last executing test programs: 5.934429585s ago: executing program 2 (id=3099): sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x7, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0xa, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030031000b12d25a80648c2594f90324fc60100c114002200600053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8916, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r1, 0x6, 0x6, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) r2 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r2, &(0x7f0000001700)={0x0, 0x0, 0x0}, 0x20000010) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f00000001c0), 0x2, 0xffffffffffffffff, 0x4}, 0x38) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="130000000700000002"], 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x10, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xe}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ldst={0x0, 0x3, 0x0, 0x8, 0x1, 0x6, 0xfffffffffffffff1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x2a, 0x6a, &(0x7f0000000280)=""/106, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x9, 0x2, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r3, r3, r3, r3, r3, r3, r3, r3], 0x0, 0x10, 0x3, @void, @value}, 0x94) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x890b, &(0x7f0000000100)={0xffffffffffffffff, r4}) 5.498241881s ago: executing program 2 (id=3104): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x14, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x5, 0x4, &(0x7f0000000100)=""/4, 0x41100, 0x40, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x4, 0x5, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000001c0)=[{0x3, 0x3, 0xd, 0xa}, {0x2, 0x4, 0x10, 0x4}, {0x3, 0x1, 0xb, 0x2}, {0x0, 0x2, 0xf, 0x1}, {0x4, 0x4, 0xa, 0x5}], 0x10, 0x4, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r0, 0x0, 0x97, 0x7c, &(0x7f0000000300)="ac471766daeb0e20a89c7ec86e1cd2176a6722962f650fdbd8c00a1e53bda96709515e2e24121565dae8a1c5edc541d7826355cf9b5723a0eac3492c3ff7b804cc0c23836014c493c17b336d98d1e115a69bd1a05a271ffea198e7960cd26213543a031fc23b8edf4f480f87804c5c089647c5c31b0b9125baaecbc0febc5940e11fa51d75497160e0beec246292ce64536b83f72f8551", &(0x7f00000003c0)=""/124, 0x1, 0x0, 0xd, 0xb0, &(0x7f0000000440)="5476c77dc5196d3a782cc35a6a", &(0x7f0000000480)="3b79f4eec8359e3740be9c80c2f67d5dcf03a820266d6cef0e6b3eba8835aff6154d18a99a265a79bc6141b9f4b75f39739a9518d48ca6ffa6439b64c739c65cad392abea3716b08fb3120f4759afbb34cfd6df4da4516280f9864dbcf35b889143aba1b68c1568168270bd5a567fe5e92cf40ced5ca615d67db8db999471b677b55f47e98f10a1a14647cbe9f154b16c6301f27a9e5c17a5f2c8c43a1641f2722847807ed1c26d44adc50acb71d4a3a", 0x5, 0x0, 0x80000000}, 0x50) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000600)='cpuacct.usage\x00', 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640), 0x505000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000680), &(0x7f00000006c0)=r0}, 0x20) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbc, 0xbc, 0x8, [@const={0x0, 0x0, 0x0, 0xa, 0x1}, @func={0xa, 0x0, 0x0, 0xc, 0x3}, @float={0x8, 0x0, 0x0, 0x10, 0x8}, @struct={0x5, 0x5, 0x0, 0x4, 0x1, 0x200, [{0x2, 0x1, 0x7}, {0xb, 0x3, 0x1}, {0x0, 0x5, 0x9}, {0xf, 0x0, 0x5}, {0x5, 0x0, 0x7f}]}, @typedef={0xd}, @var={0x3, 0x0, 0x0, 0xe, 0x4, 0x1}, @struct={0xf, 0x2, 0x0, 0x4, 0x1, 0x6, [{0x1, 0x4, 0x8}, {0xd, 0x1, 0x7fffffff}]}, @decl_tag={0xd, 0x0, 0x0, 0x11, 0x4, 0x3}]}, {0x0, [0x30, 0x5f, 0x5f, 0x0, 0x30, 0x0]}}, &(0x7f0000000840)=""/116, 0xdc, 0x74, 0x0, 0xd304, 0x0, @void, @value}, 0x28) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0xc, 0x7, 0x7fff, 0x7, 0x40, r4, 0xffffffff, '\x00', 0x0, r5, 0x4, 0x3, 0x1, 0x0, @void, @value, @void, @value}, 0x50) r7 = socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(r7, &(0x7f0000000dc0)={&(0x7f0000000980)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000a00)=""/46, 0x2e}, {&(0x7f0000000a40)=""/232, 0xe8}, {&(0x7f0000000b40)=""/124, 0x7c}, {&(0x7f0000000bc0)=""/130, 0x82}, {&(0x7f0000000c80)=""/93, 0x5d}], 0x5, &(0x7f0000000d80)=""/4, 0x4}, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x2, 0x8, &(0x7f0000000e00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@jmp={0x5, 0x0, 0x8, 0x9, 0xa, 0xffffffffffffffc0, 0x8}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}]}, &(0x7f0000000e40)='syzkaller\x00', 0x4c57, 0xb6, &(0x7f0000000e80)=""/182, 0x40f00, 0x42, '\x00', 0x0, @fallback=0x9, r5, 0x8, &(0x7f0000000f40)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000f80)={0x2, 0xb, 0x1, 0x6}, 0x10, 0x0, r0, 0x9, &(0x7f0000000fc0)=[r6, r6], &(0x7f0000001000)=[{0x5, 0x4, 0x10, 0x5}, {0x2, 0x1, 0x5, 0x1}, {0x5, 0x3, 0xe, 0x2}, {0x0, 0x5, 0xa, 0x5}, {0x1, 0x2, 0x6}, {0x0, 0x3, 0xf, 0xa}, {0x3, 0x1, 0x4, 0x7}, {0x1, 0x3, 0x3, 0x1}, {0x3, 0x2, 0x1, 0xc}], 0x10, 0x7, @void, @value}, 0x94) recvmsg$unix(r3, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001180), 0x0, &(0x7f00000011c0)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}, 0x2160) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000012c0)={&(0x7f0000001280)='net_dev_xmit_timeout\x00', r8, 0x0, 0x9}, 0x18) openat$ppp(0xffffffffffffff9c, &(0x7f0000001300), 0x505480, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001340)) sendmsg$sock(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001380)="64b4cc4fe3235eaf1bc9586649edbdbf052d728d016f9f01f8352a21a5064beac891fcc5e7fcda58eed0273c95bc087e1a8b0e3f6e0b0e40c0c2e7d8a682ad8d8a27c1a6301d309200dd6693346edea1b05fa25edeb59bb0c02d03184acc1ab070b12bcf4104f8b850d746da68c240b6378d0ed0cfc92e9ccbb7ffb7e57639ee189f62a338c93f4b6b9a946965cc364b1a754fd61fd60b130f155246e6257f651f0168d5d6ae1a3830285b8942c86a097cc63d9e5afc7f35cce1a550d709e853", 0xc0}, {&(0x7f0000001440)="dd96f7a2a3162c1ebdc5c3b1ac05ebb216079780ade67a1c20843e6b5ab33289e6c3fbe9c713ff7da90ad32015937abc6c2842554fffa444e90dd78e7c272f95cf958010d42a55a73468f48af3cba6960f1bbe956b1c61d17305b807a5af7b662511cd849d845ea3a28485b15311711405abd1730d396dc8bdde3f35f15f357ef8f982f2", 0x84}, {&(0x7f0000001500)="5c14e26e429a346d7cb61a804f0915eaf938ce5735affd1c3a0ca0353bf1131c3fffa9404c6896b4370b7f7b1a8d4084459af49ba59911114bcda8d0e38f6700d44ad62f3219810fd26146b55dd0687408aefef5cf831fb81b3960eee754a9fb6869bcd7caf2b906ab71d3918793ceac8a4bfa6acc70467f47502be3157bfe6d47260345b37c8abf1f7923f1985b9adc2fe6ca453fa7426f5a26fa6ed49a03d61d068940835b62d4885aacf6b4e2", 0xae}, {&(0x7f00000015c0)="f6fea3d44ac0c69c884d8484aa2428904db344f0d58ebdff58240c1e43d13882af49a977807b11df0d2daa26068f4f642949", 0x32}, {&(0x7f0000001600)="c67fcd7a1e3add0e03177cfa76bedeb94ddbe6dffa276439be77902f9719dab1b21d485a289d5d4e20209db9678d2ea74e00bc5fd978306bd2", 0x39}], 0x5, &(0x7f00000016c0)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x48}, 0x80800) socketpair$tipc(0x1e, 0x3, 0x0, &(0x7f0000001780)) r12 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r12, 0x89e2, &(0x7f00000017c0)={r2}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001800)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$TUNSETOFFLOAD(r11, 0x400454d0, 0x1) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000001840)={'bridge_slave_1\x00'}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001980)={@cgroup=r11, 0x3, 0x1, 0x3, &(0x7f0000001880)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001900)=[0x0, 0x0, 0x0], &(0x7f0000001940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001cc0)={r9, 0xe0, &(0x7f0000001bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6, &(0x7f0000001a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x75, &(0x7f0000001ac0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001b00), &(0x7f0000001b40), 0x8, 0x42, 0x8, 0x8, &(0x7f0000001b80)}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000019c0)={@cgroup, r9, 0x22, 0x2c, 0x0, @void, @void, @void, @value=r14, r13}, 0x20) socketpair(0x6, 0x2, 0x8, &(0x7f0000001d00)) r17 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001d40)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x6, '\x00', r15, r11, 0x2, 0x3, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001dc0)={0x1b, 0x0, 0x0, 0xa, 0x0, r17, 0x1, '\x00', r15, r5, 0x2, 0x1, 0x3, 0x0, @void, @value, @void, @value}, 0x50) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001f80)=r16, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002080)={0x18, 0x20, &(0x7f0000001e40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x43450edd}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r9}}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001f40)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x65, '\x00', 0x0, 0x0, r18, 0x8, &(0x7f0000001fc0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000002000)={0x2, 0xe, 0x1, 0x6}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000002040)=[{0x1, 0x5, 0x9, 0x9}, {0x0, 0x2, 0xa, 0x3}], 0x10, 0xd8000000, @void, @value}, 0x94) 5.358286243s ago: executing program 2 (id=3106): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xf, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10}, [@ldst={0x5}], {0x95, 0x0, 0x5}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open$cgroup(&(0x7f0000000580)={0x0, 0x80, 0xc0, 0x1, 0xd, 0x0, 0x0, 0x1, 0x84000, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x2, @perf_config_ext={0x8}, 0x0, 0x1, 0x1fb1, 0x0, 0x80000001, 0x1, 0x9, 0x0, 0x3, 0x0, 0xf}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x2) r0 = getpid() perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = socket$kcm(0xa, 0x922000000003, 0x11) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x13, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=@framed={{0x62, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0x1a}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x14000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x5, 0x0, 0x20007f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x109801, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x19) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x1470c, 0x9, 0xfffffbff, 0x3, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000400)=[0x0], &(0x7f00000004c0)=[0x0, 0x0], 0x0, 0xc4, &(0x7f0000000840)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0xbe, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x21, &(0x7f0000000640), 0x4) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) close(r6) sendmsg$inet(0xffffffffffffffff, 0x0, 0x34004091) r7 = socket$kcm(0x10, 0x2, 0x0) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r8, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xee, 0x3, 0x9c, 0x0, 0x0, 0x800000000000000, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x1}, 0x10305, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6796}, 0x0, 0xe, r3, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)="2e00000010008188040f46ecdb4cb9cca7480ef421000000e3bd6efb440013030e000a000d000008ba8000001201", 0x2e}], 0x1}, 0x0) 4.772601231s ago: executing program 2 (id=3108): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x80, 0xa4, 0x8c, 0x8, 0x40, 0x0, 0x8000, 0x0, 0x7, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x2, @perf_bp={0x0}, 0x2010, 0x7fffffff, 0x2, 0x8, 0x8000000000000001, 0x1f, 0xbf76, 0x0, 0x38, 0x0, 0xdf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0xb) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b04, &(0x7f0000000040)={'wlan1\x00', @random="0e0000000400"}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc038, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x9, 0x0, 0x3, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d40)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x4000000) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b4000000000000007111360000000000c30a00ff000000009500000000db64132ab9f560aaf7000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x2, 0x922000000001, 0x106) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) 4.399732087s ago: executing program 2 (id=3111): perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x8) perf_event_open(&(0x7f0000000cc0)={0x5, 0x80, 0x7, 0x8, 0x3, 0x4, 0x0, 0x2, 0x80001, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xb, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffe}, 0x1020c0, 0x6, 0x46, 0x7, 0x100000000, 0x4, 0x7, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x7, 0xffffffffffffffff, 0x13) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x11}) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000000540)={0x0, 0xc027, &(0x7f0000000340)=[{&(0x7f00000000c0)="97eb000014006bcd9e", 0xeb98}], 0x1, 0x0, 0x0, 0x1f000000}, 0x600) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x2018, 0x0, 0x0, 0x6, 0x1000, 0x0, 0x9b99, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r4}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000340)={'some', 0x20, 0x9, 0x20, 0x8}, 0x2f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='hrtimer_start\x00', r5}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x8}, 0x8080, 0x2, 0x0, 0x0, 0x7fffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000e300", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xc, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {0x3, 0x3, 0x3, 0xa, 0x5}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x1e}}]}, &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r8, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000780)=[0x0], &(0x7f00000007c0)=[0x0], 0x0, 0x57, &(0x7f0000000800)=[{}, {}], 0x10, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0xcf, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x9, 0x2b, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@ringbuf_query, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x4}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0xf}, @alu={0x7, 0x1, 0x1, 0x9, 0x7, 0x18, 0x10}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x800}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='syzkaller\x00', 0x7fff, 0x52, &(0x7f00000006c0)=""/82, 0x41000, 0x3c, '\x00', r9, @cgroup_sock=0xc, r6, 0x8, &(0x7f0000000980)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000b40)={0x0, 0x9, 0x7ff, 0x80000001}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000000b80)=[r7, 0xffffffffffffffff, r7], &(0x7f0000000bc0)=[{0x1, 0x5, 0xf, 0x5}, {0x1, 0x3, 0xe, 0xa}, {0x0, 0x3, 0x10, 0x1}, {0x1, 0x1, 0x6, 0x4}], 0x10, 0x8, @void, @value}, 0x94) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r10) ioctl$SIOCSIFHWADDR(r10, 0x8b18, &(0x7f0000000000)={'wlan1\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@bloom_filter={0x1e, 0x800, 0x4, 0x3, 0x2000, r1, 0xeb5, '\x00', r9, r10, 0x0, 0x2, 0x1, 0x4, @void, @value, @void, @value}, 0x50) r11 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r11, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c008102e00f80ecdb4cb9f207c804a00d00000088081afb0a0002000a0ada1b40d80800c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) sendmsg$kcm(r11, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)}, {&(0x7f00000003c0)="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", 0xfb}, {&(0x7f00000004c0)="3a2580578d48539db454e70fbf3d02c407a04f7ee4102840ff92dcf62897f7009927d309e3eefc8548abd4aea7d914e6c81bf1889d2225c1f37e", 0x3a}], 0x3, &(0x7f0000000540)=[{0xc8, 0x10e, 0x9, "3edb2c9eb585fbbd6850b1f33dc0dcf3dd2e3c337e9d40e8b91b1d8acb1f9458ac4bf8aed3cfcdc475b8d75a5f821fe30a72a45926cb6b748726e92db7a02ff0cc7a82468b421e56f7e33b18de59c5b21e142a5220fba9e6dfbf599ec9ecc535f23a2131808dc56d6fbd4345e549b9382ab6ca032d480e959f9f588febe0824bd29fe556396b34bcc8be5e34017b22607d3aea6dc45cdeabf054d0817da0660bc067674dd03e9193ccb00b5ee7893871837893cb19678f"}], 0xc8}, 0x80) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000140)) 3.853580704s ago: executing program 2 (id=3115): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1c00, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x3) r0 = socket$kcm(0x2, 0x5, 0x84) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f0000002800)=[{&(0x7f0000000c00)="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", 0x1ec}, {&(0x7f0000001680)="fae0835ee82c20abb86f7c287ffb04a52a0b2339a4efc8216bada6fb7f4385ead471969bdf9b82994c10898db8b0fd9a6068b87f4547eff53d6cb7b37534e44d27c79042f5c405c0ff3eaf643001000000000000008263d71ee0e5b2cb31215ded6df9c76d150aa52a4eecb94fe48e79205c96a0", 0x74}, {&(0x7f00000015c0)="6b75b597d05d969a191023", 0xb}, {&(0x7f0000001740)="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", 0x2fa}], 0x4, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x10}, @multicast1}}}, @ip_retopts={{0x28, 0x0, 0x7, {[@end, @ra={0x94, 0x4}, @ra={0x94, 0x4}, @generic={0x82, 0xd, "3a047e2aae56e4b9eab8f1"}]}}}], 0x48}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x14, &(0x7f0000000000), 0x4) 3.266464133s ago: executing program 1 (id=3121): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x80, 0xa4, 0x8c, 0x8, 0x40, 0x0, 0x8000, 0x0, 0x7, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x2, @perf_bp={0x0}, 0x2010, 0x7fffffff, 0x2, 0x8, 0x8000000000000001, 0x1f, 0xbf76, 0x0, 0x38, 0x0, 0xdf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0xb) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b04, &(0x7f0000000040)={'wlan1\x00', @random="0e0000000400"}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc038, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x9, 0x0, 0x3, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d40)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x4000000) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b4000000000000007111360000000000c30a00ff000000009500000000db64132ab9f560aaf7000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x2, 0x922000000001, 0x106) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) 2.898116428s ago: executing program 3 (id=3123): close(0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80000000, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xe82, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r0}, 0x10) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) openat$cgroup_devices(r4, 0x0, 0x2, 0x0) r5 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r5, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4e20, @remote}, 0x10, 0x0}, 0x3000c085) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)="89000000120081ae08060cdc030000017f03e3f7000000006ee2ffca1b1f0000000504c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c00010005080c00bdad01409bbc7a46e39a8285dcdf12176679df069163ce955fed0009d78f0a947ee2b49e", 0x78}], 0x1}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000500)="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", &(0x7f0000001500)=""/194}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0xd, 0x0, 0x0, 0xb, 0x4}]}}, &(0x7f0000000240)=""/240, 0x26, 0xf0, 0x2, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000010008188e6b62aa73772cc9f1ba1f848480000005e140602000000000e0019000f000000028000001294", 0x2e}], 0x1}, 0x0) 2.870135479s ago: executing program 1 (id=3124): perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x8) perf_event_open(&(0x7f0000000cc0)={0x5, 0x80, 0x7, 0x8, 0x3, 0x4, 0x0, 0x2, 0x80001, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xb, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffe}, 0x1020c0, 0x6, 0x46, 0x7, 0x100000000, 0x4, 0x7, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x7, 0xffffffffffffffff, 0x13) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x11}) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000000540)={0x0, 0xc027, &(0x7f0000000340)=[{&(0x7f00000000c0)="97eb000014006bcd9e", 0xeb98}], 0x1, 0x0, 0x0, 0x1f000000}, 0x600) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x2018, 0x0, 0x0, 0x6, 0x1000, 0x0, 0x9b99, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r4}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000340)={'some', 0x20, 0x9, 0x20, 0x8}, 0x2f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='hrtimer_start\x00', r5}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x8}, 0x8080, 0x2, 0x0, 0x0, 0x7fffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000e300", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xc, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {0x3, 0x3, 0x3, 0xa, 0x5}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x1e}}]}, &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r8, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000780)=[0x0], &(0x7f00000007c0)=[0x0], 0x0, 0x57, &(0x7f0000000800)=[{}, {}], 0x10, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0xcf, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x9, 0x2b, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@ringbuf_query, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x4}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0xf}, @alu={0x7, 0x1, 0x1, 0x9, 0x7, 0x18, 0x10}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x800}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='syzkaller\x00', 0x7fff, 0x52, &(0x7f00000006c0)=""/82, 0x41000, 0x3c, '\x00', r9, @cgroup_sock=0xc, r6, 0x8, &(0x7f0000000980)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000b40)={0x0, 0x9, 0x7ff, 0x80000001}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000000b80)=[r7, 0xffffffffffffffff, r7], &(0x7f0000000bc0)=[{0x1, 0x5, 0xf, 0x5}, {0x1, 0x3, 0xe, 0xa}, {0x0, 0x3, 0x10, 0x1}, {0x1, 0x1, 0x6, 0x4}], 0x10, 0x8, @void, @value}, 0x94) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r10) ioctl$SIOCSIFHWADDR(r10, 0x8b18, &(0x7f0000000000)={'wlan1\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@bloom_filter={0x1e, 0x800, 0x4, 0x3, 0x2000, r1, 0xeb5, '\x00', r9, r10, 0x0, 0x2, 0x1, 0x4, @void, @value, @void, @value}, 0x50) r11 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r11, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c008102e00f80ecdb4cb9f207c804a00d00000088081afb0a0002000a0ada1b40d80800c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) sendmsg$kcm(r11, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)}, {&(0x7f00000003c0)="54be2689d9d251fe6ca7aba0449dceddd23958d628778f1ab9b28c73a747ab652a3d90031c515fadcae997bf7381e29f29ad4b1ed84a6bf3d7286edc09d107a73df1691410044acf43bbd86fbac1b910a9432e5888cc17ec0a9f698523ca0f644845e0d8d7d9d78c453c65a29a0a6b9788b0369d54199042758fbede518699b19be2252b0c3de9d490acffe0393e4a7e671c85e6f1c2feb4bf07d0b2768df0b2a77cef2af32ce7d1eef738335425eb06e9ff440e0c22e7dcadba377954f3eb96aa5ef5da18ed60e1983eb049bbbe1eea242a3f0985608adddeae25b4ae96a886ca4d5c0e3214f19f3ecdbd7a1b41abdfc850bc5b5d4b94656de17d", 0xfb}, {&(0x7f00000004c0)="3a2580578d48539db454e70fbf3d02c407a04f7ee4102840ff92dcf62897f7009927d309e3eefc8548abd4aea7d914e6c81bf1889d2225c1f37e", 0x3a}], 0x3, &(0x7f0000000540)=[{0xc8, 0x10e, 0x9, "3edb2c9eb585fbbd6850b1f33dc0dcf3dd2e3c337e9d40e8b91b1d8acb1f9458ac4bf8aed3cfcdc475b8d75a5f821fe30a72a45926cb6b748726e92db7a02ff0cc7a82468b421e56f7e33b18de59c5b21e142a5220fba9e6dfbf599ec9ecc535f23a2131808dc56d6fbd4345e549b9382ab6ca032d480e959f9f588febe0824bd29fe556396b34bcc8be5e34017b22607d3aea6dc45cdeabf054d0817da0660bc067674dd03e9193ccb00b5ee7893871837893cb19678f"}], 0xc8}, 0x80) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000140)) 2.605574572s ago: executing program 0 (id=3125): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=ANY=[@ANYBLOB="12000000030000000400000002"], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001100)={r2, &(0x7f0000000000), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000006300000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="01000000010000f60b000000020075e943781f", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x1f, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000363255b22e6e1f6dde619f53bfd70e04273528c4d2af0bdd2a42724562e7d47a5eb4f5f90edc49e430414508d96bd6d328d6f25cae09ea2d5f5f6317a4dafadfcdf644c2ca2716d313482718f3f91ef89434cecc73ff76c946213e90"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x19, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1}, &(0x7f0000000040), &(0x7f0000000140)=r0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r0}, 0x20) close(r0) 2.602450332s ago: executing program 4 (id=3126): ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_bp={0x0, 0x1}, 0x494f, 0x7, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x9e0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x2e0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x3f, 0x4f, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f91731dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f62", 0x0, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x10, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) 2.478804334s ago: executing program 4 (id=3127): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1400, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x101000, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffd, 0x1, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x0, 0x29, 0x0, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB], 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000200)={'hsr0\x00'}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xee, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x100}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r2, &(0x7f0000000040), 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(r2, 0x0, 0x100002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5, 0x0, 0x0, @void, @value}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_service_time\x00', 0x100002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x13, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000008000000180100002520732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000f98500000006000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020600000085000000710000009500"/145], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ITER_CREATE(0x21, &(0x7f0000000540)={r3}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0x3, 0x8, &(0x7f00000002c0)="0000ff", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = socket$kcm(0xa, 0x2, 0x3a) setsockopt$sock_attach_bpf(r6, 0x29, 0x21, &(0x7f0000000100), 0x4) sendmsg$kcm(r6, &(0x7f00000004c0)={&(0x7f0000000800)=@in6={0xa, 0xfffe, 0x0, @mcast2, 0x1a}, 0xe0, &(0x7f00000000c0)=[{&(0x7f0000000500)="80005b020eaa4da2", 0x8}], 0x1, 0x0, 0x0, 0x900}, 0x0) recvmsg$kcm(r6, &(0x7f0000000200)={&(0x7f0000000040), 0x80, 0x0}, 0x40000110) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x80) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$kcm(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000010008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d0001", 0x23}], 0x1}, 0x0) 2.335889136s ago: executing program 0 (id=3128): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xf, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10}, [@ldst={0x5}], {0x95, 0x0, 0x5}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r0 = perf_event_open$cgroup(&(0x7f0000000580)={0x0, 0x80, 0xc0, 0x1, 0xd, 0x0, 0x0, 0x1, 0x84000, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x2, @perf_config_ext={0x8}, 0x0, 0x1, 0x1fb1, 0x0, 0x80000001, 0x1, 0x9, 0x0, 0x3, 0x0, 0xf}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x2) r1 = getpid() perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(0x0, r1, 0xaffffff7ffffffff, r0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x13, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=@framed={{0x62, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0x1a}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x14000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x5, 0x0, 0x20007f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x109801, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0), 0x19) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x1470c, 0x9, 0xfffffbff, 0x3, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000400)=[0x0], &(0x7f00000004c0)=[0x0, 0x0], 0x0, 0xc4, &(0x7f0000000840)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0xbe, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x21, &(0x7f0000000640), 0x4) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) close(r6) sendmsg$inet(0xffffffffffffffff, 0x0, 0x34004091) r7 = socket$kcm(0x10, 0x2, 0x0) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r8, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xee, 0x3, 0x9c, 0x0, 0x0, 0x800000000000000, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x1}, 0x10305, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6796}, 0x0, 0xe, r3, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)="2e00000010008188040f46ecdb4cb9cca7480ef421000000e3bd6efb440013030e000a000d000008ba8000001201", 0x2e}], 0x1}, 0x0) 2.334853626s ago: executing program 1 (id=3129): r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000001340)=@hci={0x1f, 0x0, 0x2}, 0x80, &(0x7f0000002540)=[{&(0x7f0000000100)="62032800590500000000042f1eafbcf72be12b30087f5c582d26116642c47a5f8786ee601e65ab3c06d4b8bf4a81cb3e247306af215542f41ddf82f618438a34f90186cee8441e2305e495d04ad68ab8fef69df82de6456fbb48b63f60c9c9097be968ea872c4801e5d0711b4373c7224ed7a9cbd49d40f82bdb6afc0036824be26fc96e49a70e90797e6caa1b38ddacb3cb2b3eac7c068a185b644582f25edfa3d6a46e2a894ca809a422a6a29bd7145bb6e7992570484d6a710292ea0c3f97b7cbff701684b13c5593262534a7af9eab48f2ca2d74d9a4de33", 0x32}, {&(0x7f0000000580)="294f28dfe56d898ba23606bc7ecd1f634665cb5bed07bac5684da6eb21da1d6926910c5a0c653b0105869a804dd2a44ce42557b2e32e2bd367e9d01a5e7380cc4fc8e7c9044cc4115b978ca7427d749beaefdf2e48b369cb169ad7b1ced26bb161297c7e56a3e83e91b379c179017f8b4657d1b22eca6bca33036d33e1a684059c53cea91ca6637ac780ab2bcfc22a666cd4e5876f11e9aee4724b7cb59731c97e70ebd7f7483994eb07de2f3c6a9448c3206cff6d290b433f331c2399e99ee3bdec", 0xc2}, {&(0x7f00000004c0)="0a985d7879f1bbff16c7d66e33657e452299fd0ef8c2afda588eb05891b7da030e01452a7986bea19b59c98dc2996c0ea09604d00ea48336d0c813d83025aca8623a5915ddddce2c11c5e374f2e0f387d2398fe0b899ff60dc7a73addcf253cf32aafbe2b9f90799e7fc583bdd9b564697ba988080270bdceb4714219a2d4c229fffb0d86fb286e3553a8b3ac02badc66ada5fceabe5f63c79da96e641a45901128063d6e1e31b11bcfbc3e70bd3c8c6c0be9f653f977f16", 0xe96}, {&(0x7f0000004040)="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", 0x358}], 0x4}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x40900, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000380)=ANY=[@ANYRES32=r5, @ANYRES32=r4, @ANYBLOB='&\x00\x00'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) close(r2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x7, 0xe, &(0x7f0000002180)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x26, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r6 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r6, &(0x7f0000000040)={0x0, 0xf, &(0x7f0000000080)=[{&(0x7f00000000c0)="0207070002000000e4a17c45c8d260c90ec56959a440278950ff8cdca342f51686908ea4fe07dee035abee82755979fbd7991b71517d20096811c5a663a947eaf378bf56aaccdde0d91d2fa08aba131d91a15f81bfd1e961e534a605e9196747aaf27c0ec3994018ec333b40070beae950827d3efce8a34af6c67c60ee83b76c1132f55a7ccf7843a9a1de5284a60a57f66fa52701bccb915def033b664bc63242c782ecc7", 0x10}], 0x1}, 0x0) 2.194178168s ago: executing program 3 (id=3130): perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x2018, 0x0, 0x0, 0x6, 0x1000, 0x0, 0x9b99, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='hrtimer_start\x00'}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000e300", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000780)=[0x0], &(0x7f00000007c0)=[0x0], 0x0, 0x57, &(0x7f0000000800)=[{}, {}], 0x10, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0xcf, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.time\x00', 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8b18, &(0x7f0000000000)={'wlan1\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c008102e00f80ecdb4cb9f207c804a00d00000088081afb0a0002000a0ada1b40d80800c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)) 2.019952721s ago: executing program 4 (id=3131): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x40900, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0xf, &(0x7f0000000080)=[{&(0x7f00000000c0)="0207070002000000e4a17c45c8d260c90ec56959a440278950ff8cdca342f51686908ea4fe07dee035abee82755979fbd7991b71517d20096811c5a663a947eaf378bf56aaccdde0d91d2fa08aba131d91a15f81bfd1e961e534a605e9196747aaf27c0ec3994018ec333b40070beae950827d3efce8a34af6c67c60ee83b76c1132f55a7ccf7843a9a1de5284a60a57f66fa52701bccb915def033b664bc63242c782ecc7", 0x10}], 0x1}, 0x0) 1.949511772s ago: executing program 0 (id=3132): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xf, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10}, [@ldst={0x5}], {0x95, 0x0, 0x5}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open$cgroup(&(0x7f0000000580)={0x0, 0x80, 0xc0, 0x1, 0xd, 0x0, 0x0, 0x1, 0x84000, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x2, @perf_config_ext={0x8}, 0x0, 0x1, 0x1fb1, 0x0, 0x80000001, 0x1, 0x9, 0x0, 0x3, 0x0, 0xf}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x2) r0 = getpid() perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = socket$kcm(0xa, 0x922000000003, 0x11) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x13, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=@framed={{0x62, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0x1a}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x14000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x5, 0x0, 0x20007f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x109801, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x19) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x1470c, 0x9, 0xfffffbff, 0x3, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000400)=[0x0], &(0x7f00000004c0)=[0x0, 0x0], 0x0, 0xc4, &(0x7f0000000840)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0xbe, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x21, &(0x7f0000000640), 0x4) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) close(r6) sendmsg$inet(0xffffffffffffffff, 0x0, 0x34004091) r7 = socket$kcm(0x10, 0x2, 0x0) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r8, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xee, 0x3, 0x9c, 0x0, 0x0, 0x800000000000000, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x1}, 0x10305, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6796}, 0x0, 0xe, r3, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)="2e00000010008188040f46ecdb4cb9cca7480ef421000000e3bd6efb440013030e000a000d000008ba8000001201", 0x2e}], 0x1}, 0x0) 1.798491214s ago: executing program 3 (id=3133): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x80a543}, 0x18) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x1c4842, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0xfe33) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdb, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffeffe, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYRES16=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r4}, 0x18) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={0x0, r5, 0x0, 0x100}, 0x18) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETOFFLOAD(r2, 0x400454c9, 0xba98575a95aeb70d) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="67309db7f596817f2d3074da863913c2edc420a3c94d683b96fc5cfce74b80b983fbf3aeda4294f6cb5b774aefeaa8d109aa67c40cce13d879e0ad91e6cafd8ec8f238bdc9cfdb71c462f2ede90e270f667d7b451a8a5a6da7d40ed471c0107c73a4", @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="00f7ffffff0002000000000000000000000000000000ad6041", @ANYRES8, @ANYRES64=r0, @ANYBLOB="05b8b3ef3f29d77c7fe0fd40a49878d1ba2036cfcdc97acb84f3d4d96be20931c899fd6560096d2bfa78d98db71b05f19d00"/60, @ANYRESDEC=0x0, @ANYRESHEX=r6, @ANYRES16=r0, @ANYBLOB="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"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000b00), &(0x7f0000000580), 0x7, r7}, 0x38) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x200400, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0x18, &(0x7f00000009c0)=ANY=[@ANYBLOB="180000000000000000000000ffffff7f18110000", @ANYRES32=r9, @ANYRES8=0x0, @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000030000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000c5000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='signal_generate\x00', r10}, 0x18) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) close(r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$cgroup_devices(r0, &(0x7f0000000400)=ANY=[@ANYRES64=r0], 0xffdd) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) 1.561708477s ago: executing program 0 (id=3134): socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r3, 0x0, 0x31) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b703000000000000850000000c00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001e40)={r4, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880), 0x0, 0x0, 0x32, &(0x7f0000000c40)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0x5e, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002500)={r4, 0xe0, &(0x7f0000002400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000002240)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000002280)=[0x0, 0x0, 0x0], &(0x7f00000022c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x28, &(0x7f0000002300)=[{}, {}], 0x10, 0x10, &(0x7f0000002340), &(0x7f0000002380), 0x8, 0xbd, 0x8, 0x8, &(0x7f00000023c0)}}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x4000) r5 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000001c0), 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x2f) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1f, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000006fa2850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x17, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000800)='kfree_skb\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r7}, 0x10) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000e40)=""/4096, 0x1000}], 0x1}, 0x0) 1.530706158s ago: executing program 3 (id=3135): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x80, 0xa4, 0x8c, 0x8, 0x40, 0x0, 0x8000, 0x0, 0x7, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000000, 0x2, @perf_bp={0x0}, 0x2010, 0x7fffffff, 0x2, 0x8, 0x8000000000000001, 0x1f, 0xbf76, 0x0, 0x38, 0x0, 0xdf}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0xb) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b04, &(0x7f0000000040)={'wlan1\x00', @random="0e0000000400"}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc038, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x9, 0x0, 0x3, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d40)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x4000000) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b4000000000000007111360000000000c30a00ff000000009500000000db64132ab9f560aaf7000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x2, 0x922000000001, 0x106) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) 1.3721428s ago: executing program 4 (id=3136): ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_bp={0x0, 0x1}, 0x494f, 0x7, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x9e0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x2e0, 0xfe, 0x0, &(0x7f0000000100)="b9ff03076044238cb89e141808000de0ffff00184000632977fbac14140ce000006a62079f4b4d2f87e505ca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000, 0x3f, 0x4f, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f91731dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f62", 0x0, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x10, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000240)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) 1.270445072s ago: executing program 1 (id=3137): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x18) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0xfe33) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r3}, 0x18) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={0x0, r4, 0x0, 0x100}, 0x18) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETOFFLOAD(r2, 0x400454c9, 0xba98575a95aeb70d) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00f7ffffff0002000000000000000000000000000000ad6041"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000b00), &(0x7f0000000580), 0x7, r5}, 0x38) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_devices(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="1e0308004d6b71ef288563"], 0xffdd) 1.173957553s ago: executing program 3 (id=3138): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x18) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0xfe33) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r3}, 0x18) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={0x0, r4, 0x0, 0x100}, 0x18) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETOFFLOAD(r2, 0x400454c9, 0xba98575a95aeb70d) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00f7ffffff0002000000000000000000000000000000ad6041"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000b00), &(0x7f0000000580), 0x7, r5}, 0x38) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_devices(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="1e0308004d6b71ef288563"], 0xffdd) (fail_nth: 2) 1.144514343s ago: executing program 4 (id=3139): perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r1, 0x107, 0x12, &(0x7f00000000c0)=r0, 0x8) perf_event_open(&(0x7f0000000cc0)={0x5, 0x80, 0x7, 0x8, 0x3, 0x4, 0x0, 0x2, 0x80001, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xb, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffe}, 0x1020c0, 0x6, 0x46, 0x7, 0x100000000, 0x4, 0x7, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x7, 0xffffffffffffffff, 0x13) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x11}) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000000540)={0x0, 0xc027, &(0x7f0000000340)=[{&(0x7f00000000c0)="97eb000014006bcd9e", 0xeb98}], 0x1, 0x0, 0x0, 0x1f000000}, 0x600) r3 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x2018, 0x0, 0x0, 0x6, 0x1000, 0x0, 0x9b99, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r4}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000340)={'some', 0x20, 0x9, 0x20, 0x8}, 0x2f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='hrtimer_start\x00', r5}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x8}, 0x8080, 0x2, 0x0, 0x0, 0x7fffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000e300", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xc, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {0x3, 0x3, 0x3, 0xa, 0x5}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x1e}}]}, &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r8, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000780)=[0x0], &(0x7f00000007c0)=[0x0], 0x0, 0x57, &(0x7f0000000800)=[{}, {}], 0x10, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0xcf, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x9, 0x2b, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@ringbuf_query, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x4}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0xf}, @alu={0x7, 0x1, 0x1, 0x9, 0x7, 0x18, 0x10}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x800}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000680)='syzkaller\x00', 0x7fff, 0x52, &(0x7f00000006c0)=""/82, 0x41000, 0x3c, '\x00', r9, @cgroup_sock=0xc, r6, 0x8, &(0x7f0000000980)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000b40)={0x0, 0x9, 0x7ff, 0x80000001}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000000b80)=[r7, 0xffffffffffffffff, r7], &(0x7f0000000bc0)=[{0x1, 0x5, 0xf, 0x5}, {0x1, 0x3, 0xe, 0xa}, {0x0, 0x3, 0x10, 0x1}, {0x1, 0x1, 0x6, 0x4}], 0x10, 0x8, @void, @value}, 0x94) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r10) ioctl$SIOCSIFHWADDR(r10, 0x8b18, &(0x7f0000000000)={'wlan1\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@bloom_filter={0x1e, 0x800, 0x4, 0x3, 0x2000, r1, 0xeb5, '\x00', r9, r10, 0x0, 0x2, 0x1, 0x4, @void, @value, @void, @value}, 0x50) r11 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r11, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c008102e00f80ecdb4cb9f207c804a00d00000088081afb0a0002000a0ada1b40d80800c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) sendmsg$kcm(r11, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)}, {&(0x7f00000003c0)="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", 0xfb}, {&(0x7f00000004c0)="3a2580578d48539db454e70fbf3d02c407a04f7ee4102840ff92dcf62897f7009927d309e3eefc8548abd4aea7d914e6c81bf1889d2225c1f37e", 0x3a}], 0x3, &(0x7f0000000540)=[{0xc8, 0x10e, 0x9, "3edb2c9eb585fbbd6850b1f33dc0dcf3dd2e3c337e9d40e8b91b1d8acb1f9458ac4bf8aed3cfcdc475b8d75a5f821fe30a72a45926cb6b748726e92db7a02ff0cc7a82468b421e56f7e33b18de59c5b21e142a5220fba9e6dfbf599ec9ecc535f23a2131808dc56d6fbd4345e549b9382ab6ca032d480e959f9f588febe0824bd29fe556396b34bcc8be5e34017b22607d3aea6dc45cdeabf054d0817da0660bc067674dd03e9193ccb00b5ee7893871837893cb19678f"}], 0xc8}, 0x80) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000140)) 533.618242ms ago: executing program 0 (id=3140): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1400, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x101000, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffd, 0x1, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x0, 0x29, 0x0, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB], 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000200)={'hsr0\x00'}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xee, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x100}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(r2, &(0x7f0000000040), 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(r2, 0x0, 0x100002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x5, 0x0, 0x0, @void, @value}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_service_time\x00', 0x100002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x13, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000008000000180100002520732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000f98500000006000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020600000085000000710000009500"/145], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ITER_CREATE(0x21, &(0x7f0000000540)={r3}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0x3, 0x8, &(0x7f00000002c0)="0000ff", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = socket$kcm(0xa, 0x2, 0x3a) setsockopt$sock_attach_bpf(r6, 0x29, 0x21, &(0x7f0000000100), 0x4) sendmsg$kcm(r6, &(0x7f00000004c0)={&(0x7f0000000800)=@in6={0xa, 0xfffe, 0x0, @mcast2, 0x1a}, 0xe0, &(0x7f00000000c0)=[{&(0x7f0000000500)="80005b020eaa4da2", 0x8}], 0x1, 0x0, 0x0, 0x900}, 0x0) recvmsg$kcm(r6, &(0x7f0000000200)={&(0x7f0000000040), 0x80, 0x0}, 0x40000110) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x80) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000000)=r3, 0x4) sendmsg$kcm(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000010008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000100020400bf05", 0x29}], 0x1}, 0x0) 465.984823ms ago: executing program 4 (id=3141): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="1400000037000b0fd25a806c8c6f94f907000000", 0x14}], 0x1, 0x0, 0x0, 0x20000000}, 0x408e0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001f80)=ANY=[@ANYBLOB="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"/2832], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x57, 0x10, &(0x7f0000000000), 0xffffffffffffff4f, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000007c0)="76389e147583ddd0579ba56a5cfd", 0x0, 0x3400, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e80)={0x0, 0x0, 0x0}, 0x40000002) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x2, '\x00', 0x0, r5, 0x0, 0x3, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x1}, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8902, &(0x7f0000000040)) 311.074516ms ago: executing program 1 (id=3142): perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x2018, 0x0, 0x0, 0x6, 0x1000, 0x0, 0x9b99, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='hrtimer_start\x00'}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000e300", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000780)=[0x0], &(0x7f00000007c0)=[0x0], 0x0, 0x57, &(0x7f0000000800)=[{}, {}], 0x10, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0xcf, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.time\x00', 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8b18, &(0x7f0000000000)={'wlan1\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1d}}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c008102e00f80ecdb4cb9f207c804a00d00000088081afb0a0002000a0ada1b40d80800c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)) 2.46404ms ago: executing program 3 (id=3143): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xfffffff9, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, 0x0, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x9}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ca373e663b84139c57827b95ff1327cee623bd0f5a8ca266c465de7bb218d2aa0b3d5527ec7ba9af5ea9737c51cbf7bbfa197c019f2cd6053dd667ce6ccdfe621a5c17781c146b2c45f94fd7cac9b86f4623f34f8a8131214cfd47de57cea0a75ae97cafa2651e987c3b", @ANYRESHEX=0x0], 0xfe33) perf_event_open(0x0, 0x0, 0x200, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xf3, 0x0, 0x72, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0x5}, 0x101214, 0x7, 0x3, 0xf, 0xfffffffffffffffe, 0x2001000a, 0xfffe, 0x0, 0x1, 0x0, 0x34cc}, 0x0, 0x1, 0xffffffffffffffff, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x33) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r2) socket$kcm(0x2, 0x922000000001, 0x106) ioctl$SIOCSIFHWADDR(r2, 0x8b0b, &(0x7f0000000000)={'wlan1\x00', @random='\x00\x00 \x00'}) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000001100)={0x0, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=r3, 0x4) socket$kcm(0x11, 0x200000000000002, 0x300) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b703000000000000850000002f000000b7090000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="180000"], 0xfe33) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x8fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) socketpair(0x1, 0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1, 0x100008, 0x4, 0x8, 0x1, 0xffffffffffffffff, 0x400000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x2, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x28, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000a000000000000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000043718000f0ffffff1801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000018570000020000000000000000000000da5a0000f0ffffff6d821800ffffffff18110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018200000", @ANYRES32=r4, @ANYBLOB="00000000050000009500000000000000bf91000000000000b7020000020000008500000084000000b7000000000000000100000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 417.56µs ago: executing program 0 (id=3144): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xf, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10}, [@ldst={0x5}], {0x95, 0x0, 0x5}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r0 = perf_event_open$cgroup(&(0x7f0000000580)={0x0, 0x80, 0xc0, 0x1, 0xd, 0x0, 0x0, 0x1, 0x84000, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x2, @perf_config_ext={0x8}, 0x0, 0x1, 0x1fb1, 0x0, 0x80000001, 0x1, 0x9, 0x0, 0x3, 0x0, 0xf}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x2) r1 = getpid() perf_event_open(0x0, r1, 0xaffffff7ffffffff, r0, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x13, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=@framed={{0x62, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0x1a}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x14000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x5, 0x0, 0x20007f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x109801, 0x0) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x19) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x1470c, 0x9, 0xfffffbff, 0x3, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000400)=[0x0], &(0x7f00000004c0)=[0x0, 0x0], 0x0, 0xc4, &(0x7f0000000840)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0xbe, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x21, &(0x7f0000000640), 0x4) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) close(r7) sendmsg$inet(0xffffffffffffffff, 0x0, 0x34004091) r8 = socket$kcm(0x10, 0x2, 0x0) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r9, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xee, 0x3, 0x9c, 0x0, 0x0, 0x800000000000000, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x1}, 0x10305, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6796}, 0x0, 0xe, r4, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)="2e00000010008188040f46ecdb4cb9cca7480ef421000000e3bd6efb440013030e000a000d000008ba8000001201", 0x2e}], 0x1}, 0x0) 0s ago: executing program 1 (id=3145): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x17, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000730106000000000095000000000000007a263d0389930521c77e4a502654eb1500ebf9010cbcc76e89061b528104a2cc577b0a6e61cbf24ac20fe62195b6bc00a745b82650be70b49b67ce438c3e6395b764412a22b68bff8f9117001ff9343fb075645fea0187a5d9b59667de17dc1322031072dab45d2826ea8e3186844882a0a146957b570237bafaa606877ce0176796e251824b714a0679ea295e4b00022b05dd0ac43efd8f5a76cddf34c10f8f753958ea263f522ab181095df6df806d1455e39cb8a6dbcb0de49425dd5a9780ccb35331145db88875506974733bfdb31199aa8d9955"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) openat$tun(0xffffffffffffff9c, 0x0, 0x40841, 0x0) socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x180, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x10, 0x400000002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x15, 0xf, &(0x7f0000000200)=@ringbuf={{0x18, 0x7}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x1a}}, {}, [], {{}, {0x5}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x6, 0x5, 0x6, 0x8084, r1, 0xf, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, @value, @void, @void, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r4, 0x18000000000002a0, 0x23, 0x0, &(0x7f0000000240)="d2ff03066003008cb89e08d986ddc8421d7fb2465abe96ddb08bbf6db422e0475ca797", 0x0, 0xd5b4, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$inet(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x80100, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x180, 0xc8, 0x400000, 0x0, 0x0, 0x4, 0x7, 0x0, 0x0, 0x0, 0x20b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd637f4b22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35"], 0xfdef) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) kernel console output (not intermixed with test programs): `syz.1.2416'. [ 386.093690][T11460] bond0: (slave team0): Error: Slave device does not support XDP [ 386.122410][T11460] validate_nla: 3 callbacks suppressed [ 386.122430][T11460] netlink: 'syz.4.2417': attribute type 10 has an invalid length. [ 386.886715][T11478] bond0: (slave team0): Error: Slave device does not support XDP [ 386.915322][T11472] netlink: 'syz.2.2422': attribute type 10 has an invalid length. [ 386.929369][T11477] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2423'. [ 386.951298][T11478] netlink: 'syz.0.2424': attribute type 10 has an invalid length. [ 387.023137][T11479] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 387.071954][T11481] netlink: 'syz.3.2426': attribute type 4 has an invalid length. [ 387.195471][T11483] netlink: 830 bytes leftover after parsing attributes in process `syz.0.2427'. [ 387.297824][T11484] netlink: 129384 bytes leftover after parsing attributes in process `syz.3.2426'. [ 387.395610][T11489] netlink: 'syz.3.2426': attribute type 3 has an invalid length. [ 387.438198][T11489] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.2426'. [ 387.512882][T11491] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 387.823190][T11486] netlink: 830 bytes leftover after parsing attributes in process `syz.2.2428'. [ 388.074333][T11493] bond0: (slave team0): Error: Slave device does not support XDP [ 388.243354][T11496] netlink: 'syz.4.2430': attribute type 10 has an invalid length. [ 388.684599][T11513] netlink: 'syz.0.2438': attribute type 10 has an invalid length. [ 388.692447][T11515] FAULT_INJECTION: forcing a failure. [ 388.692447][T11515] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 388.854483][T11515] CPU: 0 PID: 11515 Comm: syz.4.2436 Not tainted 5.15.182-syzkaller #0 [ 388.862788][T11515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 388.872960][T11515] Call Trace: [ 388.876273][T11515] [ 388.879222][T11515] dump_stack_lvl+0x168/0x230 [ 388.883929][T11515] ? show_regs_print_info+0x20/0x20 [ 388.889152][T11515] ? load_image+0x3b0/0x3b0 [ 388.893691][T11515] ? ___ratelimit+0x1/0x5f0 [ 388.898221][T11515] should_fail+0x38c/0x4c0 [ 388.902671][T11515] _copy_from_user+0x2e/0x170 [ 388.907385][T11515] __copy_msghdr_from_user+0xaf/0x5e0 [ 388.912992][T11515] ? verify_lock_unused+0x140/0x140 [ 388.918226][T11515] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 388.923556][T11515] ? rcu_nmi_exit+0x6f/0xf0 [ 388.928105][T11515] ___sys_sendmsg+0x156/0x260 [ 388.932836][T11515] ? __sys_sendmsg+0x250/0x250 [ 388.937671][T11515] ? __fdget+0x18b/0x210 [ 388.941946][T11515] __se_sys_sendmsg+0x190/0x250 [ 388.946835][T11515] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 388.953104][T11515] ? __x64_sys_sendmsg+0x80/0x80 [ 388.958093][T11515] ? syscall_enter_from_user_mode+0x2a/0x70 [ 388.964018][T11515] do_syscall_64+0x4c/0xa0 [ 388.968461][T11515] ? clear_bhb_loop+0x15/0x70 [ 388.973166][T11515] ? clear_bhb_loop+0x15/0x70 [ 388.977908][T11515] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 388.983809][T11515] RIP: 0033:0x7f4057d45969 [ 388.988225][T11515] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 389.007859][T11515] RSP: 002b:00007f4055bad038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 389.016280][T11515] RAX: ffffffffffffffda RBX: 00007f4057f6cfa0 RCX: 00007f4057d45969 [ 389.024265][T11515] RDX: 0000000000000000 RSI: 0000200000001240 RDI: 0000000000000003 [ 389.032260][T11515] RBP: 00007f4055bad090 R08: 0000000000000000 R09: 0000000000000000 [ 389.040239][T11515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 389.048209][T11515] R13: 0000000000000000 R14: 00007f4057f6cfa0 R15: 00007fffaaef0488 [ 389.056223][T11515] [ 389.883826][T11521] bond0: (slave team0): Error: Slave device does not support XDP [ 389.976390][T11526] netlink: 'syz.3.2440': attribute type 10 has an invalid length. [ 390.637233][T11537] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2454'. [ 390.681372][T11537] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 391.091173][T11548] bond0: (slave team0): Error: Slave device does not support XDP [ 391.253191][T11554] netlink: 'syz.1.2447': attribute type 10 has an invalid length. [ 391.328491][T11552] netlink: 830 bytes leftover after parsing attributes in process `syz.3.2448'. [ 391.762385][T11559] bond0: (slave team0): Error: Slave device does not support XDP [ 391.835542][T11565] netlink: 'syz.2.2452': attribute type 10 has an invalid length. [ 392.077978][T11567] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2456'. [ 392.140253][T11569] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2458'. [ 392.205612][T11569] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 392.262932][T11571] bond0: (slave team0): Error: Slave device does not support XDP [ 392.371812][T11575] netlink: 'syz.2.2457': attribute type 10 has an invalid length. [ 393.515804][T11596] netlink: 830 bytes leftover after parsing attributes in process `syz.4.2466'. [ 394.185304][T11614] netlink: 830 bytes leftover after parsing attributes in process `syz.0.2473'. [ 394.381241][T11619] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2476'. [ 394.450701][T11619] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 394.567276][T11623] netlink: 'syz.2.2477': attribute type 3 has an invalid length. [ 394.671113][T11623] netlink: 105116 bytes leftover after parsing attributes in process `syz.2.2477'. [ 394.932246][T11629] bond0: (slave team0): Error: Slave device does not support XDP [ 395.133325][T11630] netlink: 'syz.3.2479': attribute type 10 has an invalid length. [ 395.575750][T11636] bond0: (slave team0): Error: Slave device does not support XDP [ 395.742224][T11637] netlink: 'syz.4.2482': attribute type 21 has an invalid length. [ 395.804653][T11637] IPv6: NLM_F_CREATE should be specified when creating new route [ 395.909170][T11637] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 395.916561][T11637] IPv6: NLM_F_CREATE should be set when creating new route [ 395.923899][T11637] IPv6: NLM_F_CREATE should be set when creating new route [ 395.931161][T11637] IPv6: NLM_F_CREATE should be set when creating new route [ 396.085061][T11644] netlink: 'syz.1.2481': attribute type 10 has an invalid length. [ 396.128118][T11646] netlink: 830 bytes leftover after parsing attributes in process `syz.2.2483'. [ 397.049853][T11663] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2490'. [ 397.074872][T11660] bond0: (slave team0): Error: Slave device does not support XDP [ 397.197215][T11669] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 397.218006][T11668] netlink: 'syz.3.2493': attribute type 4 has an invalid length. [ 397.286068][T11668] netlink: 129384 bytes leftover after parsing attributes in process `syz.3.2493'. [ 397.304077][T11665] netlink: 'syz.2.2489': attribute type 10 has an invalid length. [ 397.845159][T11680] bond0: (slave team0): Error: Slave device does not support XDP [ 397.894412][T11680] netlink: 'syz.1.2494': attribute type 10 has an invalid length. [ 398.121102][T11692] FAULT_INJECTION: forcing a failure. [ 398.121102][T11692] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 398.201052][T11691] netlink: 830 bytes leftover after parsing attributes in process `syz.3.2499'. [ 398.220673][T11692] CPU: 0 PID: 11692 Comm: syz.0.2497 Not tainted 5.15.182-syzkaller #0 [ 398.228980][T11692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 398.239057][T11692] Call Trace: [ 398.242356][T11692] [ 398.245300][T11692] dump_stack_lvl+0x168/0x230 [ 398.249991][T11692] ? show_regs_print_info+0x20/0x20 [ 398.255200][T11692] ? load_image+0x3b0/0x3b0 [ 398.259706][T11692] ? __lock_acquire+0x7c60/0x7c60 [ 398.264728][T11692] ? vfs_write+0x84d/0xd00 [ 398.269158][T11692] should_fail+0x38c/0x4c0 [ 398.273582][T11692] _copy_from_user+0x2e/0x170 [ 398.278258][T11692] __sys_bpf+0x21b/0x670 [ 398.282501][T11692] ? bpf_link_show_fdinfo+0x310/0x310 [ 398.287880][T11692] ? vtime_user_exit+0x2dc/0x400 [ 398.292830][T11692] __x64_sys_bpf+0x78/0x90 [ 398.297246][T11692] do_syscall_64+0x4c/0xa0 [ 398.301662][T11692] ? clear_bhb_loop+0x15/0x70 [ 398.306338][T11692] ? clear_bhb_loop+0x15/0x70 [ 398.311049][T11692] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 398.316980][T11692] RIP: 0033:0x7fd32cc3c969 [ 398.321409][T11692] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 398.341122][T11692] RSP: 002b:00007fd32aaa4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 398.349554][T11692] RAX: ffffffffffffffda RBX: 00007fd32ce63fa0 RCX: 00007fd32cc3c969 [ 398.357893][T11692] RDX: 0000000000000010 RSI: 0000200000000340 RDI: 000000000000000f [ 398.365871][T11692] RBP: 00007fd32aaa4090 R08: 0000000000000000 R09: 0000000000000000 [ 398.373850][T11692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 398.381825][T11692] R13: 0000000000000000 R14: 00007fd32ce63fa0 R15: 00007ffea2478b88 [ 398.389813][T11692] [ 399.786625][T11717] bond0: (slave team0): Error: Slave device does not support XDP [ 399.853612][T11720] netlink: 830 bytes leftover after parsing attributes in process `syz.1.2516'. [ 399.954191][T11719] netlink: 'syz.3.2506': attribute type 10 has an invalid length. [ 399.989540][T11722] FAULT_INJECTION: forcing a failure. [ 399.989540][T11722] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 400.026712][T11722] CPU: 1 PID: 11722 Comm: syz.2.2508 Not tainted 5.15.182-syzkaller #0 [ 400.035128][T11722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 400.045211][T11722] Call Trace: [ 400.048512][T11722] [ 400.051467][T11722] dump_stack_lvl+0x168/0x230 [ 400.056177][T11722] ? show_regs_print_info+0x20/0x20 [ 400.061409][T11722] ? load_image+0x3b0/0x3b0 [ 400.065943][T11722] ? __lock_acquire+0x7c60/0x7c60 [ 400.071006][T11722] should_fail+0x38c/0x4c0 [ 400.075461][T11722] _copy_from_user+0x2e/0x170 [ 400.080179][T11722] __sys_bpf+0x21b/0x670 [ 400.084456][T11722] ? bpf_link_show_fdinfo+0x310/0x310 [ 400.089883][T11722] ? vtime_user_exit+0x2dc/0x400 [ 400.094857][T11722] __x64_sys_bpf+0x78/0x90 [ 400.099315][T11722] do_syscall_64+0x4c/0xa0 [ 400.103761][T11722] ? clear_bhb_loop+0x15/0x70 [ 400.108469][T11722] ? clear_bhb_loop+0x15/0x70 [ 400.113171][T11722] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 400.119199][T11722] RIP: 0033:0x7ff23b5f0969 [ 400.123650][T11722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 400.143443][T11722] RSP: 002b:00007ff239458038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 400.151992][T11722] RAX: ffffffffffffffda RBX: 00007ff23b817fa0 RCX: 00007ff23b5f0969 [ 400.160086][T11722] RDX: 0000000000000048 RSI: 000020000000e000 RDI: 0000000000000005 [ 400.168069][T11722] RBP: 00007ff239458090 R08: 0000000000000000 R09: 0000000000000000 [ 400.176051][T11722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 400.184027][T11722] R13: 0000000000000000 R14: 00007ff23b817fa0 R15: 00007ffd72444958 [ 400.192054][T11722] [ 400.485118][T11729] bond0: (slave team0): Error: Slave device does not support XDP [ 400.654160][T11727] netlink: 'syz.4.2510': attribute type 2 has an invalid length. [ 400.696377][T11727] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2510'. [ 400.715312][T11732] netlink: 'syz.3.2511': attribute type 3 has an invalid length. [ 400.751294][T11732] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.2511'. [ 400.919219][T11734] bond0: (slave team0): Error: Slave device does not support XDP [ 401.056281][T11739] netlink: 'syz.2.2512': attribute type 10 has an invalid length. [ 401.158192][T11738] netlink: 830 bytes leftover after parsing attributes in process `syz.1.2513'. [ 401.396516][T11753] netlink: 'syz.3.2519': attribute type 4 has an invalid length. [ 401.567744][T11755] netlink: 129384 bytes leftover after parsing attributes in process `syz.3.2519'. [ 401.687553][T11757] netlink: 'syz.2.2520': attribute type 10 has an invalid length. [ 401.741138][T11755] netlink: 'syz.3.2519': attribute type 3 has an invalid length. [ 401.803706][T11755] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.2519'. [ 402.197129][T11776] FAULT_INJECTION: forcing a failure. [ 402.197129][T11776] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 402.294032][T11776] CPU: 0 PID: 11776 Comm: syz.3.2526 Not tainted 5.15.182-syzkaller #0 [ 402.302437][T11776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 402.312526][T11776] Call Trace: [ 402.315842][T11776] [ 402.318801][T11776] dump_stack_lvl+0x168/0x230 [ 402.323523][T11776] ? show_regs_print_info+0x20/0x20 [ 402.328753][T11776] ? load_image+0x3b0/0x3b0 [ 402.333293][T11776] ? __lock_acquire+0x7c60/0x7c60 [ 402.338357][T11776] ? __alloc_skb+0x473/0x750 [ 402.342982][T11776] should_fail+0x38c/0x4c0 [ 402.347434][T11776] _copy_from_iter+0x22a/0x1150 [ 402.352316][T11776] ? __lock_acquire+0x7c60/0x7c60 [ 402.357383][T11776] ? copy_mc_pipe_to_iter+0x7d0/0x7d0 [ 402.362802][T11776] ? __virt_addr_valid+0x3c6/0x470 [ 402.367941][T11776] ? __phys_addr+0xb6/0x170 [ 402.372469][T11776] ? __phys_addr_symbol+0x2b/0x70 [ 402.377521][T11776] ? __check_object_size+0x30c/0x410 [ 402.382848][T11776] skb_copy_datagram_from_iter+0xf2/0x6a0 [ 402.388608][T11776] ? tun_get_user+0xabe/0x38d0 [ 402.393406][T11776] ? skb_put+0x117/0x210 [ 402.397681][T11776] tun_get_user+0x1279/0x38d0 [ 402.402397][T11776] ? tun_ring_recv+0xc30/0xc30 [ 402.407288][T11776] ? rcu_lock_release+0x5/0x20 [ 402.412088][T11776] ? __lock_acquire+0x7c60/0x7c60 [ 402.417162][T11776] tun_chr_write_iter+0x112/0x1e0 [ 402.422215][T11776] vfs_write+0x712/0xd00 [ 402.426492][T11776] ? file_end_write+0x250/0x250 [ 402.431473][T11776] ? __fget_files+0x40f/0x480 [ 402.436201][T11776] ? __fdget_pos+0x1e2/0x370 [ 402.440814][T11776] ? ksys_write+0x71/0x250 [ 402.445266][T11776] ksys_write+0x14d/0x250 [ 402.449637][T11776] ? __ia32_sys_read+0x80/0x80 [ 402.454441][T11776] ? lockdep_hardirqs_on+0x94/0x140 [ 402.459675][T11776] do_syscall_64+0x4c/0xa0 [ 402.464112][T11776] ? clear_bhb_loop+0x15/0x70 [ 402.468811][T11776] ? clear_bhb_loop+0x15/0x70 [ 402.473514][T11776] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 402.479439][T11776] RIP: 0033:0x7fa0f10bd969 [ 402.483890][T11776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 402.503527][T11776] RSP: 002b:00007fa0eef25038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 402.512243][T11776] RAX: ffffffffffffffda RBX: 00007fa0f12e4fa0 RCX: 00007fa0f10bd969 [ 402.520250][T11776] RDX: 000000000000fdef RSI: 0000200000000580 RDI: 00000000000000c8 [ 402.528274][T11776] RBP: 00007fa0eef25090 R08: 0000000000000000 R09: 0000000000000000 [ 402.536374][T11776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 402.544369][T11776] R13: 0000000000000000 R14: 00007fa0f12e4fa0 R15: 00007fff9fc57048 [ 402.552364][T11776] [ 403.290736][T11787] bond0: (slave team0): Error: Slave device does not support XDP [ 403.364019][T11798] netlink: 'syz.1.2528': attribute type 10 has an invalid length. [ 403.525395][T11806] netlink: 'syz.2.2536': attribute type 4 has an invalid length. [ 403.624454][T11804] netlink: 830 bytes leftover after parsing attributes in process `syz.4.2532'. [ 403.719876][T11814] netlink: 129384 bytes leftover after parsing attributes in process `syz.2.2536'. [ 403.909671][T11807] netlink: 'syz.2.2536': attribute type 3 has an invalid length. [ 403.962457][T11807] netlink: 105116 bytes leftover after parsing attributes in process `syz.2.2536'. [ 404.268213][T11822] bond0: (slave team0): Error: Slave device does not support XDP [ 404.328127][T11825] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 404.346462][T11822] netlink: 'syz.3.2539': attribute type 10 has an invalid length. [ 404.539361][T11830] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 404.987492][T11844] bond0: (slave team0): Error: Slave device does not support XDP [ 405.062871][T11846] FAULT_INJECTION: forcing a failure. [ 405.062871][T11846] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 405.101216][T11854] netlink: 'syz.1.2548': attribute type 10 has an invalid length. [ 405.147777][T11846] CPU: 1 PID: 11846 Comm: syz.4.2549 Not tainted 5.15.182-syzkaller #0 [ 405.156077][T11846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 405.166157][T11846] Call Trace: [ 405.169458][T11846] [ 405.172405][T11846] dump_stack_lvl+0x168/0x230 [ 405.177115][T11846] ? show_regs_print_info+0x20/0x20 [ 405.182354][T11846] ? load_image+0x3b0/0x3b0 [ 405.186882][T11846] ? __lock_acquire+0x7c60/0x7c60 [ 405.191927][T11846] ? vfs_write+0x84d/0xd00 [ 405.196369][T11846] should_fail+0x38c/0x4c0 [ 405.200906][T11846] _copy_from_user+0x2e/0x170 [ 405.205612][T11846] __sys_bpf+0x21b/0x670 [ 405.209883][T11846] ? bpf_link_show_fdinfo+0x310/0x310 [ 405.215306][T11846] ? rcu_nmi_exit+0x6f/0xf0 [ 405.219840][T11846] ? vtime_user_exit+0x2dc/0x400 [ 405.224789][T11846] __x64_sys_bpf+0x78/0x90 [ 405.229208][T11846] do_syscall_64+0x4c/0xa0 [ 405.233631][T11846] ? clear_bhb_loop+0x15/0x70 [ 405.238309][T11846] ? clear_bhb_loop+0x15/0x70 [ 405.242985][T11846] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 405.248884][T11846] RIP: 0033:0x7f4057d45969 [ 405.253303][T11846] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 405.272911][T11846] RSP: 002b:00007f4055bad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 405.281328][T11846] RAX: ffffffffffffffda RBX: 00007f4057f6cfa0 RCX: 00007f4057d45969 [ 405.289325][T11846] RDX: 0000000000000010 RSI: 0000200000000340 RDI: 000000000000000f [ 405.297297][T11846] RBP: 00007f4055bad090 R08: 0000000000000000 R09: 0000000000000000 [ 405.305272][T11846] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 405.313254][T11846] R13: 0000000000000000 R14: 00007f4057f6cfa0 R15: 00007fffaaef0488 [ 405.321289][T11846] [ 405.325067][T11853] netlink: 'syz.3.2552': attribute type 4 has an invalid length. [ 405.334206][T11850] netlink: 830 bytes leftover after parsing attributes in process `syz.2.2551'. [ 405.412356][T11853] netlink: 129384 bytes leftover after parsing attributes in process `syz.3.2552'. [ 405.892741][T11875] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 406.354737][T11889] netlink: 10 bytes leftover after parsing attributes in process `syz.4.2559'. [ 406.462880][T11896] netlink: 830 bytes leftover after parsing attributes in process `syz.2.2565'. [ 406.779959][T11899] bond0: (slave team0): Error: Slave device does not support XDP [ 406.867873][T11903] netlink: 'syz.0.2568': attribute type 10 has an invalid length. [ 406.882435][T11905] netlink: 'syz.1.2566': attribute type 10 has an invalid length. [ 406.920667][T11908] netlink: 'syz.3.2569': attribute type 4 has an invalid length. [ 407.091534][T11908] netlink: 129384 bytes leftover after parsing attributes in process `syz.3.2569'. [ 407.377245][T11919] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 407.487815][T11908] netlink: 'syz.3.2569': attribute type 3 has an invalid length. [ 407.532009][T11908] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.2569'. [ 407.953395][T11924] device syzkaller0 entered promiscuous mode [ 408.024725][T11936] netlink: 830 bytes leftover after parsing attributes in process `syz.1.2578'. [ 408.362497][T11946] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 408.456324][T11949] bond0: (slave team0): Error: Slave device does not support XDP [ 408.510341][T11949] netlink: 'syz.2.2582': attribute type 10 has an invalid length. [ 408.844747][T11961] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 409.154052][T11969] netlink: 'syz.0.2591': attribute type 4 has an invalid length. [ 409.383703][T11975] netlink: 129384 bytes leftover after parsing attributes in process `syz.0.2591'. [ 409.404173][T11973] netlink: 830 bytes leftover after parsing attributes in process `syz.3.2592'. [ 409.550563][T11974] netlink: 'syz.0.2591': attribute type 3 has an invalid length. [ 409.569971][T11974] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.2591'. [ 409.749723][T11982] netlink: 830 bytes leftover after parsing attributes in process `syz.1.2604'. [ 409.842714][T11985] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 409.945433][T11989] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2596'. [ 410.071950][T11989] netlink: 'syz.4.2596': attribute type 39 has an invalid length. [ 410.295774][T11991] bond0: (slave team0): Error: Slave device does not support XDP [ 410.337000][T11997] netlink: 'syz.3.2597': attribute type 10 has an invalid length. [ 410.362831][T11996] bond0: (slave team0): Error: Slave device does not support XDP [ 410.454147][T12001] netlink: 'syz.0.2598': attribute type 10 has an invalid length. [ 410.825322][T12013] bond0: (slave team0): Error: Slave device does not support XDP [ 410.879498][T12017] netlink: 'syz.2.2607': attribute type 4 has an invalid length. [ 410.994360][T12012] netlink: 'syz.0.2605': attribute type 10 has an invalid length. [ 411.504509][T12017] netlink: 'syz.2.2607': attribute type 3 has an invalid length. [ 411.747012][T12017] __nla_validate_parse: 3 callbacks suppressed [ 411.747033][T12017] netlink: 105116 bytes leftover after parsing attributes in process `syz.2.2607'. [ 412.076631][T12043] bond0: (slave team0): Error: Slave device does not support XDP [ 412.392263][T12043] netlink: 'syz.0.2613': attribute type 10 has an invalid length. [ 412.448221][T12047] bond0: (slave team0): Error: Slave device does not support XDP [ 412.503263][T12051] FAULT_INJECTION: forcing a failure. [ 412.503263][T12051] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 412.530373][T12051] CPU: 0 PID: 12051 Comm: syz.0.2617 Not tainted 5.15.182-syzkaller #0 [ 412.538671][T12051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 412.548901][T12051] Call Trace: [ 412.552192][T12051] [ 412.555131][T12051] dump_stack_lvl+0x168/0x230 [ 412.559870][T12051] ? show_regs_print_info+0x20/0x20 [ 412.565084][T12051] ? load_image+0x3b0/0x3b0 [ 412.569602][T12051] ? __lock_acquire+0x7c60/0x7c60 [ 412.574653][T12051] should_fail+0x38c/0x4c0 [ 412.579086][T12051] _copy_from_user+0x2e/0x170 [ 412.583812][T12051] bpf_test_init+0x136/0x1b0 [ 412.588522][T12051] bpf_prog_test_run_skb+0x181/0x1180 [ 412.593921][T12051] ? __fget_files+0x40f/0x480 [ 412.598813][T12051] ? cpu_online+0x60/0x60 [ 412.603156][T12051] bpf_prog_test_run+0x31e/0x390 [ 412.608123][T12051] __sys_bpf+0x535/0x670 [ 412.612392][T12051] ? bpf_link_show_fdinfo+0x310/0x310 [ 412.617803][T12051] ? vtime_user_exit+0x2dc/0x400 [ 412.622755][T12051] __x64_sys_bpf+0x78/0x90 [ 412.627179][T12051] do_syscall_64+0x4c/0xa0 [ 412.631597][T12051] ? clear_bhb_loop+0x15/0x70 [ 412.636280][T12051] ? clear_bhb_loop+0x15/0x70 [ 412.640964][T12051] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 412.646895][T12051] RIP: 0033:0x7fd32cc3c969 [ 412.651325][T12051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 412.671213][T12051] RSP: 002b:00007fd32aaa4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 412.679653][T12051] RAX: ffffffffffffffda RBX: 00007fd32ce63fa0 RCX: 00007fd32cc3c969 [ 412.687640][T12051] RDX: 0000000000000050 RSI: 00002000000000c0 RDI: 000000000000000a [ 412.695620][T12051] RBP: 00007fd32aaa4090 R08: 0000000000000000 R09: 0000000000000000 [ 412.703603][T12051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 412.711653][T12051] R13: 0000000000000000 R14: 00007fd32ce63fa0 R15: 00007ffea2478b88 [ 412.719653][T12051] [ 412.974997][T12059] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 414.264125][T12083] validate_nla: 1 callbacks suppressed [ 414.264142][T12083] netlink: 'syz.3.2629': attribute type 4 has an invalid length. [ 414.375084][T12079] bond0: (slave team0): Error: Slave device does not support XDP [ 414.430141][T12086] netlink: 'syz.0.2628': attribute type 10 has an invalid length. [ 414.515116][T12085] netlink: 129384 bytes leftover after parsing attributes in process `syz.3.2629'. [ 414.629220][T12089] netlink: 'syz.3.2629': attribute type 3 has an invalid length. [ 414.658026][T12089] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.2629'. [ 415.003534][T12091] bond0: (slave team0): Error: Slave device does not support XDP [ 415.059192][T12100] netlink: 'syz.4.2634': attribute type 10 has an invalid length. [ 415.446898][T12111] netlink: 'syz.1.2638': attribute type 6 has an invalid length. [ 415.578164][T12113] netlink: 'syz.4.2640': attribute type 27 has an invalid length. [ 415.647436][T12113] netlink: 'syz.4.2640': attribute type 3 has an invalid length. [ 415.719442][T12113] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2640'. [ 415.879256][T12120] bond0: (slave team0): Error: Slave device does not support XDP [ 415.930122][T12120] netlink: 'syz.1.2642': attribute type 10 has an invalid length. [ 416.198264][T12132] FAULT_INJECTION: forcing a failure. [ 416.198264][T12132] name failslab, interval 1, probability 0, space 0, times 0 [ 416.303279][T12132] CPU: 1 PID: 12132 Comm: syz.3.2647 Not tainted 5.15.182-syzkaller #0 [ 416.311592][T12132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 416.321680][T12132] Call Trace: [ 416.324986][T12132] [ 416.327957][T12132] dump_stack_lvl+0x168/0x230 [ 416.332762][T12132] ? show_regs_print_info+0x20/0x20 [ 416.337988][T12132] ? load_image+0x3b0/0x3b0 [ 416.342552][T12132] ? memset+0x1e/0x40 [ 416.346573][T12132] ? memset+0x1e/0x40 [ 416.350600][T12132] should_fail+0x38c/0x4c0 [ 416.355073][T12132] should_failslab+0x5/0x20 [ 416.359609][T12132] slab_pre_alloc_hook+0x51/0xc0 [ 416.364582][T12132] ? __build_skb+0x26/0x2e0 [ 416.369124][T12132] kmem_cache_alloc+0x3d/0x290 [ 416.373928][T12132] __build_skb+0x26/0x2e0 [ 416.378294][T12132] build_skb+0x1e/0x170 [ 416.382483][T12132] bpf_prog_test_run_skb+0x260/0x1180 [ 416.388005][T12132] ? __fget_files+0x40f/0x480 [ 416.392834][T12132] ? cpu_online+0x60/0x60 [ 416.397208][T12132] bpf_prog_test_run+0x31e/0x390 [ 416.402196][T12132] __sys_bpf+0x535/0x670 [ 416.406478][T12132] ? bpf_link_show_fdinfo+0x310/0x310 [ 416.411882][T12132] ? rcu_nmi_exit+0x6f/0xf0 [ 416.416528][T12132] ? vtime_user_exit+0x2dc/0x400 [ 416.421515][T12132] __x64_sys_bpf+0x78/0x90 [ 416.425984][T12132] do_syscall_64+0x4c/0xa0 [ 416.430520][T12132] ? clear_bhb_loop+0x15/0x70 [ 416.435240][T12132] ? clear_bhb_loop+0x15/0x70 [ 416.439956][T12132] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 416.445884][T12132] RIP: 0033:0x7fa0f10bd969 [ 416.450330][T12132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 416.469969][T12132] RSP: 002b:00007fa0eef25038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 416.478420][T12132] RAX: ffffffffffffffda RBX: 00007fa0f12e4fa0 RCX: 00007fa0f10bd969 [ 416.486421][T12132] RDX: 0000000000000028 RSI: 00002000000000c0 RDI: 000000000000000a [ 416.494548][T12132] RBP: 00007fa0eef25090 R08: 0000000000000000 R09: 0000000000000000 [ 416.502549][T12132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 416.510547][T12132] R13: 0000000000000000 R14: 00007fa0f12e4fa0 R15: 00007fff9fc57048 [ 416.518581][T12132] [ 416.566779][T12134] netlink: 'syz.4.2648': attribute type 4 has an invalid length. [ 416.812482][T12137] netlink: 'syz.4.2648': attribute type 3 has an invalid length. [ 416.853233][T12137] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.2648'. [ 417.117578][T12153] device veth1_macvtap left promiscuous mode [ 417.249159][T12156] bond0: (slave team0): Error: Slave device does not support XDP [ 418.012046][T12188] netlink: 129384 bytes leftover after parsing attributes in process `syz.0.2668'. [ 418.678278][T12196] bond0: (slave team0): Error: Slave device does not support XDP [ 418.718892][T12203] device hsr_slave_0 left promiscuous mode [ 418.799097][T12203] device hsr_slave_1 left promiscuous mode [ 419.140581][T12223] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2680'. [ 419.152544][T12225] FAULT_INJECTION: forcing a failure. [ 419.152544][T12225] name failslab, interval 1, probability 0, space 0, times 0 [ 419.167325][T12225] CPU: 1 PID: 12225 Comm: syz.0.2680 Not tainted 5.15.182-syzkaller #0 [ 419.175762][T12225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 419.185961][T12225] Call Trace: [ 419.189276][T12225] [ 419.192217][T12225] dump_stack_lvl+0x168/0x230 [ 419.196910][T12225] ? show_regs_print_info+0x20/0x20 [ 419.202114][T12225] ? load_image+0x3b0/0x3b0 [ 419.206645][T12225] should_fail+0x38c/0x4c0 [ 419.211079][T12225] should_failslab+0x5/0x20 [ 419.215671][T12225] slab_pre_alloc_hook+0x51/0xc0 [ 419.220630][T12225] ? skb_clone+0x1bd/0x350 [ 419.225060][T12225] kmem_cache_alloc+0x3d/0x290 [ 419.229855][T12225] skb_clone+0x1bd/0x350 [ 419.234122][T12225] __netlink_deliver_tap+0x3cd/0x7c0 [ 419.239419][T12225] netlink_deliver_tap+0x16c/0x180 [ 419.244547][T12225] netlink_unicast+0x757/0x920 [ 419.249322][T12225] netlink_sendmsg+0x8ab/0xbc0 [ 419.254093][T12225] ? netlink_getsockopt+0x560/0x560 [ 419.259296][T12225] ? aa_sock_msg_perm+0x94/0x150 [ 419.264247][T12225] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 419.269540][T12225] ? security_socket_sendmsg+0x7c/0xa0 [ 419.275008][T12225] ? netlink_getsockopt+0x560/0x560 [ 419.280240][T12225] ____sys_sendmsg+0x5a2/0x8c0 [ 419.285033][T12225] ? memset+0x1e/0x40 [ 419.289105][T12225] ? __sys_sendmsg_sock+0x30/0x30 [ 419.294169][T12225] ? import_iovec+0x6f/0xa0 [ 419.298696][T12225] ___sys_sendmsg+0x1f0/0x260 [ 419.303386][T12225] ? __sys_sendmsg+0x250/0x250 [ 419.308163][T12225] ? vfs_write+0x84d/0xd00 [ 419.312592][T12225] ? __fdget+0x18b/0x210 [ 419.316840][T12225] __se_sys_sendmsg+0x190/0x250 [ 419.321721][T12225] ? __x64_sys_sendmsg+0x80/0x80 [ 419.326696][T12225] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 419.332721][T12225] ? lockdep_hardirqs_on+0x94/0x140 [ 419.338020][T12225] do_syscall_64+0x4c/0xa0 [ 419.342441][T12225] ? clear_bhb_loop+0x15/0x70 [ 419.347120][T12225] ? clear_bhb_loop+0x15/0x70 [ 419.351799][T12225] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 419.357697][T12225] RIP: 0033:0x7fd32cc3c969 [ 419.362148][T12225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 419.381869][T12225] RSP: 002b:00007fd32aa83038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 419.390378][T12225] RAX: ffffffffffffffda RBX: 00007fd32ce64080 RCX: 00007fd32cc3c969 [ 419.398574][T12225] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000007 [ 419.406691][T12225] RBP: 00007fd32aa83090 R08: 0000000000000000 R09: 0000000000000000 [ 419.414699][T12225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 419.422681][T12225] R13: 0000000000000000 R14: 00007fd32ce64080 R15: 00007ffea2478b88 [ 419.430687][T12225] [ 419.436246][T12225] validate_nla: 8 callbacks suppressed [ 419.436261][T12225] netlink: 'syz.0.2680': attribute type 39 has an invalid length. [ 420.479446][T12249] FAULT_INJECTION: forcing a failure. [ 420.479446][T12249] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 420.506223][T12250] netlink: 'syz.0.2688': attribute type 4 has an invalid length. [ 420.543762][T12249] CPU: 0 PID: 12249 Comm: syz.4.2687 Not tainted 5.15.182-syzkaller #0 [ 420.552065][T12249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 420.562156][T12249] Call Trace: [ 420.565471][T12249] [ 420.568424][T12249] dump_stack_lvl+0x168/0x230 [ 420.573141][T12249] ? show_regs_print_info+0x20/0x20 [ 420.578386][T12249] ? load_image+0x3b0/0x3b0 [ 420.582950][T12249] ? __lock_acquire+0x7c60/0x7c60 [ 420.588241][T12249] ? perf_trace_run_bpf_submit+0x1c0/0x1c0 [ 420.594130][T12249] should_fail+0x38c/0x4c0 [ 420.598845][T12249] _copy_from_user+0x2e/0x170 [ 420.603648][T12249] __copy_msghdr_from_user+0xaf/0x5e0 [ 420.609084][T12249] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 420.614929][T12249] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 420.620249][T12249] ? trace_event_raw_event_lock+0x250/0x250 [ 420.626168][T12249] ___sys_sendmsg+0x156/0x260 [ 420.630901][T12249] ? __sys_sendmsg+0x250/0x250 [ 420.635811][T12249] ? trace_event_raw_event_lock+0x250/0x250 [ 420.642048][T12249] ? vfs_write+0x84d/0xd00 [ 420.646526][T12249] ? __fdget+0x18b/0x210 [ 420.650828][T12249] __se_sys_sendmsg+0x190/0x250 [ 420.655923][T12249] ? __x64_sys_sendmsg+0x80/0x80 [ 420.660873][T12249] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 420.666905][T12249] ? lockdep_hardirqs_on+0x94/0x140 [ 420.672148][T12249] do_syscall_64+0x4c/0xa0 [ 420.676581][T12249] ? clear_bhb_loop+0x15/0x70 [ 420.681567][T12249] ? clear_bhb_loop+0x15/0x70 [ 420.686472][T12249] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 420.692487][T12249] RIP: 0033:0x7f4057d45969 [ 420.696924][T12249] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 420.717313][T12249] RSP: 002b:00007f4055bad038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 420.725875][T12249] RAX: ffffffffffffffda RBX: 00007f4057f6cfa0 RCX: 00007f4057d45969 [ 420.733868][T12249] RDX: 0000000000000600 RSI: 0000200000000540 RDI: 0000000000000004 [ 420.742017][T12249] RBP: 00007f4055bad090 R08: 0000000000000000 R09: 0000000000000000 [ 420.750004][T12249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 420.758001][T12249] R13: 0000000000000000 R14: 00007f4057f6cfa0 R15: 00007fffaaef0488 [ 420.766031][T12249] [ 420.836667][T12254] netlink: 129384 bytes leftover after parsing attributes in process `syz.0.2688'. [ 420.981554][T12257] netlink: 'syz.0.2688': attribute type 3 has an invalid length. [ 421.014089][T12260] device wlan0 left promiscuous mode [ 421.026813][T12257] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.2688'. [ 421.059721][T12260] device wlan0 entered promiscuous mode [ 421.225308][T12270] netlink: 'syz.1.2696': attribute type 29 has an invalid length. [ 421.378060][T12270] netlink: 'syz.1.2696': attribute type 29 has an invalid length. [ 421.466798][T12277] netlink: 'syz.3.2697': attribute type 21 has an invalid length. [ 421.493648][T12277] IPv6: NLM_F_CREATE should be specified when creating new route [ 421.502022][T12277] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 421.509513][T12277] IPv6: NLM_F_CREATE should be set when creating new route [ 421.517384][T12277] IPv6: NLM_F_CREATE should be set when creating new route [ 421.525058][T12277] IPv6: NLM_F_CREATE should be set when creating new route [ 421.543198][T12274] netlink: 'syz.1.2696': attribute type 29 has an invalid length. [ 421.549750][T12280] netlink: 'syz.3.2697': attribute type 29 has an invalid length. [ 421.592180][T12280] netlink: 'syz.3.2697': attribute type 29 has an invalid length. [ 421.761418][T12292] netlink: 'syz.0.2702': attribute type 6 has an invalid length. [ 422.459542][T12314] netlink: 129384 bytes leftover after parsing attributes in process `syz.3.2708'. [ 422.719984][T12322] netlink: 129384 bytes leftover after parsing attributes in process `syz.1.2709'. [ 422.875545][T12324] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.2709'. [ 423.006029][T12336] bond0: (slave team0): Error: Slave device does not support XDP [ 423.170054][T12341] FAULT_INJECTION: forcing a failure. [ 423.170054][T12341] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 423.202466][T12341] CPU: 1 PID: 12341 Comm: syz.4.2715 Not tainted 5.15.182-syzkaller #0 [ 423.210762][T12341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 423.220826][T12341] Call Trace: [ 423.224105][T12341] [ 423.227034][T12341] dump_stack_lvl+0x168/0x230 [ 423.231716][T12341] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 423.237868][T12341] ? show_regs_print_info+0x20/0x20 [ 423.243073][T12341] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 423.249245][T12341] should_fail+0x38c/0x4c0 [ 423.253668][T12341] _copy_from_user+0x2e/0x170 [ 423.258354][T12341] bpf_test_init+0x136/0x1b0 [ 423.262955][T12341] bpf_prog_test_run_skb+0x181/0x1180 [ 423.268335][T12341] ? __fget_files+0x40f/0x480 [ 423.273022][T12341] ? cpu_online+0x60/0x60 [ 423.277354][T12341] bpf_prog_test_run+0x31e/0x390 [ 423.282300][T12341] __sys_bpf+0x535/0x670 [ 423.286551][T12341] ? bpf_link_show_fdinfo+0x310/0x310 [ 423.291940][T12341] __x64_sys_bpf+0x78/0x90 [ 423.296363][T12341] do_syscall_64+0x4c/0xa0 [ 423.300782][T12341] ? clear_bhb_loop+0x15/0x70 [ 423.305475][T12341] ? clear_bhb_loop+0x15/0x70 [ 423.310153][T12341] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 423.316050][T12341] RIP: 0033:0x7f4057d45969 [ 423.320471][T12341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 423.340164][T12341] RSP: 002b:00007f4055bad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 423.348580][T12341] RAX: ffffffffffffffda RBX: 00007f4057f6cfa0 RCX: 00007f4057d45969 [ 423.356552][T12341] RDX: 0000000000000050 RSI: 00002000000000c0 RDI: 000000000000000a [ 423.364534][T12341] RBP: 00007f4055bad090 R08: 0000000000000000 R09: 0000000000000000 [ 423.372506][T12341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 423.380477][T12341] R13: 0000000000000000 R14: 00007f4057f6cfa0 R15: 00007fffaaef0488 [ 423.388461][T12341] [ 423.627263][T12350] bond0: (slave team0): Error: Slave device does not support XDP [ 423.701688][T12352] netlink: 830 bytes leftover after parsing attributes in process `syz.1.2721'. [ 423.938412][T12364] netlink: 129384 bytes leftover after parsing attributes in process `syz.2.2722'. [ 424.111666][T12370] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 424.157953][T12364] netlink: 105116 bytes leftover after parsing attributes in process `syz.2.2722'. [ 424.521055][T12386] validate_nla: 9 callbacks suppressed [ 424.521092][T12386] netlink: 'syz.0.2731': attribute type 10 has an invalid length. [ 424.641072][T12383] netlink: 129384 bytes leftover after parsing attributes in process `syz.2.2730'. [ 424.918847][T12394] bond0: (slave team0): Error: Slave device does not support XDP [ 424.987399][T12394] netlink: 'syz.4.2734': attribute type 10 has an invalid length. [ 425.100670][T12403] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2736'. [ 425.156453][T12403] netlink: 'syz.0.2736': attribute type 39 has an invalid length. [ 425.244268][T12402] netlink: 830 bytes leftover after parsing attributes in process `syz.2.2737'. [ 425.622759][T12415] netlink: 'syz.2.2741': attribute type 4 has an invalid length. [ 425.774981][T12421] netlink: 129384 bytes leftover after parsing attributes in process `syz.2.2741'. [ 425.811766][T12423] netlink: 'syz.4.2745': attribute type 10 has an invalid length. [ 426.329741][T12442] bond0: (slave team0): Error: Slave device does not support XDP [ 429.080655][T12447] netlink: 'syz.3.2749': attribute type 10 has an invalid length. [ 429.293134][T12464] netlink: 'syz.4.2759': attribute type 6 has an invalid length. [ 429.320936][T12462] netlink: 'syz.0.2757': attribute type 29 has an invalid length. [ 429.480877][T12462] netlink: 'syz.0.2757': attribute type 29 has an invalid length. [ 429.524158][T12470] __nla_validate_parse: 1 callbacks suppressed [ 429.524175][T12470] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2757'. [ 429.574094][T12475] netlink: 'syz.4.2762': attribute type 4 has an invalid length. [ 429.576156][T12476] netlink: 147724 bytes leftover after parsing attributes in process `syz.2.2761'. [ 429.598315][T12469] netlink: 'syz.0.2757': attribute type 29 has an invalid length. [ 429.732680][T12479] netlink: 129384 bytes leftover after parsing attributes in process `syz.4.2762'. [ 429.843876][T12482] netlink: 'syz.4.2762': attribute type 3 has an invalid length. [ 429.853572][T12482] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.2762'. [ 429.905013][T12488] netlink: 'syz.0.2765': attribute type 10 has an invalid length. [ 430.138581][T12489] bond0: (slave team0): Error: Slave device does not support XDP [ 430.176906][T12489] netlink: 'syz.1.2766': attribute type 10 has an invalid length. [ 430.351558][T12497] netlink: 830 bytes leftover after parsing attributes in process `syz.0.2768'. [ 430.472735][T12507] netlink: 'syz.4.2772': attribute type 6 has an invalid length. [ 430.520875][T12500] bond0: (slave team0): Error: Slave device does not support XDP [ 430.628858][T12508] netlink: 'syz.2.2769': attribute type 10 has an invalid length. [ 430.990725][T12518] netlink: 'syz.2.2776': attribute type 29 has an invalid length. [ 431.016218][T12519] netlink: 830 bytes leftover after parsing attributes in process `syz.0.2786'. [ 431.043757][T12518] netlink: 'syz.2.2776': attribute type 29 has an invalid length. [ 431.101338][T12520] netlink: 'syz.2.2776': attribute type 29 has an invalid length. [ 431.185610][T12524] bond0: (slave team0): Error: Slave device does not support XDP [ 431.286359][T12518] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2776'. [ 431.354763][T12527] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 431.381869][T12527] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 431.450830][T12527] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 431.467918][T12527] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 432.606541][T12558] netlink: 830 bytes leftover after parsing attributes in process `syz.4.2790'. [ 432.831227][T12566] bond0: (slave team0): Error: Slave device does not support XDP [ 432.972717][T12576] FAULT_INJECTION: forcing a failure. [ 432.972717][T12576] name failslab, interval 1, probability 0, space 0, times 0 [ 433.005623][T12576] CPU: 0 PID: 12576 Comm: syz.3.2798 Not tainted 5.15.182-syzkaller #0 [ 433.014008][T12576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 433.024087][T12576] Call Trace: [ 433.027388][T12576] [ 433.030337][T12576] dump_stack_lvl+0x168/0x230 [ 433.035053][T12576] ? show_regs_print_info+0x20/0x20 [ 433.040282][T12576] ? load_image+0x3b0/0x3b0 [ 433.044835][T12576] ? __might_sleep+0xf0/0xf0 [ 433.049471][T12576] ? __lock_acquire+0x7c60/0x7c60 [ 433.054538][T12576] should_fail+0x38c/0x4c0 [ 433.059037][T12576] should_failslab+0x5/0x20 [ 433.063668][T12576] slab_pre_alloc_hook+0x51/0xc0 [ 433.068643][T12576] ? proc_invalidate_siblings_dcache+0x650/0x650 [ 433.075001][T12576] ? proc_alloc_inode+0x19/0xa0 [ 433.079874][T12576] kmem_cache_alloc+0x3d/0x290 [ 433.084656][T12576] ? proc_invalidate_siblings_dcache+0x650/0x650 [ 433.091011][T12576] proc_alloc_inode+0x19/0xa0 [ 433.095717][T12576] ? proc_invalidate_siblings_dcache+0x650/0x650 [ 433.102077][T12576] new_inode_pseudo+0x5f/0x210 [ 433.106870][T12576] new_inode+0x25/0x1c0 [ 433.111053][T12576] proc_sys_make_inode+0x50/0x580 [ 433.116108][T12576] proc_sys_lookup+0x4d5/0x610 [ 433.120901][T12576] __lookup_slow+0x27d/0x3d0 [ 433.125511][T12576] ? lookup_one_len+0x2c0/0x2c0 [ 433.130458][T12576] ? preempt_count_add+0x8d/0x190 [ 433.135518][T12576] ? down_read+0x1aa/0x2e0 [ 433.139962][T12576] lookup_slow+0x53/0x70 [ 433.144223][T12576] walk_component+0x319/0x460 [ 433.148921][T12576] link_path_walk+0x662/0xd40 [ 433.153642][T12576] ? handle_lookup_down+0x130/0x130 [ 433.158870][T12576] path_lookupat+0x9d/0x440 [ 433.163425][T12576] filename_lookup+0x1e2/0x4f0 [ 433.168215][T12576] ? hashlen_string+0x110/0x110 [ 433.173104][T12576] ? strncpy_from_user+0x1fb/0x360 [ 433.178245][T12576] ? getname_flags+0x1fe/0x500 [ 433.183040][T12576] user_path_at_empty+0x40/0x190 [ 433.188004][T12576] bpf_obj_get_user+0xb6/0x480 [ 433.192807][T12576] ? bpf_obj_pin_user+0x2f0/0x2f0 [ 433.197884][T12576] __sys_bpf+0x43c/0x670 [ 433.202161][T12576] ? bpf_link_show_fdinfo+0x310/0x310 [ 433.207574][T12576] ? vtime_user_exit+0x2dc/0x400 [ 433.212547][T12576] __x64_sys_bpf+0x78/0x90 [ 433.216982][T12576] do_syscall_64+0x4c/0xa0 [ 433.221414][T12576] ? clear_bhb_loop+0x15/0x70 [ 433.226112][T12576] ? clear_bhb_loop+0x15/0x70 [ 433.230801][T12576] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 433.236717][T12576] RIP: 0033:0x7fa0f10bd969 [ 433.241139][T12576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 433.260755][T12576] RSP: 002b:00007fa0eef25038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 433.269193][T12576] RAX: ffffffffffffffda RBX: 00007fa0f12e4fa0 RCX: 00007fa0f10bd969 [ 433.277280][T12576] RDX: 0000000000000010 RSI: 0000200000000180 RDI: 0000000000000007 [ 433.285258][T12576] RBP: 00007fa0eef25090 R08: 0000000000000000 R09: 0000000000000000 [ 433.293225][T12576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 433.301194][T12576] R13: 0000000000000000 R14: 00007fa0f12e4fa0 R15: 00007fff9fc57048 [ 433.309178][T12576] [ 433.841172][T12595] bond0: (slave team0): Error: Slave device does not support XDP [ 433.910172][T12597] netlink: 830 bytes leftover after parsing attributes in process `syz.3.2806'. [ 434.177028][T12609] netlink: 399 bytes leftover after parsing attributes in process `syz.4.2810'. [ 434.738808][T12628] bond0: (slave team0): Error: Slave device does not support XDP [ 434.812839][T12628] validate_nla: 10 callbacks suppressed [ 434.812897][T12628] netlink: 'syz.4.2817': attribute type 10 has an invalid length. [ 434.877262][T12637] netlink: 'syz.2.2821': attribute type 10 has an invalid length. [ 435.011872][T12643] netlink: 'syz.2.2823': attribute type 6 has an invalid length. [ 435.508120][T12650] FAULT_INJECTION: forcing a failure. [ 435.508120][T12650] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 435.583631][T12650] CPU: 0 PID: 12650 Comm: syz.3.2826 Not tainted 5.15.182-syzkaller #0 [ 435.591926][T12650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 435.602004][T12650] Call Trace: [ 435.605299][T12650] [ 435.608240][T12650] dump_stack_lvl+0x168/0x230 [ 435.612935][T12650] ? show_regs_print_info+0x20/0x20 [ 435.618148][T12650] ? load_image+0x3b0/0x3b0 [ 435.622673][T12650] ? __lock_acquire+0x7c60/0x7c60 [ 435.627725][T12650] ? __alloc_skb+0x473/0x750 [ 435.632351][T12650] should_fail+0x38c/0x4c0 [ 435.636809][T12650] _copy_from_iter+0x22a/0x1150 [ 435.641695][T12650] ? __lock_acquire+0x7c60/0x7c60 [ 435.646757][T12650] ? copy_mc_pipe_to_iter+0x7d0/0x7d0 [ 435.652262][T12650] ? __virt_addr_valid+0x3c6/0x470 [ 435.657384][T12650] ? __phys_addr+0xb6/0x170 [ 435.661928][T12650] ? __phys_addr_symbol+0x2b/0x70 [ 435.666968][T12650] ? __check_object_size+0x30c/0x410 [ 435.672267][T12650] skb_copy_datagram_from_iter+0xf2/0x6a0 [ 435.678007][T12650] ? skb_put+0x117/0x210 [ 435.682274][T12650] tun_get_user+0x1279/0x38d0 [ 435.686972][T12650] ? tun_ring_recv+0xc30/0xc30 [ 435.691763][T12650] ? rcu_lock_release+0x5/0x20 [ 435.696536][T12650] ? __lock_acquire+0x7c60/0x7c60 [ 435.701592][T12650] tun_chr_write_iter+0x112/0x1e0 [ 435.706786][T12650] vfs_write+0x712/0xd00 [ 435.711083][T12650] ? file_end_write+0x250/0x250 [ 435.715949][T12650] ? __fget_files+0x40f/0x480 [ 435.720651][T12650] ? __fdget_pos+0x1e2/0x370 [ 435.725237][T12650] ? ksys_write+0x71/0x250 [ 435.729654][T12650] ksys_write+0x14d/0x250 [ 435.733987][T12650] ? __ia32_sys_read+0x80/0x80 [ 435.738773][T12650] ? lockdep_hardirqs_on+0x94/0x140 [ 435.744088][T12650] do_syscall_64+0x4c/0xa0 [ 435.748526][T12650] ? clear_bhb_loop+0x15/0x70 [ 435.753222][T12650] ? clear_bhb_loop+0x15/0x70 [ 435.757915][T12650] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 435.763917][T12650] RIP: 0033:0x7fa0f10bd969 [ 435.768451][T12650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 435.788085][T12650] RSP: 002b:00007fa0eef25038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 435.796535][T12650] RAX: ffffffffffffffda RBX: 00007fa0f12e4fa0 RCX: 00007fa0f10bd969 [ 435.804540][T12650] RDX: 000000000000fdef RSI: 0000200000000300 RDI: 00000000000000c8 [ 435.812535][T12650] RBP: 00007fa0eef25090 R08: 0000000000000000 R09: 0000000000000000 [ 435.820528][T12650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 435.828526][T12650] R13: 0000000000000000 R14: 00007fa0f12e4fa0 R15: 00007fff9fc57048 [ 435.836537][T12650] [ 435.858073][T12671] netlink: 'syz.1.2834': attribute type 10 has an invalid length. [ 436.713638][T12701] __nla_validate_parse: 1 callbacks suppressed [ 436.713659][T12701] netlink: 830 bytes leftover after parsing attributes in process `syz.2.2848'. [ 436.921712][T12705] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 436.941714][T12705] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 437.018366][T12705] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 437.119854][T12705] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 437.574387][T12710] bond0: (slave team0): Error: Slave device does not support XDP [ 437.597411][T12714] netlink: 'syz.4.2851': attribute type 10 has an invalid length. [ 437.645343][T12713] netlink: 830 bytes leftover after parsing attributes in process `syz.1.2853'. [ 438.495251][T12746] bond0: (slave team0): Error: Slave device does not support XDP [ 438.552604][T12747] netlink: 830 bytes leftover after parsing attributes in process `syz.2.2864'. [ 438.577665][T12746] netlink: 'syz.1.2865': attribute type 10 has an invalid length. [ 438.595319][T12719] chnl_net:caif_netlink_parms(): no params data found [ 438.844184][ T5746] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 438.865067][T12719] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.872306][T12719] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.888809][T12719] device bridge_slave_0 entered promiscuous mode [ 438.954662][ T5746] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 438.982364][T12719] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.993324][T12719] bridge0: port 2(bridge_slave_1) entered disabled state [ 439.035655][T12719] device bridge_slave_1 entered promiscuous mode [ 439.051933][T12761] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 439.082281][T12761] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 439.190434][T12761] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 439.220803][T12761] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 439.593673][ T21] Bluetooth: hci5: command 0x0409 tx timeout [ 439.803472][T12770] device wlan0 left promiscuous mode [ 439.995993][ T1421] ieee802154 phy0 wpan0: encryption failed: -22 [ 440.002354][ T1421] ieee802154 phy1 wpan1: encryption failed: -22 [ 440.024699][ T5746] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 440.078672][T12719] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 440.091827][T12719] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 440.123154][T12782] bond0: (slave team0): Error: Slave device does not support XDP [ 440.195181][T12783] netlink: 'syz.0.2878': attribute type 10 has an invalid length. [ 440.223962][T12719] team0: Port device team_slave_0 added [ 440.230181][T12785] netlink: 830 bytes leftover after parsing attributes in process `syz.1.2879'. [ 440.257049][ T5746] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 440.287665][T12719] team0: Port device team_slave_1 added [ 440.422889][T12719] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 440.470473][T12719] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 440.538231][T12719] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 440.551753][T12719] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 440.600057][T12719] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 440.657558][T12719] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 440.738153][T12805] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 440.760944][T12805] device syzkaller0 entered promiscuous mode [ 440.776046][T12802] netlink: 'syz.1.2887': attribute type 10 has an invalid length. [ 440.862360][T12807] netlink: 'syz.0.2889': attribute type 21 has an invalid length. [ 440.870695][T12807] netlink: 'syz.0.2889': attribute type 6 has an invalid length. [ 440.879256][T12807] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2889'. [ 440.902943][T12719] device hsr_slave_0 entered promiscuous mode [ 440.909920][T12719] device hsr_slave_1 entered promiscuous mode [ 440.918950][T12719] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 440.926614][T12719] Cannot create hsr debugfs directory [ 441.405303][T12817] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 441.427878][T12817] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 441.461172][T12817] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 441.481871][T12817] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 441.678568][ T2195] Bluetooth: hci5: command 0x041b tx timeout [ 441.865383][T12827] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2892'. [ 441.900440][T12828] bond0: (slave team0): Error: Slave device does not support XDP [ 441.931500][T12833] netlink: 'syz.4.2894': attribute type 10 has an invalid length. [ 442.372696][T12852] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2900'. [ 442.846248][T12862] device syzkaller0 entered promiscuous mode [ 443.189626][T12881] bond0: (slave team0): Error: Slave device does not support XDP [ 443.223015][T12887] netlink: 'syz.4.2906': attribute type 10 has an invalid length. [ 443.335227][T12884] FAULT_INJECTION: forcing a failure. [ 443.335227][T12884] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 443.350456][T12884] CPU: 0 PID: 12884 Comm: syz.0.2907 Not tainted 5.15.182-syzkaller #0 [ 443.358744][T12884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 443.369000][T12884] Call Trace: [ 443.372367][T12884] [ 443.375299][T12884] dump_stack_lvl+0x168/0x230 [ 443.380008][T12884] ? show_regs_print_info+0x20/0x20 [ 443.385271][T12884] ? load_image+0x3b0/0x3b0 [ 443.389805][T12884] ? __lock_acquire+0x7c60/0x7c60 [ 443.394859][T12884] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 443.400963][T12884] should_fail+0x38c/0x4c0 [ 443.405396][T12884] prepare_alloc_pages+0x1e4/0x5f0 [ 443.410522][T12884] __alloc_pages+0x10e/0x470 [ 443.415120][T12884] ? zone_statistics+0x170/0x170 [ 443.420077][T12884] ? __phys_addr+0xb6/0x170 [ 443.424588][T12884] ? alloc_pages+0x438/0x550 [ 443.429275][T12884] alloc_skb_with_frags+0x215/0x730 [ 443.434482][T12884] sock_alloc_send_pskb+0x853/0x980 [ 443.439685][T12884] ? __might_fault+0xb3/0x110 [ 443.444372][T12884] ? sock_kzfree_s+0x50/0x50 [ 443.449052][T12884] ? iov_iter_advance+0x202/0x390 [ 443.454089][T12884] tun_get_user+0x856/0x38d0 [ 443.458693][T12884] ? tun_ring_recv+0xc30/0xc30 [ 443.463459][T12884] ? rcu_lock_release+0x5/0x20 [ 443.468234][T12884] ? __lock_acquire+0x7c60/0x7c60 [ 443.473269][T12884] tun_chr_write_iter+0x112/0x1e0 [ 443.478290][T12884] vfs_write+0x712/0xd00 [ 443.482537][T12884] ? file_end_write+0x250/0x250 [ 443.487387][T12884] ? __fget_files+0x40f/0x480 [ 443.492070][T12884] ? __fdget_pos+0x1e2/0x370 [ 443.496662][T12884] ? ksys_write+0x71/0x250 [ 443.501079][T12884] ksys_write+0x14d/0x250 [ 443.505405][T12884] ? __ia32_sys_read+0x80/0x80 [ 443.510171][T12884] ? lockdep_hardirqs_on+0x94/0x140 [ 443.515373][T12884] do_syscall_64+0x4c/0xa0 [ 443.519787][T12884] ? clear_bhb_loop+0x15/0x70 [ 443.524462][T12884] ? clear_bhb_loop+0x15/0x70 [ 443.529136][T12884] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 443.535030][T12884] RIP: 0033:0x7fd32cc3c969 [ 443.539482][T12884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 443.559094][T12884] RSP: 002b:00007fd32aaa4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 443.567517][T12884] RAX: ffffffffffffffda RBX: 00007fd32ce63fa0 RCX: 00007fd32cc3c969 [ 443.575518][T12884] RDX: 000000000000ffdd RSI: 0000200000000840 RDI: 0000000000000003 [ 443.583501][T12884] RBP: 00007fd32aaa4090 R08: 0000000000000000 R09: 0000000000000000 [ 443.591496][T12884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 443.599479][T12884] R13: 0000000000000000 R14: 00007fd32ce63fa0 R15: 00007ffea2478b88 [ 443.607475][T12884] [ 443.622042][ T1108] syzkaller0: tun_net_xmit 76 [ 443.627272][ T1108] syzkaller0: tun_net_xmit 48 [ 443.647870][T12869] syzkaller0: tun_net_xmit 76 [ 443.670242][T12890] syzkaller0: create flow: hash 1842379732 index 1 [ 443.743556][ T21] syzkaller0: tun_net_xmit 76 [ 443.748765][ T2195] syzkaller0: tun_net_xmit 76 [ 443.756399][ T2195] syzkaller0: tun_net_xmit 48 [ 443.761372][ T21] Bluetooth: hci5: command 0x040f tx timeout [ 443.775455][ T21] syzkaller0: tun_net_xmit 76 [ 443.815622][T12902] device syzkaller0 entered promiscuous mode [ 443.884874][T12889] syzkaller0: delete flow: hash 1842379732 index 1 [ 443.965983][T12719] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 444.003587][T12905] device syzkaller0 entered promiscuous mode [ 444.029680][T12719] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 444.070242][T12719] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 444.144780][T12719] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 444.496824][T12929] device syzkaller0 entered promiscuous mode [ 444.541897][T12933] netlink: 10 bytes leftover after parsing attributes in process `syz.1.2917'. [ 444.720234][T12719] 8021q: adding VLAN 0 to HW filter on device bond0 [ 444.820936][ T5738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 444.839544][ T5738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 444.932754][T12719] 8021q: adding VLAN 0 to HW filter on device team0 [ 445.009339][T12939] bond0: (slave team0): Error: Slave device does not support XDP [ 445.097931][T12950] netlink: 'syz.2.2920': attribute type 10 has an invalid length. [ 445.131426][T12956] netlink: 'syz.4.2923': attribute type 4 has an invalid length. [ 445.173027][ T5746] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 445.200488][ T5746] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 445.231331][ T5746] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 445.240500][ T5746] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 445.254918][ T5746] device bridge_slave_1 left promiscuous mode [ 445.262498][ T5746] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.298613][T12963] netlink: 129384 bytes leftover after parsing attributes in process `syz.4.2923'. [ 445.327857][ T5746] device bridge_slave_0 left promiscuous mode [ 445.362304][ T5746] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.392602][T12967] FAULT_INJECTION: forcing a failure. [ 445.392602][T12967] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 445.473943][T12967] CPU: 1 PID: 12967 Comm: syz.2.2926 Not tainted 5.15.182-syzkaller #0 [ 445.482251][T12967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 445.492329][T12967] Call Trace: [ 445.495632][T12967] [ 445.498589][T12967] dump_stack_lvl+0x168/0x230 [ 445.503294][T12967] ? show_regs_print_info+0x20/0x20 [ 445.508708][T12967] ? load_image+0x3b0/0x3b0 [ 445.513243][T12967] ? __lock_acquire+0x7c60/0x7c60 [ 445.518293][T12967] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 445.524367][T12967] should_fail+0x38c/0x4c0 [ 445.528835][T12967] _copy_from_iter+0x22a/0x1150 [ 445.533704][T12967] ? lockdep_hardirqs_on+0x94/0x140 [ 445.538927][T12967] ? __lock_acquire+0x7c60/0x7c60 [ 445.543980][T12967] ? copy_mc_pipe_to_iter+0x7d0/0x7d0 [ 445.549386][T12967] ? __virt_addr_valid+0x3c6/0x470 [ 445.554515][T12967] ? __phys_addr+0xb6/0x170 [ 445.559039][T12967] ? __phys_addr_symbol+0x2b/0x70 [ 445.564085][T12967] ? __check_object_size+0x30c/0x410 [ 445.569401][T12967] skb_copy_datagram_from_iter+0xf2/0x6a0 [ 445.575146][T12967] ? skb_put+0x117/0x210 [ 445.579445][T12967] tun_get_user+0x1279/0x38d0 [ 445.584159][T12967] ? tun_ring_recv+0xc30/0xc30 [ 445.588949][T12967] ? rcu_lock_release+0x5/0x20 [ 445.593729][T12967] ? __lock_acquire+0x7c60/0x7c60 [ 445.598793][T12967] tun_chr_write_iter+0x112/0x1e0 [ 445.603841][T12967] vfs_write+0x712/0xd00 [ 445.608119][T12967] ? file_end_write+0x250/0x250 [ 445.613002][T12967] ? __fget_files+0x40f/0x480 [ 445.617713][T12967] ? __fdget_pos+0x1e2/0x370 [ 445.622332][T12967] ? ksys_write+0x71/0x250 [ 445.626774][T12967] ksys_write+0x14d/0x250 [ 445.631170][T12967] ? __ia32_sys_read+0x80/0x80 [ 445.635956][T12967] ? syscall_enter_from_user_mode+0x2a/0x70 [ 445.641870][T12967] do_syscall_64+0x4c/0xa0 [ 445.646298][T12967] ? clear_bhb_loop+0x15/0x70 [ 445.650986][T12967] ? clear_bhb_loop+0x15/0x70 [ 445.655679][T12967] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 445.661588][T12967] RIP: 0033:0x7ff23b5f0969 [ 445.666019][T12967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 445.685649][T12967] RSP: 002b:00007ff239458038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 445.694104][T12967] RAX: ffffffffffffffda RBX: 00007ff23b817fa0 RCX: 00007ff23b5f0969 [ 445.702106][T12967] RDX: 000000000000fdef RSI: 0000200000000580 RDI: 00000000000000c8 [ 445.710102][T12967] RBP: 00007ff239458090 R08: 0000000000000000 R09: 0000000000000000 [ 445.718093][T12967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 445.726075][T12967] R13: 0000000000000000 R14: 00007ff23b817fa0 R15: 00007ffd72444958 [ 445.734089][T12967] [ 445.779802][ T5746] device veth1_macvtap left promiscuous mode [ 445.787921][T12963] netlink: 'syz.4.2923': attribute type 3 has an invalid length. [ 445.797317][ T5746] device veth0_macvtap left promiscuous mode [ 445.833417][ T4220] Bluetooth: hci5: command 0x0419 tx timeout [ 445.880589][T12963] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.2923'. [ 446.197931][ T5746] team0 (unregistering): Port device team_slave_1 removed [ 446.219963][ T5746] team0 (unregistering): Port device team_slave_0 removed [ 446.247263][ T5746] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 446.341843][ T5746] bond0 (unregistering): (slave team0): Releasing backup interface [ 446.411877][ T5746] bond0 (unregistering): Released all slaves [ 446.490360][ T4239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 446.502838][ T4239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 446.512442][ T4239] bridge0: port 1(bridge_slave_0) entered blocking state [ 446.520989][ T4239] bridge0: port 1(bridge_slave_0) entered forwarding state [ 446.544146][ T4239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 446.563612][ T4239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 446.577551][ T4239] bridge0: port 2(bridge_slave_1) entered blocking state [ 446.584701][ T4239] bridge0: port 2(bridge_slave_1) entered forwarding state [ 446.602046][ T4239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 446.726660][T12719] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 446.745948][T12719] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 446.966001][T12983] netlink: 830 bytes leftover after parsing attributes in process `syz.0.2930'. [ 447.079962][ T4239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 447.108522][ T4239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 447.144497][ T4239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 447.205862][ T4239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 447.231438][ T4239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 447.263637][ T4239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 447.305039][ T4239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 447.321154][ T4239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 447.340686][ T4239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 447.357048][ T4239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 447.386522][ T4239] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 447.477593][ T4239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 447.709089][T12991] device syzkaller0 entered promiscuous mode [ 447.883660][T12993] netlink: 10 bytes leftover after parsing attributes in process `syz.1.2931'. [ 448.412610][T13005] netlink: 'syz.2.2934': attribute type 10 has an invalid length. [ 448.465245][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 448.472832][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 448.575031][T12719] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 448.838813][ T5749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 448.867826][ T5749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 449.405133][T13017] bond0: (slave team0): Error: Slave device does not support XDP [ 449.549138][T12719] device veth0_vlan entered promiscuous mode [ 449.758479][T13021] netlink: 'syz.1.2936': attribute type 10 has an invalid length. [ 449.783938][ T5749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 449.795891][ T5749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 449.836026][T12719] device veth1_vlan entered promiscuous mode [ 449.958229][ T5749] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 450.037083][ T5749] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 450.780308][T12719] device veth0_macvtap entered promiscuous mode [ 450.808557][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 450.886436][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 450.939849][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 451.012665][T12719] device veth1_macvtap entered promiscuous mode [ 451.464945][T12719] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 451.966647][ T5749] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 452.005572][ T5749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 452.055017][T12719] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 452.081611][ T5749] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 452.107026][ T5749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 452.225334][T12719] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 452.412127][T12719] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 452.573182][T12719] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 452.581936][T12719] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 453.078462][T13037] delete_channel: no stack [ 453.376495][T13050] device syzkaller0 entered promiscuous mode [ 453.605046][T13053] netlink: 'syz.4.2947': attribute type 10 has an invalid length. [ 453.636900][T13049] netlink: 10 bytes leftover after parsing attributes in process `syz.1.2945'. [ 453.850115][T13052] device wlan0 entered promiscuous mode [ 453.906964][T13056] bond0: (slave team0): Error: Slave device does not support XDP [ 454.015257][T13058] netlink: 'syz.0.2948': attribute type 10 has an invalid length. [ 454.086433][ T4239] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 454.105510][ T4239] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 454.143262][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 454.221462][ T155] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 454.235718][ T155] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 454.286088][ T5749] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 454.504572][T13081] netlink: 'syz.4.2957': attribute type 4 has an invalid length. [ 454.590107][T13083] netlink: 'syz.2.2958': attribute type 10 has an invalid length. [ 454.676242][T13085] netlink: 129384 bytes leftover after parsing attributes in process `syz.4.2957'. [ 454.802111][T13090] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 454.848466][T13088] netlink: 'syz.4.2957': attribute type 3 has an invalid length. [ 454.874795][T13088] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.2957'. [ 455.137447][T13099] FAULT_INJECTION: forcing a failure. [ 455.137447][T13099] name failslab, interval 1, probability 0, space 0, times 0 [ 455.163392][T13099] CPU: 0 PID: 13099 Comm: syz.2.2962 Not tainted 5.15.182-syzkaller #0 [ 455.171689][T13099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 455.181772][T13099] Call Trace: [ 455.185076][T13099] [ 455.188036][T13099] dump_stack_lvl+0x168/0x230 [ 455.192749][T13099] ? show_regs_print_info+0x20/0x20 [ 455.197979][T13099] ? load_image+0x3b0/0x3b0 [ 455.202508][T13099] ? __might_sleep+0xf0/0xf0 [ 455.207131][T13099] ? __lock_acquire+0x7c60/0x7c60 [ 455.212181][T13099] ? perf_trace_lock+0xdf/0x370 [ 455.217060][T13099] should_fail+0x38c/0x4c0 [ 455.221531][T13099] should_failslab+0x5/0x20 [ 455.226055][T13099] slab_pre_alloc_hook+0x51/0xc0 [ 455.231109][T13099] kmem_cache_alloc_node+0x47/0x2d0 [ 455.236330][T13099] ? __alloc_skb+0xf4/0x750 [ 455.240873][T13099] __alloc_skb+0xf4/0x750 [ 455.245243][T13099] alloc_skb_with_frags+0xa7/0x730 [ 455.250379][T13099] ? mark_lock+0x94/0x320 [ 455.254838][T13099] ? __lock_acquire+0x12d9/0x7c60 [ 455.259894][T13099] sock_alloc_send_pskb+0x853/0x980 [ 455.265222][T13099] ? sock_kzfree_s+0x50/0x50 [ 455.269857][T13099] ? verify_lock_unused+0x140/0x140 [ 455.275090][T13099] tun_get_user+0x856/0x38d0 [ 455.279724][T13099] ? tun_ring_recv+0xc30/0xc30 [ 455.284531][T13099] ? rcu_lock_release+0x5/0x20 [ 455.289315][T13099] ? __lock_acquire+0x7c60/0x7c60 [ 455.294375][T13099] tun_chr_write_iter+0x112/0x1e0 [ 455.299440][T13099] vfs_write+0x712/0xd00 [ 455.303716][T13099] ? file_end_write+0x250/0x250 [ 455.308605][T13099] ? __fget_files+0x40f/0x480 [ 455.313316][T13099] ? __fdget_pos+0x1e2/0x370 [ 455.317927][T13099] ? ksys_write+0x71/0x250 [ 455.322410][T13099] ksys_write+0x14d/0x250 [ 455.326767][T13099] ? __ia32_sys_read+0x80/0x80 [ 455.331559][T13099] ? lockdep_hardirqs_on+0x94/0x140 [ 455.336788][T13099] do_syscall_64+0x4c/0xa0 [ 455.341228][T13099] ? clear_bhb_loop+0x15/0x70 [ 455.345929][T13099] ? clear_bhb_loop+0x15/0x70 [ 455.350634][T13099] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 455.356551][T13099] RIP: 0033:0x7ff23b5f0969 [ 455.360987][T13099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 455.380712][T13099] RSP: 002b:00007ff239458038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 455.389156][T13099] RAX: ffffffffffffffda RBX: 00007ff23b817fa0 RCX: 00007ff23b5f0969 [ 455.397145][T13099] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 455.405142][T13099] RBP: 00007ff239458090 R08: 0000000000000000 R09: 0000000000000000 [ 455.413178][T13099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 455.421294][T13099] R13: 0000000000000000 R14: 00007ff23b817fa0 R15: 00007ffd72444958 [ 455.429314][T13099] [ 455.943585][T13102] bond0: (slave team0): Error: Slave device does not support XDP [ 455.988128][T13112] device wlan0 entered promiscuous mode [ 455.999934][T13113] netlink: 'syz.1.2963': attribute type 10 has an invalid length. [ 456.125985][T13096] chnl_net:caif_netlink_parms(): no params data found [ 456.367486][T13108] netlink: 'syz.3.2964': attribute type 9 has an invalid length. [ 456.449005][T13096] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.469388][T13096] bridge0: port 1(bridge_slave_0) entered disabled state [ 456.488336][T13096] device bridge_slave_0 entered promiscuous mode [ 456.497538][T13125] netlink: 'syz.1.2970': attribute type 10 has an invalid length. [ 456.508475][T13130] netlink: 830 bytes leftover after parsing attributes in process `syz.4.2969'. [ 456.523971][T13108] netlink: 209836 bytes leftover after parsing attributes in process `syz.3.2964'. [ 456.538103][T13096] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.606500][T13096] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.649476][T13096] device bridge_slave_1 entered promiscuous mode [ 456.763624][T13096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 456.806173][ T5746] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 456.859382][T13096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 456.907435][T13140] netlink: 'syz.3.2975': attribute type 4 has an invalid length. [ 456.947103][T13096] team0: Port device team_slave_0 added [ 456.972395][ T5746] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 457.020518][T13144] netlink: 129384 bytes leftover after parsing attributes in process `syz.3.2975'. [ 457.041218][T13096] team0: Port device team_slave_1 added [ 457.103845][ T5746] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 457.125894][T13146] netlink: 'syz.3.2975': attribute type 3 has an invalid length. [ 457.148685][T13096] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 457.163557][T13096] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 457.193734][ T4216] Bluetooth: hci2: command 0x0409 tx timeout [ 457.194708][T13146] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.2975'. [ 457.217938][T13096] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 457.250672][ T5746] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 457.268419][T13096] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 457.281426][T13096] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 457.326388][T13096] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 457.459699][T13096] device hsr_slave_0 entered promiscuous mode [ 457.473593][T13096] device hsr_slave_1 entered promiscuous mode [ 457.486479][T13096] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 457.497134][T13096] Cannot create hsr debugfs directory [ 458.003665][T13164] 8021q: adding VLAN 0 to HW filter on device team0 [ 458.020073][T13164] bond0: (slave team0): Enslaving as an active interface with an up link [ 458.085620][T13170] FAULT_INJECTION: forcing a failure. [ 458.085620][T13170] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 458.126202][T13170] CPU: 0 PID: 13170 Comm: syz.2.2982 Not tainted 5.15.182-syzkaller #0 [ 458.134503][T13170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 458.144573][T13170] Call Trace: [ 458.147849][T13170] [ 458.150775][T13170] dump_stack_lvl+0x168/0x230 [ 458.155458][T13170] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 458.161615][T13170] ? show_regs_print_info+0x20/0x20 [ 458.166814][T13170] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 458.172974][T13170] should_fail+0x38c/0x4c0 [ 458.177399][T13170] _copy_from_user+0x2e/0x170 [ 458.182077][T13170] __copy_msghdr_from_user+0xaf/0x5e0 [ 458.187448][T13170] ? verify_lock_unused+0x140/0x140 [ 458.192655][T13170] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 458.197954][T13170] ___sys_sendmsg+0x156/0x260 [ 458.202638][T13170] ? __sys_sendmsg+0x250/0x250 [ 458.207412][T13170] ? ktime_get_real_ts64+0x420/0x420 [ 458.212722][T13170] ? __fdget+0x18b/0x210 [ 458.216966][T13170] __se_sys_sendmsg+0x190/0x250 [ 458.221817][T13170] ? __x64_sys_sendmsg+0x80/0x80 [ 458.226751][T13170] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 458.232744][T13170] ? lockdep_hardirqs_on+0x94/0x140 [ 458.237946][T13170] do_syscall_64+0x4c/0xa0 [ 458.242359][T13170] ? clear_bhb_loop+0x15/0x70 [ 458.247047][T13170] ? clear_bhb_loop+0x15/0x70 [ 458.251720][T13170] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 458.257614][T13170] RIP: 0033:0x7ff23b5f0969 [ 458.262028][T13170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 458.281628][T13170] RSP: 002b:00007ff239437038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 458.290041][T13170] RAX: ffffffffffffffda RBX: 00007ff23b818080 RCX: 00007ff23b5f0969 [ 458.298011][T13170] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000006 [ 458.305991][T13170] RBP: 00007ff239437090 R08: 0000000000000000 R09: 0000000000000000 [ 458.314054][T13170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 458.323081][T13170] R13: 0000000000000000 R14: 00007ff23b818080 R15: 00007ffd72444958 [ 458.331079][T13170] [ 458.645103][T13178] delete_channel: no stack [ 458.711515][T13190] netlink: 129384 bytes leftover after parsing attributes in process `syz.3.2987'. [ 458.842334][T13199] FAULT_INJECTION: forcing a failure. [ 458.842334][T13199] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 458.883618][T13194] validate_nla: 3 callbacks suppressed [ 458.883641][T13194] netlink: 'syz.3.2987': attribute type 3 has an invalid length. [ 458.924057][T13199] CPU: 0 PID: 13199 Comm: syz.1.2991 Not tainted 5.15.182-syzkaller #0 [ 458.932366][T13199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 458.942472][T13199] Call Trace: [ 458.945766][T13199] [ 458.945948][T13194] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.2987'. [ 458.948714][T13199] dump_stack_lvl+0x168/0x230 [ 458.948758][T13199] ? show_regs_print_info+0x20/0x20 [ 458.948788][T13199] ? load_image+0x3b0/0x3b0 [ 458.948819][T13199] ? __lock_acquire+0x7c60/0x7c60 [ 458.948849][T13199] ? perf_trace_run_bpf_submit+0x1c0/0x1c0 [ 458.983337][T13199] should_fail+0x38c/0x4c0 [ 458.987835][T13199] _copy_from_user+0x2e/0x170 [ 458.992565][T13199] __copy_msghdr_from_user+0x448/0x5e0 [ 458.998066][T13199] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 459.003835][T13199] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 459.009185][T13199] ? trace_event_raw_event_lock+0x250/0x250 [ 459.015132][T13199] ___sys_sendmsg+0x156/0x260 [ 459.019869][T13199] ? __sys_sendmsg+0x250/0x250 [ 459.024700][T13199] ? trace_event_raw_event_lock+0x250/0x250 [ 459.030639][T13199] ? vfs_write+0x84d/0xd00 [ 459.035131][T13199] ? __fdget+0x18b/0x210 [ 459.039421][T13199] __se_sys_sendmsg+0x190/0x250 [ 459.044315][T13199] ? __x64_sys_sendmsg+0x80/0x80 [ 459.049288][T13199] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 459.055328][T13199] ? lockdep_hardirqs_on+0x94/0x140 [ 459.060583][T13199] do_syscall_64+0x4c/0xa0 [ 459.065034][T13199] ? clear_bhb_loop+0x15/0x70 [ 459.069739][T13199] ? clear_bhb_loop+0x15/0x70 [ 459.074453][T13199] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 459.080385][T13199] RIP: 0033:0x7fbab741f969 [ 459.084825][T13199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 459.104455][T13199] RSP: 002b:00007fbab5287038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 459.112906][T13199] RAX: ffffffffffffffda RBX: 00007fbab7646fa0 RCX: 00007fbab741f969 [ 459.122715][T13199] RDX: 0000000004000080 RSI: 0000200000000580 RDI: 0000000000000004 [ 459.130720][T13199] RBP: 00007fbab5287090 R08: 0000000000000000 R09: 0000000000000000 [ 459.138730][T13199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 459.146733][T13199] R13: 0000000000000000 R14: 00007fbab7646fa0 R15: 00007ffefbf3b208 [ 459.154771][T13199] [ 459.283560][ T13] Bluetooth: hci2: command 0x041b tx timeout [ 459.482232][T13096] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 459.551995][T13219] netlink: 'syz.1.2994': attribute type 10 has an invalid length. [ 459.605386][T13096] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 459.810568][T13096] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 459.889943][T13096] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 460.340465][T13248] netlink: 'syz.3.3002': attribute type 4 has an invalid length. [ 460.383742][T13096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 460.843799][ T5746] device hsr_slave_0 left promiscuous mode [ 460.881819][ T5746] device hsr_slave_1 left promiscuous mode [ 460.910464][ T5746] device veth1_macvtap left promiscuous mode [ 460.917599][ T5746] device veth0_macvtap left promiscuous mode [ 460.929641][ T5746] device veth1_vlan left promiscuous mode [ 460.938455][ T5746] device veth0_vlan left promiscuous mode [ 460.979439][T13250] netlink: 129384 bytes leftover after parsing attributes in process `syz.3.3002'. [ 461.353246][T12869] Bluetooth: hci2: command 0x040f tx timeout [ 461.619463][ T5746] team0 (unregistering): Port device team_slave_1 removed [ 461.641571][ T5746] team0 (unregistering): Port device team_slave_0 removed [ 461.662162][ T5746] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 461.745071][ T5746] bond0 (unregistering): (slave team0): Releasing backup interface [ 461.771589][ T5746] bond0 (unregistering): Released all slaves [ 461.787303][T13254] netlink: 'syz.4.3004': attribute type 21 has an invalid length. [ 461.795271][T13254] netlink: 164 bytes leftover after parsing attributes in process `syz.4.3004'. [ 461.821386][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 461.841469][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 461.859319][T13274] syz.1.3007[13274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 461.859420][T13274] syz.1.3007[13274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 461.880171][T13096] 8021q: adding VLAN 0 to HW filter on device team0 [ 461.919322][T13274] IPv6: Can't replace route, no match found [ 461.937345][T13276] netlink: 'syz.4.3006': attribute type 10 has an invalid length. [ 462.019307][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 462.041299][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 462.066630][ T4242] bridge0: port 1(bridge_slave_0) entered blocking state [ 462.073771][ T4242] bridge0: port 1(bridge_slave_0) entered forwarding state [ 462.117358][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 462.135568][ T5749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 462.146536][ T5749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 462.156050][ T5749] bridge0: port 2(bridge_slave_1) entered blocking state [ 462.163281][ T5749] bridge0: port 2(bridge_slave_1) entered forwarding state [ 462.172503][ T5749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 462.206176][T13278] device syzkaller0 entered promiscuous mode [ 462.262217][T13281] netlink: 10 bytes leftover after parsing attributes in process `syz.4.3009'. [ 462.276173][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 462.290305][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 462.301551][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 462.317890][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 462.336982][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 462.350689][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 462.367658][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 462.376861][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 462.486522][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 462.519098][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 462.542193][T13096] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 462.549674][T13287] FAULT_INJECTION: forcing a failure. [ 462.549674][T13287] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 462.610946][T13287] CPU: 0 PID: 13287 Comm: syz.1.3012 Not tainted 5.15.182-syzkaller #0 [ 462.619241][T13287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 462.629413][T13287] Call Trace: [ 462.632718][T13287] [ 462.635669][T13287] dump_stack_lvl+0x168/0x230 [ 462.640381][T13287] ? show_regs_print_info+0x20/0x20 [ 462.645611][T13287] ? load_image+0x3b0/0x3b0 [ 462.650158][T13287] ? __lock_acquire+0x7c60/0x7c60 [ 462.655226][T13287] should_fail+0x38c/0x4c0 [ 462.659682][T13287] _copy_to_user+0x2e/0x130 [ 462.664228][T13287] simple_read_from_buffer+0xe3/0x150 [ 462.669622][T13287] proc_fail_nth_read+0x19a/0x210 [ 462.674665][T13287] ? proc_fault_inject_write+0x2f0/0x2f0 [ 462.680320][T13287] ? fsnotify_perm+0x254/0x560 [ 462.685107][T13287] ? proc_fault_inject_write+0x2f0/0x2f0 [ 462.690852][T13287] vfs_read+0x2f6/0xcf0 [ 462.695072][T13287] ? kernel_read+0x1e0/0x1e0 [ 462.699696][T13287] ? __fget_files+0x40f/0x480 [ 462.704394][T13287] ? mutex_lock_nested+0x17/0x20 [ 462.709363][T13287] ? __fdget_pos+0x2bf/0x370 [ 462.713961][T13287] ? ksys_read+0x71/0x250 [ 462.718328][T13287] ksys_read+0x14d/0x250 [ 462.722594][T13287] ? vfs_write+0xd00/0xd00 [ 462.727022][T13287] ? lockdep_hardirqs_on+0x94/0x140 [ 462.732262][T13287] do_syscall_64+0x4c/0xa0 [ 462.736683][T13287] ? clear_bhb_loop+0x15/0x70 [ 462.741360][T13287] ? clear_bhb_loop+0x15/0x70 [ 462.746050][T13287] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 462.751972][T13287] RIP: 0033:0x7fbab741e37c [ 462.756396][T13287] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 462.776007][T13287] RSP: 002b:00007fbab5287030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 462.784430][T13287] RAX: ffffffffffffffda RBX: 00007fbab7646fa0 RCX: 00007fbab741e37c [ 462.792425][T13287] RDX: 000000000000000f RSI: 00007fbab52870a0 RDI: 0000000000000004 [ 462.800401][T13287] RBP: 00007fbab5287090 R08: 0000000000000000 R09: 0000000000000000 [ 462.808379][T13287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 462.816352][T13287] R13: 0000000000000000 R14: 00007fbab7646fa0 R15: 00007ffefbf3b208 [ 462.824357][T13287] [ 462.859080][T13292] netlink: 'syz.4.3014': attribute type 4 has an invalid length. [ 462.983073][T13294] netlink: 129384 bytes leftover after parsing attributes in process `syz.4.3014'. [ 463.103529][T13302] netlink: 'syz.4.3014': attribute type 3 has an invalid length. [ 463.122020][T13302] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.3014'. [ 463.132684][ T5749] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 463.152184][ T5749] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 463.199590][T13096] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 463.223553][T13303] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.3015'. [ 463.253445][T13301] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.3015'. [ 463.327637][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 463.344184][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 463.389474][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 463.405725][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 463.446133][ T4253] Bluetooth: hci2: command 0x0419 tx timeout [ 463.455166][T13096] device veth0_vlan entered promiscuous mode [ 463.465776][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 463.484138][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 463.530947][T13096] device veth1_vlan entered promiscuous mode [ 463.550538][T13317] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.3016'. [ 463.566164][T13318] FAULT_INJECTION: forcing a failure. [ 463.566164][T13318] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 463.615343][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 463.630415][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 463.643604][T13318] CPU: 0 PID: 13318 Comm: syz.3.3018 Not tainted 5.15.182-syzkaller #0 [ 463.651881][T13318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 463.662052][T13318] Call Trace: [ 463.665358][T13318] [ 463.668298][T13318] dump_stack_lvl+0x168/0x230 [ 463.672996][T13318] ? show_regs_print_info+0x20/0x20 [ 463.678209][T13318] ? load_image+0x3b0/0x3b0 [ 463.682734][T13318] ? __lock_acquire+0x7c60/0x7c60 [ 463.687777][T13318] should_fail+0x38c/0x4c0 [ 463.692227][T13318] _copy_to_user+0x2e/0x130 [ 463.696747][T13318] simple_read_from_buffer+0xe3/0x150 [ 463.702141][T13318] proc_fail_nth_read+0x19a/0x210 [ 463.707186][T13318] ? proc_fault_inject_write+0x2f0/0x2f0 [ 463.712839][T13318] ? fsnotify_perm+0x254/0x560 [ 463.717631][T13318] ? proc_fault_inject_write+0x2f0/0x2f0 [ 463.723279][T13318] vfs_read+0x2f6/0xcf0 [ 463.727454][T13318] ? kernel_read+0x1e0/0x1e0 [ 463.732075][T13318] ? __fget_files+0x40f/0x480 [ 463.736800][T13318] ? mutex_lock_nested+0x17/0x20 [ 463.741754][T13318] ? __fdget_pos+0x2bf/0x370 [ 463.746355][T13318] ? ksys_read+0x71/0x250 [ 463.750686][T13318] ksys_read+0x14d/0x250 [ 463.754939][T13318] ? vfs_write+0xd00/0xd00 [ 463.759359][T13318] ? lockdep_hardirqs_on+0x94/0x140 [ 463.764560][T13318] do_syscall_64+0x4c/0xa0 [ 463.768989][T13318] ? clear_bhb_loop+0x15/0x70 [ 463.773673][T13318] ? clear_bhb_loop+0x15/0x70 [ 463.778363][T13318] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 463.784274][T13318] RIP: 0033:0x7fc30e09a37c [ 463.788706][T13318] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 463.808319][T13318] RSP: 002b:00007fc30bf03030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 463.816769][T13318] RAX: ffffffffffffffda RBX: 00007fc30e2c2fa0 RCX: 00007fc30e09a37c [ 463.824763][T13318] RDX: 000000000000000f RSI: 00007fc30bf030a0 RDI: 0000000000000004 [ 463.832750][T13318] RBP: 00007fc30bf03090 R08: 0000000000000000 R09: 0000000000000000 [ 463.840744][T13318] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 463.848738][T13318] R13: 0000000000000000 R14: 00007fc30e2c2fa0 R15: 00007ffcfc2f2f58 [ 463.856780][T13318] [ 463.897594][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 463.909793][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 463.939707][T13096] device veth0_macvtap entered promiscuous mode [ 463.961586][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 463.977905][T13096] device veth1_macvtap entered promiscuous mode [ 464.017578][T13096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 464.058773][T13096] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 464.095909][T13096] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 464.145922][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 464.167281][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 464.212602][T13096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 464.250429][T13096] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 464.293619][T13096] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 464.320414][T13324] netlink: 830 bytes leftover after parsing attributes in process `syz.4.3020'. [ 464.348846][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 464.375821][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 464.405879][T13096] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 464.433147][T13096] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 464.441878][T13096] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 464.495917][T13096] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 464.549200][T13327] bond0: (slave team0): Error: Slave device does not support XDP [ 464.597215][T13327] netlink: 'syz.1.3021': attribute type 10 has an invalid length. [ 464.716545][ T5749] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 464.738036][ T5749] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 464.818078][T13332] device syzkaller0 entered promiscuous mode [ 464.849974][ T155] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 464.869426][T13335] netlink: 10 bytes leftover after parsing attributes in process `syz.4.3023'. [ 464.919359][ T155] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 464.930583][T13337] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 464.937386][T13337] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 464.949394][ T155] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 465.012517][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 465.176331][T13342] FAULT_INJECTION: forcing a failure. [ 465.176331][T13342] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 465.233301][T13342] CPU: 1 PID: 13342 Comm: syz.0.2959 Not tainted 5.15.182-syzkaller #0 [ 465.241592][T13342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 465.251768][T13342] Call Trace: [ 465.255064][T13342] [ 465.258014][T13342] dump_stack_lvl+0x168/0x230 [ 465.262725][T13342] ? show_regs_print_info+0x20/0x20 [ 465.268014][T13342] ? load_image+0x3b0/0x3b0 [ 465.272543][T13342] ? __lock_acquire+0x7c60/0x7c60 [ 465.277603][T13342] should_fail+0x38c/0x4c0 [ 465.282055][T13342] _copy_from_user+0x2e/0x170 [ 465.286758][T13342] __copy_msghdr_from_user+0xaf/0x5e0 [ 465.292154][T13342] ? verify_lock_unused+0x140/0x140 [ 465.297379][T13342] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 465.302723][T13342] ___sys_sendmsg+0x156/0x260 [ 465.307449][T13342] ? __sys_sendmsg+0x250/0x250 [ 465.312253][T13342] ? ktime_get_real_ts64+0x420/0x420 [ 465.317578][T13342] ? __fdget+0x18b/0x210 [ 465.321960][T13342] __se_sys_sendmsg+0x190/0x250 [ 465.326819][T13342] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 465.333072][T13342] ? __x64_sys_sendmsg+0x80/0x80 [ 465.338031][T13342] ? syscall_enter_from_user_mode+0x2a/0x70 [ 465.343964][T13342] do_syscall_64+0x4c/0xa0 [ 465.348816][T13342] ? clear_bhb_loop+0x15/0x70 [ 465.353610][T13342] ? clear_bhb_loop+0x15/0x70 [ 465.358381][T13342] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 465.364284][T13342] RIP: 0033:0x7f2125454969 [ 465.368698][T13342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 465.388306][T13342] RSP: 002b:00007f21232bc038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 465.396730][T13342] RAX: ffffffffffffffda RBX: 00007f212567bfa0 RCX: 00007f2125454969 [ 465.404803][T13342] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000004 [ 465.413124][T13342] RBP: 00007f21232bc090 R08: 0000000000000000 R09: 0000000000000000 [ 465.421097][T13342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 465.429064][T13342] R13: 0000000000000000 R14: 00007f212567bfa0 R15: 00007ffc9302b5d8 [ 465.437045][T13342] [ 465.828611][T13347] netlink: 'syz.3.3028': attribute type 10 has an invalid length. [ 466.174216][T13348] chnl_net:caif_netlink_parms(): no params data found [ 466.298805][ T5746] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 466.401308][ T5746] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 466.437178][T13348] bridge0: port 1(bridge_slave_0) entered blocking state [ 466.476898][T13348] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.511465][T13348] device bridge_slave_0 entered promiscuous mode [ 466.552686][T13368] FAULT_INJECTION: forcing a failure. [ 466.552686][T13368] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 466.580168][ T5746] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 466.594752][T13368] CPU: 1 PID: 13368 Comm: syz.1.3032 Not tainted 5.15.182-syzkaller #0 [ 466.603137][T13368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 466.613208][T13368] Call Trace: [ 466.616508][T13368] [ 466.619454][T13368] dump_stack_lvl+0x168/0x230 [ 466.624160][T13368] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 466.630332][T13368] ? show_regs_print_info+0x20/0x20 [ 466.635554][T13368] ? load_image+0x3b0/0x3b0 [ 466.640086][T13368] should_fail+0x38c/0x4c0 [ 466.644525][T13368] _copy_from_user+0x2e/0x170 [ 466.649233][T13368] __copy_msghdr_from_user+0x448/0x5e0 [ 466.654711][T13368] ? verify_lock_unused+0x140/0x140 [ 466.659931][T13368] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 466.665254][T13368] ? trace_event_raw_event_lock+0x250/0x250 [ 466.671196][T13368] ___sys_sendmsg+0x156/0x260 [ 466.675914][T13368] ? __sys_sendmsg+0x250/0x250 [ 466.680720][T13368] ? rcu_is_watching+0x11/0xa0 [ 466.685535][T13368] ? __se_sys_sendmsg+0x80/0x250 [ 466.690506][T13368] __se_sys_sendmsg+0x190/0x250 [ 466.695375][T13368] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 466.701554][T13368] ? __x64_sys_sendmsg+0x80/0x80 [ 466.706530][T13368] ? trace_sys_enter+0x1f/0x80 [ 466.711316][T13368] do_syscall_64+0x4c/0xa0 [ 466.715746][T13368] ? clear_bhb_loop+0x15/0x70 [ 466.720440][T13368] ? clear_bhb_loop+0x15/0x70 [ 466.725132][T13368] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 466.731069][T13368] RIP: 0033:0x7fbab741f969 [ 466.735522][T13368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 466.755157][T13368] RSP: 002b:00007fbab5287038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 466.763609][T13368] RAX: ffffffffffffffda RBX: 00007fbab7646fa0 RCX: 00007fbab741f969 [ 466.771616][T13368] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000005 [ 466.779608][T13368] RBP: 00007fbab5287090 R08: 0000000000000000 R09: 0000000000000000 [ 466.787583][T13368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 466.795568][T13368] R13: 0000000000000000 R14: 00007fbab7646fa0 R15: 00007ffefbf3b208 [ 466.803584][T13368] [ 466.833786][T13348] bridge0: port 2(bridge_slave_1) entered blocking state [ 466.840875][T13348] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.876610][T13348] device bridge_slave_1 entered promiscuous mode [ 466.902825][T13369] netlink: 830 bytes leftover after parsing attributes in process `syz.0.3033'. [ 467.007415][ T5746] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 467.031753][T13348] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 467.064595][T13373] bond0: (slave team0): Error: Slave device does not support XDP [ 467.115622][T13348] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 467.137214][T13374] netlink: 'syz.3.3034': attribute type 10 has an invalid length. [ 467.187877][T13374] bond0: (slave bond_slave_0): Releasing backup interface [ 467.374487][T13348] team0: Port device team_slave_0 added [ 467.448115][T13348] team0: Port device team_slave_1 added [ 467.493907][T13386] FAULT_INJECTION: forcing a failure. [ 467.493907][T13386] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 467.541369][T13389] netlink: 'syz.2.3039': attribute type 21 has an invalid length. [ 467.559348][T13386] CPU: 1 PID: 13386 Comm: syz.1.3038 Not tainted 5.15.182-syzkaller #0 [ 467.567643][T13386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 467.577713][T13386] Call Trace: [ 467.580998][T13386] [ 467.583925][T13386] dump_stack_lvl+0x168/0x230 [ 467.588610][T13386] ? show_regs_print_info+0x20/0x20 [ 467.593823][T13386] ? load_image+0x3b0/0x3b0 [ 467.598348][T13386] ? __lock_acquire+0x7c60/0x7c60 [ 467.603384][T13386] ? __might_fault+0x4c/0x110 [ 467.608066][T13386] should_fail+0x38c/0x4c0 [ 467.612587][T13386] _copy_from_user+0x2e/0x170 [ 467.617272][T13386] __sys_bpf+0x21b/0x670 [ 467.621537][T13386] ? bpf_link_show_fdinfo+0x310/0x310 [ 467.626919][T13386] ? vtime_user_exit+0x2dc/0x400 [ 467.631862][T13386] __x64_sys_bpf+0x78/0x90 [ 467.636281][T13386] do_syscall_64+0x4c/0xa0 [ 467.640694][T13386] ? clear_bhb_loop+0x15/0x70 [ 467.645394][T13386] ? clear_bhb_loop+0x15/0x70 [ 467.650091][T13386] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 467.655985][T13386] RIP: 0033:0x7fbab741f969 [ 467.660398][T13386] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 467.680027][T13386] RSP: 002b:00007fbab5287038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 467.688444][T13386] RAX: ffffffffffffffda RBX: 00007fbab7646fa0 RCX: 00007fbab741f969 [ 467.696415][T13386] RDX: 0000000000000050 RSI: 0000200000000640 RDI: 000000000000000a [ 467.704383][T13386] RBP: 00007fbab5287090 R08: 0000000000000000 R09: 0000000000000000 [ 467.712349][T13386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 467.720345][T13386] R13: 0000000000000000 R14: 00007fbab7646fa0 R15: 00007ffefbf3b208 [ 467.728333][T13386] [ 467.771330][T12869] Bluetooth: hci1: command 0x0409 tx timeout [ 467.813652][T13348] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 467.820646][T13348] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 467.929721][T13348] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 468.057474][T13348] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 468.066963][T13348] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 468.129058][T13348] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 468.240031][T13394] netlink: 10 bytes leftover after parsing attributes in process `syz.2.3041'. [ 468.352267][T13401] device syzkaller0 entered promiscuous mode [ 468.737409][T13348] device hsr_slave_0 entered promiscuous mode [ 468.754130][T13348] device hsr_slave_1 entered promiscuous mode [ 468.761014][T13348] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 468.783206][T13348] Cannot create hsr debugfs directory [ 468.789130][T13422] netlink: 830 bytes leftover after parsing attributes in process `syz.1.3044'. [ 469.041924][ T5746] device erspan0 left promiscuous mode [ 469.063659][ T5746] GPL: port 1(erspan0) entered disabled state [ 469.092860][T13433] netlink: 'syz.2.3048': attribute type 10 has an invalid length. [ 469.190021][T13427] netlink: 'syz.0.3046': attribute type 10 has an invalid length. [ 469.242007][T13427] bond0: (slave bond_slave_0): Releasing backup interface [ 469.360186][T13447] FAULT_INJECTION: forcing a failure. [ 469.360186][T13447] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 469.383250][T13447] CPU: 1 PID: 13447 Comm: syz.3.3049 Not tainted 5.15.182-syzkaller #0 [ 469.391663][T13447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 469.401743][T13447] Call Trace: [ 469.405059][T13447] [ 469.408019][T13447] dump_stack_lvl+0x168/0x230 [ 469.412747][T13447] ? show_regs_print_info+0x20/0x20 [ 469.417991][T13447] ? load_image+0x3b0/0x3b0 [ 469.422533][T13447] ? __lock_acquire+0x7c60/0x7c60 [ 469.427614][T13447] should_fail+0x38c/0x4c0 [ 469.432078][T13447] _copy_from_user+0x2e/0x170 [ 469.436806][T13447] kstrtouint_from_user+0xbe/0x200 [ 469.441961][T13447] ? kstrtol_from_user+0x260/0x260 [ 469.447146][T13447] proc_fail_nth_write+0x85/0x1f0 [ 469.452207][T13447] ? proc_fail_nth_read+0x210/0x210 [ 469.457448][T13447] ? common_file_perm+0x171/0x1c0 [ 469.462516][T13447] ? proc_fail_nth_read+0x210/0x210 [ 469.467749][T13447] vfs_write+0x300/0xd00 [ 469.472027][T13447] ? file_end_write+0x250/0x250 [ 469.477064][T13447] ? __fget_files+0x40f/0x480 [ 469.481796][T13447] ? mutex_lock_nested+0x17/0x20 [ 469.486767][T13447] ? __fdget_pos+0x2bf/0x370 [ 469.491394][T13447] ? ksys_write+0x71/0x250 [ 469.495845][T13447] ksys_write+0x14d/0x250 [ 469.500206][T13447] ? __ia32_sys_read+0x80/0x80 [ 469.505044][T13447] ? lockdep_hardirqs_on+0x94/0x140 [ 469.510283][T13447] do_syscall_64+0x4c/0xa0 [ 469.514729][T13447] ? clear_bhb_loop+0x15/0x70 [ 469.519439][T13447] ? clear_bhb_loop+0x15/0x70 [ 469.524149][T13447] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 469.530263][T13447] RIP: 0033:0x7fc30e09a41f [ 469.534882][T13447] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 469.554628][T13447] RSP: 002b:00007fc30bee2030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 469.563206][T13447] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc30e09a41f [ 469.571227][T13447] RDX: 0000000000000001 RSI: 00007fc30bee20a0 RDI: 0000000000000007 [ 469.579236][T13447] RBP: 00007fc30bee2090 R08: 0000000000000000 R09: 0000000000000000 [ 469.587237][T13447] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 469.595234][T13447] R13: 0000000000000000 R14: 00007fc30e2c3080 R15: 00007ffcfc2f2f58 [ 469.603256][T13447] [ 469.833372][T12990] Bluetooth: hci1: command 0x041b tx timeout [ 469.972152][T13449] netlink: 'syz.2.3050': attribute type 33 has an invalid length. [ 470.867082][T13476] device syzkaller0 entered promiscuous mode [ 470.893598][T13482] netlink: 830 bytes leftover after parsing attributes in process `syz.2.3057'. [ 471.032999][T13491] FAULT_INJECTION: forcing a failure. [ 471.032999][T13491] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 471.093282][T13491] CPU: 1 PID: 13491 Comm: syz.0.3060 Not tainted 5.15.182-syzkaller #0 [ 471.101592][T13491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 471.111697][T13491] Call Trace: [ 471.114993][T13491] [ 471.117945][T13491] dump_stack_lvl+0x168/0x230 [ 471.122653][T13491] ? show_regs_print_info+0x20/0x20 [ 471.127873][T13491] ? load_image+0x3b0/0x3b0 [ 471.132394][T13491] ? __lock_acquire+0x7c60/0x7c60 [ 471.137441][T13491] ? __might_fault+0x4c/0x110 [ 471.142149][T13491] should_fail+0x38c/0x4c0 [ 471.146600][T13491] _copy_from_user+0x2e/0x170 [ 471.151324][T13491] __copy_msghdr_from_user+0xaf/0x5e0 [ 471.156820][T13491] ? verify_lock_unused+0x140/0x140 [ 471.162049][T13491] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 471.167365][T13491] ? trace_event_raw_event_lock+0x250/0x250 [ 471.173290][T13491] ___sys_sendmsg+0x156/0x260 [ 471.177999][T13491] ? __sys_sendmsg+0x250/0x250 [ 471.182803][T13491] ? trace_event_raw_event_lock+0x250/0x250 [ 471.188698][T13491] ? vfs_write+0x84d/0xd00 [ 471.193135][T13491] ? __fdget+0x18b/0x210 [ 471.197472][T13491] __se_sys_sendmsg+0x190/0x250 [ 471.202320][T13491] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 471.208488][T13491] ? __x64_sys_sendmsg+0x80/0x80 [ 471.213544][T13491] ? syscall_enter_from_user_mode+0x2a/0x70 [ 471.219445][T13491] do_syscall_64+0x4c/0xa0 [ 471.223995][T13491] ? clear_bhb_loop+0x15/0x70 [ 471.228679][T13491] ? clear_bhb_loop+0x15/0x70 [ 471.233448][T13491] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 471.239442][T13491] RIP: 0033:0x7f2125454969 [ 471.243858][T13491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 471.263480][T13491] RSP: 002b:00007f21232bc038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 471.272122][T13491] RAX: ffffffffffffffda RBX: 00007f212567bfa0 RCX: 00007f2125454969 [ 471.280094][T13491] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000004 [ 471.288066][T13491] RBP: 00007f21232bc090 R08: 0000000000000000 R09: 0000000000000000 [ 471.296042][T13491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 471.304021][T13491] R13: 0000000000000000 R14: 00007f212567bfa0 R15: 00007ffc9302b5d8 [ 471.312050][T13491] [ 471.331168][T13481] netlink: 10 bytes leftover after parsing attributes in process `syz.1.3058'. [ 471.549150][T13348] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 471.583882][T13348] netdevsim netdevsim4 netdevsim1: renamed from eth1 Stopping sshd: [ 471.666632][T13348] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 471.699601][T13348] netdevsim netdevsim4 netdevsim3: renamed from eth3 stopped /usr/sbin/sshd (pid 3941) OK [ 471.913446][T12990] Bluetooth: hci1: command 0x040f tx timeout Stopping crond: [ 472.239183][T13348] 8021q: adding VLAN 0 to HW filter on device bond0 [ 472.325060][ T5746] device hsr_slave_0 left promiscuous mode stopped /usr/sbin/crond (pid 3914) [ 472.386209][ T5746] device hsr_slave_1 left promiscuous mode OK [ 472.410841][ T5746] device veth1_to_team left promiscuous mode [ 472.428735][ T5746] bridge0: port 3(veth1_to_team) entered disabled state [ 472.450616][ T5746] device bridge_slave_1 left promiscuous mode [ 472.469053][ T5746] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.517449][ T5746] device bridge_slave_0 left promiscuous mode [ 472.588206][ T5746] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.769823][ T5746] device veth1_macvtap left promiscuous mode [ 472.868437][ T5746] device veth0_macvtap left promiscuous mode [ 472.934783][ T5746] device veth1_vlan left promiscuous mode [ 473.024487][ T5746] device veth0_vlan left promiscuous mode Stopping dhcpcd... stopped /sbin/dhcpcd (pid 3839) Stopping network: [ 473.580242][ T5746] team0 (unregistering): Port device team_slave_1 removed [ 473.601449][ T5746] team0 (unregistering): Port device team_slave_0 removed [ 473.618097][ T5746] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 473.681065][ T5746] bond0 (unregistering): (slave team0): Releasing backup interface [ 473.712324][ T5746] bond0 (unregistering): Released all slaves [ 473.774334][T13532] netlink: 'syz.0.3068': attribute type 15 has an invalid length. [ 473.782186][T13532] netlink: 176 bytes leftover after parsing attributes in process `syz.0.3068'. [ 473.842662][T13592] netlink: 830 bytes leftover after parsing attributes in process `syz.2.3071'. [ 473.843370][T13606] FAULT_INJECTION: forcing a failure. [ 473.843370][T13606] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 473.864988][T13606] CPU: 1 PID: 13606 Comm: syz.0.3072 Not tainted 5.15.182-syzkaller #0 [ 473.873342][T13606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 473.883417][T13606] Call Trace: [ 473.886709][T13606] [ 473.889656][T13606] dump_stack_lvl+0x168/0x230 [ 473.894375][T13606] ? show_regs_print_info+0x20/0x20 [ 473.899602][T13606] ? load_image+0x3b0/0x3b0 [ 473.904128][T13606] ? __lock_acquire+0x7c60/0x7c60 [ 473.909185][T13606] should_fail+0x38c/0x4c0 [ 473.913632][T13606] _copy_from_user+0x2e/0x170 [ 473.918340][T13606] iovec_from_user+0x142/0x370 [ 473.923139][T13606] __import_iovec+0x70/0x490 [ 473.927770][T13606] import_iovec+0x6f/0xa0 [ 473.932159][T13606] ___sys_sendmsg+0x1b9/0x260 [ 473.936874][T13606] ? __sys_sendmsg+0x250/0x250 [ 473.941673][T13606] ? vfs_write+0x84d/0xd00 [ 473.946125][T13606] ? __fdget+0x18b/0x210 [ 473.950389][T13606] __se_sys_sendmsg+0x190/0x250 [ 473.955267][T13606] ? __x64_sys_sendmsg+0x80/0x80 [ 473.960226][T13606] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 473.963214][T13348] 8021q: adding VLAN 0 to HW filter on device team0 [ 473.966238][T13606] ? lockdep_hardirqs_on+0x94/0x140 [ 473.978011][T13606] do_syscall_64+0x4c/0xa0 [ 473.982452][T13606] ? clear_bhb_loop+0x15/0x70 [ 473.987148][T13606] ? clear_bhb_loop+0x15/0x70 [ 473.991844][T13606] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 473.997759][T13606] RIP: 0033:0x7f2125454969 [ 474.002195][T13606] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 474.021909][T13606] RSP: 002b:00007f21232bc038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 474.030438][T13606] RAX: ffffffffffffffda RBX: 00007f212567bfa0 RCX: 00007f2125454969 [ 474.038437][T13606] RDX: 0000000020000080 RSI: 0000200000001a40 RDI: 0000000000000007 [ 474.046428][T13606] RBP: 00007f21232bc090 R08: 0000000000000000 R09: 0000000000000000 [ 474.054944][T13606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 474.055683][T13348] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 474.062929][T13606] R13: 0000000000000000 R14: 00007f212567bfa0 R15: 00007ffc9302b5d8 [ 474.062963][T13606] [ 474.078830][ T23] Bluetooth: hci1: command 0x0419 tx timeout [ 474.090537][T13348] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 474.123451][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 474.134122][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 474.142404][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 474.164195][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 474.184477][T13584] bridge0: port 1(bridge_slave_0) entered blocking state [ 474.191635][T13584] bridge0: port 1(bridge_slave_0) entered forwarding state [ 474.240663][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 474.379599][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 474.389206][T13584] bridge0: port 2(bridge_slave_1) entered blocking state [ 474.396345][T13584] bridge0: port 2(bridge_slave_1) entered forwarding state [ 474.408650][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 474.424281][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 474.458225][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 474.485524][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 474.543809][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 474.624804][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 474.640545][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 474.649075][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 474.657803][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 474.666378][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 474.823332][T13618] device syzkaller0 entered promiscuous mode [ 474.861936][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 474.889163][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 474.906719][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 475.194498][T13634] pim6reg: tun_chr_ioctl cmd 1074025677 [ 475.200307][T13634] pim6reg: linktype set to 778 OK [ 475.534611][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 475.542196][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 475.631400][T13348] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 475.703865][T13658] netlink: 830 bytes leftover after parsing attributes in process `syz.1.3083'. Stopping iptables: OK [ 475.994307][T13670] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.3085'. Stopping system message bus: [ 476.947983][T13695] device syzkaller0 entered promiscuous mode [ 476.993672][T13697] netlink: 10 bytes leftover after parsing attributes in process `syz.1.3090'. [ 477.012972][T13580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 477.074156][T13580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 477.083621][T13701] FAULT_INJECTION: forcing a failure. [ 477.083621][T13701] name failslab, interval 1, probability 0, space 0, times 0 [ 477.124410][T13701] CPU: 0 PID: 13701 Comm: syz.0.3093 Not tainted 5.15.182-syzkaller #0 [ 477.132699][T13701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 477.142781][T13701] Call Trace: [ 477.146077][T13701] [ 477.149019][T13701] dump_stack_lvl+0x168/0x230 [ 477.153719][T13701] ? show_regs_print_info+0x20/0x20 [ 477.158946][T13701] ? load_image+0x3b0/0x3b0 [ 477.163467][T13701] ? __mutex_lock_common+0x14d8/0x2390 [ 477.168954][T13701] should_fail+0x38c/0x4c0 [ 477.173401][T13701] should_failslab+0x5/0x20 [ 477.177931][T13701] slab_pre_alloc_hook+0x51/0xc0 [ 477.182886][T13701] kmem_cache_alloc_node+0x47/0x2d0 [ 477.188093][T13701] ? __alloc_skb+0xf4/0x750 [ 477.192623][T13701] __alloc_skb+0xf4/0x750 [ 477.196982][T13701] netlink_dump+0x1d5/0xcb0 [ 477.201500][T13701] ? slab_free_freelist_hook+0xea/0x170 [ 477.207065][T13701] ? netlink_lookup+0x1d0/0x1d0 [ 477.211948][T13701] netlink_recvmsg+0x653/0xdb0 [ 477.216731][T13701] ? lock_chain_count+0x20/0x20 [ 477.221633][T13701] ? netlink_sendmsg+0xbc0/0xbc0 [ 477.226585][T13701] ? aa_sk_perm+0x7b4/0x8f0 [ 477.231109][T13701] ? aa_af_perm+0x2b0/0x2b0 [ 477.235634][T13701] ? bpf_lsm_socket_recvmsg+0x5/0x10 [ 477.240945][T13701] ? security_socket_recvmsg+0x85/0xb0 [ 477.246423][T13701] ? netlink_sendmsg+0xbc0/0xbc0 [ 477.251375][T13701] ____sys_recvmsg+0x291/0x580 [ 477.256159][T13701] ? lock_chain_count+0x20/0x20 [ 477.261026][T13701] ? __sys_recvmsg_sock+0x40/0x40 [ 477.266071][T13701] ? import_iovec+0x6f/0xa0 [ 477.270579][T13701] ___sys_recvmsg+0x1af/0x4f0 [ 477.275265][T13701] ? __sys_recvmsg+0x250/0x250 [ 477.280040][T13701] ? trace_event_raw_event_lock+0x250/0x250 [ 477.285932][T13701] ? perf_trace_lock+0xdf/0x370 [ 477.290798][T13701] ? __fdget+0x18b/0x210 [ 477.295041][T13701] __x64_sys_recvmsg+0x1dd/0x2a0 [ 477.299983][T13701] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 477.306146][T13701] ? ___sys_recvmsg+0x4f0/0x4f0 [ 477.311024][T13701] ? syscall_enter_from_user_mode+0x2a/0x70 [ 477.316957][T13701] do_syscall_64+0x4c/0xa0 [ 477.321382][T13701] ? clear_bhb_loop+0x15/0x70 [ 477.326056][T13701] ? clear_bhb_loop+0x15/0x70 [ 477.330731][T13701] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 477.336629][T13701] RIP: 0033:0x7f2125454969 [ 477.341049][T13701] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 477.360658][T13701] RSP: 002b:00007f21232bc038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 477.369070][T13701] RAX: ffffffffffffffda RBX: 00007f212567bfa0 RCX: 00007f2125454969 [ 477.377042][T13701] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000004 [ 477.385011][T13701] RBP: 00007f21232bc090 R08: 0000000000000000 R09: 0000000000000000 [ 477.392987][T13701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 477.400952][T13701] R13: 0000000000000000 R14: 00007f212567bfa0 R15: 00007ffc9302b5d8 [ 477.408932][T13701] done [ 477.934545][T13700] bond0: (slave team0): Error: Slave device does not support XDP [ 477.961914][T13704] netlink: 'syz.3.3094': attribute type 10 has an invalid length. [ 477.992035][T13706] bond0: (slave team0): Error: Slave device does not support XDP [ 478.052808][T13709] netlink: 'syz.2.3095': attribute type 10 has an invalid length. [ 478.157926][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 478.179747][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 478.231141][T13348] device veth0_vlan entered promiscuous mode [ 478.261293][T13718] netlink: 830 bytes leftover after parsing attributes in process `syz.3.3097'. [ 478.307928][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 478.343992][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 478.392227][T13724] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.3099'. [ 478.394227][T13348] device veth1_vlan entered promiscuous mode [ 478.657949][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 478.694982][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 478.714735][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 478.764231][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 478.831651][T13348] device veth0_macvtap entered promiscuous mode [ 478.864330][T13348] device veth1_macvtap entered promiscuous mode [ 478.950308][T13348] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 479.017026][T13348] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 479.072086][T13348] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 Stopping klogd: [ 479.133608][T13348] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 479.192885][T13348] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 479.252109][T13746] bond0: (slave team0): Error: Slave device does not support XDP [ 479.298122][T13751] netlink: 'syz.2.3106': attribute type 10 has an invalid length. [ 479.307140][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 479.318295][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 479.327375][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 479.339771][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 479.361488][T13348] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 OK [ 479.404657][T13348] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! Stopping acpid: [ 479.440688][T13348] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 479.477773][T13348] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 479.520769][T13348] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 479.593799][T13754] device syzkaller0 entered promiscuous mode [ 479.604926][T13762] netlink: 'syz.2.3108': attribute type 10 has an invalid length. [ 479.624348][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 479.639099][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 479.651310][T13348] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 479.664832][T13348] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 479.678358][T13768] FAULT_INJECTION: forcing a failure. [ 479.678358][T13768] name failslab, interval 1, probability 0, space 0, times 0 [ 479.681341][T13348] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 479.705896][T13348] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 479.714974][T13768] CPU: 1 PID: 13768 Comm: syz.0.3110 Not tainted 5.15.182-syzkaller #0 [ 479.723247][T13768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 479.733327][T13768] Call Trace: [ 479.736624][T13768] [ 479.739574][T13768] dump_stack_lvl+0x168/0x230 [ 479.744277][T13768] ? rcu_is_watching+0x11/0xa0 [ 479.749068][T13768] ? show_regs_print_info+0x20/0x20 [ 479.754304][T13768] ? load_image+0x3b0/0x3b0 [ 479.758830][T13768] ? lockdep_hardirqs_on+0x94/0x140 [ 479.764076][T13768] should_fail+0x38c/0x4c0 [ 479.768543][T13768] should_failslab+0x5/0x20 [ 479.773081][T13768] slab_pre_alloc_hook+0x51/0xc0 [ 479.778057][T13768] ? __sys_setsockopt+0x3d6/0x5e0 [ 479.783206][T13768] __kmalloc_track_caller+0x69/0x330 [ 479.788520][T13768] ? __sys_setsockopt+0x3d6/0x5e0 [ 479.793567][T13768] sctp_setsockopt+0x7d/0xf80 [ 479.798257][T13768] ? sock_common_recvmsg+0x1b0/0x1b0 [ 479.803553][T13768] __sys_setsockopt+0x3d6/0x5e0 [ 479.808415][T13768] ? __ia32_sys_recv+0xb0/0xb0 [ 479.814780][T13768] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 479.821039][T13768] ? lock_chain_count+0x20/0x20 [ 479.825899][T13768] ? vtime_user_exit+0x2dc/0x400 [ 479.830853][T13768] __x64_sys_setsockopt+0xb1/0xc0 [ 479.835972][T13768] do_syscall_64+0x4c/0xa0 [ 479.840397][T13768] ? clear_bhb_loop+0x15/0x70 [ 479.845075][T13768] ? clear_bhb_loop+0x15/0x70 [ 479.849755][T13768] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 479.855745][T13768] RIP: 0033:0x7f2125454969 [ 479.860157][T13768] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 479.879755][T13768] RSP: 002b:00007f21232bc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 479.888169][T13768] RAX: ffffffffffffffda RBX: 00007f212567bfa0 RCX: 00007f2125454969 [ 479.896141][T13768] RDX: 0000000000000014 RSI: 0000000000000084 RDI: 0000000000000004 [ 479.904107][T13768] RBP: 00007f21232bc090 R08: 0000000000000004 R09: 0000000000000000 [ 479.912159][T13768] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 479.920130][T13768] R13: 0000000000000000 R14: 00007f212567bfa0 R15: 00007ffc9302b5d8 [ 479.928114][T13768] [ 480.145910][T13770] netlink: 830 bytes leftover after parsing attributes in process `syz.2.3111'. [ 480.186812][T13584] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 480.205711][T13775] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.3113'. [ 480.219509][T13584] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 480.259168][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 480.356159][ T4242] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 480.455148][T13782] sctp: [Deprecated]: syz.2.3115 (pid 13782) Use of int in max_burst socket option deprecated. [ 480.455148][T13782] Use struct sctp_assoc_value instead [ 480.455583][ T4242] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 480.518423][T13584] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 480.665742][T13787] netlink: 830 bytes leftover after parsing attributes in process `syz.1.3118'. [ 480.696657][T13792] netlink: 'syz.4.3026': attribute type 4 has an invalid length. [ 480.739543][T13795] netlink: 4595 bytes leftover after parsing attributes in process `syz.3.3117'. [ 480.803994][T13795] netlink: 'syz.3.3117': attribute type 3 has an invalid length. [ 480.811889][T13795] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.3117'. [ 480.854437][T13797] netlink: 129384 bytes leftover after parsing attributes in process `syz.4.3026'. OK [ 480.982438][T13801] netlink: 'syz.4.3026': attribute type 3 has an invalid length. [ 481.023556][T13801] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.3026'. [ 481.163004][T13802] netlink: 'syz.1.3121': attribute type 10 has an invalid length. Stopping syslogd: stopped /sbin/syslogd (pid 3528) OK [ 481.433989][T13818] device syzkaller0 entered promiscuous mode [ 481.500207][T13818] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 481.584152][T13815] netlink: 830 bytes leftover after parsing attributes in process `syz.1.3124'. [ 481.693231][T13819] netlink: 10 bytes leftover after parsing attributes in process `syz.3.3123'. [ 482.023526][T13831] netlink: 'syz.0.3128': attribute type 10 has an invalid length. umount: can't remount debugfs re[ 482.136237][T13844] netlink: 830 bytes leftover after parsing attributes in process `syz.3.3130'. ad-only [ 482.291582][T13811] chnl_net:caif_netlink_parms(): no params data found [ 482.449936][T13854] netlink: 'syz.0.3132': attribute type 10 has an invalid length. [ 482.611608][T13811] bridge0: port 1(bridge_slave_0) entered blocking state [ 482.649620][T13811] bridge0: port 1(bridge_slave_0) entered disabled state [ 482.680680][T13811] device bridge_slave_0 entered promiscuous mode [ 482.738951][T13811] bridge0: port 2(bridge_slave_1) entered blocking state [ 482.823299][T13811] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.905251][T13811] device bridge_slave_1 entered promiscuous mode [ 482.991804][T13811] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 483.055098][T13811] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 483.134832][T13895] syzkaller0: create flow: hash 1842379732 index 1 [ 483.169607][ T4253] syzkaller0: tun_net_xmit 76 [ 483.174888][ T4253] syzkaller0: tun_net_xmit 48 [ 483.198832][ T13] syzkaller0: tun_net_xmit 76 [ 483.209318][T13896] netlink: 830 bytes leftover after parsing attributes in process `syz.4.3139'. [ 483.252204][T13888] syzkaller0: delete flow: hash 1842379732 index 1 [ 483.296566][T13893] FAULT_INJECTION: forcing a failure. [ 483.296566][T13893] name failslab, interval 1, probability 0, space 0, times 0 [ 483.313352][T13893] CPU: 1 PID: 13893 Comm: syz.3.3138 Not tainted 5.15.182-syzkaller #0 [ 483.321656][T13893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 483.331722][T13893] Call Trace: [ 483.335032][T13893] [ 483.337981][T13893] dump_stack_lvl+0x168/0x230 [ 483.342680][T13893] ? show_regs_print_info+0x20/0x20 [ 483.347897][T13893] ? load_image+0x3b0/0x3b0 [ 483.352477][T13893] ? __might_sleep+0xf0/0xf0 [ 483.357095][T13893] ? __lock_acquire+0x7c60/0x7c60 [ 483.362160][T13893] should_fail+0x38c/0x4c0 [ 483.366625][T13893] should_failslab+0x5/0x20 [ 483.371154][T13893] slab_pre_alloc_hook+0x51/0xc0 [ 483.376126][T13893] kmem_cache_alloc_node+0x47/0x2d0 [ 483.381355][T13893] ? __alloc_skb+0xf4/0x750 [ 483.385902][T13893] __alloc_skb+0xf4/0x750 [ 483.390275][T13893] alloc_skb_with_frags+0xa7/0x730 [ 483.395416][T13893] ? __lock_acquire+0x7c60/0x7c60 [ 483.400487][T13893] sock_alloc_send_pskb+0x853/0x980 [ 483.405711][T13893] ? __might_fault+0xb3/0x110 [ 483.410454][T13893] ? sock_kzfree_s+0x50/0x50 [ 483.415259][T13893] ? iov_iter_advance+0x202/0x390 [ 483.420339][T13893] tun_get_user+0x856/0x38d0 [ 483.424968][T13893] ? perf_trace_lock+0x2ec/0x370 [ 483.429980][T13893] ? tun_ring_recv+0xc30/0xc30 [ 483.434794][T13893] ? rcu_lock_release+0x5/0x20 [ 483.439598][T13893] ? __lock_acquire+0x7c60/0x7c60 [ 483.444655][T13893] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 483.450522][T13893] tun_chr_write_iter+0x112/0x1e0 [ 483.455581][T13893] vfs_write+0x712/0xd00 [ 483.459872][T13893] ? file_end_write+0x250/0x250 [ 483.464771][T13893] ? __fget_files+0x40f/0x480 [ 483.469487][T13893] ? __fdget_pos+0x1e2/0x370 [ 483.474084][T13893] ? ksys_write+0x71/0x250 [ 483.478511][T13893] ksys_write+0x14d/0x250 [ 483.482848][T13893] ? __ia32_sys_read+0x80/0x80 [ 483.487627][T13893] ? lockdep_hardirqs_on+0x94/0x140 [ 483.492837][T13893] do_syscall_64+0x4c/0xa0 [ 483.497254][T13893] ? clear_bhb_loop+0x15/0x70 [ 483.501929][T13893] ? clear_bhb_loop+0x15/0x70 [ 483.506636][T13893] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 483.512537][T13893] RIP: 0033:0x7fc30e09b969 [ 483.516974][T13893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 483.538539][T13893] RSP: 002b:00007fc30bf03038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 483.547113][T13893] RAX: ffffffffffffffda RBX: 00007fc30e2c2fa0 RCX: 00007fc30e09b969 [ 483.555103][T13893] RDX: 000000000000ffdd RSI: 0000200000000840 RDI: 0000000000000003 [ 483.563084][T13893] RBP: 00007fc30bf03090 R08: 0000000000000000 R09: 0000000000000000 [ 483.571091][T13893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 483.579064][T13893] R13: 0000000000000000 R14: 00007fc30e2c2fa0 R15: 00007ffcfc2f2f58 [ 483.587084][T13893] [ 483.601405][ T23] Bluetooth: hci0: command 0x0409 tx timeout [ 483.643038][T13811] team0: Port device team_slave_0 added [ 483.750432][T13811] team0: Port device team_slave_1 added [ 483.757548][ T13] syzkaller0: tun_net_xmit 76 [ 483.762420][ T13] syzkaller0: tun_net_xmit 48 [ 483.823206][T12990] syzkaller0: tun_net_xmit 76 [ 483.972270][T13904] netlink: 830 bytes leftover after parsing attributes in process `syz.1.3142'. [ 483.992275][T13811] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 484.003279][T13811] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 484.036539][T13811] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 484.061103][T13811] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 484.082093][T13811] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 484.114308][T13811] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only The system is going down NOW! Connection to 10.128.0.212 closed by remote host. Sent SIGTERM to all processes [ 484.936337][T13811] ODEBUG: Out of memory. ODEBUG disabled [ 485.049121][ T4239] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 485.202279][ T4239] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 485.269562][ T4239] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 485.351787][ T4239] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Sent SIGKILL to all processes Requesting system poweroff [ 486.118621][ T4239] device hsr_slave_0 left promiscuous mode [ 486.125029][ T4239] device hsr_slave_1 left promiscuous mode [ 486.131329][ T4239] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 486.138848][ T4239] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 486.146734][ T4239] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 486.155712][ T4239] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 486.164061][ T4239] device bridge_slave_1 left promiscuous mode [ 486.170262][ T4239] bridge0: port 2(bridge_slave_1) entered disabled state [ 486.179225][ T4239] device bridge_slave_0 left promiscuous mode [ 486.186341][ T4239] bridge0: port 1(bridge_slave_0) entered disabled state [ 486.198783][ T4239] device veth1_macvtap left promiscuous mode [ 486.205019][ T4239] device veth0_macvtap left promiscuous mode [ 486.211044][ T4239] device veth1_vlan left promiscuous mode [ 486.216919][ T4239] device veth0_vlan left promiscuous mode [ 486.374396][ T4239] team0 (unregistering): Port device team_slave_1 removed [ 486.388584][ T4239] team0 (unregistering): Port device team_slave_0 removed [ 486.402509][ T4239] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 486.469147][ T4239] bond0 (unregistering): Released all slaves [ 486.522891][T13913] kvm: exiting hardware virtualization [ 486.541429][T13913] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 486.551784][T13913] ACPI: PM: Preparing to enter system sleep state S5 [ 486.561124][T13913] reboot: Power down serialport: VM disconnected.