last executing test programs: 7.704582948s ago: executing program 3 (id=2811): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x90, &(0x7f0000001000)=ANY=[@ANYBLOB="61158c000000000061138c0000000000bfa00000000000001503000008004e002d3501000000000095004100000000006916000000000000bf67000000000000350605000fff07206706000005000000160302000ee60060bf500000000000000f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffbd4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe01c5473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc2300000008ac86d8a297dff0445a15f21dce4de9f29eff65aadc841848c9b562a31e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076ebae3f55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932c9a6aa57f1ad2e99e0e67ab93716d20000009fbb0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000207b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000f4000000000000000000000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c6939628950000000000000001c7205a6b068fff496d2da7d632bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b30410856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db88aa3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fb9fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff010404faf0a4da65396174b4563d54b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202ee1192b81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2b517dc4a29b9b5a8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da23c00d9ef418cf19e7a8c4c328be0ce95798adc2dca871073f6bd61dc18487b6feb89752cd600000000abc86b94f8cbde4d470667bee722a6a2af483ad0d3415ed0f9db059acaba9eaea93f811d434e00000000000000000000d154ba10a8e51489a614e69722bac30000000000000000000000000000c5dfd188ff555285b9743d3aac000583f42d168613151d681a2f71373f20d92c9048407c91fabecfe8b3f2d5454d127edab14ba61ba1cfc4336324c86f3dcb43e9a58208077e90f6ec1c7ac756f61dcc372cdd30b82507489f0bbfbd3c3f21752e81319c0161e154ceb16e00bc7f5a6962dff317f4d014786e432817064874d69a39cb0da31bcc5f81894d8a80756447322207b4007dff12eb95066cc6bc256f0a12282224d718b06ca80b57aa183dd0c3eee45891441f2b89b4c67aa9882281393954972046974f18df232cd7fca610e33f51c2d062020f403d85ff36c26e2f6bd1d82f4d3ceb3472d9a77e0057a3bfe697d9ab7585f4a1b381343d2cf855689232f4fc5135790662dc1419a374be9d7b3e5be2886d23add90d862f1a682ff11c798e338af3e5bb0f9d3952b15bf3e0c618c89d20ca1e18a031397693bf3cfbd8417e5b55e641c898c280356f2da222d5d68919d98158578dcf18efa404e508bcbbb8cfcf70086821ebdf34c9a1dff45af873df904c2bdbef81f246d26f4b40df949e12bdac18533d4e11c608cc31d60cb591c40a7b386fa1c753336d7220a35118d4919b45eff32aab684e62c6691de14e97aa7e9dc8ecf0cd50540246d2b746e41e5b4e2c095039dfe0f71db6265f7580d098be40ef36faee5d1695830d4242a23e541e6ce9fa1998d8961cf4fe3c8e8fbb566f148c8befc229614a4b7f80d237b8abc6fd0407de31d6e5532f360d379f20f054692b47207922fe6c14eba96c9a7ae906abc1ae1ae8c4fae92883cfa1978a04bbff4bbe0000000000000000000000000044585397feaadda3fcc64e7b0c08f7ac5c64cb190f1712a3b10fc34eb758705f1751d8c8b712eb39d2b8ad44f129c2c9aedb15"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 7.334942615s ago: executing program 3 (id=2813): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="05000000050000000200000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b703000000000000850000002d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f00000005c0)=""/258, 0x26, 0x102, 0x1}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000180)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_val, @exit]}, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x3}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x3a, 0x3, 0x6, 0xf, 0x20, r1, 0x80, '\x00', 0x0, r2, 0x1, 0x5, 0x4}, 0x50) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x4046fa, 0x5, 0xfffe, 0x0, 0x0, 0x0, 0x8000004000000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2a, 0x2, 0x0) sendmsg$inet(r3, &(0x7f0000000640)={&(0x7f0000000000)={0x2a, 0x0, @rand_addr=0x1000000}, 0x10, 0x0}, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 6.828854843s ago: executing program 3 (id=2815): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000340)={&(0x7f0000000e80)="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", &(0x7f0000000600)=""/240, 0x0, &(0x7f00000007c0)="7255898943f932a461cf955ff775303adf177553020050a05f9a313ed4e5ccdb6977ea813a31bfefbb6e8dd2d55ca9cc658de80f8f315693b05c0ef93453182e4e7e11b4e087f8ba10f8e7150900b658f12f03d2cabd2c92f3ca368bd5900a4154b4ae76fb478196498123582fa1f33fe97efc000000000000", 0xff, r0, 0x4}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000015c0)={&(0x7f0000001480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x1}]}, {0x0, [0x61, 0x25]}}, &(0x7f00000014c0)=""/224, 0x28, 0xe0, 0x1}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40841, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid\x00') ioctl$TUNSETNOCSUM(r4, 0xb702, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0x8, 0x6, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r5}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r5, &(0x7f00000000c0)="fd9899be4b65982f830c79bfd1e93090f6d5067cc9b8fc1d307ed17c6a900a7c4b46c6930a4210bd8c5affe5fda3ed", &(0x7f0000000140)=""/123}, 0x20) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="d8000000180081064e81f782db4cb904021d0800fd027c05e8fe55a10a0006000140020203600e41b0000900ac00060311000000a4000500000080000004015c3b61c1d67f6f94007134cf6efb8000a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9000000008af26c8b7b55f4d3a6823a45f28fcb1d", 0xd8}], 0x1}, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_pid(r7, &(0x7f0000000480), 0x12) setsockopt$sock_attach_bpf(r2, 0x29, 0x3c, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000500), 0x4) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r8 = socket$kcm(0x2, 0xa, 0x2) ioctl$TUNSETLINK(r1, 0x400454cd, 0x336) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) close(r1) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 5.782708411s ago: executing program 3 (id=2827): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800"/12], &(0x7f0000000000)='syzkaller\x00'}, 0x94) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x200, 0x80220, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x411, 0x1, 0xb, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x4, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x0, @perf_config_ext={0x3, 0x8001}, 0x0, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800"/16], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x1010, 0x0, 0x0, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000540)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x5411, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x5761, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x7, &(0x7f0000000200), 0x4) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r4, 0x0, 0x2, 0x0) openat$cgroup_procs(r4, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) socket$kcm(0x29, 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r8 = openat$cgroup_devices(r7, 0x0, 0x2, 0x0) write$cgroup_devices(r8, &(0x7f0000000080)=ANY=[], 0xe) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) socketpair(0x3, 0x0, 0xfffffff9, &(0x7f0000000240)) 5.619014094s ago: executing program 3 (id=2832): sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/31], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x2}, 0x1010, 0x0, 0x0, 0x2, 0x1, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000080)={0x2, 0x4e1f, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000300)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x35}, @initdev={0xac, 0x1e, 0x1, 0x0}}}}], 0x20}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xd}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0xd, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000062010400000000009500000000000000601e3c02000000000000002b6031fa9e2c27dbcd5de1fbd474cad25d772042470bd06d56427b88423758043a247221b996ff2cdf099d23763c3170c8fcd31394e9d27069ae331bee52a5773bb3fa8e930cf3ab4f7ff1929223ed194b69fe3660d58cc616a9cb7a93f14b50dfbb60e439158c56a2ba843885547d181bf5a32797d463cd25a73ec8e50065da5d19f5ee2cf098b30d3962fc0619ce"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x90) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000300)="2e00000010008188040f80ec59acbc0413a181004000000001000000000000000e000a000d00000002800200121f", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) 4.927127365s ago: executing program 3 (id=2834): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/31], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x2}, 0x1010, 0x0, 0x0, 0x2, 0x1, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000080)={0x2, 0x4e1f, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000300)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x35}, @initdev={0xac, 0x1e, 0x1, 0x0}}}}], 0x20}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xd}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0xd, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000062010400000000009500000000000000601e3c02000000000000002b6031fa9e2c27dbcd5de1fbd474cad25d772042470bd06d56427b88423758043a247221b996ff2cdf099d23763c3170c8fcd31394e9d27069ae331bee52a5773bb3fa8e930cf3ab4f7ff1929223ed194b69fe3660d58cc616a9cb7a93f14b50dfbb60e439158c56a2ba843885547d181bf5a32797d463cd25a73ec8e50065da5d19f5ee2cf098b30d3962fc0619ce"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x90) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000300)="2e00000010008188040f80ec59acbc0413a181004000000001000000000000000e000a000d00000002800200121f", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) 2.30925866s ago: executing program 2 (id=2853): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000005c31, 0x410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffd, 0x0, 0x10000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001380)) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1d, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x4}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'team_slave_0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000002c0)={0x9, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000300)=r3, 0x4) openat$cgroup_ro(r2, &(0x7f0000000280)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="b702000003460200bfa30000000000001702000000feffff7a0af0ff14ffffff79a4f0ff00000000b7060000ff0800007e640200000000005502faff037202000404000001007d60a6040000001000006a0a58fe39000f00850000005b000000bc600000000000009500000000000000a81bbfa32d51a7d0679fd43041097666ab982de7b0efc5733ed236e4add6de094e0832aaa6912a8b2ce571c4580034fb000000e3a94bd24d2eb3860d808922433e3e0f242a46b3009a54f4077db0d4968a384b0559c7919b893d3b72cd6c832e986440ff0a7e8620cb231ccd00000000000000000000007777e2704653f620b2272c3c7fea60491073847c4b7bbaed91f33fb382d91ae8e18c9b6c9f0322ec5f1c7cc5869ff455896712198c4e2ddf8b86e714229527ca40b24cfd6a1f00e891728807982d90e116bba29bb70900000000000000c63ad2e7402f9cb424ac416e66af9ebbfea905d37cf226312cb81ec8439cea06e7fa5e5b3596301460142f83b464d9e57dfdb06dcf9101000100130033d649d2110cf2e1f4682c24a314447c5e0807f0b1766ebdecbd061772daa52a38539295d3fea7a7e669441e1ff04114dfa904fb43897f8d9c3c287acba716973eadf1bf9cd0a38edc345415c42d3d2dd3339d32a5796cbe8925efd0c81af69a3e97588878d7ce18b68bc37e061d33357d6a39d33c702576cc2a8891663e3776c7a37c5c962e12102f237bbf60c0a3bf07d55b3888418de2b2ad23d25395dd4ccddf247dd2c712e2e2eaf7d432e968122cc5dcaa7ba330963b7093a58a02dba114f75e1ffd5c2912b506bfb93122fc776aadec51a367658100000000000000b148a90000000000a2a283801ff218538cb12c72b56ffb6b7a062581ec749f5700000000009f1f5ab2e02739ccd50523d3360300005cbeaf95c7d797d6e094c4a3aee025bf43cebde7e7cdbae9b1698e19eb0e6d5244c1ffb0e97628a88a5e37032f1e8f6c893e514f2b3e1028cd404a1d8fe6569da0385e65e4d523166c4213abb8dae5b1409317f29572e788af92aedb0287f2816e301fc8a24dba6fca8b270d44fe65e7bd90a5fc16387bcb5e3df18d7d2a33c72cfda827b8926a6dc6bc19ce398cb8fe48b11b7f93e6fdfb040283c9627bd40909ee4307c4197b15797af17845fbc02846d2f8543f65594cb535a9598eb067b21111dbaa58b19a52f3f12880128d08eb477ad349ca214bc7f80000000000ffb52da89cff41552996e20a585c7d265bd749eeba040fa7111c84142757709d7c475fac2839beb833327db41c6b647c7ee9ad419a6c68dd5c2ce4fa23c280518fc6e54d1b055cae5492e8c4cdd314a49631a15de2bffc920dd74e670794acec7a9da17d809bf956f1af51cf3c0711792d3071dfdaec3c66053cdb00028f6fba8da8f53de39a5999e56fc26ae866674627c8a53d3fd245050060ed40782d1d98bf1e1f5dfd4d1fb399624c12732e300818b222ce029ce01055f941721226e3e5f05d2837240f8f6831b6ef2a02ec64aae1eea9cfac06d8b7042e8ebdc6cb0d4a140e1e631d06afc99d397c5b67b290344e347c953806b298f288884335f624378b3748a4a86bbd0a62127b2c28ce3737661b98bd45965b537ece7bd4e365ffd5567df4d02034c8d488a49c6fb1a0a02eaab2f271d3a14e44211e4ff602d146f72355972860bdd14719d65301964d022819b75696ce47534c9d989d69a445095ff8fbebd2c84635acc333f2aca4623cfe9f9e6c3f9fbb4374c08e1be5eec12c329a87d335fd7a52a4e4e7c2e57fa2f0df9500347b300f84230783cb665f3fa44f5d6fa987aa93c2619ef4977f9e4d38adec323778f3bc987533ffd85fe5417398a3001b394fccbd2faee83b5e2b8a2dd18cf067b619a82c4706531b3ef336a84e825c63b9bc7b98b4ad6a471692224adef86f4c9930169dfa133e22929d5a27e10bfbcfe7c02ca451afd74d26f489e0e09cf1b596ae0c959cf26cb0c8114a9311b7f2fe2ad977074ff5f62f6777a20700414ed03ba3d7404eadd43a62ad1173491a5c099290393e1f85aeb3886fbb7f6646212054a850d58a71c6d6027cd3a5ff22e98672349f9bddb23622e2f19b39e51ced84524567ec1fcb233a2fb85371e9b08b6fd4adcd4db148ed26757123a0e604bcf6ffdcc303956e1805f1746361bd3eeb55d3fefe6ac274c2e6c78963430118942d62a465698e600dadd81a53ffd29358746e8db2499e3fca62b0ff660b0aaeedadeb194a9217e9fed2ce04cc24451871d5bcd76173ab7123cc27eef33dbb4d3c3bf1fc2df68a98345c15667388c5000000000000000000000015000000c0459f900702908d4979288d06c7159ef2663dc7ea9302b10bf2da21e3990ddf20a38adc1fd15124310daf2461224cfbfd5e6265d012d60fc9e39209ce3209720f8d7bf39bf71d0d46ed6d51eede797da70cf0b7463cffc80a7a56eeb25ed0adfb146a3221c20d51f172cf2eefe1e6b28cffc1e40a789d5513626f5c4fbf65a2b5a093634b806b7ee570f70f624ce8c02d4c1ec7a9370f42a807f1d46fe77be0637a8007343b7771788f64b36cab94a99243bc780702f98f34a80f81aeb853f97c3e9586805d1a240d7e870b15defbc6b21fdc98a79759c9b8375313deea0000000009e38e9539d6b9507b6f3f8d29992d080a13aed8879a1f2cf352fb5a376427f89d432f7fe7c0cad2ce38427fc773cef47e00000000000000000000000000000000000d09b8ee6321377ffcb6cc386f8704ae9ce6c11b4bb91d0097ef2b77e0cd28af1222e68c2745eca64fa40db07f6e5925224069d14395f7170ab9c2d396f7510f65ce5b0405d8951a70a37117d13c5b2f684c52bff2dc895f5e06e497adee9de0012dd140c592137c90319f8a578007b57aaba3fb93d29a6584313e5b58f8a71cebf77a0891f3633dba69588ec728e785e6e4431fce5a143451c7a51c22b1b605347db811eb9a461f4ef2612181aa8cafc33a2047b7ba57a5"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040), 0x2a, 0x0, 0xffffffffffffffff, 0x37}, 0x24) 2.118228114s ago: executing program 2 (id=2856): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="ff000000000000000400000000000000850000001100000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x1a, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec2, 0x0, 0x0, 0x0}, 0x94) 1.890052358s ago: executing program 2 (id=2859): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/31], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x2}, 0x1010, 0x0, 0x0, 0x2, 0x1, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000080)={0x2, 0x4e1f, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000300)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x35}, @initdev={0xac, 0x1e, 0x1, 0x0}}}}], 0x20}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xd}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0xd, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000062010400000000009500000000000000601e3c02000000000000002b6031fa9e2c27dbcd5de1fbd474cad25d772042470bd06d56427b88423758043a247221b996ff2cdf099d23763c3170c8fcd31394e9d27069ae331bee52a5773bb3fa8e930cf3ab4f7ff1929223ed194b69fe3660d58cc616a9cb7a93f14b50dfbb60e439158c56a2ba843885547d181bf5a32797d463cd25a73ec8e50065da5d19f5ee2cf098b30d3962fc0619ce"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x90) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000300)="2e00000010008188040f80ec59acbc0413a181004000000001000000000000000e000a000d00000002800200121f", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) 1.830750319s ago: executing program 2 (id=2861): perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80340, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xe869}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000c40)="c10e020022003505d25a806f8c6394f90435fc60040011000a740100053582c137153e37024801", 0x27}], 0x1}, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030020000b12d25a80648c2594f90124fc60100c074002000000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 1.692002901s ago: executing program 0 (id=2864): perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80340, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xe869}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000c40)="c10e020022003505d25a806f8c6394f90435fc60040011000a740100053582c137153e37024801", 0x27}], 0x1}, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000100000000", @ANYRES32=0x1], 0x50) r1 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8916, &(0x7f0000000000)) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030020000b12d25a80648c2594f90124fc60100c074002000000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 1.552123164s ago: executing program 0 (id=2865): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f00000010c0)) r1 = socket$kcm(0x10, 0x2, 0x4) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$LINK_DETACH(0x22, &(0x7f0000000080)=r2, 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000003c0)="89000000120081ae08060cdc030000007f1be3f74001000000e2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c00014009080c00000000009bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 1.551570213s ago: executing program 2 (id=2866): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000005c31, 0x410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffd, 0x0, 0x10000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001380)) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1d, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x4}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'team_slave_0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000002c0)={0x9, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000300)=r3, 0x4) openat$cgroup_ro(r2, &(0x7f0000000280)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040), 0x2a, 0x0, 0xffffffffffffffff, 0x37}, 0x24) 1.485092295s ago: executing program 4 (id=2868): perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$kcm(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x18) sendmsg$inet(r0, &(0x7f0000000900)={&(0x7f0000000500)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000880)=[{&(0x7f0000000540)="e8691a913b", 0x2ec0}, {0x0, 0x2900}], 0x2, &(0x7f00000008c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @rand_addr=0x64010101}}}], 0x38}, 0x0) 1.400689466s ago: executing program 4 (id=2869): perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80340, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xe869}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000c40)="c10e020022003505d25a806f8c6394f90435fc60040011000a740100053582c137153e37024801", 0x27}], 0x1}, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030020000b12d25a80648c2594f90124fc60100c074002000000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 3) 986.793483ms ago: executing program 1 (id=2870): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02000000040000000844000001"], 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x6, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018200000", @ANYRES32=r0, @ANYBLOB="0000000000000000c3000040000000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xd2, &(0x7f0000000080)=""/210}, 0x54) socket$kcm(0x29, 0x4, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x2, 0x0, 0x0, 0x0, 0x9, 0x80410, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x8, 0x100000001}, 0x880, 0x800, 0x0, 0x6, 0x4, 0x3, 0xffff, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x80087601, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x8000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0700000004000000080000000300000014000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00 \v\x00'/28], 0x48) close(r3) ioctl$SIOCSIFHWADDR(r3, 0x8b1b, &(0x7f0000000000)={'wlan1\x00', @local}) setsockopt$sock_attach_bpf(r1, 0x29, 0x2d, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = gettid() r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000300000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00b900"/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r7}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000500), 0x0, 0x3, r7}, 0x38) sendmsg$unix(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000640)='Q;', 0x2}], 0x1, &(0x7f0000001040)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r5, @ANYRES32=r4, @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="1c000000000000000100000402000000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r4, @ANYBLOB="0000000018"], 0xa0}, 0x4004881) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r8, &(0x7f0000000080)=ANY=[@ANYBLOB="180000007200911fdabcf8b307"], 0xfe33) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xe, 0x2, 0x1, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r10 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[@ANYBLOB="36400000260091"], 0xfe33) ioctl$TUNSETOFFLOAD(r9, 0x400454c9, 0x13) 934.775924ms ago: executing program 0 (id=2871): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x202, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7ff0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x2, @perf_bp={&(0x7f0000000380), 0x4}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x1000000, 0x200, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gretap0\x00', 0x400}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000600), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000080000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='notify_on_release\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0x3ff, 0x12) mkdirat$cgroup(r1, &(0x7f00000000c0)='syz1\x00', 0x1ff) 799.873686ms ago: executing program 0 (id=2872): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/31], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x2}, 0x1010, 0x0, 0x0, 0x2, 0x1, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000080)={0x2, 0x4e1f, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000300)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x35}, @initdev={0xac, 0x1e, 0x1, 0x0}}}}], 0x20}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xd}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0xd, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000062010400000000009500000000000000601e3c02000000000000002b6031fa9e2c27dbcd5de1fbd474cad25d772042470bd06d56427b88423758043a247221b996ff2cdf099d23763c3170c8fcd31394e9d27069ae331bee52a5773bb3fa8e930cf3ab4f7ff1929223ed194b69fe3660d58cc616a9cb7a93f14b50dfbb60e439158c56a2ba843885547d181bf5a32797d463cd25a73ec8e50065da5d19f5ee2cf098b30d3962fc0619ce"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x90) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000300)="2e00000010008188040f80ec59acbc0413a181004000000001000000000000000e000a000d00000002800200121f", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) 718.782768ms ago: executing program 4 (id=2873): r0 = socket$kcm(0x10, 0x400000002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='N-N:N/N'], 0x6a) (async) recvmsg$kcm(r0, &(0x7f0000006480)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000014c0)=""/4085, 0xff5}, {&(0x7f0000006280)=""/108, 0x6c}, {&(0x7f00000008c0)=""/200, 0xc8}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000a00)=""/97, 0x61}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000340)=""/44, 0x2c}], 0x7}, 0x40) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="3fb896d7044aab7ccc59c13f9da6c43b03c94c816a933bf0a2b9e954a124b6df6527c3371076e1841d155d65fdcc0ef415be4a2c8714c1f5151bba4d39d1dcc3762f5dbdda0576646a6a9eca6c500fb536270d396942081aadc69cc47e2ee5cf9aebd975cdc47388d5daa4dce456cc012fccf75c8b5b9260344fb7c5ed778fd95e8a37664a51327bd6182e1b581627565173a5acc0d104b04e3d7840d99836acc5f4be53f04106037b"}, {&(0x7f00000004c0)="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"}], 0x1}, 0x36e1d148081bbc40) 718.569698ms ago: executing program 4 (id=2874): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000011c0)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/31], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x2}, 0x1010, 0x0, 0x0, 0x2, 0x1, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000080)={0x2, 0x4e1f, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000300)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x35}, @initdev={0xac, 0x1e, 0x1, 0x0}}}}], 0x20}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xd}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0xd, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000062010400000000009500000000000000601e3c02000000000000002b6031fa9e2c27dbcd5de1fbd474cad25d772042470bd06d56427b88423758043a247221b996ff2cdf099d23763c3170c8fcd31394e9d27069ae331bee52a5773bb3fa8e930cf3ab4f7ff1929223ed194b69fe3660d58cc616a9cb7a93f14b50dfbb60e439158c56a2ba843885547d181bf5a32797d463cd25a73ec8e50065da5d19f5ee2cf098b30d3962fc0619ce"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x90) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000300)="2e00000010008188040f80ec59acbc0413a181004000000001000000000000000e000a000d00000002800200121f", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) 654.177819ms ago: executing program 0 (id=2875): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x20000}, 0x0, 0x0, 0x0, 0x6, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a0300fef0ffffff79a4f0ff00000000b7060000ffffffff2e64050000000000750afaff07cd02020404000000247d60b7030000030a00006a0a00fe0000000c8500000011000000b70000000000002995000000000000001da5ad3548ebb63d18c5071c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f0e5eb09d38ac46e99e7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8ef534b93dcb34e1da2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa380700000000000000c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82e3568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000500000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac64d9c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccfd8b129258bb0a93cee1d44f8665172c06933d20f184b78b435462c52a85149451ffd564c56a7cbf11a1127c77242915e43b2bc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) (fail_nth: 3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0xfffffffffffffffe, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @loopback, 0x2, 0x1}, 0x80, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x541b, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x13, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x9, 0x1, 0x68}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0x5, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x61}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 646.682579ms ago: executing program 2 (id=2876): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)}], 0x1}, 0x80801) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x8, 0x100000000}, 0x880, 0x9, 0xfffffffa, 0x0, 0xc, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r2}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2663}, 0x0) r6 = socket$kcm(0xa, 0x6, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x5411, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8b04, &(0x7f0000000000)={'wlan1\x00', @random="0200"}) r8 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg$kcm(r8, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x60) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000002940)="2000000020008107090f9becdb4cb96b0200000000fbff0100000000000000", 0x1f}], 0x1, 0x0, 0x0, 0x81000000}, 0x4) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 570.40546ms ago: executing program 1 (id=2877): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x72, 0xfe, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async, rerun: 64) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d2f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x101000, 0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) (rerun: 32) close(r0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000740)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) (async) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x22fe0}], 0x1}, 0x0) recvmsg$unix(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)=""/229, 0xe5}], 0x1}, 0x2) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4810) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_bp={0x0, 0xb}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x2, 0x1, &(0x7f0000000000)) (async) r6 = socket$kcm(0x29, 0x2, 0x0) close(r6) (async) r7 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) close(r7) (async) r8 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r8, &(0x7f00000007c0)={&(0x7f0000000040)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000000900)=[{&(0x7f0000000080)="92", 0x1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="2400000000000000840000000700000044140823e000000200000002e00000010000100000000000dc00000000000000000000000700000094040000863900000001000cb2ffb69602013567ffcb060f19367d2b99bdc0f59e428bc33a050a3660f2bb77c7045b050a31efe0215e235d56060495ae0144243471ac14142700000006ac1414bb00000001ac1414bb0000ffff0a01010200000009009404010000866000000000000c253d78b48f9458beb62d0102000d3bf9f2dbdddfea00b260f00503db010436b20603c70109e35e3ab5244a640709675e60e1799f870512e123b12c8654130f6a1f80f526064d12061127d9c9821b1bfe4b42fcb33e2e2d2594040000000000001400000000000000000000000200000022a200000000000014000000000000000000000002000000050000000000"], 0x158}, 0x40) (async) close(r7) setsockopt$sock_attach_bpf(r5, 0x1, 0x4c, 0x0, 0x0) 544.203191ms ago: executing program 1 (id=2878): perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$kcm(0xa, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x18) sendmsg$inet(r0, &(0x7f0000000900)={&(0x7f0000000500)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000880)=[{&(0x7f0000000540)="e8691a913b", 0x2ec0}, {0x0, 0x2900}], 0x2, &(0x7f00000008c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @rand_addr=0x64010101}}}], 0x38}, 0x0) 472.889792ms ago: executing program 1 (id=2879): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb010018000000ea"], 0x0, 0x1a, 0x0, 0x1, 0x3}, 0x28) r0 = socket$kcm(0x11, 0x200000000000003, 0x300) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300), 0x1}, 0x2) 248.928126ms ago: executing program 4 (id=2880): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mkdir(&(0x7f00000017c0)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x180) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001812000001a89c41355e0dcc786a97e3a99cb3fb7708ab90c211fa7411882267d822c37c9e109d1bd0b36b60ecceac04569d92f5db37efc211b986eda82effab3cb67e6484a61c8f7b1400be0000cd40328c29ab230e47237fe733fc824fb9d8bfe092f4ccf081ec31bea7f0f84de40eba47fda1bba3cdebc960231a23a0", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)=@o_path={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, r0}, 0x18) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x80000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x1) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001740)=@generic={&(0x7f00000028c0)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000e80)={&(0x7f0000000c80)="82cb172d9e8c040bf7c56ee1026d12ae283762c478b43d22d58a57772b4b222b6746baaadc1f741a9007cb17e7801630f813e87e6480a7ae5282b797fbdecc69d97fb46273ceed753b4c6addb228299070cd875578fa096d690e4e9101fea1e694e21d9a9ee0787a75983d352ea5236be7be8f77da9eb5983aef716bf7fd", &(0x7f0000000d40)=""/122, &(0x7f0000000dc0)="5e048061daba0fafc69d9ab00a3689a89efd5cd1f747e64676b442929d7684", &(0x7f0000000e00)="12fc6480d463cb13f0adcad3d17d8c9255ec5003333d95871e9e727540009088e333c1ffa5af7f55746967a7fbef0437aa337bd0938f3689519c0aa863abe40afc5155656379b5a157e5fd7c32793775061a5aa3", 0x80}, 0x38) syz_clone(0x2001000, &(0x7f0000000980)="8d668b5163693dfdedc67cc99d39970bd086ef52ade8576f0771934891b387fdfdc20d5bcc97f4853948d17ad5eda100a8ff1238acc85a6cd9e60f7575f53f7a20c990fdf3a0bd758596257e3de28ba09ee224723fc797b3a87f7b4524d565ec2be33f36950d1dbf22b7cdd3317950514e2a7fffeb5e6983d459cc797f3b53c8cd8f3cc0f330cbf00c35084eed2954ce894e35db299d4ced370d5177c96358f122", 0xa1, &(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)="63c9a1f8b642be2168953b91cfbdb57b2e3f5e73aa80ac880fb964b984d8dea69e98e44b2a15b22639b8faee3ceff1863231efdf1aa2e6a156f1eabe7a71e59d04cb3297a1c48cabf41b359b75251db75ba5e626a59cbab490a9fcbe812ed81df9543f63edb616794a16e9e75554aafad04270806a73f976b7d86e8e9a7ffa40cd8a04816900e84bf5ccc29c1de1a0d3df10fe519af2ca005cda23896cc38d51884ffa509880b8908b9ff0b919c08f85520529e15251eb895f659b6289084458dc479be3a17d45f80f027170ee3504d4c804ff411e24a58816de6031bbfd761ad53f4431507a3228071c56d77d5548") 225.250296ms ago: executing program 1 (id=2881): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x202, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7ff0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x2, @perf_bp={&(0x7f0000000380), 0x4}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x1000000, 0x200, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gretap0\x00', 0x400}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000600), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000080000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='notify_on_release\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0x3ff, 0x12) mkdirat$cgroup(r1, &(0x7f00000000c0)='syz1\x00', 0x1ff) 177.134137ms ago: executing program 1 (id=2882): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x111, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5ff, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x9006, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x1, 0x8000000}, 0x0, 0x500000000000, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, r0, 0x0) (fail_nth: 1) 65.249019ms ago: executing program 4 (id=2883): r0 = socket$kcm(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) close(r0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) (async, rerun: 64) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1500}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000180)='hugetlb.1GB.rsvd.failcnt\x00', 0x2, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="110000000400000004000000ff00000000000000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000001c00"/28], 0x50) r3 = socket$kcm(0x2, 0x2, 0x88) sendmsg$inet(r3, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10, 0x0}, 0x4048800) (async) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f8480d0000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 32) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r5, 0x0, 0x0}, 0x10) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000006c0)={r2, &(0x7f0000000600)}, 0x20) 0s ago: executing program 0 (id=2884): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x111, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5ff, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x9006, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x1, 0x8000000}, 0x0, 0x500000000000, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_devices(r2, 0x0, 0x9) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f07df33c9f7b986", 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, r0, 0x0) kernel console output (not intermixed with test programs): tribute type 1 has an invalid length. [ 260.039571][ T9133] netlink: 191376 bytes leftover after parsing attributes in process `syz.1.1638'. [ 261.118813][ T9162] netlink: 55631 bytes leftover after parsing attributes in process `syz.4.1650'. [ 261.163293][ T9162] netlink: 6328 bytes leftover after parsing attributes in process `syz.4.1650'. [ 261.190829][ T9162] tc_dump_action: action bad kind [ 262.644447][ T9200] netlink: 55631 bytes leftover after parsing attributes in process `syz.1.1664'. [ 262.706925][ T9200] netlink: 6328 bytes leftover after parsing attributes in process `syz.1.1664'. [ 262.802371][ T9200] tc_dump_action: action bad kind [ 262.891270][ T9207] netlink: 'syz.0.1665': attribute type 10 has an invalid length. [ 263.199420][ T9207] bridge0: port 3(macsec0) entered blocking state [ 263.308586][ T9207] bridge0: port 3(macsec0) entered disabled state [ 263.364555][ T9224] netlink: 'syz.2.1674': attribute type 1 has an invalid length. [ 263.422078][ T9224] netlink: 181400 bytes leftover after parsing attributes in process `syz.2.1674'. [ 263.512123][ T9207] device macsec0 entered promiscuous mode [ 263.635850][ T9207] bridge0: port 3(macsec0) entered blocking state [ 263.642775][ T9207] bridge0: port 3(macsec0) entered forwarding state [ 264.482093][ T9246] netlink: 40 bytes leftover after parsing attributes in process `syz.3.1678'. [ 264.614273][ T9246] netlink: 'syz.3.1678': attribute type 2 has an invalid length. [ 264.749038][ T9246] netlink: 1 bytes leftover after parsing attributes in process `syz.3.1678'. [ 264.769374][ T9253] netlink: 55631 bytes leftover after parsing attributes in process `syz.2.1683'. [ 264.825795][ T9253] netlink: 6328 bytes leftover after parsing attributes in process `syz.2.1683'. [ 264.841392][ T9253] tc_dump_action: action bad kind [ 266.092076][ T9280] device syzkaller0 entered promiscuous mode [ 266.184200][ T9296] netlink: 55631 bytes leftover after parsing attributes in process `syz.1.1698'. [ 266.235126][ T9296] netlink: 6328 bytes leftover after parsing attributes in process `syz.1.1698'. [ 266.294107][ T9296] tc_dump_action: action bad kind [ 267.797918][ T9348] device syzkaller0 entered promiscuous mode [ 267.896042][ T9349] netlink: 'syz.3.1721': attribute type 10 has an invalid length. [ 267.948835][ T9349] bridge0: port 3(macsec0) entered blocking state [ 267.967396][ T9349] bridge0: port 3(macsec0) entered disabled state [ 268.070568][ T9349] device macsec0 entered promiscuous mode [ 268.173647][ T9349] bridge0: port 3(macsec0) entered blocking state [ 268.180691][ T9349] bridge0: port 3(macsec0) entered forwarding state [ 269.218690][ T9394] netlink: 55631 bytes leftover after parsing attributes in process `syz.2.1740'. [ 269.283133][ T9394] netlink: 6328 bytes leftover after parsing attributes in process `syz.2.1740'. [ 269.321349][ T9394] tc_dump_action: action bad kind [ 269.754403][ T9405] device syzkaller0 entered promiscuous mode [ 270.747331][ T9437] netlink: 55631 bytes leftover after parsing attributes in process `syz.3.1758'. [ 270.874261][ T9437] netlink: 6328 bytes leftover after parsing attributes in process `syz.3.1758'. [ 270.904400][ T9437] tc_dump_action: action bad kind [ 271.011210][ T9438] netlink: 55631 bytes leftover after parsing attributes in process `syz.0.1757'. [ 271.034026][ T9438] netlink: 6328 bytes leftover after parsing attributes in process `syz.0.1757'. [ 271.158387][ T9438] tc_dump_action: action bad kind [ 271.880111][ T9477] netlink: 55631 bytes leftover after parsing attributes in process `syz.2.1775'. [ 271.925597][ T9477] netlink: 6328 bytes leftover after parsing attributes in process `syz.2.1775'. [ 271.938284][ T9477] tc_dump_action: action bad kind [ 272.377446][ T9506] syz.3.1784[9506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.377561][ T9506] syz.3.1784[9506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.472824][ T9500] device wg2 left promiscuous mode [ 272.593874][ T9506] device wg2 entered promiscuous mode [ 272.887238][ T9518] netlink: 'syz.2.1793': attribute type 2 has an invalid length. [ 272.979640][ T9518] netlink: 164 bytes leftover after parsing attributes in process `syz.2.1793'. [ 273.047520][ T9519] : port 1(erspan0) entered blocking state [ 273.150444][ T9519] : port 1(erspan0) entered disabled state [ 273.232303][ T9519] device erspan0 entered promiscuous mode [ 273.301633][ T9522] netlink: 55631 bytes leftover after parsing attributes in process `syz.0.1794'. [ 273.358877][ T9522] tc_dump_action: action bad kind [ 273.605507][ T9541] netlink: 'syz.1.1802': attribute type 10 has an invalid length. [ 273.651270][ T9541] bridge0: port 3(macsec0) entered blocking state [ 273.710544][ T9541] bridge0: port 3(macsec0) entered disabled state [ 273.741062][ T9541] device macsec0 entered promiscuous mode [ 273.760922][ T9541] bridge0: port 3(macsec0) entered blocking state [ 273.767433][ T9541] bridge0: port 3(macsec0) entered forwarding state [ 274.401921][ T9573] __nla_validate_parse: 1 callbacks suppressed [ 274.402008][ T9573] netlink: 55631 bytes leftover after parsing attributes in process `syz.3.1818'. [ 274.468012][ T9573] netlink: 6328 bytes leftover after parsing attributes in process `syz.3.1818'. [ 274.514728][ T9573] tc_dump_action: action bad kind [ 274.699726][ T9586] netlink: 'syz.3.1823': attribute type 10 has an invalid length. [ 275.509985][ T9611] device wg2 left promiscuous mode [ 275.618464][ T9611] syz.3.1842[9611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.618579][ T9611] syz.3.1842[9611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.680774][ T9613] device wg2 entered promiscuous mode [ 275.754228][ T9622] netlink: 'syz.2.1836': attribute type 10 has an invalid length. [ 275.795067][ T9622] bridge0: port 3(macsec0) entered blocking state [ 275.830030][ T9622] bridge0: port 3(macsec0) entered disabled state [ 275.868663][ T9622] device macsec0 entered promiscuous mode [ 275.904311][ T9622] bridge0: port 3(macsec0) entered blocking state [ 275.911361][ T9622] bridge0: port 3(macsec0) entered forwarding state [ 276.731858][ T9649] device wg2 left promiscuous mode [ 276.768090][ T9649] syz.0.1848[9649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.768184][ T9649] syz.0.1848[9649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.870709][ T9652] device wg2 entered promiscuous mode [ 277.924328][ T9702] netlink: 55631 bytes leftover after parsing attributes in process `syz.2.1871'. [ 277.958634][ T9702] netlink: 6328 bytes leftover after parsing attributes in process `syz.2.1871'. [ 278.003206][ T9702] tc_dump_action: action bad kind [ 278.305278][ T9718] netlink: 'syz.2.1876': attribute type 10 has an invalid length. [ 278.417075][ T9724] device wg2 left promiscuous mode [ 278.453988][ T9724] syz.1.1879[9724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.454081][ T9724] syz.1.1879[9724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.547749][ T9724] device wg2 entered promiscuous mode [ 278.711257][ T9742] netlink: 55631 bytes leftover after parsing attributes in process `syz.2.1888'. [ 278.744094][ T9742] netlink: 6328 bytes leftover after parsing attributes in process `syz.2.1888'. [ 278.761903][ T9742] tc_dump_action: action bad kind [ 279.354730][ T9759] : port 1(erspan0) entered blocking state [ 279.366901][ T9759] : port 1(erspan0) entered disabled state [ 279.396916][ T9759] device erspan0 entered promiscuous mode [ 279.544703][ T9759] netlink: 'syz.3.1894': attribute type 2 has an invalid length. [ 279.566601][ T9759] netlink: 164 bytes leftover after parsing attributes in process `syz.3.1894'. [ 279.867953][ T9777] netlink: 55631 bytes leftover after parsing attributes in process `syz.0.1902'. [ 279.896902][ T9777] netlink: 6328 bytes leftover after parsing attributes in process `syz.0.1902'. [ 279.930615][ T9777] tc_dump_action: action bad kind [ 279.981154][ T9788] netlink: 'syz.4.1907': attribute type 10 has an invalid length. [ 280.014593][ T9788] bridge0: port 3(macsec0) entered blocking state [ 280.029707][ T9788] bridge0: port 3(macsec0) entered disabled state [ 280.052242][ T9788] device macsec0 entered promiscuous mode [ 280.067845][ T9788] bridge0: port 3(macsec0) entered blocking state [ 280.074647][ T9788] bridge0: port 3(macsec0) entered forwarding state [ 280.168660][ T9797] netlink: 'syz.2.1909': attribute type 10 has an invalid length. [ 280.322714][ T9803] device wg2 left promiscuous mode [ 280.379026][ T9803] syz.4.1913[9803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.379130][ T9803] syz.4.1913[9803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.427299][ T9803] device wg2 entered promiscuous mode [ 280.451880][ T9806] netlink: 55631 bytes leftover after parsing attributes in process `syz.1.1914'. [ 280.468823][ T9806] netlink: 6328 bytes leftover after parsing attributes in process `syz.1.1914'. [ 280.481151][ T9806] tc_dump_action: action bad kind [ 280.755636][ T9824] netlink: 'syz.2.1921': attribute type 1 has an invalid length. [ 280.793662][ T9822] netlink: 'syz.1.1920': attribute type 10 has an invalid length. [ 280.898200][ T9831] netlink: 'syz.2.1925': attribute type 10 has an invalid length. [ 281.306686][ T9853] netlink: 55631 bytes leftover after parsing attributes in process `syz.4.1933'. [ 281.351571][ T9853] netlink: 6328 bytes leftover after parsing attributes in process `syz.4.1933'. [ 281.386612][ T9853] tc_dump_action: action bad kind [ 281.845135][ T9883] device wg2 left promiscuous mode [ 281.900058][ T9883] syz.4.1944[9883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.900148][ T9883] syz.4.1944[9883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.998996][ T9884] device wg2 entered promiscuous mode [ 282.099262][ T9888] netlink: 'syz.1.1946': attribute type 10 has an invalid length. [ 282.448333][ T9864] delete_channel: no stack [ 283.725367][ T9932] netlink: 55631 bytes leftover after parsing attributes in process `syz.4.1965'. [ 283.781374][ T9932] netlink: 6328 bytes leftover after parsing attributes in process `syz.4.1965'. [ 283.815683][ T9932] tc_dump_action: action bad kind [ 283.835448][ T9934] device wg2 left promiscuous mode [ 283.897168][ T9934] syz.3.1967[9934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.897262][ T9934] syz.3.1967[9934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.974569][ T9934] device wg2 entered promiscuous mode [ 284.143380][ T9951] netlink: 'syz.4.1974': attribute type 10 has an invalid length. [ 284.336726][ T9961] netlink: 'syz.2.1977': attribute type 10 has an invalid length. [ 284.534594][ T9973] netlink: 55631 bytes leftover after parsing attributes in process `syz.2.1981'. [ 284.548485][ T9973] tc_dump_action: action bad kind [ 284.556505][ T9978] tc_dump_action: action bad kind [ 284.697276][ T9983] device wg2 left promiscuous mode [ 284.732633][ T9983] syz.2.1997[9983] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.732727][ T9983] syz.2.1997[9983] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.772656][ T9983] device wg2 entered promiscuous mode [ 285.216987][T10009] netlink: 'syz.3.1995': attribute type 28 has an invalid length. [ 285.234745][T10009] __nla_validate_parse: 3 callbacks suppressed [ 285.234758][T10009] netlink: 2 bytes leftover after parsing attributes in process `syz.3.1995'. [ 285.261071][T10008] netlink: 'syz.3.1995': attribute type 28 has an invalid length. [ 285.269875][T10008] netlink: 2 bytes leftover after parsing attributes in process `syz.3.1995'. [ 285.338873][T10009] netlink: 'syz.3.1995': attribute type 11 has an invalid length. [ 285.367408][T10009] netlink: 200752 bytes leftover after parsing attributes in process `syz.3.1995'. [ 285.477555][T10017] netlink: 55631 bytes leftover after parsing attributes in process `syz.0.1999'. [ 285.498569][T10017] netlink: 6328 bytes leftover after parsing attributes in process `syz.0.1999'. [ 285.562527][T10017] tc_dump_action: action bad kind [ 286.131494][T10052] device wg2 left promiscuous mode [ 286.150028][T10056] netlink: 'syz.3.2016': attribute type 10 has an invalid length. [ 286.167529][T10059] syz.0.2015[10059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.167620][T10059] syz.0.2015[10059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.200821][T10040] delete_channel: no stack [ 286.222467][T10063] device wg2 entered promiscuous mode [ 287.087444][T10094] netlink: 'syz.1.2032': attribute type 10 has an invalid length. [ 287.204643][T10098] netlink: 55631 bytes leftover after parsing attributes in process `syz.4.2034'. [ 287.215268][T10098] netlink: 6328 bytes leftover after parsing attributes in process `syz.4.2034'. [ 287.227273][T10098] tc_dump_action: action bad kind [ 287.285837][T10100] netlink: 55631 bytes leftover after parsing attributes in process `syz.0.2036'. [ 287.305676][T10100] netlink: 6328 bytes leftover after parsing attributes in process `syz.0.2036'. [ 287.362255][T10100] tc_dump_action: action bad kind [ 287.547025][T10119] device wg2 left promiscuous mode [ 287.567069][T10119] syz.2.2041[10119] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.567167][T10119] syz.2.2041[10119] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.688438][T10119] device wg2 entered promiscuous mode [ 288.229182][T10140] netlink: 55631 bytes leftover after parsing attributes in process `syz.3.2051'. [ 288.256935][T10140] tc_dump_action: action bad kind [ 288.983134][T10162] netlink: 'syz.0.2060': attribute type 10 has an invalid length. [ 289.254144][T10173] tc_dump_action: action bad kind [ 289.454201][T10187] tc_dump_action: action bad kind [ 289.513453][T10194] netlink: 'syz.0.2075': attribute type 10 has an invalid length. [ 289.671397][T10201] netlink: 'syz.2.2076': attribute type 10 has an invalid length. [ 289.770135][T10210] tc_dump_action: action bad kind [ 290.169223][T10228] netlink: 'syz.2.2091': attribute type 10 has an invalid length. [ 290.216709][T10228] team0: Cannot enslave team device to itself [ 290.273443][T10232] netlink: 'syz.1.2090': attribute type 10 has an invalid length. [ 290.541933][T10242] __nla_validate_parse: 7 callbacks suppressed [ 290.541950][T10242] netlink: 55631 bytes leftover after parsing attributes in process `syz.1.2095'. [ 290.618969][T10242] netlink: 6328 bytes leftover after parsing attributes in process `syz.1.2095'. [ 290.650755][T10242] tc_dump_action: action bad kind [ 290.982276][T10265] device wg2 left promiscuous mode [ 291.002810][T10270] syz.4.2105[10270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.002914][T10270] syz.4.2105[10270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.067845][T10268] netlink: 'syz.2.2106': attribute type 10 has an invalid length. [ 291.099216][T10270] device wg2 entered promiscuous mode [ 291.546477][T10292] netlink: 55631 bytes leftover after parsing attributes in process `syz.0.2115'. [ 291.590580][T10292] netlink: 6328 bytes leftover after parsing attributes in process `syz.0.2115'. [ 291.618141][T10292] tc_dump_action: action bad kind [ 291.705023][T10305] netlink: 'syz.3.2121': attribute type 10 has an invalid length. [ 292.036107][T10318] netlink: 'syz.0.2127': attribute type 10 has an invalid length. [ 292.091825][T10324] device wg2 left promiscuous mode [ 292.125144][T10324] syz.3.2129[10324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.125239][T10324] syz.3.2129[10324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.172012][T10324] device wg2 entered promiscuous mode [ 292.514880][T10337] netlink: 55631 bytes leftover after parsing attributes in process `syz.0.2134'. [ 292.546169][T10337] netlink: 6328 bytes leftover after parsing attributes in process `syz.0.2134'. [ 292.561853][T10337] tc_dump_action: action bad kind [ 292.707558][T10343] netlink: 'syz.3.2136': attribute type 10 has an invalid length. [ 292.721524][ T5814] wlan1: Trigger new scan to find an IBSS to join [ 293.612794][T10380] netlink: 'syz.2.2151': attribute type 10 has an invalid length. [ 294.026505][T10391] netlink: 'syz.2.2156': attribute type 10 has an invalid length. [ 294.384010][T10402] device wg2 left promiscuous mode [ 294.458332][T10402] syz.2.2169[10402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.458427][T10402] syz.2.2169[10402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.630598][T10402] device wg2 entered promiscuous mode [ 295.219550][T10428] netlink: 55631 bytes leftover after parsing attributes in process `syz.3.2167'. [ 295.288491][T10428] netlink: 6328 bytes leftover after parsing attributes in process `syz.3.2167'. [ 295.322040][T10428] tc_dump_action: action bad kind [ 295.682238][ T5820] wlan1: Trigger new scan to find an IBSS to join [ 296.198645][T10458] netlink: 'syz.4.2179': attribute type 10 has an invalid length. [ 296.419387][T10467] syz.4.2181[10467] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.419478][T10467] syz.4.2181[10467] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.453790][T10464] device wg2 left promiscuous mode [ 296.570591][T10467] device wg2 entered promiscuous mode [ 296.673403][T10471] netlink: 55631 bytes leftover after parsing attributes in process `syz.1.2185'. [ 296.738525][T10471] netlink: 6328 bytes leftover after parsing attributes in process `syz.1.2185'. [ 296.809666][T10471] tc_dump_action: action bad kind [ 297.035128][T10477] device syzkaller0 entered promiscuous mode [ 297.273897][T10488] netlink: 'syz.3.2192': attribute type 10 has an invalid length. [ 297.345939][T10492] netlink: 'syz.1.2193': attribute type 10 has an invalid length. [ 297.704069][ T9] wlan1: Trigger new scan to find an IBSS to join [ 297.867395][T10511] netlink: 'syz.2.2201': attribute type 39 has an invalid length. [ 298.227009][T10521] netlink: 'syz.3.2205': attribute type 10 has an invalid length. [ 298.395291][T10524] netlink: 'syz.4.2206': attribute type 10 has an invalid length. [ 298.503116][T10528] netlink: 'syz.1.2207': attribute type 10 has an invalid length. [ 298.739443][ T4373] wlan1: Creating new IBSS network, BSSID 56:67:82:8a:24:83 [ 298.743590][T10528] team0: Port device dummy0 added [ 298.772072][T10529] netlink: 'syz.1.2207': attribute type 10 has an invalid length. [ 298.843889][T10533] netlink: 'syz.2.2208': attribute type 10 has an invalid length. [ 298.861932][T10536] netlink: 'syz.4.2209': attribute type 10 has an invalid length. [ 299.604738][T10570] device wg2 left promiscuous mode [ 299.630127][T10570] syz.2.2222[10570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.630228][T10570] syz.2.2222[10570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.667214][T10570] device wg2 entered promiscuous mode [ 299.691241][ T5577] wlan1: Trigger new scan to find an IBSS to join [ 299.703553][T10573] FAULT_INJECTION: forcing a failure. [ 299.703553][T10573] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 299.717718][T10573] CPU: 1 PID: 10573 Comm: syz.4.2224 Not tainted 5.15.189-syzkaller #0 [ 299.725983][T10573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 299.736054][T10573] Call Trace: [ 299.739349][T10573] [ 299.742291][T10573] dump_stack_lvl+0x168/0x230 [ 299.746995][T10573] ? show_regs_print_info+0x20/0x20 [ 299.752209][T10573] ? load_image+0x3b0/0x3b0 [ 299.756741][T10573] ? __lock_acquire+0x7c60/0x7c60 [ 299.761801][T10573] should_fail+0x38c/0x4c0 [ 299.766247][T10573] _copy_from_user+0x2e/0x170 [ 299.770942][T10573] __copy_msghdr_from_user+0xaf/0x5e0 [ 299.776329][T10573] ? verify_lock_unused+0x140/0x140 [ 299.781551][T10573] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 299.786874][T10573] ? trace_event_raw_event_lock+0x250/0x250 [ 299.792833][T10573] ___sys_sendmsg+0x156/0x260 [ 299.797544][T10573] ? __sys_sendmsg+0x250/0x250 [ 299.802341][T10573] ? trace_event_raw_event_lock+0x250/0x250 [ 299.808248][T10573] ? vfs_write+0x84d/0xd00 [ 299.812702][T10573] ? __fdget+0x18b/0x210 [ 299.816950][T10573] __se_sys_sendmsg+0x190/0x250 [ 299.821815][T10573] ? __x64_sys_sendmsg+0x80/0x80 [ 299.826765][T10573] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 299.832791][T10573] ? lockdep_hardirqs_on+0x94/0x140 [ 299.838001][T10573] do_syscall_64+0x4c/0xa0 [ 299.842421][T10573] ? clear_bhb_loop+0x30/0x80 [ 299.847098][T10573] ? clear_bhb_loop+0x30/0x80 [ 299.851780][T10573] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 299.857676][T10573] RIP: 0033:0x7fd59ffa59a9 [ 299.862100][T10573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 299.881711][T10573] RSP: 002b:00007fd59de0d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 299.890135][T10573] RAX: ffffffffffffffda RBX: 00007fd5a01ccfa0 RCX: 00007fd59ffa59a9 [ 299.898110][T10573] RDX: 0000000020004800 RSI: 0000200000000080 RDI: 0000000000000004 [ 299.906076][T10573] RBP: 00007fd59de0d090 R08: 0000000000000000 R09: 0000000000000000 [ 299.914053][T10573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 299.922022][T10573] R13: 0000000000000000 R14: 00007fd5a01ccfa0 R15: 00007ffcdd8f7618 [ 299.930017][T10573] [ 300.141483][T10582] device syzkaller0 entered promiscuous mode [ 300.910864][ T9] wlan1: Creating new IBSS network, BSSID ca:25:bc:6f:fd:f9 [ 301.203345][T10628] validate_nla: 4 callbacks suppressed [ 301.203377][T10628] netlink: 'syz.4.2247': attribute type 10 has an invalid length. [ 301.708608][T10666] netlink: 'syz.1.2264': attribute type 10 has an invalid length. [ 301.985485][T10678] netlink: 'syz.3.2266': attribute type 39 has an invalid length. [ 302.458314][T10695] netlink: 17279 bytes leftover after parsing attributes in process `syz.4.2273'. [ 302.553229][T10701] netlink: 'syz.2.2279': attribute type 10 has an invalid length. [ 302.700077][T10712] device wg2 left promiscuous mode [ 302.719708][T10712] syz.4.2284[10712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.719798][T10712] syz.4.2284[10712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.764398][T10712] device wg2 entered promiscuous mode [ 302.926252][T10719] netlink: 'syz.0.2286': attribute type 39 has an invalid length. [ 304.140865][T10750] FAULT_INJECTION: forcing a failure. [ 304.140865][T10750] name failslab, interval 1, probability 0, space 0, times 0 [ 304.182111][T10750] CPU: 0 PID: 10750 Comm: syz.4.2297 Not tainted 5.15.189-syzkaller #0 [ 304.190382][T10750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 304.200553][T10750] Call Trace: [ 304.203836][T10750] [ 304.206868][T10750] dump_stack_lvl+0x168/0x230 [ 304.211762][T10750] ? show_regs_print_info+0x20/0x20 [ 304.216986][T10750] ? load_image+0x3b0/0x3b0 [ 304.221511][T10750] ? __might_sleep+0xf0/0xf0 [ 304.226129][T10750] ? __lock_acquire+0x7c60/0x7c60 [ 304.231253][T10750] ? mark_lock+0x94/0x320 [ 304.235592][T10750] should_fail+0x38c/0x4c0 [ 304.240029][T10750] should_failslab+0x5/0x20 [ 304.244543][T10750] slab_pre_alloc_hook+0x51/0xc0 [ 304.249663][T10750] __kmalloc+0x6b/0x330 [ 304.253833][T10750] ? tomoyo_realpath_from_path+0x118/0x610 [ 304.259690][T10750] tomoyo_realpath_from_path+0x118/0x610 [ 304.265365][T10750] tomoyo_path_number_perm+0x1d5/0x5d0 [ 304.270838][T10750] ? verify_lock_unused+0x140/0x140 [ 304.276194][T10750] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 304.281960][T10750] ? ksys_write+0x1c7/0x250 [ 304.286612][T10750] security_file_ioctl+0x6c/0xa0 [ 304.291658][T10750] __se_sys_ioctl+0x48/0x170 [ 304.296271][T10750] do_syscall_64+0x4c/0xa0 [ 304.300715][T10750] ? clear_bhb_loop+0x30/0x80 [ 304.305411][T10750] ? clear_bhb_loop+0x30/0x80 [ 304.310104][T10750] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 304.316005][T10750] RIP: 0033:0x7fd59ffa59a9 [ 304.320435][T10750] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 304.340045][T10750] RSP: 002b:00007fd59de0d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 304.348467][T10750] RAX: ffffffffffffffda RBX: 00007fd5a01ccfa0 RCX: 00007fd59ffa59a9 [ 304.356441][T10750] RDX: 0000200000000040 RSI: 00000000401054d5 RDI: 0000000000000003 [ 304.364412][T10750] RBP: 00007fd59de0d090 R08: 0000000000000000 R09: 0000000000000000 [ 304.372381][T10750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 304.380342][T10750] R13: 0000000000000000 R14: 00007fd5a01ccfa0 R15: 00007ffcdd8f7618 [ 304.388321][T10750] [ 304.408928][T10750] ERROR: Out of memory at tomoyo_realpath_from_path. [ 304.446575][T10758] device wg2 left promiscuous mode [ 304.470810][T10758] syz.3.2299[10758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.470899][T10758] syz.3.2299[10758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.602826][T10766] netlink: 55631 bytes leftover after parsing attributes in process `syz.4.2303'. [ 304.669560][T10766] netlink: 6328 bytes leftover after parsing attributes in process `syz.4.2303'. [ 304.699884][T10766] tc_dump_action: action bad kind [ 304.786121][T10778] netlink: 'syz.2.2307': attribute type 10 has an invalid length. [ 304.882813][T10784] netlink: 'syz.4.2309': attribute type 39 has an invalid length. [ 304.995857][T10790] FAULT_INJECTION: forcing a failure. [ 304.995857][T10790] name failslab, interval 1, probability 0, space 0, times 0 [ 305.009524][T10790] CPU: 1 PID: 10790 Comm: syz.4.2312 Not tainted 5.15.189-syzkaller #0 [ 305.017780][T10790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 305.027842][T10790] Call Trace: [ 305.031119][T10790] [ 305.034042][T10790] dump_stack_lvl+0x168/0x230 [ 305.038723][T10790] ? show_regs_print_info+0x20/0x20 [ 305.043918][T10790] ? load_image+0x3b0/0x3b0 [ 305.048419][T10790] ? __might_sleep+0xf0/0xf0 [ 305.053007][T10790] ? __lock_acquire+0x7c60/0x7c60 [ 305.058034][T10790] should_fail+0x38c/0x4c0 [ 305.062450][T10790] should_failslab+0x5/0x20 [ 305.066970][T10790] slab_pre_alloc_hook+0x51/0xc0 [ 305.071903][T10790] __kmalloc+0x6b/0x330 [ 305.076132][T10790] ? tomoyo_realpath_from_path+0x118/0x610 [ 305.081936][T10790] tomoyo_realpath_from_path+0x118/0x610 [ 305.087596][T10790] tomoyo_path_number_perm+0x1d5/0x5d0 [ 305.093316][T10790] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 305.098836][T10790] security_file_ioctl+0x6c/0xa0 [ 305.103763][T10790] __se_sys_ioctl+0x48/0x170 [ 305.108346][T10790] do_syscall_64+0x4c/0xa0 [ 305.112750][T10790] ? clear_bhb_loop+0x30/0x80 [ 305.117412][T10790] ? clear_bhb_loop+0x30/0x80 [ 305.122074][T10790] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 305.127954][T10790] RIP: 0033:0x7fd59ffa59a9 [ 305.132356][T10790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 305.151947][T10790] RSP: 002b:00007fd59de0d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 305.160610][T10790] RAX: ffffffffffffffda RBX: 00007fd5a01ccfa0 RCX: 00007fd59ffa59a9 [ 305.168573][T10790] RDX: 0000200000000000 RSI: 000000000000890b RDI: 0000000000000006 [ 305.176532][T10790] RBP: 00007fd59de0d090 R08: 0000000000000000 R09: 0000000000000000 [ 305.184488][T10790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 305.192444][T10790] R13: 0000000000000000 R14: 00007fd5a01ccfa0 R15: 00007ffcdd8f7618 [ 305.200438][T10790] [ 305.225484][T10790] ERROR: Out of memory at tomoyo_realpath_from_path. [ 305.527527][T10811] netlink: 16222 bytes leftover after parsing attributes in process `syz.4.2323'. [ 305.582011][T10807] netlink: 55631 bytes leftover after parsing attributes in process `syz.1.2320'. [ 305.601054][T10807] netlink: 6328 bytes leftover after parsing attributes in process `syz.1.2320'. [ 305.612747][T10807] tc_dump_action: action bad kind [ 305.622082][T10814] netlink: 'syz.2.2322': attribute type 10 has an invalid length. [ 305.779194][T10824] device wg2 left promiscuous mode [ 305.796090][T10824] syz.2.2328[10824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.796179][T10824] syz.2.2328[10824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.290694][T10853] FAULT_INJECTION: forcing a failure. [ 306.290694][T10853] name failslab, interval 1, probability 0, space 0, times 0 [ 306.328123][T10853] CPU: 0 PID: 10853 Comm: syz.4.2337 Not tainted 5.15.189-syzkaller #0 [ 306.336388][T10853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 306.346444][T10853] Call Trace: [ 306.349719][T10853] [ 306.352649][T10853] dump_stack_lvl+0x168/0x230 [ 306.357329][T10853] ? show_regs_print_info+0x20/0x20 [ 306.362525][T10853] ? load_image+0x3b0/0x3b0 [ 306.367026][T10853] ? __lock_acquire+0x7c60/0x7c60 [ 306.372052][T10853] should_fail+0x38c/0x4c0 [ 306.376470][T10853] should_failslab+0x5/0x20 [ 306.380968][T10853] slab_pre_alloc_hook+0x51/0xc0 [ 306.385901][T10853] kmem_cache_alloc_node+0x47/0x2d0 [ 306.391086][T10853] ? __alloc_skb+0xf4/0x750 [ 306.395591][T10853] __alloc_skb+0xf4/0x750 [ 306.399916][T10853] rtmsg_ifinfo_build_skb+0x80/0x180 [ 306.405213][T10853] rtmsg_ifinfo+0x71/0x120 [ 306.409623][T10853] dev_close_many+0x270/0x400 [ 306.414300][T10853] ? __dev_open+0x420/0x420 [ 306.418981][T10853] ? trace_event_raw_event_lock+0x250/0x250 [ 306.424869][T10853] unregister_netdevice_many+0x472/0x18f0 [ 306.430589][T10853] ? mark_lock+0x94/0x320 [ 306.434932][T10853] ? alloc_netdev_mqs+0xc40/0xc40 [ 306.439947][T10853] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 306.445924][T10853] ? lock_chain_count+0x20/0x20 [ 306.450778][T10853] ? __rwlock_init+0x140/0x140 [ 306.455554][T10853] ? queue_delayed_work_on+0x109/0x1e0 [ 306.461122][T10853] ? lockdep_hardirqs_on+0x94/0x140 [ 306.466333][T10853] unregister_netdevice_queue+0x31c/0x360 [ 306.472052][T10853] ? delayed_work_timer_fn+0x80/0x80 [ 306.477337][T10853] ? dev_get_iflink+0x82/0xc0 [ 306.482011][T10853] ? list_netdevice+0x450/0x450 [ 306.486853][T10853] ? linkwatch_urgent_event+0x32a/0x430 [ 306.492392][T10853] ? linkwatch_fire_event+0x2b7/0x370 [ 306.497761][T10853] __tun_detach+0xd4a/0x1500 [ 306.502357][T10853] tun_chr_close+0x109/0x1b0 [ 306.506939][T10853] ? tun_chr_open+0x4d0/0x4d0 [ 306.511605][T10853] __fput+0x234/0x930 [ 306.515596][T10853] task_work_run+0x125/0x1a0 [ 306.520272][T10853] exit_to_user_mode_loop+0x10f/0x130 [ 306.525641][T10853] exit_to_user_mode_prepare+0xb1/0x140 [ 306.531193][T10853] syscall_exit_to_user_mode+0x16/0x40 [ 306.536643][T10853] do_syscall_64+0x58/0xa0 [ 306.541178][T10853] ? clear_bhb_loop+0x30/0x80 [ 306.545863][T10853] ? clear_bhb_loop+0x30/0x80 [ 306.550613][T10853] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 306.556604][T10853] RIP: 0033:0x7fd59ffa59a9 [ 306.561022][T10853] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 306.580620][T10853] RSP: 002b:00007fd59de0d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 306.589032][T10853] RAX: 0000000000000000 RBX: 00007fd5a01ccfa0 RCX: 00007fd59ffa59a9 [ 306.596994][T10853] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 306.604953][T10853] RBP: 00007fd59de0d090 R08: 0000000000000000 R09: 0000000000000000 [ 306.612912][T10853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 306.620872][T10853] R13: 0000000000000000 R14: 00007fd5a01ccfa0 R15: 00007ffcdd8f7618 [ 306.628848][T10853] [ 306.664140][T10856] netlink: 'syz.3.2339': attribute type 10 has an invalid length. [ 306.769153][T10859] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 306.813691][T10859] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 306.869270][T10859] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 306.928151][T10864] netlink: 'syz.2.2340': attribute type 10 has an invalid length. [ 306.962954][T10874] netlink: 'syz.0.2345': attribute type 2 has an invalid length. [ 306.981479][T10874] netlink: 'syz.0.2345': attribute type 8 has an invalid length. [ 306.996155][T10874] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2345'. [ 307.146693][T10881] team0: Port device team_slave_0 removed [ 307.153173][T10881] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 307.292404][T10888] device wg2 left promiscuous mode [ 307.292700][T10892] syz.4.2351[10892] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.297985][T10892] syz.4.2351[10892] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.336157][T10890] netlink: 'syz.2.2352': attribute type 10 has an invalid length. [ 307.596081][T10907] netlink: 'syz.2.2359': attribute type 10 has an invalid length. [ 307.819933][T10919] netlink: 'syz.2.2365': attribute type 21 has an invalid length. [ 307.828529][T10919] netlink: 156 bytes leftover after parsing attributes in process `syz.2.2365'. [ 307.843681][T10919] netlink: 'syz.2.2365': attribute type 2 has an invalid length. [ 307.852026][T10919] netlink: 16 bytes leftover after parsing attributes in process `syz.2.2365'. [ 307.965722][T10925] netlink: 'syz.2.2368': attribute type 21 has an invalid length. [ 307.981716][T10925] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2368'. [ 308.017049][T10924] netlink: 'syz.0.2367': attribute type 10 has an invalid length. [ 308.265149][T10932] netlink: 55631 bytes leftover after parsing attributes in process `syz.0.2371'. [ 308.295515][T10932] netlink: 6328 bytes leftover after parsing attributes in process `syz.0.2371'. [ 308.306723][T10932] tc_dump_action: action bad kind [ 308.643731][T10961] syz.2.2383[10961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.643824][T10961] syz.2.2383[10961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.870520][T11018] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.2408'. [ 310.031132][T11018] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 310.453209][T11031] syz.4.2411[11031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.453297][T11031] syz.4.2411[11031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.756237][T11051] team0: Port device geneve1 added [ 310.881664][T11058] netlink: 1038 bytes leftover after parsing attributes in process `syz.2.2422'. [ 311.714588][T11080] validate_nla: 6 callbacks suppressed [ 311.714621][T11080] netlink: 'syz.0.2433': attribute type 10 has an invalid length. [ 311.868871][T11087] netlink: 'syz.3.2434': attribute type 10 has an invalid length. [ 312.042931][T11095] device wg2 left promiscuous mode [ 312.079105][T11098] syz.1.2438[11098] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.079197][T11098] syz.1.2438[11098] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.381891][T11109] netlink: 55631 bytes leftover after parsing attributes in process `syz.4.2443'. [ 312.426166][T11109] netlink: 6328 bytes leftover after parsing attributes in process `syz.4.2443'. [ 312.445416][T11109] tc_dump_action: action bad kind [ 312.883806][T11129] netlink: 'syz.4.2450': attribute type 10 has an invalid length. [ 313.324212][T11148] netlink: 55631 bytes leftover after parsing attributes in process `syz.1.2457'. [ 313.363598][T11148] netlink: 6328 bytes leftover after parsing attributes in process `syz.1.2457'. [ 313.396008][T11148] tc_dump_action: action bad kind [ 313.488479][T11155] netlink: 'syz.3.2461': attribute type 10 has an invalid length. [ 313.517694][T11161] syz.2.2464[11161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.517789][T11161] syz.2.2464[11161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.533308][T11157] netlink: 'syz.4.2462': attribute type 10 has an invalid length. [ 313.668868][T11168] netlink: 55631 bytes leftover after parsing attributes in process `syz.3.2475'. [ 313.686114][T11168] netlink: 6328 bytes leftover after parsing attributes in process `syz.3.2475'. [ 313.698088][T11168] tc_dump_action: action bad kind [ 313.740730][T11172] netlink: 'syz.1.2466': attribute type 10 has an invalid length. [ 313.763396][T11170] netlink: 'syz.4.2467': attribute type 10 has an invalid length. [ 313.776907][T11170] device lo entered promiscuous mode [ 313.811310][T11170] bond0: (slave lo): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 313.888516][T11179] netlink: 1038 bytes leftover after parsing attributes in process `syz.4.2469'. [ 313.977849][T11176] device syzkaller0 entered promiscuous mode [ 314.745971][T11199] netlink: 'syz.0.2478': attribute type 10 has an invalid length. [ 314.849157][T11201] device syzkaller0 entered promiscuous mode [ 314.926198][T11201] syzkaller0: mtu greater than device maximum [ 314.988027][T11211] netlink: 'syz.2.2481': attribute type 21 has an invalid length. [ 315.042109][T11208] netlink: 55631 bytes leftover after parsing attributes in process `syz.0.2482'. [ 315.060972][T11208] netlink: 6328 bytes leftover after parsing attributes in process `syz.0.2482'. [ 315.079284][T11208] tc_dump_action: action bad kind [ 315.278661][T11219] netlink: 'syz.3.2486': attribute type 10 has an invalid length. [ 315.426975][T11232] netlink: 1038 bytes leftover after parsing attributes in process `syz.3.2490'. [ 315.578841][T11238] IPv6: NLM_F_REPLACE set, but no existing node found! [ 315.945074][T11249] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2495'. [ 315.981185][T11248] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.2496'. [ 316.293069][T11263] tc_dump_action: action bad kind [ 316.531220][T11273] device lo entered promiscuous mode [ 316.748042][T11279] IPv6: NLM_F_REPLACE set, but no existing node found! [ 316.826630][T11279] tap0: tun_chr_ioctl cmd 1074025677 [ 316.853683][T11279] tap0: linktype set to 3 [ 316.906781][T11281] tap0: tun_chr_ioctl cmd 1074025677 [ 316.922206][T11281] tap0: linktype set to 776 [ 316.990666][ T1421] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.996998][ T1421] ieee802154 phy1 wpan1: encryption failed: -22 [ 317.451833][T11307] tc_dump_action: action bad kind [ 317.667707][T11312] validate_nla: 3 callbacks suppressed [ 317.667740][T11312] netlink: 'syz.3.2521': attribute type 10 has an invalid length. [ 317.775087][T11312] device lo entered promiscuous mode [ 317.778049][T11321] FAULT_INJECTION: forcing a failure. [ 317.778049][T11321] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 317.814221][T11321] CPU: 1 PID: 11321 Comm: syz.0.2525 Not tainted 5.15.189-syzkaller #0 [ 317.822520][T11321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 317.832604][T11321] Call Trace: [ 317.835905][T11321] [ 317.838853][T11321] dump_stack_lvl+0x168/0x230 [ 317.843662][T11321] ? show_regs_print_info+0x20/0x20 [ 317.848898][T11321] ? load_image+0x3b0/0x3b0 [ 317.853446][T11321] ? __lock_acquire+0x7c60/0x7c60 [ 317.856123][T11312] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 317.858517][T11321] should_fail+0x38c/0x4c0 [ 317.858564][T11321] _copy_from_user+0x2e/0x170 [ 317.858598][T11321] __copy_msghdr_from_user+0xaf/0x5e0 [ 317.858626][T11321] ? verify_lock_unused+0x140/0x140 [ 317.858663][T11321] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 317.858718][T11321] ? trace_event_raw_event_lock+0x250/0x250 [ 317.858758][T11321] ___sys_sendmsg+0x156/0x260 [ 317.858810][T11321] ? __sys_sendmsg+0x250/0x250 [ 317.858869][T11321] ? trace_event_raw_event_lock+0x250/0x250 [ 317.858890][T11321] ? vfs_write+0x84d/0xd00 [ 317.858970][T11321] ? __fdget+0x18b/0x210 [ 317.859003][T11321] __se_sys_sendmsg+0x190/0x250 [ 317.925941][T11321] ? __x64_sys_sendmsg+0x80/0x80 [ 317.930911][T11321] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 317.936964][T11321] ? lockdep_hardirqs_on+0x94/0x140 [ 317.942206][T11321] do_syscall_64+0x4c/0xa0 [ 317.946651][T11321] ? clear_bhb_loop+0x30/0x80 [ 317.951352][T11321] ? clear_bhb_loop+0x30/0x80 [ 317.956072][T11321] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 317.961992][T11321] RIP: 0033:0x7f4d987879a9 [ 317.966438][T11321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 317.986070][T11321] RSP: 002b:00007f4d965ef038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 317.994520][T11321] RAX: ffffffffffffffda RBX: 00007f4d989aefa0 RCX: 00007f4d987879a9 [ 318.002522][T11321] RDX: 0000000000008000 RSI: 0000200000000440 RDI: 0000000000000003 [ 318.010518][T11321] RBP: 00007f4d965ef090 R08: 0000000000000000 R09: 0000000000000000 [ 318.018514][T11321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.026520][T11321] R13: 0000000000000000 R14: 00007f4d989aefa0 R15: 00007ffdc23fc448 [ 318.034567][T11321] [ 318.044252][T11312] bond0: (slave lo): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 319.053510][T11351] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 319.060668][T11351] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 319.119344][T11354] __nla_validate_parse: 4 callbacks suppressed [ 319.119382][T11354] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2537'. [ 319.241850][T11357] netlink: 152 bytes leftover after parsing attributes in process `syz.3.2538'. [ 319.991408][T11388] netlink: 'syz.4.2550': attribute type 21 has an invalid length. [ 320.084188][T11388] netlink: 'syz.4.2550': attribute type 29 has an invalid length. [ 320.148580][T11388] netlink: 'syz.4.2550': attribute type 29 has an invalid length. [ 320.178134][T11390] netlink: 'syz.4.2550': attribute type 29 has an invalid length. [ 320.307735][T11394] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2550'. [ 321.004608][T11421] netlink: 'syz.0.2565': attribute type 10 has an invalid length. [ 321.183842][T11430] netlink: 'syz.0.2567': attribute type 10 has an invalid length. [ 321.220989][T11432] netlink: 144316 bytes leftover after parsing attributes in process `syz.2.2568'. [ 321.285764][T11432] netlink: 36 bytes leftover after parsing attributes in process `syz.2.2568'. [ 321.453159][T11440] FAULT_INJECTION: forcing a failure. [ 321.453159][T11440] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 321.497177][T11440] CPU: 1 PID: 11440 Comm: syz.3.2569 Not tainted 5.15.189-syzkaller #0 [ 321.505456][T11440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 321.515533][T11440] Call Trace: [ 321.518821][T11440] [ 321.521761][T11440] dump_stack_lvl+0x168/0x230 [ 321.526566][T11440] ? show_regs_print_info+0x20/0x20 [ 321.531784][T11440] ? load_image+0x3b0/0x3b0 [ 321.536311][T11440] ? __lock_acquire+0x7c60/0x7c60 [ 321.541362][T11440] should_fail+0x38c/0x4c0 [ 321.545797][T11440] _copy_from_user+0x2e/0x170 [ 321.550491][T11440] __sys_bpf+0x21b/0x670 [ 321.554747][T11440] ? bpf_link_show_fdinfo+0x340/0x340 [ 321.560130][T11440] ? rcu_nmi_exit+0x6f/0xf0 [ 321.564655][T11440] ? vtime_user_exit+0x2dc/0x400 [ 321.569612][T11440] __x64_sys_bpf+0x78/0x90 [ 321.574307][T11440] do_syscall_64+0x4c/0xa0 [ 321.578737][T11440] ? clear_bhb_loop+0x30/0x80 [ 321.583437][T11440] ? clear_bhb_loop+0x30/0x80 [ 321.588134][T11440] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 321.594047][T11440] RIP: 0033:0x7fddc66739a9 [ 321.598476][T11440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 321.618087][T11440] RSP: 002b:00007fddc44ba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 321.626518][T11440] RAX: ffffffffffffffda RBX: 00007fddc689b080 RCX: 00007fddc66739a9 [ 321.634501][T11440] RDX: 0000000000000050 RSI: 0000200000001a00 RDI: 000000000000000a [ 321.642488][T11440] RBP: 00007fddc44ba090 R08: 0000000000000000 R09: 0000000000000000 [ 321.650467][T11440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 321.658444][T11440] R13: 0000000000000000 R14: 00007fddc689b080 R15: 00007ffe8483ed88 [ 321.666446][T11440] [ 321.775992][T11446] netlink: 'syz.1.2574': attribute type 10 has an invalid length. [ 322.301020][T11462] netlink: 'syz.4.2580': attribute type 10 has an invalid length. [ 322.582025][T11469] FAULT_INJECTION: forcing a failure. [ 322.582025][T11469] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 322.706662][T11469] CPU: 0 PID: 11469 Comm: syz.1.2583 Not tainted 5.15.189-syzkaller #0 [ 322.715206][T11469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 322.725272][T11469] Call Trace: [ 322.728563][T11469] [ 322.731941][T11469] dump_stack_lvl+0x168/0x230 [ 322.736648][T11469] ? show_regs_print_info+0x20/0x20 [ 322.741854][T11469] ? load_image+0x3b0/0x3b0 [ 322.746363][T11469] ? __lock_acquire+0x7c60/0x7c60 [ 322.751390][T11469] should_fail+0x38c/0x4c0 [ 322.755820][T11469] _copy_from_iter+0x22a/0x1150 [ 322.760687][T11469] ? __lock_acquire+0x7c60/0x7c60 [ 322.765726][T11469] ? copy_mc_pipe_to_iter+0x7d0/0x7d0 [ 322.771113][T11469] ? __virt_addr_valid+0x3c6/0x470 [ 322.776323][T11469] ? __phys_addr+0xb6/0x170 [ 322.780843][T11469] ? __phys_addr_symbol+0x2b/0x70 [ 322.785885][T11469] ? __check_object_size+0x30c/0x410 [ 322.791183][T11469] netlink_sendmsg+0x749/0xbc0 [ 322.795975][T11469] ? netlink_getsockopt+0x560/0x560 [ 322.801194][T11469] ? aa_sock_msg_perm+0x94/0x150 [ 322.806182][T11469] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 322.811479][T11469] ? security_socket_sendmsg+0x7c/0xa0 [ 322.816952][T11469] ? netlink_getsockopt+0x560/0x560 [ 322.822165][T11469] ____sys_sendmsg+0x5a2/0x8c0 [ 322.827462][T11469] ? memset+0x1e/0x40 [ 322.831457][T11469] ? __sys_sendmsg_sock+0x30/0x30 [ 322.836498][T11469] ? import_iovec+0x6f/0xa0 [ 322.841014][T11469] ___sys_sendmsg+0x1f0/0x260 [ 322.845709][T11469] ? __sys_sendmsg+0x250/0x250 [ 322.850490][T11469] ? trace_event_raw_event_lock+0x250/0x250 [ 322.856412][T11469] ? vfs_write+0x84d/0xd00 [ 322.860866][T11469] ? __fdget+0x18b/0x210 [ 322.865120][T11469] __se_sys_sendmsg+0x190/0x250 [ 322.869995][T11469] ? __x64_sys_sendmsg+0x80/0x80 [ 322.874957][T11469] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 322.880980][T11469] ? lockdep_hardirqs_on+0x94/0x140 [ 322.886196][T11469] do_syscall_64+0x4c/0xa0 [ 322.890628][T11469] ? clear_bhb_loop+0x30/0x80 [ 322.895307][T11469] ? clear_bhb_loop+0x30/0x80 [ 322.899999][T11469] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 322.905903][T11469] RIP: 0033:0x7f245c3bb9a9 [ 322.910420][T11469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 322.930038][T11469] RSP: 002b:00007f245a223038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 322.938471][T11469] RAX: ffffffffffffffda RBX: 00007f245c5e2fa0 RCX: 00007f245c3bb9a9 [ 322.946461][T11469] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000003 [ 322.954452][T11469] RBP: 00007f245a223090 R08: 0000000000000000 R09: 0000000000000000 [ 322.962433][T11469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 322.970421][T11469] R13: 0000000000000000 R14: 00007f245c5e2fa0 R15: 00007ffdf2a1bca8 [ 322.978415][T11469] [ 323.006713][T11475] netlink: 'syz.3.2587': attribute type 10 has an invalid length. [ 323.337034][T11490] netlink: 'syz.4.2594': attribute type 10 has an invalid length. [ 323.634004][T11503] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2597'. [ 323.939756][T11515] netlink: 'syz.1.2601': attribute type 10 has an invalid length. [ 324.451402][T11530] netlink: 'syz.4.2608': attribute type 10 has an invalid length. [ 324.988801][T11543] netlink: 164 bytes leftover after parsing attributes in process `syz.1.2612'. [ 325.169001][T11549] netlink: 'syz.4.2615': attribute type 10 has an invalid length. [ 325.194730][T11552] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2616'. [ 325.613034][T11562] device syzkaller0 entered promiscuous mode [ 325.621107][T11569] netlink: 'syz.3.2622': attribute type 21 has an invalid length. [ 325.769481][T11577] netlink: 55631 bytes leftover after parsing attributes in process `syz.0.2624'. [ 325.782905][T11579] sctp: [Deprecated]: syz.4.2623 (pid 11579) Use of struct sctp_assoc_value in delayed_ack socket option. [ 325.782905][T11579] Use struct sctp_sack_info instead [ 325.788086][T11577] netlink: 6328 bytes leftover after parsing attributes in process `syz.0.2624'. [ 325.819531][T11577] tc_dump_action: action bad kind [ 325.839703][T11575] netlink: 'syz.3.2622': attribute type 4 has an invalid length. [ 325.879243][T11575] netlink: 152 bytes leftover after parsing attributes in process `syz.3.2622'. [ 325.891648][T11582] netlink: 'syz.2.2625': attribute type 2 has an invalid length. [ 325.909996][T11582] netlink: 164 bytes leftover after parsing attributes in process `syz.2.2625'. [ 325.948439][T11583] netlink: 140 bytes leftover after parsing attributes in process `syz.2.2625'. [ 326.031369][T11588] bridge_slave_1: mtu less than device minimum [ 326.155159][T11594] netlink: 'syz.2.2629': attribute type 21 has an invalid length. [ 326.178864][T11594] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2629'. [ 326.791502][T11613] netlink: 'syz.2.2638': attribute type 10 has an invalid length. [ 326.800603][T11609] netlink: 55631 bytes leftover after parsing attributes in process `syz.3.2637'. [ 326.838148][T11609] netlink: 6328 bytes leftover after parsing attributes in process `syz.3.2637'. [ 326.864467][T11609] tc_dump_action: action bad kind [ 327.035179][T11638] FAULT_INJECTION: forcing a failure. [ 327.035179][T11638] name failslab, interval 1, probability 0, space 0, times 0 [ 327.066359][T11638] CPU: 0 PID: 11638 Comm: syz.3.2646 Not tainted 5.15.189-syzkaller #0 [ 327.074638][T11638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 327.084685][T11638] Call Trace: [ 327.087954][T11638] [ 327.090871][T11638] dump_stack_lvl+0x168/0x230 [ 327.095563][T11638] ? show_regs_print_info+0x20/0x20 [ 327.100774][T11638] ? load_image+0x3b0/0x3b0 [ 327.105312][T11638] ? __might_sleep+0xf0/0xf0 [ 327.109910][T11638] ? __lock_acquire+0x7c60/0x7c60 [ 327.114933][T11638] should_fail+0x38c/0x4c0 [ 327.119345][T11638] should_failslab+0x5/0x20 [ 327.123839][T11638] slab_pre_alloc_hook+0x51/0xc0 [ 327.128765][T11638] ? __alloc_file+0x25/0x240 [ 327.133432][T11638] kmem_cache_alloc+0x3d/0x290 [ 327.138197][T11638] ? __lock_acquire+0x12d9/0x7c60 [ 327.143218][T11638] __alloc_file+0x25/0x240 [ 327.147629][T11638] alloc_empty_file+0x90/0x180 [ 327.152398][T11638] path_openat+0xfc/0x2f30 [ 327.156834][T11638] ? perf_trace_lock+0xdf/0x370 [ 327.161674][T11638] ? verify_lock_unused+0x140/0x140 [ 327.166859][T11638] ? __x64_sys_openat+0x135/0x160 [ 327.171873][T11638] ? do_filp_open+0x3e0/0x3e0 [ 327.176534][T11638] ? perf_trace_lock+0xdf/0x370 [ 327.181385][T11638] ? trace_event_raw_event_lock+0x250/0x250 [ 327.187270][T11638] do_filp_open+0x1b3/0x3e0 [ 327.191757][T11638] ? vfs_tmpfile+0x300/0x300 [ 327.196343][T11638] ? _raw_spin_unlock+0x24/0x40 [ 327.201176][T11638] ? alloc_fd+0x598/0x630 [ 327.205495][T11638] do_sys_openat2+0x142/0x4a0 [ 327.210159][T11638] ? __lock_acquire+0x7c60/0x7c60 [ 327.215173][T11638] ? do_sys_open+0xe0/0xe0 [ 327.219574][T11638] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 327.225538][T11638] ? lock_chain_count+0x20/0x20 [ 327.230371][T11638] ? vtime_user_exit+0x2dc/0x400 [ 327.235292][T11638] __x64_sys_openat+0x135/0x160 [ 327.240130][T11638] do_syscall_64+0x4c/0xa0 [ 327.244528][T11638] ? clear_bhb_loop+0x30/0x80 [ 327.249190][T11638] ? clear_bhb_loop+0x30/0x80 [ 327.253852][T11638] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 327.259727][T11638] RIP: 0033:0x7fddc66739a9 [ 327.264128][T11638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 327.283718][T11638] RSP: 002b:00007fddc44db038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 327.292129][T11638] RAX: ffffffffffffffda RBX: 00007fddc689afa0 RCX: 00007fddc66739a9 [ 327.300080][T11638] RDX: 0000000000200002 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 327.308032][T11638] RBP: 00007fddc44db090 R08: 0000000000000000 R09: 0000000000000000 [ 327.315998][T11638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 327.323951][T11638] R13: 0000000000000000 R14: 00007fddc689afa0 R15: 00007ffe8483ed88 [ 327.331921][T11638] [ 327.761909][T11652] delete_channel: no stack [ 328.088923][T11651] delete_channel: no stack [ 328.772779][T11693] validate_nla: 4 callbacks suppressed [ 328.772815][T11693] netlink: 'syz.1.2667': attribute type 10 has an invalid length. [ 328.803777][ T9] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 328.890702][T11700] netlink: 'syz.4.2668': attribute type 10 has an invalid length. [ 329.401105][T11717] netlink: 'syz.3.2676': attribute type 21 has an invalid length. [ 329.425489][T11720] netlink: 'syz.3.2676': attribute type 10 has an invalid length. [ 329.564987][T11710] netlink: 'syz.4.2674': attribute type 3 has an invalid length. [ 329.574326][T11720] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 329.589079][T11720] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 329.600127][T11719] tc_dump_action: action bad kind [ 329.633481][T11717] netlink: 'syz.3.2676': attribute type 10 has an invalid length. [ 329.643171][T11717] device batadv0 entered promiscuous mode [ 329.672913][T11717] bond0: (slave batadv0): Releasing backup interface [ 329.724797][T11717] bridge0: port 4(batadv0) entered blocking state [ 329.764233][T11717] bridge0: port 4(batadv0) entered disabled state [ 329.966748][T11732] netlink: 'syz.4.2682': attribute type 10 has an invalid length. [ 329.987818][T11727] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 330.025144][T11730] __nla_validate_parse: 10 callbacks suppressed [ 330.025161][T11730] netlink: 14 bytes leftover after parsing attributes in process `syz.1.2681'. [ 330.055139][ T4373] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 330.064745][ T4373] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 330.090225][T11737] netlink: 'syz.3.2683': attribute type 10 has an invalid length. [ 330.257390][T11748] netlink: 'syz.1.2685': attribute type 21 has an invalid length. [ 330.277675][T11748] netlink: 156 bytes leftover after parsing attributes in process `syz.1.2685'. [ 330.320051][T11751] netlink: 'syz.3.2687': attribute type 10 has an invalid length. [ 330.637618][T11763] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2692'. [ 330.718443][T11762] netlink: 55631 bytes leftover after parsing attributes in process `syz.3.2691'. [ 330.756304][T11762] netlink: 6328 bytes leftover after parsing attributes in process `syz.3.2691'. [ 330.768950][T11762] tc_dump_action: action bad kind [ 330.910594][T11774] netlink: 4083 bytes leftover after parsing attributes in process `syz.1.2693'. [ 330.949101][ T5820] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 330.972946][T11779] netlink: 14 bytes leftover after parsing attributes in process `syz.2.2696'. [ 330.990223][T11778] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 331.087086][T11779] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 331.159192][T11779] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 331.201387][T11779] bond0 (unregistering): (slave macvlan0): Releasing backup interface [ 331.272207][T11779] bond0 (unregistering): Released all slaves [ 331.587188][T11811] device wlan0 entered promiscuous mode [ 332.024407][T11823] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 332.445690][T11836] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2716'. [ 332.654534][T11850] netlink: 183836 bytes leftover after parsing attributes in process `syz.3.2720'. [ 332.687464][T11830] chnl_net:caif_netlink_parms(): no params data found [ 332.704799][T11847] netlink: 14 bytes leftover after parsing attributes in process `syz.0.2721'. [ 333.067180][T11858] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 333.364966][T11875] IPv6: NLM_F_CREATE should be specified when creating new route [ 333.391670][T11830] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.399497][T11830] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.408642][T11830] device bridge_slave_0 entered promiscuous mode [ 333.426697][T11830] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.440506][T11830] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.455095][T11830] device bridge_slave_1 entered promiscuous mode [ 333.581129][T11830] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 333.637545][T11887] FAULT_INJECTION: forcing a failure. [ 333.637545][T11887] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 333.644812][T11830] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 333.697601][T11887] CPU: 1 PID: 11887 Comm: syz.4.2734 Not tainted 5.15.189-syzkaller #0 [ 333.705889][T11887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 333.716044][T11887] Call Trace: [ 333.719319][T11887] [ 333.722246][T11887] dump_stack_lvl+0x168/0x230 [ 333.726927][T11887] ? show_regs_print_info+0x20/0x20 [ 333.732120][T11887] ? load_image+0x3b0/0x3b0 [ 333.736627][T11887] ? __lock_acquire+0x7c60/0x7c60 [ 333.741664][T11887] should_fail+0x38c/0x4c0 [ 333.746086][T11887] _copy_from_user+0x2e/0x170 [ 333.750761][T11887] kstrtouint_from_user+0xbe/0x200 [ 333.755875][T11887] ? kstrtol_from_user+0x260/0x260 [ 333.761013][T11887] proc_fail_nth_write+0x85/0x1f0 [ 333.766037][T11887] ? proc_fail_nth_read+0x210/0x210 [ 333.771228][T11887] ? common_file_perm+0x171/0x1c0 [ 333.776275][T11887] ? proc_fail_nth_read+0x210/0x210 [ 333.781497][T11887] vfs_write+0x300/0xd00 [ 333.785780][T11887] ? file_end_write+0x250/0x250 [ 333.790656][T11887] ? __fget_files+0x40f/0x480 [ 333.795348][T11887] ? mutex_lock_nested+0x17/0x20 [ 333.800285][T11887] ? __fdget_pos+0x2bf/0x370 [ 333.804891][T11887] ? ksys_write+0x71/0x250 [ 333.809328][T11887] ksys_write+0x14d/0x250 [ 333.813663][T11887] ? __ia32_sys_read+0x80/0x80 [ 333.818588][T11887] ? lockdep_hardirqs_on+0x94/0x140 [ 333.823807][T11887] do_syscall_64+0x4c/0xa0 [ 333.828225][T11887] ? clear_bhb_loop+0x30/0x80 [ 333.834125][T11887] ? clear_bhb_loop+0x30/0x80 [ 333.838840][T11887] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 333.844827][T11887] RIP: 0033:0x7fd59ffa445f [ 333.849242][T11887] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 333.868841][T11887] RSP: 002b:00007fd59de0d030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 333.877253][T11887] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd59ffa445f [ 333.885216][T11887] RDX: 0000000000000001 RSI: 00007fd59de0d0a0 RDI: 0000000000000006 [ 333.893176][T11887] RBP: 00007fd59de0d090 R08: 0000000000000000 R09: 0000000000000000 [ 333.901138][T11887] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 333.909099][T11887] R13: 0000000000000000 R14: 00007fd5a01ccfa0 R15: 00007ffcdd8f7618 [ 333.917101][T11887] [ 334.019721][T11830] team0: Port device team_slave_0 added [ 334.070151][T11830] team0: Port device team_slave_1 added [ 334.160488][ T4229] Bluetooth: hci5: command 0x0409 tx timeout [ 334.250488][T11830] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 334.258972][T11830] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 334.308094][T11830] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 334.323197][T11899] validate_nla: 4 callbacks suppressed [ 334.323241][T11899] netlink: 'syz.4.2738': attribute type 10 has an invalid length. [ 334.332784][T11900] FAULT_INJECTION: forcing a failure. [ 334.332784][T11900] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 334.352179][T11830] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 334.370559][T11830] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 334.439378][T11900] CPU: 1 PID: 11900 Comm: syz.1.2737 Not tainted 5.15.189-syzkaller #0 [ 334.447655][T11900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 334.457717][T11900] Call Trace: [ 334.460999][T11900] [ 334.463930][T11900] dump_stack_lvl+0x168/0x230 [ 334.468616][T11900] ? show_regs_print_info+0x20/0x20 [ 334.473811][T11900] ? load_image+0x3b0/0x3b0 [ 334.478314][T11900] ? __lock_acquire+0x7c60/0x7c60 [ 334.483337][T11900] ? vfs_write+0x84d/0xd00 [ 334.487758][T11900] should_fail+0x38c/0x4c0 [ 334.492284][T11900] _copy_from_user+0x2e/0x170 [ 334.496970][T11900] __sys_bpf+0x21b/0x670 [ 334.501213][T11900] ? bpf_link_show_fdinfo+0x340/0x340 [ 334.506612][T11900] ? vtime_user_exit+0x2dc/0x400 [ 334.511580][T11900] __x64_sys_bpf+0x78/0x90 [ 334.516020][T11900] do_syscall_64+0x4c/0xa0 [ 334.520456][T11900] ? clear_bhb_loop+0x30/0x80 [ 334.525149][T11900] ? clear_bhb_loop+0x30/0x80 [ 334.529832][T11900] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 334.535733][T11900] RIP: 0033:0x7f245c3bb9a9 [ 334.540151][T11900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 334.559752][T11900] RSP: 002b:00007f245a223038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 334.568171][T11900] RAX: ffffffffffffffda RBX: 00007f245c5e2fa0 RCX: 00007f245c3bb9a9 [ 334.576230][T11900] RDX: 0000000000000048 RSI: 000020000000e000 RDI: 0000000000000005 [ 334.584201][T11900] RBP: 00007f245a223090 R08: 0000000000000000 R09: 0000000000000000 [ 334.592166][T11900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 334.600136][T11900] R13: 0000000000000000 R14: 00007f245c5e2fa0 R15: 00007ffdf2a1bca8 [ 334.608128][T11900] [ 334.680332][T11830] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 334.707448][T11911] bridge_slave_1: mtu less than device minimum [ 334.815466][T11830] device hsr_slave_0 entered promiscuous mode [ 334.822659][T11830] device hsr_slave_1 entered promiscuous mode [ 334.829881][T11830] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 334.847989][T11830] Cannot create hsr debugfs directory [ 334.990400][T11830] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 335.087021][T11830] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 335.220751][T11830] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 335.250009][T11918] __nla_validate_parse: 1 callbacks suppressed [ 335.250026][T11918] netlink: 55631 bytes leftover after parsing attributes in process `syz.0.2743'. [ 335.269742][T11918] netlink: 6328 bytes leftover after parsing attributes in process `syz.0.2743'. [ 335.284558][T11918] tc_dump_action: action bad kind [ 335.314822][T11830] batman_adv: batadv0: Removing interface: netdevsim0 [ 335.354251][T11830] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 335.896754][T11928] netlink: 55631 bytes leftover after parsing attributes in process `syz.0.2755'. [ 335.914111][T11928] netlink: 6328 bytes leftover after parsing attributes in process `syz.0.2755'. [ 335.927381][T11928] tc_dump_action: action bad kind [ 335.984728][T11941] FAULT_INJECTION: forcing a failure. [ 335.984728][T11941] name failslab, interval 1, probability 0, space 0, times 0 [ 335.997586][T11941] CPU: 0 PID: 11941 Comm: syz.0.2749 Not tainted 5.15.189-syzkaller #0 [ 336.005840][T11941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 336.015901][T11941] Call Trace: [ 336.019185][T11941] [ 336.022113][T11941] dump_stack_lvl+0x168/0x230 [ 336.026919][T11941] ? show_regs_print_info+0x20/0x20 [ 336.032120][T11941] ? load_image+0x3b0/0x3b0 [ 336.036619][T11941] ? __might_sleep+0xf0/0xf0 [ 336.041194][T11941] ? __lock_acquire+0x7c60/0x7c60 [ 336.046208][T11941] should_fail+0x38c/0x4c0 [ 336.050613][T11941] should_failslab+0x5/0x20 [ 336.055106][T11941] slab_pre_alloc_hook+0x51/0xc0 [ 336.060027][T11941] __kmalloc+0x6b/0x330 [ 336.064162][T11941] ? tomoyo_encode+0x27e/0x540 [ 336.068915][T11941] tomoyo_encode+0x27e/0x540 [ 336.073491][T11941] tomoyo_realpath_from_path+0x5cd/0x610 [ 336.079115][T11941] tomoyo_path_number_perm+0x1d5/0x5d0 [ 336.084554][T11941] ? verify_lock_unused+0x140/0x140 [ 336.089758][T11941] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 336.095200][T11941] ? ksys_write+0x1c7/0x250 [ 336.099714][T11941] security_file_ioctl+0x6c/0xa0 [ 336.104722][T11941] __se_sys_ioctl+0x48/0x170 [ 336.109323][T11941] do_syscall_64+0x4c/0xa0 [ 336.113727][T11941] ? clear_bhb_loop+0x30/0x80 [ 336.118389][T11941] ? clear_bhb_loop+0x30/0x80 [ 336.123048][T11941] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 336.128927][T11941] RIP: 0033:0x7f4d987879a9 [ 336.133338][T11941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 336.153013][T11941] RSP: 002b:00007f4d965ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 336.161414][T11941] RAX: ffffffffffffffda RBX: 00007f4d989aefa0 RCX: 00007f4d987879a9 [ 336.169368][T11941] RDX: 0000200000000000 RSI: 0000000000008b34 RDI: 0000000000000008 [ 336.177321][T11941] RBP: 00007f4d965ef090 R08: 0000000000000000 R09: 0000000000000000 [ 336.185295][T11941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 336.193251][T11941] R13: 0000000000000000 R14: 00007f4d989aefa0 R15: 00007ffdc23fc448 [ 336.201220][T11941] [ 336.207319][T11941] ERROR: Out of memory at tomoyo_realpath_from_path. [ 336.240601][ T1346] Bluetooth: hci5: command 0x041b tx timeout [ 336.383854][T11946] netlink: 'syz.4.2750': attribute type 10 has an invalid length. [ 336.439532][T11956] netlink: 'syz.3.2751': attribute type 9 has an invalid length. [ 336.509324][T11956] netlink: 209836 bytes leftover after parsing attributes in process `syz.3.2751'. [ 336.511353][T11959] netlink: 4093 bytes leftover after parsing attributes in process `syz.0.2752'. [ 336.573134][T11830] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 336.694234][T11830] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 336.736560][T11830] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 336.788795][T11830] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 336.907393][T11830] 8021q: adding VLAN 0 to HW filter on device bond0 [ 336.922604][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 336.931386][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 336.942929][T11830] 8021q: adding VLAN 0 to HW filter on device team0 [ 336.955341][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 336.980842][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 336.996937][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.004104][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.048142][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 337.062747][T11984] FAULT_INJECTION: forcing a failure. [ 337.062747][T11984] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 337.065273][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 337.079334][T11984] CPU: 0 PID: 11984 Comm: syz.3.2759 Not tainted 5.15.189-syzkaller #0 [ 337.088563][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 337.092349][T11984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 337.092361][T11984] Call Trace: [ 337.092368][T11984] [ 337.092376][T11984] dump_stack_lvl+0x168/0x230 [ 337.092402][T11984] ? show_regs_print_info+0x20/0x20 [ 337.101876][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.110423][T11984] ? load_image+0x3b0/0x3b0 [ 337.110453][T11984] ? __lock_acquire+0x7c60/0x7c60 [ 337.110478][T11984] should_fail+0x38c/0x4c0 [ 337.113858][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.116683][T11984] _copy_from_user+0x2e/0x170 [ 337.122187][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 337.126511][T11984] __copy_msghdr_from_user+0xaf/0x5e0 [ 337.126536][T11984] ? verify_lock_unused+0x140/0x140 [ 337.126559][T11984] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 337.154160][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 337.154732][T11984] ? trace_event_raw_event_lock+0x250/0x250 [ 337.154762][T11984] ___sys_sendmsg+0x156/0x260 [ 337.160484][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 337.167298][T11984] ? __sys_sendmsg+0x250/0x250 [ 337.167335][T11984] ? trace_event_raw_event_lock+0x250/0x250 [ 337.176196][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 337.177859][T11984] ? vfs_write+0x84d/0xd00 [ 337.177900][T11984] ? __fdget+0x18b/0x210 [ 337.203097][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 337.209429][T11984] __se_sys_sendmsg+0x190/0x250 [ 337.209460][T11984] ? __x64_sys_sendmsg+0x80/0x80 [ 337.209476][T11984] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 337.215565][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 337.220102][T11984] ? lockdep_hardirqs_on+0x94/0x140 [ 337.220130][T11984] do_syscall_64+0x4c/0xa0 [ 337.229017][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 337.232294][T11984] ? clear_bhb_loop+0x30/0x80 [ 337.232317][T11984] ? clear_bhb_loop+0x30/0x80 [ 337.232333][T11984] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 337.232353][T11984] RIP: 0033:0x7fddc66739a9 [ 337.232369][T11984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 337.232383][T11984] RSP: 002b:00007fddc44db038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 337.232401][T11984] RAX: ffffffffffffffda RBX: 00007fddc689afa0 RCX: 00007fddc66739a9 [ 337.232414][T11984] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 337.232425][T11984] RBP: 00007fddc44db090 R08: 0000000000000000 R09: 0000000000000000 [ 337.232436][T11984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 337.232447][T11984] R13: 0000000000000000 R14: 00007fddc689afa0 R15: 00007ffe8483ed88 [ 337.232473][T11984] [ 337.404777][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 337.422438][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 337.432233][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 337.467598][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 337.489042][T11830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 337.555381][T11996] FAULT_INJECTION: forcing a failure. [ 337.555381][T11996] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 337.570187][T11992] netlink: 'syz.1.2762': attribute type 10 has an invalid length. [ 337.586047][T11992] netlink: 2 bytes leftover after parsing attributes in process `syz.1.2762'. [ 337.603712][T11996] CPU: 1 PID: 11996 Comm: syz.0.2763 Not tainted 5.15.189-syzkaller #0 [ 337.611999][T11996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 337.622073][T11996] Call Trace: [ 337.625369][T11996] [ 337.628325][T11996] dump_stack_lvl+0x168/0x230 [ 337.633033][T11996] ? show_regs_print_info+0x20/0x20 [ 337.638243][T11996] ? load_image+0x3b0/0x3b0 [ 337.642768][T11996] ? __lock_acquire+0x7c60/0x7c60 [ 337.647806][T11996] should_fail+0x38c/0x4c0 [ 337.652231][T11996] _copy_from_user+0x2e/0x170 [ 337.656905][T11996] __copy_msghdr_from_user+0xaf/0x5e0 [ 337.662271][T11996] ? verify_lock_unused+0x140/0x140 [ 337.667470][T11996] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 337.672761][T11996] ? trace_event_raw_event_lock+0x250/0x250 [ 337.678652][T11996] ___sys_sendmsg+0x156/0x260 [ 337.683333][T11996] ? __sys_sendmsg+0x250/0x250 [ 337.688108][T11996] ? trace_event_raw_event_lock+0x250/0x250 [ 337.693989][T11996] ? vfs_write+0x84d/0xd00 [ 337.698425][T11996] ? __fdget+0x18b/0x210 [ 337.702862][T11996] __se_sys_sendmsg+0x190/0x250 [ 337.707728][T11996] ? __x64_sys_sendmsg+0x80/0x80 [ 337.712668][T11996] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 337.718675][T11996] ? lockdep_hardirqs_on+0x94/0x140 [ 337.723873][T11996] do_syscall_64+0x4c/0xa0 [ 337.728282][T11996] ? clear_bhb_loop+0x30/0x80 [ 337.732949][T11996] ? clear_bhb_loop+0x30/0x80 [ 337.737619][T11996] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 337.743499][T11996] RIP: 0033:0x7f4d987879a9 [ 337.747903][T11996] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 337.767502][T11996] RSP: 002b:00007f4d965ef038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 337.775927][T11996] RAX: ffffffffffffffda RBX: 00007f4d989aefa0 RCX: 00007f4d987879a9 [ 337.783906][T11996] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 000000000000000a [ 337.791879][T11996] RBP: 00007f4d965ef090 R08: 0000000000000000 R09: 0000000000000000 [ 337.799839][T11996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 337.807795][T11996] R13: 0000000000000000 R14: 00007f4d989aefa0 R15: 00007ffdc23fc448 [ 337.815786][T11996] [ 337.835712][T12001] netlink: 'syz.4.2764': attribute type 1 has an invalid length. [ 337.852801][ T4373] device erspan0 left promiscuous mode [ 337.858905][T12001] netlink: 180900 bytes leftover after parsing attributes in process `syz.4.2764'. [ 337.871904][ T4373] : port 1(erspan0) entered disabled state [ 338.039613][T12003] netlink: 'syz.1.2765': attribute type 10 has an invalid length. [ 338.048633][T12003] netlink: 2 bytes leftover after parsing attributes in process `syz.1.2765'. [ 338.081484][ T5577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 338.113345][ T5577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 338.163734][T11830] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 338.244505][T12017] netlink: 'syz.3.2770': attribute type 10 has an invalid length. [ 338.329337][ T4301] Bluetooth: hci5: command 0x040f tx timeout [ 338.346243][ T5814] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 338.361098][ T5814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 338.408240][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 338.461194][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 338.498123][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 338.506562][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 338.517515][T11830] device veth0_vlan entered promiscuous mode [ 338.526230][T12027] netlink: 'syz.4.2773': attribute type 10 has an invalid length. [ 338.601542][T11830] device veth1_vlan entered promiscuous mode [ 338.608424][ T5577] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 338.687875][T11830] device veth0_macvtap entered promiscuous mode [ 338.701266][ T5814] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 338.716924][ T5814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 338.753697][T11830] device veth1_macvtap entered promiscuous mode [ 338.761819][ T5814] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 338.775585][ T5814] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 338.841770][ T4373] device hsr_slave_0 left promiscuous mode [ 338.848275][ T4373] device hsr_slave_1 left promiscuous mode [ 338.860062][ T4373] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 338.874707][ T4373] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 338.883296][T12059] FAULT_INJECTION: forcing a failure. [ 338.883296][T12059] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 338.897980][ T4373] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 338.903538][T12059] CPU: 0 PID: 12059 Comm: syz.3.2781 Not tainted 5.15.189-syzkaller #0 [ 338.913595][T12059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 338.914859][ T4373] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 338.923654][T12059] Call Trace: [ 338.923664][T12059] [ 338.923671][T12059] dump_stack_lvl+0x168/0x230 [ 338.923697][T12059] ? show_regs_print_info+0x20/0x20 [ 338.923714][T12059] ? load_image+0x3b0/0x3b0 [ 338.923732][T12059] ? __lock_acquire+0x7c60/0x7c60 [ 338.923755][T12059] should_fail+0x38c/0x4c0 [ 338.923776][T12059] _copy_from_user+0x2e/0x170 [ 338.965422][T12059] perf_copy_attr+0x167/0x840 [ 338.970095][T12059] __se_sys_perf_event_open+0xcb/0x1b80 [ 338.975629][T12059] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 338.981254][T12059] ? lockdep_hardirqs_on+0x94/0x140 [ 338.986437][T12059] ? __x64_sys_perf_event_open+0x1c/0xc0 [ 338.992053][T12059] do_syscall_64+0x4c/0xa0 [ 338.996454][T12059] ? clear_bhb_loop+0x30/0x80 [ 339.001113][T12059] ? clear_bhb_loop+0x30/0x80 [ 339.005862][T12059] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 339.011742][T12059] RIP: 0033:0x7fddc66739a9 [ 339.016233][T12059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 339.035833][T12059] RSP: 002b:00007fddc44ba038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 339.044247][T12059] RAX: ffffffffffffffda RBX: 00007fddc689b080 RCX: 00007fddc66739a9 [ 339.052326][T12059] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000000480 [ 339.060300][T12059] RBP: 00007fddc44ba090 R08: 0000000000000000 R09: 0000000000000000 [ 339.068263][T12059] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 339.076222][T12059] R13: 0000000000000000 R14: 00007fddc689b080 R15: 00007ffe8483ed88 [ 339.084193][T12059] [ 339.094975][ T4373] device macsec0 left promiscuous mode [ 339.101118][ T4373] bridge0: port 3(macsec0) entered disabled state [ 339.109674][ T4373] device bridge_slave_1 left promiscuous mode [ 339.116126][ T4373] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.127908][ T4373] device bridge_slave_0 left promiscuous mode [ 339.134377][ T4373] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.161663][ T4373] device veth1_macvtap left promiscuous mode [ 339.168061][ T4373] device veth0_macvtap left promiscuous mode [ 339.177391][ T4373] device veth1_vlan left promiscuous mode [ 339.184237][ T4373] device veth0_vlan left promiscuous mode [ 339.317327][ T4373] team0 (unregistering): Port device geneve1 removed [ 339.393475][ T4373] team0 (unregistering): Port device team_slave_1 removed [ 339.508199][T11830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 339.519569][T11830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.536741][T11830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 339.549121][T11830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.563407][T11830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 339.587568][T11830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.597713][T11830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 339.608508][T11830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.625796][T11830] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 339.638668][ T5814] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 339.648126][ T5814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 339.669997][T11830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 339.682625][T11830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.710237][T11830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 339.740080][T11830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.769288][T11830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 339.779787][T11830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.789648][T11830] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 339.800505][T11830] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.812612][T11830] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 339.820054][T12065] netlink: 'syz.1.2784': attribute type 10 has an invalid length. [ 339.878382][T12076] netlink: 'syz.0.2789': attribute type 10 has an invalid length. [ 339.947167][ T5820] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 339.962314][ T5820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 339.988833][T11830] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.017073][T11830] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.033299][T11830] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.045721][T11830] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.343362][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 340.378589][ T5814] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 340.388903][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 340.397365][ T5814] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 340.405294][ T4301] Bluetooth: hci5: command 0x0419 tx timeout [ 340.426489][ T463] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 340.430712][T12094] FAULT_INJECTION: forcing a failure. [ 340.430712][T12094] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 340.453492][ T5814] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 340.520333][T12094] CPU: 1 PID: 12094 Comm: syz.4.2795 Not tainted 5.15.189-syzkaller #0 [ 340.528608][T12094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 340.538670][T12094] Call Trace: [ 340.541952][T12094] [ 340.544897][T12094] dump_stack_lvl+0x168/0x230 [ 340.549590][T12094] ? show_regs_print_info+0x20/0x20 [ 340.554796][T12094] ? load_image+0x3b0/0x3b0 [ 340.559314][T12094] ? __lock_acquire+0x7c60/0x7c60 [ 340.564358][T12094] should_fail+0x38c/0x4c0 [ 340.568798][T12094] _copy_from_user+0x2e/0x170 [ 340.573496][T12094] iovec_from_user+0x142/0x370 [ 340.578271][T12094] __import_iovec+0x70/0x490 [ 340.582876][T12094] import_iovec+0x6f/0xa0 [ 340.587223][T12094] ___sys_sendmsg+0x1b9/0x260 [ 340.591911][T12094] ? __sys_sendmsg+0x250/0x250 [ 340.596696][T12094] ? trace_event_raw_event_lock+0x250/0x250 [ 340.602592][T12094] ? vfs_write+0x84d/0xd00 [ 340.607029][T12094] ? __fdget+0x18b/0x210 [ 340.611277][T12094] __se_sys_sendmsg+0x190/0x250 [ 340.616134][T12094] ? __x64_sys_sendmsg+0x80/0x80 [ 340.621070][T12094] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 340.627073][T12094] ? lockdep_hardirqs_on+0x94/0x140 [ 340.632277][T12094] do_syscall_64+0x4c/0xa0 [ 340.636699][T12094] ? clear_bhb_loop+0x30/0x80 [ 340.641379][T12094] ? clear_bhb_loop+0x30/0x80 [ 340.646062][T12094] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 340.651961][T12094] RIP: 0033:0x7fd59ffa59a9 [ 340.656377][T12094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 340.675983][T12094] RSP: 002b:00007fd59de0d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 340.684409][T12094] RAX: ffffffffffffffda RBX: 00007fd5a01ccfa0 RCX: 00007fd59ffa59a9 [ 340.692385][T12094] RDX: 000000002002c404 RSI: 00002000000003c0 RDI: 0000000000000003 [ 340.700369][T12094] RBP: 00007fd59de0d090 R08: 0000000000000000 R09: 0000000000000000 [ 340.708342][T12094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 340.716460][T12094] R13: 0000000000000000 R14: 00007fd5a01ccfa0 R15: 00007ffcdd8f7618 [ 340.724453][T12094] [ 341.017558][T12108] netlink: 'syz.2.2801': attribute type 10 has an invalid length. [ 341.047880][T12108] bridge0: port 3(macsec0) entered blocking state [ 341.100642][T12108] bridge0: port 3(macsec0) entered disabled state [ 341.161362][T12108] device macsec0 entered promiscuous mode [ 341.236472][T12108] bridge0: port 3(macsec0) entered blocking state [ 341.243538][T12108] bridge0: port 3(macsec0) entered forwarding state [ 341.355357][T12109] netlink: 65039 bytes leftover after parsing attributes in process `syz.0.2798'. [ 341.403378][T12114] netlink: 'syz.4.2802': attribute type 10 has an invalid length. [ 341.584539][T12126] FAULT_INJECTION: forcing a failure. [ 341.584539][T12126] name failslab, interval 1, probability 0, space 0, times 0 [ 341.602889][T12122] netlink: 55631 bytes leftover after parsing attributes in process `syz.3.2804'. [ 341.687935][T12126] CPU: 1 PID: 12126 Comm: syz.1.2806 Not tainted 5.15.189-syzkaller #0 [ 341.696211][T12126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 341.706263][T12126] Call Trace: [ 341.709540][T12126] [ 341.712468][T12126] dump_stack_lvl+0x168/0x230 [ 341.714219][ T463] wlan1: Trigger new scan to find an IBSS to join [ 341.717154][T12126] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 341.729690][T12126] ? show_regs_print_info+0x20/0x20 [ 341.735051][T12126] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 341.741233][T12126] ? dump_stack+0x5/0x20 [ 341.745495][T12126] should_fail+0x38c/0x4c0 [ 341.749931][T12126] should_failslab+0x5/0x20 [ 341.754442][T12126] slab_pre_alloc_hook+0x51/0xc0 [ 341.759387][T12126] kmem_cache_alloc_node_trace+0x4a/0x300 [ 341.765114][T12126] ? __get_vm_area_node+0x119/0x2d0 [ 341.770320][T12126] ? lock_chain_count+0x20/0x20 [ 341.775179][T12126] __get_vm_area_node+0x119/0x2d0 [ 341.780211][T12126] __vmalloc_node_range+0xef/0x8b0 [ 341.785321][T12126] ? bpf_prog_alloc_no_stats+0x36/0x2c0 [ 341.790871][T12126] ? end_current_label_crit_section+0x170/0x170 [ 341.797119][T12126] ? cap_capable+0xf8/0x230 [ 341.801718][T12126] ? bpf_prog_alloc_no_stats+0x36/0x2c0 [ 341.807267][T12126] __vmalloc+0x76/0x80 [ 341.811340][T12126] ? bpf_prog_alloc_no_stats+0x36/0x2c0 [ 341.816889][T12126] bpf_prog_alloc_no_stats+0x36/0x2c0 [ 341.822276][T12126] bpf_prog_alloc+0x1a/0x1e0 [ 341.826868][T12126] bpf_prog_load+0x7b3/0x1550 [ 341.831555][T12126] ? map_freeze+0x350/0x350 [ 341.836060][T12126] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 341.842219][T12126] ? lockdep_hardirqs_on+0x94/0x140 [ 341.847428][T12126] ? copy_user_enhanced_fast_string+0xe/0x40 [ 341.853406][T12126] ? bpf_lsm_bpf+0x5/0x10 [ 341.857732][T12126] ? security_bpf+0x7a/0xa0 [ 341.862349][T12126] __sys_bpf+0x4c2/0x670 [ 341.866592][T12126] ? bpf_link_show_fdinfo+0x340/0x340 [ 341.871983][T12126] __x64_sys_bpf+0x78/0x90 [ 341.876399][T12126] do_syscall_64+0x4c/0xa0 [ 341.880809][T12126] ? clear_bhb_loop+0x30/0x80 [ 341.885480][T12126] ? clear_bhb_loop+0x30/0x80 [ 341.890162][T12126] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 341.896050][T12126] RIP: 0033:0x7f245c3bb9a9 [ 341.900462][T12126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 341.920061][T12126] RSP: 002b:00007f245a223038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 341.928472][T12126] RAX: ffffffffffffffda RBX: 00007f245c5e2fa0 RCX: 00007f245c3bb9a9 [ 341.936437][T12126] RDX: 0000000000000080 RSI: 0000200000000600 RDI: 0000000000000005 [ 341.944408][T12126] RBP: 00007f245a223090 R08: 0000000000000000 R09: 0000000000000000 [ 341.944552][T12122] netlink: 6328 bytes leftover after parsing attributes in process `syz.3.2804'. [ 341.952382][T12126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 341.952397][T12126] R13: 0000000000000000 R14: 00007f245c5e2fa0 R15: 00007ffdf2a1bca8 [ 341.952424][T12126] [ 341.990062][T12122] tc_dump_action: action bad kind [ 341.998444][T12126] syz.1.2806: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz1,mems_allowed=0-1 [ 342.028467][T12126] CPU: 0 PID: 12126 Comm: syz.1.2806 Not tainted 5.15.189-syzkaller #0 [ 342.036734][T12126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 342.046891][T12126] Call Trace: [ 342.050177][T12126] [ 342.053108][T12126] dump_stack_lvl+0x168/0x230 [ 342.057789][T12126] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 342.064037][T12126] ? show_regs_print_info+0x20/0x20 [ 342.069245][T12126] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 342.075419][T12126] warn_alloc+0x20e/0x2f0 [ 342.079760][T12126] ? zone_watermark_ok_safe+0x240/0x240 [ 342.085318][T12126] ? __get_vm_area_node+0x2b5/0x2d0 [ 342.090521][T12126] __vmalloc_node_range+0x2b1/0x8b0 [ 342.095719][T12126] ? end_current_label_crit_section+0x170/0x170 [ 342.101961][T12126] ? cap_capable+0xf8/0x230 [ 342.106463][T12126] ? bpf_prog_alloc_no_stats+0x36/0x2c0 [ 342.112003][T12126] __vmalloc+0x76/0x80 [ 342.116073][T12126] ? bpf_prog_alloc_no_stats+0x36/0x2c0 [ 342.121620][T12126] bpf_prog_alloc_no_stats+0x36/0x2c0 [ 342.126986][T12126] bpf_prog_alloc+0x1a/0x1e0 [ 342.131651][T12126] bpf_prog_load+0x7b3/0x1550 [ 342.136327][T12126] ? map_freeze+0x350/0x350 [ 342.140817][T12126] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 342.146952][T12126] ? lockdep_hardirqs_on+0x94/0x140 [ 342.152141][T12126] ? copy_user_enhanced_fast_string+0xe/0x40 [ 342.158102][T12126] ? bpf_lsm_bpf+0x5/0x10 [ 342.162430][T12126] ? security_bpf+0x7a/0xa0 [ 342.166918][T12126] __sys_bpf+0x4c2/0x670 [ 342.171145][T12126] ? bpf_link_show_fdinfo+0x340/0x340 [ 342.176510][T12126] __x64_sys_bpf+0x78/0x90 [ 342.180905][T12126] do_syscall_64+0x4c/0xa0 [ 342.185305][T12126] ? clear_bhb_loop+0x30/0x80 [ 342.189963][T12126] ? clear_bhb_loop+0x30/0x80 [ 342.194621][T12126] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 342.200497][T12126] RIP: 0033:0x7f245c3bb9a9 [ 342.204894][T12126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 342.225005][T12126] RSP: 002b:00007f245a223038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 342.233407][T12126] RAX: ffffffffffffffda RBX: 00007f245c5e2fa0 RCX: 00007f245c3bb9a9 [ 342.241362][T12126] RDX: 0000000000000080 RSI: 0000200000000600 RDI: 0000000000000005 [ 342.249314][T12126] RBP: 00007f245a223090 R08: 0000000000000000 R09: 0000000000000000 [ 342.257267][T12126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 342.265313][T12126] R13: 0000000000000000 R14: 00007f245c5e2fa0 R15: 00007ffdf2a1bca8 [ 342.273277][T12126] [ 342.327479][T12126] Mem-Info: [ 342.331251][T12126] active_anon:271 inactive_anon:7000 isolated_anon:0 [ 342.331251][T12126] active_file:25582 inactive_file:35855 isolated_file:0 [ 342.331251][T12126] unevictable:768 dirty:332 writeback:0 [ 342.331251][T12126] slab_reclaimable:20706 slab_unreclaimable:92879 [ 342.331251][T12126] mapped:30861 shmem:1629 pagetables:614 bounce:0 [ 342.331251][T12126] kernel_misc_reclaimable:0 [ 342.331251][T12126] free:1371889 free_pcp:12264 free_cma:0 [ 342.378932][T12126] Node 0 active_anon:1052kB inactive_anon:27492kB active_file:102128kB inactive_file:143420kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:123444kB dirty:1328kB writeback:0kB shmem:4440kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:11396kB pagetables:2456kB all_unreclaimable? no [ 342.420522][T12126] Node 1 active_anon:32kB inactive_anon:508kB active_file:200kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:2076kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB all_unreclaimable? no [ 342.455948][T12126] Node 0 DMA free:15360kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 342.488803][T12126] lowmem_reserve[]: 0 2541 2542 [ 342.501352][T12141] FAULT_INJECTION: forcing a failure. [ 342.501352][T12141] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 342.540504][T12126] 2542 2542 [ 342.543906][T12126] Node 0 DMA32 free:1548496kB min:34800kB low:43500kB high:52200kB reserved_highatomic:0KB active_anon:1052kB inactive_anon:27292kB active_file:102128kB inactive_file:143420kB unevictable:1536kB writepending:1328kB present:3129332kB managed:2609004kB mlocked:0kB bounce:0kB free_pcp:42192kB local_pcp:20640kB free_cma:0kB [ 342.585715][T12141] CPU: 0 PID: 12141 Comm: syz.0.2810 Not tainted 5.15.189-syzkaller #0 [ 342.593979][T12141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 342.604051][T12141] Call Trace: [ 342.607327][T12141] [ 342.610265][T12141] dump_stack_lvl+0x168/0x230 [ 342.614988][T12141] ? show_regs_print_info+0x20/0x20 [ 342.620202][T12141] ? load_image+0x3b0/0x3b0 [ 342.624696][T12141] ? __lock_acquire+0x7c60/0x7c60 [ 342.629717][T12141] should_fail+0x38c/0x4c0 [ 342.634126][T12141] _copy_from_user+0x2e/0x170 [ 342.638790][T12141] strndup_user+0xae/0x150 [ 342.643192][T12141] perf_uprobe_init+0x5d/0x190 [ 342.647941][T12141] perf_uprobe_event_init+0xe2/0x170 [ 342.653214][T12141] perf_try_init_event+0x12b/0x3d0 [ 342.658316][T12141] perf_event_alloc+0xfcf/0x2240 [ 342.663244][T12141] __se_sys_perf_event_open+0x5ae/0x1b80 [ 342.668861][T12141] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 342.674482][T12141] ? lockdep_hardirqs_on+0x94/0x140 [ 342.679660][T12141] ? __x64_sys_perf_event_open+0x1c/0xc0 [ 342.685274][T12141] do_syscall_64+0x4c/0xa0 [ 342.689674][T12141] ? clear_bhb_loop+0x30/0x80 [ 342.694341][T12141] ? clear_bhb_loop+0x30/0x80 [ 342.699021][T12141] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 342.704913][T12141] RIP: 0033:0x7f4d987879a9 [ 342.709317][T12141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 342.728905][T12141] RSP: 002b:00007f4d965ce038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 342.737304][T12141] RAX: ffffffffffffffda RBX: 00007f4d989af080 RCX: 00007f4d987879a9 [ 342.745356][T12141] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000200000000000 [ 342.753309][T12141] RBP: 00007f4d965ce090 R08: 0000000000000000 R09: 0000000000000000 [ 342.761344][T12141] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 342.769300][T12141] R13: 0000000000000000 R14: 00007f4d989af080 R15: 00007ffdc23fc448 [ 342.777266][T12141] [ 342.830999][T12126] lowmem_reserve[]: 0 0 0 0 0 [ 342.835749][T12126] Node 0 Normal free:0kB min:12kB low:12kB high:12kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:916kB mlocked:0kB bounce:0kB free_pcp:24kB local_pcp:12kB free_cma:0kB [ 342.918661][T12126] lowmem_reserve[]: 0 0 0 0 0 [ 342.938938][T12126] Node 1 Normal free:3923692kB min:55088kB low:68860kB high:82632kB reserved_highatomic:0KB active_anon:32kB inactive_anon:508kB active_file:200kB inactive_file:0kB unevictable:1536kB writepending:0kB present:4194304kB managed:4119672kB mlocked:0kB bounce:0kB free_pcp:6568kB local_pcp:5256kB free_cma:0kB [ 343.002949][T12126] lowmem_reserve[]: 0 0 0 0 0 [ 343.007714][T12126] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 343.027018][T12126] Node 0 DMA32: 1862*4kB (UM) 2033*8kB (UME) 1772*16kB (ME) 1531*32kB (UME) 1411*64kB (UM) 844*128kB (UME) 368*256kB (UM) 111*512kB (UM) 13*1024kB (UM) 5*2048kB (UME) 262*4096kB (UM) = 1547136kB [ 343.047613][T12126] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 343.070467][T12126] Node 1 Normal: 145*4kB (UME) 37*8kB (UME) 28*16kB (UME) 142*32kB (UME) 60*64kB (UME) 20*128kB (UE) 9*256kB (UM) 3*512kB (UE) 2*1024kB (UE) 3*2048kB (UME) 952*4096kB (M) = 3923692kB [ 343.110792][T12126] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 343.135600][T12126] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 343.160706][T12126] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 343.180403][T12126] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 343.200047][T12126] 63066 total pagecache pages [ 343.205248][T12126] 0 pages in swap cache [ 343.209422][T12126] Swap cache stats: add 0, delete 0, find 0/0 [ 343.220470][T12126] Free swap = 124996kB [ 343.224840][T12126] Total swap = 124996kB [ 343.229156][T12126] 2097051 pages RAM [ 343.233262][T12126] 0 pages HighMem/MovableOnly [ 343.238477][T12126] 410813 pages reserved [ 343.242835][T12126] 0 pages cma reserved [ 343.492411][T12162] netlink: 'syz.0.2816': attribute type 10 has an invalid length. [ 343.546008][T12167] netlink: 'syz.1.2818': attribute type 10 has an invalid length. [ 343.575422][T12166] netlink: 'syz.2.2817': attribute type 3 has an invalid length. [ 343.602719][T12163] netlink: 'syz.3.2815': attribute type 6 has an invalid length. [ 343.640978][T12166] netlink: 105116 bytes leftover after parsing attributes in process `syz.2.2817'. [ 343.807376][T12177] netlink: 55631 bytes leftover after parsing attributes in process `syz.1.2822'. [ 343.843948][T12177] netlink: 6328 bytes leftover after parsing attributes in process `syz.1.2822'. [ 343.881848][T12177] tc_dump_action: action bad kind [ 343.891758][T12180] FAULT_INJECTION: forcing a failure. [ 343.891758][T12180] name failslab, interval 1, probability 0, space 0, times 0 [ 343.960471][T12180] CPU: 0 PID: 12180 Comm: syz.0.2823 Not tainted 5.15.189-syzkaller #0 [ 343.968748][T12180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 343.978801][T12180] Call Trace: [ 343.982075][T12180] [ 343.985000][T12180] dump_stack_lvl+0x168/0x230 [ 343.989681][T12180] ? show_regs_print_info+0x20/0x20 [ 343.994875][T12180] ? load_image+0x3b0/0x3b0 [ 343.999380][T12180] ? __might_sleep+0xf0/0xf0 [ 344.003967][T12180] ? __lock_acquire+0x7c60/0x7c60 [ 344.008999][T12180] should_fail+0x38c/0x4c0 [ 344.013418][T12180] should_failslab+0x5/0x20 [ 344.017921][T12180] slab_pre_alloc_hook+0x51/0xc0 [ 344.022862][T12180] __kmalloc_node_track_caller+0x68/0x3a0 [ 344.028575][T12180] ? netlink_sendmsg+0x645/0xbc0 [ 344.033512][T12180] ? kmem_cache_alloc_node+0x162/0x2d0 [ 344.038962][T12180] ? __alloc_skb+0xf4/0x750 [ 344.043463][T12180] ? netlink_sendmsg+0x645/0xbc0 [ 344.048399][T12180] __alloc_skb+0x22c/0x750 [ 344.052826][T12180] netlink_sendmsg+0x645/0xbc0 [ 344.057599][T12180] ? netlink_getsockopt+0x560/0x560 [ 344.062795][T12180] ? aa_sock_msg_perm+0x94/0x150 [ 344.067737][T12180] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 344.073020][T12180] ? security_socket_sendmsg+0x7c/0xa0 [ 344.078481][T12180] ? netlink_getsockopt+0x560/0x560 [ 344.083676][T12180] ____sys_sendmsg+0x5a2/0x8c0 [ 344.088881][T12180] ? memset+0x1e/0x40 [ 344.092863][T12180] ? __sys_sendmsg_sock+0x30/0x30 [ 344.097901][T12180] ? import_iovec+0x6f/0xa0 [ 344.102415][T12180] ___sys_sendmsg+0x1f0/0x260 [ 344.107108][T12180] ? __sys_sendmsg+0x250/0x250 [ 344.111913][T12180] ? __fdget+0x18b/0x210 [ 344.116170][T12180] __se_sys_sendmsg+0x190/0x250 [ 344.121025][T12180] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 344.127192][T12180] ? __x64_sys_sendmsg+0x80/0x80 [ 344.132147][T12180] ? syscall_enter_from_user_mode+0x2a/0x70 [ 344.138480][T12180] do_syscall_64+0x4c/0xa0 [ 344.142897][T12180] ? clear_bhb_loop+0x30/0x80 [ 344.147584][T12180] ? clear_bhb_loop+0x30/0x80 [ 344.152257][T12180] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 344.158149][T12180] RIP: 0033:0x7f4d987879a9 [ 344.162574][T12180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 344.182197][T12180] RSP: 002b:00007f4d965ef038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 344.190624][T12180] RAX: ffffffffffffffda RBX: 00007f4d989aefa0 RCX: 00007f4d987879a9 [ 344.198609][T12180] RDX: 0000000000000000 RSI: 0000200000000340 RDI: 0000000000000003 [ 344.206588][T12180] RBP: 00007f4d965ef090 R08: 0000000000000000 R09: 0000000000000000 [ 344.214571][T12180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 344.222549][T12180] R13: 0000000000000000 R14: 00007f4d989aefa0 R15: 00007ffdc23fc448 [ 344.230548][T12180] [ 344.584371][T12198] FAULT_INJECTION: forcing a failure. [ 344.584371][T12198] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 344.622386][T12200] FAULT_INJECTION: forcing a failure. [ 344.622386][T12200] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 344.647889][T12198] CPU: 1 PID: 12198 Comm: syz.2.2830 Not tainted 5.15.189-syzkaller #0 [ 344.656157][T12198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 344.666208][T12198] Call Trace: [ 344.669484][T12198] [ 344.672409][T12198] dump_stack_lvl+0x168/0x230 [ 344.677100][T12198] ? show_regs_print_info+0x20/0x20 [ 344.682418][T12198] ? load_image+0x3b0/0x3b0 [ 344.686941][T12198] ? __lock_acquire+0x7c60/0x7c60 [ 344.691982][T12198] should_fail+0x38c/0x4c0 [ 344.696407][T12198] _copy_to_user+0x2e/0x130 [ 344.700911][T12198] simple_read_from_buffer+0xe3/0x150 [ 344.706293][T12198] proc_fail_nth_read+0x19a/0x210 [ 344.711325][T12198] ? proc_fault_inject_write+0x2f0/0x2f0 [ 344.716961][T12198] ? fsnotify_perm+0x254/0x560 [ 344.721824][T12198] ? proc_fault_inject_write+0x2f0/0x2f0 [ 344.727456][T12198] vfs_read+0x2f6/0xcf0 [ 344.731621][T12198] ? kernel_read+0x1e0/0x1e0 [ 344.736225][T12198] ? __fget_files+0x40f/0x480 [ 344.740914][T12198] ? mutex_lock_nested+0x17/0x20 [ 344.745987][T12198] ? __fdget_pos+0x2bf/0x370 [ 344.750585][T12198] ? ksys_read+0x71/0x250 [ 344.754923][T12198] ksys_read+0x14d/0x250 [ 344.759178][T12198] ? vfs_write+0xd00/0xd00 [ 344.763687][T12198] ? lockdep_hardirqs_on+0x94/0x140 [ 344.769110][T12198] do_syscall_64+0x4c/0xa0 [ 344.773709][T12198] ? clear_bhb_loop+0x30/0x80 [ 344.778394][T12198] ? clear_bhb_loop+0x30/0x80 [ 344.783072][T12198] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 344.788972][T12198] RIP: 0033:0x7fd2c4ba43bc [ 344.793386][T12198] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 344.813075][T12198] RSP: 002b:00007fd2c2a0d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 344.821487][T12198] RAX: ffffffffffffffda RBX: 00007fd2c4dccfa0 RCX: 00007fd2c4ba43bc [ 344.829681][T12198] RDX: 000000000000000f RSI: 00007fd2c2a0d0a0 RDI: 000000000000000c [ 344.837653][T12198] RBP: 00007fd2c2a0d090 R08: 0000000000000000 R09: 0000000000000000 [ 344.845616][T12198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 344.853575][T12198] R13: 0000000000000000 R14: 00007fd2c4dccfa0 R15: 00007ffc7dc281a8 [ 344.861554][T12198] [ 344.894591][T12200] CPU: 1 PID: 12200 Comm: syz.4.2831 Not tainted 5.15.189-syzkaller #0 [ 344.902854][T12200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 344.912906][T12200] Call Trace: [ 344.916176][T12200] [ 344.919096][T12200] dump_stack_lvl+0x168/0x230 [ 344.923773][T12200] ? show_regs_print_info+0x20/0x20 [ 344.929052][T12200] ? load_image+0x3b0/0x3b0 [ 344.933562][T12200] ? __lock_acquire+0x7c60/0x7c60 [ 344.938566][T12200] ? tomoyo_path_number_perm+0x4d4/0x5d0 [ 344.944178][T12200] ? verify_lock_unused+0x140/0x140 [ 344.949356][T12200] should_fail+0x38c/0x4c0 [ 344.953759][T12200] _copy_from_user+0x2e/0x170 [ 344.958445][T12200] wext_handle_ioctl+0xb7/0x1c0 [ 344.963281][T12200] ? call_commit_handler+0xf0/0xf0 [ 344.968395][T12200] sock_ioctl+0x145/0x6e0 [ 344.972707][T12200] ? sock_poll+0x3f0/0x3f0 [ 344.977115][T12200] ? bpf_lsm_file_ioctl+0x5/0x10 [ 344.982029][T12200] ? security_file_ioctl+0x7c/0xa0 [ 344.987122][T12200] ? sock_poll+0x3f0/0x3f0 [ 344.991528][T12200] __se_sys_ioctl+0xfa/0x170 [ 344.996120][T12200] do_syscall_64+0x4c/0xa0 [ 345.000518][T12200] ? clear_bhb_loop+0x30/0x80 [ 345.005177][T12200] ? clear_bhb_loop+0x30/0x80 [ 345.009832][T12200] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 345.015708][T12200] RIP: 0033:0x7fd59ffa59a9 [ 345.020105][T12200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 345.039687][T12200] RSP: 002b:00007fd59de0d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 345.048079][T12200] RAX: ffffffffffffffda RBX: 00007fd5a01ccfa0 RCX: 00007fd59ffa59a9 [ 345.056032][T12200] RDX: 0000200000000000 RSI: 0000000000008b30 RDI: 0000000000000003 [ 345.063984][T12200] RBP: 00007fd59de0d090 R08: 0000000000000000 R09: 0000000000000000 [ 345.071936][T12200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 345.079979][T12200] R13: 0000000000000000 R14: 00007fd5a01ccfa0 R15: 00007ffcdd8f7618 [ 345.087939][T12200] [ 345.158406][T12202] netlink: 'syz.3.2832': attribute type 10 has an invalid length. [ 345.209419][T12206] netlink: 'syz.0.2828': attribute type 4 has an invalid length. [ 345.221426][T12206] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.2828'. [ 345.440998][T12222] netlink: 'syz.3.2834': attribute type 10 has an invalid length. [ 345.663584][T12235] FAULT_INJECTION: forcing a failure. [ 345.663584][T12235] name failslab, interval 1, probability 0, space 0, times 0 [ 345.681042][ T5814] wlan1: Trigger new scan to find an IBSS to join [ 345.795542][T12235] CPU: 1 PID: 12235 Comm: syz.1.2837 Not tainted 5.15.189-syzkaller #0 [ 345.803833][T12235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 345.813909][T12235] Call Trace: [ 345.817207][T12235] [ 345.820151][T12235] dump_stack_lvl+0x168/0x230 [ 345.824863][T12235] ? show_regs_print_info+0x20/0x20 [ 345.830085][T12235] ? load_image+0x3b0/0x3b0 [ 345.834766][T12235] ? __might_sleep+0xf0/0xf0 [ 345.839382][T12235] ? __lock_acquire+0x7c60/0x7c60 [ 345.844460][T12235] should_fail+0x38c/0x4c0 [ 345.848921][T12235] should_failslab+0x5/0x20 [ 345.853441][T12235] slab_pre_alloc_hook+0x51/0xc0 [ 345.858696][T12235] ? dev_exceptions_copy+0xd1/0x3d0 [ 345.863937][T12235] __kmalloc_track_caller+0x69/0x330 [ 345.869239][T12235] ? dev_exceptions_copy+0xd1/0x3d0 [ 345.874473][T12235] kmemdup+0x22/0x50 [ 345.878393][T12235] dev_exceptions_copy+0xd1/0x3d0 [ 345.883448][T12235] devcgroup_access_write+0x5cf/0x1810 [ 345.888945][T12235] ? dev_exceptions_copy+0x3d0/0x3d0 [ 345.894277][T12235] ? perf_trace_run_bpf_submit+0x124/0x1c0 [ 345.900239][T12235] ? dev_exceptions_copy+0x3d0/0x3d0 [ 345.905552][T12235] cgroup_file_write+0x2f7/0x630 [ 345.910568][T12235] ? read_lock_is_recursive+0x10/0x10 [ 345.915981][T12235] ? cgroup_seqfile_stop+0xd0/0xd0 [ 345.921164][T12235] ? cgroup_seqfile_stop+0xd0/0xd0 [ 345.926290][T12235] kernfs_fop_write_iter+0x379/0x4c0 [ 345.931632][T12235] vfs_write+0x712/0xd00 [ 345.935919][T12235] ? file_end_write+0x250/0x250 [ 345.940811][T12235] ? __fget_files+0x40f/0x480 [ 345.945644][T12235] ? mutex_lock_nested+0x17/0x20 [ 345.950626][T12235] ? __fdget_pos+0x2bf/0x370 [ 345.955315][T12235] ? ksys_write+0x71/0x250 [ 345.959761][T12235] ksys_write+0x14d/0x250 [ 345.964123][T12235] ? __ia32_sys_read+0x80/0x80 [ 345.968921][T12235] ? lockdep_hardirqs_on+0x94/0x140 [ 345.974148][T12235] do_syscall_64+0x4c/0xa0 [ 345.978579][T12235] ? clear_bhb_loop+0x30/0x80 [ 345.983267][T12235] ? clear_bhb_loop+0x30/0x80 [ 345.987968][T12235] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 345.993878][T12235] RIP: 0033:0x7f245c3bb9a9 [ 345.998318][T12235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 346.017946][T12235] RSP: 002b:00007f245a223038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 346.026392][T12235] RAX: ffffffffffffffda RBX: 00007f245c5e2fa0 RCX: 00007f245c3bb9a9 [ 346.034385][T12235] RDX: 000000000000000a RSI: 00002000000000c0 RDI: 0000000000000006 [ 346.042378][T12235] RBP: 00007f245a223090 R08: 0000000000000000 R09: 0000000000000000 [ 346.050373][T12235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 346.058369][T12235] R13: 0000000000000000 R14: 00007f245c5e2fa0 R15: 00007ffdf2a1bca8 [ 346.066418][T12235] [ 346.721350][ T9] wlan1: Creating new IBSS network, BSSID 8a:13:f0:af:5d:1d [ 346.991246][T12255] netlink: 'syz.1.2846': attribute type 10 has an invalid length. [ 347.945149][T12272] netlink: 'syz.0.2851': attribute type 10 has an invalid length. [ 347.962254][T12274] netlink: 'syz.1.2852': attribute type 29 has an invalid length. [ 347.987178][T12274] netlink: 'syz.1.2852': attribute type 29 has an invalid length. [ 348.028634][T12274] netlink: 'syz.1.2852': attribute type 29 has an invalid length. [ 348.088316][T12239] chnl_net:caif_netlink_parms(): no params data found [ 348.201036][T12286] netlink: 40 bytes leftover after parsing attributes in process `syz.1.2857'. [ 348.308538][T12291] netlink: 'syz.2.2859': attribute type 10 has an invalid length. [ 348.422591][T12299] netlink: 209852 bytes leftover after parsing attributes in process `syz.0.2862'. [ 348.432487][T12299] openvswitch: netlink: Tunnel attr 0 has unexpected len 1 expected 8 [ 348.468981][T12300] netlink: 'syz.2.2861': attribute type 1 has an invalid length. [ 348.486422][ T4255] Bluetooth: hci3: command 0x0409 tx timeout [ 348.490084][T12300] netlink: 181400 bytes leftover after parsing attributes in process `syz.2.2861'. [ 348.517268][T12239] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.535297][T12239] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.543819][T12239] device bridge_slave_0 entered promiscuous mode [ 348.581657][T12239] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.588741][T12239] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.592142][T12303] netlink: 181400 bytes leftover after parsing attributes in process `syz.0.2864'. [ 348.597194][T12239] device bridge_slave_1 entered promiscuous mode [ 348.677489][T12239] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 348.798282][T12315] FAULT_INJECTION: forcing a failure. [ 348.798282][T12315] name failslab, interval 1, probability 0, space 0, times 0 [ 348.816170][T12239] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 348.826672][T12315] CPU: 1 PID: 12315 Comm: syz.4.2869 Not tainted 5.15.189-syzkaller #0 [ 348.835653][T12315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 348.846212][T12315] Call Trace: [ 348.849593][T12315] [ 348.853301][T12315] dump_stack_lvl+0x168/0x230 [ 348.858107][T12315] ? show_regs_print_info+0x20/0x20 [ 348.863361][T12315] ? load_image+0x3b0/0x3b0 [ 348.867890][T12315] ? __might_sleep+0xf0/0xf0 [ 348.872493][T12315] ? __lock_acquire+0x7c60/0x7c60 [ 348.877534][T12315] ? __local_bh_enable_ip+0x12a/0x1b0 [ 348.882927][T12315] should_fail+0x38c/0x4c0 [ 348.887375][T12315] should_failslab+0x5/0x20 [ 348.891887][T12315] slab_pre_alloc_hook+0x51/0xc0 [ 348.896853][T12315] kmem_cache_alloc_node_trace+0x4a/0x300 [ 348.902592][T12315] ? __get_vm_area_node+0x119/0x2d0 [ 348.907828][T12315] __get_vm_area_node+0x119/0x2d0 [ 348.912885][T12315] __vmalloc_node_range+0xef/0x8b0 [ 348.918009][T12315] ? netlink_sendmsg+0x5dd/0xbc0 [ 348.922937][T12315] ? netlink_data_ready+0x10/0x10 [ 348.927958][T12315] ? netlink_sendmsg+0x5dd/0xbc0 [ 348.932929][T12315] vmalloc+0x75/0x80 [ 348.936816][T12315] ? netlink_sendmsg+0x5dd/0xbc0 [ 348.941740][T12315] netlink_sendmsg+0x5dd/0xbc0 [ 348.946502][T12315] ? netlink_getsockopt+0x560/0x560 [ 348.951702][T12315] ? aa_sock_msg_perm+0x94/0x150 [ 348.956654][T12315] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 348.961955][T12315] ? security_socket_sendmsg+0x7c/0xa0 [ 348.967427][T12315] ? netlink_getsockopt+0x560/0x560 [ 348.972626][T12315] ____sys_sendmsg+0x5a2/0x8c0 [ 348.977478][T12315] ? memset+0x1e/0x40 [ 348.981449][T12315] ? __sys_sendmsg_sock+0x30/0x30 [ 348.986470][T12315] ? import_iovec+0x6f/0xa0 [ 348.990967][T12315] ___sys_sendmsg+0x1f0/0x260 [ 348.995643][T12315] ? __sys_sendmsg+0x250/0x250 [ 349.000426][T12315] ? trace_event_raw_event_lock+0x250/0x250 [ 349.006326][T12315] ? vfs_write+0x84d/0xd00 [ 349.010771][T12315] ? __fdget+0x18b/0x210 [ 349.015003][T12315] __se_sys_sendmsg+0x190/0x250 [ 349.019848][T12315] ? __x64_sys_sendmsg+0x80/0x80 [ 349.024767][T12315] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 349.030748][T12315] ? lockdep_hardirqs_on+0x94/0x140 [ 349.035936][T12315] do_syscall_64+0x4c/0xa0 [ 349.040336][T12315] ? clear_bhb_loop+0x30/0x80 [ 349.044996][T12315] ? clear_bhb_loop+0x30/0x80 [ 349.049671][T12315] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 349.055575][T12315] RIP: 0033:0x7fd59ffa59a9 [ 349.060001][T12315] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 349.079618][T12315] RSP: 002b:00007fd59de0d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 349.088029][T12315] RAX: ffffffffffffffda RBX: 00007fd5a01ccfa0 RCX: 00007fd59ffa59a9 [ 349.096015][T12315] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000004 [ 349.103983][T12315] RBP: 00007fd59de0d090 R08: 0000000000000000 R09: 0000000000000000 [ 349.112135][T12315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 349.120105][T12315] R13: 0000000000000000 R14: 00007fd5a01ccfa0 R15: 00007ffcdd8f7618 [ 349.128082][T12315] [ 349.201570][T12239] team0: Port device team_slave_0 added [ 349.234173][T12239] team0: Port device team_slave_1 added [ 349.449653][T12321] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.2870'. [ 349.470754][T12239] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 349.478022][T12239] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 349.505604][T12239] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 349.564865][T12239] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 349.586565][T12239] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 349.604207][T12334] FAULT_INJECTION: forcing a failure. [ 349.604207][T12334] name failslab, interval 1, probability 0, space 0, times 0 [ 349.635020][T12334] CPU: 1 PID: 12334 Comm: syz.0.2875 Not tainted 5.15.189-syzkaller #0 [ 349.643342][T12334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 349.653397][T12334] Call Trace: [ 349.656684][T12334] [ 349.659615][T12334] dump_stack_lvl+0x168/0x230 [ 349.664303][T12334] ? show_regs_print_info+0x20/0x20 [ 349.669522][T12334] ? load_image+0x3b0/0x3b0 [ 349.673433][T12239] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 349.674046][T12334] ? __might_sleep+0xf0/0xf0 [ 349.689106][T12334] ? __lock_acquire+0x7c60/0x7c60 [ 349.694143][T12334] should_fail+0x38c/0x4c0 [ 349.698573][T12334] should_failslab+0x5/0x20 [ 349.703083][T12334] slab_pre_alloc_hook+0x51/0xc0 [ 349.708026][T12334] kmem_cache_alloc_node_trace+0x4a/0x300 [ 349.713766][T12334] ? __get_vm_area_node+0x119/0x2d0 [ 349.718974][T12334] __get_vm_area_node+0x119/0x2d0 [ 349.724008][T12334] __vmalloc_node_range+0xef/0x8b0 [ 349.729130][T12334] ? bpf_prog_alloc_no_stats+0x36/0x2c0 [ 349.734684][T12334] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 349.740855][T12334] ? __vmalloc+0xf/0x80 [ 349.745022][T12334] ? bpf_prog_alloc_no_stats+0x36/0x2c0 [ 349.750577][T12334] __vmalloc+0x76/0x80 [ 349.754653][T12334] ? bpf_prog_alloc_no_stats+0x36/0x2c0 [ 349.760214][T12334] bpf_prog_alloc_no_stats+0x36/0x2c0 [ 349.765575][T12334] bpf_prog_alloc+0x1a/0x1e0 [ 349.770153][T12334] bpf_prog_load+0x7b3/0x1550 [ 349.774819][T12334] ? map_freeze+0x350/0x350 [ 349.779310][T12334] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 349.785457][T12334] ? lockdep_hardirqs_on+0x94/0x140 [ 349.790657][T12334] ? copy_user_enhanced_fast_string+0xe/0x40 [ 349.796640][T12334] ? bpf_lsm_bpf+0x5/0x10 [ 349.800952][T12334] ? security_bpf+0x7a/0xa0 [ 349.805437][T12334] __sys_bpf+0x4c2/0x670 [ 349.809664][T12334] ? bpf_link_show_fdinfo+0x340/0x340 [ 349.815021][T12334] ? vtime_user_exit+0x2dc/0x400 [ 349.819946][T12334] __x64_sys_bpf+0x78/0x90 [ 349.824349][T12334] do_syscall_64+0x4c/0xa0 [ 349.828747][T12334] ? clear_bhb_loop+0x30/0x80 [ 349.833402][T12334] ? clear_bhb_loop+0x30/0x80 [ 349.838062][T12334] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 349.843944][T12334] RIP: 0033:0x7f4d987879a9 [ 349.848358][T12334] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 349.867949][T12334] RSP: 002b:00007f4d965ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 349.876441][T12334] RAX: ffffffffffffffda RBX: 00007f4d989aefa0 RCX: 00007f4d987879a9 [ 349.884393][T12334] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 349.892362][T12334] RBP: 00007f4d965ef090 R08: 0000000000000000 R09: 0000000000000000 [ 349.900319][T12334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 349.908278][T12334] R13: 0000000000000000 R14: 00007f4d989aefa0 R15: 00007ffdc23fc448 [ 349.916250][T12334] [ 350.078633][T12239] device hsr_slave_0 entered promiscuous mode [ 350.098532][T12239] device hsr_slave_1 entered promiscuous mode [ 350.107279][T12353] FAULT_INJECTION: forcing a failure. [ 350.107279][T12353] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 350.185544][T12353] CPU: 1 PID: 12353 Comm: syz.1.2882 Not tainted 5.15.189-syzkaller #0 [ 350.193853][T12353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 350.204208][T12353] Call Trace: [ 350.207513][T12353] [ 350.210483][T12353] dump_stack_lvl+0x168/0x230 [ 350.215212][T12353] ? show_regs_print_info+0x20/0x20 [ 350.220450][T12353] ? load_image+0x3b0/0x3b0 [ 350.225006][T12353] ? __lock_acquire+0x7c60/0x7c60 [ 350.230114][T12353] should_fail+0x38c/0x4c0 [ 350.234594][T12353] _copy_from_user+0x2e/0x170 [ 350.239328][T12353] perf_copy_attr+0x167/0x840 [ 350.244076][T12353] __se_sys_perf_event_open+0xcb/0x1b80 [ 350.249707][T12353] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 350.255467][T12353] ? lockdep_hardirqs_on+0x94/0x140 [ 350.260689][T12353] ? __x64_sys_perf_event_open+0x1c/0xc0 [ 350.266372][T12353] do_syscall_64+0x4c/0xa0 [ 350.270814][T12353] ? clear_bhb_loop+0x30/0x80 [ 350.275517][T12353] ? clear_bhb_loop+0x30/0x80 [ 350.280236][T12353] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 350.286157][T12353] RIP: 0033:0x7f245c3bb9a9 [ 350.290604][T12353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 350.310236][T12353] RSP: 002b:00007f245a223038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 350.318695][T12353] RAX: ffffffffffffffda RBX: 00007f245c5e2fa0 RCX: 00007f245c3bb9a9 [ 350.326695][T12353] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000200000000000 [ 350.334693][T12353] RBP: 00007f245a223090 R08: 0000000000000000 R09: 0000000000000000 [ 350.342692][T12353] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 [ 350.350686][T12353] R13: 0000000000000000 R14: 00007f245c5e2fa0 R15: 00007ffdf2a1bca8 [ 350.358778][T12353] [ 350.560692][ T1346] Bluetooth: hci3: command 0x041b tx timeout [ 352.640684][ T4255] Bluetooth: hci3: command 0x040f tx timeout [ 354.721039][ T4255] Bluetooth: hci3: command 0x0419 tx timeout [ 362.078902][ T5814] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 369.120572][ T4255] Bluetooth: hci8: command 0x0409 tx timeout [ 369.127816][ T4255] Bluetooth: hci7: command 0x0409 tx timeout [ 369.200746][ T4255] Bluetooth: hci6: command 0x0409 tx timeout [ 369.210628][ T4255] Bluetooth: hci4: command 0x0409 tx timeout [ 371.200638][ T4255] Bluetooth: hci7: command 0x041b tx timeout [ 371.208084][ T4255] Bluetooth: hci8: command 0x041b tx timeout [ 371.280535][ T4255] Bluetooth: hci4: command 0x041b tx timeout [ 371.286697][ T4255] Bluetooth: hci6: command 0x041b tx timeout [ 373.280599][ T23] Bluetooth: hci8: command 0x040f tx timeout [ 373.287722][ T23] Bluetooth: hci7: command 0x040f tx timeout [ 373.360492][ T23] Bluetooth: hci6: command 0x040f tx timeout [ 373.368182][ T23] Bluetooth: hci4: command 0x040f tx timeout [ 375.360584][ T4255] Bluetooth: hci7: command 0x0419 tx timeout [ 375.366724][ T4255] Bluetooth: hci8: command 0x0419 tx timeout [ 375.440503][ T4255] Bluetooth: hci4: command 0x0419 tx timeout [ 375.446631][ T4255] Bluetooth: hci6: command 0x0419 tx timeout [ 408.240728][ T4255] Bluetooth: hci9: command 0x0409 tx timeout [ 410.320497][ T4255] Bluetooth: hci9: command 0x041b tx timeout [ 412.400406][ T4255] Bluetooth: hci9: command 0x040f tx timeout [ 414.480387][ T4255] Bluetooth: hci9: command 0x0419 tx timeout [ 428.320592][ T4255] Bluetooth: hci10: command 0x0409 tx timeout [ 429.760532][ T4255] Bluetooth: hci12: command 0x0409 tx timeout [ 429.840430][ T4255] Bluetooth: hci13: command 0x0409 tx timeout [ 429.847629][ T4255] Bluetooth: hci11: command 0x0409 tx timeout [ 430.400436][ T4255] Bluetooth: hci10: command 0x041b tx timeout [ 431.840554][ T4255] Bluetooth: hci12: command 0x041b tx timeout [ 431.920445][ T4255] Bluetooth: hci11: command 0x041b tx timeout [ 431.926703][ T4255] Bluetooth: hci13: command 0x041b tx timeout [ 432.480402][ T4255] Bluetooth: hci10: command 0x040f tx timeout [ 433.920558][ T4255] Bluetooth: hci12: command 0x040f tx timeout [ 434.000454][ T4255] Bluetooth: hci13: command 0x040f tx timeout [ 434.009326][ T4255] Bluetooth: hci11: command 0x040f tx timeout [ 434.560448][ T4255] Bluetooth: hci10: command 0x0419 tx timeout [ 436.000537][ T4255] Bluetooth: hci12: command 0x0419 tx timeout [ 436.080447][ T4255] Bluetooth: hci11: command 0x0419 tx timeout [ 436.091546][ T4255] Bluetooth: hci13: command 0x0419 tx timeout [ 455.830247][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 455.837388][ C1] rcu: 0-....: (1 GPs behind) idle=f5b/1/0x4000000000000002 softirq=31191/31192 fqs=5247 [ 455.848384][ C1] (detected by 1, t=10502 jiffies, g=41205, q=1064) [ 455.855082][ C1] Sending NMI from CPU 1 to CPUs 0: [ 455.860287][ C0] NMI backtrace for cpu 0 [ 455.860297][ C0] CPU: 0 PID: 12353 Comm: syz.1.2882 Not tainted 5.15.189-syzkaller #0 [ 455.860313][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 455.860322][ C0] RIP: 0010:kasan_check_range+0x4f/0x290 [ 455.860345][ C0] Code: f8 ff ff 01 00 0f 82 43 02 00 00 49 bf 01 00 00 00 00 fc ff df 49 89 fb 49 c1 eb 03 49 b8 00 00 00 00 00 fc ff df 4f 8d 0c 03 <48> 8d 5c 37 ff 48 c1 eb 03 4e 8d 14 3b 4d 89 d6 4d 29 ce 49 83 fe [ 455.860357][ C0] RSP: 0018:ffffc90000007780 EFLAGS: 00000806 [ 455.860370][ C0] RAX: ffffffff81966001 RBX: 0000000000000038 RCX: ffffffff81966160 [ 455.860380][ C0] RDX: 0000000000000001 RSI: 0000000000000038 RDI: ffffc90000007800 [ 455.860389][ C0] RBP: 0000000000000000 R08: dffffc0000000000 R09: fffff52000000f00 [ 455.860399][ C0] R10: fffffbfff1ff6e19 R11: 1ffff92000000f00 R12: ffffc90000007800 [ 455.860409][ C0] R13: 1ffff92000000efc R14: ffffc90000007800 R15: dffffc0000000001 [ 455.860420][ C0] FS: 0000000000000000(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 [ 455.860431][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 455.860441][ C0] CR2: 0000200000001240 CR3: 000000000be8e000 CR4: 00000000003506f0 [ 455.860453][ C0] DR0: 0000200000000380 DR1: 0000200000000300 DR2: 0000000000000000 [ 455.860463][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 455.860471][ C0] Call Trace: [ 455.860477][ C0] [ 455.860487][ C0] memset+0x1e/0x40 [ 455.860504][ C0] perf_event_output_forward+0x130/0x280 [ 455.860520][ C0] ? __lock_acquire+0x7c60/0x7c60 [ 455.860536][ C0] ? perf_get_page_size+0x420/0x420 [ 455.860553][ C0] ? tracing_gen_ctx_irq_test+0xb3/0x130 [ 455.860572][ C0] ? __perf_event_account_interrupt+0x187/0x280 [ 455.860588][ C0] __perf_event_overflow+0x364/0x530 [ 455.860606][ C0] perf_tp_event+0x32c/0xb50 [ 455.860623][ C0] ? perf_trace_run_bpf_submit+0x1c0/0x1c0 [ 455.860637][ C0] ? __perf_event_overflow+0x415/0x530 [ 455.860667][ C0] ? rcu_is_watching+0x11/0xa0 [ 455.860692][ C0] perf_trace_run_bpf_submit+0xf3/0x1c0 [ 455.860710][ C0] perf_trace_preemptirq_template+0x2be/0x380 [ 455.860728][ C0] ? asm_sysvec_irq_work+0x16/0x20 [ 455.860745][ C0] ? trace_event_raw_event_preemptirq_template+0x270/0x270 [ 455.860761][ C0] ? __irq_exit_rcu+0x13b/0x220 [ 455.860775][ C0] ? irq_exit_rcu+0x20/0x20 [ 455.860790][ C0] ? asm_sysvec_irq_work+0x16/0x20 [ 455.860803][ C0] trace_irq_enable_rcuidle+0x108/0x180 [ 455.860819][ C0] trace_hardirqs_on+0x57/0x80 [ 455.860832][ C0] asm_sysvec_irq_work+0x16/0x20 [ 455.860844][ C0] RIP: 0010:handle_softirqs+0x1a9/0x820 [ 455.860858][ C0] Code: 24 78 44 89 64 24 28 0f b7 db 48 c7 c7 c0 fd 09 8a e8 cb c8 5f 08 65 66 c7 05 e1 22 bb 7e 00 00 e8 4c 6c 35 00 fb 89 5c 24 34 ff ff ff ff 0f bc 44 24 34 41 89 c5 41 ff c5 0f 85 c1 00 00 00 [ 455.860869][ C0] RSP: 0018:ffffc90000007e20 EFLAGS: 00000282 [ 455.860880][ C0] RAX: d91cd8193689d600 RBX: 0000000000000242 RCX: d91cd8193689d600 [ 455.860890][ C0] RDX: dffffc0000000000 RSI: ffffffff8a0b15c0 RDI: ffffffff8a599340 [ 455.860901][ C0] RBP: ffffc90000007f30 R08: dffffc0000000000 R09: fffffbfff1ff6e19 [ 455.860911][ C0] R10: fffffbfff1ff6e19 R11: 1ffffffff1ff6e18 R12: 000000000000000a [ 455.860920][ C0] R13: 0000000000000000 R14: ffff888022cb8000 R15: dffffc0000000000 [ 455.860947][ C0] ? __irq_exit_rcu+0x12f/0x220 [ 455.860965][ C0] ? do_softirq+0x200/0x200 [ 455.860982][ C0] ? irqtime_account_irq+0xb2/0x1b0 [ 455.861000][ C0] __irq_exit_rcu+0x12f/0x220 [ 455.861014][ C0] ? irq_exit_rcu+0x20/0x20 [ 455.861026][ C0] ? kvm_sched_clock_read+0x14/0x40 [ 455.861050][ C0] irq_exit_rcu+0x5/0x20 [ 455.861062][ C0] sysvec_irq_work+0x9d/0xc0 [ 455.861077][ C0] [ 455.861081][ C0] [ 455.861092][ C0] asm_sysvec_irq_work+0x16/0x20 [ 455.861105][ C0] RIP: 0010:rcu_read_unlock_special+0x84/0x480 [ 455.861121][ C0] Code: f1 f1 f1 00 f2 f2 f2 4a 89 04 2b 66 42 c7 44 2b 09 f3 f3 42 c6 44 2b 0b f3 65 44 8b 35 7d 16 9e 7e 41 f7 c6 00 00 f0 00 74 45 <48> c7 44 24 20 0e 36 e0 45 4a c7 04 2b 00 00 00 00 66 42 c7 44 2b [ 455.861133][ C0] RSP: 0018:ffffc9000300f420 EFLAGS: 00000206 [ 455.861145][ C0] RAX: d91cd8193689d600 RBX: 1ffff92000601e88 RCX: d91cd8193689d600 [ 455.861157][ C0] RDX: dffffc0000000000 RSI: ffffffff8a0b15c0 RDI: ffffffff8a599340 [ 455.861168][ C0] RBP: ffffc9000300f4f0 R08: dffffc0000000000 R09: fffffbfff1ff6e19 [ 455.861179][ C0] R10: fffffbfff1ff6e19 R11: 1ffffffff1ff6e18 R12: ffffffff8c120800 [ 455.861190][ C0] R13: dffffc0000000000 R14: 0000000000000246 R15: 0000000000000001 [ 455.861213][ C0] ? __rcu_read_unlock+0xd0/0xd0 [ 455.861228][ C0] ? rcu_lock_acquire+0x30/0x30 [ 455.861245][ C0] ? __lock_acquire+0x7c60/0x7c60 [ 455.861264][ C0] __rcu_read_unlock+0x78/0xd0 [ 455.861279][ C0] __unlock_page_memcg+0xea/0x100 [ 455.861298][ C0] unmap_page_range+0xfbc/0x2520 [ 455.861327][ C0] ? uprobe_munmap+0x183/0x3f0 [ 455.861350][ C0] unmap_vmas+0x11b/0x230 [ 455.861366][ C0] ? uprobe_clear_state+0x4f/0x460 [ 455.861381][ C0] ? unmap_page_range+0x2520/0x2520 [ 455.861397][ C0] ? __mutex_lock_common+0x431/0x2390 [ 455.861414][ C0] ? trace_event_raw_event_lock_acquire+0x2b0/0x2b0 [ 455.861433][ C0] ? memset+0x1e/0x40 [ 455.861451][ C0] exit_mmap+0x38f/0x5f0 [ 455.861468][ C0] ? vm_brk+0x20/0x20 [ 455.861492][ C0] ? uprobe_clear_state+0x2f6/0x460 [ 455.861506][ C0] ? mm_update_next_owner+0x522/0x640 [ 455.861527][ C0] __mmput+0x115/0x3b0 [ 455.861542][ C0] exit_mm+0x567/0x6c0 [ 455.861557][ C0] ? xacct_add_tsk+0x4b0/0x4b0 [ 455.861574][ C0] ? do_exit+0x20a0/0x20a0 [ 455.861591][ C0] ? taskstats_exit+0x439/0xab0 [ 455.861608][ C0] ? tty_audit_exit+0x14e/0x1f0 [ 455.861628][ C0] do_exit+0x5a1/0x20a0 [ 455.861645][ C0] ? rcu_nmi_exit+0x6f/0xf0 [ 455.861659][ C0] ? put_task_struct+0x80/0x80 [ 455.861676][ C0] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 455.861695][ C0] ? lock_chain_count+0x20/0x20 [ 455.861716][ C0] do_group_exit+0x12e/0x300 [ 455.861732][ C0] ? lockdep_hardirqs_on+0x94/0x140 [ 455.861748][ C0] get_signal+0x6ca/0x12c0 [ 455.861775][ C0] arch_do_signal_or_restart+0xc1/0x1300 [ 455.861805][ C0] ? get_sigframe_size+0x10/0x10 [ 455.861821][ C0] ? rcu_nmi_exit+0x6f/0xf0 [ 455.861846][ C0] ? exit_to_user_mode_loop+0x3b/0x130 [ 455.861866][ C0] exit_to_user_mode_loop+0x9e/0x130 [ 455.861883][ C0] exit_to_user_mode_prepare+0xb1/0x140 [ 455.861901][ C0] syscall_exit_to_user_mode+0x16/0x40 [ 455.861916][ C0] do_syscall_64+0x58/0xa0 [ 455.861931][ C0] ? clear_bhb_loop+0x30/0x80 [ 455.861944][ C0] ? clear_bhb_loop+0x30/0x80 [ 455.861959][ C0] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 455.861976][ C0] RIP: 0033:0x7f245c3bb9a9 [ 455.861988][ C0] Code: Unable to access opcode bytes at RIP 0x7f245c3bb97f. [ 455.861995][ C0] RSP: 002b:00007f245a2230e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 455.862009][ C0] RAX: fffffffffffffe00 RBX: 00007f245c5e2fa8 RCX: 00007f245c3bb9a9 [ 455.862020][ C0] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f245c5e2fa8 [ 455.862030][ C0] RBP: 00007f245c5e2fa0 R08: 0000000000000000 R09: 0000000000000000 [ 455.862039][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f245c5e2fac [ 455.862049][ C0] R13: 0000000000000000 R14: 00007ffdf2a1bbc0 R15: 00007ffdf2a1bca8 [ 455.862069][ C0] [ 460.321483][ T1346] rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 0-... } 10950 jiffies s: 21137 root: 0x1/. [ 460.347475][ T1346] rcu: blocking rcu_node structures (internal RCU debug): [ 460.359480][ T1346] Task dump for CPU 0: [ 460.363790][ T1346] task:syz.1.2882 state:R running task stack:25632 pid:12353 ppid: 4183 flags:0x00004008 [ 460.374661][ T1346] Call Trace: [ 460.377938][ T1346] [ 460.380955][ T1346] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 460.386977][ T1346] ? perf_trace_preemptirq_template+0x2be/0x380 [ 460.393353][ T1346] ? rcu_is_watching+0x11/0xa0 [ 460.398118][ T1346] ? trace_hardirqs_off_finish+0xca/0x1f0 [ 460.403881][ T1346] ? sysvec_irq_work+0x7d/0xc0 [ 460.408646][ T1346] ? asm_sysvec_irq_work+0x16/0x20 [ 460.413807][ T1346] ? rcu_read_unlock_special+0x84/0x480 [ 460.419363][ T1346] ? __rcu_read_unlock+0xd0/0xd0 [ 460.424380][ T1346] ? rcu_lock_acquire+0x30/0x30 [ 460.429251][ T1346] ? __lock_acquire+0x7c60/0x7c60 [ 460.434361][ T1346] ? __rcu_read_unlock+0x78/0xd0 [ 460.439307][ T1346] ? __unlock_page_memcg+0xea/0x100 [ 460.444555][ T1346] ? unmap_page_range+0xfbc/0x2520 [ 460.449690][ T1346] ? uprobe_munmap+0x183/0x3f0 [ 460.454509][ T1346] ? unmap_vmas+0x11b/0x230 [ 460.459183][ T1346] ? uprobe_clear_state+0x4f/0x460 [ 460.464379][ T1346] ? unmap_page_range+0x2520/0x2520 [ 460.469583][ T1346] ? __mutex_lock_common+0x431/0x2390 [ 460.475035][ T1346] ? trace_event_raw_event_lock_acquire+0x2b0/0x2b0 [ 460.481679][ T1346] ? memset+0x1e/0x40 [ 460.485687][ T1346] ? exit_mmap+0x38f/0x5f0 [ 460.490114][ T1346] ? vm_brk+0x20/0x20 [ 460.494154][ T1346] ? uprobe_clear_state+0x2f6/0x460 [ 460.499365][ T1346] ? mm_update_next_owner+0x522/0x640 [ 460.504809][ T1346] ? __mmput+0x115/0x3b0 [ 460.509055][ T1346] ? exit_mm+0x567/0x6c0 [ 460.513333][ T1346] ? xacct_add_tsk+0x4b0/0x4b0 [ 460.518101][ T1346] ? do_exit+0x20a0/0x20a0 [ 460.522553][ T1346] ? taskstats_exit+0x439/0xab0 [ 460.527408][ T1346] ? tty_audit_exit+0x14e/0x1f0 [ 460.532339][ T1346] ? do_exit+0x5a1/0x20a0 [ 460.536673][ T1346] ? rcu_nmi_exit+0x6f/0xf0 [ 460.541212][ T1346] ? put_task_struct+0x80/0x80 [ 460.545982][ T1346] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 460.552003][ T1346] ? lock_chain_count+0x20/0x20 [ 460.556865][ T1346] ? do_group_exit+0x12e/0x300 [ 460.561659][ T1346] ? lockdep_hardirqs_on+0x94/0x140 [ 460.566865][ T1346] ? get_signal+0x6ca/0x12c0 [ 460.571540][ T1346] ? arch_do_signal_or_restart+0xc1/0x1300 [ 460.577396][ T1346] ? get_sigframe_size+0x10/0x10 [ 460.582401][ T1346] ? rcu_nmi_exit+0x6f/0xf0 [ 460.586927][ T1346] ? exit_to_user_mode_loop+0x3b/0x130 [ 460.592421][ T1346] ? exit_to_user_mode_loop+0x9e/0x130 [ 460.597880][ T1346] ? exit_to_user_mode_prepare+0xb1/0x140 [ 460.603639][ T1346] ? syscall_exit_to_user_mode+0x16/0x40 [ 460.609269][ T1346] ? do_syscall_64+0x58/0xa0 [ 460.613885][ T1346] ? clear_bhb_loop+0x30/0x80 [ 460.618564][ T1346] ? clear_bhb_loop+0x30/0x80 [ 460.623272][ T1346] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 460.629365][ T1346]