] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.108894][ T7650] FAULT_INJECTION: forcing a failure. [ 248.108894][ T7650] name failslab, interval 1, probability 0, space 0, times 0 [ 248.235666][ T7650] CPU: 0 PID: 7650 Comm: syz.4.1066 Not tainted 5.15.189-syzkaller #0 [ 248.244008][ T7650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 248.254148][ T7650] Call Trace: [ 248.257461][ T7650] [ 248.260494][ T7650] dump_stack_lvl+0x168/0x230 [ 248.265224][ T7650] ? show_regs_print_info+0x20/0x20 [ 248.270560][ T7650] ? load_image+0x3b0/0x3b0 [ 248.275156][ T7650] ? __might_sleep+0xf0/0xf0 [ 248.279771][ T7650] ? __lock_acquire+0x7c60/0x7c60 [ 248.284944][ T7650] should_fail+0x38c/0x4c0 [ 248.289398][ T7650] should_failslab+0x5/0x20 [ 248.293921][ T7650] slab_pre_alloc_hook+0x51/0xc0 [ 248.299080][ T7650] __kmalloc+0x6b/0x330 [ 248.303252][ T7650] ? tomoyo_encode+0x27e/0x540 [ 248.308141][ T7650] tomoyo_encode+0x27e/0x540 [ 248.312847][ T7650] tomoyo_realpath_from_path+0x5cd/0x610 [ 248.318525][ T7650] tomoyo_path_number_perm+0x1d5/0x5d0 [ 248.324013][ T7650] ? trace_event_raw_event_lock_acquire+0x2b0/0x2b0 [ 248.330718][ T7650] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 248.336429][ T7650] security_file_ioctl+0x6c/0xa0 [ 248.341500][ T7650] __se_sys_ioctl+0x48/0x170 [ 248.346110][ T7650] do_syscall_64+0x4c/0xa0 [ 248.350539][ T7650] ? clear_bhb_loop+0x30/0x80 [ 248.355225][ T7650] ? clear_bhb_loop+0x30/0x80 [ 248.359917][ T7650] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 248.365826][ T7650] RIP: 0033:0x7f3406ed7be9 [ 248.370260][ T7650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 248.390224][ T7650] RSP: 002b:00007f340513f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 248.398832][ T7650] RAX: ffffffffffffffda RBX: 00007f34070fefa0 RCX: 00007f3406ed7be9 [ 248.406822][ T7650] RDX: 00002000000002c0 RSI: 0000000000008935 RDI: 0000000000000003 [ 248.414809][ T7650] RBP: 00007f340513f090 R08: 0000000000000000 R09: 0000000000000000 [ 248.422881][ T7650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 248.430859][ T7650] R13: 00007f34070ff038 R14: 00007f34070fefa0 R15: 00007fffe790cd08 [ 248.438870][ T7650] [ 248.643649][ T7664] netlink: 'syz.1.1071': attribute type 29 has an invalid length. [ 248.652014][ T7650] ERROR: Out of memory at tomoyo_realpath_from_path. [ 248.673778][ T7664] netlink: 'syz.1.1071': attribute type 29 has an invalid length. [ 249.150170][ T7679] netlink: 'syz.4.1074': attribute type 10 has an invalid length. [ 249.367083][ T7679] team0: Device hsr_slave_0 failed to register rx_handler [ 249.756593][ T7688] syz.0.1078[7688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.756781][ T7688] syz.0.1078[7688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.518081][ T7704] FAULT_INJECTION: forcing a failure. [ 250.518081][ T7704] name failslab, interval 1, probability 0, space 0, times 0 [ 250.862147][ T7704] CPU: 1 PID: 7704 Comm: syz.0.1083 Not tainted 5.15.189-syzkaller #0 [ 250.870491][ T7704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 250.880580][ T7704] Call Trace: [ 250.883974][ T7704] [ 250.886941][ T7704] dump_stack_lvl+0x168/0x230 [ 250.891662][ T7704] ? show_regs_print_info+0x20/0x20 [ 250.896900][ T7704] ? load_image+0x3b0/0x3b0 [ 250.901438][ T7704] ? __might_sleep+0xf0/0xf0 [ 250.906067][ T7704] ? __lock_acquire+0x7c60/0x7c60 [ 250.911253][ T7704] should_fail+0x38c/0x4c0 [ 250.915801][ T7704] should_failslab+0x5/0x20 [ 250.920339][ T7704] slab_pre_alloc_hook+0x51/0xc0 [ 250.925313][ T7704] __kmalloc+0x6b/0x330 [ 250.929502][ T7704] ? bpf_test_init+0xf8/0x1b0 [ 250.934225][ T7704] ? __lock_acquire+0x7c60/0x7c60 [ 250.939287][ T7704] bpf_test_init+0xf8/0x1b0 [ 250.943826][ T7704] bpf_prog_test_run_skb+0x181/0x1180 [ 250.949233][ T7704] ? __fget_files+0x40f/0x480 [ 250.953957][ T7704] ? cpu_online+0x60/0x60 [ 250.958327][ T7704] bpf_prog_test_run+0x31e/0x390 [ 250.963395][ T7704] __sys_bpf+0x535/0x670 [ 250.967680][ T7704] ? bpf_link_show_fdinfo+0x340/0x340 [ 250.973187][ T7704] ? vtime_user_exit+0x2dc/0x400 [ 250.978169][ T7704] __x64_sys_bpf+0x78/0x90 [ 250.982623][ T7704] do_syscall_64+0x4c/0xa0 [ 250.987076][ T7704] ? clear_bhb_loop+0x30/0x80 [ 250.991787][ T7704] ? clear_bhb_loop+0x30/0x80 [ 250.996668][ T7704] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 251.002623][ T7704] RIP: 0033:0x7f04d866bbe9 [ 251.007383][ T7704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 251.027727][ T7704] RSP: 002b:00007f04d68d3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 251.036313][ T7704] RAX: ffffffffffffffda RBX: 00007f04d8892fa0 RCX: 00007f04d866bbe9 [ 251.044637][ T7704] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 000000000000000a [ 251.052738][ T7704] RBP: 00007f04d68d3090 R08: 0000000000000000 R09: 0000000000000000 [ 251.060855][ T7704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 251.068867][ T7704] R13: 00007f04d8893038 R14: 00007f04d8892fa0 R15: 00007ffdbd6ceb58 [ 251.077249][ T7704] [ 251.406292][ T7707] device syzkaller0 entered promiscuous mode [ 251.473086][ T7712] netlink: 'syz.4.1084': attribute type 17 has an invalid length. [ 251.510380][ T7712] netlink: 'syz.4.1084': attribute type 16 has an invalid length. [ 251.547066][ T7712] netlink: 152 bytes leftover after parsing attributes in process `syz.4.1084'. [ 252.380968][ T7737] syz.5.1093[7737] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.381129][ T7737] syz.5.1093[7737] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.731084][ T7769] netlink: 'syz.4.1104': attribute type 2 has an invalid length. [ 253.965175][ T7769] netlink: 17267 bytes leftover after parsing attributes in process `syz.4.1104'. [ 254.851864][ T7782] syz.4.1108[7782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.852025][ T7782] syz.4.1108[7782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.488821][ T7788] FAULT_INJECTION: forcing a failure. [ 255.488821][ T7788] name failslab, interval 1, probability 0, space 0, times 0 [ 255.700793][ T1423] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.707219][ T1423] ieee802154 phy1 wpan1: encryption failed: -22 [ 255.936751][ T7788] CPU: 1 PID: 7788 Comm: syz.1.1109 Not tainted 5.15.189-syzkaller #0 [ 255.945085][ T7788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 255.955186][ T7788] Call Trace: [ 255.958505][ T7788] [ 255.961473][ T7788] dump_stack_lvl+0x168/0x230 [ 255.966206][ T7788] ? show_regs_print_info+0x20/0x20 [ 255.971446][ T7788] ? load_image+0x3b0/0x3b0 [ 255.975991][ T7788] ? __might_sleep+0xf0/0xf0 [ 255.980622][ T7788] ? __lock_acquire+0x7c60/0x7c60 [ 255.985696][ T7788] ? mark_lock+0x94/0x320 [ 255.990142][ T7788] should_fail+0x38c/0x4c0 [ 255.994608][ T7788] should_failslab+0x5/0x20 [ 255.999236][ T7788] slab_pre_alloc_hook+0x51/0xc0 [ 256.004410][ T7788] __kmalloc+0x6b/0x330 [ 256.008605][ T7788] ? tomoyo_realpath_from_path+0x118/0x610 [ 256.014459][ T7788] tomoyo_realpath_from_path+0x118/0x610 [ 256.020150][ T7788] tomoyo_path_number_perm+0x1d5/0x5d0 [ 256.025740][ T7788] ? verify_lock_unused+0x140/0x140 [ 256.031104][ T7788] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 256.036609][ T7788] ? ksys_write+0x1c7/0x250 [ 256.041204][ T7788] security_file_ioctl+0x6c/0xa0 [ 256.046194][ T7788] __se_sys_ioctl+0x48/0x170 [ 256.050831][ T7788] do_syscall_64+0x4c/0xa0 [ 256.055286][ T7788] ? clear_bhb_loop+0x30/0x80 [ 256.059997][ T7788] ? clear_bhb_loop+0x30/0x80 [ 256.064721][ T7788] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 256.070781][ T7788] RIP: 0033:0x7fdabf150be9 [ 256.075246][ T7788] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 256.095342][ T7788] RSP: 002b:00007fdabd3b8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 256.103804][ T7788] RAX: ffffffffffffffda RBX: 00007fdabf377fa0 RCX: 00007fdabf150be9 [ 256.111826][ T7788] RDX: 00002000000002c0 RSI: 0000000000008953 RDI: 0000000000000007 [ 256.120109][ T7788] RBP: 00007fdabd3b8090 R08: 0000000000000000 R09: 0000000000000000 [ 256.128136][ T7788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 256.136585][ T7788] R13: 00007fdabf378038 R14: 00007fdabf377fa0 R15: 00007ffe680a1c08 [ 256.144763][ T7788] [ 256.669864][ T7820] syz.5.1121[7820] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.670037][ T7820] syz.5.1121[7820] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.398034][ T7788] ERROR: Out of memory at tomoyo_realpath_from_path. [ 257.509484][ T7835] netlink: 'syz.5.1124': attribute type 4 has an invalid length. [ 257.530596][ T7835] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.1124'. [ 257.970643][ T7851] netlink: 22 bytes leftover after parsing attributes in process `syz.5.1130'. [ 258.316821][ T7860] syz.4.1134[7860] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.317012][ T7860] syz.4.1134[7860] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.526148][ T7869] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1133'. [ 260.181763][ T7906] FAULT_INJECTION: forcing a failure. [ 260.181763][ T7906] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 260.215849][ T7906] CPU: 0 PID: 7906 Comm: syz.5.1148 Not tainted 5.15.189-syzkaller #0 [ 260.218777][ T7908] syz.0.1149[7908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.224659][ T7906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 260.224850][ T7908] syz.0.1149[7908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.236054][ T7906] Call Trace: [ 260.236069][ T7906] [ 260.236079][ T7906] dump_stack_lvl+0x168/0x230 [ 260.236109][ T7906] ? show_regs_print_info+0x20/0x20 [ 260.236131][ T7906] ? load_image+0x3b0/0x3b0 [ 260.236157][ T7906] ? __lock_acquire+0x7c60/0x7c60 [ 260.284148][ T7906] ? bpf_test_run+0x778/0x7d0 [ 260.288867][ T7906] should_fail+0x38c/0x4c0 [ 260.293337][ T7906] _copy_to_user+0x2e/0x130 [ 260.297882][ T7906] bpf_test_finish+0x1ac/0x2d0 [ 260.302687][ T7906] ? convert_skb_to___skb+0x360/0x360 [ 260.308102][ T7906] ? __build_skb+0x1e2/0x2e0 [ 260.312731][ T7906] ? convert_skb_to___skb+0x1ff/0x360 [ 260.318139][ T7906] bpf_prog_test_run_skb+0xb8f/0x1180 [ 260.323689][ T7906] ? cpu_online+0x60/0x60 [ 260.328083][ T7906] bpf_prog_test_run+0x31e/0x390 [ 260.333047][ T7906] __sys_bpf+0x535/0x670 [ 260.337414][ T7906] ? bpf_link_show_fdinfo+0x340/0x340 [ 260.342822][ T7906] ? vtime_user_exit+0x2dc/0x400 [ 260.347808][ T7906] __x64_sys_bpf+0x78/0x90 [ 260.352260][ T7906] do_syscall_64+0x4c/0xa0 [ 260.356706][ T7906] ? clear_bhb_loop+0x30/0x80 [ 260.361414][ T7906] ? clear_bhb_loop+0x30/0x80 [ 260.366132][ T7906] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 260.372062][ T7906] RIP: 0033:0x7ff66e23cbe9 [ 260.376502][ T7906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 260.396700][ T7906] RSP: 002b:00007ff66c4a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 260.405155][ T7906] RAX: ffffffffffffffda RBX: 00007ff66e463fa0 RCX: 00007ff66e23cbe9 [ 260.413250][ T7906] RDX: 0000000000000050 RSI: 00002000000004c0 RDI: 000000000000000a [ 260.421387][ T7906] RBP: 00007ff66c4a4090 R08: 0000000000000000 R09: 0000000000000000 [ 260.429706][ T7906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 260.437717][ T7906] R13: 00007ff66e464038 R14: 00007ff66e463fa0 R15: 00007ffcd6582708 [ 260.446083][ T7906] [ 261.461733][ T7937] netlink: 156 bytes leftover after parsing attributes in process `syz.0.1160'. [ 262.640052][ T7966] syz.1.1167[7966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.640246][ T7966] syz.1.1167[7966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.852662][ T7976] sctp: [Deprecated]: syz.0.1170 (pid 7976) Use of int in max_burst socket option deprecated. [ 263.852662][ T7976] Use struct sctp_assoc_value instead [ 264.188213][ T7979] FAULT_INJECTION: forcing a failure. [ 264.188213][ T7979] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 264.261136][ T7979] CPU: 0 PID: 7979 Comm: syz.5.1171 Not tainted 5.15.189-syzkaller #0 [ 264.269383][ T7979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 264.279831][ T7979] Call Trace: [ 264.283134][ T7979] [ 264.286087][ T7979] dump_stack_lvl+0x168/0x230 [ 264.290799][ T7979] ? show_regs_print_info+0x20/0x20 [ 264.296036][ T7979] ? load_image+0x3b0/0x3b0 [ 264.300590][ T7979] ? __lock_acquire+0x7c60/0x7c60 [ 264.305739][ T7979] ? tomoyo_path_number_perm+0x4d4/0x5d0 [ 264.311416][ T7979] should_fail+0x38c/0x4c0 [ 264.315871][ T7979] _copy_from_user+0x2e/0x170 [ 264.320588][ T7979] wext_handle_ioctl+0xb7/0x1c0 [ 264.325595][ T7979] ? call_commit_handler+0xf0/0xf0 [ 264.330784][ T7979] sock_ioctl+0x145/0x6e0 [ 264.335255][ T7979] ? sock_poll+0x3f0/0x3f0 [ 264.339721][ T7979] ? bpf_lsm_file_ioctl+0x5/0x10 [ 264.344796][ T7979] ? security_file_ioctl+0x7c/0xa0 [ 264.349948][ T7979] ? sock_poll+0x3f0/0x3f0 [ 264.354392][ T7979] __se_sys_ioctl+0xfa/0x170 [ 264.359008][ T7979] do_syscall_64+0x4c/0xa0 [ 264.363449][ T7979] ? clear_bhb_loop+0x30/0x80 [ 264.368149][ T7979] ? clear_bhb_loop+0x30/0x80 [ 264.372940][ T7979] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 264.378872][ T7979] RIP: 0033:0x7ff66e23cbe9 [ 264.383325][ T7979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 264.403051][ T7979] RSP: 002b:00007ff66c483038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 264.411677][ T7979] RAX: ffffffffffffffda RBX: 00007ff66e464090 RCX: 00007ff66e23cbe9 [ 264.419770][ T7979] RDX: 0000200000000000 RSI: 0000000000008b18 RDI: 0000000000000007 [ 264.427775][ T7979] RBP: 00007ff66c483090 R08: 0000000000000000 R09: 0000000000000000 [ 264.435773][ T7979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 264.443776][ T7979] R13: 00007ff66e464128 R14: 00007ff66e464090 R15: 00007ffcd6582708 [ 264.451805][ T7979] [ 265.699591][ T8013] FAULT_INJECTION: forcing a failure. [ 265.699591][ T8013] name failslab, interval 1, probability 0, space 0, times 0 [ 265.884107][ T8013] CPU: 1 PID: 8013 Comm: syz.1.1183 Not tainted 5.15.189-syzkaller #0 [ 265.892328][ T8013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 265.902419][ T8013] Call Trace: [ 265.905727][ T8013] [ 265.908686][ T8013] dump_stack_lvl+0x168/0x230 [ 265.913421][ T8013] ? show_regs_print_info+0x20/0x20 [ 265.918742][ T8013] ? load_image+0x3b0/0x3b0 [ 265.923472][ T8013] ? __might_sleep+0xf0/0xf0 [ 265.928091][ T8013] ? __lock_acquire+0x7c60/0x7c60 [ 265.933152][ T8013] should_fail+0x38c/0x4c0 [ 265.937636][ T8013] should_failslab+0x5/0x20 [ 265.942174][ T8013] slab_pre_alloc_hook+0x51/0xc0 [ 265.947265][ T8013] kmem_cache_alloc_node+0x47/0x2d0 [ 265.952493][ T8013] ? __alloc_skb+0xf4/0x750 [ 265.957025][ T8013] ? perf_tp_event+0xa3b/0xb50 [ 265.961824][ T8013] __alloc_skb+0xf4/0x750 [ 265.966180][ T8013] alloc_skb_with_frags+0xa7/0x730 [ 265.971330][ T8013] sock_alloc_send_pskb+0x853/0x980 [ 265.976579][ T8013] ? sock_kzfree_s+0x50/0x50 [ 265.981209][ T8013] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 265.986973][ T8013] tun_get_user+0x856/0x38d0 [ 265.991600][ T8013] ? perf_trace_lock+0x2ec/0x370 [ 265.996627][ T8013] ? tun_ring_recv+0xc30/0xc30 [ 266.001442][ T8013] ? rcu_lock_release+0x5/0x20 [ 266.006246][ T8013] ? __lock_acquire+0x7c60/0x7c60 [ 266.011311][ T8013] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 266.017081][ T8013] tun_chr_write_iter+0x112/0x1e0 [ 266.022141][ T8013] vfs_write+0x712/0xd00 [ 266.026467][ T8013] ? file_end_write+0x250/0x250 [ 266.031359][ T8013] ? __fget_files+0x40f/0x480 [ 266.036072][ T8013] ? __fdget_pos+0x1e2/0x370 [ 266.040685][ T8013] ? ksys_write+0x71/0x250 [ 266.045134][ T8013] ksys_write+0x14d/0x250 [ 266.049502][ T8013] ? __ia32_sys_read+0x80/0x80 [ 266.054307][ T8013] ? lockdep_hardirqs_on+0x94/0x140 [ 266.059551][ T8013] do_syscall_64+0x4c/0xa0 [ 266.064016][ T8013] ? clear_bhb_loop+0x30/0x80 [ 266.068725][ T8013] ? clear_bhb_loop+0x30/0x80 [ 266.073466][ T8013] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 266.079407][ T8013] RIP: 0033:0x7fdabf150be9 [ 266.083865][ T8013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 266.103785][ T8013] RSP: 002b:00007fdabd3b8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 266.112332][ T8013] RAX: ffffffffffffffda RBX: 00007fdabf377fa0 RCX: 00007fdabf150be9 [ 266.120334][ T8013] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 266.128417][ T8013] RBP: 00007fdabd3b8090 R08: 0000000000000000 R09: 0000000000000000 [ 266.136619][ T8013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 266.144626][ T8013] R13: 00007fdabf378038 R14: 00007fdabf377fa0 R15: 00007ffe680a1c08 [ 266.152653][ T8013] [ 266.239731][ T8020] syz.0.1184[8020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.239919][ T8020] syz.0.1184[8020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.586193][ T8026] netlink: 830 bytes leftover after parsing attributes in process `syz.4.1186'. [ 267.815883][ T8039] netlink: 'syz.3.1190': attribute type 4 has an invalid length. [ 267.844555][ T8039] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.1190'. [ 268.007815][ T4240] Bluetooth: hci1: command 0x0406 tx timeout [ 268.520447][ T8059] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1196'. [ 269.850700][ T8084] syz.1.1203[8084] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.850866][ T8084] syz.1.1203[8084] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.525236][ T8110] netlink: 'syz.1.1211': attribute type 9 has an invalid length. [ 272.823331][ T8110] netlink: 126588 bytes leftover after parsing attributes in process `syz.1.1211'. [ 274.226551][ T8133] syz.5.1216[8133] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.226715][ T8133] syz.5.1216[8133] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.890395][ T8152] FAULT_INJECTION: forcing a failure. [ 274.890395][ T8152] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 275.010468][ T8152] CPU: 1 PID: 8152 Comm: syz.4.1222 Not tainted 5.15.189-syzkaller #0 [ 275.018745][ T8152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 275.028842][ T8152] Call Trace: [ 275.032145][ T8152] [ 275.035097][ T8152] dump_stack_lvl+0x168/0x230 [ 275.039808][ T8152] ? show_regs_print_info+0x20/0x20 [ 275.045038][ T8152] ? load_image+0x3b0/0x3b0 [ 275.049584][ T8152] ? __lock_acquire+0x7c60/0x7c60 [ 275.054639][ T8152] ? vfs_write+0x84d/0xd00 [ 275.059093][ T8152] should_fail+0x38c/0x4c0 [ 275.063544][ T8152] _copy_from_user+0x2e/0x170 [ 275.068258][ T8152] __sys_bpf+0x21b/0x670 [ 275.072540][ T8152] ? bpf_link_show_fdinfo+0x340/0x340 [ 275.077950][ T8152] ? rcu_nmi_exit+0x6f/0xf0 [ 275.082531][ T8152] ? vtime_user_exit+0x2dc/0x400 [ 275.087608][ T8152] __x64_sys_bpf+0x78/0x90 [ 275.092066][ T8152] do_syscall_64+0x4c/0xa0 [ 275.096521][ T8152] ? clear_bhb_loop+0x30/0x80 [ 275.101319][ T8152] ? clear_bhb_loop+0x30/0x80 [ 275.106028][ T8152] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 275.112067][ T8152] RIP: 0033:0x7f3406ed7be9 [ 275.116621][ T8152] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 275.136259][ T8152] RSP: 002b:00007f340513f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 275.144710][ T8152] RAX: ffffffffffffffda RBX: 00007f34070fefa0 RCX: 00007f3406ed7be9 [ 275.152937][ T8152] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 275.161392][ T8152] RBP: 00007f340513f090 R08: 0000000000000000 R09: 0000000000000000 [ 275.169398][ T8152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 275.177401][ T8152] R13: 00007f34070ff038 R14: 00007f34070fefa0 R15: 00007fffe790cd08 [ 275.185422][ T8152] [ 275.231497][ T8159] netlink: 'syz.5.1223': attribute type 11 has an invalid length. [ 275.267687][ T8159] netlink: 140 bytes leftover after parsing attributes in process `syz.5.1223'. [ 276.228665][ T8174] netlink: 'syz.4.1229': attribute type 39 has an invalid length. [ 277.510691][ T8192] syz.5.1234[8192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.510862][ T8192] syz.5.1234[8192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.806432][ T8226] netlink: 'syz.3.1241': attribute type 21 has an invalid length. [ 278.882498][ T8226] netlink: 'syz.3.1241': attribute type 12 has an invalid length. [ 278.917691][ T8226] netlink: 'syz.3.1241': attribute type 13 has an invalid length. [ 278.939685][ T8226] netlink: 'syz.3.1241': attribute type 14 has an invalid length. [ 278.976298][ T8226] netlink: 'syz.3.1241': attribute type 15 has an invalid length. [ 279.002795][ T8226] netlink: 'syz.3.1241': attribute type 16 has an invalid length. [ 279.033724][ T8226] netlink: 12926 bytes leftover after parsing attributes in process `syz.3.1241'. [ 279.119444][ T8227] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1240'. [ 279.206637][ T8227] netlink: 152 bytes leftover after parsing attributes in process `syz.1.1240'. [ 279.819928][ T8251] syz.3.1247[8251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.820099][ T8251] syz.3.1247[8251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.011560][ T8292] device veth1_macvtap left promiscuous mode [ 282.227728][ T8294] device veth1_macvtap entered promiscuous mode [ 282.234222][ T8294] device macsec0 entered promiscuous mode [ 282.559896][ T8311] netlink: 830 bytes leftover after parsing attributes in process `syz.3.1260'. [ 282.662076][ T8314] FAULT_INJECTION: forcing a failure. [ 282.662076][ T8314] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 282.696229][ T8314] CPU: 0 PID: 8314 Comm: syz.4.1264 Not tainted 5.15.189-syzkaller #0 [ 282.704454][ T8314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 282.714645][ T8314] Call Trace: [ 282.718053][ T8314] [ 282.721010][ T8314] dump_stack_lvl+0x168/0x230 [ 282.725736][ T8314] ? show_regs_print_info+0x20/0x20 [ 282.731063][ T8314] ? load_image+0x3b0/0x3b0 [ 282.735708][ T8314] ? __lock_acquire+0x7c60/0x7c60 [ 282.740755][ T8314] ? __might_sleep+0xf0/0xf0 [ 282.745366][ T8314] should_fail+0x38c/0x4c0 [ 282.749797][ T8314] _copy_from_user+0x2e/0x170 [ 282.754497][ T8314] generic_map_update_batch+0x484/0x7c0 [ 282.760083][ T8314] ? rcu_read_unlock+0x90/0x90 [ 282.764899][ T8314] ? __fdget+0x18b/0x210 [ 282.769152][ T8314] ? rcu_read_unlock+0x90/0x90 [ 282.773930][ T8314] bpf_map_do_batch+0x466/0x600 [ 282.778919][ T8314] __sys_bpf+0x601/0x670 [ 282.783309][ T8314] ? bpf_link_show_fdinfo+0x340/0x340 [ 282.788718][ T8314] ? rcu_nmi_exit+0x6f/0xf0 [ 282.793248][ T8314] ? vtime_user_exit+0x2dc/0x400 [ 282.798199][ T8314] __x64_sys_bpf+0x78/0x90 [ 282.802636][ T8314] do_syscall_64+0x4c/0xa0 [ 282.807069][ T8314] ? clear_bhb_loop+0x30/0x80 [ 282.811760][ T8314] ? clear_bhb_loop+0x30/0x80 [ 282.816575][ T8314] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 282.822742][ T8314] RIP: 0033:0x7f3406ed7be9 [ 282.827360][ T8314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 282.846986][ T8314] RSP: 002b:00007f340513f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 282.855428][ T8314] RAX: ffffffffffffffda RBX: 00007f34070fefa0 RCX: 00007f3406ed7be9 [ 282.863417][ T8314] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 282.871397][ T8314] RBP: 00007f340513f090 R08: 0000000000000000 R09: 0000000000000000 [ 282.879383][ T8314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 282.887496][ T8314] R13: 00007f34070ff038 R14: 00007f34070fefa0 R15: 00007fffe790cd08 [ 282.895590][ T8314] [ 283.058802][ T8321] syz.1.1266[8321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.058984][ T8321] syz.1.1266[8321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.505763][ T8336] netlink: 'syz.1.1272': attribute type 17 has an invalid length. [ 283.566209][ T8336] netlink: 'syz.1.1272': attribute type 16 has an invalid length. [ 283.597270][ T8336] netlink: 152 bytes leftover after parsing attributes in process `syz.1.1272'. [ 284.111088][ T8350] netlink: 'syz.5.1274': attribute type 2 has an invalid length. [ 284.277430][ T8355] TCP: TCP_TX_DELAY enabled [ 284.437675][ T8350] netlink: 209852 bytes leftover after parsing attributes in process `syz.5.1274'. [ 284.654041][ T8363] FAULT_INJECTION: forcing a failure. [ 284.654041][ T8363] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 284.785271][ T8363] CPU: 0 PID: 8363 Comm: syz.0.1278 Not tainted 5.15.189-syzkaller #0 [ 284.793503][ T8363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 284.803681][ T8363] Call Trace: [ 284.806988][ T8363] [ 284.809947][ T8363] dump_stack_lvl+0x168/0x230 [ 284.814661][ T8363] ? show_regs_print_info+0x20/0x20 [ 284.820024][ T8363] ? load_image+0x3b0/0x3b0 [ 284.824558][ T8363] ? __lock_acquire+0x7c60/0x7c60 [ 284.829717][ T8363] should_fail+0x38c/0x4c0 [ 284.834243][ T8363] _copy_from_user+0x2e/0x170 [ 284.838937][ T8363] __copy_msghdr_from_user+0x448/0x5e0 [ 284.844459][ T8363] ? verify_lock_unused+0x140/0x140 [ 284.849674][ T8363] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 284.854985][ T8363] ___sys_sendmsg+0x156/0x260 [ 284.859679][ T8363] ? __sys_sendmsg+0x250/0x250 [ 284.864483][ T8363] ? __fdget+0x18b/0x210 [ 284.868830][ T8363] __se_sys_sendmsg+0x190/0x250 [ 284.873692][ T8363] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 284.879940][ T8363] ? __x64_sys_sendmsg+0x80/0x80 [ 284.884905][ T8363] ? syscall_enter_from_user_mode+0x2a/0x70 [ 284.890817][ T8363] do_syscall_64+0x4c/0xa0 [ 284.895270][ T8363] ? clear_bhb_loop+0x30/0x80 [ 284.900035][ T8363] ? clear_bhb_loop+0x30/0x80 [ 284.904726][ T8363] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 284.910629][ T8363] RIP: 0033:0x7f04d866bbe9 [ 284.915057][ T8363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 284.934674][ T8363] RSP: 002b:00007f04d68d3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 284.943098][ T8363] RAX: ffffffffffffffda RBX: 00007f04d8892fa0 RCX: 00007f04d866bbe9 [ 284.951077][ T8363] RDX: 00000000300080c5 RSI: 0000200000000000 RDI: 0000000000000004 [ 284.959057][ T8363] RBP: 00007f04d68d3090 R08: 0000000000000000 R09: 0000000000000000 [ 284.967056][ T8363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 284.975123][ T8363] R13: 00007f04d8893038 R14: 00007f04d8892fa0 R15: 00007ffdbd6ceb58 [ 284.983133][ T8363] [ 285.152592][ T8368] syz.5.1282[8368] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.152778][ T8368] syz.5.1282[8368] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.174249][ T8376] FAULT_INJECTION: forcing a failure. [ 285.174249][ T8376] name failslab, interval 1, probability 0, space 0, times 0 [ 285.296857][ T8376] CPU: 0 PID: 8376 Comm: syz.4.1286 Not tainted 5.15.189-syzkaller #0 [ 285.305081][ T8376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 285.315171][ T8376] Call Trace: [ 285.318570][ T8376] [ 285.321709][ T8376] dump_stack_lvl+0x168/0x230 [ 285.326446][ T8376] ? show_regs_print_info+0x20/0x20 [ 285.331743][ T8376] ? load_image+0x3b0/0x3b0 [ 285.336299][ T8376] ? __lock_acquire+0x7c60/0x7c60 [ 285.341373][ T8376] should_fail+0x38c/0x4c0 [ 285.345884][ T8376] should_failslab+0x5/0x20 [ 285.350422][ T8376] slab_pre_alloc_hook+0x51/0xc0 [ 285.355507][ T8376] __kmalloc+0x6b/0x330 [ 285.359696][ T8376] ? bpf_prog_test_run_flow_dissector+0x25d/0x5e0 [ 285.366155][ T8376] bpf_prog_test_run_flow_dissector+0x25d/0x5e0 [ 285.372474][ T8376] ? __lock_acquire+0x7c60/0x7c60 [ 285.377650][ T8376] ? xdp_convert_buff_to_md+0x1e0/0x1e0 [ 285.383264][ T8376] ? __fget_files+0x40f/0x480 [ 285.387995][ T8376] ? xdp_convert_buff_to_md+0x1e0/0x1e0 [ 285.393812][ T8376] bpf_prog_test_run+0x31e/0x390 [ 285.398802][ T8376] __sys_bpf+0x535/0x670 [ 285.403196][ T8376] ? bpf_link_show_fdinfo+0x340/0x340 [ 285.408639][ T8376] __x64_sys_bpf+0x78/0x90 [ 285.413090][ T8376] do_syscall_64+0x4c/0xa0 [ 285.417539][ T8376] ? clear_bhb_loop+0x30/0x80 [ 285.422244][ T8376] ? clear_bhb_loop+0x30/0x80 [ 285.426963][ T8376] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 285.433082][ T8376] RIP: 0033:0x7f3406ed7be9 [ 285.437529][ T8376] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 285.457183][ T8376] RSP: 002b:00007f340513f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 285.465636][ T8376] RAX: ffffffffffffffda RBX: 00007f34070fefa0 RCX: 00007f3406ed7be9 [ 285.473646][ T8376] RDX: 0000000000000050 RSI: 0000200000000640 RDI: 000000000000000a [ 285.481659][ T8376] RBP: 00007f340513f090 R08: 0000000000000000 R09: 0000000000000000 [ 285.489666][ T8376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 285.497666][ T8376] R13: 00007f34070ff038 R14: 00007f34070fefa0 R15: 00007fffe790cd08 [ 285.505793][ T8376] [ 287.335920][ T8406] device syzkaller0 entered promiscuous mode [ 288.094884][ T8422] syz.3.1299[8422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.095072][ T8422] syz.3.1299[8422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.063359][ T8439] FAULT_INJECTION: forcing a failure. [ 289.063359][ T8439] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 289.152616][ T8439] CPU: 0 PID: 8439 Comm: syz.4.1306 Not tainted 5.15.189-syzkaller #0 [ 289.161019][ T8439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 289.171298][ T8439] Call Trace: [ 289.174694][ T8439] [ 289.177645][ T8439] dump_stack_lvl+0x168/0x230 [ 289.182382][ T8439] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 289.188579][ T8439] ? show_regs_print_info+0x20/0x20 [ 289.193813][ T8439] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 289.200044][ T8439] should_fail+0x38c/0x4c0 [ 289.204479][ T8439] _copy_to_user+0x2e/0x130 [ 289.209080][ T8439] simple_read_from_buffer+0xe3/0x150 [ 289.214553][ T8439] proc_fail_nth_read+0x19a/0x210 [ 289.219610][ T8439] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 289.225782][ T8439] ? proc_fault_inject_write+0x2f0/0x2f0 [ 289.231427][ T8439] ? vfs_read+0x2df/0xcf0 [ 289.235854][ T8439] ? proc_fault_inject_write+0x2f0/0x2f0 [ 289.241501][ T8439] vfs_read+0x2f6/0xcf0 [ 289.245764][ T8439] ? kernel_read+0x1e0/0x1e0 [ 289.250364][ T8439] ? __fget_files+0x40f/0x480 [ 289.255057][ T8439] ? mutex_lock_nested+0x17/0x20 [ 289.260010][ T8439] ? __fdget_pos+0x2bf/0x370 [ 289.264890][ T8439] ? ksys_read+0x71/0x250 [ 289.269256][ T8439] ksys_read+0x14d/0x250 [ 289.273513][ T8439] ? vfs_write+0xd00/0xd00 [ 289.277956][ T8439] ? lockdep_hardirqs_on+0x94/0x140 [ 289.283398][ T8439] do_syscall_64+0x4c/0xa0 [ 289.287827][ T8439] ? clear_bhb_loop+0x30/0x80 [ 289.292512][ T8439] ? clear_bhb_loop+0x30/0x80 [ 289.297395][ T8439] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 289.303306][ T8439] RIP: 0033:0x7f3406ed65fc [ 289.307829][ T8439] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 289.327536][ T8439] RSP: 002b:00007f340513f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 289.335965][ T8439] RAX: ffffffffffffffda RBX: 00007f34070fefa0 RCX: 00007f3406ed65fc [ 289.343951][ T8439] RDX: 000000000000000f RSI: 00007f340513f0a0 RDI: 0000000000000007 [ 289.351957][ T8439] RBP: 00007f340513f090 R08: 0000000000000000 R09: 0000000000000000 [ 289.359936][ T8439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 289.367909][ T8439] R13: 00007f34070ff038 R14: 00007f34070fefa0 R15: 00007fffe790cd08 [ 289.375901][ T8439] [ 289.410924][ T8446] FAULT_INJECTION: forcing a failure. [ 289.410924][ T8446] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 289.487577][ T8446] CPU: 0 PID: 8446 Comm: syz.0.1308 Not tainted 5.15.189-syzkaller #0 [ 289.495820][ T8446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 289.505912][ T8446] Call Trace: [ 289.509226][ T8446] [ 289.512310][ T8446] dump_stack_lvl+0x168/0x230 [ 289.517032][ T8446] ? show_regs_print_info+0x20/0x20 [ 289.522321][ T8446] ? load_image+0x3b0/0x3b0 [ 289.526872][ T8446] ? __lock_acquire+0x7c60/0x7c60 [ 289.531931][ T8446] ? bpf_trace_run4+0x20c/0x330 [ 289.536826][ T8446] should_fail+0x38c/0x4c0 [ 289.541377][ T8446] prepare_alloc_pages+0x1e4/0x5f0 [ 289.546558][ T8446] __alloc_pages+0x10e/0x470 [ 289.551199][ T8446] ? zone_statistics+0x170/0x170 [ 289.556177][ T8446] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 289.562219][ T8446] pcpu_populate_chunk+0x15d/0xc90 [ 289.567397][ T8446] ? _find_next_bit+0x1a9/0x200 [ 289.572764][ T8446] pcpu_alloc+0xbed/0x1770 [ 289.577241][ T8446] bpf_map_alloc_percpu+0xc5/0x150 [ 289.582491][ T8446] array_map_alloc+0x370/0x6f0 [ 289.587299][ T8446] map_create+0x485/0x2170 [ 289.591803][ T8446] __sys_bpf+0x2a4/0x670 [ 289.596079][ T8446] ? bpf_link_show_fdinfo+0x340/0x340 [ 289.601483][ T8446] ? rcu_nmi_exit+0x6f/0xf0 [ 289.606033][ T8446] ? vtime_user_exit+0x2dc/0x400 [ 289.611185][ T8446] __x64_sys_bpf+0x78/0x90 [ 289.615641][ T8446] do_syscall_64+0x4c/0xa0 [ 289.620184][ T8446] ? clear_bhb_loop+0x30/0x80 [ 289.625027][ T8446] ? clear_bhb_loop+0x30/0x80 [ 289.629848][ T8446] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 289.635866][ T8446] RIP: 0033:0x7f04d866bbe9 [ 289.640422][ T8446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 289.660234][ T8446] RSP: 002b:00007f04d68d3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 289.668864][ T8446] RAX: ffffffffffffffda RBX: 00007f04d8892fa0 RCX: 00007f04d866bbe9 [ 289.676876][ T8446] RDX: 0000000000000050 RSI: 00002000000005c0 RDI: 2000000000000000 [ 289.684883][ T8446] RBP: 00007f04d68d3090 R08: 0000000000000000 R09: 0000000000000000 [ 289.693144][ T8446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 289.701149][ T8446] R13: 00007f04d8893038 R14: 00007f04d8892fa0 R15: 00007ffdbd6ceb58 [ 289.709261][ T8446] [ 291.339661][ T8470] device vcan0 entered promiscuous mode [ 291.345594][ T8470] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 291.929438][ T8498] syz.0.1318[8498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.929617][ T8498] syz.0.1318[8498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.211396][ T8501] netlink: 15231 bytes leftover after parsing attributes in process `syz.1.1319'. [ 294.175502][ T8539] syz.3.1331[8539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.175673][ T8539] syz.3.1331[8539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.440819][ T8581] syz.4.1345[8581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.509355][ T8581] syz.4.1345[8581] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.546654][ T8610] netlink: 'syz.3.1355': attribute type 10 has an invalid length. [ 297.663967][ T8610] netlink: 40 bytes leftover after parsing attributes in process `syz.3.1355'. [ 297.759908][ T8602] team0: Port device team_slave_0 removed [ 297.814719][ T8602] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 297.852672][ T8610] netlink: 'syz.3.1355': attribute type 10 has an invalid length. [ 297.899825][ T8610] netlink: 40 bytes leftover after parsing attributes in process `syz.3.1355'. [ 298.169684][ T8620] syz.5.1358[8620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.169885][ T8620] syz.5.1358[8620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.185079][ T8621] netlink: 61211 bytes leftover after parsing attributes in process `syz.0.1357'. [ 299.413584][ T8627] team0: Port device team_slave_0 removed [ 299.469314][ T8627] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 300.729135][ T8652] FAULT_INJECTION: forcing a failure. [ 300.729135][ T8652] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 300.870012][ T8652] CPU: 0 PID: 8652 Comm: syz.0.1367 Not tainted 5.15.189-syzkaller #0 [ 300.878247][ T8652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 300.888338][ T8652] Call Trace: [ 300.891654][ T8652] [ 300.894616][ T8652] dump_stack_lvl+0x168/0x230 [ 300.899336][ T8652] ? show_regs_print_info+0x20/0x20 [ 300.904680][ T8652] ? load_image+0x3b0/0x3b0 [ 300.909229][ T8652] ? __lock_acquire+0x7c60/0x7c60 [ 300.914304][ T8652] should_fail+0x38c/0x4c0 [ 300.918764][ T8652] _copy_from_user+0x2e/0x170 [ 300.923487][ T8652] __copy_msghdr_from_user+0xaf/0x5e0 [ 300.928903][ T8652] ? verify_lock_unused+0x140/0x140 [ 300.934138][ T8652] ? perf_tp_event+0xa3b/0xb50 [ 300.939049][ T8652] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 300.944471][ T8652] ? trace_event_raw_event_lock+0x250/0x250 [ 300.950417][ T8652] ___sys_sendmsg+0x156/0x260 [ 300.955156][ T8652] ? __sys_sendmsg+0x250/0x250 [ 300.959973][ T8652] ? trace_event_raw_event_lock+0x250/0x250 [ 300.965922][ T8652] ? __fdget+0x18b/0x210 [ 300.970202][ T8652] __se_sys_sendmsg+0x190/0x250 [ 300.975092][ T8652] ? __x64_sys_sendmsg+0x80/0x80 [ 300.980172][ T8652] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 300.986208][ T8652] ? lockdep_hardirqs_on+0x94/0x140 [ 300.991535][ T8652] do_syscall_64+0x4c/0xa0 [ 300.996181][ T8652] ? clear_bhb_loop+0x30/0x80 [ 301.001013][ T8652] ? clear_bhb_loop+0x30/0x80 [ 301.005730][ T8652] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 301.011696][ T8652] RIP: 0033:0x7f04d866bbe9 [ 301.016141][ T8652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 301.035781][ T8652] RSP: 002b:00007f04d68d3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 301.044236][ T8652] RAX: ffffffffffffffda RBX: 00007f04d8892fa0 RCX: 00007f04d866bbe9 [ 301.052244][ T8652] RDX: 0000000020000001 RSI: 0000200000000580 RDI: 0000000000000003 [ 301.060252][ T8652] RBP: 00007f04d68d3090 R08: 0000000000000000 R09: 0000000000000000 [ 301.068384][ T8652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 301.076399][ T8652] R13: 00007f04d8893038 R14: 00007f04d8892fa0 R15: 00007ffdbd6ceb58 [ 301.084527][ T8652] [ 301.298303][ T8677] netlink: 'syz.5.1374': attribute type 10 has an invalid length. [ 301.336712][ T8673] syz.1.1372[8673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.336888][ T8673] syz.1.1372[8673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.766479][ T8684] netlink: 'syz.5.1378': attribute type 21 has an invalid length. [ 301.877814][ T8684] netlink: 'syz.5.1378': attribute type 20 has an invalid length. [ 301.978726][ T8687] netlink: 'syz.1.1380': attribute type 21 has an invalid length. [ 301.996931][ T8687] netlink: 'syz.1.1380': attribute type 20 has an invalid length. [ 302.910531][ T8714] netlink: 'syz.5.1386': attribute type 10 has an invalid length. [ 302.933492][ T8714] netlink: 40 bytes leftover after parsing attributes in process `syz.5.1386'. [ 302.963475][ T8714] netlink: 'syz.5.1386': attribute type 10 has an invalid length. [ 303.011261][ T8714] netlink: 40 bytes leftover after parsing attributes in process `syz.5.1386'. [ 303.201457][ T8720] netlink: 'syz.3.1388': attribute type 21 has an invalid length. [ 303.276822][ T8720] netlink: 'syz.3.1388': attribute type 20 has an invalid length. [ 303.524696][ T8728] syz.4.1390[8728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.524922][ T8728] syz.4.1390[8728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.247247][ T8734] device syzkaller0 entered promiscuous mode [ 305.717833][ T8766] delete_channel: no stack [ 305.723460][ T8766] delete_channel: no stack [ 306.436226][ T8785] syz.3.1406[8785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.436432][ T8785] syz.3.1406[8785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.638764][ T8779] device syzkaller0 entered promiscuous mode [ 310.875966][ T8853] syz.0.1424[8853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.876177][ T8853] syz.0.1424[8853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.039335][ T8902] netlink: 16186 bytes leftover after parsing attributes in process `syz.1.1437'. [ 315.998224][ T8921] device wlan0 left promiscuous mode [ 316.101133][ T8924] syz.1.1444[8924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.101361][ T8924] syz.1.1444[8924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.318013][ T1423] ieee802154 phy0 wpan0: encryption failed: -22 [ 317.335874][ T1423] ieee802154 phy1 wpan1: encryption failed: -22 [ 318.762264][ T8946] syz.5.1460[8946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.762466][ T8946] syz.5.1460[8946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.009334][ T9013] syz.5.1468[9013] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.080474][ T9013] syz.5.1468[9013] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.341849][ T9016] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1471'. [ 326.913329][ T9028] netlink: 'syz.0.1472': attribute type 39 has an invalid length. [ 327.802469][ T9048] device wlan0 entered promiscuous mode [ 327.816733][ T9046] netlink: 6 bytes leftover after parsing attributes in process `syz.3.1490'. [ 327.967841][ T9046] openvswitch: netlink: Flow actions attr not present in new flow. [ 329.029993][ T9076] syz.5.1487[9076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.030172][ T9076] syz.5.1487[9076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.984573][ T9084] device syzkaller0 entered promiscuous mode [ 331.136899][ T9094] netlink: 16186 bytes leftover after parsing attributes in process `syz.4.1494'. [ 331.338037][ T9106] netlink: 'syz.5.1498': attribute type 39 has an invalid length. [ 331.948626][ T9115] syz.0.1502[9115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.948796][ T9115] syz.0.1502[9115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.416632][ T9124] netlink: 'syz.0.1504': attribute type 39 has an invalid length. [ 332.577183][ T9130] netlink: 209820 bytes leftover after parsing attributes in process `syz.0.1504'. [ 334.374200][ T9148] netlink: 16186 bytes leftover after parsing attributes in process `syz.3.1509'. [ 335.218094][ T9161] device wlan0 left promiscuous mode [ 335.271443][ T9162] device wlan0 entered promiscuous mode [ 335.344640][ T9165] syz.5.1515[9165] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.344825][ T9165] syz.5.1515[9165] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.120043][ T9252] €Â0: renamed from pim6reg1 [ 343.149790][ T9284] netlink: 'syz.3.1557': attribute type 10 has an invalid length. [ 343.257679][ T9284] netlink: 40 bytes leftover after parsing attributes in process `syz.3.1557'. [ 343.575022][ T9288] netlink: 'syz.0.1558': attribute type 39 has an invalid length. [ 344.357067][ T9316] netlink: 'syz.3.1567': attribute type 29 has an invalid length. [ 344.421904][ T9311] netlink: 6 bytes leftover after parsing attributes in process `syz.0.1566'. [ 344.423797][ T9316] netlink: 'syz.3.1567': attribute type 29 has an invalid length. [ 344.439490][ T9311] openvswitch: netlink: Flow actions attr not present in new flow. [ 346.686054][ T9329] device syzkaller0 entered promiscuous mode [ 346.772786][ T9333] netlink: 'syz.1.1569': attribute type 17 has an invalid length. [ 346.854631][ T9333] netlink: 'syz.1.1569': attribute type 16 has an invalid length. [ 346.910828][ T9333] netlink: 152 bytes leftover after parsing attributes in process `syz.1.1569'. [ 348.738871][ T9374] netlink: 'syz.1.1583': attribute type 39 has an invalid length. [ 350.674411][ T9406] syz.0.1602[9406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.674573][ T9406] syz.0.1602[9406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.717200][ T9431] netlink: 'syz.1.1601': attribute type 10 has an invalid length. [ 354.640174][ T9462] netlink: 'syz.0.1611': attribute type 39 has an invalid length. [ 355.166435][ T9474] netlink: 'syz.4.1615': attribute type 10 has an invalid length. [ 356.025322][ T9489] device syzkaller0 entered promiscuous mode [ 356.135011][ T9489] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 356.678754][ T9509] netlink: 'syz.3.1623': attribute type 39 has an invalid length. [ 357.895396][ T9530] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1629'. [ 357.983584][ T9530] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1629'. [ 358.300049][ T9529] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1629'. [ 358.359855][ T9539] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 358.431938][ T9531] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1629'. [ 358.555225][ T9542] netlink: 'syz.4.1633': attribute type 20 has an invalid length. [ 359.481478][ T9553] FAULT_INJECTION: forcing a failure. [ 359.481478][ T9553] name failslab, interval 1, probability 0, space 0, times 0 [ 359.572183][ T9553] CPU: 1 PID: 9553 Comm: syz.0.1635 Not tainted 5.15.189-syzkaller #0 [ 359.580979][ T9553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 359.591161][ T9553] Call Trace: [ 359.594705][ T9553] [ 359.597666][ T9553] dump_stack_lvl+0x168/0x230 [ 359.602388][ T9553] ? show_regs_print_info+0x20/0x20 [ 359.607629][ T9553] ? load_image+0x3b0/0x3b0 [ 359.612211][ T9553] ? __might_sleep+0xf0/0xf0 [ 359.616929][ T9553] ? __lock_acquire+0x7c60/0x7c60 [ 359.621997][ T9553] should_fail+0x38c/0x4c0 [ 359.626459][ T9553] should_failslab+0x5/0x20 [ 359.630998][ T9553] slab_pre_alloc_hook+0x51/0xc0 [ 359.635972][ T9553] kmem_cache_alloc_node+0x47/0x2d0 [ 359.641204][ T9553] ? __alloc_skb+0xf4/0x750 [ 359.645859][ T9553] __alloc_skb+0xf4/0x750 [ 359.650245][ T9553] netlink_sendmsg+0x645/0xbc0 [ 359.655062][ T9553] ? netlink_getsockopt+0x560/0x560 [ 359.660307][ T9553] ? aa_sock_msg_perm+0x94/0x150 [ 359.665283][ T9553] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 359.670599][ T9553] ? security_socket_sendmsg+0x7c/0xa0 [ 359.676101][ T9553] ? netlink_getsockopt+0x560/0x560 [ 359.681365][ T9553] ____sys_sendmsg+0x5a2/0x8c0 [ 359.686167][ T9553] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 359.692354][ T9553] ? __sys_sendmsg_sock+0x30/0x30 [ 359.697435][ T9553] ___sys_sendmsg+0x1f0/0x260 [ 359.702156][ T9553] ? __sys_sendmsg+0x250/0x250 [ 359.706955][ T9553] ? rcu_nmi_exit+0x6f/0xf0 [ 359.711638][ T9553] __se_sys_sendmsg+0x190/0x250 [ 359.716564][ T9553] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 359.722893][ T9553] ? __x64_sys_sendmsg+0x80/0x80 [ 359.727976][ T9553] ? syscall_enter_from_user_mode+0x2a/0x70 [ 359.733910][ T9553] do_syscall_64+0x4c/0xa0 [ 359.738363][ T9553] ? clear_bhb_loop+0x30/0x80 [ 359.743198][ T9553] ? clear_bhb_loop+0x30/0x80 [ 359.747920][ T9553] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 359.753944][ T9553] RIP: 0033:0x7f04d866bbe9 [ 359.758436][ T9553] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 359.778181][ T9553] RSP: 002b:00007f04d68d3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 359.786965][ T9553] RAX: ffffffffffffffda RBX: 00007f04d8892fa0 RCX: 00007f04d866bbe9 [ 359.795060][ T9553] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000005 [ 359.803058][ T9553] RBP: 00007f04d68d3090 R08: 0000000000000000 R09: 0000000000000000 [ 359.811165][ T9553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 359.819242][ T9553] R13: 00007f04d8893038 R14: 00007f04d8892fa0 R15: 00007ffdbd6ceb58 [ 359.827244][ T9553] [ 360.882734][ T9573] netlink: 'syz.0.1638': attribute type 39 has an invalid length. [ 361.094920][ T9576] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 361.474939][ T9589] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1646'. [ 361.769448][ T9596] netlink: 'syz.5.1650': attribute type 39 has an invalid length. [ 363.321158][ T9633] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1662'. [ 364.067584][ T9648] sock: sock_timestamping_bind_phc: sock not bind to device [ 364.301732][ T9652] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1668'. [ 365.035680][ T9660] FAULT_INJECTION: forcing a failure. [ 365.035680][ T9660] name failslab, interval 1, probability 0, space 0, times 0 [ 365.117611][ T9660] CPU: 1 PID: 9660 Comm: syz.3.1670 Not tainted 5.15.189-syzkaller #0 [ 365.125844][ T9660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 365.136216][ T9660] Call Trace: [ 365.139624][ T9660] [ 365.142826][ T9660] dump_stack_lvl+0x168/0x230 [ 365.147550][ T9660] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 365.153504][ T9660] ? show_regs_print_info+0x20/0x20 [ 365.158779][ T9660] ? load_image+0x3b0/0x3b0 [ 365.163338][ T9660] ? perf_trace_lock+0x2ec/0x370 [ 365.168455][ T9660] should_fail+0x38c/0x4c0 [ 365.172927][ T9660] should_failslab+0x5/0x20 [ 365.177455][ T9660] slab_pre_alloc_hook+0x51/0xc0 [ 365.182449][ T9660] ? skb_clone+0x1bd/0x350 [ 365.187001][ T9660] kmem_cache_alloc+0x3d/0x290 [ 365.191824][ T9660] skb_clone+0x1bd/0x350 [ 365.196126][ T9660] __netlink_deliver_tap+0x3cd/0x7c0 [ 365.201486][ T9660] netlink_deliver_tap+0x16c/0x180 [ 365.206678][ T9660] netlink_unicast+0x74f/0x920 [ 365.211521][ T9660] netlink_sendmsg+0x8ab/0xbc0 [ 365.216356][ T9660] ? netlink_getsockopt+0x560/0x560 [ 365.221616][ T9660] ? aa_sock_msg_perm+0x94/0x150 [ 365.226605][ T9660] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 365.231942][ T9660] ? security_socket_sendmsg+0x7c/0xa0 [ 365.237448][ T9660] ? netlink_getsockopt+0x560/0x560 [ 365.242690][ T9660] ____sys_sendmsg+0x5a2/0x8c0 [ 365.247608][ T9660] ? memset+0x1e/0x40 [ 365.251637][ T9660] ? __sys_sendmsg_sock+0x30/0x30 [ 365.256726][ T9660] ? import_iovec+0x6f/0xa0 [ 365.261280][ T9660] ___sys_sendmsg+0x1f0/0x260 [ 365.266016][ T9660] ? __sys_sendmsg+0x250/0x250 [ 365.270847][ T9660] ? trace_event_raw_event_lock+0x250/0x250 [ 365.276785][ T9660] ? vfs_write+0x84d/0xd00 [ 365.281286][ T9660] ? __fdget+0x18b/0x210 [ 365.285741][ T9660] __se_sys_sendmsg+0x190/0x250 [ 365.290634][ T9660] ? __x64_sys_sendmsg+0x80/0x80 [ 365.295638][ T9660] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 365.301784][ T9660] ? lockdep_hardirqs_on+0x94/0x140 [ 365.307043][ T9660] do_syscall_64+0x4c/0xa0 [ 365.311509][ T9660] ? clear_bhb_loop+0x30/0x80 [ 365.316230][ T9660] ? clear_bhb_loop+0x30/0x80 [ 365.320951][ T9660] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 365.326991][ T9660] RIP: 0033:0x7f38e4179be9 [ 365.331454][ T9660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 365.351222][ T9660] RSP: 002b:00007f38e23e1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 365.359690][ T9660] RAX: ffffffffffffffda RBX: 00007f38e43a0fa0 RCX: 00007f38e4179be9 [ 365.367709][ T9660] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000004 [ 365.375728][ T9660] RBP: 00007f38e23e1090 R08: 0000000000000000 R09: 0000000000000000 [ 365.383844][ T9660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 365.392135][ T9660] R13: 00007f38e43a1038 R14: 00007f38e43a0fa0 R15: 00007ffc366f34b8 [ 365.400192][ T9660] [ 365.707351][ T9660] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1670'. [ 365.825440][ T9673] netlink: 14354 bytes leftover after parsing attributes in process `syz.5.1675'. [ 365.908664][ T9672] netlink: 14354 bytes leftover after parsing attributes in process `syz.5.1675'. [ 366.013420][ T9680] netlink: 'syz.0.1676': attribute type 17 has an invalid length. [ 366.054198][ T9680] netlink: 148 bytes leftover after parsing attributes in process `syz.0.1676'. [ 367.575456][ T9712] device syzkaller0 entered promiscuous mode [ 367.952925][ T9724] syz.5.1689[9724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.953085][ T9724] syz.5.1689[9724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.041842][ T9726] netlink: 156 bytes leftover after parsing attributes in process `syz.4.1691'. [ 369.009931][ T9750] netlink: 'syz.3.1697': attribute type 21 has an invalid length. [ 369.095143][ T9750] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1697'. [ 369.947879][ T9761] FAULT_INJECTION: forcing a failure. [ 369.947879][ T9761] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 370.019585][ T9761] CPU: 0 PID: 9761 Comm: syz.5.1701 Not tainted 5.15.189-syzkaller #0 [ 370.027816][ T9761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 370.038097][ T9761] Call Trace: [ 370.041409][ T9761] [ 370.044466][ T9761] dump_stack_lvl+0x168/0x230 [ 370.049186][ T9761] ? show_regs_print_info+0x20/0x20 [ 370.054516][ T9761] ? load_image+0x3b0/0x3b0 [ 370.059171][ T9761] ? __lock_acquire+0x7c60/0x7c60 [ 370.064249][ T9761] should_fail+0x38c/0x4c0 [ 370.068722][ T9761] _copy_to_user+0x2e/0x130 [ 370.073346][ T9761] simple_read_from_buffer+0xe3/0x150 [ 370.078760][ T9761] proc_fail_nth_read+0x19a/0x210 [ 370.083829][ T9761] ? proc_fault_inject_write+0x2f0/0x2f0 [ 370.089508][ T9761] ? fsnotify_perm+0x254/0x560 [ 370.094424][ T9761] ? proc_fault_inject_write+0x2f0/0x2f0 [ 370.100185][ T9761] vfs_read+0x2f6/0xcf0 [ 370.104603][ T9761] ? rcu_lock_release+0x5/0x20 [ 370.109486][ T9761] ? kernel_read+0x1e0/0x1e0 [ 370.114217][ T9761] ? __fget_files+0x40f/0x480 [ 370.119037][ T9761] ? mutex_lock_nested+0x17/0x20 [ 370.124007][ T9761] ? __fdget_pos+0x2bf/0x370 [ 370.128712][ T9761] ? ksys_read+0x71/0x250 [ 370.133084][ T9761] ksys_read+0x14d/0x250 [ 370.137363][ T9761] ? vfs_write+0xd00/0xd00 [ 370.141922][ T9761] ? trace_sys_enter+0x1f/0x80 [ 370.146813][ T9761] do_syscall_64+0x4c/0xa0 [ 370.151268][ T9761] ? clear_bhb_loop+0x30/0x80 [ 370.156106][ T9761] ? clear_bhb_loop+0x30/0x80 [ 370.160815][ T9761] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 370.166747][ T9761] RIP: 0033:0x7ff66e23b5fc [ 370.171195][ T9761] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 370.191107][ T9761] RSP: 002b:00007ff66c4a4030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 370.199570][ T9761] RAX: ffffffffffffffda RBX: 00007ff66e463fa0 RCX: 00007ff66e23b5fc [ 370.207633][ T9761] RDX: 000000000000000f RSI: 00007ff66c4a40a0 RDI: 0000000000000005 [ 370.215638][ T9761] RBP: 00007ff66c4a4090 R08: 0000000000000000 R09: 0000000000000000 [ 370.223644][ T9761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 370.231745][ T9761] R13: 00007ff66e464038 R14: 00007ff66e463fa0 R15: 00007ffcd6582708 [ 370.239773][ T9761] [ 370.421254][ T9757] delete_channel: no stack [ 370.562867][ T9776] syz.3.1706[9776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.563098][ T9776] syz.3.1706[9776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.663162][ T9779] syz.1.1707[9779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.726961][ T9779] syz.1.1707[9779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.811681][ T9782] netlink: 'syz.0.1708': attribute type 10 has an invalid length. [ 370.930123][ T9782] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1708'. [ 370.992402][ T9782] device dummy0 entered promiscuous mode [ 371.052264][ T9782] bridge0: port 4(dummy0) entered blocking state [ 371.102165][ T9782] bridge0: port 4(dummy0) entered disabled state [ 371.478645][ T9782] bridge0: port 4(dummy0) entered blocking state [ 371.485477][ T9782] bridge0: port 4(dummy0) entered forwarding state [ 372.091784][ T9796] netlink: 'syz.4.1712': attribute type 17 has an invalid length. [ 372.111761][ T9796] netlink: 148 bytes leftover after parsing attributes in process `syz.4.1712'. [ 374.252898][ T9838] syz.0.1726[9838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.253061][ T9838] syz.0.1726[9838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.541359][ T9844] netlink: 'syz.3.1728': attribute type 17 has an invalid length. [ 374.587910][ T9844] netlink: 148 bytes leftover after parsing attributes in process `syz.3.1728'. [ 375.516402][ T9868] netlink: 156 bytes leftover after parsing attributes in process `syz.0.1735'. [ 376.168651][ T9885] syz.5.1739[9885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.168788][ T9885] syz.5.1739[9885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.507981][ T9896] netlink: 140 bytes leftover after parsing attributes in process `syz.3.1744'. [ 376.696329][ T9902] netlink: 'syz.3.1744': attribute type 21 has an invalid length. [ 376.742007][ T9902] netlink: 'syz.3.1744': attribute type 1 has an invalid length. [ 376.791339][ T9902] netlink: 16098 bytes leftover after parsing attributes in process `syz.3.1744'. [ 377.654648][ T9923] netlink: 156 bytes leftover after parsing attributes in process `syz.5.1752'. [ 378.302564][ T9936] delete_channel: no stack [ 378.570569][ T1423] ieee802154 phy0 wpan0: encryption failed: -22 [ 378.577038][ T1423] ieee802154 phy1 wpan1: encryption failed: -22 [ 379.199938][ T9951] delete_channel: no stack [ 379.675035][ T9973] FAULT_INJECTION: forcing a failure. [ 379.675035][ T9973] name failslab, interval 1, probability 0, space 0, times 0 [ 379.809684][ T9973] CPU: 0 PID: 9973 Comm: syz.0.1778 Not tainted 5.15.189-syzkaller #0 [ 379.817985][ T9973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 379.828082][ T9973] Call Trace: [ 379.831396][ T9973] [ 379.834355][ T9973] dump_stack_lvl+0x168/0x230 [ 379.839097][ T9973] ? show_regs_print_info+0x20/0x20 [ 379.844560][ T9973] ? load_image+0x3b0/0x3b0 [ 379.849114][ T9973] ? __might_sleep+0xf0/0xf0 [ 379.853868][ T9973] ? __lock_acquire+0x7c60/0x7c60 [ 379.858945][ T9973] should_fail+0x38c/0x4c0 [ 379.863409][ T9973] should_failslab+0x5/0x20 [ 379.867950][ T9973] slab_pre_alloc_hook+0x51/0xc0 [ 379.873006][ T9973] __kmalloc_node_track_caller+0x68/0x3a0 [ 379.878783][ T9973] ? netlink_dump+0x1d3/0xcd0 [ 379.883546][ T9973] ? kmem_cache_alloc_node+0x162/0x2d0 [ 379.889050][ T9973] ? __alloc_skb+0xf4/0x750 [ 379.893686][ T9973] ? netlink_dump+0x1d3/0xcd0 [ 379.898421][ T9973] __alloc_skb+0x22c/0x750 [ 379.902887][ T9973] ? end_current_label_crit_section+0x170/0x170 [ 379.909462][ T9973] netlink_dump+0x1d3/0xcd0 [ 379.914219][ T9973] ? apparmor_capable+0x12c/0x190 [ 379.919500][ T9973] ? bpf_lsm_capable+0x5/0x10 [ 379.924315][ T9973] ? netlink_lookup+0x1d0/0x1d0 [ 379.929225][ T9973] ? __inet_diag_dump_start+0x805/0x970 [ 379.934913][ T9973] __netlink_dump_start+0x523/0x700 [ 379.940166][ T9973] inet_diag_rcv_msg_compat+0x1e9/0x3c0 [ 379.945736][ T9973] ? inet_diag_unregister+0xb0/0xb0 [ 379.950952][ T9973] ? mutex_lock_io_nested+0x60/0x60 [ 379.956164][ T9973] ? __inet_diag_dump+0x380/0x380 [ 379.961209][ T9973] ? inet_diag_dump_start_compat+0x20/0x20 [ 379.967025][ T9973] ? inet_diag_dump+0x50/0x50 [ 379.971710][ T9973] ? memcpy+0x3c/0x60 [ 379.975708][ T9973] ? sock_diag_rcv+0x17/0x40 [ 379.980441][ T9973] ? sock_diag_rcv+0x17/0x40 [ 379.985064][ T9973] ? inet_diag_unregister+0xb0/0xb0 [ 379.990274][ T9973] sock_diag_rcv_msg+0x164/0x3e0 [ 379.995237][ T9973] netlink_rcv_skb+0x1e0/0x430 [ 380.000018][ T9973] ? sock_diag_bind+0xa0/0xa0 [ 380.004706][ T9973] ? netlink_ack+0xb60/0xb60 [ 380.009307][ T9973] ? __lock_acquire+0x7c60/0x7c60 [ 380.014357][ T9973] sock_diag_rcv+0x26/0x40 [ 380.018788][ T9973] netlink_unicast+0x774/0x920 [ 380.023575][ T9973] netlink_sendmsg+0x8ab/0xbc0 [ 380.028559][ T9973] ? netlink_getsockopt+0x560/0x560 [ 380.033863][ T9973] ? aa_sock_msg_perm+0x94/0x150 [ 380.038815][ T9973] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 380.044227][ T9973] ? security_socket_sendmsg+0x7c/0xa0 [ 380.049706][ T9973] ? netlink_getsockopt+0x560/0x560 [ 380.054918][ T9973] ____sys_sendmsg+0x5a2/0x8c0 [ 380.059701][ T9973] ? memset+0x1e/0x40 [ 380.063693][ T9973] ? __sys_sendmsg_sock+0x30/0x30 [ 380.068737][ T9973] ? import_iovec+0x6f/0xa0 [ 380.073260][ T9973] ___sys_sendmsg+0x1f0/0x260 [ 380.078188][ T9973] ? __sys_sendmsg+0x250/0x250 [ 380.083038][ T9973] ? trace_event_raw_event_lock+0x250/0x250 [ 380.088966][ T9973] ? vfs_write+0x84d/0xd00 [ 380.093682][ T9973] ? __fdget+0x18b/0x210 [ 380.098747][ T9973] __se_sys_sendmsg+0x190/0x250 [ 380.103631][ T9973] ? __x64_sys_sendmsg+0x80/0x80 [ 380.108671][ T9973] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 380.114689][ T9973] ? lockdep_hardirqs_on+0x94/0x140 [ 380.119902][ T9973] do_syscall_64+0x4c/0xa0 [ 380.124336][ T9973] ? clear_bhb_loop+0x30/0x80 [ 380.129019][ T9973] ? clear_bhb_loop+0x30/0x80 [ 380.133709][ T9973] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 380.139621][ T9973] RIP: 0033:0x7f04d866bbe9 [ 380.144046][ T9973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 380.163791][ T9973] RSP: 002b:00007f04d68d3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 380.172227][ T9973] RAX: ffffffffffffffda RBX: 00007f04d8892fa0 RCX: 00007f04d866bbe9 [ 380.180305][ T9973] RDX: 0000000000000000 RSI: 0000200000000340 RDI: 0000000000000003 [ 380.188287][ T9973] RBP: 00007f04d68d3090 R08: 0000000000000000 R09: 0000000000000000 [ 380.196268][ T9973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 380.204269][ T9973] R13: 00007f04d8893038 R14: 00007f04d8892fa0 R15: 00007ffdbd6ceb58 [ 380.212279][ T9973] [ 380.496819][ T9978] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1768'. [ 381.060703][ T9993] netlink: 180 bytes leftover after parsing attributes in process `syz.3.1773'. [ 382.262473][T10026] FAULT_INJECTION: forcing a failure. [ 382.262473][T10026] name failslab, interval 1, probability 0, space 0, times 0 [ 382.335907][T10026] CPU: 0 PID: 10026 Comm: syz.0.1784 Not tainted 5.15.189-syzkaller #0 [ 382.344213][T10026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 382.354301][T10026] Call Trace: [ 382.357604][T10026] [ 382.360564][T10026] dump_stack_lvl+0x168/0x230 [ 382.365282][T10026] ? show_regs_print_info+0x20/0x20 [ 382.370694][T10026] ? load_image+0x3b0/0x3b0 [ 382.375237][T10026] ? __might_sleep+0xf0/0xf0 [ 382.379857][T10026] ? __lock_acquire+0x7c60/0x7c60 [ 382.384925][T10026] should_fail+0x38c/0x4c0 [ 382.389381][T10026] should_failslab+0x5/0x20 [ 382.393916][T10026] slab_pre_alloc_hook+0x51/0xc0 [ 382.398991][T10026] kmem_cache_alloc_node+0x47/0x2d0 [ 382.404339][T10026] ? __alloc_skb+0xf4/0x750 [ 382.408870][T10026] ? __netlink_dump_start+0x11f/0x700 [ 382.414551][T10026] __alloc_skb+0xf4/0x750 [ 382.418928][T10026] netlink_dump+0x1d3/0xcd0 [ 382.423479][T10026] ? mutex_lock_io_nested+0x60/0x60 [ 382.428806][T10026] ? netlink_lookup+0x1d0/0x1d0 [ 382.433706][T10026] __netlink_dump_start+0x523/0x700 [ 382.438942][T10026] rtnetlink_rcv_msg+0xb97/0xe60 [ 382.443912][T10026] ? neigh_get+0xca0/0xca0 [ 382.448365][T10026] ? rtnetlink_bind+0x80/0x80 [ 382.453084][T10026] ? __local_bh_enable_ip+0x12a/0x1b0 [ 382.458616][T10026] ? lockdep_hardirqs_on+0x94/0x140 [ 382.463845][T10026] ? __local_bh_enable_ip+0x12a/0x1b0 [ 382.469247][T10026] ? _local_bh_enable+0xa0/0xa0 [ 382.474131][T10026] ? __dev_queue_xmit+0x1bc5/0x2ed0 [ 382.479367][T10026] ? dev_queue_xmit+0x20/0x20 [ 382.484088][T10026] ? memcpy+0x3c/0x60 [ 382.488099][T10026] ? __copy_skb_header+0x417/0x5a0 [ 382.493243][T10026] ? neigh_get+0xca0/0xca0 [ 382.497683][T10026] ? __skb_clone+0x480/0x790 [ 382.502304][T10026] netlink_rcv_skb+0x1e0/0x430 [ 382.507100][T10026] ? rtnetlink_bind+0x80/0x80 [ 382.511911][T10026] ? netlink_ack+0xb60/0xb60 [ 382.516543][T10026] netlink_unicast+0x774/0x920 [ 382.521345][T10026] netlink_sendmsg+0x8ab/0xbc0 [ 382.526234][T10026] ? netlink_getsockopt+0x560/0x560 [ 382.531469][T10026] ? aa_sock_msg_perm+0x94/0x150 [ 382.536441][T10026] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 382.541836][T10026] ? security_socket_sendmsg+0x7c/0xa0 [ 382.547333][T10026] ? netlink_getsockopt+0x560/0x560 [ 382.552558][T10026] ____sys_sendmsg+0x5a2/0x8c0 [ 382.557355][T10026] ? memset+0x1e/0x40 [ 382.561364][T10026] ? __sys_sendmsg_sock+0x30/0x30 [ 382.566439][T10026] ? import_iovec+0x6f/0xa0 [ 382.570977][T10026] ___sys_sendmsg+0x1f0/0x260 [ 382.575691][T10026] ? __sys_sendmsg+0x250/0x250 [ 382.580499][T10026] ? vfs_write+0x84d/0xd00 [ 382.584958][T10026] ? __fdget+0x18b/0x210 [ 382.589230][T10026] __se_sys_sendmsg+0x190/0x250 [ 382.594145][T10026] ? __x64_sys_sendmsg+0x80/0x80 [ 382.599153][T10026] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 382.605181][T10026] ? lockdep_hardirqs_on+0x94/0x140 [ 382.610581][T10026] do_syscall_64+0x4c/0xa0 [ 382.615027][T10026] ? clear_bhb_loop+0x30/0x80 [ 382.619728][T10026] ? clear_bhb_loop+0x30/0x80 [ 382.624791][T10026] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 382.630711][T10026] RIP: 0033:0x7f04d866bbe9 [ 382.635158][T10026] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 382.654886][T10026] RSP: 002b:00007f04d68d3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 382.663439][T10026] RAX: ffffffffffffffda RBX: 00007f04d8892fa0 RCX: 00007f04d866bbe9 [ 382.671445][T10026] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 382.679452][T10026] RBP: 00007f04d68d3090 R08: 0000000000000000 R09: 0000000000000000 [ 382.687451][T10026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 382.695445][T10026] R13: 00007f04d8893038 R14: 00007f04d8892fa0 R15: 00007ffdbd6ceb58 [ 382.703462][T10026] [ 383.831545][T10021] netlink: 'syz.4.1782': attribute type 10 has an invalid length. [ 383.897750][T10021] netlink: 40 bytes leftover after parsing attributes in process `syz.4.1782'. [ 384.044469][T10021] device dummy0 entered promiscuous mode [ 384.124133][T10021] bridge0: port 3(dummy0) entered blocking state [ 384.187618][T10021] bridge0: port 3(dummy0) entered disabled state [ 384.325438][T10021] bridge0: port 3(dummy0) entered blocking state [ 384.331924][T10021] bridge0: port 3(dummy0) entered forwarding state [ 386.264850][T10090] netlink: 15231 bytes leftover after parsing attributes in process `syz.5.1815'. [ 386.437862][T10096] netlink: 'syz.0.1808': attribute type 10 has an invalid length. [ 386.514122][T10096] bridge0: port 4(dummy0) entered disabled state [ 386.520854][T10096] bridge0: port 3(veth1_to_team) entered disabled state [ 386.528185][T10096] bridge0: port 2(bridge_slave_1) entered disabled state [ 386.535648][T10096] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.129490][T10108] netlink: 'syz.5.1810': attribute type 6 has an invalid length. [ 387.696237][T10124] €Â0: renamed from pim6reg1 [ 388.778517][T10147] veth1_macvtap: mtu greater than device maximum [ 390.306107][T10169] €Â0: renamed from pim6reg1 [ 390.858694][T10185] syz.1.1840[10185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.859064][T10185] syz.1.1840[10185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.452069][T10210] €Â0: renamed from pim6reg1 [ 394.167303][T10230] syz.1.1856[10230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.169830][T10230] syz.1.1856[10230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.085626][T10252] €Â0: renamed from pim6reg1 [ 396.729231][T10261] FAULT_INJECTION: forcing a failure. [ 396.729231][T10261] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 396.890885][T10261] CPU: 1 PID: 10261 Comm: syz.3.1865 Not tainted 5.15.189-syzkaller #0 [ 396.899428][T10261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 396.909518][T10261] Call Trace: [ 396.912820][T10261] [ 396.915773][T10261] dump_stack_lvl+0x168/0x230 [ 396.920627][T10261] ? show_regs_print_info+0x20/0x20 [ 396.925945][T10261] ? load_image+0x3b0/0x3b0 [ 396.930502][T10261] ? __lock_acquire+0x7c60/0x7c60 [ 396.935572][T10261] should_fail+0x38c/0x4c0 [ 396.940043][T10261] _copy_to_user+0x2e/0x130 [ 396.944794][T10261] simple_read_from_buffer+0xe3/0x150 [ 396.950320][T10261] proc_fail_nth_read+0x19a/0x210 [ 396.955431][T10261] ? proc_fault_inject_write+0x2f0/0x2f0 [ 396.961249][T10261] ? fsnotify_perm+0x254/0x560 [ 396.966058][T10261] ? proc_fault_inject_write+0x2f0/0x2f0 [ 396.971727][T10261] vfs_read+0x2f6/0xcf0 [ 396.975932][T10261] ? kernel_read+0x1e0/0x1e0 [ 396.980558][T10261] ? __fget_files+0x40f/0x480 [ 396.985283][T10261] ? mutex_lock_nested+0x17/0x20 [ 396.990367][T10261] ? __fdget_pos+0x2bf/0x370 [ 396.994988][T10261] ? ksys_read+0x71/0x250 [ 396.999359][T10261] ksys_read+0x14d/0x250 [ 397.003630][T10261] ? vfs_write+0xd00/0xd00 [ 397.008078][T10261] ? lockdep_hardirqs_on+0x94/0x140 [ 397.013691][T10261] do_syscall_64+0x4c/0xa0 [ 397.018155][T10261] ? clear_bhb_loop+0x30/0x80 [ 397.022865][T10261] ? clear_bhb_loop+0x30/0x80 [ 397.027601][T10261] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 397.033536][T10261] RIP: 0033:0x7f38e41785fc [ 397.038084][T10261] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 397.057907][T10261] RSP: 002b:00007f38e23c0030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 397.066534][T10261] RAX: ffffffffffffffda RBX: 00007f38e43a1090 RCX: 00007f38e41785fc [ 397.074540][T10261] RDX: 000000000000000f RSI: 00007f38e23c00a0 RDI: 0000000000000005 [ 397.082677][T10261] RBP: 00007f38e23c0090 R08: 0000000000000000 R09: 0000000000000000 [ 397.090765][T10261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 397.098767][T10261] R13: 00007f38e43a1128 R14: 00007f38e43a1090 R15: 00007ffc366f34b8 [ 397.107340][T10261] [ 398.076113][T10274] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 398.148238][T10274] netlink: 'syz.1.1873': attribute type 10 has an invalid length. [ 398.168039][T10274] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1873'. [ 398.871153][T10302] €Â0: renamed from pim6reg1 [ 399.178418][T10306] netlink: 'syz.4.1883': attribute type 3 has an invalid length. [ 399.224640][T10306] netlink: 'syz.4.1883': attribute type 10 has an invalid length. [ 400.676366][T10323] netlink: 'syz.1.1889': attribute type 3 has an invalid length. [ 400.732236][T10323] netlink: 'syz.1.1889': attribute type 10 has an invalid length. [ 401.951601][T10355] €Â0: renamed from pim6reg1 [ 403.221030][T10385] netlink: 'syz.4.1910': attribute type 10 has an invalid length. [ 404.818658][T10436] €Â0: renamed from pim6reg1 [ 405.333955][T10451] €Â0: renamed from pim6reg1 [ 406.107204][T10468] netlink: 105120 bytes leftover after parsing attributes in process `syz.4.1935'. [ 406.338030][T10478] netlink: 'syz.1.1938': attribute type 10 has an invalid length. [ 406.411410][T10476] device wlan0 left promiscuous mode [ 406.502634][T10484] device wlan0 entered promiscuous mode [ 406.579778][T10476] netlink: 'syz.5.1939': attribute type 9 has an invalid length. [ 406.649479][T10484] netlink: 60 bytes leftover after parsing attributes in process `syz.5.1939'. [ 406.687821][T10476] netlink: 209836 bytes leftover after parsing attributes in process `syz.5.1939'. [ 406.775700][T10491] €Â0: renamed from pim6reg1 [ 407.614271][T10502] netlink: 'syz.5.1946': attribute type 3 has an invalid length. [ 407.671098][T10505] netlink: 'syz.5.1946': attribute type 10 has an invalid length. [ 408.297667][T10519] syz.3.1951[10519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 408.297868][T10519] syz.3.1951[10519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 408.552566][T10526] FAULT_INJECTION: forcing a failure. [ 408.552566][T10526] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 408.638535][T10526] CPU: 0 PID: 10526 Comm: syz.4.1952 Not tainted 5.15.189-syzkaller #0 [ 408.647009][T10526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 408.657221][T10526] Call Trace: [ 408.660565][T10526] [ 408.663637][T10526] dump_stack_lvl+0x168/0x230 [ 408.668404][T10526] ? show_regs_print_info+0x20/0x20 [ 408.673668][T10526] ? load_image+0x3b0/0x3b0 [ 408.678268][T10526] ? __lock_acquire+0x7c60/0x7c60 [ 408.683381][T10526] should_fail+0x38c/0x4c0 [ 408.687890][T10526] _copy_to_user+0x2e/0x130 [ 408.692457][T10526] simple_read_from_buffer+0xe3/0x150 [ 408.698003][T10526] proc_fail_nth_read+0x19a/0x210 [ 408.703187][T10526] ? proc_fault_inject_write+0x2f0/0x2f0 [ 408.708910][T10526] ? fsnotify_perm+0x254/0x560 [ 408.713746][T10526] ? proc_fault_inject_write+0x2f0/0x2f0 [ 408.719415][T10526] vfs_read+0x2f6/0xcf0 [ 408.723630][T10526] ? kernel_read+0x1e0/0x1e0 [ 408.728279][T10526] ? __fget_files+0x40f/0x480 [ 408.733092][T10526] ? mutex_lock_nested+0x17/0x20 [ 408.738155][T10526] ? __fdget_pos+0x2bf/0x370 [ 408.742867][T10526] ? ksys_read+0x71/0x250 [ 408.747239][T10526] ksys_read+0x14d/0x250 [ 408.751526][T10526] ? vfs_write+0xd00/0xd00 [ 408.755979][T10526] ? lockdep_hardirqs_on+0x94/0x140 [ 408.761211][T10526] do_syscall_64+0x4c/0xa0 [ 408.765673][T10526] ? clear_bhb_loop+0x30/0x80 [ 408.770381][T10526] ? clear_bhb_loop+0x30/0x80 [ 408.775087][T10526] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 408.781022][T10526] RIP: 0033:0x7f3406ed65fc [ 408.785463][T10526] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 408.805092][T10526] RSP: 002b:00007f340513f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 408.813538][T10526] RAX: ffffffffffffffda RBX: 00007f34070fefa0 RCX: 00007f3406ed65fc [ 408.821559][T10526] RDX: 000000000000000f RSI: 00007f340513f0a0 RDI: 0000000000000008 [ 408.829556][T10526] RBP: 00007f340513f090 R08: 0000000000000000 R09: 0000000000000000 [ 408.837553][T10526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 408.845664][T10526] R13: 00007f34070ff038 R14: 00007f34070fefa0 R15: 00007fffe790cd08 [ 408.853785][T10526] [ 409.450000][T10547] netlink: 'syz.4.1963': attribute type 10 has an invalid length. [ 409.498072][T10547] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.546977][T10547] device bridge_slave_1 left promiscuous mode [ 409.568124][T10547] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.703323][T10547] bond0: (slave bridge_slave_1): Enslaving as an active interface with an up link [ 409.872829][T10561] syz.3.1967[10561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.873020][T10561] syz.3.1967[10561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.487818][T10577] FAULT_INJECTION: forcing a failure. [ 410.487818][T10577] name failslab, interval 1, probability 0, space 0, times 0 [ 410.648883][T10577] CPU: 1 PID: 10577 Comm: syz.5.1973 Not tainted 5.15.189-syzkaller #0 [ 410.657237][T10577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 410.667441][T10577] Call Trace: [ 410.670883][T10577] [ 410.673937][T10577] dump_stack_lvl+0x168/0x230 [ 410.678652][T10577] ? show_regs_print_info+0x20/0x20 [ 410.684113][T10577] ? load_image+0x3b0/0x3b0 [ 410.688663][T10577] ? __might_sleep+0xf0/0xf0 [ 410.693294][T10577] ? __lock_acquire+0x7c60/0x7c60 [ 410.698365][T10577] should_fail+0x38c/0x4c0 [ 410.702820][T10577] should_failslab+0x5/0x20 [ 410.707457][T10577] slab_pre_alloc_hook+0x51/0xc0 [ 410.712425][T10577] __kmalloc+0x6b/0x330 [ 410.716603][T10577] ? tomoyo_encode+0x27e/0x540 [ 410.721420][T10577] tomoyo_encode+0x27e/0x540 [ 410.726052][T10577] tomoyo_realpath_from_path+0x5cd/0x610 [ 410.731731][T10577] tomoyo_path_number_perm+0x1d5/0x5d0 [ 410.737258][T10577] ? verify_lock_unused+0x140/0x140 [ 410.742540][T10577] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 410.748330][T10577] ? ksys_write+0x1c7/0x250 [ 410.752940][T10577] security_file_ioctl+0x6c/0xa0 [ 410.758050][T10577] __se_sys_ioctl+0x48/0x170 [ 410.763126][T10577] do_syscall_64+0x4c/0xa0 [ 410.767581][T10577] ? clear_bhb_loop+0x30/0x80 [ 410.772384][T10577] ? clear_bhb_loop+0x30/0x80 [ 410.777092][T10577] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 410.783019][T10577] RIP: 0033:0x7ff66e23cbe9 [ 410.787482][T10577] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 410.807121][T10577] RSP: 002b:00007ff66c4a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 410.815600][T10577] RAX: ffffffffffffffda RBX: 00007ff66e463fa0 RCX: 00007ff66e23cbe9 [ 410.823619][T10577] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000006 [ 410.831669][T10577] RBP: 00007ff66c4a4090 R08: 0000000000000000 R09: 0000000000000000 [ 410.839682][T10577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 410.847692][T10577] R13: 00007ff66e464038 R14: 00007ff66e463fa0 R15: 00007ffcd6582708 [ 410.855711][T10577] [ 411.038880][T10577] ERROR: Out of memory at tomoyo_realpath_from_path. [ 411.093946][T10595] FAULT_INJECTION: forcing a failure. [ 411.093946][T10595] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 411.197742][T10595] CPU: 0 PID: 10595 Comm: syz.3.1979 Not tainted 5.15.189-syzkaller #0 [ 411.206053][T10595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 411.216140][T10595] Call Trace: [ 411.219456][T10595] [ 411.222423][T10595] dump_stack_lvl+0x168/0x230 [ 411.227142][T10595] ? show_regs_print_info+0x20/0x20 [ 411.232385][T10595] ? load_image+0x3b0/0x3b0 [ 411.237033][T10595] ? __lock_acquire+0x7c60/0x7c60 [ 411.242098][T10595] ? __lock_acquire+0x7c60/0x7c60 [ 411.247279][T10595] should_fail+0x38c/0x4c0 [ 411.251910][T10595] _copy_from_user+0x2e/0x170 [ 411.256624][T10595] ____sys_sendmsg+0x305/0x8c0 [ 411.261440][T10595] ? __sys_sendmsg_sock+0x30/0x30 [ 411.266593][T10595] ? import_iovec+0x6f/0xa0 [ 411.271122][T10595] ___sys_sendmsg+0x1f0/0x260 [ 411.275839][T10595] ? __sys_sendmsg+0x250/0x250 [ 411.280646][T10595] ? vfs_write+0x84d/0xd00 [ 411.285113][T10595] ? __fdget+0x18b/0x210 [ 411.289445][T10595] __se_sys_sendmsg+0x190/0x250 [ 411.294421][T10595] ? __x64_sys_sendmsg+0x80/0x80 [ 411.299400][T10595] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 411.305430][T10595] ? lockdep_hardirqs_on+0x94/0x140 [ 411.310675][T10595] do_syscall_64+0x4c/0xa0 [ 411.315116][T10595] ? clear_bhb_loop+0x30/0x80 [ 411.319820][T10595] ? clear_bhb_loop+0x30/0x80 [ 411.324647][T10595] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 411.330580][T10595] RIP: 0033:0x7f38e4179be9 [ 411.335029][T10595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 411.354664][T10595] RSP: 002b:00007f38e23e1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 411.363217][T10595] RAX: ffffffffffffffda RBX: 00007f38e43a0fa0 RCX: 00007f38e4179be9 [ 411.371229][T10595] RDX: 0000000000040040 RSI: 0000200000000bc0 RDI: 0000000000000004 [ 411.379250][T10595] RBP: 00007f38e23e1090 R08: 0000000000000000 R09: 0000000000000000 [ 411.387260][T10595] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 411.395267][T10595] R13: 00007f38e43a1038 R14: 00007f38e43a0fa0 R15: 00007ffc366f34b8 [ 411.403290][T10595] [ 411.991185][T10612] syz.4.1983[10612] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 411.991352][T10612] syz.4.1983[10612] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.019768][T10616] netlink: 'syz.1.1984': attribute type 9 has an invalid length. [ 412.151900][T10614] device wlan0 entered promiscuous mode [ 412.252768][T10611] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1984'. [ 412.313338][T10616] netlink: 209836 bytes leftover after parsing attributes in process `syz.1.1984'. [ 412.515748][T10624] device syzkaller0 entered promiscuous mode [ 412.603054][T10624] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1989'. [ 412.645317][T10624] netlink: 13695 bytes leftover after parsing attributes in process `syz.3.1989'. [ 413.175563][T10648] netlink: 'syz.3.1998': attribute type 10 has an invalid length. [ 413.384604][T10648] 8021q: adding VLAN 0 to HW filter on device bond0 [ 413.452864][T10648] team0: Port device bond0 added [ 413.526984][T10657] syz.1.2002[10657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.527162][T10657] syz.1.2002[10657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.812541][T10662] device wlan0 left promiscuous mode [ 413.914413][T10665] device wlan0 entered promiscuous mode [ 414.024047][T10662] netlink: 'syz.0.2004': attribute type 9 has an invalid length. [ 414.055394][T10662] netlink: 209836 bytes leftover after parsing attributes in process `syz.0.2004'. [ 414.069490][T10665] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2004'. [ 414.202580][T10674] device syzkaller0 entered promiscuous mode [ 414.627941][T10680] netlink: 201392 bytes leftover after parsing attributes in process `syz.1.2008'. [ 414.689027][T10680] netlink: zone id is out of range [ 414.690990][T10681] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2008'. [ 414.694242][T10680] netlink: zone id is out of range [ 414.878950][T10680] netlink: zone id is out of range [ 414.958987][T10680] netlink: zone id is out of range [ 414.964465][T10680] netlink: del zone limit has 8 unknown bytes [ 415.360928][T10701] syz.1.2016[10701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.361103][T10701] syz.1.2016[10701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.407935][T10704] netlink: 'syz.3.2014': attribute type 21 has an invalid length. [ 415.572248][T10704] netlink: 'syz.3.2014': attribute type 6 has an invalid length. [ 415.721762][T10704] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2014'. [ 416.772317][T10724] device wlan0 entered promiscuous mode [ 416.882598][T10724] netlink: 'syz.3.2021': attribute type 9 has an invalid length. [ 416.923387][T10727] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2021'. [ 417.293994][T10741] __nla_validate_parse: 1 callbacks suppressed [ 417.294012][T10741] netlink: 201392 bytes leftover after parsing attributes in process `syz.5.2027'. [ 417.409656][T10740] netlink: 132 bytes leftover after parsing attributes in process `syz.5.2027'. [ 417.558912][T10741] netlink: zone id is out of range [ 417.607909][T10745] netlink: 14 bytes leftover after parsing attributes in process `syz.4.2029'. [ 417.662217][T10741] netlink: zone id is out of range [ 417.737310][T10741] netlink: zone id is out of range [ 417.855576][T10741] netlink: zone id is out of range [ 417.911963][T10741] netlink: del zone limit has 8 unknown bytes [ 418.665751][T10769] Â: renamed from pim6reg1 [ 419.555181][T10799] €Â0: renamed from pim6reg1 [ 419.637183][T10798] netlink: 201392 bytes leftover after parsing attributes in process `syz.3.2047'. [ 419.668467][T10798] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2047'. [ 419.792849][T10800] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 420.283859][T10817] netlink: 'syz.3.2063': attribute type 3 has an invalid length. [ 420.374734][T10817] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.2063'. [ 424.476534][T10894] netlink: 'syz.4.2079': attribute type 3 has an invalid length. [ 424.533064][T10894] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.2079'. [ 424.929380][T10903] €Â0: renamed from pim6reg1 [ 425.759237][T10913] netlink: 64927 bytes leftover after parsing attributes in process `syz.4.2085'. [ 426.397077][T10935] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.2093'. [ 427.842608][T10960] €Â0: renamed from pim6reg1 [ 427.924862][T10966] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2102'. [ 427.987987][T10966] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2102'. [ 428.028576][T10962] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2102'. [ 428.139343][T10967] syz.0.2105[10967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.147677][T10967] syz.0.2105[10967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.188108][T10958] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2102'. [ 429.439146][T10996] netlink: 103 bytes leftover after parsing attributes in process `syz.5.2114'. [ 429.770868][T11006] netlink: 'syz.3.2118': attribute type 10 has an invalid length. [ 430.553864][T11006] team0: Device hsr_slave_0 failed to register rx_handler [ 435.603031][T11029] netlink: 'syz.1.2125': attribute type 9 has an invalid length. [ 435.682571][T11029] netlink: 209836 bytes leftover after parsing attributes in process `syz.1.2125'. [ 435.958086][T11031] netlink: 'syz.1.2125': attribute type 9 has an invalid length. [ 435.966029][T11031] netlink: 209836 bytes leftover after parsing attributes in process `syz.1.2125'. [ 436.459560][T11050] syz.5.2133[11050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 436.459821][T11050] syz.5.2133[11050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 440.011215][ T1423] ieee802154 phy0 wpan0: encryption failed: -22 [ 440.036451][ T1423] ieee802154 phy1 wpan1: encryption failed: -22 [ 440.570079][T11116] netlink: 17279 bytes leftover after parsing attributes in process `syz.3.2153'. [ 440.907942][T11130] netlink: 'syz.5.2158': attribute type 4 has an invalid length. [ 440.957182][T11130] netlink: 14345 bytes leftover after parsing attributes in process `syz.5.2158'. [ 441.037374][T11134] netlink: 'syz.1.2159': attribute type 21 has an invalid length. [ 441.312651][T11130] device sit0 entered promiscuous mode [ 442.108258][T11145] net_ratelimit: 5 callbacks suppressed [ 442.108279][T11145] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 443.906049][T11177] delete_channel: no stack [ 444.183010][T11191] netlink: 129384 bytes leftover after parsing attributes in process `syz.5.2176'. [ 444.908317][T11188] delete_channel: no stack [ 445.240600][T11222] netlink: 'syz.4.2187': attribute type 4 has an invalid length. [ 445.280976][T11224] netlink: 132 bytes leftover after parsing attributes in process `syz.5.2186'. [ 445.308401][T11222] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.2187'. [ 446.002639][T11240] netlink: 132 bytes leftover after parsing attributes in process `syz.5.2190'. [ 447.579558][T11269] netlink: 129384 bytes leftover after parsing attributes in process `syz.4.2203'. [ 449.694895][T11308] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 449.949783][T11317] netlink: 'syz.1.2216': attribute type 4 has an invalid length. [ 449.957864][T11317] netlink: 14345 bytes leftover after parsing attributes in process `syz.1.2216'. [ 449.971103][T11317] netlink: 'syz.1.2216': attribute type 4 has an invalid length. [ 450.019542][T11317] netlink: 14345 bytes leftover after parsing attributes in process `syz.1.2216'. [ 450.308315][T11318] netlink: 'syz.0.2212': attribute type 1 has an invalid length. [ 450.382368][T11317] device sit0 entered promiscuous mode [ 451.219750][T11349] €Â0: renamed from pim6reg1 [ 453.001388][T11376] netlink: 'syz.0.2236': attribute type 4 has an invalid length. [ 453.056906][T11376] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.2236'. [ 453.355467][T11390] netlink: 'syz.5.2239': attribute type 12 has an invalid length. [ 453.443078][T11390] netlink: 132 bytes leftover after parsing attributes in process `syz.5.2239'. [ 454.256901][T11406] €Â0: renamed from pim6reg1 [ 454.929497][T11430] syz.4.2250[11430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 454.929695][T11430] syz.4.2250[11430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.748319][T11457] €Â0: renamed from pim6reg1 [ 456.705235][T11489] syz.3.2264[11489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.705423][T11489] syz.3.2264[11489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 457.159214][T11500] netlink: 'syz.3.2269': attribute type 10 has an invalid length. [ 457.241393][T11500] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2269'. [ 458.942589][T11562] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.2282'. [ 459.955516][T11583] €Â0: renamed from pim6reg1 [ 460.411142][T11597] netlink: 201392 bytes leftover after parsing attributes in process `syz.1.2294'. [ 460.479769][T11597] netlink: zone id is out of range [ 460.484959][T11597] netlink: zone id is out of range [ 460.520737][T11597] netlink: del zone limit has 8 unknown bytes [ 460.765837][T11608] netlink: 201392 bytes leftover after parsing attributes in process `syz.3.2297'. [ 460.880248][T11608] netlink: zone id is out of range [ 460.885440][T11608] netlink: zone id is out of range [ 461.018345][T11608] netlink: del zone limit has 8 unknown bytes [ 461.428767][T11615] FAULT_INJECTION: forcing a failure. [ 461.428767][T11615] name failslab, interval 1, probability 0, space 0, times 0 [ 461.541403][T11615] CPU: 1 PID: 11615 Comm: syz.4.2296 Not tainted 5.15.189-syzkaller #0 [ 461.549726][T11615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 461.560062][T11615] Call Trace: [ 461.563392][T11615] [ 461.566409][T11615] dump_stack_lvl+0x168/0x230 [ 461.571271][T11615] ? show_regs_print_info+0x20/0x20 [ 461.576533][T11615] ? load_image+0x3b0/0x3b0 [ 461.581099][T11615] ? __might_sleep+0xf0/0xf0 [ 461.585736][T11615] ? __lock_acquire+0x7c60/0x7c60 [ 461.591056][T11615] ? __local_bh_enable_ip+0x12a/0x1b0 [ 461.596593][T11615] should_fail+0x38c/0x4c0 [ 461.601111][T11615] should_failslab+0x5/0x20 [ 461.605656][T11615] slab_pre_alloc_hook+0x51/0xc0 [ 461.610639][T11615] kmem_cache_alloc_node_trace+0x4a/0x300 [ 461.616676][T11615] ? __get_vm_area_node+0x119/0x2d0 [ 461.622086][T11615] __get_vm_area_node+0x119/0x2d0 [ 461.627169][T11615] __vmalloc_node_range+0xef/0x8b0 [ 461.632360][T11615] ? netlink_sendmsg+0x5dd/0xbc0 [ 461.637371][T11615] ? netlink_data_ready+0x10/0x10 [ 461.642559][T11615] ? netlink_sendmsg+0x5dd/0xbc0 [ 461.647551][T11615] vmalloc+0x75/0x80 [ 461.651493][T11615] ? netlink_sendmsg+0x5dd/0xbc0 [ 461.656593][T11615] netlink_sendmsg+0x5dd/0xbc0 [ 461.661414][T11615] ? netlink_getsockopt+0x560/0x560 [ 461.666649][T11615] ? aa_sock_msg_perm+0x94/0x150 [ 461.671626][T11615] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 461.676939][T11615] ? security_socket_sendmsg+0x7c/0xa0 [ 461.682427][T11615] ? netlink_getsockopt+0x560/0x560 [ 461.687662][T11615] ____sys_sendmsg+0x5a2/0x8c0 [ 461.692471][T11615] ? memset+0x1e/0x40 [ 461.696487][T11615] ? __sys_sendmsg_sock+0x30/0x30 [ 461.701558][T11615] ? import_iovec+0x6f/0xa0 [ 461.706095][T11615] ___sys_sendmsg+0x1f0/0x260 [ 461.710888][T11615] ? __sys_sendmsg+0x250/0x250 [ 461.715684][T11615] ? trace_event_raw_event_lock+0x250/0x250 [ 461.721715][T11615] ? vfs_write+0x84d/0xd00 [ 461.726172][T11615] ? __fdget+0x18b/0x210 [ 461.730493][T11615] __se_sys_sendmsg+0x190/0x250 [ 461.735363][T11615] ? __x64_sys_sendmsg+0x80/0x80 [ 461.740315][T11615] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 461.746330][T11615] ? lockdep_hardirqs_on+0x94/0x140 [ 461.751683][T11615] do_syscall_64+0x4c/0xa0 [ 461.756126][T11615] ? clear_bhb_loop+0x30/0x80 [ 461.760822][T11615] ? clear_bhb_loop+0x30/0x80 [ 461.765522][T11615] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 461.771467][T11615] RIP: 0033:0x7f3406ed7be9 [ 461.775936][T11615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 461.795647][T11615] RSP: 002b:00007f340513f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 461.804087][T11615] RAX: ffffffffffffffda RBX: 00007f34070fefa0 RCX: 00007f3406ed7be9 [ 461.812186][T11615] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000006 [ 461.820167][T11615] RBP: 00007f340513f090 R08: 0000000000000000 R09: 0000000000000000 [ 461.828145][T11615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 461.836125][T11615] R13: 00007f34070ff038 R14: 00007f34070fefa0 R15: 00007fffe790cd08 [ 461.844136][T11615] [ 461.934248][T11615] syz.4.2296: vmalloc error: size 213312, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz4,mems_allowed=0-1 [ 462.093254][T11615] CPU: 0 PID: 11615 Comm: syz.4.2296 Not tainted 5.15.189-syzkaller #0 [ 462.101669][T11615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 462.111851][T11615] Call Trace: [ 462.115252][T11615] [ 462.118291][T11615] dump_stack_lvl+0x168/0x230 [ 462.123692][T11615] ? rcu_lock_release+0x5/0x20 [ 462.128486][T11615] ? show_regs_print_info+0x20/0x20 [ 462.133717][T11615] ? load_image+0x3b0/0x3b0 [ 462.138267][T11615] warn_alloc+0x20e/0x2f0 [ 462.142817][T11615] ? zone_watermark_ok_safe+0x240/0x240 [ 462.148398][T11615] ? kmem_cache_alloc_node_trace+0x16c/0x300 [ 462.154415][T11615] ? __get_vm_area_node+0x119/0x2d0 [ 462.159745][T11615] __vmalloc_node_range+0x2b1/0x8b0 [ 462.164982][T11615] ? netlink_data_ready+0x10/0x10 [ 462.170320][T11615] ? netlink_sendmsg+0x5dd/0xbc0 [ 462.175287][T11615] vmalloc+0x75/0x80 [ 462.179214][T11615] ? netlink_sendmsg+0x5dd/0xbc0 [ 462.184201][T11615] netlink_sendmsg+0x5dd/0xbc0 [ 462.189026][T11615] ? netlink_getsockopt+0x560/0x560 [ 462.194267][T11615] ? aa_sock_msg_perm+0x94/0x150 [ 462.199247][T11615] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 462.204570][T11615] ? security_socket_sendmsg+0x7c/0xa0 [ 462.210073][T11615] ? netlink_getsockopt+0x560/0x560 [ 462.215313][T11615] ____sys_sendmsg+0x5a2/0x8c0 [ 462.220128][T11615] ? memset+0x1e/0x40 [ 462.224153][T11615] ? __sys_sendmsg_sock+0x30/0x30 [ 462.229221][T11615] ? import_iovec+0x6f/0xa0 [ 462.233762][T11615] ___sys_sendmsg+0x1f0/0x260 [ 462.238575][T11615] ? __sys_sendmsg+0x250/0x250 [ 462.243390][T11615] ? trace_event_raw_event_lock+0x250/0x250 [ 462.249413][T11615] ? vfs_write+0x84d/0xd00 [ 462.253884][T11615] ? __fdget+0x18b/0x210 [ 462.258166][T11615] __se_sys_sendmsg+0x190/0x250 [ 462.263054][T11615] ? __x64_sys_sendmsg+0x80/0x80 [ 462.268020][T11615] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 462.274061][T11615] ? lockdep_hardirqs_on+0x94/0x140 [ 462.279387][T11615] do_syscall_64+0x4c/0xa0 [ 462.283845][T11615] ? clear_bhb_loop+0x30/0x80 [ 462.288605][T11615] ? clear_bhb_loop+0x30/0x80 [ 462.293395][T11615] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 462.299327][T11615] RIP: 0033:0x7f3406ed7be9 [ 462.303782][T11615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 462.323607][T11615] RSP: 002b:00007f340513f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 462.332109][T11615] RAX: ffffffffffffffda RBX: 00007f34070fefa0 RCX: 00007f3406ed7be9 [ 462.340118][T11615] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000006 [ 462.348127][T11615] RBP: 00007f340513f090 R08: 0000000000000000 R09: 0000000000000000 [ 462.356137][T11615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 462.364229][T11615] R13: 00007f34070ff038 R14: 00007f34070fefa0 R15: 00007fffe790cd08 [ 462.372359][T11615] [ 462.669396][T11633] €Â0: renamed from pim6reg1 [ 463.198358][T11615] Mem-Info: [ 463.227737][T11615] active_anon:281 inactive_anon:17315 isolated_anon:0 [ 463.227737][T11615] active_file:23940 inactive_file:36690 isolated_file:0 [ 463.227737][T11615] unevictable:768 dirty:361 writeback:0 [ 463.227737][T11615] slab_reclaimable:20651 slab_unreclaimable:95880 [ 463.227737][T11615] mapped:35114 shmem:13471 pagetables:592 bounce:0 [ 463.227737][T11615] kernel_misc_reclaimable:0 [ 463.227737][T11615] free:1366695 free_pcp:3927 free_cma:0 [ 463.868334][T11615] Node 0 active_anon:1092kB inactive_anon:72536kB active_file:95560kB inactive_file:146760kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:141436kB dirty:1520kB writeback:0kB shmem:55660kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:10608kB pagetables:2404kB all_unreclaimable? no [ 464.053728][T11638] device syzkaller0 entered promiscuous mode [ 464.063555][T11615] Node 1 active_anon:32kB inactive_anon:508kB active_file:200kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:2076kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB all_unreclaimable? no [ 464.574934][T11615] Node 0 DMA free:15360kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 464.792165][T11674] €Â0: renamed from pim6reg1 [ 464.847548][T11680] netlink: 65047 bytes leftover after parsing attributes in process `syz.5.2321'. [ 464.876750][T11615] lowmem_reserve[]: 0 2541 2542 2542 2542 [ 464.972794][T11615] Node 0 DMA32 free:1505044kB min:34800kB low:43500kB high:52200kB reserved_highatomic:0KB active_anon:1096kB inactive_anon:95872kB active_file:95560kB inactive_file:146760kB unevictable:1536kB writepending:1540kB present:3129332kB managed:2609004kB mlocked:0kB bounce:0kB free_pcp:13080kB local_pcp:5968kB free_cma:0kB [ 465.197524][T11615] lowmem_reserve[]: 0 0 0 0 0 [ 465.212768][T11615] Node 0 Normal free:12kB min:12kB low:12kB high:12kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:916kB mlocked:0kB bounce:0kB free_pcp:16kB local_pcp:8kB free_cma:0kB [ 465.418832][T11691] syz.3.2326[11691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.419019][T11691] syz.3.2326[11691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.509245][T11615] lowmem_reserve[]: 0 0 0 0 0 [ 465.707885][T11615] Node 1 Normal free:3919464kB min:55088kB low:68860kB high:82632kB reserved_highatomic:0KB active_anon:32kB inactive_anon:508kB active_file:200kB inactive_file:0kB unevictable:1536kB writepending:0kB present:4194304kB managed:4119672kB mlocked:0kB bounce:0kB free_pcp:2848kB local_pcp:0kB free_cma:0kB [ 465.833348][T11615] lowmem_reserve[]: 0 0 0 0 0 [ 465.877521][T11615] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 466.069613][T11615] Node 0 DMA32: 2*4kB (ME) 195*8kB (UM) 1291*16kB (UME) 2180*32kB (UM) 1280*64kB (UME) 466*128kB (UM) 120*256kB (UME) 23*512kB (ME) 7*1024kB (UM) 3*2048kB (UE) 286*4096kB (M) = 1460816kB [ 466.147672][T11615] Node 0 Normal: 3*4kB (U) 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 466.255795][T11615] Node 1 Normal: 158*4kB (UME) 40*8kB (UME) 33*16kB (UME) 207*32kB (UME) 69*64kB (UME) 25*128kB (UE) 13*256kB (UME) 4*512kB (UE) 1*1024kB (U) 3*2048kB (UME) 950*4096kB (M) = 3919464kB [ 466.412660][T11615] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 466.541499][T11615] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 466.617823][T11615] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 466.837759][T11615] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 466.946663][T11615] 95862 total pagecache pages [ 467.048110][T11615] 0 pages in swap cache [ 467.052436][T11615] Swap cache stats: add 0, delete 0, find 0/0 [ 467.198575][T11615] Free swap = 124996kB [ 467.229912][T11615] Total swap = 124996kB [ 467.284944][T11615] 2097051 pages RAM [ 467.298074][T11615] 0 pages HighMem/MovableOnly [ 467.302813][T11615] 410813 pages reserved [ 467.439056][T11615] 0 pages cma reserved [ 467.560489][T11736] €Â0: renamed from pim6reg1 [ 467.696630][T11739] netlink: 'syz.5.2343': attribute type 10 has an invalid length. [ 468.004990][T11751] syz.0.2347[11751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.005169][T11751] syz.0.2347[11751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 469.246786][T11781] €Â0: renamed from pim6reg1 [ 469.420449][T11785] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.2360'. [ 469.503777][T11785] debugfs: Directory '!!ô' with parent 'ieee80211' already present! [ 469.821887][ T7234] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 470.106522][ T7234] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 470.368730][ T7234] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 470.546686][ T7234] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 472.520056][T11844] netlink: 65047 bytes leftover after parsing attributes in process `syz.0.2382'. [ 472.705767][T11838] netlink: 68 bytes leftover after parsing attributes in process `syz.1.2380'. [ 473.269112][T11829] chnl_net:caif_netlink_parms(): no params data found [ 473.338050][T11856] FAULT_INJECTION: forcing a failure. [ 473.338050][T11856] name failslab, interval 1, probability 0, space 0, times 0 [ 473.399248][T11856] CPU: 1 PID: 11856 Comm: syz.0.2384 Not tainted 5.15.189-syzkaller #0 [ 473.407821][T11856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 473.418119][T11856] Call Trace: [ 473.421429][T11856] [ 473.424385][T11856] dump_stack_lvl+0x168/0x230 [ 473.429101][T11856] ? show_regs_print_info+0x20/0x20 [ 473.434339][T11856] ? load_image+0x3b0/0x3b0 [ 473.438882][T11856] ? __might_sleep+0xf0/0xf0 [ 473.443502][T11856] ? __lock_acquire+0x7c60/0x7c60 [ 473.448650][T11856] ? rcu_is_watching+0x11/0xa0 [ 473.453457][T11856] should_fail+0x38c/0x4c0 [ 473.457904][T11856] should_failslab+0x5/0x20 [ 473.462431][T11856] slab_pre_alloc_hook+0x51/0xc0 [ 473.467398][T11856] kmem_cache_alloc_node+0x47/0x2d0 [ 473.472652][T11856] ? perf_event_alloc+0x161/0x2240 [ 473.477925][T11856] perf_event_alloc+0x161/0x2240 [ 473.482903][T11856] ? do_raw_spin_unlock+0x11d/0x230 [ 473.488137][T11856] ? alloc_fd+0x598/0x630 [ 473.492505][T11856] __se_sys_perf_event_open+0x5ae/0x1b80 [ 473.498184][T11856] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 473.503969][T11856] ? lockdep_hardirqs_on+0x94/0x140 [ 473.509205][T11856] ? __x64_sys_perf_event_open+0x1c/0xc0 [ 473.515054][T11856] do_syscall_64+0x4c/0xa0 [ 473.519606][T11856] ? clear_bhb_loop+0x30/0x80 [ 473.524326][T11856] ? clear_bhb_loop+0x30/0x80 [ 473.529042][T11856] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 473.534978][T11856] RIP: 0033:0x7f04d866bbe9 [ 473.539516][T11856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 473.559169][T11856] RSP: 002b:00007f04d68d3038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 473.567644][T11856] RAX: ffffffffffffffda RBX: 00007f04d8892fa0 RCX: 00007f04d866bbe9 [ 473.575656][T11856] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000240 [ 473.583827][T11856] RBP: 00007f04d68d3090 R08: 0000000000000005 R09: 0000000000000000 [ 473.591843][T11856] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 473.599856][T11856] R13: 00007f04d8893038 R14: 00007f04d8892fa0 R15: 00007ffdbd6ceb58 [ 473.607972][T11856] [ 473.732222][T11861] netlink: 'syz.0.2384': attribute type 10 has an invalid length. [ 474.010582][T11363] Bluetooth: hci4: command 0x0409 tx timeout [ 474.628465][T11861] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2384'. [ 475.157863][T11829] bridge0: port 1(bridge_slave_0) entered blocking state [ 475.165121][T11829] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.196277][T11829] device bridge_slave_0 entered promiscuous mode [ 475.226913][T11829] bridge0: port 2(bridge_slave_1) entered blocking state [ 475.244888][T11829] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.265022][T11829] device bridge_slave_1 entered promiscuous mode [ 475.483650][T11829] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 475.511386][T11829] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 475.775361][T11829] team0: Port device team_slave_0 added [ 475.791431][T11829] team0: Port device team_slave_1 added [ 476.021923][T11829] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 476.047542][T11829] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 476.096728][ T4312] Bluetooth: hci4: command 0x041b tx timeout [ 476.147524][T11829] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 476.205086][T11829] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 476.247866][T11829] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 476.286034][T11892] netlink: 65047 bytes leftover after parsing attributes in process `syz.4.2394'. [ 476.368850][T11829] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 476.570192][T11829] device hsr_slave_0 entered promiscuous mode [ 476.637997][T11829] device hsr_slave_1 entered promiscuous mode [ 477.463769][ T7234] device hsr_slave_0 left promiscuous mode [ 477.690474][ T7234] device hsr_slave_1 left promiscuous mode [ 477.729329][ T7234] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 477.736933][ T7234] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 477.819527][ T7234] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 477.867712][ T7234] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 477.926787][ T7234] batman_adv: batadv0: Interface deactivated: virt_wifi0 [ 477.947772][ T7234] batman_adv: batadv0: Removing interface: virt_wifi0 [ 477.978261][ T7234] device bridge_slave_0 left promiscuous mode [ 477.984565][ T7234] bridge0: port 1(bridge_slave_0) entered disabled state [ 478.108359][ T7234] device veth1_macvtap left promiscuous mode [ 478.114464][ T7234] device veth0_macvtap left promiscuous mode [ 478.157827][ T7234] device veth1_vlan left promiscuous mode [ 478.163689][ T7234] device veth0_vlan left promiscuous mode [ 478.177557][ T4312] Bluetooth: hci4: command 0x040f tx timeout [ 478.415366][T11913] FAULT_INJECTION: forcing a failure. [ 478.415366][T11913] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 478.527576][T11913] CPU: 0 PID: 11913 Comm: syz.0.2403 Not tainted 5.15.189-syzkaller #0 [ 478.535989][T11913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 478.546082][T11913] Call Trace: [ 478.549396][T11913] [ 478.552533][T11913] dump_stack_lvl+0x168/0x230 [ 478.557264][T11913] ? show_regs_print_info+0x20/0x20 [ 478.562513][T11913] ? load_image+0x3b0/0x3b0 [ 478.567177][T11913] ? __lock_acquire+0x7c60/0x7c60 [ 478.572252][T11913] should_fail+0x38c/0x4c0 [ 478.576715][T11913] _copy_from_user+0x2e/0x170 [ 478.581695][T11913] __sys_bpf+0x21b/0x670 [ 478.586079][T11913] ? bpf_link_show_fdinfo+0x340/0x340 [ 478.591514][T11913] __x64_sys_bpf+0x78/0x90 [ 478.595974][T11913] do_syscall_64+0x4c/0xa0 [ 478.600521][T11913] ? clear_bhb_loop+0x30/0x80 [ 478.605286][T11913] ? clear_bhb_loop+0x30/0x80 [ 478.610015][T11913] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 478.615949][T11913] RIP: 0033:0x7f04d866bbe9 [ 478.620397][T11913] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 478.640040][T11913] RSP: 002b:00007f04d68d3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 478.648599][T11913] RAX: ffffffffffffffda RBX: 00007f04d8892fa0 RCX: 00007f04d866bbe9 [ 478.656607][T11913] RDX: 0000000000000046 RSI: 0000200000000180 RDI: 0000000000000005 [ 478.664612][T11913] RBP: 00007f04d68d3090 R08: 0000000000000000 R09: 0000000000000000 [ 478.672618][T11913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 478.680630][T11913] R13: 00007f04d8893038 R14: 00007f04d8892fa0 R15: 00007ffdbd6ceb58 [ 478.688830][T11913] [ 479.081165][ T7234] team0 (unregistering): Port device team_slave_1 removed [ 479.140621][ T7234] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 479.214592][ T7234] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 479.285059][ T7234] bond0 (unregistering): (slave bridge_slave_1): Releasing backup interface [ 479.407297][ T7234] team0 (unregistering): Port device bond0 removed [ 479.502476][ T7234] bond0 (unregistering): (slave bridge0): Releasing backup interface [ 479.525579][ T7234] bond0 (unregistering): Released all slaves [ 479.686333][T11829] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 479.734115][T11829] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 479.775048][T11829] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 479.880785][T11829] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 479.969458][T11928] netlink: 'syz.0.2410': attribute type 11 has an invalid length. [ 480.247606][T11363] Bluetooth: hci4: command 0x0419 tx timeout [ 480.456547][T11829] 8021q: adding VLAN 0 to HW filter on device bond0 [ 480.559622][T11829] 8021q: adding VLAN 0 to HW filter on device team0 [ 480.589498][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 480.608395][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 480.747739][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 480.779950][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 480.825173][ T1272] bridge0: port 1(bridge_slave_0) entered blocking state [ 480.832423][ T1272] bridge0: port 1(bridge_slave_0) entered forwarding state [ 480.856939][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 480.881233][T11945] syz.4.2413[11945] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 480.881431][T11945] syz.4.2413[11945] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 480.904939][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 480.935825][ T1272] bridge0: port 2(bridge_slave_1) entered blocking state [ 480.942998][ T1272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 480.958012][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 480.985887][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 481.017308][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 481.044186][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 481.088452][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 481.127744][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 481.152279][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 481.172515][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 481.227167][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 481.248941][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 481.282484][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 481.298433][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 481.328648][T11955] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 481.362176][T11829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 481.890977][T11969] netlink: 32 bytes leftover after parsing attributes in process `syz.0.2419'. [ 481.944966][T11970] netlink: 32 bytes leftover after parsing attributes in process `syz.0.2419'. [ 482.097336][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 482.111599][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 482.168051][T11829] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 483.279267][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 483.313278][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 483.475061][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 483.511085][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 483.529253][T12000] syz.0.2427[12000] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 483.529420][T12000] syz.0.2427[12000] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 483.571545][T11829] device veth0_vlan entered promiscuous mode [ 483.661381][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 483.679489][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 483.712054][T11829] device veth1_vlan entered promiscuous mode [ 483.891670][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 483.912433][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 483.964262][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 484.003176][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 484.049080][T11829] device veth0_macvtap entered promiscuous mode [ 484.108930][T11829] device veth1_macvtap entered promiscuous mode [ 484.250681][T11829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 484.367474][T11829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.417708][T11829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 484.457515][T11829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.509052][T11829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 484.563407][T11829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.610990][T11829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 484.631876][T11829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.749651][T11829] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 484.858439][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 484.882727][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 484.968411][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 485.038183][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 485.091721][T11829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 485.149804][T11829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 485.197995][T11829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 485.247593][T11829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 485.297496][T11829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 485.316403][T11829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 485.352020][T11829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 485.401403][T11829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 485.453435][T11829] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 485.480525][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 485.497992][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 485.545616][T11829] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 485.565012][T11829] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 485.616236][T11829] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 485.654546][T11829] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 485.974470][ T144] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 486.015369][ T144] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 486.065155][ T1272] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 486.079382][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 486.119242][ T1272] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 486.226686][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 486.620676][T12039] €Â0: renamed from pim6reg1 [ 486.722903][T12018] chnl_net:caif_netlink_parms(): no params data found [ 487.399553][T12018] bridge0: port 1(bridge_slave_0) entered blocking state [ 487.428583][T12018] bridge0: port 1(bridge_slave_0) entered disabled state [ 487.448369][T12018] device bridge_slave_0 entered promiscuous mode [ 487.466047][T12061] netlink: 'syz.6.2445': attribute type 17 has an invalid length. [ 487.488528][T12061] netlink: 'syz.6.2445': attribute type 16 has an invalid length. [ 487.496831][T12061] netlink: 152 bytes leftover after parsing attributes in process `syz.6.2445'. [ 487.531308][T12064] netlink: 'syz.4.2444': attribute type 9 has an invalid length. [ 487.561920][T12018] bridge0: port 2(bridge_slave_1) entered blocking state [ 487.575354][T12018] bridge0: port 2(bridge_slave_1) entered disabled state [ 487.604406][T12018] device bridge_slave_1 entered promiscuous mode [ 487.643417][T12064] netlink: 126588 bytes leftover after parsing attributes in process `syz.4.2444'. [ 487.762261][T12018] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 487.805256][T12018] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 487.832525][T12068] netlink: 'syz.6.2446': attribute type 1 has an invalid length. [ 487.847886][ T4312] Bluetooth: hci5: command 0x0409 tx timeout [ 487.854621][T12068] netlink: 101600 bytes leftover after parsing attributes in process `syz.6.2446'. [ 487.933861][T12068] netlink: 188 bytes leftover after parsing attributes in process `syz.6.2446'. [ 487.952572][T12018] team0: Port device team_slave_0 added [ 487.989715][T12018] team0: Port device team_slave_1 added [ 488.145113][T12018] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 488.186400][T12018] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 488.292104][T12018] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 488.311396][T12088] syz.1.2452[12088] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.311658][T12088] syz.1.2452[12088] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.406826][T12018] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 488.467003][T12018] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 488.560662][T12018] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 488.595585][T12090] €Â0: renamed from pim6reg1 [ 488.704992][T12018] device hsr_slave_0 entered promiscuous mode [ 488.747001][T12018] device hsr_slave_1 entered promiscuous mode [ 488.771962][T12018] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 488.789696][T12018] Cannot create hsr debugfs directory [ 489.189227][ T7234] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 489.275871][T12109] netlink: 'syz.0.2459': attribute type 2 has an invalid length. [ 489.320777][ T7234] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 489.344456][T12109] netlink: 17267 bytes leftover after parsing attributes in process `syz.0.2459'. [ 489.482695][ T7234] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 489.575531][ T7234] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 489.810265][T12123] €Â0: renamed from pim6reg1 [ 489.866018][T12018] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 489.922231][T12018] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 489.930217][ T4297] Bluetooth: hci5: command 0x041b tx timeout [ 490.028791][T12018] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 490.138927][T12018] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 490.721268][T12151] netlink: 'syz.6.2473': attribute type 27 has an invalid length. [ 490.757674][T12151] netlink: 'syz.6.2473': attribute type 4 has an invalid length. [ 490.807186][T12151] netlink: 152 bytes leftover after parsing attributes in process `syz.6.2473'. [ 491.378107][T12164] netlink: 'syz.6.2477': attribute type 39 has an invalid length. [ 491.551393][T12018] 8021q: adding VLAN 0 to HW filter on device bond0 [ 491.643229][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 491.664740][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 491.711422][T12018] 8021q: adding VLAN 0 to HW filter on device team0 [ 491.758599][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 491.776503][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 491.785913][ T580] bridge0: port 1(bridge_slave_0) entered blocking state [ 491.793089][ T580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 491.809168][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 491.833547][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 491.875844][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 491.902807][ T580] bridge0: port 2(bridge_slave_1) entered blocking state [ 491.910087][ T580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 491.942742][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 492.013494][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 492.028024][ T23] Bluetooth: hci5: command 0x040f tx timeout [ 492.059363][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 492.097351][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 492.123780][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 492.204366][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 492.243504][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 492.294069][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 492.328959][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 492.364418][T12018] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 492.396933][T12201] FAULT_INJECTION: forcing a failure. [ 492.396933][T12201] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 492.397345][T12018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 492.435881][T12201] CPU: 1 PID: 12201 Comm: syz.4.2491 Not tainted 5.15.189-syzkaller #0 [ 492.444203][T12201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 492.454389][T12201] Call Trace: [ 492.457703][T12201] [ 492.460708][T12201] dump_stack_lvl+0x168/0x230 [ 492.465424][T12201] ? show_regs_print_info+0x20/0x20 [ 492.470671][T12201] ? load_image+0x3b0/0x3b0 [ 492.475395][T12201] ? __lock_acquire+0x7c60/0x7c60 [ 492.480436][T12201] ? bpf_test_run+0x778/0x7d0 [ 492.485127][T12201] should_fail+0x38c/0x4c0 [ 492.489566][T12201] _copy_to_user+0x2e/0x130 [ 492.494099][T12201] bpf_test_finish+0x1db/0x2d0 [ 492.498884][T12201] ? convert_skb_to___skb+0x360/0x360 [ 492.504297][T12201] ? __build_skb+0x1e2/0x2e0 [ 492.508928][T12201] ? convert_skb_to___skb+0x1ff/0x360 [ 492.514351][T12201] bpf_prog_test_run_skb+0xb8f/0x1180 [ 492.519761][T12201] ? cpu_online+0x60/0x60 [ 492.524115][T12201] bpf_prog_test_run+0x31e/0x390 [ 492.529157][T12201] __sys_bpf+0x535/0x670 [ 492.533519][T12201] ? bpf_link_show_fdinfo+0x340/0x340 [ 492.538929][T12201] ? vtime_user_exit+0x2dc/0x400 [ 492.543924][T12201] __x64_sys_bpf+0x78/0x90 [ 492.548354][T12201] do_syscall_64+0x4c/0xa0 [ 492.552806][T12201] ? clear_bhb_loop+0x30/0x80 [ 492.557489][T12201] ? clear_bhb_loop+0x30/0x80 [ 492.562182][T12201] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 492.568087][T12201] RIP: 0033:0x7f3406ed7be9 [ 492.572532][T12201] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 492.592184][T12201] RSP: 002b:00007f340513f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 492.600886][T12201] RAX: ffffffffffffffda RBX: 00007f34070fefa0 RCX: 00007f3406ed7be9 [ 492.609002][T12201] RDX: 0000000000000050 RSI: 00002000000004c0 RDI: 000000000000000a [ 492.617002][T12201] RBP: 00007f340513f090 R08: 0000000000000000 R09: 0000000000000000 [ 492.624997][T12201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 492.633069][T12201] R13: 00007f34070ff038 R14: 00007f34070fefa0 R15: 00007fffe790cd08 [ 492.641200][T12201] [ 492.691914][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 492.719362][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 492.867272][ T7234] device hsr_slave_0 left promiscuous mode [ 492.929302][ T7234] device hsr_slave_1 left promiscuous mode [ 492.961978][T12220] netlink: 209852 bytes leftover after parsing attributes in process `syz.1.2494'. [ 492.977607][ T7234] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 492.985124][ T7234] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 493.029964][ T7234] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 493.043866][ T7234] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 493.053425][ T7234] batman_adv: batadv0: Interface deactivated: virt_wifi0 [ 493.061145][ T7234] batman_adv: batadv0: Removing interface: virt_wifi0 [ 493.077761][ T7234] device bridge_slave_1 left promiscuous mode [ 493.107168][ T7234] bridge0: port 2(bridge_slave_1) entered disabled state [ 493.116622][ T7234] device bridge_slave_0 left promiscuous mode [ 493.119714][T12228] netlink: 'syz.6.2495': attribute type 3 has an invalid length. [ 493.133109][T12228] netlink: 'syz.6.2495': attribute type 1 has an invalid length. [ 493.135793][ T7234] bridge0: port 1(bridge_slave_0) entered disabled state [ 493.142395][T12228] netlink: 60387 bytes leftover after parsing attributes in process `syz.6.2495'. [ 493.181518][ T7234] device veth1_vlan left promiscuous mode [ 493.187362][ T7234] device veth0_vlan left promiscuous mode [ 493.474400][ T7234] team0 (unregistering): Port device team_slave_1 removed [ 493.500461][ T7234] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 493.520520][ T7234] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 493.617165][ T7234] bond0 (unregistering): Released all slaves [ 493.988973][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 493.996572][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 494.029178][T12018] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 494.091118][ T4297] Bluetooth: hci5: command 0x0419 tx timeout [ 494.389793][T12243] €Â0: renamed from pim6reg1 [ 494.805080][T12255] FAULT_INJECTION: forcing a failure. [ 494.805080][T12255] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 494.944687][T12255] CPU: 0 PID: 12255 Comm: syz.0.2506 Not tainted 5.15.189-syzkaller #0 [ 494.952979][T12255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 494.963253][T12255] Call Trace: [ 494.966644][T12255] [ 494.969603][T12255] dump_stack_lvl+0x168/0x230 [ 494.974329][T12255] ? show_regs_print_info+0x20/0x20 [ 494.979831][T12255] ? load_image+0x3b0/0x3b0 [ 494.984382][T12255] ? __lock_acquire+0x7c60/0x7c60 [ 494.989455][T12255] should_fail+0x38c/0x4c0 [ 494.994004][T12255] _copy_from_user+0x2e/0x170 [ 494.998718][T12255] __copy_msghdr_from_user+0xaf/0x5e0 [ 495.004217][T12255] ? verify_lock_unused+0x140/0x140 [ 495.009450][T12255] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 495.014783][T12255] ? trace_event_raw_event_lock+0x250/0x250 [ 495.020719][T12255] ___sys_sendmsg+0x156/0x260 [ 495.025528][T12255] ? __sys_sendmsg+0x250/0x250 [ 495.030343][T12255] ? trace_event_raw_event_lock+0x250/0x250 [ 495.036273][T12255] ? vfs_write+0x84d/0xd00 [ 495.040745][T12255] ? __fdget+0x18b/0x210 [ 495.045035][T12255] __se_sys_sendmsg+0x190/0x250 [ 495.049949][T12255] ? __x64_sys_sendmsg+0x80/0x80 [ 495.054932][T12255] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 495.061047][T12255] ? lockdep_hardirqs_on+0x94/0x140 [ 495.066291][T12255] do_syscall_64+0x4c/0xa0 [ 495.070741][T12255] ? clear_bhb_loop+0x30/0x80 [ 495.075450][T12255] ? clear_bhb_loop+0x30/0x80 [ 495.080164][T12255] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 495.086099][T12255] RIP: 0033:0x7f04d866bbe9 [ 495.090550][T12255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 495.110536][T12255] RSP: 002b:00007f04d68d3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 495.118991][T12255] RAX: ffffffffffffffda RBX: 00007f04d8892fa0 RCX: 00007f04d866bbe9 [ 495.127095][T12255] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000005 [ 495.135097][T12255] RBP: 00007f04d68d3090 R08: 0000000000000000 R09: 0000000000000000 [ 495.143101][T12255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 495.151203][T12255] R13: 00007f04d8893038 R14: 00007f04d8892fa0 R15: 00007ffdbd6ceb58 [ 495.159462][T12255] [ 495.807953][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 495.838336][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 495.843149][T12275] netlink: 'syz.0.2510': attribute type 9 has an invalid length. [ 495.946938][T12275] netlink: 209836 bytes leftover after parsing attributes in process `syz.0.2510'. [ 496.009797][T12018] device veth0_vlan entered promiscuous mode [ 496.027841][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 496.054776][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 496.124701][T12018] device veth1_vlan entered promiscuous mode [ 496.193091][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 496.213306][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 496.395618][ T4370] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 496.425405][ T4370] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 496.602207][T12018] device veth0_macvtap entered promiscuous mode [ 496.609087][T12276] netlink: 'syz.0.2510': attribute type 9 has an invalid length. [ 496.632984][T12276] netlink: 209836 bytes leftover after parsing attributes in process `syz.0.2510'. [ 496.659904][T12018] device veth1_macvtap entered promiscuous mode [ 496.741558][T12018] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 496.814769][T12018] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 496.857531][T12018] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 496.891754][T12018] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 496.924004][T12018] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 496.966255][T12018] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 497.004438][T12018] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 497.031923][T12296] FAULT_INJECTION: forcing a failure. [ 497.031923][T12296] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 497.045535][T12018] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 497.051189][T12296] CPU: 0 PID: 12296 Comm: syz.6.2517 Not tainted 5.15.189-syzkaller #0 [ 497.063645][T12296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 497.073762][T12296] Call Trace: [ 497.077090][T12296] [ 497.080063][T12296] dump_stack_lvl+0x168/0x230 [ 497.084994][T12296] ? show_regs_print_info+0x20/0x20 [ 497.086790][T12018] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 497.090328][T12296] ? load_image+0x3b0/0x3b0 [ 497.090369][T12296] ? __lock_acquire+0x7c60/0x7c60 [ 497.090393][T12296] ? slab_post_alloc_hook+0x4c/0x380 [ 497.090415][T12296] ? __alloc_skb+0xf4/0x750 [ 497.090435][T12296] ? alloc_skb_with_frags+0xa7/0x730 [ 497.090459][T12296] ? sock_alloc_send_pskb+0x853/0x980 [ 497.090489][T12296] should_fail+0x38c/0x4c0 [ 497.090527][T12296] prepare_alloc_pages+0x1e4/0x5f0 [ 497.090566][T12296] __alloc_pages+0x10e/0x470 [ 497.139258][T12301] netlink: 16222 bytes leftover after parsing attributes in process `syz.1.2518'. [ 497.142119][T12296] ? zone_statistics+0x170/0x170 [ 497.156310][T12296] kmalloc_large_node+0x7d/0x190 [ 497.158662][T12018] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 497.161384][T12296] __kmalloc_node_track_caller+0x22e/0x3a0 [ 497.177755][T12296] ? alloc_skb_with_frags+0xa7/0x730 [ 497.183082][T12296] ? kmem_cache_alloc_node+0x162/0x2d0 [ 497.188568][T12296] ? __alloc_skb+0xf4/0x750 [ 497.193116][T12296] ? alloc_skb_with_frags+0xa7/0x730 [ 497.195300][T12018] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 497.198438][T12296] __alloc_skb+0x22c/0x750 [ 497.198475][T12296] alloc_skb_with_frags+0xa7/0x730 [ 497.198525][T12296] sock_alloc_send_pskb+0x853/0x980 [ 497.198595][T12296] ? sock_kzfree_s+0x50/0x50 [ 497.198637][T12296] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 497.233701][T12296] tun_get_user+0x856/0x38d0 [ 497.238436][T12296] ? perf_trace_lock+0x2ec/0x370 [ 497.239351][T12018] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 497.243437][T12296] ? tun_ring_recv+0xc30/0xc30 [ 497.258751][T12296] ? rcu_lock_release+0x5/0x20 [ 497.263574][T12296] ? __lock_acquire+0x7c60/0x7c60 [ 497.268642][T12296] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 497.274425][T12296] tun_chr_write_iter+0x112/0x1e0 [ 497.279493][T12296] vfs_write+0x712/0xd00 [ 497.283097][T12018] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 497.283776][T12296] ? file_end_write+0x250/0x250 [ 497.298673][T12296] ? __fget_files+0x40f/0x480 [ 497.303441][T12296] ? __fdget_pos+0x1e2/0x370 [ 497.308073][T12296] ? ksys_write+0x71/0x250 [ 497.312552][T12296] ksys_write+0x14d/0x250 [ 497.316940][T12296] ? __ia32_sys_read+0x80/0x80 [ 497.321769][T12296] ? lockdep_hardirqs_on+0x94/0x140 [ 497.327019][T12296] do_syscall_64+0x4c/0xa0 [ 497.331609][T12296] ? clear_bhb_loop+0x30/0x80 [ 497.331939][T12018] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 497.336346][T12296] ? clear_bhb_loop+0x30/0x80 [ 497.351575][T12296] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 497.357509][T12296] RIP: 0033:0x7fd082f58be9 [ 497.361960][T12296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 497.376248][T12018] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 497.381599][T12296] RSP: 002b:00007fd0811c0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 497.381630][T12296] RAX: ffffffffffffffda RBX: 00007fd08317ffa0 RCX: 00007fd082f58be9 [ 497.381646][T12296] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 497.381661][T12296] RBP: 00007fd0811c0090 R08: 0000000000000000 R09: 0000000000000000 [ 497.381675][T12296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 497.381689][T12296] R13: 00007fd083180038 R14: 00007fd08317ffa0 R15: 00007ffcd5ef2748 [ 497.381736][T12296] [ 497.471260][T12018] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 497.494354][T12018] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 497.510513][T12018] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 497.526451][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 497.553520][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 497.577166][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 497.603263][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 497.625327][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 497.642727][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 497.731613][T12018] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 497.745261][T12018] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 497.755371][T12018] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 497.769970][T12018] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 498.017239][T12312] netlink: 180 bytes leftover after parsing attributes in process `syz.6.2521'. [ 498.068583][ T580] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 498.092671][ T580] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 498.105638][T12312] netlink: 'syz.6.2521': attribute type 3 has an invalid length. [ 498.188109][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 498.200152][ T154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 498.258183][ T154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 498.294503][ T1272] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 498.888985][T12330] device wlan0 entered promiscuous mode [ 498.899850][T12332] netlink: 140 bytes leftover after parsing attributes in process `syz.0.2529'. [ 498.981850][T12337] netlink: 'syz.1.2528': attribute type 23 has an invalid length. [ 499.026577][T12339] netlink: 14 bytes leftover after parsing attributes in process `syz.7.2531'. [ 499.118300][T12339] netlink: del zone limit has 4 unknown bytes [ 499.836601][T12372] netlink: 'syz.4.2543': attribute type 29 has an invalid length. [ 499.900488][T12372] netlink: 'syz.4.2543': attribute type 29 has an invalid length. [ 500.208951][T12377] netlink: 9286 bytes leftover after parsing attributes in process `syz.4.2543'. [ 500.488801][T12390] netlink: 132 bytes leftover after parsing attributes in process `syz.6.2547'. [ 501.414895][T12412] netlink: 'syz.7.2556': attribute type 3 has an invalid length. [ 501.450856][ T1423] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.457264][ T1423] ieee802154 phy1 wpan1: encryption failed: -22 [ 501.461427][T12412] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.2556'. [ 501.642856][T12420] netlink: 'syz.1.2554': attribute type 1 has an invalid length. [ 501.684664][T12420] netlink: 154788 bytes leftover after parsing attributes in process `syz.1.2554'. [ 501.695255][T12403] €Â0: renamed from pim6reg1 [ 501.989477][T12431] netlink: 'syz.4.2560': attribute type 10 has an invalid length. [ 502.058436][T12428] netlink: 'syz.4.2560': attribute type 10 has an invalid length. [ 502.745761][T12457] netlink: 'syz.0.2568': attribute type 1 has an invalid length. [ 502.779766][T12457] netlink: 157116 bytes leftover after parsing attributes in process `syz.0.2568'. [ 502.815479][T12461] device veth1_macvtap left promiscuous mode [ 502.880116][T12464] device veth1_macvtap entered promiscuous mode [ 502.893320][T12464] device macsec0 entered promiscuous mode [ 502.903284][T12463] netlink: 140 bytes leftover after parsing attributes in process `syz.0.2568'. [ 502.923780][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 503.005239][T12468] FAULT_INJECTION: forcing a failure. [ 503.005239][T12468] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 503.038622][T12468] CPU: 1 PID: 12468 Comm: syz.0.2572 Not tainted 5.15.189-syzkaller #0 [ 503.047165][T12468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 503.057252][T12468] Call Trace: [ 503.060563][T12468] [ 503.063523][T12468] dump_stack_lvl+0x168/0x230 [ 503.068432][T12468] ? show_regs_print_info+0x20/0x20 [ 503.073677][T12468] ? load_image+0x3b0/0x3b0 [ 503.078226][T12468] ? __lock_acquire+0x7c60/0x7c60 [ 503.083293][T12468] ? __might_sleep+0xf0/0xf0 [ 503.088028][T12468] should_fail+0x38c/0x4c0 [ 503.092482][T12468] _copy_from_user+0x2e/0x170 [ 503.097197][T12468] generic_map_update_batch+0x4d4/0x7c0 [ 503.102774][T12468] ? rcu_read_unlock+0x90/0x90 [ 503.107560][T12468] ? __fdget+0x18b/0x210 [ 503.111806][T12468] ? rcu_read_unlock+0x90/0x90 [ 503.116657][T12468] bpf_map_do_batch+0x466/0x600 [ 503.121518][T12468] __sys_bpf+0x601/0x670 [ 503.125771][T12468] ? bpf_link_show_fdinfo+0x340/0x340 [ 503.131240][T12468] ? vtime_user_exit+0x2dc/0x400 [ 503.136190][T12468] __x64_sys_bpf+0x78/0x90 [ 503.140615][T12468] do_syscall_64+0x4c/0xa0 [ 503.145041][T12468] ? clear_bhb_loop+0x30/0x80 [ 503.149729][T12468] ? clear_bhb_loop+0x30/0x80 [ 503.154417][T12468] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 503.160316][T12468] RIP: 0033:0x7f04d866bbe9 [ 503.164737][T12468] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 503.184345][T12468] RSP: 002b:00007f04d68d3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 503.192770][T12468] RAX: ffffffffffffffda RBX: 00007f04d8892fa0 RCX: 00007f04d866bbe9 [ 503.200922][T12468] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 503.208894][T12468] RBP: 00007f04d68d3090 R08: 0000000000000000 R09: 0000000000000000 [ 503.216872][T12468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 503.224848][T12468] R13: 00007f04d8893038 R14: 00007f04d8892fa0 R15: 00007ffdbd6ceb58 [ 503.232838][T12468] [ 503.329189][T12476] €Â0: renamed from pim6reg1 [ 504.304006][T12511] FAULT_INJECTION: forcing a failure. [ 504.304006][T12511] name failslab, interval 1, probability 0, space 0, times 0 [ 504.343284][T12511] CPU: 0 PID: 12511 Comm: syz.7.2589 Not tainted 5.15.189-syzkaller #0 [ 504.351594][T12511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 504.361859][T12511] Call Trace: [ 504.365313][T12511] [ 504.368272][T12511] dump_stack_lvl+0x168/0x230 [ 504.372992][T12511] ? show_regs_print_info+0x20/0x20 [ 504.378260][T12511] ? load_image+0x3b0/0x3b0 [ 504.382801][T12511] ? __might_sleep+0xf0/0xf0 [ 504.387569][T12511] ? __lock_acquire+0x7c60/0x7c60 [ 504.392713][T12511] should_fail+0x38c/0x4c0 [ 504.397202][T12511] should_failslab+0x5/0x20 [ 504.402001][T12511] slab_pre_alloc_hook+0x51/0xc0 [ 504.406972][T12511] kmem_cache_alloc_trace+0x47/0x2a0 [ 504.412295][T12511] ? tcp_sendmsg_fastopen+0x1d5/0x600 [ 504.417710][T12511] tcp_sendmsg_fastopen+0x1d5/0x600 [ 504.423043][T12511] tcp_sendmsg_locked+0x3097/0x3590 [ 504.428493][T12511] ? aa_sk_perm+0x8f0/0x8f0 [ 504.433048][T12511] ? mark_lock+0x94/0x320 [ 504.437421][T12511] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 504.443521][T12511] ? lock_chain_count+0x20/0x20 [ 504.448518][T12511] ? rcu_is_watching+0x11/0xa0 [ 504.453328][T12511] ? tcp_free_fastopen_req+0x70/0x70 [ 504.458750][T12511] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 504.465066][T12511] ? inet_send_prepare+0x260/0x260 [ 504.470315][T12511] ? inet_send_prepare+0x260/0x260 [ 504.475466][T12511] tcp_sendmsg+0x2b/0x40 [ 504.479744][T12511] ____sys_sendmsg+0x5a2/0x8c0 [ 504.484543][T12511] ? memset+0x1e/0x40 [ 504.488551][T12511] ? __sys_sendmsg_sock+0x30/0x30 [ 504.493619][T12511] ? import_iovec+0x6f/0xa0 [ 504.498156][T12511] ___sys_sendmsg+0x1f0/0x260 [ 504.502870][T12511] ? __sys_sendmsg+0x250/0x250 [ 504.507672][T12511] ? ktime_get_real_ts64+0x420/0x420 [ 504.513022][T12511] ? __fdget+0x18b/0x210 [ 504.517295][T12511] __se_sys_sendmsg+0x190/0x250 [ 504.522176][T12511] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 504.528474][T12511] ? __x64_sys_sendmsg+0x80/0x80 [ 504.533537][T12511] ? __x64_sys_sendmsg+0x30/0x80 [ 504.538505][T12511] do_syscall_64+0x4c/0xa0 [ 504.542950][T12511] ? clear_bhb_loop+0x30/0x80 [ 504.547638][T12511] ? clear_bhb_loop+0x30/0x80 [ 504.552433][T12511] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 504.558373][T12511] RIP: 0033:0x7ffa76424be9 [ 504.562917][T12511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 504.582559][T12511] RSP: 002b:00007ffa7468c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 504.591049][T12511] RAX: ffffffffffffffda RBX: 00007ffa7664bfa0 RCX: 00007ffa76424be9 [ 504.599155][T12511] RDX: 00000000300080c5 RSI: 0000200000000000 RDI: 0000000000000004 [ 504.607253][T12511] RBP: 00007ffa7468c090 R08: 0000000000000000 R09: 0000000000000000 [ 504.615254][T12511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 504.623268][T12511] R13: 00007ffa7664c038 R14: 00007ffa7664bfa0 R15: 00007fff3c832078 [ 504.631299][T12511] [ 504.745075][T12514] €Â0: renamed from pim6reg1 [ 504.928854][T12520] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2591'. [ 505.043219][T12520] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2591'. [ 505.077842][T12517] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2591'. [ 506.340038][T12553] syz.7.2601[12553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 506.340142][T12553] syz.7.2601[12553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 506.798645][T12568] FAULT_INJECTION: forcing a failure. [ 506.798645][T12568] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 507.035194][T12568] CPU: 1 PID: 12568 Comm: syz.7.2606 Not tainted 5.15.189-syzkaller #0 [ 507.043504][T12568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 507.053598][T12568] Call Trace: [ 507.056908][T12568] [ 507.059864][T12568] dump_stack_lvl+0x168/0x230 [ 507.064701][T12568] ? show_regs_print_info+0x20/0x20 [ 507.069933][T12568] ? load_image+0x3b0/0x3b0 [ 507.074480][T12568] ? __lock_acquire+0x7c60/0x7c60 [ 507.079537][T12568] ? bpf_trace_run4+0x20c/0x330 [ 507.084425][T12568] should_fail+0x38c/0x4c0 [ 507.088877][T12568] prepare_alloc_pages+0x1e4/0x5f0 [ 507.094034][T12568] __alloc_pages+0x10e/0x470 [ 507.098657][T12568] ? zone_statistics+0x170/0x170 [ 507.103631][T12568] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 507.109674][T12568] pcpu_populate_chunk+0x15d/0xc90 [ 507.114831][T12568] ? _find_next_bit+0x1a9/0x200 [ 507.119855][T12568] pcpu_alloc+0xbed/0x1770 [ 507.124339][T12568] bpf_map_alloc_percpu+0xc5/0x150 [ 507.129493][T12568] array_map_alloc+0x370/0x6f0 [ 507.134312][T12568] map_create+0x485/0x2170 [ 507.138774][T12568] __sys_bpf+0x2a4/0x670 [ 507.143052][T12568] ? bpf_link_show_fdinfo+0x340/0x340 [ 507.148567][T12568] ? vtime_user_exit+0x2dc/0x400 [ 507.153552][T12568] __x64_sys_bpf+0x78/0x90 [ 507.158097][T12568] do_syscall_64+0x4c/0xa0 [ 507.162646][T12568] ? clear_bhb_loop+0x30/0x80 [ 507.167347][T12568] ? clear_bhb_loop+0x30/0x80 [ 507.172164][T12568] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 507.178106][T12568] RIP: 0033:0x7ffa76424be9 [ 507.182585][T12568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 507.202313][T12568] RSP: 002b:00007ffa7468c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 507.211237][T12568] RAX: ffffffffffffffda RBX: 00007ffa7664bfa0 RCX: 00007ffa76424be9 [ 507.219327][T12568] RDX: 0000000000000050 RSI: 00002000000005c0 RDI: 2000000000000000 [ 507.227334][T12568] RBP: 00007ffa7468c090 R08: 0000000000000000 R09: 0000000000000000 [ 507.235334][T12568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 507.243418][T12568] R13: 00007ffa7664c038 R14: 00007ffa7664bfa0 R15: 00007fff3c832078 [ 507.251437][T12568] [ 510.808828][T12643] netlink: 'syz.1.2631': attribute type 9 has an invalid length. [ 510.846024][T12643] netlink: 61967 bytes leftover after parsing attributes in process `syz.1.2631'. [ 512.210785][T12678] netlink: 'syz.4.2644': attribute type 21 has an invalid length. [ 512.297535][T12678] netlink: 'syz.4.2644': attribute type 12 has an invalid length. [ 512.354377][T12678] netlink: 'syz.4.2644': attribute type 13 has an invalid length. [ 512.417190][T12678] netlink: 'syz.4.2644': attribute type 14 has an invalid length. [ 512.526383][T12678] netlink: 'syz.4.2644': attribute type 15 has an invalid length. [ 512.628040][T12678] netlink: 'syz.4.2644': attribute type 16 has an invalid length. [ 512.672345][T12678] netlink: 'syz.4.2644': attribute type 19 has an invalid length. [ 512.746728][T12678] netlink: 'syz.4.2644': attribute type 21 has an invalid length. [ 512.816163][T12678] netlink: 'syz.4.2644': attribute type 22 has an invalid length. [ 512.871810][T12678] netlink: 12226 bytes leftover after parsing attributes in process `syz.4.2644'. [ 515.096704][T12747] FAULT_INJECTION: forcing a failure. [ 515.096704][T12747] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 515.246990][T12747] CPU: 0 PID: 12747 Comm: syz.7.2663 Not tainted 5.15.189-syzkaller #0 [ 515.255319][T12747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 515.265493][T12747] Call Trace: [ 515.268796][T12747] [ 515.271747][T12747] dump_stack_lvl+0x168/0x230 [ 515.276458][T12747] ? show_regs_print_info+0x20/0x20 [ 515.281684][T12747] ? load_image+0x3b0/0x3b0 [ 515.286277][T12747] ? __lock_acquire+0x7c60/0x7c60 [ 515.291342][T12747] should_fail+0x38c/0x4c0 [ 515.295805][T12747] _copy_from_user+0x2e/0x170 [ 515.300514][T12747] iovec_from_user+0x142/0x370 [ 515.305490][T12747] __import_iovec+0x70/0x490 [ 515.310123][T12747] import_iovec+0x6f/0xa0 [ 515.314490][T12747] ___sys_sendmsg+0x1b9/0x260 [ 515.319203][T12747] ? __sys_sendmsg+0x250/0x250 [ 515.324099][T12747] ? trace_event_raw_event_lock+0x250/0x250 [ 515.330019][T12747] ? vfs_write+0x84d/0xd00 [ 515.334486][T12747] ? __fdget+0x18b/0x210 [ 515.338757][T12747] __se_sys_sendmsg+0x190/0x250 [ 515.343637][T12747] ? __x64_sys_sendmsg+0x80/0x80 [ 515.348599][T12747] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 515.354625][T12747] ? lockdep_hardirqs_on+0x94/0x140 [ 515.359858][T12747] do_syscall_64+0x4c/0xa0 [ 515.364298][T12747] ? clear_bhb_loop+0x30/0x80 [ 515.368995][T12747] ? clear_bhb_loop+0x30/0x80 [ 515.373700][T12747] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 515.379644][T12747] RIP: 0033:0x7ffa76424be9 [ 515.384111][T12747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 515.403749][T12747] RSP: 002b:00007ffa7468c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 515.412200][T12747] RAX: ffffffffffffffda RBX: 00007ffa7664bfa0 RCX: 00007ffa76424be9 [ 515.420337][T12747] RDX: 0000000020000001 RSI: 0000200000000580 RDI: 0000000000000003 [ 515.428345][T12747] RBP: 00007ffa7468c090 R08: 0000000000000000 R09: 0000000000000000 [ 515.436348][T12747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 515.444357][T12747] R13: 00007ffa7664c038 R14: 00007ffa7664bfa0 R15: 00007fff3c832078 [ 515.452385][T12747] [ 515.964388][T12753] netlink: 'syz.4.2665': attribute type 1 has an invalid length. [ 515.983523][T12753] netlink: 154788 bytes leftover after parsing attributes in process `syz.4.2665'. [ 516.095747][T12765] netlink: 'syz.1.2668': attribute type 10 has an invalid length. [ 516.133932][T12765] netlink: 40 bytes leftover after parsing attributes in process `syz.1.2668'. [ 516.280815][T12765] netlink: 'syz.1.2668': attribute type 10 has an invalid length. [ 516.307614][T12765] netlink: 40 bytes leftover after parsing attributes in process `syz.1.2668'. [ 516.612139][T12768] netlink: 'syz.1.2670': attribute type 21 has an invalid length. [ 516.647635][T12768] netlink: 144 bytes leftover after parsing attributes in process `syz.1.2670'. [ 517.798234][T12801] €Â0: renamed from pim6reg1 [ 518.521474][T12809] device syzkaller0 entered promiscuous mode [ 518.599354][T12809] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 518.724564][T12817] netlink: 'syz.6.2687': attribute type 1 has an invalid length. [ 518.932342][T12817] netlink: 154788 bytes leftover after parsing attributes in process `syz.6.2687'. [ 518.942319][T12815] syzkaller0: mtu greater than device maximum [ 520.073224][T12858] device syzkaller0 entered promiscuous mode [ 520.151599][T12858] netlink: 'syz.4.2700': attribute type 41 has an invalid length. [ 520.189517][T12858] netlink: 14 bytes leftover after parsing attributes in process `syz.4.2700'. [ 521.005255][T12867] €Â0: renamed from pim6reg1 [ 521.410515][T12890] netlink: 'syz.6.2709': attribute type 46 has an invalid length. [ 521.496428][T12890] netlink: 2 bytes leftover after parsing attributes in process `syz.6.2709'. [ 521.666955][T12859] chnl_net:caif_netlink_parms(): no params data found [ 521.821858][T12892] netlink: 'syz.4.2710': attribute type 10 has an invalid length. [ 521.855483][T12892] netlink: 55 bytes leftover after parsing attributes in process `syz.4.2710'. [ 522.139383][T12859] bridge0: port 1(bridge_slave_0) entered blocking state [ 522.177866][T12859] bridge0: port 1(bridge_slave_0) entered disabled state [ 522.284679][T12859] device bridge_slave_0 entered promiscuous mode [ 522.301433][T12859] bridge0: port 2(bridge_slave_1) entered blocking state [ 522.327662][ T4258] Bluetooth: hci1: command 0x0409 tx timeout [ 522.367664][T12859] bridge0: port 2(bridge_slave_1) entered disabled state [ 522.376758][T12859] device bridge_slave_1 entered promiscuous mode [ 522.538974][T12909] netlink: 'syz.6.2715': attribute type 3 has an invalid length. [ 522.574386][T12859] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 522.605853][T12909] netlink: 'syz.6.2715': attribute type 1 has an invalid length. [ 522.629196][T12912] netlink: 'syz.7.2716': attribute type 10 has an invalid length. [ 522.637063][T12912] netlink: 40 bytes leftover after parsing attributes in process `syz.7.2716'. [ 522.694475][T12909] netlink: 152 bytes leftover after parsing attributes in process `syz.6.2715'. [ 522.787830][T12912] device caif0 entered promiscuous mode [ 522.822332][T12912] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 522.927839][T12859] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 523.162511][T12859] team0: Port device team_slave_0 added [ 523.320893][T12859] team0: Port device team_slave_1 added [ 523.361524][T12929] FAULT_INJECTION: forcing a failure. [ 523.361524][T12929] name failslab, interval 1, probability 0, space 0, times 0 [ 523.457876][T12929] CPU: 0 PID: 12929 Comm: syz.7.2720 Not tainted 5.15.189-syzkaller #0 [ 523.466201][T12929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 523.476299][T12929] Call Trace: [ 523.479613][T12929] [ 523.482582][T12929] dump_stack_lvl+0x168/0x230 [ 523.487328][T12929] ? show_regs_print_info+0x20/0x20 [ 523.492572][T12929] ? load_image+0x3b0/0x3b0 [ 523.497145][T12929] ? __might_sleep+0xf0/0xf0 [ 523.501772][T12929] ? __lock_acquire+0x7c60/0x7c60 [ 523.506856][T12929] should_fail+0x38c/0x4c0 [ 523.511323][T12929] should_failslab+0x5/0x20 [ 523.515864][T12929] slab_pre_alloc_hook+0x51/0xc0 [ 523.520852][T12929] __kmalloc_node_track_caller+0x68/0x3a0 [ 523.526606][T12929] ? netlink_sendmsg+0x645/0xbc0 [ 523.531590][T12929] ? kmem_cache_alloc_node+0x162/0x2d0 [ 523.537120][T12929] ? __alloc_skb+0xf4/0x750 [ 523.541700][T12929] ? netlink_sendmsg+0x645/0xbc0 [ 523.546696][T12929] __alloc_skb+0x22c/0x750 [ 523.551170][T12929] netlink_sendmsg+0x645/0xbc0 [ 523.556006][T12929] ? netlink_getsockopt+0x560/0x560 [ 523.561250][T12929] ? aa_sock_msg_perm+0x94/0x150 [ 523.566232][T12929] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 523.571649][T12929] ? security_socket_sendmsg+0x7c/0xa0 [ 523.577181][T12929] ? netlink_getsockopt+0x560/0x560 [ 523.582472][T12929] ____sys_sendmsg+0x5a2/0x8c0 [ 523.587320][T12929] ? memset+0x1e/0x40 [ 523.591350][T12929] ? __sys_sendmsg_sock+0x30/0x30 [ 523.596450][T12929] ? import_iovec+0x6f/0xa0 [ 523.601116][T12929] ___sys_sendmsg+0x1f0/0x260 [ 523.606012][T12929] ? __sys_sendmsg+0x250/0x250 [ 523.610933][T12929] ? __fdget+0x18b/0x210 [ 523.615246][T12929] __se_sys_sendmsg+0x190/0x250 [ 523.620249][T12929] ? __x64_sys_sendmsg+0x80/0x80 [ 523.625314][T12929] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 523.631396][T12929] ? lockdep_hardirqs_on+0x94/0x140 [ 523.636671][T12929] do_syscall_64+0x4c/0xa0 [ 523.641131][T12929] ? clear_bhb_loop+0x30/0x80 [ 523.645842][T12929] ? clear_bhb_loop+0x30/0x80 [ 523.650587][T12929] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 523.656541][T12929] RIP: 0033:0x7ffa76424be9 [ 523.661014][T12929] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 523.680760][T12929] RSP: 002b:00007ffa7468c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 523.689427][T12929] RAX: ffffffffffffffda RBX: 00007ffa7664bfa0 RCX: 00007ffa76424be9 [ 523.697573][T12929] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000005 [ 523.705596][T12929] RBP: 00007ffa7468c090 R08: 0000000000000000 R09: 0000000000000000 [ 523.713702][T12929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 523.721712][T12929] R13: 00007ffa7664c038 R14: 00007ffa7664bfa0 R15: 00007fff3c832078 [ 523.729786][T12929] [ 523.747983][T12936] netlink: 129384 bytes leftover after parsing attributes in process `syz.6.2722'. [ 523.885733][T12935] netlink: 'syz.6.2722': attribute type 21 has an invalid length. [ 523.918008][T12935] IPv6: NLM_F_CREATE should be specified when creating new route [ 523.954796][T12934] netlink: 'syz.4.2723': attribute type 39 has an invalid length. [ 524.258943][T12859] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 524.276436][T12859] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 524.395521][T12859] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 524.408498][T11363] Bluetooth: hci1: command 0x041b tx timeout [ 524.531546][T12859] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 524.547537][T12859] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 524.667842][T12859] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 524.969627][T12946] netlink: 156 bytes leftover after parsing attributes in process `syz.7.2727'. [ 525.123198][T12859] device hsr_slave_0 entered promiscuous mode [ 525.188662][T12859] device hsr_slave_1 entered promiscuous mode [ 525.228145][T12859] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 525.235800][T12859] Cannot create hsr debugfs directory [ 525.618080][T12957] netlink: 'syz.6.2731': attribute type 4 has an invalid length. [ 525.647919][T12957] netlink: 'syz.6.2731': attribute type 16 has an invalid length. [ 525.655901][T12957] netlink: 132 bytes leftover after parsing attributes in process `syz.6.2731'. [ 526.334527][T12859] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 526.487944][ T4270] Bluetooth: hci1: command 0x040f tx timeout [ 526.930844][T12859] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 527.194800][T12859] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 527.549217][T12994] netlink: 15487 bytes leftover after parsing attributes in process `syz.7.2744'. [ 527.613125][T12859] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 528.072158][T12859] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 528.146021][T12859] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 528.354820][T12859] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 528.448422][T12859] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 528.567971][T11363] Bluetooth: hci1: command 0x0419 tx timeout [ 528.841370][T13018] netlink: 40 bytes leftover after parsing attributes in process `syz.7.2749'. [ 529.555660][T12859] 8021q: adding VLAN 0 to HW filter on device bond0 [ 529.900662][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 529.918468][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 529.950672][T12859] 8021q: adding VLAN 0 to HW filter on device team0 [ 530.001646][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 530.012731][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 530.052922][ T154] bridge0: port 1(bridge_slave_0) entered blocking state [ 530.060357][ T154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 530.149379][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 530.184240][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 530.206212][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 530.239352][ T154] bridge0: port 2(bridge_slave_1) entered blocking state [ 530.246628][ T154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 530.322312][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 530.359253][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 530.443213][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 530.470525][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 530.544515][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 530.596938][T13039] netlink: 'syz.0.2758': attribute type 10 has an invalid length. [ 530.678226][T13039] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2758'. [ 530.736394][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 530.761541][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 530.926125][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 530.940657][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 530.989644][ T4370] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 531.014154][ T4370] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 531.072322][T12859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 531.461384][T13057] €Â0: renamed from pim6reg1 [ 532.729307][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 532.737043][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 532.925291][T12859] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 533.050633][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 533.085798][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 533.256048][T13085] netlink: 140 bytes leftover after parsing attributes in process `syz.0.2772'. [ 533.318135][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 533.350574][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 533.384104][T12859] device veth0_vlan entered promiscuous mode [ 533.413230][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 533.458833][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 533.540965][T12859] device veth1_vlan entered promiscuous mode [ 533.802187][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 533.824046][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 533.888745][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 533.940269][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 534.046115][T12859] device veth0_macvtap entered promiscuous mode [ 534.067012][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 534.089356][T12859] device veth1_macvtap entered promiscuous mode [ 534.311443][T12859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 534.377498][T12859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 534.413311][T12859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 534.457706][T12859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 534.477372][T12859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 534.547524][T12859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 534.588768][T12859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 534.643738][T12859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 534.664709][T12859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 534.707187][T12859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 534.749278][T12859] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 534.784087][T12859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 534.857494][T12859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 534.952928][T12859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 535.027519][T12859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 535.058480][T12859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 535.085392][T12859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 535.126661][T12859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 535.147514][T12859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 535.197556][T12859] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 535.267615][T12859] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 535.328436][T12859] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 535.501143][T13126] netlink: 144316 bytes leftover after parsing attributes in process `syz.7.2784'. [ 535.565762][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 535.590683][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 535.649052][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 535.701409][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 535.794999][T12859] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 535.822943][T12859] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 535.862016][T12859] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 535.897618][T12859] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 536.317776][ T1272] device hsr_slave_0 left promiscuous mode [ 536.523720][ T1272] device hsr_slave_1 left promiscuous mode [ 536.559058][ T1272] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 536.621409][ T1272] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 536.699357][ T1272] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 536.706989][ T1272] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 536.778889][ T1272] batman_adv: batadv0: Interface deactivated: virt_wifi0 [ 536.786070][ T1272] batman_adv: batadv0: Removing interface: virt_wifi0 [ 536.874593][ T1272] device veth1_vlan left promiscuous mode [ 537.895620][ T1272] team0 (unregistering): Port device team_slave_1 removed [ 538.008760][ T1272] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 538.081198][ T1272] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 538.349265][ T1272] team0 (unregistering): Port device bond0 removed [ 538.434886][ T1272] bond0 (unregistering): Released all slaves [ 538.560226][T13144] netlink: 'syz.6.2790': attribute type 39 has an invalid length. [ 538.812008][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 538.830829][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 538.915065][ T4370] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 538.935050][ T1220] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 538.968025][ T1220] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 539.092984][ T1220] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 539.245230][T13158] €Â0: renamed from pim6reg1 [ 539.611809][T13166] netlink: 'syz.1.2695': attribute type 10 has an invalid length. [ 540.191219][T13166] bond0: (slave veth0_to_bond): Enslaving as an active interface with an up link [ 540.358623][T13183] veth1_macvtap: mtu greater than device maximum [ 540.849968][T13203] FAULT_INJECTION: forcing a failure. [ 540.849968][T13203] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 540.879962][T13204] netlink: 'syz.6.2813': attribute type 2 has an invalid length. [ 540.900472][T13203] CPU: 0 PID: 13203 Comm: syz.1.2814 Not tainted 5.15.189-syzkaller #0 [ 540.908896][T13203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 540.918986][T13203] Call Trace: [ 540.922309][T13203] [ 540.925278][T13203] dump_stack_lvl+0x168/0x230 [ 540.930015][T13203] ? show_regs_print_info+0x20/0x20 [ 540.935452][T13203] ? load_image+0x3b0/0x3b0 [ 540.940017][T13203] ? __lock_acquire+0x7c60/0x7c60 [ 540.945289][T13203] should_fail+0x38c/0x4c0 [ 540.949780][T13203] _copy_from_user+0x2e/0x170 [ 540.954505][T13203] __copy_msghdr_from_user+0xaf/0x5e0 [ 540.959918][T13203] ? verify_lock_unused+0x140/0x140 [ 540.965170][T13203] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 540.970790][T13203] ___sys_sendmsg+0x156/0x260 [ 540.976069][T13203] ? __sys_sendmsg+0x250/0x250 [ 540.980913][T13203] ? vfs_write+0x84d/0xd00 [ 540.985666][T13203] ? __fdget+0x18b/0x210 [ 540.989953][T13203] __se_sys_sendmsg+0x190/0x250 [ 540.994858][T13203] ? __x64_sys_sendmsg+0x80/0x80 [ 540.999830][T13203] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 541.005896][T13203] ? lockdep_hardirqs_on+0x94/0x140 [ 541.011153][T13203] do_syscall_64+0x4c/0xa0 [ 541.015617][T13203] ? clear_bhb_loop+0x30/0x80 [ 541.020333][T13203] ? clear_bhb_loop+0x30/0x80 [ 541.025055][T13203] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 541.030991][T13203] RIP: 0033:0x7fc8a4becbe9 [ 541.035445][T13203] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 541.055093][T13203] RSP: 002b:00007fc8a2e54038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 541.063555][T13203] RAX: ffffffffffffffda RBX: 00007fc8a4e13fa0 RCX: 00007fc8a4becbe9 [ 541.071580][T13203] RDX: 0000000020000040 RSI: 00002000000001c0 RDI: 0000000000000010 [ 541.079596][T13203] RBP: 00007fc8a2e54090 R08: 0000000000000000 R09: 0000000000000000 [ 541.087768][T13203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 541.095981][T13203] R13: 00007fc8a4e14038 R14: 00007fc8a4e13fa0 R15: 00007fff2f792068 [ 541.104016][T13203] [ 541.108256][T13204] netlink: 132 bytes leftover after parsing attributes in process `syz.6.2813'. [ 541.743854][T13230] netlink: 76 bytes leftover after parsing attributes in process `syz.6.2823'. [ 541.913314][T13224] netlink: 14 bytes leftover after parsing attributes in process `syz.7.2821'. [ 542.256726][ T3562] udevd[3562]: worker [11015] terminated by signal 33 (Unknown signal 33) [ 542.272086][ T3562] udevd[3562]: worker [11015] failed while handling '/devices/virtual/block/loop6' [ 542.308805][T13224] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 542.400379][T13224] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 542.468277][T13224] bond0 (unregistering): Released all slaves [ 542.956484][T13268] €Â0: renamed from pim6reg1 [ 543.146778][T13277] netlink: 144316 bytes leftover after parsing attributes in process `syz.4.2842'. [ 543.293354][T13283] netlink: 'syz.7.2844': attribute type 3 has an invalid length. [ 543.341285][T13283] netlink: 'syz.7.2844': attribute type 10 has an invalid length. [ 544.221858][T13294] netlink: 'syz.0.2848': attribute type 10 has an invalid length. [ 545.157321][T13294] bond0: (slave veth0_to_bond): Enslaving as an active interface with an up link [ 545.338651][T13312] €Â0: renamed from pim6reg1 [ 545.801359][T13332] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2862'. [ 548.522581][ T1272] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 548.584496][ T1272] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 548.624952][ T1272] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 548.675122][ T1272] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 548.738601][ T1272] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 548.793152][ T1272] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 548.853393][ T1272] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 548.921291][ T1272] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 549.020640][ T1272] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 549.074585][ T1272] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 549.118425][ T1272] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 549.183248][ T1272] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 549.290184][ T1272] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 549.373495][ T1272] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 549.443834][ T1272] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 549.494324][ T1272] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 549.568576][ T1272] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 549.642934][ T1272] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 549.712825][ T1272] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 549.755735][ T1272] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 551.653476][ T1272] device hsr_slave_0 left promiscuous mode [ 551.660299][ T1272] device hsr_slave_1 left promiscuous mode [ 551.666797][ T1272] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 551.674558][ T1272] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 551.682527][ T1272] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 551.690953][ T1272] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 551.699073][ T1272] device bridge_slave_1 left promiscuous mode [ 551.705493][ T1272] bridge0: port 2(bridge_slave_1) entered disabled state [ 551.714314][ T1272] device bridge_slave_0 left promiscuous mode [ 551.721141][ T1272] bridge0: port 1(bridge_slave_0) entered disabled state [ 551.733797][ T1272] device hsr_slave_0 left promiscuous mode [ 551.740505][ T1272] device hsr_slave_1 left promiscuous mode [ 551.747135][ T1272] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 551.754744][ T1272] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 551.763826][ T1272] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 551.771486][ T1272] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 551.779744][ T1272] device bridge_slave_1 left promiscuous mode [ 551.785978][ T1272] bridge0: port 2(bridge_slave_1) entered disabled state [ 551.795761][ T1272] device bridge_slave_0 left promiscuous mode [ 551.802938][ T1272] bridge0: port 1(bridge_slave_0) entered disabled state [ 551.814587][ T1272] device hsr_slave_0 left promiscuous mode [ 551.821290][ T1272] device hsr_slave_1 left promiscuous mode [ 551.827794][ T1272] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 551.835379][ T1272] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 551.843424][ T1272] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 551.851478][ T1272] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 551.860074][ T1272] device bridge_slave_1 left promiscuous mode [ 551.866432][ T1272] bridge0: port 2(bridge_slave_1) entered disabled state [ 551.875281][ T1272] device bridge_slave_0 left promiscuous mode [ 551.881940][ T1272] bridge0: port 1(bridge_slave_0) entered disabled state [ 551.894253][ T1272] device hsr_slave_0 left promiscuous mode [ 551.900904][ T1272] device hsr_slave_1 left promiscuous mode [ 551.907238][ T1272] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 551.915566][ T1272] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 551.923663][ T1272] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 551.931795][ T1272] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 551.941140][ T1272] bridge0: port 4(dummy0) entered disabled state [ 551.949578][ T1272] device veth1_to_team left promiscuous mode [ 551.955710][ T1272] bridge0: port 3(veth1_to_team) entered disabled state [ 551.964654][ T1272] device bridge_slave_1 left promiscuous mode [ 551.970950][ T1272] bridge0: port 2(bridge_slave_1) entered disabled state [ 551.979653][ T1272] device bridge_slave_0 left promiscuous mode [ 551.985866][ T1272] bridge0: port 1(bridge_slave_0) entered disabled state [ 551.996181][ T1272] device hsr_slave_0 left promiscuous mode [ 552.002791][ T1272] device hsr_slave_1 left promiscuous mode [ 552.010137][ T1272] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 552.018531][ T1272] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 552.026414][ T1272] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 552.034088][ T1272] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 552.042082][ T1272] bridge0: port 3(dummy0) entered disabled state [ 552.050125][ T1272] device bridge_slave_0 left promiscuous mode [ 552.056352][ T1272] bridge0: port 1(bridge_slave_0) entered disabled state [ 552.076353][ T1272] device veth1_vlan left promiscuous mode [ 552.082324][ T1272] device veth0_vlan left promiscuous mode [ 552.094636][ T1272] device veth1_macvtap left promiscuous mode [ 552.100957][ T1272] device veth0_macvtap left promiscuous mode [ 552.107136][ T1272] device veth1_vlan left promiscuous mode [ 552.113121][ T1272] device veth0_vlan left promiscuous mode [ 552.121541][ T1272] device veth1_macvtap left promiscuous mode [ 552.128950][ T1272] device veth0_macvtap left promiscuous mode [ 552.135043][ T1272] device veth1_vlan left promiscuous mode [ 552.141053][ T1272] device veth0_vlan left promiscuous mode [ 552.149249][ T1272] device veth1_macvtap left promiscuous mode [ 552.155332][ T1272] device veth0_macvtap left promiscuous mode [ 552.162126][ T1272] device veth1_vlan left promiscuous mode [ 552.168518][ T1272] device veth0_vlan left promiscuous mode [ 552.175523][ T1272] device veth1_vlan left promiscuous mode [ 552.182710][ T1272] device veth0_vlan left promiscuous mode [ 552.674182][ T1272] team0 (unregistering): Port device team_slave_1 removed [ 552.692655][ T1272] team0 (unregistering): Port device team_slave_0 removed [ 552.907366][ T1272] team0 (unregistering): Port device team_slave_1 removed [ 552.922305][ T1272] team0 (unregistering): Port device team_slave_0 removed [ 552.934730][ T1272] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 552.953511][ T1272] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 553.023820][ T1272] bond0 (unregistering): Released all slaves [ 553.193547][ T1272] team0 (unregistering): Port device team_slave_1 removed [ 553.210377][ T1272] team0 (unregistering): Port device team_slave_0 removed [ 553.222873][ T1272] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 553.239547][ T1272] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 553.251664][ T1272] bond0 (unregistering): (slave veth0_to_bond): Releasing backup interface [ 553.318745][ T1272] bond0 (unregistering): Released all slaves [ 553.456155][ T1272] team0 (unregistering): Port device team_slave_1 removed [ 553.474564][ T1272] team0 (unregistering): Port device team_slave_0 removed [ 553.490663][ T1272] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 553.504747][ T1272] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 553.518512][ T1272] bond0 (unregistering): (slave veth0_to_bond): Releasing backup interface [ 553.554792][ T1272] bond0 (unregistering): (slave batadv0): Releasing backup interface [ 553.593745][ T1272] bond0 (unregistering): (slave bridge0): Releasing backup interface [ 553.603030][ T1272] bond0 (unregistering): Released all slaves [ 553.720486][ T1272] team0 (unregistering): Port device team_slave_1 removed [ 553.738944][ T1272] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 553.754025][ T1272] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 553.771631][ T1272] bond0 (unregistering): (slave bridge_slave_1): Releasing backup interface [ 553.832880][ T1272] bond0 (unregistering): (slave bridge0): Releasing backup interface [ 553.843454][ T1272] bond0 (unregistering): Released all slaves