last executing test programs: 3.581329357s ago: executing program 0 (id=2206): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x1, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x3, 0x10004, 0x5, 0x40, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000002d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f80)={r0, 0x58, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000dc0)="f9008405f7706eb7b2c65460f5442a43e4f6db7522ead26ae2f9dfead8a6d69922d9e3ed51bcff0261141469b7b29be99de04ea466977b0b957e07da79bb0f88970c322d015b6de3d77f51918b65d24694df2eb9e6706bbfac97a59f324145e93f138bb5078b4968057ba3fd523cb87c8350ff3fefa86f5af477ddab4c21ff692077599b519c46e5586f64ae9863ce2ac055f9dc63bc6ae11534a2bbaa97438c0e1f99130bbc7e47e789143cbcf628fe096e73f520a597d16c97a1c446947721e57c910685e70113eb42b02a2432f0c275e3ed6d8c620082373d2a85c7c11ce6bdbb5e1caac7bc01d3bcebe163e237e13139cb058296b437734f9c01b00b0d", 0xff}], 0x1, &(0x7f0000000fc0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}], 0x20}, 0x24008040) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa65, 0x0, @perf_config_ext, 0x6011}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r6, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7}, &(0x7f0000000000), &(0x7f0000000080)=r4}, 0x20) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000100)='>', 0x1}], 0x1}, 0x44000) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe2d, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000140)={'veth1_to_team\x00', @link_local}) r10 = socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x19, 0x4, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="190000000400000004000000020000"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r11, &(0x7f0000000140), &(0x7f0000000000)=""/6, 0x2}, 0x20) sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000011008108090f9becdb4cb92e264831371900000069bd6efb2502eaf60d002700020400bf050005001201", 0x2e}], 0x1}, 0x0) 2.901502875s ago: executing program 0 (id=2212): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x84, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x80) socket$kcm(0x25, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='blkio.bfq.dequeue\x00') bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xe, 0x0, &(0x7f00000003c0)="386d178529a39dea18dd3f87d7a5", 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.696353865s ago: executing program 2 (id=2215): r0 = socket$kcm(0x1e, 0x5, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300000004000000040000000a0000001a000000", @ANYRES32, @ANYBLOB='\t\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000040000000100"/28], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x77, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a00)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x182, 0x182, 0x8, [@float={0xf, 0x0, 0x0, 0x10, 0xc}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @struct={0xb, 0x1, 0x0, 0x4, 0x0, 0x7, [{0x0, 0x5, 0x3}]}, @type_tag={0xf, 0x0, 0x0, 0x12, 0x5}, @enum64={0x6, 0x1, 0x0, 0x13, 0x0, 0x11, [{0x6, 0x5, 0x9}]}, @enum={0xa, 0x9, 0x0, 0x6, 0x4, [{0xc, 0x6}, {0x0, 0x7}, {0xb, 0x6}, {0x5, 0xfffffff7}, {0x7, 0x7}, {0x5}, {0x8}, {0x8, 0x6}, {0xb, 0x6}]}, @datasec={0x6, 0x7, 0x0, 0xf, 0x2, [{0x2, 0x4, 0x1b1c}, {0x4, 0xfffffffc, 0x8001}, {0x2, 0x2042ec5c, 0x80}, {0x3, 0x9, 0x2}, {0x4, 0x7fff, 0x1}, {0x5, 0x4, 0x5}, {0x2, 0x41e2, 0x10000}], "ff1e"}, @struct={0xa, 0x3, 0x0, 0x4, 0x1, 0x6, [{0xd, 0x5, 0xfffffffb}, {0x2000000a, 0x3, 0x7}, {0x9, 0x3, 0x5}]}, @var={0x2, 0x0, 0x0, 0xe, 0x4}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0xe, 0x1}, {0x9, 0x4}, {}, {0x9, 0x2}]}]}, {0x0, [0x5f, 0x5f, 0x0, 0x30, 0x0, 0x30]}}, &(0x7f0000000900)=""/212, 0x1a4, 0xd4, 0x0, 0x1, 0x0, @void, @value}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="120000007f00000000405f970200000080000000f830b452565335608482ebe140b1d5a1add428c617f92c248ce1f0d1237594c48cbb50b59f2c03551e7a6db693347a56589c6ffd02cdb599c28c2a84ff482e7aa1b3bbbcc5bafdc81898649d43ccd70e98b365108406632f8f10", @ANYRES32=r1, @ANYBLOB="0100"/20, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="02000000020000000100"/28], 0x50) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001540)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x80, 0x0}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r5, 0x2b, 0x1, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) recvmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000007c0)=""/254, 0xfe}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="ff", 0x1}], 0x1, &(0x7f00000002c0)=ANY=[], 0x11f0}, 0x10) socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x200, 0x9, 0x9, 0x30, r4, 0x5, '\x00', r2, r3, 0x4, 0x4, 0x4, 0x7, @void, @value, @void, @value}, 0x50) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000400)="d8000000140081044e81f782db44b9040a1d08020a000000040000a118000200fe8000000000000008000f0100810401a80016ea1f0008400304000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c0100000000000000cb090000001fb791643a5ee40021146218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e0060000000000000080bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd68adbef3d93452a00"/216, 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f00000003c0)={&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x0, @loopback}, 0x80, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_tracing={0x1a, 0xf, &(0x7f0000000640)=@ringbuf, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2cb4e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r8 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x40) 2.600502295s ago: executing program 0 (id=2217): r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x11, 0x20000000000000a, 0x300) sendmsg$inet(r0, 0x0, 0x0) 2.535510885s ago: executing program 1 (id=2218): r0 = socket$kcm(0x1e, 0x5, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300000004000000040000000a0000001a000000", @ANYRES32, @ANYBLOB='\t\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000040000000100"/28], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x77, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a00)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x182, 0x182, 0x8, [@float={0xf, 0x0, 0x0, 0x10, 0xc}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @struct={0xb, 0x1, 0x0, 0x4, 0x0, 0x7, [{0x0, 0x5, 0x3}]}, @type_tag={0xf, 0x0, 0x0, 0x12, 0x5}, @enum64={0x6, 0x1, 0x0, 0x13, 0x0, 0x11, [{0x6, 0x5, 0x9}]}, @enum={0xa, 0x9, 0x0, 0x6, 0x4, [{0xc, 0x6}, {0x0, 0x7}, {0xb, 0x6}, {0x5, 0xfffffff7}, {0x7, 0x7}, {0x5}, {0x8}, {0x8, 0x6}, {0xb, 0x6}]}, @datasec={0x6, 0x7, 0x0, 0xf, 0x2, [{0x2, 0x4, 0x1b1c}, {0x4, 0xfffffffc, 0x8001}, {0x2, 0x2042ec5c, 0x80}, {0x3, 0x9, 0x2}, {0x4, 0x7fff, 0x1}, {0x5, 0x4, 0x5}, {0x2, 0x41e2, 0x10000}], "ff1e"}, @struct={0xa, 0x3, 0x0, 0x4, 0x1, 0x6, [{0xd, 0x5, 0xfffffffb}, {0x2000000a, 0x3, 0x7}, {0x9, 0x3, 0x5}]}, @var={0x2, 0x0, 0x0, 0xe, 0x4}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0xe, 0x1}, {0x9, 0x4}, {}, {0x9, 0x2}]}]}, {0x0, [0x5f, 0x5f, 0x0, 0x30, 0x0, 0x30]}}, &(0x7f0000000900)=""/212, 0x1a4, 0xd4, 0x0, 0x1, 0x0, @void, @value}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="120000007f00000000405f970200000080000000f830b452565335608482ebe140b1d5a1add428c617f92c248ce1f0d1237594c48cbb50b59f2c03551e7a6db693347a56589c6ffd02cdb599c28c2a84ff482e7aa1b3bbbcc5bafdc81898649d43ccd70e98b365108406632f8f10", @ANYRES32=r1, @ANYBLOB="0100"/20, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="02000000020000000100"/28], 0x50) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001540)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x80, 0x0}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r5, 0x2b, 0x1, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) recvmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000007c0)=""/254, 0xfe}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="ff", 0x1}], 0x1, &(0x7f00000002c0)=ANY=[], 0x11f0}, 0x10) r6 = socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x200, 0x9, 0x9, 0x30, r4, 0x5, '\x00', r2, r3, 0x4, 0x4, 0x4, 0x7, @void, @value, @void, @value}, 0x50) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000400)="d8000000140081044e81f782db44b9040a1d08020a000000040000a118000200fe8000000000000008000f0100810401a80016ea1f0008400304000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c0100000000000000cb090000001fb791643a5ee40021146218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e0060000000000000080bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd68adbef3d93452a00"/216, 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f00000003c0)={&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x0, @loopback}, 0x80, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_tracing={0x1a, 0xf, &(0x7f0000000640)=@ringbuf, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2cb4e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="07000000080000000c0000000300000000000000c6d677efba783f6bb4a94dad06a9d116ffc00ec2a22ecbe0f80879390e9300"/64, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001a00)={0x3}, 0x8) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r9, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r6, &(0x7f00000001c0)={0x0, 0x190d, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440013030e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 2.501349535s ago: executing program 0 (id=2219): bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_service_bytes\x00', 0x7a44, 0x1700) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$kcm(0xa, 0x5, 0x0) unlink(&(0x7f0000000200)='./cgroup\x00') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x4c) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r1}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x5, 0x4}}]}}, 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000280)={'wlan0\x00', @random="4d2151cdffe0"}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) 2.421547274s ago: executing program 4 (id=2221): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000400)="d8000000140081044e81f782db44b9040a1d08020a000000040000a118000200fe8000000000000008000f0100810401a80016ea1f0008400304000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c0100000000000000cb090000001fb791643a5ee40021146218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e0060000000000000080bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd68adbef3d93452a00"/215, 0xd7}], 0x1, 0x0, 0x0, 0x7400}, 0x0) 2.380191304s ago: executing program 2 (id=2222): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000002"], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9fd}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYRESOCT=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x1f, 0x402, 0x3ff, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r4, &(0x7f0000000540), 0x0, 0x2}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x5ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x50) 2.099120244s ago: executing program 3 (id=2223): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x1, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x3, 0x10004, 0x5, 0x40, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000002d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f80)={r0, 0x58, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000dc0)="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", 0xff}], 0x1, &(0x7f0000000fc0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}], 0x20}, 0x24008040) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa65, 0x0, @perf_config_ext, 0x6011}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r6, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7}, &(0x7f0000000000), &(0x7f0000000080)=r4}, 0x20) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000100)='>', 0x1}], 0x1}, 0x44000) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21bef5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9b24be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6eab1aa7d55545a34effa077faa56d59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e59a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d0faab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0480f94306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad9433269af3be5fa6a9a5c24e392955f4e979ea13201bafe4f0f6ea508000000a0c548552b571bed5647223c78a992810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ede62fc28839b5301160ecec37e83efceefd7ca2533659edc8be05cc85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d35a142a9ec9a7a3755e0f209150a07682c4e14e3a835701bea8240399c56ce8f58df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b262341c5e093fd66a2946501559335781092cf8ce3c7c56cd31121624d76517fd3666276c3c0e812b28e2f30d035cee5d0e77a3c70008ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856cf24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31651e0ecea5ece8fb11a4ee288eb149f1fa33669cc8d901fa8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463baf28345bde0c195bc9f021da8f3025ee9c8e3168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262fa3f1dabeb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a4601adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cc50feeb7bfad9b7be3283b6450d014e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5671820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff2418a18217747ae442e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427a7f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d17eb0000000000000000000000fa08ad0731c4b839688b22c4da2a6b00008a1949a6ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282bffff2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae05334d5a44a020000001c0d882a564d74a7c72bf9a2152b261e58fea6d2f93589cfe261dc0410b5ccc92a5a0eab327a33431d62d2b7c75ce654d556c9e1817c1abca762ab53d40da51560351b673363652e1ecb56cfe4a746a45ab13c6014e9f361ab687d1cd1795ce9e05c817b83d76046bdb3709de5df7499a02d2f636a454b85b987580ada025d83bd7b8df28a540d5ec5537942e79f2f1ab25ea5f563bc77e4f9468bd309469880c7e34150ca886d1f9ac2f7e82dbe296c877d925c38c54cc8137b29028854b6bd57ca893927c331300e16aba792289e135589d93302fc37c73c303e383cdf8ef3f6d6265fe5ee01759d24027475c8901039a898582022bc95992b86dce0710887c8a625d9cbb897bdbfaf49a3f642a169827a9bae4fcfa5212461db000000000000e6ed75ca8fcda7ef3ee336189fef3b3ffb9f38fefc5ff39c4e69e3fa1f8b10ee97123e99b61eba065b1ad67530e7c4f11f9da7ae000002000000610101ad7f79cb9bbf64a0fc109f49fe8799fe266e2ccac80fefe750151f5ddfe51833ec65ece70e07ce8ab5d97db47da8f80000664dc0b86ae2b3ff9d4e220752a6b2f3ea9f793612386496dca5af7b8952aafa796ea7b156d19612297c63bb20e1e0469f7615f67a9218cbace38f5236821314f76302b98afa93044b83989339ca10e6ae30e70e17a82f03e915b8425e8e7a91614306d2ae0bc3550d856f2d7293672b5673d264fc886b0c8bdf436a0fcd21bf9da7bdca98e34cd6e59b0a7ce4ba1b466561aaa35448dff47bb1d7df23d467689a6669e4300d5acf12e4d0b35abf91569f605b2f6df0d861"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="18000000000000000000000000000000181100001c2a4332ac9f419f9e80f3865f3deb3ab1eb251eb68481ae3151eabc6fe0280ed4b4d7ac23152f7c67b8e0012b8a438821eec110a684a61bf2c05d8f71d59eef97ea8aa3a824902f255d380a124fca0d029fa401616ee115b672a0aa6729944ccb6a375528a432a693372e87c6470676bcaf416bc8705d7ccdf20357a5cd59fddcf65c5d6622edf04155d656d3fd61ea106fa92130877628d8d16c685db7d6d74a5b12488e7fea297e44f86e9aba666ffce5234cd0f6584fe57ccd389a7ee0ab09409ef6023ffe96db0ff634c142f6ab5388b10b4fd1c0ba64f7f359ed30a4f9a762b80aeef72ce772dd87cd4465c94f7485f0b6ca8548c4f78c96d8f1f16566a1a5e8ad439322a555db8512c7425a5a42ee8fcba5515d04e6da398002166cc2dd24a90cd0f400474214ee5f0834401ea3d9489866f70a478abb2e3352aaa046bd25a59d9b374459465e49f7d04424bb3b0b52435020a1842973f7b46406ffc48fa71e4e7093046003f67bf876638e58a1c5caa4ce51d01f2e2c40ea01ad9fdbbdef6f2d1daa6cb146e695f1cf5b7171b96b66ea4f54a05d92ce63ae92b5addda9d482cb87893efc0c206543e3d59ff736bdf04606a863a8109db16e0df525a3e574af645dca0b713d7c262976e19fe03828dfb9e060d1327aa45354f47bd0a72c92aa2baad5989be55d75d6276f0e16a40027889de5", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe2d, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000140)={'veth1_to_team\x00', @link_local}) r10 = socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x19, 0x4, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="190000000400000004000000020000"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r11, &(0x7f0000000140), &(0x7f0000000000)=""/6, 0x2}, 0x20) sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000011008108090f9becdb4cb92e264831371900000069bd6efb2502eaf60d002700020400bf050005001201", 0x2e}], 0x1}, 0x0) 2.040112504s ago: executing program 4 (id=2224): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0x0, r0, 0x3) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x480c0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_service_bytes\x00', 0x7a44, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="80", 0x1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000840000000000000001"], 0x18}, 0x41) (fail_nth: 1) 1.779855823s ago: executing program 1 (id=2225): socket$kcm(0xa, 0x3, 0x73) 1.771627233s ago: executing program 2 (id=2226): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0x0, r0, 0x3) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x480c0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_service_bytes\x00', 0x7a44, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x10005, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0x3) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r4, 0xf, 0x0, 0x0, 0x0, 0x0, 0x3f00, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3}, 0x50) sendmsg$kcm(r2, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="80", 0x1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000840000000000000001"], 0x18}, 0x41) 1.413231193s ago: executing program 4 (id=2227): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x84, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x80) socket$kcm(0x25, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='blkio.bfq.dequeue\x00') bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xe, 0x0, &(0x7f00000003c0)="386d178529a39dea18dd3f87d7a5", 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.359714772s ago: executing program 3 (id=2228): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x16, 0xf, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007300000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000006000000850000008600000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2}, &(0x7f00000002c0), &(0x7f0000000300)=r1}, 0x20) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}, 0x806, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x100) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000791208000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.327074412s ago: executing program 0 (id=2229): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xa, 0x48, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000100)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000340), 0x0}, 0x20) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x8, 0x0, 0x0}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x401c5820, &(0x7f0000000040)=0x189fe) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0xd112, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x3, 0x73) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x5) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) r6 = openat$cgroup_procs(r4, &(0x7f0000000280)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000140), 0x12) write$cgroup_subtree(r5, &(0x7f00000000c0)=ANY=[@ANYRESOCT=0x0], 0x5) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xffffffffffffcc76}, 0x0, 0x4, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r7}, 0x38) 1.244216343s ago: executing program 1 (id=2230): r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x11, 0x20000000000000a, 0x300) sendmsg$inet(r0, 0x0, 0x0) 1.184539052s ago: executing program 4 (id=2231): perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events.local\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c80)={0xffffffffffffffff, 0xe0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000000c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x7f, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf0, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d40)={0x6, 0x31, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000008000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000b7080000000000007b8af8ff00000000b7080000030000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000184600000600000000000000000000008500000077000000b7080000000000007b8af8ff00000000b7080000ffff00007b8af0ff00000000bfa100000000001007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a500000085100000fcffffff8500000074000000063506000500000018480000010000000000000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x20, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000cc0)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000d00)={0x3, 0x3, 0x9, 0x13}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) r2 = socket$kcm(0x10, 0x2, 0x0) recvmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001340)=""/4101, 0x1005}], 0x1}, 0x2) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000fc0)="5c00000052006bab9a3fe3d86e17aa0a046b4877c4aaf68187bae53dca2ba35bda6a876c1d0048007ea608649e7524765f0ef82e3c0000a705259a3651f60a84c9f4d4938037e70e4509c5bb00000000e513aeac9bf2bee150d5fe86", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r2, &(0x7f0000000e80)={0x0, 0x0, 0x0}, 0x40000002) 1.154194662s ago: executing program 2 (id=2232): socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14125, 0x2e, 0xfffffbff, 0x5, 0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) r0 = socket$kcm(0x10, 0x2, 0x4) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, r1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000008c0)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00000000db5b686158bbcfe8875a0603000011230000ff000000000000000000ac1414aa3b200007", @ANYRES64=r0], 0xfe15) 1.051397992s ago: executing program 3 (id=2233): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x1, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x3, 0x10004, 0x5, 0x40, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000002d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f80)={r0, 0x58, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000d80)={0x2, 0x4e20, @local}, 0x10, 0x0, 0x0, &(0x7f0000000fc0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}], 0x20}, 0x24008040) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa65, 0x0, @perf_config_ext, 0x6011}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r6, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7}, &(0x7f0000000000), &(0x7f0000000080)=r4}, 0x20) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000100)='>', 0x1}], 0x1}, 0x44000) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21bef5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9b24be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6eab1aa7d55545a34effa077faa56d59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e59a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d0faab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0480f94306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad9433269af3be5fa6a9a5c24e392955f4e979ea13201bafe4f0f6ea508000000a0c548552b571bed5647223c78a992810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ede62fc28839b5301160ecec37e83efceefd7ca2533659edc8be05cc85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d35a142a9ec9a7a3755e0f209150a07682c4e14e3a835701bea8240399c56ce8f58df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b262341c5e093fd66a2946501559335781092cf8ce3c7c56cd31121624d76517fd3666276c3c0e812b28e2f30d035cee5d0e77a3c70008ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856cf24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31651e0ecea5ece8fb11a4ee288eb149f1fa33669cc8d901fa8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463baf28345bde0c195bc9f021da8f3025ee9c8e3168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262fa3f1dabeb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a4601adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cc50feeb7bfad9b7be3283b6450d014e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5671820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff2418a18217747ae442e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427a7f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d17eb0000000000000000000000fa08ad0731c4b839688b22c4da2a6b00008a1949a6ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282bffff2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae05334d5a44a020000001c0d882a564d74a7c72bf9a2152b261e58fea6d2f93589cfe261dc0410b5ccc92a5a0eab327a33431d62d2b7c75ce654d556c9e1817c1abca762ab53d40da51560351b673363652e1ecb56cfe4a746a45ab13c6014e9f361ab687d1cd1795ce9e05c817b83d76046bdb3709de5df7499a02d2f636a454b85b987580ada025d83bd7b8df28a540d5ec5537942e79f2f1ab25ea5f563bc77e4f9468bd309469880c7e34150ca886d1f9ac2f7e82dbe296c877d925c38c54cc8137b29028854b6bd57ca893927c331300e16aba792289e135589d93302fc37c73c303e383cdf8ef3f6d6265fe5ee01759d24027475c8901039a898582022bc95992b86dce0710887c8a625d9cbb897bdbfaf49a3f642a169827a9bae4fcfa5212461db000000000000e6ed75ca8fcda7ef3ee336189fef3b3ffb9f38fefc5ff39c4e69e3fa1f8b10ee97123e99b61eba065b1ad67530e7c4f11f9da7ae000002000000610101ad7f79cb9bbf64a0fc109f49fe8799fe266e2ccac80fefe750151f5ddfe51833ec65ece70e07ce8ab5d97db47da8f80000664dc0b86ae2b3ff9d4e220752a6b2f3ea9f793612386496dca5af7b8952aafa796ea7b156d19612297c63bb20e1e0469f7615f67a9218cbace38f5236821314f76302b98afa93044b83989339ca10e6ae30e70e17a82f03e915b8425e8e7a91614306d2ae0bc3550d856f2d7293672b5673d264fc886b0c8bdf436a0fcd21bf9da7bdca98e34cd6e59b0a7ce4ba1b466561aaa35448dff47bb1d7df23d467689a6669e4300d5acf12e4d0b35abf91569f605b2f6df0d861"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="18000000000000000000000000000000181100001c2a4332ac9f419f9e80f3865f3deb3ab1eb251eb68481ae3151eabc6fe0280ed4b4d7ac23152f7c67b8e0012b8a438821eec110a684a61bf2c05d8f71d59eef97ea8aa3a824902f255d380a124fca0d029fa401616ee115b672a0aa6729944ccb6a375528a432a693372e87c6470676bcaf416bc8705d7ccdf20357a5cd59fddcf65c5d6622edf04155d656d3fd61ea106fa92130877628d8d16c685db7d6d74a5b12488e7fea297e44f86e9aba666ffce5234cd0f6584fe57ccd389a7ee0ab09409ef6023ffe96db0ff634c142f6ab5388b10b4fd1c0ba64f7f359ed30a4f9a762b80aeef72ce772dd87cd4465c94f7485f0b6ca8548c4f78c96d8f1f16566a1a5e8ad439322a555db8512c7425a5a42ee8fcba5515d04e6da398002166cc2dd24a90cd0f400474214ee5f0834401ea3d9489866f70a478abb2e3352aaa046bd25a59d9b374459465e49f7d04424bb3b0b52435020a1842973f7b46406ffc48fa71e4e7093046003f67bf876638e58a1c5caa4ce51d01f2e2c40ea01ad9fdbbdef6f2d1daa6cb146e695f1cf5b7171b96b66ea4f54a05d92ce63ae92b5addda9d482cb87893efc0c206543e3d59ff736bdf04606a863a8109db16e0df525a3e574af645dca0b713d7c262976e19fe03828dfb9e060d1327aa45354f47bd0a72c92aa2baad5989be55d75d6276f0e16a40027889de5", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe2d, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000140)={'veth1_to_team\x00', @link_local}) r10 = socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x19, 0x4, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="190000000400000004000000020000"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r11, &(0x7f0000000140), &(0x7f0000000000)=""/6, 0x2}, 0x20) sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000011008108090f9becdb4cb92e264831371900000069bd6efb2502eaf60d002700020400bf050005001201", 0x2e}], 0x1}, 0x0) 944.361632ms ago: executing program 1 (id=2234): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000400)="d8000000140081044e81f782db44b9040a1d08020a000000040000a118000200fe8000000000000008000f0100810401a80016ea1f0008400304000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c0100000000000000cb090000001fb791643a5ee40021146218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e0060000000000000080bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd68adbef3d93452a00"/215, 0xd7}], 0x1, 0x0, 0x0, 0x7400}, 0x0) 843.121352ms ago: executing program 0 (id=2235): r0 = socket$kcm(0x1e, 0x5, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300000004000000040000000a0000001a000000", @ANYRES32, @ANYBLOB='\t\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000040000000100"/28], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r1, 0x77, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a00)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x182, 0x182, 0x8, [@float={0xf, 0x0, 0x0, 0x10, 0xc}, @var={0x7, 0x0, 0x0, 0xe, 0x3, 0x1}, @struct={0xb, 0x1, 0x0, 0x4, 0x0, 0x7, [{0x0, 0x5, 0x3}]}, @type_tag={0xf, 0x0, 0x0, 0x12, 0x5}, @enum64={0x6, 0x1, 0x0, 0x13, 0x0, 0x11, [{0x6, 0x5, 0x9}]}, @enum={0xa, 0x9, 0x0, 0x6, 0x4, [{0xc, 0x6}, {0x0, 0x7}, {0xb, 0x6}, {0x5, 0xfffffff7}, {0x7, 0x7}, {0x5}, {0x8}, {0x8, 0x6}, {0xb, 0x6}]}, @datasec={0x6, 0x7, 0x0, 0xf, 0x2, [{0x2, 0x4, 0x1b1c}, {0x4, 0xfffffffc, 0x8001}, {0x2, 0x2042ec5c, 0x80}, {0x3, 0x9, 0x2}, {0x4, 0x7fff, 0x1}, {0x5, 0x4, 0x5}, {0x2, 0x41e2, 0x10000}], "ff1e"}, @struct={0xa, 0x3, 0x0, 0x4, 0x1, 0x6, [{0xd, 0x5, 0xfffffffb}, {0x2000000a, 0x3, 0x7}, {0x9, 0x3, 0x5}]}, @var={0x2, 0x0, 0x0, 0xe, 0x4}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb, 0x2}, {0xe, 0x1}, {0x9, 0x4}, {}, {0x9, 0x2}]}]}, {0x0, [0x5f, 0x5f, 0x0, 0x30, 0x0, 0x30]}}, &(0x7f0000000900)=""/212, 0x1a4, 0xd4, 0x0, 0x1, 0x0, @void, @value}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="120000007f00000000405f970200000080000000f830b452565335608482ebe140b1d5a1add428c617f92c248ce1f0d1237594c48cbb50b59f2c03551e7a6db693347a56589c6ffd02cdb599c28c2a84ff482e7aa1b3bbbcc5bafdc81898649d43ccd70e98b365108406632f8f10", @ANYRES32=r1, @ANYBLOB="0100"/20, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="02000000020000000100"/28], 0x50) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001540)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x80, 0x0}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r5, 0x2b, 0x1, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) recvmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000007c0)=""/254, 0xfe}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="ff", 0x1}], 0x1, &(0x7f00000002c0)=ANY=[], 0x11f0}, 0x10) r6 = socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x200, 0x9, 0x9, 0x30, r4, 0x5, '\x00', r2, r3, 0x4, 0x4, 0x4, 0x7, @void, @value, @void, @value}, 0x50) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000400)="d8000000140081044e81f782db44b9040a1d08020a000000040000a118000200fe8000000000000008000f0100810401a80016ea1f0008400304000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c0100000000000000cb090000001fb791643a5ee40021146218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e0060000000000000080bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd68adbef3d93452a00"/216, 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f00000003c0)={&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x0, @loopback}, 0x80, 0x0}, 0x0) r9 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="07000000080000000c0000000300000000000000c6d677efba783f6bb4a94dad06a9d116ffc00ec2a22ecbe0f80879390e9300"/64, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001a00)={0x3}, 0x8) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r10, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r6, &(0x7f00000001c0)={0x0, 0x190d, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440013030e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 829.049122ms ago: executing program 4 (id=2236): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x101140, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) 731.787381ms ago: executing program 1 (id=2237): r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x8, &(0x7f0000000500)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x2}, @alu={0x7}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000440)="5c00000014006b030231a6080c000af32d00000000f800250502000f00e5aa000017d34460bc24eab556bd05251e6182949a2756f475ce36c2d13b48df000000000000ecb8f6ec63c9f4d4938037e786a6d1bdd700e6657594f1817d", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200), &(0x7f00000003c0), 0xf28}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc5d, 0x0, 0x0, 0x0, 0x0, 0x73, 0x0, 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0, 0x45, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='signal_generate\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYRES32=r3, @ANYRES8=r4], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@alu={0x5}, @jmp={0x3, 0x0, 0xc, 0x2, 0x2}], {0x95, 0x0, 0x0, 0x1a03d3}}, &(0x7f0000000100)='GPL\x00', 0x2, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5452, &(0x7f00000006c0)) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0x10, 0x0}, 0x3000c0c0) 715.200191ms ago: executing program 2 (id=2238): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0x0, r0, 0x3) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x480c0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_service_bytes\x00', 0x7a44, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="80", 0x1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000840000000000000001"], 0x18}, 0x41) 684.590181ms ago: executing program 3 (id=2239): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61129000000000006113500000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000150600000fff070067060000200000006a0200000ee60000bf050000000000003d350000000000006507000002000000070700004a0000000f75000000000000bf54000000000000070400000400f9ff3d53010000000000840400000000000073720000000000009500000000000000db13d5d8b741f2cdaabc8383caf56b8c2b84a8d09535a157f9005bd38addaa65b925f1ffed25b8b9e2a095d2c51ef45c5588ec78c7f32946b17cecfe54c53ab530c58b67851b7e0e82452a083b98a6aa766401047d150203b0417edef332233b081df18961d6822d133bf72a4de1c2ea17f04537fc211576846ac629d1d93265ba4580047a9dc88de358ce795731891a2031de4e09740c64e5506f991ed4785a9773a433e0db9c1a7d4ab9d658ce9cfdb4db3bed62bcb2bc91ddcdfadfe6d4421c49fb6641cbf56914e76702f673b586c767562a90a3967093b000e3806f825f1d0da2a304e06543b56d35235d78b7a7fe912971aab876022e96f5143b6234f5a6b701690b07fb664a44e22b72e843e7cf55f394cf75d1cd3ee79a25fb98cc45b3fde43e42e150d4a2fddd9a97677400ef0bd697d135324ce480c2960344de346bd511dea4ff7a07400b2d12dd1a8c4c300aee5f948777085ca142b79dfc3aca5fadaa0532ab0572169f68584ff2ee063bc7e75ecd5cc8973464629ba236e3ff97f6033d0800000000000000cef54a60aff12590a50ef147e3e640193d00263003a4ef412420a070dd0327e47c8c7abb77b4b53874788d7e2e5d554de4713db957afb56d4673f1b904c5a317d3670003000000183fb7d36e173044f4ab34"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x24}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000500)="84"}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x24}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000500)="84"}, 0x50) (async) 572.239971ms ago: executing program 4 (id=2240): bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_service_bytes\x00', 0x7a44, 0x1700) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$kcm(0xa, 0x5, 0x0) unlink(&(0x7f0000000200)='./cgroup\x00') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x4c) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r1}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x5, 0x4}}]}}, 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000280)={'wlan0\x00', @random="4d2151cdffe0"}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) 496.304791ms ago: executing program 3 (id=2241): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x84, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x80) socket$kcm(0x25, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='blkio.bfq.dequeue\x00') bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xe, 0x0, &(0x7f00000003c0)="386d178529a39dea18dd3f87d7a5", 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 371.103901ms ago: executing program 2 (id=2242): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) perf_event_open(0x0, 0x0, 0x0, r0, 0x3) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x480c0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_service_bytes\x00', 0x7a44, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="80", 0x1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000840000000000000001"], 0x18}, 0x41) (fail_nth: 1) 299.9356ms ago: executing program 1 (id=2243): perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, @perf_config_ext={0x0, 0x3}, 0x800, 0x5}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000010480)={0x2, &(0x7f0000010080)=[{0x4fac, 0x10, 0x9, 0x2}, {0x4, 0x3, 0x9, 0x7}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x11, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, 0x0, &(0x7f0000000380)=""/179}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r3}, 0x57) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 0s ago: executing program 3 (id=2244): r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x11, 0x20000000000000a, 0x300) sendmsg$inet(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="280000000000000000000000070000000717a87f000001ac141400e0000001ac1e0001ac1414bb011c000000000000000000000008000000", @ANYRES64=r0], 0x48}, 0x0) kernel console output (not intermixed with test programs): 3728][ T8542] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 277.318856][ T8554] netlink: 'syz.2.1481': attribute type 10 has an invalid length. [ 277.422060][ T8560] FAULT_INJECTION: forcing a failure. [ 277.422060][ T8560] name failslab, interval 1, probability 0, space 0, times 0 [ 277.442011][ T8560] CPU: 0 PID: 8560 Comm: syz.1.1483 Not tainted 6.1.129-syzkaller #0 [ 277.450149][ T8560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 277.460241][ T8560] Call Trace: [ 277.463548][ T8560] [ 277.466505][ T8560] dump_stack_lvl+0x1e3/0x2cb [ 277.471234][ T8560] ? nf_tcp_handle_invalid+0x647/0x647 [ 277.476736][ T8560] ? panic+0x764/0x764 [ 277.480846][ T8560] ? __might_sleep+0xb0/0xb0 [ 277.485495][ T8560] ? __lock_acquire+0x125b/0x1f80 [ 277.490581][ T8560] should_fail_ex+0x3a6/0x4d0 [ 277.495318][ T8560] should_failslab+0x5/0x20 [ 277.499869][ T8560] slab_pre_alloc_hook+0x59/0x300 [ 277.504945][ T8560] ? tomoyo_realpath_from_path+0xcb/0x5d0 [ 277.510715][ T8560] __kmem_cache_alloc_node+0x47/0x260 [ 277.516141][ T8560] ? tomoyo_realpath_from_path+0xcb/0x5d0 [ 277.521907][ T8560] __kmalloc+0xa1/0x230 [ 277.526109][ T8560] ? rcu_is_watching+0x11/0xb0 [ 277.530909][ T8560] tomoyo_realpath_from_path+0xcb/0x5d0 [ 277.536514][ T8560] tomoyo_path_number_perm+0x21f/0x7f0 [ 277.542019][ T8560] ? tomoyo_path_number_perm+0x1f2/0x7f0 [ 277.547694][ T8560] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 277.553182][ T8560] ? __fget_files+0x28/0x4a0 [ 277.557818][ T8560] ? __fget_files+0x28/0x4a0 [ 277.562413][ T8560] ? __fget_files+0x435/0x4a0 [ 277.567100][ T8560] ? __fget_files+0x28/0x4a0 [ 277.571701][ T8560] security_file_ioctl+0x6d/0xa0 [ 277.576651][ T8560] __se_sys_ioctl+0x47/0x160 [ 277.581251][ T8560] do_syscall_64+0x3b/0xb0 [ 277.585683][ T8560] ? clear_bhb_loop+0x45/0xa0 [ 277.590372][ T8560] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 277.596276][ T8560] RIP: 0033:0x7f9a8058d169 [ 277.600698][ T8560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 277.620309][ T8560] RSP: 002b:00007f9a803ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 277.628733][ T8560] RAX: ffffffffffffffda RBX: 00007f9a807a5fa0 RCX: 00007f9a8058d169 [ 277.636711][ T8560] RDX: 0000400000000080 RSI: 0000000000008b19 RDI: 0000000000000003 [ 277.644686][ T8560] RBP: 00007f9a803ff090 R08: 0000000000000000 R09: 0000000000000000 [ 277.652658][ T8560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 277.660630][ T8560] R13: 0000000000000000 R14: 00007f9a807a5fa0 R15: 00007ffccaebf058 [ 277.668626][ T8560] [ 277.697917][ T8560] ERROR: Out of memory at tomoyo_realpath_from_path. [ 278.420398][ T8584] netlink: 'syz.4.1492': attribute type 39 has an invalid length. [ 278.702919][ T8600] netlink: 'syz.1.1499': attribute type 10 has an invalid length. [ 278.723938][ T8599] FAULT_INJECTION: forcing a failure. [ 278.723938][ T8599] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 278.774032][ T8599] CPU: 1 PID: 8599 Comm: syz.4.1498 Not tainted 6.1.129-syzkaller #0 [ 278.782172][ T8599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 278.792259][ T8599] Call Trace: [ 278.795833][ T8599] [ 278.798788][ T8599] dump_stack_lvl+0x1e3/0x2cb [ 278.803512][ T8599] ? nf_tcp_handle_invalid+0x647/0x647 [ 278.809019][ T8599] ? panic+0x764/0x764 [ 278.813131][ T8599] ? __lock_acquire+0x1f80/0x1f80 [ 278.818303][ T8599] should_fail_ex+0x3a6/0x4d0 [ 278.823030][ T8599] _copy_from_user+0x2b/0x170 [ 278.827743][ T8599] copy_msghdr_from_user+0xaa/0x670 [ 278.832986][ T8599] ? sendmsg_copy_msghdr+0x70/0x70 [ 278.838151][ T8599] __sys_sendmsg+0x236/0x390 [ 278.842804][ T8599] ? ____sys_sendmsg+0x9a0/0x9a0 [ 278.847789][ T8599] ? vfs_write+0x6cf/0xbc0 [ 278.852251][ T8599] ? perf_trace_run_bpf_submit+0xf7/0x1d0 [ 278.858044][ T8599] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 278.864086][ T8599] ? syscall_enter_from_user_mode+0x2e/0x230 [ 278.870116][ T8599] ? lockdep_hardirqs_on+0x94/0x130 [ 278.875349][ T8599] ? syscall_enter_from_user_mode+0x2e/0x230 [ 278.881371][ T8599] do_syscall_64+0x3b/0xb0 [ 278.885834][ T8599] ? clear_bhb_loop+0x45/0xa0 [ 278.890552][ T8599] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 278.896478][ T8599] RIP: 0033:0x7fcf5e18d169 [ 278.900926][ T8599] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 278.920568][ T8599] RSP: 002b:00007fcf5f02d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 278.929027][ T8599] RAX: ffffffffffffffda RBX: 00007fcf5e3a5fa0 RCX: 00007fcf5e18d169 [ 278.937034][ T8599] RDX: 0000000000000000 RSI: 0000400000000700 RDI: 0000000000000008 [ 278.945042][ T8599] RBP: 00007fcf5f02d090 R08: 0000000000000000 R09: 0000000000000000 [ 278.953047][ T8599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 278.961048][ T8599] R13: 0000000000000000 R14: 00007fcf5e3a5fa0 R15: 00007ffe044b9718 [ 278.969068][ T8599] [ 279.427794][ T8606] tun0: tun_chr_ioctl cmd 2147767507 [ 279.730267][ T8625] delete_channel: no stack [ 279.785503][ T8625] delete_channel: no stack [ 280.029196][ T8625] netlink: 11594 bytes leftover after parsing attributes in process `syz.2.1508'. [ 280.115395][ T8632] netlink: 'syz.4.1509': attribute type 39 has an invalid length. [ 280.136314][ T8634] netlink: 'syz.0.1510': attribute type 10 has an invalid length. [ 280.165528][ T8634] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1510'. [ 280.210546][ T8637] FAULT_INJECTION: forcing a failure. [ 280.210546][ T8637] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 280.264983][ T8637] CPU: 1 PID: 8637 Comm: syz.3.1511 Not tainted 6.1.129-syzkaller #0 [ 280.273121][ T8637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 280.283210][ T8637] Call Trace: [ 280.286521][ T8637] [ 280.289473][ T8637] dump_stack_lvl+0x1e3/0x2cb [ 280.294196][ T8637] ? nf_tcp_handle_invalid+0x647/0x647 [ 280.299697][ T8637] ? panic+0x764/0x764 [ 280.303804][ T8637] ? __lock_acquire+0x1f80/0x1f80 [ 280.308879][ T8637] should_fail_ex+0x3a6/0x4d0 [ 280.313599][ T8637] _copy_from_user+0x2b/0x170 [ 280.318316][ T8637] copy_msghdr_from_user+0xaa/0x670 [ 280.323559][ T8637] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 280.329797][ T8637] ? sendmsg_copy_msghdr+0x70/0x70 [ 280.334956][ T8637] ? __sys_sendmsg+0x21f/0x390 [ 280.340369][ T8637] __sys_sendmsg+0x236/0x390 [ 280.345003][ T8637] ? ____sys_sendmsg+0x9a0/0x9a0 [ 280.349970][ T8637] ? seqcount_lockdep_reader_access+0x1bd/0x220 [ 280.356249][ T8637] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 280.362254][ T8637] ? syscall_enter_from_user_mode+0x2e/0x230 [ 280.368238][ T8637] ? lockdep_hardirqs_on+0x94/0x130 [ 280.373447][ T8637] ? syscall_enter_from_user_mode+0x2e/0x230 [ 280.379445][ T8637] do_syscall_64+0x3b/0xb0 [ 280.383876][ T8637] ? clear_bhb_loop+0x45/0xa0 [ 280.388568][ T8637] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 280.394473][ T8637] RIP: 0033:0x7ff98a58d169 [ 280.398894][ T8637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 280.418509][ T8637] RSP: 002b:00007ff98b303038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 280.426932][ T8637] RAX: ffffffffffffffda RBX: 00007ff98a7a5fa0 RCX: 00007ff98a58d169 [ 280.434999][ T8637] RDX: 0000000000000000 RSI: 0000400000000140 RDI: 0000000000000003 [ 280.442979][ T8637] RBP: 00007ff98b303090 R08: 0000000000000000 R09: 0000000000000000 [ 280.450967][ T8637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 280.458952][ T8637] R13: 0000000000000000 R14: 00007ff98a7a5fa0 R15: 00007fff2d7522c8 [ 280.466947][ T8637] [ 280.582577][ T8647] netlink: 'syz.2.1515': attribute type 10 has an invalid length. [ 280.601662][ T8647] netlink: 40 bytes leftover after parsing attributes in process `syz.2.1515'. [ 280.760045][ T8653] FAULT_INJECTION: forcing a failure. [ 280.760045][ T8653] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 280.790095][ T8653] CPU: 1 PID: 8653 Comm: syz.2.1518 Not tainted 6.1.129-syzkaller #0 [ 280.798235][ T8653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 280.808312][ T8653] Call Trace: [ 280.811610][ T8653] [ 280.814559][ T8653] dump_stack_lvl+0x1e3/0x2cb [ 280.819279][ T8653] ? nf_tcp_handle_invalid+0x647/0x647 [ 280.824776][ T8653] ? panic+0x764/0x764 [ 280.828879][ T8653] ? __lock_acquire+0x1f80/0x1f80 [ 280.833962][ T8653] should_fail_ex+0x3a6/0x4d0 [ 280.838727][ T8653] _copy_from_user+0x2b/0x170 [ 280.843438][ T8653] copy_msghdr_from_user+0xaa/0x670 [ 280.848674][ T8653] ? sendmsg_copy_msghdr+0x70/0x70 [ 280.853840][ T8653] __sys_sendmsg+0x236/0x390 [ 280.858470][ T8653] ? ____sys_sendmsg+0x9a0/0x9a0 [ 280.863432][ T8653] ? vfs_write+0x6cf/0xbc0 [ 280.867948][ T8653] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 280.873981][ T8653] ? syscall_enter_from_user_mode+0x2e/0x230 [ 280.879991][ T8653] ? lockdep_hardirqs_on+0x94/0x130 [ 280.885225][ T8653] ? syscall_enter_from_user_mode+0x2e/0x230 [ 280.891252][ T8653] do_syscall_64+0x3b/0xb0 [ 280.895715][ T8653] ? clear_bhb_loop+0x45/0xa0 [ 280.900432][ T8653] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 280.906356][ T8653] RIP: 0033:0x7fa24958d169 [ 280.910776][ T8653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 280.930392][ T8653] RSP: 002b:00007fa24a333038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 280.938815][ T8653] RAX: ffffffffffffffda RBX: 00007fa2497a5fa0 RCX: 00007fa24958d169 [ 280.946808][ T8653] RDX: 0000000000000000 RSI: 0000400000000700 RDI: 0000000000000003 [ 280.954782][ T8653] RBP: 00007fa24a333090 R08: 0000000000000000 R09: 0000000000000000 [ 280.962787][ T8653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 280.970768][ T8653] R13: 0000000000000000 R14: 00007fa2497a5fa0 R15: 00007fffc323f128 [ 280.978790][ T8653] [ 281.003047][ T8650] netlink: 'syz.0.1516': attribute type 10 has an invalid length. [ 281.722675][ T8670] netlink: 'syz.0.1524': attribute type 39 has an invalid length. [ 282.065144][ T8686] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 282.647032][ T8705] netlink: 'syz.3.1534': attribute type 10 has an invalid length. [ 283.440905][ T8719] netlink: 'syz.1.1540': attribute type 39 has an invalid length. [ 283.572064][ T8723] netlink: 'syz.4.1542': attribute type 2 has an invalid length. [ 283.614618][ T8723] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1542'. [ 284.968784][ T8760] netlink: 'syz.0.1555': attribute type 10 has an invalid length. [ 284.996151][ T8767] netlink: 'syz.4.1556': attribute type 39 has an invalid length. [ 285.337212][ T8772] netlink: 'syz.2.1568': attribute type 10 has an invalid length. [ 285.749879][ T8789] netlink: 'syz.3.1561': attribute type 2 has an invalid length. [ 285.784934][ T8789] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1561'. [ 286.424773][ T8809] netlink: 'syz.2.1569': attribute type 39 has an invalid length. [ 287.245463][ T8829] netlink: 'syz.3.1575': attribute type 10 has an invalid length. [ 287.724856][ T8837] netlink: 'syz.1.1579': attribute type 2 has an invalid length. [ 287.743376][ T8837] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1579'. [ 287.776166][ T8838] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 287.783421][ T8838] IPv6: NLM_F_CREATE should be set when creating new route [ 287.790930][ T8838] IPv6: NLM_F_CREATE should be set when creating new route [ 287.798290][ T8838] IPv6: NLM_F_CREATE should be set when creating new route [ 287.930460][ T8846] netlink: 'syz.4.1582': attribute type 7 has an invalid length. [ 287.940390][ T8846] netlink: 'syz.4.1582': attribute type 6 has an invalid length. [ 289.280964][ T8862] netlink: 'syz.3.1588': attribute type 39 has an invalid length. [ 289.423141][ T8866] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1590'. [ 289.509850][ T8866] netlink: 'syz.2.1590': attribute type 10 has an invalid length. [ 289.555788][ T8866] netlink: 'syz.2.1590': attribute type 10 has an invalid length. [ 289.661073][ T8866] bond0: (slave team0): Releasing backup interface [ 289.894629][ T8866] bridge0: port 3(team0) entered blocking state [ 289.911720][ T8866] bridge0: port 3(team0) entered disabled state [ 289.929931][ T8866] device team0 entered promiscuous mode [ 289.943519][ T8866] device team_slave_0 entered promiscuous mode [ 289.959136][ T8866] device team_slave_1 entered promiscuous mode [ 290.124323][ T8886] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1596'. [ 290.815736][ T8904] validate_nla: 2 callbacks suppressed [ 290.815754][ T8904] netlink: 'syz.4.1605': attribute type 39 has an invalid length. [ 290.918343][ T8905] netlink: 'syz.0.1603': attribute type 4 has an invalid length. [ 290.954451][ T8905] netlink: 152 bytes leftover after parsing attributes in process `syz.0.1603'. [ 291.215772][ T8905] netlink: 5 bytes leftover after parsing attributes in process `syz.0.1603'. [ 291.254225][ T8905] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 291.786926][ T8927] netlink: 'syz.2.1619': attribute type 39 has an invalid length. [ 293.273077][ T8963] netlink: 'syz.3.1625': attribute type 10 has an invalid length. [ 295.253636][ T9005] netlink: 'syz.3.1638': attribute type 7 has an invalid length. [ 295.304987][ T9005] netlink: 'syz.3.1638': attribute type 6 has an invalid length. [ 295.892374][ T9016] netlink: 'syz.4.1641': attribute type 10 has an invalid length. [ 296.212693][ T9019] netlink: 'syz.1.1643': attribute type 10 has an invalid length. [ 296.321911][ T9024] netlink: 'syz.4.1646': attribute type 2 has an invalid length. [ 296.677198][ T9024] device 0 entered promiscuous mode [ 299.019933][ T9056] netlink: 'syz.3.1654': attribute type 10 has an invalid length. [ 300.041794][ T9078] netlink: 'syz.2.1658': attribute type 7 has an invalid length. [ 300.070336][ T9078] netlink: 'syz.2.1658': attribute type 6 has an invalid length. [ 301.763270][ T9092] netlink: 'syz.0.1662': attribute type 2 has an invalid length. [ 301.969348][ T9092] device 0 entered promiscuous mode [ 302.171043][ T9096] netlink: 'syz.4.1661': attribute type 10 has an invalid length. [ 302.219417][ T9097] netlink: 'syz.2.1664': attribute type 39 has an invalid length. [ 302.542322][ T9114] netlink: 'syz.0.1680': attribute type 39 has an invalid length. [ 302.568375][ T9117] netlink: 'syz.1.1667': attribute type 4 has an invalid length. [ 302.583649][ T9117] netlink: 152 bytes leftover after parsing attributes in process `syz.1.1667'. [ 303.196918][ T9117] netlink: 5 bytes leftover after parsing attributes in process `syz.1.1667'. [ 303.226762][ T9117] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 303.520656][ T9125] delete_channel: no stack [ 303.531510][ T9125] delete_channel: no stack [ 303.627350][ T9125] netlink: 11594 bytes leftover after parsing attributes in process `syz.1.1673'. [ 304.068745][ T9139] netlink: 'syz.2.1679': attribute type 10 has an invalid length. [ 304.249991][ T9139] netlink: 'syz.2.1679': attribute type 4 has an invalid length. [ 304.334553][ T9139] netlink: 128 bytes leftover after parsing attributes in process `syz.2.1679'. [ 304.774207][ T9139] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 305.436805][ T9147] netlink: 'syz.2.1681': attribute type 2 has an invalid length. [ 305.637079][ T9147] device 0 entered promiscuous mode [ 305.669996][ T9153] netlink: 'syz.3.1682': attribute type 2 has an invalid length. [ 305.694456][ T9153] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1682'. [ 305.892584][ T9149] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 305.935320][ T9149] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 306.786543][ T9172] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1688'. [ 306.864041][ T9169] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1689'. [ 306.899134][ T9176] FAULT_INJECTION: forcing a failure. [ 306.899134][ T9176] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 306.924605][ T9176] CPU: 0 PID: 9176 Comm: syz.4.1690 Not tainted 6.1.129-syzkaller #0 [ 306.932849][ T9176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 306.942959][ T9176] Call Trace: [ 306.946268][ T9176] [ 306.949230][ T9176] dump_stack_lvl+0x1e3/0x2cb [ 306.953960][ T9176] ? nf_tcp_handle_invalid+0x647/0x647 [ 306.959482][ T9176] ? panic+0x764/0x764 [ 306.963599][ T9176] ? __lock_acquire+0x1f80/0x1f80 [ 306.968689][ T9176] should_fail_ex+0x3a6/0x4d0 [ 306.973447][ T9176] _copy_from_user+0x2b/0x170 [ 306.978361][ T9176] __sys_bpf+0x226/0x6c0 [ 306.982656][ T9176] ? bpf_link_show_fdinfo+0x300/0x300 [ 306.988084][ T9176] ? print_irqtrace_events+0x210/0x210 [ 306.993597][ T9176] ? print_irqtrace_events+0x210/0x210 [ 306.999120][ T9176] ? syscall_enter_from_user_mode+0x2e/0x230 [ 307.005235][ T9176] ? lockdep_hardirqs_on+0x94/0x130 [ 307.010486][ T9176] __x64_sys_bpf+0x78/0x90 [ 307.014971][ T9176] do_syscall_64+0x3b/0xb0 [ 307.019625][ T9176] ? clear_bhb_loop+0x45/0xa0 [ 307.024354][ T9176] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 307.030289][ T9176] RIP: 0033:0x7fcf5e18d169 [ 307.034736][ T9176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 307.054394][ T9176] RSP: 002b:00007fcf5f00c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 307.062855][ T9176] RAX: ffffffffffffffda RBX: 00007fcf5e3a6080 RCX: 00007fcf5e18d169 [ 307.071023][ T9176] RDX: 0000000000000048 RSI: 0000400000000080 RDI: 0000000000000005 [ 307.079041][ T9176] RBP: 00007fcf5f00c090 R08: 0000000000000000 R09: 0000000000000000 [ 307.087027][ T9176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 307.095042][ T9176] R13: 0000000000000001 R14: 00007fcf5e3a6080 R15: 00007ffe044b9718 [ 307.103044][ T9176] [ 307.635958][ T9191] netlink: 114704 bytes leftover after parsing attributes in process `syz.1.1693'. [ 308.101285][ T9195] FAULT_INJECTION: forcing a failure. [ 308.101285][ T9195] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 308.156214][ T9195] CPU: 0 PID: 9195 Comm: syz.4.1695 Not tainted 6.1.129-syzkaller #0 [ 308.164362][ T9195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 308.174448][ T9195] Call Trace: [ 308.177753][ T9195] [ 308.180707][ T9195] dump_stack_lvl+0x1e3/0x2cb [ 308.185435][ T9195] ? nf_tcp_handle_invalid+0x647/0x647 [ 308.190945][ T9195] ? panic+0x764/0x764 [ 308.195052][ T9195] ? __lock_acquire+0x1f80/0x1f80 [ 308.200143][ T9195] should_fail_ex+0x3a6/0x4d0 [ 308.204867][ T9195] _copy_from_user+0x2b/0x170 [ 308.209579][ T9195] __sys_bpf+0x226/0x6c0 [ 308.213940][ T9195] ? bpf_link_show_fdinfo+0x300/0x300 [ 308.219368][ T9195] ? syscall_enter_from_user_mode+0x37/0x230 [ 308.225398][ T9195] __x64_sys_bpf+0x78/0x90 [ 308.229863][ T9195] do_syscall_64+0x3b/0xb0 [ 308.234500][ T9195] ? clear_bhb_loop+0x45/0xa0 [ 308.239309][ T9195] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 308.245241][ T9195] RIP: 0033:0x7fcf5e18d169 [ 308.249680][ T9195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 308.269316][ T9195] RSP: 002b:00007fcf5f02d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 308.277768][ T9195] RAX: ffffffffffffffda RBX: 00007fcf5e3a5fa0 RCX: 00007fcf5e18d169 [ 308.285952][ T9195] RDX: 0000000000000020 RSI: 0000400000001300 RDI: 0000000000000012 [ 308.293946][ T9195] RBP: 00007fcf5f02d090 R08: 0000000000000000 R09: 0000000000000000 [ 308.301951][ T9195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 308.309965][ T9195] R13: 0000000000000000 R14: 00007fcf5e3a5fa0 R15: 00007ffe044b9718 [ 308.317995][ T9195] [ 308.966503][ T9214] FAULT_INJECTION: forcing a failure. [ 308.966503][ T9214] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 309.013174][ T9214] CPU: 1 PID: 9214 Comm: syz.1.1703 Not tainted 6.1.129-syzkaller #0 [ 309.021323][ T9214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 309.031425][ T9214] Call Trace: [ 309.034732][ T9214] [ 309.037683][ T9214] dump_stack_lvl+0x1e3/0x2cb [ 309.042405][ T9214] ? nf_tcp_handle_invalid+0x647/0x647 [ 309.047913][ T9214] ? panic+0x764/0x764 [ 309.052023][ T9214] ? __lock_acquire+0x1f80/0x1f80 [ 309.057099][ T9214] should_fail_ex+0x3a6/0x4d0 [ 309.061833][ T9214] _copy_from_user+0x2b/0x170 [ 309.066549][ T9214] copy_msghdr_from_user+0xaa/0x670 [ 309.071778][ T9214] ? lock_release+0xc7/0xa20 [ 309.076421][ T9214] ? sendmsg_copy_msghdr+0x70/0x70 [ 309.081580][ T9214] __sys_sendmsg+0x236/0x390 [ 309.086209][ T9214] ? ____sys_sendmsg+0x9a0/0x9a0 [ 309.091188][ T9214] ? vfs_write+0x6cf/0xbc0 [ 309.095676][ T9214] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 309.101712][ T9214] ? syscall_enter_from_user_mode+0x2e/0x230 [ 309.107738][ T9214] ? lockdep_hardirqs_on+0x94/0x130 [ 309.112987][ T9214] ? syscall_enter_from_user_mode+0x2e/0x230 [ 309.119020][ T9214] do_syscall_64+0x3b/0xb0 [ 309.123482][ T9214] ? clear_bhb_loop+0x45/0xa0 [ 309.128182][ T9214] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 309.134123][ T9214] RIP: 0033:0x7f9a8058d169 [ 309.138552][ T9214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 309.158179][ T9214] RSP: 002b:00007f9a803ff038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 309.166607][ T9214] RAX: ffffffffffffffda RBX: 00007f9a807a5fa0 RCX: 00007f9a8058d169 [ 309.174597][ T9214] RDX: 000000003000c085 RSI: 0000400000000080 RDI: 0000000000000003 [ 309.182574][ T9214] RBP: 00007f9a803ff090 R08: 0000000000000000 R09: 0000000000000000 [ 309.190551][ T9214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 309.198533][ T9214] R13: 0000000000000000 R14: 00007f9a807a5fa0 R15: 00007ffccaebf058 [ 309.206540][ T9214] [ 309.849877][ T9240] netlink: 16222 bytes leftover after parsing attributes in process `syz.1.1709'. [ 309.942102][ T9240] netlink: 114704 bytes leftover after parsing attributes in process `syz.1.1709'. [ 310.008933][ T9240] sysfs: cannot create duplicate filename '/class/ieee80211/!!' [ 310.023321][ T9240] CPU: 0 PID: 9240 Comm: syz.1.1709 Not tainted 6.1.129-syzkaller #0 [ 310.031458][ T9240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 310.041531][ T9240] Call Trace: [ 310.044820][ T9240] [ 310.047757][ T9240] dump_stack_lvl+0x1e3/0x2cb [ 310.052476][ T9240] ? nf_tcp_handle_invalid+0x647/0x647 [ 310.057958][ T9240] ? panic+0x764/0x764 [ 310.062080][ T9240] sysfs_warn_dup+0x8a/0xa0 [ 310.066601][ T9240] sysfs_do_create_link_sd+0xbe/0x100 [ 310.071983][ T9240] device_add+0x7d4/0xfd0 [ 310.076422][ T9240] wiphy_register+0x1e91/0x2d10 [ 310.081306][ T9240] ? cfg80211_event_work+0x40/0x40 [ 310.086423][ T9240] ? minstrel_ht_alloc+0x874/0x9e0 [ 310.091565][ T9240] ? ieee80211_init_rate_ctrl_alg+0x592/0x610 [ 310.097649][ T9240] ieee80211_register_hw+0x31bd/0x3f10 [ 310.103125][ T9240] ? ieee80211_register_hw+0x1161/0x3f10 [ 310.108762][ T9240] ? ieee80211_register_hw+0x1161/0x3f10 [ 310.114409][ T9240] ? ieee80211_tasklet_handler+0x20/0x20 [ 310.120055][ T9240] ? __debug_object_init+0xe9/0x450 [ 310.125265][ T9240] ? memset+0x1f/0x40 [ 310.129255][ T9240] ? __hrtimer_init+0x181/0x260 [ 310.134122][ T9240] mac80211_hwsim_new_radio+0x2355/0x41c0 [ 310.139908][ T9240] hwsim_new_radio_nl+0xc54/0x1190 [ 310.145044][ T9240] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 310.151224][ T9240] ? hwsim_tx_info_frame_received_nl+0xde0/0xde0 [ 310.157668][ T9240] ? genl_family_rcv_msg_attrs_parse+0x1d1/0x290 [ 310.164016][ T9240] genl_rcv_msg+0xbfa/0xf50 [ 310.168625][ T9240] ? genl_bind+0x400/0x400 [ 310.173069][ T9240] ? read_lock_is_recursive+0x10/0x10 [ 310.178471][ T9240] ? perf_trace_preemptirq_template+0x2d1/0x3d0 [ 310.184739][ T9240] ? hwsim_tx_info_frame_received_nl+0xde0/0xde0 [ 310.191092][ T9240] netlink_rcv_skb+0x1cd/0x410 [ 310.195973][ T9240] ? genl_bind+0x400/0x400 [ 310.200401][ T9240] ? netlink_ack+0x12a0/0x12a0 [ 310.205179][ T9240] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 310.211362][ T9240] genl_rcv+0x24/0x40 [ 310.215356][ T9240] netlink_unicast+0x7e2/0x970 [ 310.220134][ T9240] ? netlink_detachskb+0x90/0x90 [ 310.225075][ T9240] ? find_vmap_area+0xf3/0x100 [ 310.229862][ T9240] ? __phys_addr_symbol+0x2b/0x70 [ 310.234904][ T9240] ? __check_object_size+0x4dd/0xa30 [ 310.240203][ T9240] ? bpf_lsm_netlink_send+0x5/0x10 [ 310.245335][ T9240] netlink_sendmsg+0xa26/0xd60 [ 310.250121][ T9240] ? netlink_getsockopt+0x580/0x580 [ 310.255352][ T9240] ? aa_sock_msg_perm+0x91/0x150 [ 310.260303][ T9240] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 310.265603][ T9240] ? security_socket_sendmsg+0x7d/0xa0 [ 310.271076][ T9240] ? netlink_getsockopt+0x580/0x580 [ 310.276286][ T9240] ____sys_sendmsg+0x5d3/0x9a0 [ 310.281071][ T9240] ? __sys_sendmsg_sock+0x30/0x30 [ 310.286148][ T9240] __sys_sendmsg+0x2a9/0x390 [ 310.290760][ T9240] ? ____sys_sendmsg+0x9a0/0x9a0 [ 310.295733][ T9240] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 310.301991][ T9240] ? lockdep_hardirqs_on+0x94/0x130 [ 310.307233][ T9240] ? syscall_enter_from_user_mode+0x37/0x230 [ 310.313233][ T9240] ? syscall_enter_from_user_mode+0x2e/0x230 [ 310.319226][ T9240] do_syscall_64+0x3b/0xb0 [ 310.323661][ T9240] ? clear_bhb_loop+0x45/0xa0 [ 310.328368][ T9240] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 310.334277][ T9240] RIP: 0033:0x7f9a8058d169 [ 310.338705][ T9240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 310.358318][ T9240] RSP: 002b:00007f9a803ff038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 310.366740][ T9240] RAX: ffffffffffffffda RBX: 00007f9a807a5fa0 RCX: 00007f9a8058d169 [ 310.374722][ T9240] RDX: 0000000000000000 RSI: 0000400000000000 RDI: 000000000000000d [ 310.382702][ T9240] RBP: 00007f9a8060e2a0 R08: 0000000000000000 R09: 0000000000000000 [ 310.390687][ T9240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 310.398676][ T9240] R13: 0000000000000000 R14: 00007f9a807a5fa0 R15: 00007ffccaebf058 [ 310.406677][ T9240] [ 310.529282][ T9252] netlink: 16222 bytes leftover after parsing attributes in process `syz.0.1712'. [ 310.589540][ T9255] FAULT_INJECTION: forcing a failure. [ 310.589540][ T9255] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 310.608984][ T9254] netlink: 16222 bytes leftover after parsing attributes in process `syz.3.1714'. [ 310.617338][ T9255] CPU: 0 PID: 9255 Comm: syz.0.1712 Not tainted 6.1.129-syzkaller #0 [ 310.626363][ T9255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 310.636539][ T9255] Call Trace: [ 310.639851][ T9255] [ 310.642821][ T9255] dump_stack_lvl+0x1e3/0x2cb [ 310.647567][ T9255] ? nf_tcp_handle_invalid+0x647/0x647 [ 310.653075][ T9255] ? panic+0x764/0x764 [ 310.657187][ T9255] ? __lock_acquire+0x1f80/0x1f80 [ 310.660040][ T9254] netlink: 114704 bytes leftover after parsing attributes in process `syz.3.1714'. [ 310.662263][ T9255] should_fail_ex+0x3a6/0x4d0 [ 310.662312][ T9255] _copy_from_user+0x2b/0x170 [ 310.680981][ T9255] copy_msghdr_from_user+0xaa/0x670 [ 310.686245][ T9255] ? sendmsg_copy_msghdr+0x70/0x70 [ 310.691412][ T9255] __sys_sendmsg+0x236/0x390 [ 310.691446][ T9255] ? ____sys_sendmsg+0x9a0/0x9a0 [ 310.691469][ T9255] ? vfs_write+0x6cf/0xbc0 [ 310.691528][ T9255] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 310.691578][ T9255] ? syscall_enter_from_user_mode+0x2e/0x230 [ 310.717704][ T9255] ? lockdep_hardirqs_on+0x94/0x130 [ 310.719702][ T9254] debugfs: Directory '!!' with parent 'ieee80211' already present! [ 310.722921][ T9255] ? syscall_enter_from_user_mode+0x2e/0x230 [ 310.722964][ T9255] do_syscall_64+0x3b/0xb0 [ 310.722997][ T9255] ? clear_bhb_loop+0x45/0xa0 [ 310.723027][ T9255] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 310.723054][ T9255] RIP: 0033:0x7fd94338d169 [ 310.723075][ T9255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 310.776212][ T9255] RSP: 002b:00007fd944185038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 310.784788][ T9255] RAX: ffffffffffffffda RBX: 00007fd9435a6080 RCX: 00007fd94338d169 [ 310.792798][ T9255] RDX: 0000000000000000 RSI: 0000400000000000 RDI: 000000000000000d [ 310.800801][ T9255] RBP: 00007fd944185090 R08: 0000000000000000 R09: 0000000000000000 [ 310.808869][ T9255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 310.817511][ T9255] R13: 0000000000000000 R14: 00007fd9435a6080 R15: 00007ffd0e4d6a38 [ 310.825539][ T9255] [ 311.054051][ T9263] netlink: 'syz.4.1718': attribute type 39 has an invalid length. [ 311.207734][ T9273] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1721'. [ 311.730612][ T9282] FAULT_INJECTION: forcing a failure. [ 311.730612][ T9282] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 311.827639][ T9282] CPU: 0 PID: 9282 Comm: syz.1.1724 Not tainted 6.1.129-syzkaller #0 [ 311.835790][ T9282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 311.845882][ T9282] Call Trace: [ 311.849184][ T9282] [ 311.852144][ T9282] dump_stack_lvl+0x1e3/0x2cb [ 311.856873][ T9282] ? nf_tcp_handle_invalid+0x647/0x647 [ 311.862389][ T9282] ? panic+0x764/0x764 [ 311.866494][ T9282] ? __lock_acquire+0x1f80/0x1f80 [ 311.871568][ T9282] should_fail_ex+0x3a6/0x4d0 [ 311.876291][ T9282] _copy_from_user+0x2b/0x170 [ 311.881006][ T9282] __sys_bpf+0x226/0x6c0 [ 311.885276][ T9282] ? __fget_files+0x435/0x4a0 [ 311.889986][ T9282] ? bpf_link_show_fdinfo+0x300/0x300 [ 311.895386][ T9282] ? perf_trace_preemptirq_template+0xf4/0x3d0 [ 311.901595][ T9282] ? print_irqtrace_events+0x210/0x210 [ 311.907529][ T9282] ? print_irqtrace_events+0x210/0x210 [ 311.913036][ T9282] ? syscall_enter_from_user_mode+0x2e/0x230 [ 311.919063][ T9282] ? lockdep_hardirqs_on+0x94/0x130 [ 311.924299][ T9282] __x64_sys_bpf+0x78/0x90 [ 311.928764][ T9282] do_syscall_64+0x3b/0xb0 [ 311.933223][ T9282] ? clear_bhb_loop+0x45/0xa0 [ 311.938194][ T9282] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 311.944121][ T9282] RIP: 0033:0x7f9a8058d169 [ 311.948559][ T9282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 311.968190][ T9282] RSP: 002b:00007f9a803ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 311.976642][ T9282] RAX: ffffffffffffffda RBX: 00007f9a807a5fa0 RCX: 00007f9a8058d169 [ 311.984639][ T9282] RDX: 0000000000000028 RSI: 0000400000001300 RDI: 0000000000000012 [ 311.992644][ T9282] RBP: 00007f9a803ff090 R08: 0000000000000000 R09: 0000000000000000 [ 312.000667][ T9282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 312.008676][ T9282] R13: 0000000000000001 R14: 00007f9a807a5fa0 R15: 00007ffccaebf058 [ 312.016711][ T9282] [ 312.620963][ T9294] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1730'. [ 313.560147][ T9297] device syzkaller0 entered promiscuous mode [ 313.578009][ T9312] netlink: 'syz.3.1735': attribute type 39 has an invalid length. [ 317.037906][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 317.048568][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 317.144011][ T9336] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1747'. [ 317.410050][ T9358] netlink: 'syz.1.1752': attribute type 39 has an invalid length. [ 318.452608][ T9371] netlink: 'syz.1.1756': attribute type 39 has an invalid length. [ 318.481259][ T9377] FAULT_INJECTION: forcing a failure. [ 318.481259][ T9377] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 318.495298][ T9377] CPU: 1 PID: 9377 Comm: syz.3.1758 Not tainted 6.1.129-syzkaller #0 [ 318.503412][ T9377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 318.513482][ T9377] Call Trace: [ 318.516767][ T9377] [ 318.519703][ T9377] dump_stack_lvl+0x1e3/0x2cb [ 318.524413][ T9377] ? nf_tcp_handle_invalid+0x647/0x647 [ 318.529902][ T9377] ? panic+0x764/0x764 [ 318.533982][ T9377] ? __lock_acquire+0x1f80/0x1f80 [ 318.539031][ T9377] should_fail_ex+0x3a6/0x4d0 [ 318.543728][ T9377] _copy_from_user+0x2b/0x170 [ 318.548417][ T9377] __sys_bpf+0x226/0x6c0 [ 318.552662][ T9377] ? __fget_files+0x435/0x4a0 [ 318.557349][ T9377] ? bpf_link_show_fdinfo+0x300/0x300 [ 318.562737][ T9377] ? print_irqtrace_events+0x210/0x210 [ 318.568211][ T9377] ? print_irqtrace_events+0x210/0x210 [ 318.573690][ T9377] ? syscall_enter_from_user_mode+0x2e/0x230 [ 318.579855][ T9377] ? lockdep_hardirqs_on+0x94/0x130 [ 318.585066][ T9377] __x64_sys_bpf+0x78/0x90 [ 318.589500][ T9377] do_syscall_64+0x3b/0xb0 [ 318.593935][ T9377] ? clear_bhb_loop+0x45/0xa0 [ 318.598628][ T9377] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 318.604531][ T9377] RIP: 0033:0x7ff98a58d169 [ 318.608955][ T9377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 318.628650][ T9377] RSP: 002b:00007ff98b303038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 318.637073][ T9377] RAX: ffffffffffffffda RBX: 00007ff98a7a5fa0 RCX: 00007ff98a58d169 [ 318.645049][ T9377] RDX: 0000000000000094 RSI: 00004000000000c0 RDI: 0000000000000005 [ 318.653042][ T9377] RBP: 00007ff98b303090 R08: 0000000000000000 R09: 0000000000000000 [ 318.661018][ T9377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.668993][ T9377] R13: 0000000000000000 R14: 00007ff98a7a5fa0 R15: 00007fff2d7522c8 [ 318.676981][ T9377] [ 318.891866][ T9389] netlink: 'syz.0.1764': attribute type 2 has an invalid length. [ 318.917088][ T9389] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1764'. [ 319.637639][ T9381] device syzkaller0 entered promiscuous mode [ 319.866424][ T9402] FAULT_INJECTION: forcing a failure. [ 319.866424][ T9402] name failslab, interval 1, probability 0, space 0, times 0 [ 319.882217][ T9402] CPU: 1 PID: 9402 Comm: syz.1.1768 Not tainted 6.1.129-syzkaller #0 [ 319.890343][ T9402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 319.900441][ T9402] Call Trace: [ 319.903743][ T9402] [ 319.906693][ T9402] dump_stack_lvl+0x1e3/0x2cb [ 319.911437][ T9402] ? nf_tcp_handle_invalid+0x647/0x647 [ 319.916942][ T9402] ? panic+0x764/0x764 [ 319.921039][ T9402] ? __might_sleep+0xb0/0xb0 [ 319.925664][ T9402] ? __lock_acquire+0x125b/0x1f80 [ 319.930739][ T9402] should_fail_ex+0x3a6/0x4d0 [ 319.935475][ T9402] should_failslab+0x5/0x20 [ 319.940015][ T9402] slab_pre_alloc_hook+0x59/0x300 [ 319.945087][ T9402] ? tomoyo_realpath_from_path+0xcb/0x5d0 [ 319.950845][ T9402] __kmem_cache_alloc_node+0x47/0x260 [ 319.956265][ T9402] ? tomoyo_realpath_from_path+0xcb/0x5d0 [ 319.962049][ T9402] __kmalloc+0xa1/0x230 [ 319.966241][ T9402] ? rcu_is_watching+0x11/0xb0 [ 319.971036][ T9402] tomoyo_realpath_from_path+0xcb/0x5d0 [ 319.976905][ T9402] tomoyo_path_number_perm+0x21f/0x7f0 [ 319.982414][ T9402] ? tomoyo_path_number_perm+0x1f2/0x7f0 [ 319.988088][ T9402] ? perf_trace_run_bpf_submit+0xf7/0x1d0 [ 319.993857][ T9402] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 319.999377][ T9402] ? perf_trace_preemptirq_template+0x2d1/0x3d0 [ 320.005679][ T9402] ? irqentry_enter+0x33/0x50 [ 320.010413][ T9402] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 320.016435][ T9402] ? __fget_files+0x28/0x4a0 [ 320.021072][ T9402] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 320.027261][ T9402] ? __se_sys_ioctl+0x30/0x160 [ 320.032060][ T9402] security_file_ioctl+0x6d/0xa0 [ 320.037457][ T9402] __se_sys_ioctl+0x47/0x160 [ 320.042079][ T9402] do_syscall_64+0x3b/0xb0 [ 320.046529][ T9402] ? clear_bhb_loop+0x45/0xa0 [ 320.051227][ T9402] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 320.057137][ T9402] RIP: 0033:0x7f9a8058d169 [ 320.061566][ T9402] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 320.081233][ T9402] RSP: 002b:00007f9a803ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 320.089665][ T9402] RAX: ffffffffffffffda RBX: 00007f9a807a5fa0 RCX: 00007f9a8058d169 [ 320.097649][ T9402] RDX: 0000000000000000 RSI: 00000000000089e2 RDI: 0000000000000008 [ 320.105625][ T9402] RBP: 00007f9a803ff090 R08: 0000000000000000 R09: 0000000000000000 [ 320.113599][ T9402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 320.121595][ T9402] R13: 0000000000000000 R14: 00007f9a807a5fa0 R15: 00007ffccaebf058 [ 320.129607][ T9402] [ 320.265735][ T9402] ERROR: Out of memory at tomoyo_realpath_from_path. [ 322.752993][ T9419] netlink: 'syz.0.1774': attribute type 39 has an invalid length. [ 322.771976][ T9426] netlink: 'syz.1.1777': attribute type 2 has an invalid length. [ 322.784843][ T9426] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1777'. [ 322.806526][ T9430] tun0: tun_chr_ioctl cmd 2147767507 [ 323.232630][ T9441] FAULT_INJECTION: forcing a failure. [ 323.232630][ T9441] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 323.253245][ T9441] CPU: 0 PID: 9441 Comm: syz.0.1780 Not tainted 6.1.129-syzkaller #0 [ 323.261380][ T9441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 323.271473][ T9441] Call Trace: [ 323.274787][ T9441] [ 323.277729][ T9441] dump_stack_lvl+0x1e3/0x2cb [ 323.282516][ T9441] ? nf_tcp_handle_invalid+0x647/0x647 [ 323.288012][ T9441] ? panic+0x764/0x764 [ 323.292153][ T9441] should_fail_ex+0x3a6/0x4d0 [ 323.297138][ T9441] _copy_from_user+0x2b/0x170 [ 323.301867][ T9441] copy_msghdr_from_user+0xaa/0x670 [ 323.307109][ T9441] ? check_preemption_disabled+0x4b/0x110 [ 323.313048][ T9441] ? sendmsg_copy_msghdr+0x70/0x70 [ 323.318235][ T9441] __sys_sendmsg+0x236/0x390 [ 323.322854][ T9441] ? ____sys_sendmsg+0x9a0/0x9a0 [ 323.327871][ T9441] do_syscall_64+0x3b/0xb0 [ 323.332331][ T9441] ? clear_bhb_loop+0x45/0xa0 [ 323.337142][ T9441] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 323.343051][ T9441] RIP: 0033:0x7fd94338d169 [ 323.347650][ T9441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 323.367797][ T9441] RSP: 002b:00007fd9441a6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 323.376331][ T9441] RAX: ffffffffffffffda RBX: 00007fd9435a5fa0 RCX: 00007fd94338d169 [ 323.384316][ T9441] RDX: 0000000000000008 RSI: 0000400000000440 RDI: 0000000000000005 [ 323.392299][ T9441] RBP: 00007fd9441a6090 R08: 0000000000000000 R09: 0000000000000000 [ 323.400279][ T9441] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 323.408272][ T9441] R13: 0000000000000000 R14: 00007fd9435a5fa0 R15: 00007ffd0e4d6a38 [ 323.416277][ T9441] [ 327.102216][ T9476] netlink: 'syz.3.1792': attribute type 39 has an invalid length. [ 327.118391][ T9484] tun0: tun_chr_ioctl cmd 2147767507 [ 327.469633][ T9501] netlink: 'syz.1.1800': attribute type 39 has an invalid length. [ 328.736890][ T9515] netlink: 'syz.2.1806': attribute type 10 has an invalid length. [ 328.784768][ T9515] netlink: 2 bytes leftover after parsing attributes in process `syz.2.1806'. [ 328.826481][ T9515] device bond0 entered promiscuous mode [ 328.861111][ T9515] device bond_slave_0 entered promiscuous mode [ 328.906599][ T9515] device bond_slave_1 entered promiscuous mode [ 328.921508][ T9515] device wlan1 entered promiscuous mode [ 328.943848][ T9515] bridge0: port 4(bond0) entered blocking state [ 328.994937][ T9515] bridge0: port 4(bond0) entered disabled state [ 329.040756][ T9515] bridge0: port 4(bond0) entered blocking state [ 329.047916][ T9515] bridge0: port 4(bond0) entered forwarding state [ 329.111756][ T9520] netlink: 830 bytes leftover after parsing attributes in process `syz.2.1806'. [ 329.141145][ T9524] netlink: 'syz.0.1808': attribute type 10 has an invalid length. [ 329.188425][ T9524] netlink: 2 bytes leftover after parsing attributes in process `syz.0.1808'. [ 329.227928][ T9524] device bond0 entered promiscuous mode [ 329.238654][ T9524] device bond_slave_0 entered promiscuous mode [ 329.246972][ T9524] device bond_slave_1 entered promiscuous mode [ 329.253781][ T9524] device wlan1 entered promiscuous mode [ 329.261607][ T9524] bridge0: port 4(bond0) entered blocking state [ 329.269287][ T9524] bridge0: port 4(bond0) entered disabled state [ 329.303236][ T9524] bridge0: port 4(bond0) entered blocking state [ 329.309896][ T9524] bridge0: port 4(bond0) entered forwarding state [ 331.514543][ T9542] tun0: tun_chr_ioctl cmd 2147767507 [ 331.525552][ T9539] netlink: 'syz.2.1815': attribute type 39 has an invalid length. [ 331.571655][ T9563] netlink: 830 bytes leftover after parsing attributes in process `syz.0.1821'. [ 331.648661][ T9565] FAULT_INJECTION: forcing a failure. [ 331.648661][ T9565] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 331.694695][ T9565] CPU: 0 PID: 9565 Comm: syz.2.1822 Not tainted 6.1.129-syzkaller #0 [ 331.702842][ T9565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 331.712935][ T9565] Call Trace: [ 331.716248][ T9565] [ 331.719202][ T9565] dump_stack_lvl+0x1e3/0x2cb [ 331.723929][ T9565] ? nf_tcp_handle_invalid+0x647/0x647 [ 331.729453][ T9565] ? panic+0x764/0x764 [ 331.733563][ T9565] ? __lock_acquire+0x1f80/0x1f80 [ 331.738641][ T9565] should_fail_ex+0x3a6/0x4d0 [ 331.743419][ T9565] _copy_from_user+0x2b/0x170 [ 331.748139][ T9565] copy_msghdr_from_user+0xaa/0x670 [ 331.753381][ T9565] ? sendmsg_copy_msghdr+0x70/0x70 [ 331.758630][ T9565] __sys_sendmsg+0x236/0x390 [ 331.763255][ T9565] ? ____sys_sendmsg+0x9a0/0x9a0 [ 331.768223][ T9565] ? seqcount_lockdep_reader_access+0x1bd/0x220 [ 331.774540][ T9565] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 331.780589][ T9565] ? syscall_enter_from_user_mode+0x2e/0x230 [ 331.786610][ T9565] ? lockdep_hardirqs_on+0x94/0x130 [ 331.791850][ T9565] ? syscall_enter_from_user_mode+0x2e/0x230 [ 331.797872][ T9565] do_syscall_64+0x3b/0xb0 [ 331.802328][ T9565] ? clear_bhb_loop+0x45/0xa0 [ 331.807081][ T9565] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 331.813010][ T9565] RIP: 0033:0x7fa24958d169 [ 331.817474][ T9565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 331.837103][ T9565] RSP: 002b:00007fa24a333038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 331.845543][ T9565] RAX: ffffffffffffffda RBX: 00007fa2497a5fa0 RCX: 00007fa24958d169 [ 331.853538][ T9565] RDX: 0000000000000000 RSI: 0000400000000000 RDI: 000000000000000b [ 331.861524][ T9565] RBP: 00007fa24a333090 R08: 0000000000000000 R09: 0000000000000000 [ 331.869506][ T9565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 331.877487][ T9565] R13: 0000000000000000 R14: 00007fa2497a5fa0 R15: 00007fffc323f128 [ 331.885482][ T9565] [ 332.395744][ T9590] netlink: 'syz.4.1831': attribute type 10 has an invalid length. [ 332.432919][ T9590] device ipvlan1 entered promiscuous mode [ 332.474134][ T9590] batman_adv: batadv0: Adding interface: ipvlan1 [ 332.538335][ T9590] batman_adv: batadv0: The MTU of interface ipvlan1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 332.721162][ T9590] batman_adv: batadv0: Not using interface ipvlan1 (retrying later): interface not active [ 332.732468][ T9593] netlink: 'syz.0.1834': attribute type 39 has an invalid length. [ 332.769957][ T9599] tun0: tun_chr_ioctl cmd 2147767507 [ 335.391973][ T9622] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1841'. [ 335.940466][ T9641] netlink: 'syz.2.1849': attribute type 39 has an invalid length. [ 336.376119][ T9656] FAULT_INJECTION: forcing a failure. [ 336.376119][ T9656] name failslab, interval 1, probability 0, space 0, times 0 [ 336.392859][ T9656] CPU: 1 PID: 9656 Comm: syz.4.1854 Not tainted 6.1.129-syzkaller #0 [ 336.400986][ T9656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 336.411072][ T9656] Call Trace: [ 336.414368][ T9656] [ 336.417334][ T9656] dump_stack_lvl+0x1e3/0x2cb [ 336.422035][ T9656] ? nf_tcp_handle_invalid+0x647/0x647 [ 336.427695][ T9656] ? panic+0x764/0x764 [ 336.431775][ T9656] ? __might_sleep+0xb0/0xb0 [ 336.436411][ T9656] should_fail_ex+0x3a6/0x4d0 [ 336.441114][ T9656] should_failslab+0x5/0x20 [ 336.445631][ T9656] slab_pre_alloc_hook+0x59/0x300 [ 336.450671][ T9656] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 336.456673][ T9656] kmem_cache_alloc+0x4e/0x2d0 [ 336.461457][ T9656] ? getname_flags+0xb8/0x4f0 [ 336.466150][ T9656] getname_flags+0xb8/0x4f0 [ 336.470698][ T9656] __x64_sys_mkdirat+0x78/0x90 [ 336.475478][ T9656] do_syscall_64+0x3b/0xb0 [ 336.479933][ T9656] ? clear_bhb_loop+0x45/0xa0 [ 336.484629][ T9656] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 336.490561][ T9656] RIP: 0033:0x7fcf5e18d169 [ 336.494998][ T9656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 336.514845][ T9656] RSP: 002b:00007fcf5f02d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 336.523350][ T9656] RAX: ffffffffffffffda RBX: 00007fcf5e3a5fa0 RCX: 00007fcf5e18d169 [ 336.531472][ T9656] RDX: 00000000000001ff RSI: 0000400000000000 RDI: ffffffffffffff9c [ 336.539550][ T9656] RBP: 00007fcf5f02d090 R08: 0000000000000000 R09: 0000000000000000 [ 336.547546][ T9656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 336.555530][ T9656] R13: 0000000000000000 R14: 00007fcf5e3a5fa0 R15: 00007ffe044b9718 [ 336.563526][ T9656] [ 336.960771][ T9663] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1857'. [ 336.996035][ T9663] netlink: 'syz.0.1857': attribute type 10 has an invalid length. [ 337.099586][ T9666] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1858'. [ 337.171280][ T9669] netlink: 'syz.4.1858': attribute type 10 has an invalid length. [ 337.241787][ T9669] bond0: (slave team0): Releasing backup interface [ 337.322511][ T9669] bridge0: port 3(team0) entered blocking state [ 337.330119][ T9669] bridge0: port 3(team0) entered disabled state [ 337.350204][ T9669] device team0 entered promiscuous mode [ 337.356594][ T9669] device team_slave_0 entered promiscuous mode [ 337.364878][ T9669] device team_slave_1 entered promiscuous mode [ 337.372360][ T9669] device geneve1 entered promiscuous mode [ 337.381326][ T9669] device macvlan0 entered promiscuous mode [ 338.173806][ T9692] tun0: tun_chr_ioctl cmd 2147767507 [ 338.429429][ T9698] FAULT_INJECTION: forcing a failure. [ 338.429429][ T9698] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 338.450148][ T9698] CPU: 0 PID: 9698 Comm: syz.2.1871 Not tainted 6.1.129-syzkaller #0 [ 338.458266][ T9698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 338.468324][ T9698] Call Trace: [ 338.471612][ T9698] [ 338.474548][ T9698] dump_stack_lvl+0x1e3/0x2cb [ 338.479267][ T9698] ? nf_tcp_handle_invalid+0x647/0x647 [ 338.484741][ T9698] ? panic+0x764/0x764 [ 338.488819][ T9698] ? __lock_acquire+0x1f80/0x1f80 [ 338.493863][ T9698] ? __virt_addr_valid+0x17f/0x530 [ 338.498990][ T9698] should_fail_ex+0x3a6/0x4d0 [ 338.503691][ T9698] _copy_from_iter+0x1de/0xff0 [ 338.508476][ T9698] ? __lock_acquire+0x1f80/0x1f80 [ 338.513525][ T9698] ? __up_read+0x690/0x690 [ 338.517955][ T9698] ? copyout_mc+0x100/0x100 [ 338.522478][ T9698] ? __virt_addr_valid+0x17f/0x530 [ 338.527601][ T9698] ? __virt_addr_valid+0x17f/0x530 [ 338.532741][ T9698] ? __virt_addr_valid+0x45b/0x530 [ 338.537862][ T9698] ? __phys_addr_symbol+0x2b/0x70 [ 338.542893][ T9698] ? __check_object_size+0x4dd/0xa30 [ 338.548190][ T9698] udplite_getfrag+0x46/0x90 [ 338.552786][ T9698] __ip6_append_data+0x1c46/0x4520 [ 338.558024][ T9698] ? udpv6_sendmsg+0x30e0/0x30e0 [ 338.562982][ T9698] ? ip6_setup_cork+0x1090/0x1090 [ 338.568010][ T9698] ? lockdep_hardirqs_on+0x94/0x130 [ 338.573247][ T9698] ip6_append_data+0x1d6/0x400 [ 338.578022][ T9698] ? udpv6_sendmsg+0x30e0/0x30e0 [ 338.582994][ T9698] udpv6_sendmsg+0xeae/0x30e0 [ 338.587699][ T9698] ? udpv6_sendmsg+0x30e0/0x30e0 [ 338.592670][ T9698] ? udp_v6_early_demux+0x1000/0x1000 [ 338.598068][ T9698] ? aa_file_perm+0x12c/0xf60 [ 338.602763][ T9698] ? __lock_acquire+0x1f80/0x1f80 [ 338.607906][ T9698] ? tomoyo_socket_bind_permission+0x330/0x330 [ 338.614079][ T9698] ? inet_send_prepare+0x1d/0x250 [ 338.619118][ T9698] ? inet_send_prepare+0x56/0x250 [ 338.624156][ T9698] ? inet6_compat_ioctl+0x560/0x560 [ 338.629403][ T9698] sock_write_iter+0x394/0x4e0 [ 338.634185][ T9698] ? sock_read_iter+0x4b0/0x4b0 [ 338.639054][ T9698] ? common_file_perm+0x17d/0x1d0 [ 338.644092][ T9698] vfs_write+0x857/0xbc0 [ 338.648350][ T9698] ? file_end_write+0x250/0x250 [ 338.653215][ T9698] ? __fget_files+0x28/0x4a0 [ 338.657813][ T9698] ? __fget_files+0x435/0x4a0 [ 338.662505][ T9698] ? __fdget_pos+0x1db/0x360 [ 338.667101][ T9698] ? ksys_write+0x77/0x2c0 [ 338.671525][ T9698] ksys_write+0x19c/0x2c0 [ 338.675887][ T9698] ? print_irqtrace_events+0x210/0x210 [ 338.681367][ T9698] ? __ia32_sys_read+0x80/0x80 [ 338.686148][ T9698] ? syscall_enter_from_user_mode+0x2e/0x230 [ 338.692138][ T9698] ? lockdep_hardirqs_on+0x94/0x130 [ 338.697345][ T9698] ? syscall_enter_from_user_mode+0x2e/0x230 [ 338.703342][ T9698] do_syscall_64+0x3b/0xb0 [ 338.707797][ T9698] ? clear_bhb_loop+0x45/0xa0 [ 338.712487][ T9698] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 338.718388][ T9698] RIP: 0033:0x7fa24958d169 [ 338.722810][ T9698] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 338.742423][ T9698] RSP: 002b:00007fa24a333038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 338.750843][ T9698] RAX: ffffffffffffffda RBX: 00007fa2497a5fa0 RCX: 00007fa24958d169 [ 338.758825][ T9698] RDX: 000000000000fe33 RSI: 0000400000000280 RDI: 0000000000000003 [ 338.766884][ T9698] RBP: 00007fa24a333090 R08: 0000000000000000 R09: 0000000000000000 [ 338.774856][ T9698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 338.782830][ T9698] R13: 0000000000000000 R14: 00007fa2497a5fa0 R15: 00007fffc323f128 [ 338.790823][ T9698] [ 339.023619][ T9701] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1872'. [ 339.090615][ T9700] netlink: 'syz.2.1872': attribute type 10 has an invalid length. [ 339.121727][ T9700] device team0 left promiscuous mode [ 339.132115][ T9700] device team_slave_0 left promiscuous mode [ 339.143369][ T9700] device team_slave_1 left promiscuous mode [ 339.168869][ T9700] bridge0: port 3(team0) entered disabled state [ 339.232404][ T9700] 8021q: adding VLAN 0 to HW filter on device team0 [ 339.295879][ T9700] device team0 entered promiscuous mode [ 339.308894][ T9700] device team_slave_0 entered promiscuous mode [ 339.335790][ T9700] device team_slave_1 entered promiscuous mode [ 339.372307][ T9700] bond0: (slave team0): Enslaving as an active interface with an up link [ 339.394044][ T9701] netlink: 'syz.2.1872': attribute type 10 has an invalid length. [ 339.411268][ T9701] bond0: (slave team0): Releasing backup interface [ 339.430422][ T9701] device team0 left promiscuous mode [ 339.447648][ T9701] device team_slave_0 left promiscuous mode [ 339.454005][ T9701] device team_slave_1 left promiscuous mode [ 339.500174][ T9701] bridge0: port 3(team0) entered blocking state [ 339.510424][ T9701] bridge0: port 3(team0) entered disabled state [ 339.520050][ T9701] device team0 entered promiscuous mode [ 339.525974][ T9701] device team_slave_0 entered promiscuous mode [ 339.532796][ T9701] device team_slave_1 entered promiscuous mode [ 339.958171][ T9733] netlink: 'syz.3.1884': attribute type 10 has an invalid length. [ 340.008447][ T9735] FAULT_INJECTION: forcing a failure. [ 340.008447][ T9735] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 340.044037][ T9735] CPU: 0 PID: 9735 Comm: syz.0.1885 Not tainted 6.1.129-syzkaller #0 [ 340.052182][ T9735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 340.062272][ T9735] Call Trace: [ 340.065575][ T9735] [ 340.068533][ T9735] dump_stack_lvl+0x1e3/0x2cb [ 340.073259][ T9735] ? nf_tcp_handle_invalid+0x647/0x647 [ 340.078773][ T9735] ? panic+0x764/0x764 [ 340.082894][ T9735] ? __lock_acquire+0x1f80/0x1f80 [ 340.087972][ T9735] should_fail_ex+0x3a6/0x4d0 [ 340.092692][ T9735] _copy_from_user+0x2b/0x170 [ 340.097399][ T9735] copy_msghdr_from_user+0xaa/0x670 [ 340.102622][ T9735] ? sendmsg_copy_msghdr+0x70/0x70 [ 340.107803][ T9735] __sys_sendmsg+0x236/0x390 [ 340.112408][ T9735] ? ____sys_sendmsg+0x9a0/0x9a0 [ 340.117388][ T9735] ? seqcount_lockdep_reader_access+0x1bd/0x220 [ 340.123703][ T9735] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 340.129877][ T9735] ? lockdep_hardirqs_on+0x94/0x130 [ 340.135101][ T9735] ? syscall_enter_from_user_mode+0x37/0x230 [ 340.141104][ T9735] ? syscall_enter_from_user_mode+0x2e/0x230 [ 340.147102][ T9735] do_syscall_64+0x3b/0xb0 [ 340.151536][ T9735] ? clear_bhb_loop+0x45/0xa0 [ 340.156225][ T9735] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 340.162126][ T9735] RIP: 0033:0x7fd94338d169 [ 340.166546][ T9735] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 340.186163][ T9735] RSP: 002b:00007fd9441a6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 340.194589][ T9735] RAX: ffffffffffffffda RBX: 00007fd9435a5fa0 RCX: 00007fd94338d169 [ 340.202571][ T9735] RDX: 0000000000000000 RSI: 0000400000000600 RDI: 000000000000000b [ 340.210546][ T9735] RBP: 00007fd9441a6090 R08: 0000000000000000 R09: 0000000000000000 [ 340.218543][ T9735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 340.226550][ T9735] R13: 0000000000000000 R14: 00007fd9435a5fa0 R15: 00007ffd0e4d6a38 [ 340.234543][ T9735] [ 340.248031][ T9738] tun0: tun_chr_ioctl cmd 2147767507 [ 340.550622][ T9752] netlink: 'syz.2.1890': attribute type 10 has an invalid length. [ 340.601956][ T9752] device team0 left promiscuous mode [ 340.631866][ T9752] device team_slave_0 left promiscuous mode [ 340.661231][ T9752] device team_slave_1 left promiscuous mode [ 340.787341][ T9752] bridge0: port 3(team0) entered disabled state [ 340.872495][ T9752] 8021q: adding VLAN 0 to HW filter on device team0 [ 340.892712][ T9752] device team0 entered promiscuous mode [ 340.899590][ T9752] device team_slave_0 entered promiscuous mode [ 340.910568][ T9752] device team_slave_1 entered promiscuous mode [ 340.932934][ T9752] bond0: (slave team0): Enslaving as an active interface with an up link [ 340.953324][ T9765] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1894'. [ 341.064852][ T9763] netlink: 'syz.1.1894': attribute type 10 has an invalid length. [ 341.096551][ T9763] netlink: 'syz.1.1894': attribute type 10 has an invalid length. [ 341.133349][ T9763] bond0: (slave team0): Releasing backup interface [ 341.372920][ T9776] tun0: tun_chr_ioctl cmd 2147767507 [ 341.480107][ T9779] netlink: 'syz.1.1900': attribute type 39 has an invalid length. [ 341.627091][ T9781] netlink: 'syz.2.1901': attribute type 10 has an invalid length. [ 341.819425][ T9788] tun0: tun_chr_ioctl cmd 2147767507 [ 342.446085][ T9804] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1910'. [ 342.543074][ T9804] netlink: 'syz.4.1910': attribute type 10 has an invalid length. [ 342.576790][ T9804] device team0 left promiscuous mode [ 342.582516][ T9804] device team_slave_0 left promiscuous mode [ 342.620761][ T9804] device team_slave_1 left promiscuous mode [ 342.641954][ T9804] device geneve1 left promiscuous mode [ 342.649631][ T9804] device macvlan0 left promiscuous mode [ 342.682292][ T9804] bridge0: port 3(team0) entered disabled state [ 342.759801][ T9804] 8021q: adding VLAN 0 to HW filter on device team0 [ 342.799049][ T9804] bond0: (slave team0): Enslaving as an active interface with an up link [ 342.819247][ T9807] netlink: 'syz.4.1910': attribute type 10 has an invalid length. [ 342.837205][ T9807] bond0: (slave team0): Releasing backup interface [ 342.863971][ T9807] bridge0: port 3(team0) entered blocking state [ 342.870631][ T9807] bridge0: port 3(team0) entered disabled state [ 342.880956][ T9807] device team0 entered promiscuous mode [ 342.890884][ T9807] device team_slave_0 entered promiscuous mode [ 342.897767][ T9807] device team_slave_1 entered promiscuous mode [ 342.944641][ T9807] device geneve1 entered promiscuous mode [ 342.950614][ T9807] device macvlan0 entered promiscuous mode [ 342.978252][ T9819] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1914'. [ 342.992803][ T9816] netlink: 'syz.2.1916': attribute type 39 has an invalid length. [ 343.003599][ T9818] netlink: 'syz.1.1915': attribute type 10 has an invalid length. [ 343.074925][ T9818] 8021q: adding VLAN 0 to HW filter on device team0 [ 343.191156][ T9818] bond0: (slave team0): Enslaving as an active interface with an up link [ 343.216851][ T9814] netlink: 'syz.0.1914': attribute type 10 has an invalid length. [ 343.253235][ T9825] netlink: 'syz.3.1918': attribute type 29 has an invalid length. [ 343.258196][ T9827] tun0: tun_chr_ioctl cmd 2147767507 [ 343.272592][ T9825] netlink: 44 bytes leftover after parsing attributes in process `syz.3.1918'. [ 343.289580][ T9828] tun0: tun_chr_ioctl cmd 2147767507 [ 343.352853][ T9825] netlink: 44 bytes leftover after parsing attributes in process `syz.3.1918'. [ 344.390128][ T9855] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1929'. [ 344.457380][ T9855] device team0 left promiscuous mode [ 344.483667][ T9855] device team_slave_0 left promiscuous mode [ 344.504154][ T9855] device team_slave_1 left promiscuous mode [ 344.514837][ T9855] device geneve1 left promiscuous mode [ 344.538878][ T9855] device macvlan0 left promiscuous mode [ 344.561720][ T9855] bridge0: port 3(team0) entered disabled state [ 344.663146][ T9855] 8021q: adding VLAN 0 to HW filter on device team0 [ 344.689379][ T9855] bond0: (slave team0): Enslaving as an active interface with an up link [ 344.708174][ T9863] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1932'. [ 344.735278][ T9861] bond0: (slave team0): Releasing backup interface [ 344.771571][ T9861] bridge0: port 3(team0) entered blocking state [ 344.791557][ T9861] bridge0: port 3(team0) entered disabled state [ 344.803641][ T9861] device team0 entered promiscuous mode [ 344.813882][ T9861] device team_slave_0 entered promiscuous mode [ 344.828052][ T9861] device team_slave_1 entered promiscuous mode [ 344.837416][ T9861] device geneve1 entered promiscuous mode [ 344.843521][ T9861] device macvlan0 entered promiscuous mode [ 344.970371][ T9866] bond0: (slave team0): Releasing backup interface [ 345.312891][ T9873] tun0: tun_chr_ioctl cmd 2147767507 [ 346.408207][ T9901] validate_nla: 5 callbacks suppressed [ 346.408229][ T9901] netlink: 'syz.2.1945': attribute type 39 has an invalid length. [ 346.610588][ T9903] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1946'. [ 346.693569][ T9910] netlink: 'syz.4.1946': attribute type 10 has an invalid length. [ 346.714814][ T9910] device team0 left promiscuous mode [ 346.720169][ T9910] device team_slave_0 left promiscuous mode [ 346.751905][ T9917] FAULT_INJECTION: forcing a failure. [ 346.751905][ T9917] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 346.768214][ T9917] CPU: 1 PID: 9917 Comm: syz.3.1952 Not tainted 6.1.129-syzkaller #0 [ 346.776326][ T9917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 346.779347][ T9910] device team_slave_1 left promiscuous mode [ 346.786514][ T9917] Call Trace: [ 346.786528][ T9917] [ 346.786537][ T9917] dump_stack_lvl+0x1e3/0x2cb [ 346.786577][ T9917] ? nf_tcp_handle_invalid+0x647/0x647 [ 346.786611][ T9917] ? panic+0x764/0x764 [ 346.786635][ T9917] ? __lock_acquire+0x1f80/0x1f80 [ 346.786677][ T9917] should_fail_ex+0x3a6/0x4d0 [ 346.786717][ T9917] _copy_from_user+0x2b/0x170 [ 346.786746][ T9917] copy_msghdr_from_user+0xaa/0x670 [ 346.830599][ T9910] device geneve1 left promiscuous mode [ 346.832587][ T9917] ? sendmsg_copy_msghdr+0x70/0x70 [ 346.832635][ T9917] __sys_sendmsg+0x236/0x390 [ 346.847812][ T9917] ? ____sys_sendmsg+0x9a0/0x9a0 [ 346.852776][ T9917] ? vfs_write+0x6cf/0xbc0 [ 346.857249][ T9917] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 346.861772][ T9910] device macvlan0 left promiscuous mode [ 346.863260][ T9917] ? syscall_enter_from_user_mode+0x2e/0x230 [ 346.874835][ T9917] ? lockdep_hardirqs_on+0x94/0x130 [ 346.880091][ T9917] ? syscall_enter_from_user_mode+0x2e/0x230 [ 346.886095][ T9917] do_syscall_64+0x3b/0xb0 [ 346.890634][ T9917] ? clear_bhb_loop+0x45/0xa0 [ 346.895336][ T9917] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 346.901256][ T9917] RIP: 0033:0x7ff98a58d169 [ 346.905689][ T9917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 346.925337][ T9917] RSP: 002b:00007ff98b303038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 346.933764][ T9917] RAX: ffffffffffffffda RBX: 00007ff98a7a5fa0 RCX: 00007ff98a58d169 [ 346.941742][ T9917] RDX: 000000003000c0c0 RSI: 0000400000000080 RDI: 0000000000000003 [ 346.949720][ T9917] RBP: 00007ff98b303090 R08: 0000000000000000 R09: 0000000000000000 [ 346.957694][ T9917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 346.965666][ T9917] R13: 0000000000000000 R14: 00007ff98a7a5fa0 R15: 00007fff2d7522c8 [ 346.973655][ T9917] [ 346.994920][ T9910] bridge0: port 3(team0) entered disabled state [ 347.089857][ T9910] 8021q: adding VLAN 0 to HW filter on device team0 [ 347.109522][ T9910] bond0: (slave team0): Enslaving as an active interface with an up link [ 347.125713][ T9903] netlink: 'syz.4.1946': attribute type 10 has an invalid length. [ 347.183020][ T9903] bond0: (slave team0): Releasing backup interface [ 347.463945][ T9903] bridge0: port 3(team0) entered blocking state [ 347.488517][ T9903] bridge0: port 3(team0) entered disabled state [ 347.501503][ T9903] device team0 entered promiscuous mode [ 347.523421][ T9903] device team_slave_0 entered promiscuous mode [ 347.534675][ T9903] device team_slave_1 entered promiscuous mode [ 347.541002][ T9903] device geneve1 entered promiscuous mode [ 347.556679][ T9903] device macvlan0 entered promiscuous mode [ 347.574075][ T9924] tun0: tun_chr_ioctl cmd 2147767507 [ 347.739104][ T9933] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1957'. [ 347.855761][ T9933] netlink: 'syz.4.1957': attribute type 10 has an invalid length. [ 347.894962][ T9933] device team0 left promiscuous mode [ 347.900373][ T9933] device team_slave_0 left promiscuous mode [ 347.923568][ T9933] device team_slave_1 left promiscuous mode [ 347.955618][ T9933] device geneve1 left promiscuous mode [ 347.961339][ T9933] device macvlan0 left promiscuous mode [ 348.004083][ T9933] bridge0: port 3(team0) entered disabled state [ 348.030372][ T9933] 8021q: adding VLAN 0 to HW filter on device team0 [ 348.052325][ T9933] bond0: (slave team0): Enslaving as an active interface with an up link [ 348.116299][ T9938] netlink: 'syz.4.1957': attribute type 10 has an invalid length. [ 348.345269][ T9938] bond0: (slave team0): Releasing backup interface [ 348.481885][ T9938] bridge0: port 3(team0) entered blocking state [ 348.491231][ T9938] bridge0: port 3(team0) entered disabled state [ 348.500898][ T9938] device team0 entered promiscuous mode [ 348.506671][ T9938] device team_slave_0 entered promiscuous mode [ 348.520710][ T9938] device team_slave_1 entered promiscuous mode [ 348.534233][ T9938] device geneve1 entered promiscuous mode [ 348.568417][ T9938] device macvlan0 entered promiscuous mode [ 348.622758][ T9955] tun0: tun_chr_ioctl cmd 2147767507 [ 348.671938][ T9953] netlink: 'syz.0.1962': attribute type 39 has an invalid length. [ 349.721757][ T9974] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1970'. [ 349.745736][ T9971] netlink: 'syz.3.1970': attribute type 10 has an invalid length. [ 349.766549][ T9979] netlink: 'syz.3.1970': attribute type 10 has an invalid length. [ 349.816851][ T9979] bond0: (slave team0): Releasing backup interface [ 349.836345][ T9979] bridge0: port 3(team0) entered blocking state [ 349.842832][ T9979] bridge0: port 3(team0) entered disabled state [ 349.856215][ T9979] device team0 entered promiscuous mode [ 349.861820][ T9979] device team_slave_0 entered promiscuous mode [ 349.888286][ T9979] device team_slave_1 entered promiscuous mode [ 350.123678][ T9990] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1976'. [ 350.199922][ T9990] netlink: 'syz.1.1976': attribute type 10 has an invalid length. [ 350.246018][ T9990] 8021q: adding VLAN 0 to HW filter on device team0 [ 350.262742][ T9990] bond0: (slave team0): Enslaving as an active interface with an up link [ 350.280910][ T9987] netlink: 'syz.1.1976': attribute type 10 has an invalid length. [ 350.343346][ T9987] bond0: (slave team0): Releasing backup interface [ 350.373807][ T9996] netlink: 44 bytes leftover after parsing attributes in process `syz.4.1978'. [ 350.420920][ T9996] netlink: 44 bytes leftover after parsing attributes in process `syz.4.1978'. [ 351.113451][T10019] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1986'. [ 351.340753][T10015] 8021q: adding VLAN 0 to HW filter on device team0 [ 351.450949][T10015] bond0: (slave team0): Enslaving as an active interface with an up link [ 351.475943][T10019] validate_nla: 4 callbacks suppressed [ 351.475962][T10019] netlink: 'syz.1.1986': attribute type 10 has an invalid length. [ 351.557927][T10019] bond0: (slave team0): Releasing backup interface [ 351.639094][T10032] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1989'. [ 351.676234][T10028] netlink: 'syz.0.1989': attribute type 10 has an invalid length. [ 351.700820][T10028] device team0 left promiscuous mode [ 351.712737][T10028] device team_slave_0 left promiscuous mode [ 351.729897][T10028] device team_slave_1 left promiscuous mode [ 351.744888][T10028] device geneve1 left promiscuous mode [ 351.757835][T10028] bridge0: port 3(team0) entered disabled state [ 351.885291][T10028] 8021q: adding VLAN 0 to HW filter on device team0 [ 351.938491][T10028] device team0 entered promiscuous mode [ 351.952575][T10028] device team_slave_0 entered promiscuous mode [ 351.969838][T10028] device team_slave_1 entered promiscuous mode [ 351.990356][T10028] device geneve1 entered promiscuous mode [ 352.024629][T10028] bond0: (slave team0): Enslaving as an active interface with an up link [ 352.035129][T10032] netlink: 'syz.0.1989': attribute type 10 has an invalid length. [ 352.060966][T10032] bond0: (slave team0): Releasing backup interface [ 352.099671][T10032] device team0 left promiscuous mode [ 352.111718][T10032] device team_slave_0 left promiscuous mode [ 352.117853][T10032] device team_slave_1 left promiscuous mode [ 352.123925][T10032] device geneve1 left promiscuous mode [ 352.170190][T10032] bridge0: port 3(team0) entered blocking state [ 352.183768][T10032] bridge0: port 3(team0) entered disabled state [ 352.194290][T10032] device team0 entered promiscuous mode [ 352.204815][T10032] device team_slave_0 entered promiscuous mode [ 352.216123][T10032] device team_slave_1 entered promiscuous mode [ 352.222501][T10032] device geneve1 entered promiscuous mode [ 352.252314][T10040] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1993'. [ 352.272482][T10041] netlink: 'syz.2.1993': attribute type 10 has an invalid length. [ 352.378099][T10042] netlink: 'syz.2.1993': attribute type 10 has an invalid length. [ 352.420141][T10042] bond0: (slave team0): Releasing backup interface [ 352.485636][T10042] device team0 left promiscuous mode [ 352.490994][T10042] device team_slave_0 left promiscuous mode [ 352.497583][T10042] device team_slave_1 left promiscuous mode [ 352.505468][T10042] bridge0: port 3(team0) entered blocking state [ 352.512016][T10042] bridge0: port 3(team0) entered disabled state [ 352.535954][T10042] device team0 entered promiscuous mode [ 352.541554][T10042] device team_slave_0 entered promiscuous mode [ 352.569254][T10042] device team_slave_1 entered promiscuous mode [ 352.590149][T10046] netlink: 'syz.1.1995': attribute type 39 has an invalid length. [ 352.867715][T10053] netlink: 'syz.0.1999': attribute type 29 has an invalid length. [ 352.972748][T10053] netlink: 44 bytes leftover after parsing attributes in process `syz.0.1999'. [ 353.116620][T10053] netlink: 'syz.0.1999': attribute type 29 has an invalid length. [ 353.183594][T10053] netlink: 44 bytes leftover after parsing attributes in process `syz.0.1999'. [ 353.457391][T10067] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2003'. [ 353.538086][T10067] netlink: 'syz.3.2003': attribute type 10 has an invalid length. [ 353.550779][T10069] FAULT_INJECTION: forcing a failure. [ 353.550779][T10069] name failslab, interval 1, probability 0, space 0, times 0 [ 353.567034][T10067] device team0 left promiscuous mode [ 353.572664][T10067] device team_slave_0 left promiscuous mode [ 353.604853][T10069] CPU: 1 PID: 10069 Comm: syz.2.2004 Not tainted 6.1.129-syzkaller #0 [ 353.613100][T10069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 353.623193][T10069] Call Trace: [ 353.626495][T10069] [ 353.629454][T10069] dump_stack_lvl+0x1e3/0x2cb [ 353.634179][T10069] ? nf_tcp_handle_invalid+0x647/0x647 [ 353.639678][T10069] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 353.643080][T10067] device team_slave_1 left promiscuous mode [ 353.645874][T10069] should_fail_ex+0x3a6/0x4d0 [ 353.645920][T10069] should_failslab+0x5/0x20 [ 353.645956][T10069] slab_pre_alloc_hook+0x59/0x300 [ 353.645992][T10069] ? tomoyo_realpath_from_path+0xcb/0x5d0 [ 353.646032][T10069] __kmem_cache_alloc_node+0x47/0x260 [ 353.646068][T10069] ? tomoyo_realpath_from_path+0xcb/0x5d0 [ 353.646101][T10069] __kmalloc+0xa1/0x230 [ 353.646127][T10069] ? rcu_is_watching+0x11/0xb0 [ 353.646160][T10069] tomoyo_realpath_from_path+0xcb/0x5d0 [ 353.646206][T10069] tomoyo_path_number_perm+0x21f/0x7f0 [ 353.646241][T10069] ? tomoyo_path_number_perm+0x1f2/0x7f0 [ 353.646275][T10069] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 353.714148][T10069] ? __fget_files+0x28/0x4a0 [ 353.718769][T10069] ? __fget_files+0x28/0x4a0 [ 353.723540][T10069] ? __fget_files+0x435/0x4a0 [ 353.728225][T10069] ? __fget_files+0x28/0x4a0 [ 353.732828][T10069] security_file_ioctl+0x6d/0xa0 [ 353.737783][T10069] __se_sys_ioctl+0x47/0x160 [ 353.742380][T10069] do_syscall_64+0x3b/0xb0 [ 353.746808][T10069] ? clear_bhb_loop+0x45/0xa0 [ 353.751508][T10069] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 353.757410][T10069] RIP: 0033:0x7fa24958d169 [ 353.761832][T10069] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 353.781619][T10069] RSP: 002b:00007fa24a333038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 353.790042][T10069] RAX: ffffffffffffffda RBX: 00007fa2497a5fa0 RCX: 00007fa24958d169 [ 353.798021][T10069] RDX: 0000400000000000 RSI: 0000000000008b26 RDI: 000000000000000a [ 353.805993][T10069] RBP: 00007fa24a333090 R08: 0000000000000000 R09: 0000000000000000 [ 353.813985][T10069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 353.821959][T10069] R13: 0000000000000000 R14: 00007fa2497a5fa0 R15: 00007fffc323f128 [ 353.829951][T10069] [ 353.837081][T10067] bridge0: port 3(team0) entered disabled state [ 353.893100][T10067] 8021q: adding VLAN 0 to HW filter on device team0 [ 353.943819][T10067] bond0: (slave team0): Enslaving as an active interface with an up link [ 353.981180][T10072] netlink: 'syz.3.2003': attribute type 10 has an invalid length. [ 354.006359][T10072] bond0: (slave team0): Releasing backup interface [ 354.024694][T10069] ERROR: Out of memory at tomoyo_realpath_from_path. [ 354.053486][T10072] bridge0: port 3(team0) entered blocking state [ 354.081515][T10072] bridge0: port 3(team0) entered disabled state [ 354.099311][T10072] device team0 entered promiscuous mode [ 354.108475][T10072] device team_slave_0 entered promiscuous mode [ 354.119212][T10072] device team_slave_1 entered promiscuous mode [ 354.150103][T10078] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2006'. [ 354.250549][T10078] 8021q: adding VLAN 0 to HW filter on device team0 [ 354.292739][T10078] bond0: (slave team0): Enslaving as an active interface with an up link [ 354.502756][T10079] bond0: (slave team0): Releasing backup interface [ 354.982895][T10101] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2014'. [ 355.089311][T10098] device team0 left promiscuous mode [ 355.104656][T10098] device team_slave_0 left promiscuous mode [ 355.112538][T10098] device team_slave_1 left promiscuous mode [ 355.121163][T10098] device geneve1 left promiscuous mode [ 355.138137][T10098] device macvlan0 left promiscuous mode [ 355.182436][T10098] bridge0: port 3(team0) entered disabled state [ 355.577545][T10098] 8021q: adding VLAN 0 to HW filter on device team0 [ 355.812051][T10115] netlink: 44 bytes leftover after parsing attributes in process `syz.1.2020'. [ 355.830907][T10098] bond0: (slave team0): Enslaving as an active interface with an up link [ 355.892640][T10101] bond0: (slave team0): Releasing backup interface [ 355.945911][T10101] bridge0: port 3(team0) entered blocking state [ 355.952451][T10101] bridge0: port 3(team0) entered disabled state [ 355.961464][T10101] device team0 entered promiscuous mode [ 355.967921][T10101] device team_slave_0 entered promiscuous mode [ 355.974870][T10101] device team_slave_1 entered promiscuous mode [ 355.981823][T10101] device geneve1 entered promiscuous mode [ 355.988290][T10101] device macvlan0 entered promiscuous mode [ 355.999719][T10107] tun0: tun_chr_ioctl cmd 2147767507 [ 356.022027][T10115] netlink: 44 bytes leftover after parsing attributes in process `syz.1.2020'. [ 356.050319][T10121] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2022'. [ 356.103917][T10122] device team0 left promiscuous mode [ 356.124255][T10122] device team_slave_0 left promiscuous mode [ 356.153701][T10122] device team_slave_1 left promiscuous mode [ 356.177665][T10122] bridge0: port 3(team0) entered disabled state [ 356.269127][T10122] 8021q: adding VLAN 0 to HW filter on device team0 [ 356.320753][T10122] bond0: (slave team0): Enslaving as an active interface with an up link [ 356.347238][T10121] bond0: (slave team0): Releasing backup interface [ 356.407164][T10121] bridge0: port 3(team0) entered blocking state [ 356.413560][T10121] bridge0: port 3(team0) entered disabled state [ 356.431127][T10121] device team0 entered promiscuous mode [ 356.440268][T10121] device team_slave_0 entered promiscuous mode [ 356.454299][T10121] device team_slave_1 entered promiscuous mode [ 356.483051][T10130] 8021q: adding VLAN 0 to HW filter on device team0 [ 356.517996][T10130] bond0: (slave team0): Enslaving as an active interface with an up link [ 356.563606][T10132] validate_nla: 11 callbacks suppressed [ 356.563643][T10132] netlink: 'syz.4.2027': attribute type 10 has an invalid length. [ 356.579773][T10132] device team0 left promiscuous mode [ 356.585713][T10132] device team_slave_0 left promiscuous mode [ 356.593023][T10132] device team_slave_1 left promiscuous mode [ 356.601854][T10132] device geneve1 left promiscuous mode [ 356.621148][T10132] device macvlan0 left promiscuous mode [ 356.632534][T10132] bridge0: port 3(team0) entered disabled state [ 356.665407][T10132] 8021q: adding VLAN 0 to HW filter on device team0 [ 356.681472][T10132] bond0: (slave team0): Enslaving as an active interface with an up link [ 356.695114][T10135] netlink: 'syz.1.2026': attribute type 10 has an invalid length. [ 356.711963][T10135] bond0: (slave team0): Releasing backup interface [ 356.753852][T10137] netlink: 'syz.4.2027': attribute type 10 has an invalid length. [ 356.766832][T10137] bond0: (slave team0): Releasing backup interface [ 356.791181][T10137] bridge0: port 3(team0) entered blocking state [ 356.798009][T10137] bridge0: port 3(team0) entered disabled state [ 356.806591][T10137] device team0 entered promiscuous mode [ 356.812497][T10137] device team_slave_0 entered promiscuous mode [ 356.819758][T10137] device team_slave_1 entered promiscuous mode [ 356.827076][T10137] device geneve1 entered promiscuous mode [ 356.833250][T10137] device macvlan0 entered promiscuous mode [ 356.865718][T10146] tun0: tun_chr_ioctl cmd 2147767507 [ 357.293080][T10157] __nla_validate_parse: 2 callbacks suppressed [ 357.293099][T10157] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2035'. [ 357.341377][T10157] netlink: 'syz.1.2035': attribute type 10 has an invalid length. [ 357.387749][T10157] 8021q: adding VLAN 0 to HW filter on device team0 [ 357.429025][T10157] bond0: (slave team0): Enslaving as an active interface with an up link [ 357.444961][T10160] netlink: 'syz.1.2035': attribute type 10 has an invalid length. [ 357.484277][T10160] bond0: (slave team0): Releasing backup interface [ 357.632839][T10170] netlink: 'syz.0.2040': attribute type 39 has an invalid length. [ 357.692061][T10175] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2042'. [ 357.758438][T10173] netlink: 'syz.2.2042': attribute type 10 has an invalid length. [ 357.790683][T10173] device team0 left promiscuous mode [ 357.812882][T10173] device team_slave_0 left promiscuous mode [ 357.826772][T10173] device team_slave_1 left promiscuous mode [ 357.852962][T10173] bridge0: port 3(team0) entered disabled state [ 358.051198][T10173] 8021q: adding VLAN 0 to HW filter on device team0 [ 358.108275][T10173] device team0 entered promiscuous mode [ 358.122204][T10173] device team_slave_0 entered promiscuous mode [ 358.133156][T10173] device team_slave_1 entered promiscuous mode [ 358.166971][T10173] bond0: (slave team0): Enslaving as an active interface with an up link [ 358.202191][T10175] netlink: 'syz.2.2042': attribute type 10 has an invalid length. [ 358.230668][T10175] bond0: (slave team0): Releasing backup interface [ 358.339605][T10175] device team0 left promiscuous mode [ 358.354457][T10175] device team_slave_0 left promiscuous mode [ 358.360568][T10175] device team_slave_1 left promiscuous mode [ 358.387143][T10175] bridge0: port 3(team0) entered blocking state [ 358.393595][T10175] bridge0: port 3(team0) entered disabled state [ 358.436072][T10175] device team0 entered promiscuous mode [ 358.448602][T10175] device team_slave_0 entered promiscuous mode [ 358.465050][T10175] device team_slave_1 entered promiscuous mode [ 358.494837][T10190] tun0: tun_chr_ioctl cmd 2147767507 [ 358.712158][T10199] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2052'. [ 358.791032][T10199] netlink: 'syz.2.2052': attribute type 10 has an invalid length. [ 358.825861][T10199] device team0 left promiscuous mode [ 358.831903][T10199] device team_slave_0 left promiscuous mode [ 358.858988][T10199] device team_slave_1 left promiscuous mode [ 358.876778][T10199] bridge0: port 3(team0) entered disabled state [ 358.948605][T10199] 8021q: adding VLAN 0 to HW filter on device team0 [ 358.971790][T10199] device team0 entered promiscuous mode [ 358.989888][T10199] device team_slave_0 entered promiscuous mode [ 359.005718][T10199] device team_slave_1 entered promiscuous mode [ 359.048141][T10199] bond0: (slave team0): Enslaving as an active interface with an up link [ 359.065502][T10200] netlink: 'syz.2.2052': attribute type 10 has an invalid length. [ 359.076431][T10200] bond0: (slave team0): Releasing backup interface [ 359.094794][T10200] device team0 left promiscuous mode [ 359.111532][T10200] device team_slave_0 left promiscuous mode [ 359.117665][T10200] device team_slave_1 left promiscuous mode [ 359.200561][T10200] bridge0: port 3(team0) entered blocking state [ 359.225523][T10200] bridge0: port 3(team0) entered disabled state [ 359.233487][T10200] device team0 entered promiscuous mode [ 359.240186][T10200] device team_slave_0 entered promiscuous mode [ 359.249158][T10200] device team_slave_1 entered promiscuous mode [ 359.598373][T10232] tun0: tun_chr_ioctl cmd 2147767507 [ 359.638070][T10230] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2063'. [ 359.723435][T10230] device team0 left promiscuous mode [ 359.739717][T10230] device team_slave_0 left promiscuous mode [ 359.765199][T10230] device team_slave_1 left promiscuous mode [ 359.784842][T10230] device geneve1 left promiscuous mode [ 359.796359][T10230] bridge0: port 3(team0) entered disabled state [ 359.857800][T10230] 8021q: adding VLAN 0 to HW filter on device team0 [ 359.894729][T10243] FAULT_INJECTION: forcing a failure. [ 359.894729][T10243] name failslab, interval 1, probability 0, space 0, times 0 [ 359.913387][T10230] device team0 entered promiscuous mode [ 359.914579][T10243] CPU: 1 PID: 10243 Comm: syz.4.2070 Not tainted 6.1.129-syzkaller #0 [ 359.927226][T10243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 359.937319][T10243] Call Trace: [ 359.940609][T10243] [ 359.943546][T10243] dump_stack_lvl+0x1e3/0x2cb [ 359.948250][T10243] ? nf_tcp_handle_invalid+0x647/0x647 [ 359.953726][T10243] ? panic+0x764/0x764 [ 359.957819][T10243] ? __might_sleep+0xb0/0xb0 [ 359.962422][T10243] ? __lock_acquire+0x125b/0x1f80 [ 359.967481][T10243] should_fail_ex+0x3a6/0x4d0 [ 359.972193][T10243] should_failslab+0x5/0x20 [ 359.976713][T10243] slab_pre_alloc_hook+0x59/0x300 [ 359.981758][T10243] ? tomoyo_realpath_from_path+0xcb/0x5d0 [ 359.987491][T10243] __kmem_cache_alloc_node+0x47/0x260 [ 359.992880][T10243] ? tomoyo_realpath_from_path+0xcb/0x5d0 [ 359.998619][T10243] __kmalloc+0xa1/0x230 [ 360.002785][T10243] ? rcu_is_watching+0x11/0xb0 [ 360.007567][T10243] tomoyo_realpath_from_path+0xcb/0x5d0 [ 360.013148][T10243] tomoyo_path_number_perm+0x21f/0x7f0 [ 360.018628][T10243] ? tomoyo_path_number_perm+0x1f2/0x7f0 [ 360.024275][T10243] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 360.029758][T10243] ? __fget_files+0x28/0x4a0 [ 360.034384][T10243] ? __fget_files+0x28/0x4a0 [ 360.039003][T10243] ? __fget_files+0x435/0x4a0 [ 360.043686][T10243] ? __fget_files+0x28/0x4a0 [ 360.048293][T10243] security_file_ioctl+0x6d/0xa0 [ 360.053427][T10243] __se_sys_ioctl+0x47/0x160 [ 360.058027][T10243] do_syscall_64+0x3b/0xb0 [ 360.062459][T10243] ? clear_bhb_loop+0x45/0xa0 [ 360.067142][T10243] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 360.073217][T10243] RIP: 0033:0x7fcf5e18d169 [ 360.077636][T10243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 360.097247][T10243] RSP: 002b:00007fcf5f02d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 360.105668][T10243] RAX: ffffffffffffffda RBX: 00007fcf5e3a5fa0 RCX: 00007fcf5e18d169 [ 360.113646][T10243] RDX: 0000400000000080 RSI: 0000000000008946 RDI: 0000000000000004 [ 360.121652][T10243] RBP: 00007fcf5f02d090 R08: 0000000000000000 R09: 0000000000000000 [ 360.129637][T10243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 360.137613][T10243] R13: 0000000000000000 R14: 00007fcf5e3a5fa0 R15: 00007ffe044b9718 [ 360.145621][T10243] [ 360.155087][T10230] device team_slave_0 entered promiscuous mode [ 360.175081][T10230] device team_slave_1 entered promiscuous mode [ 360.182592][T10230] device geneve1 entered promiscuous mode [ 360.183796][T10243] ERROR: Out of memory at tomoyo_realpath_from_path. [ 360.210560][T10230] bond0: (slave team0): Enslaving as an active interface with an up link [ 360.230231][T10236] bond0: (slave team0): Releasing backup interface [ 360.239688][T10236] device team0 left promiscuous mode [ 360.251569][T10236] device team_slave_0 left promiscuous mode [ 360.257611][T10236] device team_slave_1 left promiscuous mode [ 360.263649][T10236] device geneve1 left promiscuous mode [ 360.286864][T10236] bridge0: port 3(team0) entered blocking state [ 360.295301][T10236] bridge0: port 3(team0) entered disabled state [ 360.303392][T10236] device team0 entered promiscuous mode [ 360.309628][T10236] device team_slave_0 entered promiscuous mode [ 360.316817][T10236] device team_slave_1 entered promiscuous mode [ 360.323394][T10236] device geneve1 entered promiscuous mode [ 360.330857][T10240] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2068'. [ 360.343121][T10244] device team0 left promiscuous mode [ 360.376571][T10244] device team_slave_0 left promiscuous mode [ 360.406355][T10244] device team_slave_1 left promiscuous mode [ 360.428412][T10244] bridge0: port 3(team0) entered disabled state [ 360.635120][T10244] 8021q: adding VLAN 0 to HW filter on device team0 [ 360.716490][T10244] device team0 entered promiscuous mode [ 360.722569][T10244] device team_slave_0 entered promiscuous mode [ 360.737294][T10244] device team_slave_1 entered promiscuous mode [ 360.744615][T10244] bond0: (slave team0): Enslaving as an active interface with an up link [ 360.757480][T10249] bond0: (slave team0): Releasing backup interface [ 360.766211][T10249] device team0 left promiscuous mode [ 360.772008][T10249] device team_slave_0 left promiscuous mode [ 360.778180][T10249] device team_slave_1 left promiscuous mode [ 360.792846][T10249] bridge0: port 3(team0) entered blocking state [ 360.819122][T10249] bridge0: port 3(team0) entered disabled state [ 360.836510][T10249] device team0 entered promiscuous mode [ 360.848976][T10249] device team_slave_0 entered promiscuous mode [ 360.863358][T10249] device team_slave_1 entered promiscuous mode [ 360.884689][T10252] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2073'. [ 360.913043][T10254] device team0 left promiscuous mode [ 360.929640][T10254] device team_slave_0 left promiscuous mode [ 360.946391][T10254] device team_slave_1 left promiscuous mode [ 360.975196][T10254] device geneve1 left promiscuous mode [ 361.034554][T10254] bridge0: port 3(team0) entered disabled state [ 361.210849][T10254] 8021q: adding VLAN 0 to HW filter on device team0 [ 361.248588][T10254] device team0 entered promiscuous mode [ 361.265282][T10254] device team_slave_0 entered promiscuous mode [ 361.273204][T10254] device team_slave_1 entered promiscuous mode [ 361.287317][T10254] device geneve1 entered promiscuous mode [ 361.310298][T10254] bond0: (slave team0): Enslaving as an active interface with an up link [ 361.337476][T10257] bond0: (slave team0): Releasing backup interface [ 361.375746][T10257] device team0 left promiscuous mode [ 361.381942][T10257] device team_slave_0 left promiscuous mode [ 361.388028][T10257] device team_slave_1 left promiscuous mode [ 361.394074][T10257] device geneve1 left promiscuous mode [ 361.464134][T10257] bridge0: port 3(team0) entered blocking state [ 361.472404][T10257] bridge0: port 3(team0) entered disabled state [ 361.480275][T10257] device team0 entered promiscuous mode [ 361.487260][T10257] device team_slave_0 entered promiscuous mode [ 361.493698][T10257] device team_slave_1 entered promiscuous mode [ 361.500640][T10257] device geneve1 entered promiscuous mode [ 361.535902][T10275] tun0: tun_chr_ioctl cmd 2147767507 [ 361.793161][T10281] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2084'. [ 361.911551][T10281] validate_nla: 8 callbacks suppressed [ 361.911610][T10281] netlink: 'syz.0.2084': attribute type 10 has an invalid length. [ 362.112179][T10281] device team0 left promiscuous mode [ 362.197383][T10281] device team_slave_0 left promiscuous mode [ 362.225719][T10281] device team_slave_1 left promiscuous mode [ 362.236030][T10281] device geneve1 left promiscuous mode [ 362.361308][T10281] bridge0: port 3(team0) entered disabled state [ 362.469485][T10281] 8021q: adding VLAN 0 to HW filter on device team0 [ 362.526498][T10281] device team0 entered promiscuous mode [ 362.536540][T10281] device team_slave_0 entered promiscuous mode [ 362.556619][T10281] device team_slave_1 entered promiscuous mode [ 362.584719][T10281] device geneve1 entered promiscuous mode [ 362.591523][T10281] bond0: (slave team0): Enslaving as an active interface with an up link [ 362.619668][T10284] netlink: 'syz.0.2084': attribute type 10 has an invalid length. [ 362.671959][T10284] bond0: (slave team0): Releasing backup interface [ 362.685564][T10284] device team0 left promiscuous mode [ 362.691470][T10284] device team_slave_0 left promiscuous mode [ 362.697565][T10284] device team_slave_1 left promiscuous mode [ 362.703542][T10284] device geneve1 left promiscuous mode [ 362.762285][T10284] bridge0: port 3(team0) entered blocking state [ 362.774600][T10284] bridge0: port 3(team0) entered disabled state [ 362.792536][T10284] device team0 entered promiscuous mode [ 362.803232][T10284] device team_slave_0 entered promiscuous mode [ 362.832206][T10284] device team_slave_1 entered promiscuous mode [ 362.839389][T10284] device geneve1 entered promiscuous mode [ 362.870123][T10310] FAULT_INJECTION: forcing a failure. [ 362.870123][T10310] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 362.872513][T10307] tun0: tun_chr_ioctl cmd 2147767507 [ 362.910196][T10310] CPU: 0 PID: 10310 Comm: syz.1.2091 Not tainted 6.1.129-syzkaller #0 [ 362.918402][T10310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 362.928485][T10310] Call Trace: [ 362.931785][T10310] [ 362.934727][T10310] dump_stack_lvl+0x1e3/0x2cb [ 362.939429][T10310] ? nf_tcp_handle_invalid+0x647/0x647 [ 362.944911][T10310] ? panic+0x764/0x764 [ 362.949002][T10310] ? __lock_acquire+0x1f80/0x1f80 [ 362.954051][T10310] should_fail_ex+0x3a6/0x4d0 [ 362.958755][T10310] _copy_from_user+0x2b/0x170 [ 362.963448][T10310] copy_msghdr_from_user+0xaa/0x670 [ 362.968661][T10310] ? sendmsg_copy_msghdr+0x70/0x70 [ 362.973793][T10310] __sys_sendmsg+0x236/0x390 [ 362.978400][T10310] ? ____sys_sendmsg+0x9a0/0x9a0 [ 362.983345][T10310] ? vfs_write+0x6cf/0xbc0 [ 362.987813][T10310] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 362.993851][T10310] ? syscall_enter_from_user_mode+0x2e/0x230 [ 362.999849][T10310] ? lockdep_hardirqs_on+0x94/0x130 [ 363.005058][T10310] ? syscall_enter_from_user_mode+0x2e/0x230 [ 363.011064][T10310] do_syscall_64+0x3b/0xb0 [ 363.015497][T10310] ? clear_bhb_loop+0x45/0xa0 [ 363.020189][T10310] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 363.026094][T10310] RIP: 0033:0x7f9a8058d169 [ 363.030531][T10310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 363.050143][T10310] RSP: 002b:00007f9a803ff038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 363.058564][T10310] RAX: ffffffffffffffda RBX: 00007f9a807a5fa0 RCX: 00007f9a8058d169 [ 363.066552][T10310] RDX: 0000000000000840 RSI: 00004000000000c0 RDI: 0000000000000003 [ 363.074529][T10310] RBP: 00007f9a803ff090 R08: 0000000000000000 R09: 0000000000000000 [ 363.082530][T10310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 363.090512][T10310] R13: 0000000000000000 R14: 00007f9a807a5fa0 R15: 00007ffccaebf058 [ 363.098515][T10310] [ 363.467256][T10321] tun0: tun_chr_ioctl cmd 2147767507 [ 363.472642][T10324] netlink: 'syz.3.2095': attribute type 10 has an invalid length. [ 363.499587][T10324] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2095'. [ 363.518974][T10324] device batadv0 entered promiscuous mode [ 363.534849][T10324] bridge0: port 4(batadv0) entered blocking state [ 363.544744][T10324] bridge0: port 4(batadv0) entered disabled state [ 363.588692][T10324] bridge0: port 4(batadv0) entered blocking state [ 363.595372][T10324] bridge0: port 4(batadv0) entered forwarding state [ 363.761188][ T4296] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 363.770917][ T4296] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 363.943539][T10333] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2099'. [ 364.026565][T10333] netlink: 'syz.4.2099': attribute type 10 has an invalid length. [ 364.087120][T10333] device team0 left promiscuous mode [ 364.092938][T10333] device team_slave_0 left promiscuous mode [ 364.156344][T10333] device team_slave_1 left promiscuous mode [ 364.196864][T10333] device geneve1 left promiscuous mode [ 364.226380][T10333] device macvlan0 left promiscuous mode [ 364.255619][T10333] bridge0: port 3(team0) entered disabled state [ 364.307058][T10333] 8021q: adding VLAN 0 to HW filter on device team0 [ 364.368331][T10333] bond0: (slave team0): Enslaving as an active interface with an up link [ 364.385406][T10338] netlink: 'syz.4.2099': attribute type 10 has an invalid length. [ 364.446487][T10338] bond0: (slave team0): Releasing backup interface [ 364.494094][T10338] bridge0: port 3(team0) entered blocking state [ 364.526127][T10338] bridge0: port 3(team0) entered disabled state [ 364.541492][T10338] device team0 entered promiscuous mode [ 364.553773][T10338] device team_slave_0 entered promiscuous mode [ 364.570953][T10338] device team_slave_1 entered promiscuous mode [ 364.579870][T10338] device geneve1 entered promiscuous mode [ 364.587170][T10338] device macvlan0 entered promiscuous mode [ 364.595312][T10349] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2104'. [ 364.605019][T10352] netlink: 'syz.2.2104': attribute type 10 has an invalid length. [ 364.616678][T10352] device team0 left promiscuous mode [ 364.623319][T10352] device team_slave_0 left promiscuous mode [ 364.630205][T10352] device team_slave_1 left promiscuous mode [ 364.656330][T10352] bridge0: port 3(team0) entered disabled state [ 364.705251][T10352] 8021q: adding VLAN 0 to HW filter on device team0 [ 364.738138][T10352] device team0 entered promiscuous mode [ 364.743964][T10352] device team_slave_0 entered promiscuous mode [ 364.758187][T10352] device team_slave_1 entered promiscuous mode [ 364.792071][T10352] bond0: (slave team0): Enslaving as an active interface with an up link [ 364.812799][T10353] netlink: 'syz.2.2104': attribute type 10 has an invalid length. [ 364.822678][T10353] bond0: (slave team0): Releasing backup interface [ 364.837721][T10353] device team0 left promiscuous mode [ 364.843692][T10353] device team_slave_0 left promiscuous mode [ 364.849838][T10353] device team_slave_1 left promiscuous mode [ 364.884182][T10353] bridge0: port 3(team0) entered blocking state [ 364.892267][T10353] bridge0: port 3(team0) entered disabled state [ 364.907475][T10353] device team0 entered promiscuous mode [ 364.913269][T10353] device team_slave_0 entered promiscuous mode [ 364.923954][T10353] device team_slave_1 entered promiscuous mode [ 364.945702][T10356] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2105'. [ 364.964998][T10363] tun0: tun_chr_ioctl cmd 2147767507 [ 364.975936][T10361] netlink: 'syz.3.2105': attribute type 10 has an invalid length. [ 364.997214][T10361] device team0 left promiscuous mode [ 365.010875][T10361] device team_slave_0 left promiscuous mode [ 365.024979][T10361] device team_slave_1 left promiscuous mode [ 365.045970][T10361] bridge0: port 3(team0) entered disabled state [ 365.118323][T10361] 8021q: adding VLAN 0 to HW filter on device team0 [ 365.155195][T10361] bond0: (slave team0): Enslaving as an active interface with an up link [ 365.174716][T10369] netlink: 'syz.3.2105': attribute type 10 has an invalid length. [ 365.192353][T10369] bond0: (slave team0): Releasing backup interface [ 365.241000][T10369] bridge0: port 3(team0) entered blocking state [ 365.256154][T10369] bridge0: port 3(team0) entered disabled state [ 365.264106][T10369] device team0 entered promiscuous mode [ 365.270426][T10369] device team_slave_0 entered promiscuous mode [ 365.277615][T10369] device team_slave_1 entered promiscuous mode [ 365.322341][T10379] tun0: tun_chr_ioctl cmd 2147767507 [ 365.468933][T10384] FAULT_INJECTION: forcing a failure. [ 365.468933][T10384] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 365.510556][T10384] CPU: 0 PID: 10384 Comm: syz.4.2114 Not tainted 6.1.129-syzkaller #0 [ 365.518776][T10384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 365.528863][T10384] Call Trace: [ 365.532162][T10384] [ 365.535115][T10384] dump_stack_lvl+0x1e3/0x2cb [ 365.539836][T10384] ? nf_tcp_handle_invalid+0x647/0x647 [ 365.545346][T10384] ? panic+0x764/0x764 [ 365.549454][T10384] ? __lock_acquire+0x1f80/0x1f80 [ 365.554517][T10384] should_fail_ex+0x3a6/0x4d0 [ 365.559225][T10384] _copy_from_user+0x2b/0x170 [ 365.563923][T10384] copy_msghdr_from_user+0xaa/0x670 [ 365.569141][T10384] ? sendmsg_copy_msghdr+0x70/0x70 [ 365.574279][T10384] __sys_sendmsg+0x236/0x390 [ 365.578886][T10384] ? ____sys_sendmsg+0x9a0/0x9a0 [ 365.583842][T10384] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 365.589874][T10384] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 365.595885][T10384] ? syscall_enter_from_user_mode+0x2e/0x230 [ 365.601873][T10384] ? lockdep_hardirqs_on+0x94/0x130 [ 365.607084][T10384] ? syscall_enter_from_user_mode+0x2e/0x230 [ 365.613075][T10384] do_syscall_64+0x3b/0xb0 [ 365.617509][T10384] ? clear_bhb_loop+0x45/0xa0 [ 365.622196][T10384] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 365.628098][T10384] RIP: 0033:0x7fcf5e18d169 [ 365.632516][T10384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 365.652213][T10384] RSP: 002b:00007fcf5f02d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 365.660634][T10384] RAX: ffffffffffffffda RBX: 00007fcf5e3a5fa0 RCX: 00007fcf5e18d169 [ 365.668609][T10384] RDX: 0000000000000000 RSI: 0000400000000000 RDI: 0000000000000006 [ 365.676583][T10384] RBP: 00007fcf5f02d090 R08: 0000000000000000 R09: 0000000000000000 [ 365.684561][T10384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 365.692537][T10384] R13: 0000000000000000 R14: 00007fcf5e3a5fa0 R15: 00007ffe044b9718 [ 365.700527][T10384] [ 365.920365][T10396] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2119'. [ 366.000653][T10396] netlink: 'syz.1.2119': attribute type 10 has an invalid length. [ 366.069188][T10396] 8021q: adding VLAN 0 to HW filter on device team0 [ 366.133932][T10396] bond0: (slave team0): Enslaving as an active interface with an up link [ 366.157650][T10402] bond0: (slave team0): Releasing backup interface [ 366.236766][T10406] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 366.259938][T10406] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 366.313194][T10411] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2120'. [ 366.332380][T10410] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2123'. [ 366.373961][T10408] device team0 left promiscuous mode [ 366.382077][T10408] device team_slave_0 left promiscuous mode [ 366.390071][T10408] device team_slave_1 left promiscuous mode [ 366.410461][T10408] bridge0: port 3(team0) entered disabled state [ 366.452885][T10408] 8021q: adding VLAN 0 to HW filter on device team0 [ 366.477666][T10408] device team0 entered promiscuous mode [ 366.489580][T10408] device team_slave_0 entered promiscuous mode [ 366.505607][T10408] device team_slave_1 entered promiscuous mode [ 366.549022][T10408] bond0: (slave team0): Enslaving as an active interface with an up link [ 366.571782][T10410] device team0 left promiscuous mode [ 366.587964][T10410] device team_slave_0 left promiscuous mode [ 366.596947][T10410] device team_slave_1 left promiscuous mode [ 366.604707][T10410] device geneve1 left promiscuous mode [ 366.611633][T10410] bridge0: port 3(team0) entered disabled state [ 366.648811][T10410] 8021q: adding VLAN 0 to HW filter on device team0 [ 366.673628][T10410] device team0 entered promiscuous mode [ 366.687961][T10410] device team_slave_0 entered promiscuous mode [ 366.701418][T10410] device team_slave_1 entered promiscuous mode [ 366.709565][T10410] device geneve1 entered promiscuous mode [ 366.729871][T10410] bond0: (slave team0): Enslaving as an active interface with an up link [ 366.740892][T10411] bond0: (slave team0): Releasing backup interface [ 366.749909][T10411] device team0 left promiscuous mode [ 366.756006][T10411] device team_slave_0 left promiscuous mode [ 366.762066][T10411] device team_slave_1 left promiscuous mode [ 366.774148][T10411] bridge0: port 3(team0) entered blocking state [ 366.780958][T10411] bridge0: port 3(team0) entered disabled state [ 366.789334][T10411] device team0 entered promiscuous mode [ 366.795720][T10411] device team_slave_0 entered promiscuous mode [ 366.802370][T10411] device team_slave_1 entered promiscuous mode [ 366.811142][T10412] bond0: (slave team0): Releasing backup interface [ 366.821102][T10412] device team0 left promiscuous mode [ 366.827315][T10412] device team_slave_0 left promiscuous mode [ 366.833497][T10412] device team_slave_1 left promiscuous mode [ 366.839526][T10412] device geneve1 left promiscuous mode [ 366.859383][T10412] bridge0: port 3(team0) entered blocking state [ 366.873473][T10412] bridge0: port 3(team0) entered disabled state [ 366.885964][T10412] device team0 entered promiscuous mode [ 366.891568][T10412] device team_slave_0 entered promiscuous mode [ 366.898323][T10412] device team_slave_1 entered promiscuous mode [ 366.905175][T10412] device geneve1 entered promiscuous mode [ 366.924596][T10424] tun0: tun_chr_ioctl cmd 2147767507 [ 367.088898][T10429] tun0: tun_chr_ioctl cmd 2147767507 [ 367.132992][T10435] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2130'. [ 367.206809][T10432] validate_nla: 5 callbacks suppressed [ 367.206851][T10432] netlink: 'syz.1.2130': attribute type 10 has an invalid length. [ 367.273160][T10432] 8021q: adding VLAN 0 to HW filter on device team0 [ 367.305282][T10432] bond0: (slave team0): Enslaving as an active interface with an up link [ 367.344940][T10435] netlink: 'syz.1.2130': attribute type 10 has an invalid length. [ 367.405252][T10435] bond0: (slave team0): Releasing backup interface [ 367.500591][T10445] netlink: 'syz.4.2135': attribute type 39 has an invalid length. [ 368.058805][T10462] tun0: tun_chr_ioctl cmd 2147767507 [ 368.071602][T10461] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2141'. [ 368.093375][T10467] netlink: 'syz.1.2141': attribute type 10 has an invalid length. [ 368.128131][T10467] 8021q: adding VLAN 0 to HW filter on device team0 [ 368.161062][T10467] bond0: (slave team0): Enslaving as an active interface with an up link [ 368.185599][T10461] netlink: 'syz.1.2141': attribute type 10 has an invalid length. [ 368.221917][T10461] bond0: (slave team0): Releasing backup interface [ 368.584898][T10487] netlink: 'syz.2.2150': attribute type 39 has an invalid length. [ 368.812929][T10498] tun0: tun_chr_ioctl cmd 2147767507 [ 368.830651][T10495] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2154'. [ 368.913926][T10495] netlink: 'syz.3.2154': attribute type 10 has an invalid length. [ 368.933687][T10495] device team0 left promiscuous mode [ 368.940053][T10495] device team_slave_0 left promiscuous mode [ 368.958113][T10495] device team_slave_1 left promiscuous mode [ 368.967250][T10495] bridge0: port 3(team0) entered disabled state [ 369.004517][T10495] 8021q: adding VLAN 0 to HW filter on device team0 [ 369.021530][T10504] FAULT_INJECTION: forcing a failure. [ 369.021530][T10504] name failslab, interval 1, probability 0, space 0, times 0 [ 369.062823][T10495] bond0: (slave team0): Enslaving as an active interface with an up link [ 369.076092][T10504] CPU: 1 PID: 10504 Comm: syz.0.2158 Not tainted 6.1.129-syzkaller #0 [ 369.084307][T10504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 369.094405][T10504] Call Trace: [ 369.097708][T10504] [ 369.100691][T10504] dump_stack_lvl+0x1e3/0x2cb [ 369.105414][T10504] ? nf_tcp_handle_invalid+0x647/0x647 [ 369.110923][T10504] ? panic+0x764/0x764 [ 369.115030][T10504] ? __might_sleep+0xb0/0xb0 [ 369.119656][T10504] should_fail_ex+0x3a6/0x4d0 [ 369.124378][T10504] should_failslab+0x5/0x20 [ 369.128905][T10504] slab_pre_alloc_hook+0x59/0x300 [ 369.133967][T10504] ? inet_sk_state_store+0x40/0x80 [ 369.139118][T10504] kmem_cache_alloc_node+0x52/0x310 [ 369.144363][T10504] ? __alloc_skb+0xd3/0x2c0 [ 369.148905][T10504] __alloc_skb+0xd3/0x2c0 [ 369.153275][T10504] tcp_send_active_reset+0x82/0x7b0 [ 369.158525][T10504] tcp_disconnect+0x16c/0x1990 [ 369.163330][T10504] ? __tcp_close+0x1f9/0xdc0 [ 369.167966][T10504] __tcp_close+0xaf4/0xdc0 [ 369.172434][T10504] tcp_close+0x24/0x110 [ 369.176603][T10504] inet_release+0x174/0x1f0 [ 369.181117][T10504] sock_release+0x7a/0x140 [ 369.185551][T10504] smc_clcsock_release+0xc8/0xe0 [ 369.190497][T10504] __smc_release+0x678/0x7f0 [ 369.195107][T10504] smc_release+0x2d5/0x530 [ 369.199547][T10504] sock_close+0xcd/0x230 [ 369.203793][T10504] ? sock_mmap+0x90/0x90 [ 369.208044][T10504] __fput+0x3f6/0x8d0 [ 369.212051][T10504] task_work_run+0x246/0x300 [ 369.216654][T10504] ? ct_nmi_exit+0x13f/0x1c0 [ 369.221261][T10504] ? task_work_cancel+0x2e0/0x2e0 [ 369.226302][T10504] ? exit_to_user_mode_loop+0x39/0x100 [ 369.231780][T10504] exit_to_user_mode_loop+0xde/0x100 [ 369.237070][T10504] exit_to_user_mode_prepare+0xb1/0x140 [ 369.242633][T10504] syscall_exit_to_user_mode+0x60/0x270 [ 369.248197][T10504] do_syscall_64+0x47/0xb0 [ 369.252635][T10504] ? clear_bhb_loop+0x45/0xa0 [ 369.257324][T10504] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 369.263235][T10504] RIP: 0033:0x7fd94338d169 [ 369.267704][T10504] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 369.287330][T10504] RSP: 002b:00007fd9441a6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 369.295755][T10504] RAX: 0000000000000000 RBX: 00007fd9435a5fa0 RCX: 00007fd94338d169 [ 369.303733][T10504] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 369.311711][T10504] RBP: 00007fd9441a6090 R08: 0000000000000000 R09: 0000000000000000 [ 369.319689][T10504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 369.327671][T10504] R13: 0000000000000000 R14: 00007fd9435a5fa0 R15: 00007ffd0e4d6a38 [ 369.335676][T10504] [ 369.363468][T10501] netlink: 'syz.3.2154': attribute type 10 has an invalid length. [ 369.396294][T10501] bond0: (slave team0): Releasing backup interface [ 369.426305][T10501] bridge0: port 3(team0) entered blocking state [ 369.444043][T10501] bridge0: port 3(team0) entered disabled state [ 369.499063][T10501] device team0 entered promiscuous mode [ 369.511615][T10501] device team_slave_0 entered promiscuous mode [ 369.519486][T10501] device team_slave_1 entered promiscuous mode [ 369.561744][T10517] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2160'. [ 369.632511][T10517] netlink: 'syz.2.2160': attribute type 10 has an invalid length. [ 369.664778][T10517] device team0 left promiscuous mode [ 369.670314][T10517] device team_slave_0 left promiscuous mode [ 369.705642][T10517] device team_slave_1 left promiscuous mode [ 369.723534][T10517] bridge0: port 3(team0) entered disabled state [ 369.787787][T10517] 8021q: adding VLAN 0 to HW filter on device team0 [ 369.837434][T10517] device team0 entered promiscuous mode [ 369.885903][T10517] device team_slave_0 entered promiscuous mode [ 369.938344][T10517] device team_slave_1 entered promiscuous mode [ 370.078256][T10517] bond0: (slave team0): Enslaving as an active interface with an up link [ 370.106504][T10518] netlink: 'syz.2.2160': attribute type 10 has an invalid length. [ 370.173412][T10518] bond0: (slave team0): Releasing backup interface [ 370.215272][T10518] device team0 left promiscuous mode [ 370.227424][T10518] device team_slave_0 left promiscuous mode [ 370.233482][T10518] device team_slave_1 left promiscuous mode [ 370.291478][T10518] bridge0: port 3(team0) entered blocking state [ 370.304673][T10518] bridge0: port 3(team0) entered disabled state [ 370.316250][T10518] device team0 entered promiscuous mode [ 370.332739][T10518] device team_slave_0 entered promiscuous mode [ 370.351425][T10518] device team_slave_1 entered promiscuous mode [ 370.431905][T10544] tun0: tun_chr_ioctl cmd 2147767507 [ 370.561957][T10550] FAULT_INJECTION: forcing a failure. [ 370.561957][T10550] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 370.593744][T10550] CPU: 1 PID: 10550 Comm: syz.2.2172 Not tainted 6.1.129-syzkaller #0 [ 370.601976][T10550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 370.612092][T10550] Call Trace: [ 370.615398][T10550] [ 370.618347][T10550] dump_stack_lvl+0x1e3/0x2cb [ 370.623163][T10550] ? nf_tcp_handle_invalid+0x647/0x647 [ 370.628674][T10550] ? panic+0x764/0x764 [ 370.632778][T10550] ? __lock_acquire+0x1f80/0x1f80 [ 370.637865][T10550] should_fail_ex+0x3a6/0x4d0 [ 370.642587][T10550] _copy_from_user+0x2b/0x170 [ 370.647307][T10550] copy_msghdr_from_user+0xaa/0x670 [ 370.652549][T10550] ? sendmsg_copy_msghdr+0x70/0x70 [ 370.657733][T10550] __sys_sendmsg+0x236/0x390 [ 370.662359][T10550] ? ____sys_sendmsg+0x9a0/0x9a0 [ 370.667343][T10550] ? vfs_write+0x6cf/0xbc0 [ 370.671827][T10550] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 370.677881][T10550] ? syscall_enter_from_user_mode+0x2e/0x230 [ 370.683924][T10550] ? lockdep_hardirqs_on+0x94/0x130 [ 370.689163][T10550] ? syscall_enter_from_user_mode+0x2e/0x230 [ 370.695219][T10550] do_syscall_64+0x3b/0xb0 [ 370.699673][T10550] ? clear_bhb_loop+0x45/0xa0 [ 370.704384][T10550] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 370.710307][T10550] RIP: 0033:0x7fa24958d169 [ 370.714751][T10550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 370.734393][T10550] RSP: 002b:00007fa24a333038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 370.742847][T10550] RAX: ffffffffffffffda RBX: 00007fa2497a5fa0 RCX: 00007fa24958d169 [ 370.750845][T10550] RDX: 0000000000000041 RSI: 0000400000000600 RDI: 0000000000000003 [ 370.758839][T10550] RBP: 00007fa24a333090 R08: 0000000000000000 R09: 0000000000000000 [ 370.766831][T10550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 370.774834][T10550] R13: 0000000000000000 R14: 00007fa2497a5fa0 R15: 00007fffc323f128 [ 370.782843][T10550] [ 371.028721][T10562] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2176'. [ 371.122904][T10562] device team0 left promiscuous mode [ 371.162434][T10562] device team_slave_0 left promiscuous mode [ 371.221149][T10562] device team_slave_1 left promiscuous mode [ 371.275872][T10562] device geneve1 left promiscuous mode [ 371.283921][T10562] bridge0: port 3(team0) entered disabled state [ 371.337426][T10562] 8021q: adding VLAN 0 to HW filter on device team0 [ 371.364002][T10562] device team0 entered promiscuous mode [ 371.380996][T10562] device team_slave_0 entered promiscuous mode [ 371.421364][T10562] device team_slave_1 entered promiscuous mode [ 371.441374][T10562] device geneve1 entered promiscuous mode [ 371.488811][T10562] bond0: (slave team0): Enslaving as an active interface with an up link [ 371.552307][T10566] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2177'. [ 371.565978][T10563] bond0: (slave team0): Releasing backup interface [ 371.576678][T10563] device team0 left promiscuous mode [ 371.582856][T10563] device team_slave_0 left promiscuous mode [ 371.588896][T10563] device team_slave_1 left promiscuous mode [ 371.594934][T10563] device geneve1 left promiscuous mode [ 371.685934][T10563] bridge0: port 3(team0) entered blocking state [ 371.692315][T10563] bridge0: port 3(team0) entered disabled state [ 371.708328][T10563] device team0 entered promiscuous mode [ 371.714117][T10563] device team_slave_0 entered promiscuous mode [ 371.737842][T10563] device team_slave_1 entered promiscuous mode [ 371.750959][T10563] device geneve1 entered promiscuous mode [ 371.763781][T10568] device team0 left promiscuous mode [ 371.783025][T10568] device team_slave_0 left promiscuous mode [ 371.837354][T10568] device team_slave_1 left promiscuous mode [ 371.882553][T10568] bridge0: port 3(team0) entered disabled state [ 371.962636][T10568] 8021q: adding VLAN 0 to HW filter on device team0 [ 372.059512][T10568] device team0 entered promiscuous mode [ 372.083490][T10568] device team_slave_0 entered promiscuous mode [ 372.090138][T10568] device team_slave_1 entered promiscuous mode [ 372.097567][T10568] bond0: (slave team0): Enslaving as an active interface with an up link [ 372.106796][T10584] netlink: 168 bytes leftover after parsing attributes in process `syz.1.2182'. [ 372.123712][T10570] bond0: (slave team0): Releasing backup interface [ 372.135142][T10570] device team0 left promiscuous mode [ 372.143275][T10570] device team_slave_0 left promiscuous mode [ 372.149345][T10570] device team_slave_1 left promiscuous mode [ 372.196799][T10570] bridge0: port 3(team0) entered blocking state [ 372.226645][T10570] bridge0: port 3(team0) entered disabled state [ 372.264151][T10570] device team0 entered promiscuous mode [ 372.269991][T10570] device team_slave_0 entered promiscuous mode [ 372.277057][T10570] device team_slave_1 entered promiscuous mode [ 372.318662][T10587] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2183'. [ 372.359067][T10586] validate_nla: 5 callbacks suppressed [ 372.359109][T10586] netlink: 'syz.0.2183': attribute type 10 has an invalid length. [ 372.393862][T10586] device team0 left promiscuous mode [ 372.414687][T10586] device team_slave_0 left promiscuous mode [ 372.421487][T10586] device team_slave_1 left promiscuous mode [ 372.483637][T10586] device geneve1 left promiscuous mode [ 372.499236][T10586] bridge0: port 3(team0) entered disabled state [ 372.557371][T10586] 8021q: adding VLAN 0 to HW filter on device team0 [ 372.607726][T10586] device team0 entered promiscuous mode [ 372.614807][T10586] device team_slave_0 entered promiscuous mode [ 372.622983][T10586] device team_slave_1 entered promiscuous mode [ 372.666909][T10586] device geneve1 entered promiscuous mode [ 372.687925][T10586] bond0: (slave team0): Enslaving as an active interface with an up link [ 372.697446][T10587] netlink: 'syz.0.2183': attribute type 10 has an invalid length. [ 372.707292][T10587] bond0: (slave team0): Releasing backup interface [ 372.715455][T10587] device team0 left promiscuous mode [ 372.721429][T10587] device team_slave_0 left promiscuous mode [ 372.727525][T10587] device team_slave_1 left promiscuous mode [ 372.733529][T10587] device geneve1 left promiscuous mode [ 372.744189][T10587] bridge0: port 3(team0) entered blocking state [ 372.750931][T10587] bridge0: port 3(team0) entered disabled state [ 372.761755][T10587] device team0 entered promiscuous mode [ 372.767533][T10587] device team_slave_0 entered promiscuous mode [ 372.774098][T10587] device team_slave_1 entered promiscuous mode [ 372.781451][T10587] device geneve1 entered promiscuous mode [ 372.792340][T10591] netlink: 'syz.2.2186': attribute type 39 has an invalid length. [ 372.812840][T10594] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2187'. [ 372.823690][T10599] tun0: tun_chr_ioctl cmd 2147767507 [ 372.835480][T10600] netlink: 'syz.1.2188': attribute type 39 has an invalid length. [ 372.863985][T10597] netlink: 'syz.3.2187': attribute type 10 has an invalid length. [ 372.883164][T10597] device team0 left promiscuous mode [ 372.889888][T10597] device team_slave_0 left promiscuous mode [ 372.898732][T10597] device team_slave_1 left promiscuous mode [ 372.908137][T10597] bridge0: port 3(team0) entered disabled state [ 372.996022][T10597] 8021q: adding VLAN 0 to HW filter on device team0 [ 373.047381][T10597] bond0: (slave team0): Enslaving as an active interface with an up link [ 373.065206][T10602] netlink: 'syz.3.2187': attribute type 10 has an invalid length. [ 373.102287][T10602] bond0: (slave team0): Releasing backup interface [ 373.138836][T10602] bridge0: port 3(team0) entered blocking state [ 373.155924][T10602] bridge0: port 3(team0) entered disabled state [ 373.163864][T10602] device team0 entered promiscuous mode [ 373.178595][T10602] device team_slave_0 entered promiscuous mode [ 373.188126][T10602] device team_slave_1 entered promiscuous mode [ 373.750341][T10627] netlink: 'syz.0.2197': attribute type 5 has an invalid length. [ 373.771144][T10627] netlink: 168 bytes leftover after parsing attributes in process `syz.0.2197'. [ 373.861831][T10632] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2199'. [ 373.915473][T10632] netlink: 'syz.4.2199': attribute type 10 has an invalid length. [ 373.932809][T10632] device team0 left promiscuous mode [ 373.957580][T10632] device team_slave_0 left promiscuous mode [ 373.971897][T10632] device team_slave_1 left promiscuous mode [ 373.994203][T10632] device geneve1 left promiscuous mode [ 374.011767][T10632] device macvlan0 left promiscuous mode [ 374.027998][T10632] bridge0: port 3(team0) entered disabled state [ 374.144982][T10632] 8021q: adding VLAN 0 to HW filter on device team0 [ 374.193880][T10632] bond0: (slave team0): Enslaving as an active interface with an up link [ 374.213286][T10634] netlink: 'syz.4.2199': attribute type 10 has an invalid length. [ 374.231477][T10634] bond0: (slave team0): Releasing backup interface [ 374.261048][T10634] bridge0: port 3(team0) entered blocking state [ 374.270252][T10634] bridge0: port 3(team0) entered disabled state [ 374.279182][T10634] device team0 entered promiscuous mode [ 374.285448][T10634] device team_slave_0 entered promiscuous mode [ 374.291925][T10634] device team_slave_1 entered promiscuous mode [ 374.298793][T10634] device geneve1 entered promiscuous mode [ 374.306142][T10634] device macvlan0 entered promiscuous mode [ 374.324755][T10641] netlink: 'syz.3.2201': attribute type 39 has an invalid length. [ 374.373757][T10652] FAULT_INJECTION: forcing a failure. [ 374.373757][T10652] name failslab, interval 1, probability 0, space 0, times 0 [ 374.405694][T10652] CPU: 0 PID: 10652 Comm: syz.1.2207 Not tainted 6.1.129-syzkaller #0 [ 374.413895][T10652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 374.423971][T10652] Call Trace: [ 374.427263][T10652] [ 374.430209][T10652] dump_stack_lvl+0x1e3/0x2cb [ 374.434996][T10652] ? nf_tcp_handle_invalid+0x647/0x647 [ 374.440491][T10652] ? panic+0x764/0x764 [ 374.444580][T10652] ? __might_sleep+0xb0/0xb0 [ 374.449203][T10652] should_fail_ex+0x3a6/0x4d0 [ 374.453912][T10652] should_failslab+0x5/0x20 [ 374.458429][T10652] slab_pre_alloc_hook+0x59/0x300 [ 374.463477][T10652] kmem_cache_alloc_lru+0x4a/0x2d0 [ 374.468601][T10652] ? sock_alloc_inode+0x24/0xc0 [ 374.473470][T10652] sock_alloc_inode+0x24/0xc0 [ 374.478154][T10652] ? sockfs_init_fs_context+0xa0/0xa0 [ 374.483535][T10652] new_inode_pseudo+0x61/0x1d0 [ 374.488317][T10652] __sock_create+0x11f/0x930 [ 374.492934][T10652] __sys_socket+0x136/0x3a0 [ 374.497457][T10652] ? __sys_socket_file+0x1d0/0x1d0 [ 374.502593][T10652] __x64_sys_socket+0x76/0x80 [ 374.507388][T10652] do_syscall_64+0x3b/0xb0 [ 374.511821][T10652] ? clear_bhb_loop+0x45/0xa0 [ 374.516529][T10652] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 374.522449][T10652] RIP: 0033:0x7f9a8058d169 [ 374.526870][T10652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 374.546512][T10652] RSP: 002b:00007f9a803ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 374.555975][T10652] RAX: ffffffffffffffda RBX: 00007f9a807a5fa0 RCX: 00007f9a8058d169 [ 374.563952][T10652] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000000a [ 374.571926][T10652] RBP: 00007f9a803ff090 R08: 0000000000000000 R09: 0000000000000000 [ 374.579902][T10652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 374.587884][T10652] R13: 0000000000000000 R14: 00007f9a807a5fa0 R15: 00007ffccaebf058 [ 374.595887][T10652] [ 374.656866][T10652] socket: no more sockets [ 374.828562][T10659] netlink: 156 bytes leftover after parsing attributes in process `syz.3.2209'. [ 374.842043][T10659] IPv6: NLM_F_CREATE should be specified when creating new route [ 374.850431][T10659] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 374.857731][T10659] IPv6: NLM_F_CREATE should be set when creating new route [ 374.865071][T10659] IPv6: NLM_F_CREATE should be set when creating new route [ 374.872357][T10659] IPv6: NLM_F_CREATE should be set when creating new route [ 375.167460][T10671] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2215'. [ 375.306961][T10683] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2218'. [ 375.405608][T10686] device wlan0 entered promiscuous mode [ 375.462448][T10678] 8021q: adding VLAN 0 to HW filter on device team0 [ 375.567876][T10678] bond0: (slave team0): Enslaving as an active interface with an up link [ 375.626983][T10683] bond0: (slave team0): Releasing backup interface [ 375.842644][T10694] FAULT_INJECTION: forcing a failure. [ 375.842644][T10694] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 375.960816][T10694] CPU: 1 PID: 10694 Comm: syz.4.2224 Not tainted 6.1.129-syzkaller #0 [ 375.969032][T10694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 375.979119][T10694] Call Trace: [ 375.982424][T10694] [ 375.985388][T10694] dump_stack_lvl+0x1e3/0x2cb [ 375.990119][T10694] ? nf_tcp_handle_invalid+0x647/0x647 [ 375.995624][T10694] ? panic+0x764/0x764 [ 375.999738][T10694] ? __lock_acquire+0x1f80/0x1f80 [ 376.004828][T10694] should_fail_ex+0x3a6/0x4d0 [ 376.009588][T10694] _copy_from_user+0x2b/0x170 [ 376.014311][T10694] copy_msghdr_from_user+0xaa/0x670 [ 376.019549][T10694] ? sendmsg_copy_msghdr+0x70/0x70 [ 376.024714][T10694] __sys_sendmsg+0x236/0x390 [ 376.029340][T10694] ? ____sys_sendmsg+0x9a0/0x9a0 [ 376.034300][T10694] ? vfs_write+0x6cf/0xbc0 [ 376.038784][T10694] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 376.044819][T10694] ? syscall_enter_from_user_mode+0x2e/0x230 [ 376.050834][T10694] ? lockdep_hardirqs_on+0x94/0x130 [ 376.056065][T10694] ? syscall_enter_from_user_mode+0x2e/0x230 [ 376.062074][T10694] do_syscall_64+0x3b/0xb0 [ 376.066613][T10694] ? clear_bhb_loop+0x45/0xa0 [ 376.071339][T10694] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 376.077260][T10694] RIP: 0033:0x7fcf5e18d169 [ 376.081697][T10694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 376.101341][T10694] RSP: 002b:00007fcf5f02d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 376.109796][T10694] RAX: ffffffffffffffda RBX: 00007fcf5e3a5fa0 RCX: 00007fcf5e18d169 [ 376.117798][T10694] RDX: 0000000000000041 RSI: 0000400000000600 RDI: 0000000000000005 [ 376.125806][T10694] RBP: 00007fcf5f02d090 R08: 0000000000000000 R09: 0000000000000000 [ 376.133810][T10694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 376.141815][T10694] R13: 0000000000000000 R14: 00007fcf5e3a5fa0 R15: 00007ffe044b9718 [ 376.149935][T10694] [ 376.976554][T10721] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2235'. [ 377.061801][T10721] device team0 left promiscuous mode [ 377.074657][T10721] device team_slave_0 left promiscuous mode [ 377.080813][T10721] device team_slave_1 left promiscuous mode [ 377.112132][T10721] device geneve1 left promiscuous mode [ 377.130012][T10721] bridge0: port 3(team0) entered disabled state [ 377.197582][T10721] 8021q: adding VLAN 0 to HW filter on device team0 [ 377.258398][T10721] device team0 entered promiscuous mode [ 377.264021][T10721] device team_slave_0 entered promiscuous mode [ 377.317642][T10721] device team_slave_1 entered promiscuous mode [ 377.324185][T10721] device geneve1 entered promiscuous mode [ 377.425405][T10721] bond0: (slave team0): Enslaving as an active interface with an up link [ 377.528775][T10722] validate_nla: 9 callbacks suppressed [ 377.528815][T10722] netlink: 'syz.0.2235': attribute type 10 has an invalid length. [ 377.778305][T10743] FAULT_INJECTION: forcing a failure. [ 377.778305][T10743] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 377.779363][T10743] [ 377.779370][T10743] ====================================================== [ 377.779377][T10743] WARNING: possible circular locking dependency detected [ 377.779385][T10743] 6.1.129-syzkaller #0 Not tainted [ 377.779395][T10743] ------------------------------------------------------ [ 377.779401][T10743] syz.2.2242/10743 is trying to acquire lock: [ 377.779411][T10743] ffffffff8d322840 (console_owner){-.-.}-{0:0}, at: console_emit_next_record+0x74f/0xc30 [ 377.779466][T10743] [ 377.779466][T10743] but task is already holding lock: [ 377.779471][T10743] ffff8880b8f3a9d8 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140 [ 377.779522][T10743] [ 377.779522][T10743] which lock already depends on the new lock. [ 377.779522][T10743] [ 377.779528][T10743] [ 377.779528][T10743] the existing dependency chain (in reverse order) is: [ 377.779533][T10743] [ 377.779533][T10743] -> #4 (&rq->__lock){-.-.}-{2:2}: [ 377.779558][T10743] lock_acquire+0x1f8/0x5a0 [ 377.779587][T10743] _raw_spin_lock_nested+0x2d/0x40 [ 377.779608][T10743] raw_spin_rq_lock_nested+0x26/0x140 [ 377.779632][T10743] task_fork_fair+0x5d/0x350 [ 377.779659][T10743] sched_cgroup_fork+0x374/0x400 [ 377.779686][T10743] copy_process+0x2482/0x40a0 [ 377.779704][T10743] kernel_clone+0x222/0x920 [ 377.779722][T10743] user_mode_thread+0x140/0x1b0 [ 377.779741][T10743] rest_init+0x23/0x300 [ 377.779763][T10743] start_kernel+0x0/0x53f [ 377.779788][T10743] start_kernel+0x496/0x53f [ 377.779813][T10743] secondary_startup_64_no_verify+0xcf/0xdb [ 377.779840][T10743] [ 377.779840][T10743] -> #3 (&p->pi_lock){-.-.}-{2:2}: [ 377.779865][T10743] lock_acquire+0x1f8/0x5a0 [ 377.779893][T10743] _raw_spin_lock_irqsave+0xd1/0x120 [ 377.779911][T10743] try_to_wake_up+0xad/0x1250 [ 377.779936][T10743] __wake_up_common+0x2a0/0x4e0 [ 377.779965][T10743] __wake_up+0x11a/0x1c0 [ 377.779991][T10743] tty_port_default_wakeup+0xa2/0xf0 [ 377.780013][T10743] serial8250_tx_chars+0x60d/0x800 [ 377.780037][T10743] serial8250_handle_irq+0x4ff/0x6a0 [ 377.780060][T10743] serial8250_default_handle_irq+0xc8/0x1e0 [ 377.780087][T10743] serial8250_interrupt+0xa1/0x1e0 [ 377.780108][T10743] __handle_irq_event_percpu+0x2a8/0xb20 [ 377.780131][T10743] handle_irq_event+0x85/0x1e0 [ 377.780153][T10743] handle_edge_irq+0x245/0xbf0 [ 377.780180][T10743] __common_interrupt+0xd7/0x1f0 [ 377.780206][T10743] common_interrupt+0xae/0xd0 [ 377.780224][T10743] asm_common_interrupt+0x22/0x40 [ 377.780252][T10743] _raw_spin_unlock_irqrestore+0xd4/0x130 [ 377.780272][T10743] debug_check_no_obj_freed+0x455/0x4e0 [ 377.780295][T10743] __kmem_cache_free+0x205/0x3c0 [ 377.780322][T10743] load_elf_binary+0x19e4/0x2720 [ 377.780340][T10743] bprm_execve+0x96a/0x18a0 [ 377.780359][T10743] do_execveat_common+0x580/0x720 [ 377.780381][T10743] __x64_sys_execve+0x8e/0xa0 [ 377.780401][T10743] do_syscall_64+0x3b/0xb0 [ 377.780430][T10743] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 377.780452][T10743] [ 377.780452][T10743] -> #2 (&tty->write_wait){-.-.}-{2:2}: [ 377.780478][T10743] lock_acquire+0x1f8/0x5a0 [ 377.780505][T10743] _raw_spin_lock_irqsave+0xd1/0x120 [ 377.780523][T10743] __wake_up+0xfd/0x1c0 [ 377.780550][T10743] tty_port_default_wakeup+0xa2/0xf0 [ 377.780571][T10743] serial8250_tx_chars+0x60d/0x800 [ 377.780594][T10743] serial8250_handle_irq+0x4ff/0x6a0 [ 377.780618][T10743] serial8250_default_handle_irq+0xc8/0x1e0 [ 377.780644][T10743] serial8250_interrupt+0xa1/0x1e0 [ 377.780666][T10743] __handle_irq_event_percpu+0x2a8/0xb20 [ 377.780689][T10743] handle_irq_event+0x85/0x1e0 [ 377.780711][T10743] handle_edge_irq+0x245/0xbf0 [ 377.780739][T10743] __common_interrupt+0xd7/0x1f0 [ 377.780765][T10743] common_interrupt+0xae/0xd0 [ 377.780783][T10743] asm_common_interrupt+0x22/0x40 [ 377.780805][T10743] acpi_idle_do_entry+0x10f/0x340 [ 377.780822][T10743] acpi_idle_enter+0x352/0x4f0 [ 377.780839][T10743] cpuidle_enter_state+0x516/0xf80 [ 377.780857][T10743] cpuidle_enter+0x59/0x90 [ 377.780873][T10743] do_idle+0x3ce/0x680 [ 377.780901][T10743] cpu_startup_entry+0x3d/0x60 [ 377.780931][T10743] rest_init+0x2da/0x300 [ 377.780952][T10743] start_kernel+0x0/0x53f [ 377.780977][T10743] start_kernel+0x496/0x53f [ 377.781003][T10743] secondary_startup_64_no_verify+0xcf/0xdb [ 377.781028][T10743] [ 377.781028][T10743] -> #1 (&port_lock_key){-.-.}-{2:2}: [ 377.781054][T10743] lock_acquire+0x1f8/0x5a0 [ 377.781082][T10743] _raw_spin_lock_irqsave+0xd1/0x120 [ 377.781100][T10743] serial8250_console_write+0x19f/0x1a30 [ 377.781126][T10743] console_emit_next_record+0x86d/0xc30 [ 377.781146][T10743] console_unlock+0x278/0x7c0 [ 377.781162][T10743] vprintk_emit+0x523/0x740 [ 377.781178][T10743] _printk+0xd1/0x111 [ 377.781197][T10743] register_console+0x6b9/0x9a0 [ 377.781215][T10743] univ8250_console_init+0x41/0x43 [ 377.781235][T10743] console_init+0x1d6/0x7f3 [ 377.781265][T10743] start_kernel+0x30b/0x53f [ 377.781290][T10743] secondary_startup_64_no_verify+0xcf/0xdb [ 377.781316][T10743] [ 377.781316][T10743] -> #0 (console_owner){-.-.}-{0:0}: [ 377.781341][T10743] validate_chain+0x1661/0x5950 [ 377.781359][T10743] __lock_acquire+0x125b/0x1f80 [ 377.781388][T10743] lock_acquire+0x1f8/0x5a0 [ 377.781415][T10743] console_emit_next_record+0x76c/0xc30 [ 377.781437][T10743] console_unlock+0x278/0x7c0 [ 377.781453][T10743] vprintk_emit+0x523/0x740 [ 377.781469][T10743] _printk+0xd1/0x111 [ 377.781488][T10743] should_fail_ex+0x387/0x4d0 [ 377.781517][T10743] strncpy_from_user+0x32/0x360 [ 377.781543][T10743] strncpy_from_user_nofault+0x6c/0x130 [ 377.781571][T10743] bpf_probe_read_compat_str+0xe4/0x180 [ 377.781590][T10743] bpf_prog_c1796171ffc7efef+0x35/0x37 [ 377.781609][T10743] bpf_trace_run4+0x253/0x470 [ 377.781630][T10743] __traceiter_sched_switch+0x91/0xc0 [ 377.781649][T10743] __schedule+0x2128/0x4570 [ 377.781673][T10743] schedule+0xbf/0x180 [ 377.781695][T10743] exit_to_user_mode_loop+0x44/0x100 [ 377.781715][T10743] exit_to_user_mode_prepare+0xb1/0x140 [ 377.781734][T10743] irqentry_exit_to_user_mode+0x5/0x30 [ 377.781757][T10743] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 377.781781][T10743] [ 377.781781][T10743] other info that might help us debug this: [ 377.781781][T10743] [ 377.781787][T10743] Chain exists of: [ 377.781787][T10743] console_owner --> &p->pi_lock --> &rq->__lock [ 377.781787][T10743] [ 377.781816][T10743] Possible unsafe locking scenario: [ 377.781816][T10743] [ 377.781821][T10743] CPU0 CPU1 [ 377.781826][T10743] ---- ---- [ 377.781830][T10743] lock(&rq->__lock); [ 377.781842][T10743] lock(&p->pi_lock); [ 377.781855][T10743] lock(&rq->__lock); [ 377.781868][T10743] lock(console_owner); [ 377.781879][T10743] [ 377.781879][T10743] *** DEADLOCK *** [ 377.781879][T10743] [ 377.781883][T10743] 3 locks held by syz.2.2242/10743: [ 377.781894][T10743] #0: ffff8880b8f3a9d8 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140 [ 377.781947][T10743] #1: ffffffff8d32e680 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run4+0x16a/0x470 [ 377.781997][T10743] #2: ffffffff8d20a5a0 (console_lock){+.+.}-{0:0}, at: _printk+0xd1/0x111 [ 377.782043][T10743] [ 377.782043][T10743] stack backtrace: [ 377.782049][T10743] CPU: 1 PID: 10743 Comm: syz.2.2242 Not tainted 6.1.129-syzkaller #0 [ 377.782068][T10743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 377.782080][T10743] Call Trace: [ 377.782086][T10743] [ 377.782093][T10743] dump_stack_lvl+0x1e3/0x2cb [ 377.782126][T10743] ? nf_tcp_handle_invalid+0x647/0x647 [ 377.782165][T10743] ? print_circular_bug+0x12b/0x1a0 [ 377.782187][T10743] check_noncircular+0x2fa/0x3b0 [ 377.782211][T10743] ? add_chain_block+0x850/0x850 [ 377.782232][T10743] ? lockdep_lock+0x11f/0x2a0 [ 377.782269][T10743] ? add_lock_to_list+0x1de/0x2e0 [ 377.782295][T10743] validate_chain+0x1661/0x5950 [ 377.782327][T10743] ? vsnprintf+0x1b93/0x1c70 [ 377.782351][T10743] ? reacquire_held_locks+0x660/0x660 [ 377.782385][T10743] ? _prb_read_valid+0xbcc/0xbe0 [ 377.782410][T10743] ? mark_lock+0x9a/0x340 [ 377.782430][T10743] __lock_acquire+0x125b/0x1f80 [ 377.782470][T10743] lock_acquire+0x1f8/0x5a0 [ 377.782501][T10743] ? console_emit_next_record+0x74f/0xc30 [ 377.782527][T10743] ? read_lock_is_recursive+0x10/0x10 [ 377.782559][T10743] ? __lock_acquire+0x1f80/0x1f80 [ 377.782588][T10743] ? do_raw_spin_lock+0x14a/0x370 [ 377.782615][T10743] ? do_raw_spin_unlock+0x137/0x8a0 [ 377.782639][T10743] ? console_emit_next_record+0x74f/0xc30 [ 377.782663][T10743] console_emit_next_record+0x76c/0xc30 [ 377.782685][T10743] ? console_emit_next_record+0x74f/0xc30 [ 377.782713][T10743] ? info_print_prefix+0x300/0x300 [ 377.782757][T10743] console_unlock+0x278/0x7c0 [ 377.782779][T10743] ? vprintk_emit+0x740/0x740 [ 377.782802][T10743] ? _printk+0xd1/0x111 [ 377.782823][T10743] vprintk_emit+0x523/0x740 [ 377.782843][T10743] ? printk_sprint+0x490/0x490 [ 377.782866][T10743] ? mark_lock+0x9a/0x340 [ 377.782887][T10743] _printk+0xd1/0x111 [ 377.782911][T10743] ? panic+0x764/0x764 [ 377.782939][T10743] should_fail_ex+0x387/0x4d0 [ 377.782973][T10743] strncpy_from_user+0x32/0x360 [ 377.783005][T10743] strncpy_from_user_nofault+0x6c/0x130 [ 377.783037][T10743] bpf_probe_read_compat_str+0xe4/0x180 [ 377.783060][T10743] ? bpf_trace_run4+0x16a/0x470 [ 377.783083][T10743] bpf_prog_c1796171ffc7efef+0x35/0x37 [ 377.783102][T10743] bpf_trace_run4+0x253/0x470 [ 377.783127][T10743] ? bpf_trace_run3+0x440/0x440 [ 377.783154][T10743] ? probe_sched_wakeup+0x80/0x80 [ 377.783184][T10743] ? tracing_record_taskinfo_sched_switch+0x77/0x390 [ 377.783218][T10743] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 377.783250][T10743] __traceiter_sched_switch+0x91/0xc0 [ 377.783274][T10743] __schedule+0x2128/0x4570 [ 377.783303][T10743] ? sched_clock_cpu+0x71/0x2b0 [ 377.783330][T10743] ? ktime_get+0x242/0x270 [ 377.783364][T10743] ? release_firmware_map_entry+0x18b/0x18b [ 377.783390][T10743] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 377.783423][T10743] ? print_irqtrace_events+0x210/0x210 [ 377.783455][T10743] ? __irq_exit_rcu+0x163/0x240 [ 377.783476][T10743] schedule+0xbf/0x180 [ 377.783501][T10743] exit_to_user_mode_loop+0x44/0x100 [ 377.783523][T10743] exit_to_user_mode_prepare+0xb1/0x140 [ 377.783544][T10743] irqentry_exit_to_user_mode+0x5/0x30 [ 377.783568][T10743] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 377.783593][T10743] RIP: 0033:0x7fa24958bc27 [ 377.783609][T10743] Code: 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 48 3d 00 f0 ff ff 77 31 <44> 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 8b 44 24 08 48 83 c4 28 [ 377.783626][T10743] RSP: 002b:00007fa24a333030 EFLAGS: 00000203 [ 377.783642][T10743] RAX: 0000000000000001 RBX: 0000000000000007 RCX: 00007fa24958bc1f [ 377.783656][T10743] RDX: 0000000000000001 RSI: 00007fa24a333090 RDI: 0000000000000007 [ 377.783668][T10743] RBP: 00007fa24a333090 R08: 0000000000000000 R09: 00007fa24a332df7 [ 377.783682][T10743] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 377.783694][T10743] R13: 0000000000000000 R14: 00007fa2497a5fa0 R15: 00007fffc323f128 [ 377.783717][T10743] [ 378.906833][T10743] CPU: 1 PID: 10743 Comm: syz.2.2242 Not tainted 6.1.129-syzkaller #0 [ 378.915002][T10743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 378.925088][T10743] Call Trace: [ 378.928381][T10743] [ 378.931325][T10743] dump_stack_lvl+0x1e3/0x2cb [ 378.936014][T10743] ? nf_tcp_handle_invalid+0x647/0x647 [ 378.941840][T10743] ? panic+0x764/0x764 [ 378.945912][T10743] should_fail_ex+0x3a6/0x4d0 [ 378.950595][T10743] strncpy_from_user+0x32/0x360 [ 378.955462][T10743] strncpy_from_user_nofault+0x6c/0x130 [ 378.961020][T10743] bpf_probe_read_compat_str+0xe4/0x180 [ 378.966563][T10743] ? bpf_trace_run4+0x16a/0x470 [ 378.971413][T10743] bpf_prog_c1796171ffc7efef+0x35/0x37 [ 378.976892][T10743] bpf_trace_run4+0x253/0x470 [ 378.981583][T10743] ? bpf_trace_run3+0x440/0x440 [ 378.986433][T10743] ? probe_sched_wakeup+0x80/0x80 [ 378.991457][T10743] ? tracing_record_taskinfo_sched_switch+0x77/0x390 [ 378.998134][T10743] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 379.004454][T10743] __traceiter_sched_switch+0x91/0xc0 [ 379.009820][T10743] __schedule+0x2128/0x4570 [ 379.014423][T10743] ? sched_clock_cpu+0x71/0x2b0 [ 379.019272][T10743] ? ktime_get+0x242/0x270 [ 379.023688][T10743] ? release_firmware_map_entry+0x18b/0x18b [ 379.029575][T10743] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 379.035557][T10743] ? print_irqtrace_events+0x210/0x210 [ 379.041013][T10743] ? __irq_exit_rcu+0x163/0x240 [ 379.045856][T10743] schedule+0xbf/0x180 [ 379.049920][T10743] exit_to_user_mode_loop+0x44/0x100 [ 379.055207][T10743] exit_to_user_mode_prepare+0xb1/0x140 [ 379.060749][T10743] irqentry_exit_to_user_mode+0x5/0x30 [ 379.066202][T10743] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 379.072182][T10743] RIP: 0033:0x7fa24958bc27 [ 379.076597][T10743] Code: 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 48 3d 00 f0 ff ff 77 31 <44> 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 8b 44 24 08 48 83 c4 28 [ 379.096210][T10743] RSP: 002b:00007fa24a333030 EFLAGS: 00000203 [ 379.102287][T10743] RAX: 0000000000000001 RBX: 0000000000000007 RCX: 00007fa24958bc1f [ 379.110265][T10743] RDX: 0000000000000001 RSI: 00007fa24a333090 RDI: 0000000000000007 [ 379.118240][T10743] RBP: 00007fa24a333090 R08: 0000000000000000 R09: 00007fa24a332df7 [ 379.126272][T10743] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 379.134269][T10743] R13: 0000000000000000 R14: 00007fa2497a5fa0 R15: 00007fffc323f128 [ 379.142248][T10743] [ 379.151437][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 379.158179][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 379.183968][T10722] bond0: (slave team0): Releasing backup interface [ 379.225513][T10722] device team0 left promiscuous mode [ 379.231742][T10722] device team_slave_0 left promiscuous mode [ 379.237750][T10722] device team_slave_1 left promiscuous mode [ 379.243726][T10722] device geneve1 left promiscuous mode [ 379.269238][T10722] bridge0: port 3(team0) entered blocking state [ 379.275946][T10722] bridge0: port 3(team0) entered disabled state [ 379.283047][T10722] device team0 entered promiscuous mode [ 379.288996][T10722] device team_slave_0 entered promiscuous mode [ 379.295482][T10722] device team_slave_1 entered promiscuous mode [ 379.301766][T10722] device geneve1 entered promiscuous mode