last executing test programs: 3m42.646395445s ago: executing program 1 (id=481): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000b40)) ioctl$SIOCSIFHWADDR(r1, 0x8943, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0x7, 0x4, 0x800, 0x80000001, 0x20, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) 3m42.125895126s ago: executing program 1 (id=483): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000100)=r1, 0x4) sendmsg$inet(r0, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000500)="fe", 0x1}], 0x1}, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 3m41.673832232s ago: executing program 1 (id=487): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000100)=r1, 0x4) sendmsg$inet(r0, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000500)="fe", 0x1}], 0x1}, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 3m41.471347094s ago: executing program 1 (id=492): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0xef12, 0x8, 0x0, 0x1000, 0xffffffffffffffff, 0x1000, '\x00', 0x0, r0, 0x4, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000100)=r2, 0x4) sendmsg$inet(r1, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000500)="fe", 0x1}], 0x1}, 0x0) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 3m41.122600555s ago: executing program 1 (id=499): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000100)=r1, 0x4) sendmsg$inet(r0, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 3m39.980502921s ago: executing program 1 (id=506): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) syz_clone(0x40000000, &(0x7f0000000a00)="3815ac5d7239cbed0c0beec31008bc63f3e163c64c983bcd66bc5edcbd3e29b997d13591cb5c3eba2ec79bb06e7943199a51563231ef9868b997d37057ca076168344e5ae8020aa545e9823a7543838101ed06ee9575d2e0f6fb423c24b8debc385fd61ce12bc74cfacb556dc5bf7ba73d37bd05027fa8afa24c1b1a1b4106c803f86ad0fce54d823d05fda67d2bdc7ef9f2171ade227a5d2f219094305dcc95faf6c97e745d98378dbb54e077bdd7f75cb1ad148733587e18fb03daebb76f6afa8e556bb27c0300b8868e27f419ac82938b338b20ea5f6f20ed472bc2ceea93b5d0abfd897a60b3c95e0b1bd31831d025e31aca5af17a5cb0d79bac1b95c16b51099095a81ac8a56d3ba6e73d2b178fba49cdb73e568f1fc6510c4e1129b379b0ff854c998a3dd8260b16a9aee1689caff3ac80d9cb89d1e188ee87beff048826dc33621d401b3e8590b3308b75cb07b0a9923e99c7c6ff5a54e64bab728c0230c56cbba0be85f53d48ed4c2bcfe8ca1f0c0c61d5782425e5e22bf1d89bcd01ce0bceaabafc78b13775d72447c01e959588d25ea73611b80331ac2a3e8802dad8d2ee56160a0cdc48e9bf39ce6075d11411d7fa06a2412ed47636623d3e1695d4c5bf680f31ce0ace6cd5c4067c0d2eae10d4dbe5874822b0743a7f6ad15ef43ed4700cc39fe94fdb15c6045a83a64448c4470ba7c60182ed8a8ee223870b530ed38440463d3f99bfbcd6f912da84810d481c05ce71795b03da5d05a539a5ef6d7032c30731d08bca2d05258059d78e0d9242e461e5a4fc4be0ab3cacf1723f5fdc051ce06015a5e128002c7066e2a5adbd20eb357869f7f6948a8dbe198a031d5d07047864b5d30b4918f65467d680e4938bb954dc8bebb29b25aa8b5488809b559ed8be143253ed8093996b1cb46752253e009a526431490ae52eef4e2287cae4e3bb60b2db56a1866c216dc20a03c7dfc083cce8eb02d78b25e3f2ac1cae30eb2eb926cdef3bfa29e3fc21b9e653cd92cbc1e8b7e07056e986f0060c44102719e0d1c0330a8527ad1ab7aa474f57e655ef4f2f3dfd18706ca9f7622618a13b1142bb6840fe8f3e426b059ffa7f6804bce80b749fbc5794c297c2b181457f0f63b4cf82d17232e29101511f52bb397ba1fc53ad66a1f0781259c7f46aec8c5fb88fcc5ec1996d5a56fb7e55ddc297227aa7600d5abcc67c7cd41bc231d234af3d52c806fe1dd6329d7bc8b8d5a9444cea14455a07847b251798291f07e1867f69e0254491b5b2f6c845d38bf4f1387348d577a447e614dbdc08519870a4da4485875c40b590eac1fd3a70a4ba56d3315c237c8227b236ab88d21893fac53ac8349a614251de284bc5d751b3db773cba3d4c03314bf3d41d251bbc97efbbb45f9b3d85bd606917e52e0eceb125a1da98f9788808d1eb0db6d3d85940ac212829d5ac05593b1945012fa67857d8f72db2120c495eaa6fd30674a4a944b690542ec325f83c42a98ac469879d3ebeb0f490e43f9956caf422a61c116b237d46fa0eebadbff397b57c063f16b34b9aaf3551a6c43692604486f8e9391f066031d16aa7bbed9e4df37c835375e7f647b3e07dcb43203a7f5921b18fa320015ec517b57fad1c772a934fa92a3d1883f796ee18c14d410ae88e0093a205f2c5fd3351157964b6d8baecc73cdb0878b87b1551976571bdd5a9ad877e4c8af98a2ebd733038609be138fabd80c47f2680697aa9cd54eeef3ece3d90c4706f63a53b5b129158160a18649ee055b0bf87d94c570dd99e9bd7d82291b321cb5cfd1cd4ac6bbf7bb4d93be3288d9423f4451b4aafe908ea5879ee453ef1d12713982474862818e1cb33164ee569fde970c6632b0a5de6f9850db01cb200744b5a8daa83ced70e71b5ffcd604f1bd0c1d4bcb373d42c50fd3bddfdf0af25e9af3679d9633ceb4693622d7791f082c964eed81985c8368d53b22f8c5aa5883e1a1527683bc6c243319ac5f2acb23cb3b2e1c272bd9741b8b1d25b82181b0c6202f231836f83f5a7a78dac03a455e8568f205ad0889456cbbcda72119480694311f7cbaa8aafc58fea2d77bbf380df25fa1543cf34720a5e457ebba366b41fd519ed9e2e61f0f913ae793281f38134590943fb579674cf5b67d0ba52fe787abd5d0258f77d279c9360fbdc8d690d53b05c3c01b772a7ddc8e2f73700ed1ad415663b8840e084781da24c9bcacc6d89b6a978c6749cb1406664e5fd7e0a22038f18a608b51edf6af9247f426d1934972e82190cb24b5d67d086fabdd1b86e06efa81a1468d49cfd01fd0394181636b0558f278e51d190effd53dcc1d7e664f6f76d0e338faad9f7fab24bef7135e569f2c5b853e5182f56a683cbf18fe6cf5959c41e043fb9b8a52c6671c5f23895214b78b53dcc33a4d59c6bde200c482a4ed28fae27ba0259fffd86aa78bf051004bcb9f8ed125d6a2d91d20b67f71414316fc81b16a1944b28890c61f5e636b55d4912327096c45008bb61ef841a0ff314d65efb09f98be78949c01ea8753fc5b555c5d6bad40dcfbf01041ed0863af08ca03b55c62f74e6d816287ed970faab9a98948dbbf2ba8952cc0b928a69085d31f9250c1d02d0af42997c6ffd611ceb78b44f9f7f550d2cb90894fb5865ffcd55638b7f36e05fb71ce2855f35a1f9450329e4ee365e18bda4e85a76f1d9570707d868284c02d7faa9d0c986f30fbd5061e06834715e9907c0f17fbffb0c243659b44c5362d6b4ef3dc85c829852df029f1b2d80d17814e608a367436eb6a15e7ed181f28fa1081eeb69ff9955b1fccaf4b2c068c8ac8338e753b0b536d2648e4f1ed1e06129d920ae5e2c97fe13a951c7e4518b8ed439d504d95b67e40e0142175f3c44b5e019baf7b0490df32870f849a3f6b8cc918ee1b34623322f3df6a809c74d91814583d25eaa2e7cd9c3071a1686b57f24fba27f441d95e3223f241a80b38633bb1de2b39c00453d137dea3cb63b3d2164b4769f0aaa6937c2fbda96a8d6b6a796fd7ca9c01a037189c172537db29f8c37a9873d80ffdabd5f22bbce5b69646d2f16e390db4734f541be47e0bdb0502f9ce8b318600eb5c704fe32c0e07a8670e9903e0301e470c22d1540bc64dbce5806ae341bc0c3c21a5350c0e5f2483641e9a51411e806a6fc5c84ec52b30df910436131f71c3f45c0703c16f2c261c0f4f872867b32999ea0276cb8ce8015d625c6795930c731291d27e5e302aa8c0356ca478cdf026a4a215a1ca3238d90157910e985ee56638e69193b53becad9521e73ceeb8ddf39f09bf1354efa65c3bf3ba3deafb16431b59673eed7388adfa1cc21b946ca08507f8bc958f4816492e6f7c9806dea6ffdf0ca582370ff121436461aef9c00e8cac812ac01c08fec6ead717ba4cd3babc438d4f7c4b1fef3b90766bbac8f5f54a87eb32d5ace5666f0f6205fe9a0355ce6d9be5f491c78dae3bd6e326d97f6b2dc7db22921e9ab742f1905c5f7bdf70c95e0c8272de2961fef5b0438656651fe4523f7bc4d96c40fd6376ca00163b8f9437c98d6b38cf32b1c3546121b5bdac8e6c539cf2d8c77d22a963252917a476cb2599aac4ba21182cd6838fb7a6996f823b3c26f06e7821dd70dd4cede2d95826aaeb9d7fc7a22f50f82a41a1907715755fce41b150647718b421acaf706d2e18fef276e56c39e1937a421657dfe5e0f90c8b3aa1c3f9f1ddb6a2fa05a8f4ba464b86399cb9b0ce0a0d69bd8e33b649ab80ae3f3c91bbaa309cd03d8a8d14f460cfdf850a3aaca563aff2eb6ff762be6da401197fedfc885a9382c615e2bd47de98ca0f251744e0aec23b23d419d3d36a224ed3b4a85d2b317052223a90ca2a01c133fad03b791812ad7b00342a07d110f07698a9a806048be7b92aec0a2e650d802831a771bf12d7343668283923e002e38bd561e934aa47c4bd22fc633bbe97dadca3702ed6df1589b7fc390957b2bdc7487afec0707ed51256fe62f95295aba3e071330ebd9cb5319f77ae2f0169b29670a3dc34e2d2fee20c6054c1124b09d166d203107c8a9327f3a8d5172396c7f2f1794262443b3f05c6a9abeadc58f39adef998d1fe92c203234762d3a92b5ef85127f3def289cf619e7855dd292c82922241e4687e694f52741d1c436b08937a7ee2d9f9d0f8d1675a30c65b1db5c9b70b3ff6f3769a7267559e6a8283325fc7456f8e7d2d8e0f0e4ed33aa2c0c3b266d7d11ab4a98e7ea5e1f12c0a9f56d692ec0416e93a4ff2e9b5354d07e4c414ae3fe2e3c99731a5025373e3e20f68ece8c30dde8ce82e22493a34f22b9ef25daec980673966e2e62ea7d3fc7bde597662fd6ec20ad629c0b5e61778088a1110ba59cb4928327f748565ed44d80936f7eb1fa55a9f4fab002c0b9f9dd9bea5917c13ebdcab77a4a653432e16127d90a76d7e69aada9daf33f65d1cc0798deebc51adc633738a7101c2958e40355a5e943fb1df5800f3dc039f50013a4c2bdfd63a85d0ffa5fe4381f9a34018dcf2ae7c40d3d39248ef971d610f238d8961740795e1545f13db7463137db200bc4c06b254f1ad03e0e5445115516b475f3cd98de600d2193f3b378b78cbcd16e0fc7c5460a60462d66eda1b4ee37c8e30ff0016a617f63eb38e9deff5d5253cbfc6426825b7bfd0d041f1c527c86956a129de01b6f7f815236d86f06d7d1e5ed60f0914ac728e38c454a8533840e274c695d01aba6dcdaa3b22f8c74bc61a317fe9ab118752f3734f3cbe572db041e7733d16c7201cc72719b226ef468423d8b1c9b1892d5185c51145cf6963764f9141c1057b8410fe8881b9b338ebf28626183c4bb604ccac96b3e25f8368b10877a2db05f274b0e4de15ada91da316fe304ba5ee6646ee6215e288fd358e5a08013b17fc8fe312e6f41ed382cf1119e44ab1102977090f23c6934f0a7a39bd299cdd154fa1914e8a7f0283a757746cc43ef08a9bc1ef1e04b11bc90a9929f1119a300d8f1e76a29a6ce13fae3c9f5bffbff949928a9598f1e01fbc50054a269b804a6590096365bea3476ab4592ac622fbe9e389a54716866542b17c953f30a7b11f99b17fec7d9d42d242c35e45396ced041d6c7306be74b6d47b15e28c7113221643fe49517a36bd1a80d1b0aaa1a423e6ec1a0f8a2dfb440f37d470298b865f77a4175052adc8bf3bf43bee114772bb6fab477868f2d3095eab7a791ef36a9eb0395cf61fc015c4c92356e4e955f5d080d9c2e1122a0b842dc0bdd51942a4d7eee1476a7a32cb0d9d872f4088bc601a8ecbcf69fe4ccdc191be07791c3dea5dc8afdc8b14cf4297411450cd1fb80d6ee73ba97f6360a69b72ee9746a785a7106ac050c657b00daaaf6f5b044c6a09ee8cee89cfe25a34e35c785d1f3bb2e989216d41286be9e805bb842f6382fc3757cc5127e50b1079af889bcbd9ba861d8228b3616fa6293fb5a07a4cf550fc5788bd9bee1215e0e063a1ac6e1231b1b79dec1434029b0cfd3835725b0bb7a1bdc2e868ac2401014b070f0c4609891408455dc4edd0f782332eb1962831ed37da5c5e80c8b3d2d0e69d03e457642ef3bc39414fc5f1d6369d0e2c4772c63f3934ea785b4ad459033354f1877a84953b4d790da7a0e2fde941253644a004594d1b66a1a07a64bbfff7ec535ce082c6c85db1eb8437437afcc55f7b54e6f37ba253f29a0455d157b165f6899097c98e183fa039ed2e2e30584ecc492c0c3a5da5b5e2c64926a7b4b9d5e0239c94d95e547b3506896e6ce2d95e43b6df476e29100d9a994ae45", 0x1000, &(0x7f0000000940), &(0x7f0000000980), &(0x7f0000001a00)="4c60e5920ac89046d0bf2b933859f7c233ff340468ec51e1cb485507daada4b8ebb1376e6729697863caa64b4b05dc1a34fd8fd7e3171a0d77e9ec99b8ced1ce48577a5325322083878621f89bfb49271b35570dfac0fe238e76a34e77df775d03e2b677284f8f9e61ff0a5317013b8dfd732ac9d8bd0c056bdb2dcb05aed6189422a0f47425b4b2e7694ac5e9fc04dd5d3382526495f345527a73b00f92d505d1ab4d98fdfac930ab900cd1284af33d08f4af1ca4") r2 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r2, 0x0, 0x24, 0x0, 0x53) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x16, &(0x7f0000000180)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x179, 0x0, 0x0, 0x0, 0x4}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @jmp={0x5, 0x1, 0x4, 0x1, 0xb, 0x18}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @func, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0xfffffeff}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000000)='GPL\x00', 0x1, 0xb4, &(0x7f0000000280)=""/180, 0x41000, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0x0, 0x4b1c, 0x9}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000380)=[r0, r0, r0, r0, r0, 0x1], &(0x7f00000003c0)=[{0x3, 0x1, 0xf, 0xb}, {0x0, 0x5, 0x2, 0xb}], 0x10, 0x4, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r3, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000500)=[0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0], 0x0, 0xa6, &(0x7f0000000680)=[{}, {}], 0x10, 0x10, &(0x7f00000006c0), &(0x7f0000000780), 0x8, 0xcb, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 3m24.858341597s ago: executing program 32 (id=506): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) syz_clone(0x40000000, &(0x7f0000000a00)="3815ac5d7239cbed0c0beec31008bc63f3e163c64c983bcd66bc5edcbd3e29b997d13591cb5c3eba2ec79bb06e7943199a51563231ef9868b997d37057ca076168344e5ae8020aa545e9823a7543838101ed06ee9575d2e0f6fb423c24b8debc385fd61ce12bc74cfacb556dc5bf7ba73d37bd05027fa8afa24c1b1a1b4106c803f86ad0fce54d823d05fda67d2bdc7ef9f2171ade227a5d2f219094305dcc95faf6c97e745d98378dbb54e077bdd7f75cb1ad148733587e18fb03daebb76f6afa8e556bb27c0300b8868e27f419ac82938b338b20ea5f6f20ed472bc2ceea93b5d0abfd897a60b3c95e0b1bd31831d025e31aca5af17a5cb0d79bac1b95c16b51099095a81ac8a56d3ba6e73d2b178fba49cdb73e568f1fc6510c4e1129b379b0ff854c998a3dd8260b16a9aee1689caff3ac80d9cb89d1e188ee87beff048826dc33621d401b3e8590b3308b75cb07b0a9923e99c7c6ff5a54e64bab728c0230c56cbba0be85f53d48ed4c2bcfe8ca1f0c0c61d5782425e5e22bf1d89bcd01ce0bceaabafc78b13775d72447c01e959588d25ea73611b80331ac2a3e8802dad8d2ee56160a0cdc48e9bf39ce6075d11411d7fa06a2412ed47636623d3e1695d4c5bf680f31ce0ace6cd5c4067c0d2eae10d4dbe5874822b0743a7f6ad15ef43ed4700cc39fe94fdb15c6045a83a64448c4470ba7c60182ed8a8ee223870b530ed38440463d3f99bfbcd6f912da84810d481c05ce71795b03da5d05a539a5ef6d7032c30731d08bca2d05258059d78e0d9242e461e5a4fc4be0ab3cacf1723f5fdc051ce06015a5e128002c7066e2a5adbd20eb357869f7f6948a8dbe198a031d5d07047864b5d30b4918f65467d680e4938bb954dc8bebb29b25aa8b5488809b559ed8be143253ed8093996b1cb46752253e009a526431490ae52eef4e2287cae4e3bb60b2db56a1866c216dc20a03c7dfc083cce8eb02d78b25e3f2ac1cae30eb2eb926cdef3bfa29e3fc21b9e653cd92cbc1e8b7e07056e986f0060c44102719e0d1c0330a8527ad1ab7aa474f57e655ef4f2f3dfd18706ca9f7622618a13b1142bb6840fe8f3e426b059ffa7f6804bce80b749fbc5794c297c2b181457f0f63b4cf82d17232e29101511f52bb397ba1fc53ad66a1f0781259c7f46aec8c5fb88fcc5ec1996d5a56fb7e55ddc297227aa7600d5abcc67c7cd41bc231d234af3d52c806fe1dd6329d7bc8b8d5a9444cea14455a07847b251798291f07e1867f69e0254491b5b2f6c845d38bf4f1387348d577a447e614dbdc08519870a4da4485875c40b590eac1fd3a70a4ba56d3315c237c8227b236ab88d21893fac53ac8349a614251de284bc5d751b3db773cba3d4c03314bf3d41d251bbc97efbbb45f9b3d85bd606917e52e0eceb125a1da98f9788808d1eb0db6d3d85940ac212829d5ac05593b1945012fa67857d8f72db2120c495eaa6fd30674a4a944b690542ec325f83c42a98ac469879d3ebeb0f490e43f9956caf422a61c116b237d46fa0eebadbff397b57c063f16b34b9aaf3551a6c43692604486f8e9391f066031d16aa7bbed9e4df37c835375e7f647b3e07dcb43203a7f5921b18fa320015ec517b57fad1c772a934fa92a3d1883f796ee18c14d410ae88e0093a205f2c5fd3351157964b6d8baecc73cdb0878b87b1551976571bdd5a9ad877e4c8af98a2ebd733038609be138fabd80c47f2680697aa9cd54eeef3ece3d90c4706f63a53b5b129158160a18649ee055b0bf87d94c570dd99e9bd7d82291b321cb5cfd1cd4ac6bbf7bb4d93be3288d9423f4451b4aafe908ea5879ee453ef1d12713982474862818e1cb33164ee569fde970c6632b0a5de6f9850db01cb200744b5a8daa83ced70e71b5ffcd604f1bd0c1d4bcb373d42c50fd3bddfdf0af25e9af3679d9633ceb4693622d7791f082c964eed81985c8368d53b22f8c5aa5883e1a1527683bc6c243319ac5f2acb23cb3b2e1c272bd9741b8b1d25b82181b0c6202f231836f83f5a7a78dac03a455e8568f205ad0889456cbbcda72119480694311f7cbaa8aafc58fea2d77bbf380df25fa1543cf34720a5e457ebba366b41fd519ed9e2e61f0f913ae793281f38134590943fb579674cf5b67d0ba52fe787abd5d0258f77d279c9360fbdc8d690d53b05c3c01b772a7ddc8e2f73700ed1ad415663b8840e084781da24c9bcacc6d89b6a978c6749cb1406664e5fd7e0a22038f18a608b51edf6af9247f426d1934972e82190cb24b5d67d086fabdd1b86e06efa81a1468d49cfd01fd0394181636b0558f278e51d190effd53dcc1d7e664f6f76d0e338faad9f7fab24bef7135e569f2c5b853e5182f56a683cbf18fe6cf5959c41e043fb9b8a52c6671c5f23895214b78b53dcc33a4d59c6bde200c482a4ed28fae27ba0259fffd86aa78bf051004bcb9f8ed125d6a2d91d20b67f71414316fc81b16a1944b28890c61f5e636b55d4912327096c45008bb61ef841a0ff314d65efb09f98be78949c01ea8753fc5b555c5d6bad40dcfbf01041ed0863af08ca03b55c62f74e6d816287ed970faab9a98948dbbf2ba8952cc0b928a69085d31f9250c1d02d0af42997c6ffd611ceb78b44f9f7f550d2cb90894fb5865ffcd55638b7f36e05fb71ce2855f35a1f9450329e4ee365e18bda4e85a76f1d9570707d868284c02d7faa9d0c986f30fbd5061e06834715e9907c0f17fbffb0c243659b44c5362d6b4ef3dc85c829852df029f1b2d80d17814e608a367436eb6a15e7ed181f28fa1081eeb69ff9955b1fccaf4b2c068c8ac8338e753b0b536d2648e4f1ed1e06129d920ae5e2c97fe13a951c7e4518b8ed439d504d95b67e40e0142175f3c44b5e019baf7b0490df32870f849a3f6b8cc918ee1b34623322f3df6a809c74d91814583d25eaa2e7cd9c3071a1686b57f24fba27f441d95e3223f241a80b38633bb1de2b39c00453d137dea3cb63b3d2164b4769f0aaa6937c2fbda96a8d6b6a796fd7ca9c01a037189c172537db29f8c37a9873d80ffdabd5f22bbce5b69646d2f16e390db4734f541be47e0bdb0502f9ce8b318600eb5c704fe32c0e07a8670e9903e0301e470c22d1540bc64dbce5806ae341bc0c3c21a5350c0e5f2483641e9a51411e806a6fc5c84ec52b30df910436131f71c3f45c0703c16f2c261c0f4f872867b32999ea0276cb8ce8015d625c6795930c731291d27e5e302aa8c0356ca478cdf026a4a215a1ca3238d90157910e985ee56638e69193b53becad9521e73ceeb8ddf39f09bf1354efa65c3bf3ba3deafb16431b59673eed7388adfa1cc21b946ca08507f8bc958f4816492e6f7c9806dea6ffdf0ca582370ff121436461aef9c00e8cac812ac01c08fec6ead717ba4cd3babc438d4f7c4b1fef3b90766bbac8f5f54a87eb32d5ace5666f0f6205fe9a0355ce6d9be5f491c78dae3bd6e326d97f6b2dc7db22921e9ab742f1905c5f7bdf70c95e0c8272de2961fef5b0438656651fe4523f7bc4d96c40fd6376ca00163b8f9437c98d6b38cf32b1c3546121b5bdac8e6c539cf2d8c77d22a963252917a476cb2599aac4ba21182cd6838fb7a6996f823b3c26f06e7821dd70dd4cede2d95826aaeb9d7fc7a22f50f82a41a1907715755fce41b150647718b421acaf706d2e18fef276e56c39e1937a421657dfe5e0f90c8b3aa1c3f9f1ddb6a2fa05a8f4ba464b86399cb9b0ce0a0d69bd8e33b649ab80ae3f3c91bbaa309cd03d8a8d14f460cfdf850a3aaca563aff2eb6ff762be6da401197fedfc885a9382c615e2bd47de98ca0f251744e0aec23b23d419d3d36a224ed3b4a85d2b317052223a90ca2a01c133fad03b791812ad7b00342a07d110f07698a9a806048be7b92aec0a2e650d802831a771bf12d7343668283923e002e38bd561e934aa47c4bd22fc633bbe97dadca3702ed6df1589b7fc390957b2bdc7487afec0707ed51256fe62f95295aba3e071330ebd9cb5319f77ae2f0169b29670a3dc34e2d2fee20c6054c1124b09d166d203107c8a9327f3a8d5172396c7f2f1794262443b3f05c6a9abeadc58f39adef998d1fe92c203234762d3a92b5ef85127f3def289cf619e7855dd292c82922241e4687e694f52741d1c436b08937a7ee2d9f9d0f8d1675a30c65b1db5c9b70b3ff6f3769a7267559e6a8283325fc7456f8e7d2d8e0f0e4ed33aa2c0c3b266d7d11ab4a98e7ea5e1f12c0a9f56d692ec0416e93a4ff2e9b5354d07e4c414ae3fe2e3c99731a5025373e3e20f68ece8c30dde8ce82e22493a34f22b9ef25daec980673966e2e62ea7d3fc7bde597662fd6ec20ad629c0b5e61778088a1110ba59cb4928327f748565ed44d80936f7eb1fa55a9f4fab002c0b9f9dd9bea5917c13ebdcab77a4a653432e16127d90a76d7e69aada9daf33f65d1cc0798deebc51adc633738a7101c2958e40355a5e943fb1df5800f3dc039f50013a4c2bdfd63a85d0ffa5fe4381f9a34018dcf2ae7c40d3d39248ef971d610f238d8961740795e1545f13db7463137db200bc4c06b254f1ad03e0e5445115516b475f3cd98de600d2193f3b378b78cbcd16e0fc7c5460a60462d66eda1b4ee37c8e30ff0016a617f63eb38e9deff5d5253cbfc6426825b7bfd0d041f1c527c86956a129de01b6f7f815236d86f06d7d1e5ed60f0914ac728e38c454a8533840e274c695d01aba6dcdaa3b22f8c74bc61a317fe9ab118752f3734f3cbe572db041e7733d16c7201cc72719b226ef468423d8b1c9b1892d5185c51145cf6963764f9141c1057b8410fe8881b9b338ebf28626183c4bb604ccac96b3e25f8368b10877a2db05f274b0e4de15ada91da316fe304ba5ee6646ee6215e288fd358e5a08013b17fc8fe312e6f41ed382cf1119e44ab1102977090f23c6934f0a7a39bd299cdd154fa1914e8a7f0283a757746cc43ef08a9bc1ef1e04b11bc90a9929f1119a300d8f1e76a29a6ce13fae3c9f5bffbff949928a9598f1e01fbc50054a269b804a6590096365bea3476ab4592ac622fbe9e389a54716866542b17c953f30a7b11f99b17fec7d9d42d242c35e45396ced041d6c7306be74b6d47b15e28c7113221643fe49517a36bd1a80d1b0aaa1a423e6ec1a0f8a2dfb440f37d470298b865f77a4175052adc8bf3bf43bee114772bb6fab477868f2d3095eab7a791ef36a9eb0395cf61fc015c4c92356e4e955f5d080d9c2e1122a0b842dc0bdd51942a4d7eee1476a7a32cb0d9d872f4088bc601a8ecbcf69fe4ccdc191be07791c3dea5dc8afdc8b14cf4297411450cd1fb80d6ee73ba97f6360a69b72ee9746a785a7106ac050c657b00daaaf6f5b044c6a09ee8cee89cfe25a34e35c785d1f3bb2e989216d41286be9e805bb842f6382fc3757cc5127e50b1079af889bcbd9ba861d8228b3616fa6293fb5a07a4cf550fc5788bd9bee1215e0e063a1ac6e1231b1b79dec1434029b0cfd3835725b0bb7a1bdc2e868ac2401014b070f0c4609891408455dc4edd0f782332eb1962831ed37da5c5e80c8b3d2d0e69d03e457642ef3bc39414fc5f1d6369d0e2c4772c63f3934ea785b4ad459033354f1877a84953b4d790da7a0e2fde941253644a004594d1b66a1a07a64bbfff7ec535ce082c6c85db1eb8437437afcc55f7b54e6f37ba253f29a0455d157b165f6899097c98e183fa039ed2e2e30584ecc492c0c3a5da5b5e2c64926a7b4b9d5e0239c94d95e547b3506896e6ce2d95e43b6df476e29100d9a994ae45", 0x1000, &(0x7f0000000940), &(0x7f0000000980), &(0x7f0000001a00)="4c60e5920ac89046d0bf2b933859f7c233ff340468ec51e1cb485507daada4b8ebb1376e6729697863caa64b4b05dc1a34fd8fd7e3171a0d77e9ec99b8ced1ce48577a5325322083878621f89bfb49271b35570dfac0fe238e76a34e77df775d03e2b677284f8f9e61ff0a5317013b8dfd732ac9d8bd0c056bdb2dcb05aed6189422a0f47425b4b2e7694ac5e9fc04dd5d3382526495f345527a73b00f92d505d1ab4d98fdfac930ab900cd1284af33d08f4af1ca4") r2 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r2, 0x0, 0x24, 0x0, 0x53) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x16, &(0x7f0000000180)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x179, 0x0, 0x0, 0x0, 0x4}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @jmp={0x5, 0x1, 0x4, 0x1, 0xb, 0x18}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @func, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0xfffffeff}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000000)='GPL\x00', 0x1, 0xb4, &(0x7f0000000280)=""/180, 0x41000, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0x0, 0x4b1c, 0x9}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000380)=[r0, r0, r0, r0, r0, 0x1], &(0x7f00000003c0)=[{0x3, 0x1, 0xf, 0xb}, {0x0, 0x5, 0x2, 0xb}], 0x10, 0x4, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r3, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000500)=[0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0], 0x0, 0xa6, &(0x7f0000000680)=[{}, {}], 0x10, 0x10, &(0x7f00000006c0), &(0x7f0000000780), 0x8, 0xcb, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2m39.92636816s ago: executing program 0 (id=923): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0xef12, 0x8, 0x0, 0x1000, 0xffffffffffffffff, 0x1000, '\x00', 0x0, r0, 0x4, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000100)=r2, 0x4) sendmsg$inet(r1, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000500)="fe", 0x1}], 0x1}, 0x0) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 2m39.559791422s ago: executing program 0 (id=934): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000100)=r1, 0x4) sendmsg$inet(r0, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000000600)}, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 2m38.168387073s ago: executing program 0 (id=926): openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x100, 0xffffffad, 0x3, 0x30, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1, 0x7, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0xef12, 0x8, 0x0, 0x1000, r0, 0x1000, '\x00', r1, r2, 0x4, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r3, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000100)=r4, 0x4) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 2m37.533448401s ago: executing program 0 (id=935): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x5000, 0x0, 0x0, 0x0, 0x0, 0x0) 2m37.084313717s ago: executing program 0 (id=938): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000004c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xd, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x15) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r4, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x10, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xd, &(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r7}, 0x10) r10 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xa, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7030000070000008500000021000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = socket$kcm(0x1e, 0x1, 0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000200000000000000000818110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x4, 0x8, 0x1f, 0x4, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x80, 0x8, 0xa893, 0x6, 0x101, 0x3ff, 0x6, 0x0, 0xf76c, 0x0, 0x101}, r10, 0x1, r9, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r14, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(r12, &(0x7f00000014c0)={&(0x7f0000001540)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x4}}}, 0x80, 0x0}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r11, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2m36.51543982s ago: executing program 0 (id=944): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0xef12, 0x8, 0x0, 0x1000, 0xffffffffffffffff, 0x1000, '\x00', 0x0, r0, 0x4, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000100)=r2, 0x4) sendmsg$inet(r1, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000500)="fe", 0x1}], 0x1}, 0x0) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 2m36.265958445s ago: executing program 33 (id=944): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0xef12, 0x8, 0x0, 0x1000, 0xffffffffffffffff, 0x1000, '\x00', 0x0, r0, 0x4, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000100)=r2, 0x4) sendmsg$inet(r1, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000500)="fe", 0x1}], 0x1}, 0x0) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 2m2.104531926s ago: executing program 4 (id=1325): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000b40)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r1, 0x8914, 0x0) 2m1.86345596s ago: executing program 3 (id=1328): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) r1 = socket$kcm(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/249, 0x101d0}], 0x1}, 0x0) close(r2) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$inet(r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 2m1.712273319s ago: executing program 4 (id=1333): sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @mcast2, 0x1a}, 0x80, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x900}, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x13}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x1c, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x408) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a07, 0x1700) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, 0x0, 0x0) getpid() ioctl$TUNSETIFF(0xffffffffffffffff, 0xb701, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000000010000000400000004"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000006007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000005000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r2}, 0xc) close(0xffffffffffffffff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0300002000"}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r3, &(0x7f0000005680)={&(0x7f00000011c0)=@in6={0xa, 0x0, 0x0, @empty, 0xffff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 2m0.772518045s ago: executing program 3 (id=1336): r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000280)=@phonet={0x23, 0x0, 0x0, 0x4}, 0x80, 0x0}, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x3, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000180)="807af9e35c4032165e632f409ca246fc90b068134516ba048432292e2c188858823e27326521cd626bbc7b952fb24b7dbc8ad36451f5bfa33a00fc7627b9e967009e449620188e2195cc24f9eb75b2b02b08505d6cc640dbdd2f2e3cd0e1efd23440", 0x62}], 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="20000000000000008400000008000000da"], 0x20}, 0x41) socket$kcm(0x11, 0x2, 0x0) (async) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) (async) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000280)=@phonet={0x23, 0x0, 0x0, 0x4}, 0x80, 0x0}, 0x0) (async) socket$kcm(0xa, 0x5, 0x0) (async) sendmsg$kcm(r1, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x3, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000180)="807af9e35c4032165e632f409ca246fc90b068134516ba048432292e2c188858823e27326521cd626bbc7b952fb24b7dbc8ad36451f5bfa33a00fc7627b9e967009e449620188e2195cc24f9eb75b2b02b08505d6cc640dbdd2f2e3cd0e1efd23440", 0x62}], 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="20000000000000008400000008000000da"], 0x20}, 0x41) (async) 2m0.636498812s ago: executing program 4 (id=1339): bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0xf2321, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x40, 0x0, 0x6, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r4}, 0x10) write$cgroup_int(r3, &(0x7f0000000040)=0x1, 0x12) 2m0.582776285s ago: executing program 5 (id=1340): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x100, 0xffffffad, 0x3, 0x30, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1, 0x7, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0xef12, 0x8, 0x0, 0x1000, r0, 0x1000, '\x00', r1, r2, 0x4, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r3, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000100)=r4, 0x4) sendmsg$inet(r3, &(0x7f0000002640)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 2m0.480471451s ago: executing program 3 (id=1341): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x100, 0xffffffad, 0x3, 0x30, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1, 0x7, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0xef12, 0x8, 0x0, 0x1000, r0, 0x1000, '\x00', r1, r2, 0x4, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r3, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000100)=r4, 0x4) sendmsg$inet(r3, &(0x7f0000002640)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 2m0.453815303s ago: executing program 5 (id=1343): bpf$ENABLE_STATS(0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x12) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r3}, 0x10) write$cgroup_int(r2, &(0x7f0000000040)=0x1, 0x12) (fail_nth: 2) 2m0.304519122s ago: executing program 4 (id=1345): perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x4, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000040)='mm_lru_insertion\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f91024fc60040011000a7403004700000037153e370248018000f01700d1", 0x2d}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40010) 2m0.122585972s ago: executing program 3 (id=1347): perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x85, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfe, 0x0, 0x4, 0x0, 0x0, 0x8, 0x8051, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x40000000}, 0x4203, 0xc8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000130b0000040008000800000014100000da01dfaf76bd5daa6cfe5b17bb15511d6d4f97095587ead08a96a615789b53296772418a0fd5d9d1a77d006e64", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x4c, 0x0, 0x0) socket$kcm(0xa, 0x5, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000580)="6700000011008188040f56ecdb4cb9cca7480ef436000000e3bd6efb440009000e000a0010000000ba80010000005a8c3774fa0af3dc59a933c1e7a6d3361d83b20000319cdf5656826edaaa11032701c61ec666d482078ccebcb9a4f187f7a4e98f09cdc2649f", 0x67}], 0x1}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x13, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='cachefiles_io_error\x00', 0xffffffffffffffff, 0x0, 0x8000000000000000}, 0x18) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030025000b12d25a80648c2594f90224fc60100c034002bf0900053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x600300) 2m0.046729767s ago: executing program 4 (id=1348): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0, 0x5}, 0x880, 0x800, 0x0, 0x0, 0x0, 0x7, 0xffff, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000014c0)) ioctl$SIOCSIFHWADDR(r0, 0x8b20, &(0x7f0000000080)={'wlan1\x00', @local}) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x20000801) recvmsg(0xffffffffffffffff, 0x0, 0x40002002) socket$kcm(0x2, 0x5, 0x84) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b73, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x32, 0xfffffbff, 0x5, 0x2, 0xfffffffe, 0x4, 0x0, 0x0, 0x0, 0x2007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1d, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x47, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x10) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x500, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73772cc9f1ba1f848420000005e140602000000000e000a0010000000028000001294", 0x2e}], 0x1}, 0x0) 1m59.9923976s ago: executing program 6 (id=1349): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fe9cb7907021175f37538e486dd6317ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35f06558"], 0xfdef) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 1m59.99213772s ago: executing program 2 (id=1350): sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @mcast2, 0x1a}, 0x80, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x900}, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x13}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x1c, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x408) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a07, 0x1700) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, 0x0, 0x0) getpid() ioctl$TUNSETIFF(0xffffffffffffffff, 0xb701, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000000010000000400000004"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000006007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000005000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r2}, 0xc) close(0xffffffffffffffff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0300002000"}) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r3, &(0x7f0000005680)={&(0x7f00000011c0)=@in6={0xa, 0x0, 0x0, @empty, 0xffff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 1m59.3057786s ago: executing program 5 (id=1351): close(0xffffffffffffffff) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000079120800000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x15fc000000000000}, 0x100000}, 0x0, 0xfffffdbfffffffff, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x19}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xc, 0x6, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000004ade000000000200008510000002000000950000000000000085000000220000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0xeb, &(0x7f0000000140)=""/235, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5, @void, @value}, 0x94) close(r3) close(0xffffffffffffffff) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000079120800000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x15fc000000000000}, 0x100000}, 0x0, 0xfffffdbfffffffff, 0xffffffffffffffff, 0x1) (async) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x19}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xc, 0x6, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000004ade000000000200008510000002000000950000000000000085000000220000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0xeb, &(0x7f0000000140)=""/235, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5, @void, @value}, 0x94) (async) close(r3) (async) 1m59.208919976s ago: executing program 6 (id=1352): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0xef12, 0x8, 0x0, 0x1000, 0xffffffffffffffff, 0x1000, '\x00', 0x0, r0, 0x4, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000500)="fe", 0x1}], 0x1}, 0x0) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 1m58.96735376s ago: executing program 2 (id=1353): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x100, 0xffffffad, 0x3, 0x30, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1, 0x7, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0xef12, 0x8, 0x0, 0x1000, r0, 0x1000, '\x00', r1, r2, 0x4, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r3, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000100)=r4, 0x4) sendmsg$inet(r3, &(0x7f0000002640)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 1m57.120350478s ago: executing program 6 (id=1354): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0xef12, 0x8, 0x0, 0x1000, 0xffffffffffffffff, 0x1000, '\x00', 0x0, r0, 0x4, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000500)="fe", 0x1}], 0x1}, 0x0) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 1m57.021236234s ago: executing program 4 (id=1355): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x85, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) socket$kcm(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfe, 0x0, 0x4, 0x0, 0x0, 0x8, 0x8051, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x40000000}, 0x4203, 0xc8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000130b0000040008000800000014100000da01dfaf76bd5daa6cfe5b17bb15511d6d4f97095587ead08a96a615789b53296772418a0fd5d9d1a77d006e64", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000003c0)={r3, 0x0, &(0x7f0000000780)=""/4096}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000c0000000000000005000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ff0f000085000000060000001811", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000080000007b8af8ff2d4b478d8c00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082001700950000"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x57, &(0x7f0000000440)=""/87, 0x41000, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f00000002c0)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x3, 0x1ff, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x10, 0x2, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r5 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x4c, 0x0, 0x0) r6 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r6, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x9, @local, 0x39}, 0x80, &(0x7f0000000340)=[{&(0x7f00000003c0)='`', 0x1}], 0x1}, 0x41) setsockopt$sock_attach_bpf(r6, 0x84, 0x1e, &(0x7f0000000000), 0x4) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000580)="6700000011008188040f56ecdb4cb9cca7480ef436000000e3bd6efb440009000e000a0010000000ba80010000005a8c3774fa0af3dc59a933c1e7a6d3361d83b20000319cdf5656826edaaa11032701c61ec666d482078ccebcb9a4f187f7a4e98f09cdc2649f", 0x67}], 0x1}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x13, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x6, 0x9, 0x0, 0x1, 0x0, 0x19f09f06, 0xc8, 0xb, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xd}, 0x111d2, 0xd7, 0x5, 0x3, 0xfffffffffffffffe, 0x1ff, 0x8, 0x0, 0x101, 0x0, 0x400}, 0x0, 0xffffffffffffffff, r5, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='cachefiles_io_error\x00', r4, 0x0, 0x8000000000000000}, 0x18) r8 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030025000b12d25a80648c2594f90224fc60100c034002bf0900053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x600300) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102033a00fe08000e40000200875a65969ff57b00ff0200000000000000"], 0xfdef) 1m56.949967478s ago: executing program 2 (id=1356): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x15) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1m54.247990566s ago: executing program 2 (id=1357): r0 = perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0xb, 0x0, 0x9, 0x5, 0x0, 0x0, 0x40010, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000080), 0xd}, 0x0, 0x6, 0xdcc, 0x3, 0x1, 0x7f, 0xc244, 0x0, 0x90, 0x0, 0x9}, 0x0, 0x8, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0xe}, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x3c6}, 0x0, 0xd, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="110000005200338f65277b9b108b4ab51c"], 0xfe33) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x18000000000002a0, 0x13, 0x0, &(0x7f0000000080)="b9ff030711a5268c019e14f088a847e0ffff00", 0x0, 0xffffffff, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fe9cb7907021175f37538e486dd6317ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35f06558"], 0xfdef) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) 1m53.777360694s ago: executing program 6 (id=1358): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@bloom_filter={0x1e, 0x100, 0xffffffad, 0x3, 0x30, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1, 0x7, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0xef12, 0x8, 0x0, 0x1000, r0, 0x1000, '\x00', r1, r2, 0x4, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r3, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000100)=r4, 0x4) sendmsg$inet(r3, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000000600)}, 0x0) sendmsg$inet(r3, 0x0, 0x52cc) 1m52.675457939s ago: executing program 5 (id=1359): perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x4, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000040)='mm_lru_insertion\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f91024fc60040011000a7403004700000037153e370248018000f01700d1", 0x2d}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40010) 1m51.716913665s ago: executing program 6 (id=1360): socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xd000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) socket$kcm(0x2b, 0x1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r1}, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0x703, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x436, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 1m49.221677761s ago: executing program 5 (id=1361): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) r1 = socket$kcm(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/249, 0x101d0}], 0x1}, 0x0) close(r2) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$inet(r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1m48.926188698s ago: executing program 2 (id=1362): bpf$MAP_CREATE(0x0, 0x0, 0xdae5) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000001040)={&(0x7f0000000d00)=@abs={0x1, 0x2}, 0x6e, 0x0}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0900000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000400000026b13ef5009ec500"/30], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="040000000000000000faffffffffffff17110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000440)={r4}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x5421, 0x110e22fff7) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r5 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0xfc, 0x8, 0x4, 0x0, 0x0, 0x30c, 0x18841, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x14882, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0xf}, 0x0, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000fc0)=' \xb4\xcfhj0\x04\x9e\x92\xee\x87\xa1X\xbb\xea/\xbe\x18\xeb\xa9\bsDi\xb2\xc6E\x14\x8a\x1d\xc0\xd9\xe6\x10\xc0s\xe8\xc1\x12\xbd\xe2tX}\xa3\x1e \xfady7D -\x96x\x81\xdb.?\x16\xbb\x93\x1c') perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0xfffffffffffffffa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@generic={&(0x7f0000000100)='./file0\x00', r2}, 0x18) r7 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x29, 0x23, &(0x7f0000000040), 0xcf) close(r7) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) 1m48.925617478s ago: executing program 3 (id=1363): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="050000000000000071113100000000009500a50500000000f33acd3f07c6b514beaee99087b1abac87fb7ef60816b9a9729ae342d1704ec136fe519859a3b61ebea513a038899bb232cf956f055fe208ab06ecb374d8d51b342fcd424712d7ae25d8e2900b99196b79468ecd7997283b95e47f7e238bb21f382bdfd451db434527bd53fd48e8a9916b6af2d031eecf207e9877496b8c394471fdbc8cb997f2174a6e7d661b1f"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000580), 0x4) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r1 = perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x4, 0x5, 0x1, 0x9, 0x0, 0x4, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x5, 0x7fffffffffffffff}, 0x1, 0x8, 0xfffffffa, 0x5, 0x4, 0x1528, 0x4, 0x0, 0x9, 0x0, 0x5422}, 0x0, 0x4, r1, 0x5) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r3 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x31, 0x0, 0x0) write$cgroup_devices(r2, &(0x7f0000000100)={'a', ' *:* ', 'rm\x00'}, 0x9) r4 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="1d100000120091ef"], 0xfe33) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000540)={r5, &(0x7f0000000400), &(0x7f0000000440)=""/236}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f0000000040)={0x4, &(0x7f00000001c0)=[{0x45, 0x0, 0x2, 0xfffffffe}, {0x3}, {0x0, 0x0, 0xfc}, {0x6}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='GPL\x00') 1m46.220569087s ago: executing program 6 (id=1364): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a000000050000000300000004"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000cc0)={r2}, 0xc) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r3) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB="0400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000c9c4f77300"/28], 0x50) ioctl$TUNSETOFFLOAD(r3, 0x541b, 0x2000001f) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r6, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r6, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r6, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) recvmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) write$cgroup_devices(r4, 0x0, 0xffdd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r7 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r7, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000400)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80044, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 1m46.219044487s ago: executing program 5 (id=1365): sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @mcast2, 0x1a}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000780)="80005b020eaa4da2", 0x8}], 0x1, 0x0, 0x0, 0x900}, 0x0) close(0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x19) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x10, &(0x7f0000000200), 0x4) r2 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x1c, 0x0, 0x0) r3 = openat$cgroup_procs(r0, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000380), 0x12) write$cgroup_int(r2, &(0x7f0000000240)=0xffffffffffffff24, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r4}, 0x10) write$cgroup_int(r2, &(0x7f0000000040), 0x1) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000940)={0x0, 0xa, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000100081044e81f782db44b904021d08000b000000e8fe55a1180015000600142603600e1209000d0000000401a80016000a00014006000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) close(r6) ioctl$SIOCSIFHWADDR(r6, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0300002000"}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r7 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r7, &(0x7f0000005680)={&(0x7f00000011c0)=@in6={0xa, 0x0, 0x0, @empty, 0xffff}, 0x80, 0x0, 0x0, &(0x7f0000002240)=[{0x10, 0x1}], 0x10}, 0x0) 1m46.122432883s ago: executing program 3 (id=1366): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000100)=r1, 0x4) sendmsg$inet(r0, &(0x7f0000002640)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 1m45.348868938s ago: executing program 2 (id=1367): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1e4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="7c00000000000000000000000700000044140001ac1414aa00000000ac1414000000000000441c0003e0000001000000007f000001000000000000000000000000442c000000000000000000000000000000000000000000000000000000000000000000000000000000000000440c0001000000000000000000000000000000a400000000000000000000000700000044280000000000000000000000000000000000000000000000000000000000000000000000000000071700e0000002ac1414bb00000000e0000002ac1414bb018616000000000010c986d78e6c4b9394b247217b87cb00830b00000000007f000001861f0000000000020010421487f84baabcbcfb42a4d90bab000748c68c4c31001089ca45d9612e5b5c11f12bc78a41000000000000006c000000000000000000000007000000441c0003ffffffff000000000000000000000000e00000010000000044340001ac1414bb0000000000000000000000000000000000000000ac1414aa00000000ac1414aa00000000ac1e000100000000830b007f000001e000000200000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000001400000000000000000000000200000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f0000017f000001000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f000001ac141400000000001c00000000000000000000004700000044aa00210a2101"], 0x230}, 0x0) gettid() socket$kcm(0xa, 0x2, 0x73) perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x80, 0x7fd, 0x0, 0x0, 0x0, 0x7, 0xffff, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0xfc, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x12504, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x8}, 0x7602, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63239747cb7f2f00db5b686158bbcfe8875a65969ff57b00000000000000"], 0xfdef) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRES64=r0, @ANYRES32, @ANYBLOB="6ad86e08a37e313186f3bc3af9883e08bb39829b6b5cc8ddaa8a12ee691523111744df2061f3af9ea2f70df6cafb4d5cb462a81b0414560850836efcb1caf57451215001cd5e502633e4d4f79fc8ad7b", @ANYRES32, @ANYBLOB], 0x50) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0xb701, 0xffffffffffffffff) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) gettid() perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1ff, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000240)={'ip6gretap0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) socket$kcm(0xa, 0x2, 0x0) 681.97466ms ago: executing program 34 (id=1364): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a000000050000000300000004"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000cc0)={r2}, 0xc) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r3) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB="0400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000c9c4f77300"/28], 0x50) ioctl$TUNSETOFFLOAD(r3, 0x541b, 0x2000001f) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r6, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r6, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r6, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) recvmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) write$cgroup_devices(r4, 0x0, 0xffdd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r7 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r7, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000400)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80044, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 411.623746ms ago: executing program 35 (id=1365): sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @mcast2, 0x1a}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000780)="80005b020eaa4da2", 0x8}], 0x1, 0x0, 0x0, 0x900}, 0x0) close(0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x19) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x10, &(0x7f0000000200), 0x4) r2 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x1c, 0x0, 0x0) r3 = openat$cgroup_procs(r0, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000380), 0x12) write$cgroup_int(r2, &(0x7f0000000240)=0xffffffffffffff24, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r4}, 0x10) write$cgroup_int(r2, &(0x7f0000000040), 0x1) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000940)={0x0, 0xa, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000100081044e81f782db44b904021d08000b000000e8fe55a1180015000600142603600e1209000d0000000401a80016000a00014006000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) close(r6) ioctl$SIOCSIFHWADDR(r6, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0300002000"}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r7 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r7, &(0x7f0000005680)={&(0x7f00000011c0)=@in6={0xa, 0x0, 0x0, @empty, 0xffff}, 0x80, 0x0, 0x0, &(0x7f0000002240)=[{0x10, 0x1}], 0x10}, 0x0) 325.680561ms ago: executing program 36 (id=1367): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1e4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000001400000000000000000000000200000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f0000017f000001000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f000001ac141400000000001c00000000000000000000004700000044aa00210a2101"], 0x230}, 0x0) gettid() socket$kcm(0xa, 0x2, 0x73) perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x80, 0x7fd, 0x0, 0x0, 0x0, 0x7, 0xffff, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0xfc, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x12504, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x8}, 0x7602, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63239747cb7f2f00db5b686158bbcfe8875a65969ff57b00000000000000"], 0xfdef) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRES64=r0, @ANYRES32, @ANYBLOB="6ad86e08a37e313186f3bc3af9883e08bb39829b6b5cc8ddaa8a12ee691523111744df2061f3af9ea2f70df6cafb4d5cb462a81b0414560850836efcb1caf57451215001cd5e502633e4d4f79fc8ad7b", @ANYRES32, @ANYBLOB], 0x50) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0xb701, 0xffffffffffffffff) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) gettid() perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1ff, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000240)={'ip6gretap0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) socket$kcm(0xa, 0x2, 0x0) 231.920777ms ago: executing program 37 (id=1366): openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000100)=r1, 0x4) sendmsg$inet(r0, &(0x7f0000002640)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 0s ago: executing program 38 (id=1355): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x85, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) socket$kcm(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfe, 0x0, 0x4, 0x0, 0x0, 0x8, 0x8051, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x40000000}, 0x4203, 0xc8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000130b0000040008000800000014100000da01dfaf76bd5daa6cfe5b17bb15511d6d4f97095587ead08a96a615789b53296772418a0fd5d9d1a77d006e64", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000003c0)={r3, 0x0, &(0x7f0000000780)=""/4096}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000c0000000000000005000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ff0f000085000000060000001811", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000080000007b8af8ff2d4b478d8c00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082001700950000"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x57, &(0x7f0000000440)=""/87, 0x41000, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f00000002c0)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x3, 0x1ff, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x10, 0x2, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r5 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x4c, 0x0, 0x0) r6 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r6, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x9, @local, 0x39}, 0x80, &(0x7f0000000340)=[{&(0x7f00000003c0)='`', 0x1}], 0x1}, 0x41) setsockopt$sock_attach_bpf(r6, 0x84, 0x1e, &(0x7f0000000000), 0x4) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000580)="6700000011008188040f56ecdb4cb9cca7480ef436000000e3bd6efb440009000e000a0010000000ba80010000005a8c3774fa0af3dc59a933c1e7a6d3361d83b20000319cdf5656826edaaa11032701c61ec666d482078ccebcb9a4f187f7a4e98f09cdc2649f", 0x67}], 0x1}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x13, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x6, 0x9, 0x0, 0x1, 0x0, 0x19f09f06, 0xc8, 0xb, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0xd}, 0x111d2, 0xd7, 0x5, 0x3, 0xfffffffffffffffe, 0x1ff, 0x8, 0x0, 0x101, 0x0, 0x400}, 0x0, 0xffffffffffffffff, r5, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='cachefiles_io_error\x00', r4, 0x0, 0x8000000000000000}, 0x18) r8 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030025000b12d25a80648c2594f90224fc60100c034002bf0900053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x600300) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102033a00fe08000e40000200875a65969ff57b00ff0200000000000000"], 0xfdef) kernel console output (not intermixed with test programs): r parsing attributes in process `syz.3.448'. [ 123.022119][ T5467] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 123.038198][ T5461] netlink: 55 bytes leftover after parsing attributes in process `syz.3.448'. [ 123.143495][ T5470] device syzkaller0 entered promiscuous mode [ 123.222180][ T5474] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.451'. [ 123.387969][ T5469] device syzkaller0 entered promiscuous mode [ 124.063030][ T5494] netlink: 'syz.4.458': attribute type 10 has an invalid length. [ 124.133243][ T5494] netlink: 156 bytes leftover after parsing attributes in process `syz.4.458'. [ 124.240809][ T5498] netlink: 'syz.1.460': attribute type 10 has an invalid length. [ 124.290753][ T5498] netlink: 156 bytes leftover after parsing attributes in process `syz.1.460'. [ 124.516646][ T5503] device syzkaller0 entered promiscuous mode [ 124.529841][ T5506] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.464'. [ 124.549182][ T5508] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.462'. [ 124.564921][ T5502] netlink: 'syz.2.462': attribute type 10 has an invalid length. [ 124.573253][ T5508] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 124.832918][ T5515] device syzkaller0 entered promiscuous mode [ 125.191360][ T5523] device syzkaller0 entered promiscuous mode [ 125.788328][ T5537] netlink: 'syz.2.475': attribute type 10 has an invalid length. [ 126.099043][ T5539] netlink: 'syz.3.477': attribute type 10 has an invalid length. [ 126.265184][ T5539] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 126.382593][ T5548] netlink: 'syz.4.479': attribute type 10 has an invalid length. [ 126.494869][ T5548] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 126.776981][ T5556] device syzkaller0 entered promiscuous mode [ 126.820932][ T5562] device syzkaller0 entered promiscuous mode [ 127.217736][ T5564] netlink: 'syz.2.484': attribute type 10 has an invalid length. [ 127.263903][ T5564] __nla_validate_parse: 7 callbacks suppressed [ 127.263923][ T5564] netlink: 55 bytes leftover after parsing attributes in process `syz.2.484'. [ 127.342227][ T5575] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.484'. [ 127.416423][ T5575] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 127.438308][ T5573] netlink: 'syz.4.486': attribute type 10 has an invalid length. [ 127.457039][ T5573] netlink: 156 bytes leftover after parsing attributes in process `syz.4.486'. [ 127.611781][ T5580] netlink: 156 bytes leftover after parsing attributes in process `syz.3.488'. [ 127.798899][ T5587] netlink: 209852 bytes leftover after parsing attributes in process `syz.2.490'. [ 128.025425][ T5591] validate_nla: 1 callbacks suppressed [ 128.025462][ T5591] netlink: 'syz.4.495': attribute type 10 has an invalid length. [ 128.079690][ T5591] netlink: 156 bytes leftover after parsing attributes in process `syz.4.495'. [ 128.140894][ T5596] netlink: 'syz.0.494': attribute type 10 has an invalid length. [ 128.245026][ T5596] netlink: 55 bytes leftover after parsing attributes in process `syz.0.494'. [ 128.757395][ T5604] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.494'. [ 128.802354][ T5607] netlink: 'syz.2.501': attribute type 10 has an invalid length. [ 128.806263][ T5604] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 128.822984][ T5607] netlink: 156 bytes leftover after parsing attributes in process `syz.2.501'. [ 128.838108][ T5608] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.500'. [ 128.892849][ T5605] netlink: 'syz.3.500': attribute type 10 has an invalid length. [ 128.915622][ T5608] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 128.988024][ T5610] netlink: 'syz.4.502': attribute type 10 has an invalid length. [ 129.070537][ T5610] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 129.801248][ T5633] netlink: 'syz.2.510': attribute type 3 has an invalid length. [ 129.964415][ T5638] netlink: 'syz.0.512': attribute type 10 has an invalid length. [ 130.385821][ T5652] netlink: 'syz.2.515': attribute type 10 has an invalid length. [ 130.571331][ T5645] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 131.155051][ T5662] netlink: 'syz.2.522': attribute type 10 has an invalid length. [ 131.206895][ T5662] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 132.156233][ T5683] netlink: 'syz.0.528': attribute type 3 has an invalid length. [ 132.706867][ T1422] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.713278][ T1422] ieee802154 phy1 wpan1: encryption failed: -22 [ 132.811437][ T5693] __nla_validate_parse: 10 callbacks suppressed [ 132.811456][ T5693] netlink: 55 bytes leftover after parsing attributes in process `syz.3.535'. [ 133.105631][ T5697] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.535'. [ 133.193452][ T5697] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 134.549496][ T5714] validate_nla: 1 callbacks suppressed [ 134.549535][ T5714] netlink: 'syz.2.544': attribute type 3 has an invalid length. [ 134.658722][ T5714] netlink: 105116 bytes leftover after parsing attributes in process `syz.2.544'. [ 134.727749][ T5718] netlink: 'syz.3.545': attribute type 10 has an invalid length. [ 134.816305][ T5718] netlink: 55 bytes leftover after parsing attributes in process `syz.3.545'. [ 134.862451][ T5727] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.548'. [ 134.889280][ T5727] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 134.999558][ T5725] netlink: 'syz.4.548': attribute type 10 has an invalid length. [ 135.080620][ T5725] netlink: 55 bytes leftover after parsing attributes in process `syz.4.548'. [ 136.206589][ T5737] device syzkaller0 entered promiscuous mode [ 136.922592][ T5752] netlink: 'syz.4.559': attribute type 3 has an invalid length. [ 137.014343][ T5752] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.559'. [ 137.196284][ T5757] netlink: 'syz.2.561': attribute type 10 has an invalid length. [ 137.246406][ T5757] netlink: 55 bytes leftover after parsing attributes in process `syz.2.561'. [ 137.378104][ T5757] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.561'. [ 137.472429][ T5757] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 138.792184][ T5784] netlink: 'syz.0.572': attribute type 10 has an invalid length. [ 138.842259][ T5784] netlink: 156 bytes leftover after parsing attributes in process `syz.0.572'. [ 138.982594][ T5788] netlink: 'syz.2.575': attribute type 3 has an invalid length. [ 139.053340][ T5788] netlink: 105116 bytes leftover after parsing attributes in process `syz.2.575'. [ 139.321865][ T5790] netlink: 'syz.0.576': attribute type 10 has an invalid length. [ 139.345826][ T5790] netlink: 55 bytes leftover after parsing attributes in process `syz.0.576'. [ 139.957879][ T5792] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.576'. [ 139.991093][ T5792] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 140.746559][ T5817] netlink: 'syz.4.586': attribute type 10 has an invalid length. [ 140.771975][ T5815] netlink: 'syz.3.587': attribute type 3 has an invalid length. [ 140.808424][ T5817] netlink: 156 bytes leftover after parsing attributes in process `syz.4.586'. [ 140.823768][ T5815] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.587'. [ 141.022317][ T5822] netlink: 'syz.2.589': attribute type 3 has an invalid length. [ 141.067769][ T5822] netlink: 105116 bytes leftover after parsing attributes in process `syz.2.589'. [ 141.729895][ T5834] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.593'. [ 141.828244][ T5834] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 142.059167][ T5848] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.596'. [ 142.158565][ T5848] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 142.639690][ T5860] netlink: 'syz.2.602': attribute type 3 has an invalid length. [ 142.678827][ T5860] netlink: 105116 bytes leftover after parsing attributes in process `syz.2.602'. [ 142.714571][ T5862] netlink: 'syz.3.603': attribute type 3 has an invalid length. [ 143.005998][ T5868] netlink: 'syz.2.605': attribute type 3 has an invalid length. [ 143.954272][ T5888] __nla_validate_parse: 2 callbacks suppressed [ 143.954293][ T5888] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.610'. [ 143.984717][ T5877] device syzkaller0 entered promiscuous mode [ 144.045868][ T5888] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 144.126639][ T5887] netlink: 'syz.0.610': attribute type 10 has an invalid length. [ 144.158325][ T5889] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.614'. [ 144.175960][ T5887] netlink: 55 bytes leftover after parsing attributes in process `syz.0.610'. [ 144.187488][ T5891] netlink: 'syz.2.615': attribute type 3 has an invalid length. [ 144.197772][ T5889] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 144.221157][ T5891] netlink: 105116 bytes leftover after parsing attributes in process `syz.2.615'. [ 144.744604][ T5899] netlink: 'syz.2.619': attribute type 10 has an invalid length. [ 144.805460][ T5902] netlink: 'syz.3.620': attribute type 3 has an invalid length. [ 144.819949][ T5899] netlink: 55 bytes leftover after parsing attributes in process `syz.2.619'. [ 145.057669][ T5897] netlink: 55 bytes leftover after parsing attributes in process `syz.4.618'. [ 145.158790][ T5905] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.618'. [ 145.169167][ T5902] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.620'. [ 145.194382][ T5905] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 145.487471][ T5910] device syzkaller0 entered promiscuous mode [ 146.102757][ T5923] validate_nla: 1 callbacks suppressed [ 146.109150][ T5923] netlink: 'syz.4.626': attribute type 3 has an invalid length. [ 146.138524][ T5923] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.626'. [ 146.332665][ T5909] chnl_net:caif_netlink_parms(): no params data found [ 146.497568][ T5934] netlink: 'syz.4.629': attribute type 3 has an invalid length. [ 146.555234][ T5934] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.629'. [ 146.746393][ T5929] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 146.993662][ T5909] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.109675][ T5909] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.132063][ T5909] device bridge_slave_0 entered promiscuous mode [ 147.152494][ T5909] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.162263][ T5945] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 147.220419][ T5909] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.287096][ T5909] device bridge_slave_1 entered promiscuous mode [ 147.322797][ T5944] netlink: 'syz.4.632': attribute type 10 has an invalid length. [ 147.403327][ T1324] Bluetooth: hci5: command 0x0409 tx timeout [ 147.444386][ T5909] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 147.503052][ T5909] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 147.608546][ T5909] team0: Port device team_slave_0 added [ 147.792231][ T5909] team0: Port device team_slave_1 added [ 147.945636][ T5909] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 147.952944][ T5909] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 148.015880][ T5909] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 148.035597][ T5909] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 148.063916][ T5909] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 148.100043][ T5909] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 148.323929][ T5909] device hsr_slave_0 entered promiscuous mode [ 148.339153][ T5909] device hsr_slave_1 entered promiscuous mode [ 148.366781][ T5909] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 148.387713][ T5909] Cannot create hsr debugfs directory [ 148.406392][ T5970] netlink: 'syz.3.641': attribute type 10 has an invalid length. [ 148.548525][ T5975] netlink: 'syz.0.642': attribute type 3 has an invalid length. [ 148.710320][ T5970] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 148.930077][ T5981] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 149.037770][ T5909] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 149.048826][ T5986] __nla_validate_parse: 7 callbacks suppressed [ 149.048846][ T5986] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.645'. [ 149.115021][ T5909] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 149.121907][ T5986] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 149.138389][ T5909] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 149.164106][ T5909] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 149.469774][ T5909] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.491105][ T4245] Bluetooth: hci5: command 0x041b tx timeout [ 149.506208][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 149.520452][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.566613][ T5909] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.594112][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 149.613117][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.642095][ T4389] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.649283][ T4389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.698651][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 149.737661][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 149.788792][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.829877][ T4389] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.837028][ T4389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.874018][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 149.941618][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 150.002974][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 150.021537][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 150.050390][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 150.071618][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 150.110141][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 150.154497][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 150.235161][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 150.368142][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 150.384060][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 150.399233][ T5909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 150.519799][ T6015] netlink: 'syz.2.657': attribute type 10 has an invalid length. [ 150.546625][ T6015] netlink: 55 bytes leftover after parsing attributes in process `syz.2.657'. [ 150.612137][ T6015] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.657'. [ 150.663815][ T6015] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 150.839154][ T6014] device syzkaller0 entered promiscuous mode [ 151.293245][ T4193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 151.300965][ T4193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 151.344480][ T5909] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 151.564051][ T4245] Bluetooth: hci5: command 0x040f tx timeout [ 151.900213][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 151.966542][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 152.010529][ T6051] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.667'. [ 152.084274][ T5909] device veth0_vlan entered promiscuous mode [ 152.092584][ T6051] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 152.205248][ T6045] netlink: 'syz.3.667': attribute type 10 has an invalid length. [ 152.247886][ T6057] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.668'. [ 152.258454][ T6045] netlink: 55 bytes leftover after parsing attributes in process `syz.3.667'. [ 152.341005][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 152.364379][ T6057] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 152.384308][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.405788][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.414574][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.422934][ T6053] netlink: 'syz.0.668': attribute type 10 has an invalid length. [ 152.440579][ T6053] netlink: 55 bytes leftover after parsing attributes in process `syz.0.668'. [ 152.499729][ T5909] device veth1_vlan entered promiscuous mode [ 152.519843][ T4193] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 152.580638][ T4193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 152.597553][ T4193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 152.622762][ T5909] device veth0_macvtap entered promiscuous mode [ 152.672687][ T5909] device veth1_macvtap entered promiscuous mode [ 152.728511][ T6066] netlink: 'syz.2.670': attribute type 10 has an invalid length. [ 152.769096][ T6065] netlink: 'syz.3.671': attribute type 3 has an invalid length. [ 152.803762][ T6065] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.671'. [ 152.825057][ T6066] netlink: 55 bytes leftover after parsing attributes in process `syz.2.670'. [ 152.857149][ T5909] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 152.910585][ T5909] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.965334][ T5909] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 153.013729][ T5909] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.044109][ T6062] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.670'. [ 153.089262][ T5909] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 153.101829][ T5909] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.111649][ T6062] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 153.124999][ T5909] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 153.136048][ T5909] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.146430][ T5909] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 153.157604][ T5909] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.188070][ T5909] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 153.205621][ T5909] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 153.216573][ T5909] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.227171][ T5909] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 153.237761][ T5909] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.261973][ T5909] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 153.281710][ T5909] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.294249][ T5909] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 153.332044][ T5909] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.362976][ T5909] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 153.390898][ T5909] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.441902][ T5909] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 153.496872][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 153.515486][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 153.554555][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 153.584568][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 153.609246][ T6081] netlink: 'syz.3.679': attribute type 3 has an invalid length. [ 153.629564][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 153.643344][ T1346] Bluetooth: hci5: command 0x0419 tx timeout [ 153.647598][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 153.674086][ T5909] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 153.695748][ T5909] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 153.705057][ T5909] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 153.747095][ T5909] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.057390][ T6090] netlink: 'syz.2.683': attribute type 10 has an invalid length. [ 154.084687][ T6090] __nla_validate_parse: 1 callbacks suppressed [ 154.084707][ T6090] netlink: 55 bytes leftover after parsing attributes in process `syz.2.683'. [ 154.169891][ T6092] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.683'. [ 154.283365][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 154.291435][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 154.293039][ T6092] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 154.337308][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 154.407038][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 154.426336][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 154.506833][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 154.917735][ T6107] netlink: 'syz.5.616': attribute type 3 has an invalid length. [ 154.939556][ T6107] netlink: 105116 bytes leftover after parsing attributes in process `syz.5.616'. [ 155.086846][ T6114] netlink: 'syz.4.692': attribute type 3 has an invalid length. [ 155.102612][ T6114] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.692'. [ 155.589668][ T6121] netlink: 'syz.4.694': attribute type 10 has an invalid length. [ 155.618271][ T6121] netlink: 55 bytes leftover after parsing attributes in process `syz.4.694'. [ 155.798573][ T6124] netlink: 'syz.2.695': attribute type 10 has an invalid length. [ 155.807061][ T6124] netlink: 55 bytes leftover after parsing attributes in process `syz.2.695'. [ 155.907203][ T6124] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.695'. [ 155.974254][ T6124] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 156.526088][ T6131] device syzkaller0 entered promiscuous mode [ 156.618674][ T6121] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.694'. [ 156.627973][ T6121] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 156.959103][ T6146] netlink: 55 bytes leftover after parsing attributes in process `syz.2.700'. [ 156.997004][ T6146] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.700'. [ 157.107302][ T6146] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 157.170841][ T6152] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 158.831421][ T6178] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 159.195425][ T6182] validate_nla: 3 callbacks suppressed [ 159.195464][ T6182] netlink: 'syz.4.717': attribute type 3 has an invalid length. [ 159.229537][ T6182] __nla_validate_parse: 4 callbacks suppressed [ 159.229575][ T6182] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.717'. [ 166.880064][ T6156] netlink: 'syz.3.707': attribute type 10 has an invalid length. [ 166.890935][ T6156] netlink: 156 bytes leftover after parsing attributes in process `syz.3.707'. [ 166.903541][ T6176] netlink: 'syz.0.715': attribute type 10 has an invalid length. [ 166.911409][ T6176] netlink: 55 bytes leftover after parsing attributes in process `syz.0.715'. [ 167.306714][ T6188] netlink: 'syz.3.719': attribute type 10 has an invalid length. [ 167.323349][ T6188] netlink: 55 bytes leftover after parsing attributes in process `syz.3.719'. [ 167.415780][ T6188] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.719'. [ 167.484963][ T6188] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 167.726111][ T6215] netlink: 830 bytes leftover after parsing attributes in process `syz.2.730'. [ 167.774411][ T6215] device bond_slave_0 entered promiscuous mode [ 167.780878][ T6215] device bond_slave_1 entered promiscuous mode [ 168.000129][ T6227] netlink: 'syz.0.733': attribute type 1 has an invalid length. [ 168.058498][ T6227] netlink: 161700 bytes leftover after parsing attributes in process `syz.0.733'. [ 168.940660][ T6238] netlink: 'syz.2.738': attribute type 10 has an invalid length. [ 169.006368][ T6238] netlink: 55 bytes leftover after parsing attributes in process `syz.2.738'. [ 169.041711][ T6239] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.738'. [ 169.082908][ T6239] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 169.424201][ T6252] netlink: 'syz.5.753': attribute type 3 has an invalid length. [ 169.511464][ T6252] netlink: 105116 bytes leftover after parsing attributes in process `syz.5.753'. [ 169.534887][ T6254] netlink: 'syz.4.743': attribute type 10 has an invalid length. [ 169.554430][ T6254] netlink: 55 bytes leftover after parsing attributes in process `syz.4.743'. [ 170.004458][ T6262] netlink: 'syz.0.744': attribute type 10 has an invalid length. [ 170.207270][ T6254] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 170.244074][ T6262] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 170.994195][ T6281] device syzkaller0 entered promiscuous mode [ 171.361007][ T6294] netlink: 'syz.2.758': attribute type 3 has an invalid length. [ 171.468536][ T6298] netlink: 'syz.3.760': attribute type 1 has an invalid length. [ 171.635933][ T6296] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 172.001456][ T6309] validate_nla: 2 callbacks suppressed [ 172.001488][ T6309] netlink: 'syz.4.765': attribute type 3 has an invalid length. [ 172.064570][ T6309] __nla_validate_parse: 8 callbacks suppressed [ 172.064609][ T6309] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.765'. [ 172.547435][ T6322] netlink: 'syz.3.770': attribute type 10 has an invalid length. [ 172.573733][ T6322] netlink: 55 bytes leftover after parsing attributes in process `syz.3.770'. [ 172.605807][ T6329] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.770'. [ 172.716926][ T6329] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 172.821902][ T6328] netlink: 'syz.5.773': attribute type 10 has an invalid length. [ 172.847589][ T6333] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.773'. [ 172.847618][ T6333] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 172.935897][ T6328] netlink: 55 bytes leftover after parsing attributes in process `syz.5.773'. [ 173.220450][ T6340] netlink: 'syz.3.777': attribute type 10 has an invalid length. [ 173.270509][ T6340] netlink: 156 bytes leftover after parsing attributes in process `syz.3.777'. [ 173.293306][ T6339] netlink: 'syz.2.776': attribute type 10 has an invalid length. [ 173.332423][ T6339] netlink: 156 bytes leftover after parsing attributes in process `syz.2.776'. [ 173.558304][ T6344] netlink: 'syz.0.778': attribute type 10 has an invalid length. [ 173.585638][ T6353] netlink: 'syz.5.781': attribute type 1 has an invalid length. [ 173.594221][ T6354] FAULT_INJECTION: forcing a failure. [ 173.594221][ T6354] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 173.608745][ T6344] netlink: 55 bytes leftover after parsing attributes in process `syz.0.778'. [ 173.704356][ T6353] netlink: 161700 bytes leftover after parsing attributes in process `syz.5.781'. [ 173.713880][ T6354] CPU: 0 PID: 6354 Comm: syz.3.780 Not tainted 5.15.178-syzkaller #0 [ 173.721982][ T6354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 173.732069][ T6354] Call Trace: [ 173.735363][ T6354] [ 173.738304][ T6354] dump_stack_lvl+0x1e3/0x2d0 [ 173.743024][ T6354] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 173.748682][ T6354] ? panic+0x860/0x860 [ 173.752788][ T6354] ? snprintf+0xd6/0x120 [ 173.757060][ T6354] should_fail+0x38a/0x4c0 [ 173.761507][ T6354] _copy_to_user+0x2d/0x130 [ 173.766036][ T6354] simple_read_from_buffer+0xc6/0x150 [ 173.771450][ T6354] proc_fail_nth_read+0x1a3/0x210 [ 173.776508][ T6354] ? proc_fault_inject_write+0x390/0x390 [ 173.782175][ T6354] ? fsnotify_perm+0x442/0x590 [ 173.786965][ T6354] ? proc_fault_inject_write+0x390/0x390 [ 173.792626][ T6354] vfs_read+0x2fc/0xe10 [ 173.796818][ T6354] ? kernel_read+0x1f0/0x1f0 [ 173.801443][ T6354] ? __fget_files+0x413/0x480 [ 173.806155][ T6354] ? mutex_lock_nested+0x17/0x20 [ 173.811116][ T6354] ? __fdget_pos+0x2cb/0x380 [ 173.815742][ T6354] ? ksys_read+0x77/0x2c0 [ 173.820098][ T6354] ksys_read+0x1a2/0x2c0 [ 173.824368][ T6354] ? print_irqtrace_events+0x210/0x210 [ 173.829852][ T6354] ? vfs_write+0xe50/0xe50 [ 173.834299][ T6354] ? syscall_enter_from_user_mode+0x2e/0x240 [ 173.840302][ T6354] ? lockdep_hardirqs_on+0x94/0x130 [ 173.845528][ T6354] ? syscall_enter_from_user_mode+0x2e/0x240 [ 173.851540][ T6354] do_syscall_64+0x3b/0xb0 [ 173.855978][ T6354] ? clear_bhb_loop+0x15/0x70 [ 173.860682][ T6354] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 173.866604][ T6354] RIP: 0033:0x7fb470e27b7c [ 173.871043][ T6354] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 173.890672][ T6354] RSP: 002b:00007fb46ec71030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 173.899132][ T6354] RAX: ffffffffffffffda RBX: 00007fb471042080 RCX: 00007fb470e27b7c [ 173.907130][ T6354] RDX: 000000000000000f RSI: 00007fb46ec710a0 RDI: 0000000000000006 [ 173.908473][ T6344] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.778'. [ 173.915200][ T6354] RBP: 00007fb46ec71090 R08: 0000000000000000 R09: 0000000000000000 [ 173.915242][ T6354] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.915256][ T6354] R13: 0000000000000001 R14: 00007fb471042080 R15: 00007fffef47ffd8 [ 173.915292][ T6354] [ 174.193568][ T6344] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 174.479373][ T6359] netlink: 'syz.3.784': attribute type 3 has an invalid length. [ 174.907920][ T6369] netlink: 'syz.5.788': attribute type 10 has an invalid length. [ 175.091241][ T6369] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 175.339750][ T6384] netlink: 'syz.3.793': attribute type 10 has an invalid length. [ 175.716100][ T6386] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 175.951939][ T6400] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 176.577558][ T6422] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 176.840936][ T6431] delete_channel: no stack [ 176.879932][ T6431] delete_channel: no stack [ 177.290660][ T6439] validate_nla: 6 callbacks suppressed [ 177.290676][ T6439] netlink: 'syz.4.815': attribute type 10 has an invalid length. [ 177.345343][ T6437] __nla_validate_parse: 13 callbacks suppressed [ 177.345363][ T6437] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.812'. [ 177.370391][ T6439] netlink: 55 bytes leftover after parsing attributes in process `syz.4.815'. [ 177.416449][ T6448] netlink: 'syz.5.817': attribute type 3 has an invalid length. [ 177.431435][ T6437] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 177.474928][ T6448] netlink: 105116 bytes leftover after parsing attributes in process `syz.5.817'. [ 177.490282][ T6436] netlink: 'syz.3.812': attribute type 10 has an invalid length. [ 177.500728][ T6449] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.815'. [ 177.510001][ T6436] netlink: 55 bytes leftover after parsing attributes in process `syz.3.812'. [ 177.536933][ T6449] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 177.751617][ T6461] FAULT_INJECTION: forcing a failure. [ 177.751617][ T6461] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 177.921203][ T6461] CPU: 0 PID: 6461 Comm: syz.3.822 Not tainted 5.15.178-syzkaller #0 [ 177.929330][ T6461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 177.939428][ T6461] Call Trace: [ 177.942729][ T6461] [ 177.945686][ T6461] dump_stack_lvl+0x1e3/0x2d0 [ 177.950396][ T6461] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 177.956065][ T6461] ? panic+0x860/0x860 [ 177.960186][ T6461] ? perf_trace_lock+0x138/0x440 [ 177.965168][ T6461] should_fail+0x38a/0x4c0 [ 177.969738][ T6461] strncpy_from_user+0x32/0x370 [ 177.974647][ T6461] bpf_raw_tracepoint_open+0x32f/0x750 [ 177.980140][ T6461] ? bpf_obj_get_info_by_fd+0x3e10/0x3e10 [ 177.985887][ T6461] ? __lock_acquire+0x1ff0/0x1ff0 [ 177.986085][ T6457] device syzkaller0 entered promiscuous mode [ 177.990947][ T6461] ? __might_fault+0xb4/0x110 [ 177.990978][ T6461] ? bpf_lsm_bpf+0x5/0x10 [ 178.005951][ T6461] ? security_bpf+0x7d/0xa0 [ 178.010483][ T6461] __sys_bpf+0x468/0x670 [ 178.014758][ T6461] ? bpf_link_show_fdinfo+0x300/0x300 [ 178.020180][ T6461] ? syscall_enter_from_user_mode+0x2e/0x240 [ 178.026184][ T6461] ? lockdep_hardirqs_on+0x94/0x130 [ 178.031414][ T6461] __x64_sys_bpf+0x78/0x90 [ 178.035861][ T6461] do_syscall_64+0x3b/0xb0 [ 178.040294][ T6461] ? clear_bhb_loop+0x15/0x70 [ 178.044997][ T6461] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 178.050912][ T6461] RIP: 0033:0x7fb470e29169 [ 178.055348][ T6461] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 178.075066][ T6461] RSP: 002b:00007fb46ec92038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 178.083511][ T6461] RAX: ffffffffffffffda RBX: 00007fb471041fa0 RCX: 00007fb470e29169 [ 178.091599][ T6461] RDX: 0000000000000010 RSI: 0000400000000080 RDI: 0000000000000011 [ 178.099682][ T6461] RBP: 00007fb46ec92090 R08: 0000000000000000 R09: 0000000000000000 [ 178.107680][ T6461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 178.115718][ T6461] R13: 0000000000000000 R14: 00007fb471041fa0 R15: 00007fffef47ffd8 [ 178.123738][ T6461] [ 178.131459][ T6465] netlink: 'syz.4.823': attribute type 10 has an invalid length. [ 178.147104][ T6465] netlink: 55 bytes leftover after parsing attributes in process `syz.4.823'. [ 178.149161][ T6467] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.823'. [ 178.260148][ T6467] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 179.105193][ T6484] netlink: 'syz.3.830': attribute type 3 has an invalid length. [ 179.126698][ T6483] netlink: 'syz.2.832': attribute type 3 has an invalid length. [ 179.144012][ T6484] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.830'. [ 179.164604][ T6483] netlink: 105116 bytes leftover after parsing attributes in process `syz.2.832'. [ 179.341363][ T6494] netlink: 'syz.4.833': attribute type 10 has an invalid length. [ 179.436366][ T6494] netlink: 55 bytes leftover after parsing attributes in process `syz.4.833'. [ 179.843826][ T6491] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 180.120831][ T6502] netlink: 'syz.0.838': attribute type 10 has an invalid length. [ 180.269102][ T6510] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 180.310236][ T6512] netlink: 'syz.2.843': attribute type 10 has an invalid length. [ 180.640784][ T6519] netlink: 'syz.3.847': attribute type 3 has an invalid length. [ 180.681570][ T6525] device lo entered promiscuous mode [ 181.108118][ T6529] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 182.360272][ T6565] validate_nla: 3 callbacks suppressed [ 182.360291][ T6565] netlink: 'syz.5.866': attribute type 10 has an invalid length. [ 182.462276][ T6565] __nla_validate_parse: 6 callbacks suppressed [ 182.462292][ T6565] netlink: 55 bytes leftover after parsing attributes in process `syz.5.866'. [ 182.608611][ T6566] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.866'. [ 182.671212][ T6566] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 182.995192][ T6580] netlink: 'syz.5.873': attribute type 10 has an invalid length. [ 183.025283][ T6580] netlink: 156 bytes leftover after parsing attributes in process `syz.5.873'. [ 183.249674][ T6584] netlink: 'syz.3.874': attribute type 10 has an invalid length. [ 183.275389][ T6584] netlink: 156 bytes leftover after parsing attributes in process `syz.3.874'. [ 183.294426][ T6586] FAULT_INJECTION: forcing a failure. [ 183.294426][ T6586] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 183.376034][ T6586] CPU: 0 PID: 6586 Comm: syz.2.875 Not tainted 5.15.178-syzkaller #0 [ 183.384147][ T6586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 183.394225][ T6586] Call Trace: [ 183.397528][ T6586] [ 183.400472][ T6586] dump_stack_lvl+0x1e3/0x2d0 [ 183.405168][ T6586] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 183.410816][ T6586] ? panic+0x860/0x860 [ 183.414943][ T6586] should_fail+0x38a/0x4c0 [ 183.419384][ T6586] strncpy_from_user+0x32/0x370 [ 183.424257][ T6586] bpf_prog_load+0x185/0x1b60 [ 183.428960][ T6586] ? map_freeze+0x360/0x360 [ 183.433474][ T6586] ? __might_fault+0xb8/0x110 [ 183.438182][ T6586] ? __might_fault+0xb4/0x110 [ 183.442875][ T6586] ? bpf_lsm_bpf+0x5/0x10 [ 183.447215][ T6586] ? security_bpf+0x7d/0xa0 [ 183.451754][ T6586] __sys_bpf+0x343/0x670 [ 183.456014][ T6586] ? bpf_link_show_fdinfo+0x300/0x300 [ 183.461421][ T6586] ? syscall_enter_from_user_mode+0x2e/0x240 [ 183.467436][ T6586] ? lockdep_hardirqs_on+0x94/0x130 [ 183.472651][ T6586] __x64_sys_bpf+0x78/0x90 [ 183.477087][ T6586] do_syscall_64+0x3b/0xb0 [ 183.481514][ T6586] ? clear_bhb_loop+0x15/0x70 [ 183.486201][ T6586] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 183.492114][ T6586] RIP: 0033:0x7f605c5b2169 [ 183.496541][ T6586] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 183.516154][ T6586] RSP: 002b:00007f605a41b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 183.524584][ T6586] RAX: ffffffffffffffda RBX: 00007f605c7cafa0 RCX: 00007f605c5b2169 [ 183.532601][ T6586] RDX: 0000000000000080 RSI: 0000400000000600 RDI: 0000000000000005 [ 183.540578][ T6586] RBP: 00007f605a41b090 R08: 0000000000000000 R09: 0000000000000000 [ 183.548555][ T6586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 183.556533][ T6586] R13: 0000000000000000 R14: 00007f605c7cafa0 R15: 00007ffcc0bdf178 [ 183.564530][ T6586] [ 184.189663][ T6616] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.883'. [ 184.323729][ T6616] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 184.571036][ T6611] netlink: 'syz.4.883': attribute type 10 has an invalid length. [ 184.583292][ T6611] netlink: 55 bytes leftover after parsing attributes in process `syz.4.883'. [ 184.610710][ T6621] FAULT_INJECTION: forcing a failure. [ 184.610710][ T6621] name failslab, interval 1, probability 0, space 0, times 1 [ 184.624748][ T6621] CPU: 1 PID: 6621 Comm: syz.5.886 Not tainted 5.15.178-syzkaller #0 [ 184.632857][ T6621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 184.642937][ T6621] Call Trace: [ 184.646235][ T6621] [ 184.649184][ T6621] dump_stack_lvl+0x1e3/0x2d0 [ 184.653893][ T6621] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 184.659555][ T6621] ? panic+0x860/0x860 [ 184.663652][ T6621] ? __might_sleep+0xc0/0xc0 [ 184.668321][ T6621] ? perf_trace_lock+0x138/0x440 [ 184.673288][ T6621] should_fail+0x38a/0x4c0 [ 184.677731][ T6621] should_failslab+0x5/0x20 [ 184.682257][ T6621] slab_pre_alloc_hook+0x53/0xc0 [ 184.687230][ T6621] __kmalloc+0x6e/0x300 [ 184.691403][ T6621] ? bpf_prog_test_run_flow_dissector+0x2f3/0x860 [ 184.697844][ T6621] bpf_prog_test_run_flow_dissector+0x2f3/0x860 [ 184.704128][ T6621] ? xdp_convert_buff_to_md+0x1e0/0x1e0 [ 184.709722][ T6621] ? xdp_convert_buff_to_md+0x1e0/0x1e0 [ 184.715289][ T6621] bpf_prog_test_run+0x32f/0x3a0 [ 184.720252][ T6621] __sys_bpf+0x3ac/0x670 [ 184.724522][ T6621] ? bpf_link_show_fdinfo+0x300/0x300 [ 184.729932][ T6621] ? syscall_enter_from_user_mode+0x2e/0x240 [ 184.735930][ T6621] ? lockdep_hardirqs_on+0x94/0x130 [ 184.741141][ T6621] __x64_sys_bpf+0x78/0x90 [ 184.745568][ T6621] do_syscall_64+0x3b/0xb0 [ 184.750212][ T6621] ? clear_bhb_loop+0x15/0x70 [ 184.754916][ T6621] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 184.760831][ T6621] RIP: 0033:0x7fd3bbc7d169 [ 184.765258][ T6621] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 184.784868][ T6621] RSP: 002b:00007fd3b9ae6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 184.793292][ T6621] RAX: ffffffffffffffda RBX: 00007fd3bbe95fa0 RCX: 00007fd3bbc7d169 [ 184.801272][ T6621] RDX: 000000000000004c RSI: 0000400000000240 RDI: 000000000000000a [ 184.809252][ T6621] RBP: 00007fd3b9ae6090 R08: 0000000000000000 R09: 0000000000000000 [ 184.817223][ T6621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 184.825194][ T6621] R13: 0000000000000000 R14: 00007fd3bbe95fa0 R15: 00007ffd87071e48 [ 184.833200][ T6621] [ 184.906489][ T6612] device syzkaller0 entered promiscuous mode [ 185.051367][ T6625] netlink: 'syz.5.888': attribute type 10 has an invalid length. [ 185.133364][ T6625] netlink: 156 bytes leftover after parsing attributes in process `syz.5.888'. [ 185.454195][ T6634] netlink: 'syz.5.891': attribute type 10 has an invalid length. [ 185.511022][ T6634] netlink: 156 bytes leftover after parsing attributes in process `syz.5.891'. [ 185.848362][ T6647] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 185.963292][ T4244] Bluetooth: hci1: command 0x0406 tx timeout [ 185.963395][ T4216] Bluetooth: hci3: command 0x0406 tx timeout [ 185.969339][ T4244] Bluetooth: hci0: command 0x0406 tx timeout [ 185.994453][ T4216] Bluetooth: hci2: command 0x0406 tx timeout [ 186.001379][ T6649] netlink: 'syz.3.899': attribute type 10 has an invalid length. [ 186.015858][ T6649] netlink: 156 bytes leftover after parsing attributes in process `syz.3.899'. [ 186.194492][ T6654] netlink: 'syz.3.901': attribute type 10 has an invalid length. [ 186.202461][ T6654] netlink: 156 bytes leftover after parsing attributes in process `syz.3.901'. [ 186.710461][ T6671] netlink: 'syz.4.909': attribute type 10 has an invalid length. [ 186.761849][ T6671] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 187.340892][ T6681] netlink: 'syz.2.912': attribute type 10 has an invalid length. [ 187.575764][ T6687] netlink: 'syz.2.913': attribute type 10 has an invalid length. [ 187.636613][ T6687] __nla_validate_parse: 3 callbacks suppressed [ 187.636630][ T6687] netlink: 156 bytes leftover after parsing attributes in process `syz.2.913'. [ 187.767527][ T6689] netlink: 'syz.0.915': attribute type 10 has an invalid length. [ 187.793344][ T6689] netlink: 156 bytes leftover after parsing attributes in process `syz.0.915'. [ 189.630895][ T6716] netlink: 'syz.4.921': attribute type 10 has an invalid length. [ 189.642663][ T6716] netlink: 55 bytes leftover after parsing attributes in process `syz.4.921'. [ 189.665605][ T6716] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.921'. [ 189.958362][ T6716] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 191.330870][ T6737] netlink: 'syz.4.930': attribute type 10 has an invalid length. [ 191.414323][ T6737] netlink: 156 bytes leftover after parsing attributes in process `syz.4.930'. [ 191.652580][ T6739] netlink: 'syz.5.931': attribute type 10 has an invalid length. [ 191.681486][ T6739] netlink: 55 bytes leftover after parsing attributes in process `syz.5.931'. [ 191.706274][ T6746] FAULT_INJECTION: forcing a failure. [ 191.706274][ T6746] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 191.739596][ T6748] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.931'. [ 191.757360][ T6746] CPU: 0 PID: 6746 Comm: syz.2.932 Not tainted 5.15.178-syzkaller #0 [ 191.765475][ T6746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 191.775555][ T6746] Call Trace: [ 191.778856][ T6746] [ 191.781801][ T6746] dump_stack_lvl+0x1e3/0x2d0 [ 191.786514][ T6746] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 191.792203][ T6746] ? panic+0x860/0x860 [ 191.796319][ T6746] should_fail+0x38a/0x4c0 [ 191.800773][ T6746] strncpy_from_user+0x32/0x370 [ 191.805662][ T6746] bpf_prog_load+0x185/0x1b60 [ 191.810377][ T6746] ? map_freeze+0x360/0x360 [ 191.814904][ T6746] ? __might_fault+0xb8/0x110 [ 191.819742][ T6746] ? __might_fault+0xb4/0x110 [ 191.824452][ T6746] ? bpf_lsm_bpf+0x5/0x10 [ 191.828781][ T6746] ? security_bpf+0x7d/0xa0 [ 191.833285][ T6746] __sys_bpf+0x343/0x670 [ 191.837533][ T6746] ? bpf_link_show_fdinfo+0x300/0x300 [ 191.842918][ T6746] ? syscall_enter_from_user_mode+0x2e/0x240 [ 191.848897][ T6746] ? lockdep_hardirqs_on+0x94/0x130 [ 191.854100][ T6746] __x64_sys_bpf+0x78/0x90 [ 191.858523][ T6746] do_syscall_64+0x3b/0xb0 [ 191.862936][ T6746] ? clear_bhb_loop+0x15/0x70 [ 191.867611][ T6746] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 191.873509][ T6746] RIP: 0033:0x7f605c5b2169 [ 191.877924][ T6746] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 191.897619][ T6746] RSP: 002b:00007f605a41b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 191.906125][ T6746] RAX: ffffffffffffffda RBX: 00007f605c7cafa0 RCX: 00007f605c5b2169 [ 191.914119][ T6746] RDX: 0000000000000080 RSI: 0000400000000280 RDI: 0000000000000005 [ 191.922084][ T6746] RBP: 00007f605a41b090 R08: 0000000000000000 R09: 0000000000000000 [ 191.930057][ T6746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 191.938039][ T6746] R13: 0000000000000000 R14: 00007f605c7cafa0 R15: 00007ffcc0bdf178 [ 191.946039][ T6746] [ 191.983631][ T6748] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 192.080348][ T6753] sctp: [Deprecated]: syz.4.937 (pid 6753) Use of int in max_burst socket option deprecated. [ 192.080348][ T6753] Use struct sctp_assoc_value instead [ 192.689510][ T6761] netlink: 'syz.4.941': attribute type 10 has an invalid length. [ 192.711247][ T6761] netlink: 55 bytes leftover after parsing attributes in process `syz.4.941'. [ 192.742748][ T6769] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.941'. [ 192.770742][ T6769] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 192.919882][ T6775] FAULT_INJECTION: forcing a failure. [ 192.919882][ T6775] name failslab, interval 1, probability 0, space 0, times 0 [ 192.971208][ T6775] CPU: 0 PID: 6775 Comm: syz.3.949 Not tainted 5.15.178-syzkaller #0 [ 192.979323][ T6775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 192.989398][ T6775] Call Trace: [ 192.992694][ T6775] [ 192.995640][ T6775] dump_stack_lvl+0x1e3/0x2d0 [ 193.000344][ T6775] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 193.005998][ T6775] ? panic+0x860/0x860 [ 193.010087][ T6775] ? __might_sleep+0xc0/0xc0 [ 193.014699][ T6775] should_fail+0x38a/0x4c0 [ 193.019166][ T6775] should_failslab+0x5/0x20 [ 193.023690][ T6775] slab_pre_alloc_hook+0x53/0xc0 [ 193.028650][ T6775] __kmalloc+0x6e/0x300 [ 193.032817][ T6775] ? tomoyo_encode+0x26b/0x530 [ 193.037951][ T6775] tomoyo_encode+0x26b/0x530 [ 193.042558][ T6775] ? anon_inodefs_init_fs_context+0x60/0x60 [ 193.048563][ T6775] tomoyo_realpath_from_path+0x5a2/0x5e0 [ 193.054247][ T6775] tomoyo_path_number_perm+0x225/0x810 [ 193.059746][ T6775] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 193.065278][ T6775] ? __fget_files+0x413/0x480 [ 193.069993][ T6775] security_file_ioctl+0x6d/0xa0 [ 193.074961][ T6775] __se_sys_ioctl+0x47/0x160 [ 193.079587][ T6775] do_syscall_64+0x3b/0xb0 [ 193.084019][ T6775] ? clear_bhb_loop+0x15/0x70 [ 193.088713][ T6775] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 193.094623][ T6775] RIP: 0033:0x7fb470e29169 [ 193.099058][ T6775] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 193.118683][ T6775] RSP: 002b:00007fb46ec92038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 193.127123][ T6775] RAX: ffffffffffffffda RBX: 00007fb471041fa0 RCX: 00007fb470e29169 [ 193.135123][ T6775] RDX: 0000000000000000 RSI: 0000000000002400 RDI: 0000000000000004 [ 193.143671][ T6775] RBP: 00007fb46ec92090 R08: 0000000000000000 R09: 0000000000000000 [ 193.151749][ T6775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 193.159736][ T6775] R13: 0000000000000000 R14: 00007fb471041fa0 R15: 00007fffef47ffd8 [ 193.167747][ T6775] [ 193.310837][ T6786] sctp: [Deprecated]: syz.2.952 (pid 6786) Use of int in max_burst socket option deprecated. [ 193.310837][ T6786] Use struct sctp_assoc_value instead [ 193.441439][ T6778] device syzkaller0 entered promiscuous mode [ 193.475648][ T6775] ERROR: Out of memory at tomoyo_realpath_from_path. [ 193.869259][ T6796] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.953'. [ 193.940258][ T6796] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 194.984235][ T1422] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.990563][ T1422] ieee802154 phy1 wpan1: encryption failed: -22 [ 195.563279][ T4245] Bluetooth: hci1: command 0x0409 tx timeout [ 195.841906][ T6795] netlink: 'syz.5.953': attribute type 10 has an invalid length. [ 195.857701][ T6795] netlink: 55 bytes leftover after parsing attributes in process `syz.5.953'. [ 196.069821][ T6811] FAULT_INJECTION: forcing a failure. [ 196.069821][ T6811] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 196.130257][ T6811] CPU: 1 PID: 6811 Comm: syz.5.958 Not tainted 5.15.178-syzkaller #0 [ 196.138372][ T6811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 196.148537][ T6811] Call Trace: [ 196.151834][ T6811] [ 196.154782][ T6811] dump_stack_lvl+0x1e3/0x2d0 [ 196.159484][ T6811] ? unwind_next_frame+0x1437/0x1fa0 [ 196.164805][ T6811] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 196.170762][ T6811] ? panic+0x860/0x860 [ 196.174967][ T6811] ? mark_lock+0x98/0x340 [ 196.179329][ T6811] should_fail+0x38a/0x4c0 [ 196.183778][ T6811] prepare_alloc_pages+0x1db/0x5b0 [ 196.188924][ T6811] __alloc_pages+0x14f/0x700 [ 196.193544][ T6811] ? __rmqueue_pcplist+0x23a0/0x23a0 [ 196.198856][ T6811] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 196.204865][ T6811] ? alloc_pages+0x458/0x570 [ 196.209685][ T6811] new_slab+0xbb/0x4b0 [ 196.213787][ T6811] ___slab_alloc+0x6f6/0xe10 [ 196.218400][ T6811] ? tomoyo_realpath_from_path+0xd8/0x5e0 [ 196.224146][ T6811] __kmalloc+0x1c9/0x300 [ 196.228413][ T6811] ? tomoyo_realpath_from_path+0xd8/0x5e0 [ 196.234200][ T6811] tomoyo_realpath_from_path+0xd8/0x5e0 [ 196.239784][ T6811] tomoyo_path_number_perm+0x225/0x810 [ 196.245281][ T6811] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 196.250808][ T6811] ? __fget_files+0x413/0x480 [ 196.255522][ T6811] security_file_ioctl+0x6d/0xa0 [ 196.260481][ T6811] __se_sys_ioctl+0x47/0x160 [ 196.265095][ T6811] do_syscall_64+0x3b/0xb0 [ 196.269546][ T6811] ? clear_bhb_loop+0x15/0x70 [ 196.274242][ T6811] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 196.280162][ T6811] RIP: 0033:0x7fd3bbc7d169 [ 196.284599][ T6811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 196.304226][ T6811] RSP: 002b:00007fd3b9ae6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 196.312768][ T6811] RAX: ffffffffffffffda RBX: 00007fd3bbe95fa0 RCX: 00007fd3bbc7d169 [ 196.320762][ T6811] RDX: 00000000000000a9 RSI: 0000000000002403 RDI: 0000000000000003 [ 196.328779][ T6811] RBP: 00007fd3b9ae6090 R08: 0000000000000000 R09: 0000000000000000 [ 196.336771][ T6811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 196.344760][ T6811] R13: 0000000000000000 R14: 00007fd3bbe95fa0 R15: 00007ffd87071e48 [ 196.352769][ T6811] [ 196.353453][ T6808] device syzkaller0 entered promiscuous mode [ 196.632268][ T6821] netlink: 'syz.3.963': attribute type 10 has an invalid length. [ 196.641026][ T6821] netlink: 156 bytes leftover after parsing attributes in process `syz.3.963'. [ 196.651904][ T6824] netlink: 'syz.5.964': attribute type 10 has an invalid length. [ 196.660885][ T6824] netlink: 156 bytes leftover after parsing attributes in process `syz.5.964'. [ 196.782204][ T6787] chnl_net:caif_netlink_parms(): no params data found [ 197.073915][ T6849] sctp: [Deprecated]: syz.3.969 (pid 6849) Use of int in max_burst socket option deprecated. [ 197.073915][ T6849] Use struct sctp_assoc_value instead [ 197.304103][ T6787] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.311229][ T6787] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.330397][ T6787] device bridge_slave_0 entered promiscuous mode [ 197.341186][ T6856] FAULT_INJECTION: forcing a failure. [ 197.341186][ T6856] name failslab, interval 1, probability 0, space 0, times 0 [ 197.354993][ T6853] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.357554][ T6856] CPU: 1 PID: 6856 Comm: syz.2.975 Not tainted 5.15.178-syzkaller #0 [ 197.364024][ T6853] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.370356][ T6856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 197.370373][ T6856] Call Trace: [ 197.370380][ T6856] [ 197.370388][ T6856] dump_stack_lvl+0x1e3/0x2d0 [ 197.370419][ T6856] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 197.370442][ T6856] ? panic+0x860/0x860 [ 197.408064][ T6856] ? __might_sleep+0xc0/0xc0 [ 197.412687][ T6856] ? __lock_acquire+0x1295/0x1ff0 [ 197.417748][ T6856] should_fail+0x38a/0x4c0 [ 197.422190][ T6856] should_failslab+0x5/0x20 [ 197.426231][ T6854] ÿÿÿÿÿÿ: renamed from bridge0 [ 197.426708][ T6856] slab_pre_alloc_hook+0x53/0xc0 [ 197.426744][ T6856] __kmalloc+0x6e/0x300 [ 197.440585][ T6856] ? bpf_test_init+0xf8/0x1b0 [ 197.445289][ T6856] bpf_test_init+0xf8/0x1b0 [ 197.449821][ T6856] bpf_prog_test_run_skb+0x268/0x1420 [ 197.455243][ T6856] ? cpu_online+0x70/0x70 [ 197.459608][ T6856] ? cpu_online+0x70/0x70 [ 197.463967][ T6856] bpf_prog_test_run+0x32f/0x3a0 [ 197.468935][ T6856] __sys_bpf+0x3ac/0x670 [ 197.473205][ T6856] ? bpf_link_show_fdinfo+0x300/0x300 [ 197.478613][ T6856] ? syscall_enter_from_user_mode+0x2e/0x240 [ 197.484617][ T6856] ? syscall_enter_from_user_mode+0x2e/0x240 [ 197.490614][ T6856] ? lockdep_hardirqs_on+0x94/0x130 [ 197.495835][ T6856] __x64_sys_bpf+0x78/0x90 [ 197.500261][ T6856] do_syscall_64+0x3b/0xb0 [ 197.504678][ T6856] ? clear_bhb_loop+0x15/0x70 [ 197.509613][ T6856] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 197.515512][ T6856] RIP: 0033:0x7f605c5b2169 [ 197.519940][ T6856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 197.539558][ T6856] RSP: 002b:00007f605a41b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 197.547976][ T6856] RAX: ffffffffffffffda RBX: 00007f605c7cafa0 RCX: 00007f605c5b2169 [ 197.555959][ T6856] RDX: 0000000000000050 RSI: 0000400000000240 RDI: 000000000000000a [ 197.563929][ T6856] RBP: 00007f605a41b090 R08: 0000000000000000 R09: 0000000000000000 [ 197.571916][ T6856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.579904][ T6856] R13: 0000000000000000 R14: 00007f605c7cafa0 R15: 00007ffcc0bdf178 [ 197.587894][ T6856] [ 197.617771][ T6787] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.630691][ T6787] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.653281][ T4216] Bluetooth: hci1: command 0x041b tx timeout [ 197.701890][ T6787] device bridge_slave_1 entered promiscuous mode [ 197.733912][ T6858] netlink: 'syz.2.976': attribute type 10 has an invalid length. [ 197.742090][ T6858] netlink: 156 bytes leftover after parsing attributes in process `syz.2.976'. [ 197.805037][ T6787] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 197.890728][ T6787] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 197.963596][ T6870] syz.5.980 uses obsolete (PF_INET,SOCK_PACKET) [ 198.077538][ T6863] netlink: 'syz.3.979': attribute type 10 has an invalid length. [ 198.105368][ T6863] netlink: 156 bytes leftover after parsing attributes in process `syz.3.979'. [ 198.216876][ T6872] netlink: 4 bytes leftover after parsing attributes in process `syz.4.982'. [ 198.331028][ T6787] team0: Port device team_slave_0 added [ 198.367242][ T6787] team0: Port device team_slave_1 added [ 198.484045][ T6787] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 198.491384][ T6787] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 198.566118][ T6787] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 198.591637][ T6787] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 198.642006][ T6787] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 198.703734][ T6787] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 198.886610][ T6787] device hsr_slave_0 entered promiscuous mode [ 198.903978][ T6787] device hsr_slave_1 entered promiscuous mode [ 198.910867][ T6787] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 198.920149][ T6787] Cannot create hsr debugfs directory [ 198.937077][ T6899] netlink: 'syz.3.990': attribute type 29 has an invalid length. [ 199.002540][ T6899] netlink: 'syz.3.990': attribute type 29 has an invalid length. [ 199.052843][ T6897] netlink: 'syz.4.991': attribute type 10 has an invalid length. [ 199.062842][ T6897] netlink: 156 bytes leftover after parsing attributes in process `syz.4.991'. [ 199.067823][ T6901] sctp: [Deprecated]: syz.5.989 (pid 6901) Use of int in max_burst socket option deprecated. [ 199.067823][ T6901] Use struct sctp_assoc_value instead [ 199.217715][ T6905] FAULT_INJECTION: forcing a failure. [ 199.217715][ T6905] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 199.243189][ T6905] CPU: 0 PID: 6905 Comm: syz.3.993 Not tainted 5.15.178-syzkaller #0 [ 199.251299][ T6905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 199.261373][ T6905] Call Trace: [ 199.264679][ T6905] [ 199.267626][ T6905] dump_stack_lvl+0x1e3/0x2d0 [ 199.272329][ T6905] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 199.277986][ T6905] ? panic+0x860/0x860 [ 199.282088][ T6905] should_fail+0x38a/0x4c0 [ 199.286534][ T6905] strncpy_from_user+0x32/0x370 [ 199.291409][ T6905] bpf_prog_load+0x185/0x1b60 [ 199.296113][ T6905] ? map_freeze+0x360/0x360 [ 199.300641][ T6905] ? __might_fault+0xb8/0x110 [ 199.305353][ T6905] ? __might_fault+0xb4/0x110 [ 199.310049][ T6905] ? bpf_lsm_bpf+0x5/0x10 [ 199.314392][ T6905] ? security_bpf+0x7d/0xa0 [ 199.318914][ T6905] __sys_bpf+0x343/0x670 [ 199.323178][ T6905] ? bpf_link_show_fdinfo+0x300/0x300 [ 199.328585][ T6905] ? syscall_enter_from_user_mode+0x2e/0x240 [ 199.334588][ T6905] ? syscall_enter_from_user_mode+0x2e/0x240 [ 199.340589][ T6905] ? lockdep_hardirqs_on+0x94/0x130 [ 199.345812][ T6905] __x64_sys_bpf+0x78/0x90 [ 199.350261][ T6905] do_syscall_64+0x3b/0xb0 [ 199.354697][ T6905] ? clear_bhb_loop+0x15/0x70 [ 199.359389][ T6905] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 199.365308][ T6905] RIP: 0033:0x7fb470e29169 [ 199.369741][ T6905] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 199.389370][ T6905] RSP: 002b:00007fb46ec92038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 199.397900][ T6905] RAX: ffffffffffffffda RBX: 00007fb471041fa0 RCX: 00007fb470e29169 [ 199.405905][ T6905] RDX: 0000000000000080 RSI: 0000400000000200 RDI: 0000000000000005 [ 199.414032][ T6905] RBP: 00007fb46ec92090 R08: 0000000000000000 R09: 0000000000000000 [ 199.422027][ T6905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 199.430015][ T6905] R13: 0000000000000000 R14: 00007fb471041fa0 R15: 00007fffef47ffd8 [ 199.438022][ T6905] [ 199.467557][ T6787] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 199.489147][ T6787] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 199.534022][ T6787] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 199.559071][ T6787] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 199.676059][ T6914] FAULT_INJECTION: forcing a failure. [ 199.676059][ T6914] name failslab, interval 1, probability 0, space 0, times 0 [ 199.705366][ T6914] CPU: 0 PID: 6914 Comm: syz.4.996 Not tainted 5.15.178-syzkaller #0 [ 199.713472][ T6914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 199.723655][ T6914] Call Trace: [ 199.726943][ T6914] [ 199.729881][ T6914] dump_stack_lvl+0x1e3/0x2d0 [ 199.734586][ T6914] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 199.740240][ T6914] ? panic+0x860/0x860 [ 199.744330][ T6914] ? __might_sleep+0xc0/0xc0 [ 199.748945][ T6914] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 199.754950][ T6914] should_fail+0x38a/0x4c0 [ 199.759397][ T6914] should_failslab+0x5/0x20 [ 199.763925][ T6914] slab_pre_alloc_hook+0x53/0xc0 [ 199.768885][ T6914] __kmalloc+0x6e/0x300 [ 199.773067][ T6914] ? bpf_test_init+0xf8/0x1b0 [ 199.777764][ T6914] bpf_test_init+0xf8/0x1b0 [ 199.782284][ T6914] bpf_prog_test_run_skb+0x268/0x1420 [ 199.787698][ T6914] ? cpu_online+0x70/0x70 [ 199.792054][ T6914] ? cpu_online+0x70/0x70 [ 199.796405][ T6914] bpf_prog_test_run+0x32f/0x3a0 [ 199.801371][ T6914] __sys_bpf+0x3ac/0x670 [ 199.805634][ T6914] ? bpf_link_show_fdinfo+0x300/0x300 [ 199.811067][ T6914] ? trace_hardirqs_on+0x30/0x80 [ 199.816036][ T6914] ? syscall_enter_from_user_mode+0x37/0x240 [ 199.822038][ T6914] __x64_sys_bpf+0x78/0x90 [ 199.826479][ T6914] do_syscall_64+0x3b/0xb0 [ 199.830916][ T6914] ? clear_bhb_loop+0x15/0x70 [ 199.835605][ T6914] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 199.841523][ T6914] RIP: 0033:0x7f8cd3cde169 [ 199.845737][ T6787] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.845948][ T6914] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 199.872303][ T6914] RSP: 002b:00007f8cd1b47038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 199.880741][ T6914] RAX: ffffffffffffffda RBX: 00007f8cd3ef6fa0 RCX: 00007f8cd3cde169 [ 199.888734][ T6914] RDX: 0000000000000050 RSI: 0000400000000180 RDI: 000000000000000a [ 199.889205][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.896717][ T6914] RBP: 00007f8cd1b47090 R08: 0000000000000000 R09: 0000000000000000 [ 199.896735][ T6914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 199.896749][ T6914] R13: 0000000000000000 R14: 00007f8cd3ef6fa0 R15: 00007fff87754b88 [ 199.896781][ T6914] [ 199.924262][ T4216] Bluetooth: hci1: command 0x040f tx timeout [ 200.022347][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.042410][ T6922] netlink: 'syz.3.1002': attribute type 10 has an invalid length. [ 200.052124][ T6922] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1002'. [ 200.071955][ T6920] netlink: 'syz.2.999': attribute type 10 has an invalid length. [ 200.112690][ T6920] netlink: 156 bytes leftover after parsing attributes in process `syz.2.999'. [ 200.136752][ T6787] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.170118][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 200.196990][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.239264][ T4221] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.246481][ T4221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.278419][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 200.300711][ T6930] netlink: 'syz.2.1005': attribute type 40 has an invalid length. [ 200.340605][ T6934] netlink: 16410 bytes leftover after parsing attributes in process `syz.2.1005'. [ 200.351293][ T6928] netlink: 'syz.3.1013': attribute type 10 has an invalid length. [ 200.375634][ T6928] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1013'. [ 200.398933][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 200.463983][ T4221] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.483742][ T4221] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.490841][ T4221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.544721][ T6932] netlink: 'syz.4.1004': attribute type 10 has an invalid length. [ 200.562866][ T6932] netlink: 156 bytes leftover after parsing attributes in process `syz.4.1004'. [ 200.585563][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 200.618199][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 200.683956][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 200.706409][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.762241][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.810384][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.839872][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 200.872386][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.891450][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.909420][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.932045][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.962093][ T6954] netlink: 156 bytes leftover after parsing attributes in process `syz.4.1015'. [ 200.995108][ T6787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 201.331278][ T695] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 201.341307][ T695] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 201.376039][ T6787] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 201.754457][ T6990] FAULT_INJECTION: forcing a failure. [ 201.754457][ T6990] name failslab, interval 1, probability 0, space 0, times 0 [ 201.808344][ T6990] CPU: 0 PID: 6990 Comm: syz.5.1026 Not tainted 5.15.178-syzkaller #0 [ 201.816547][ T6990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 201.827088][ T6990] Call Trace: [ 201.830381][ T6990] [ 201.833322][ T6990] dump_stack_lvl+0x1e3/0x2d0 [ 201.838022][ T6990] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 201.843674][ T6990] ? panic+0x860/0x860 [ 201.847775][ T6990] ? __might_sleep+0xc0/0xc0 [ 201.852477][ T6990] should_fail+0x38a/0x4c0 [ 201.856915][ T6990] should_failslab+0x5/0x20 [ 201.861438][ T6990] slab_pre_alloc_hook+0x53/0xc0 [ 201.866403][ T6990] __kmalloc_node+0x71/0x390 [ 201.871022][ T6990] ? kvmalloc_node+0x80/0x140 [ 201.875737][ T6990] kvmalloc_node+0x80/0x140 [ 201.880271][ T6990] map_get_next_key+0x27b/0x600 [ 201.885141][ T6990] ? bpf_lsm_bpf+0x5/0x10 [ 201.889497][ T6990] __sys_bpf+0x325/0x670 [ 201.893763][ T6990] ? bpf_link_show_fdinfo+0x300/0x300 [ 201.899176][ T6990] ? syscall_enter_from_user_mode+0x2e/0x240 [ 201.905174][ T6990] ? lockdep_hardirqs_on+0x94/0x130 [ 201.910409][ T6990] __x64_sys_bpf+0x78/0x90 [ 201.914853][ T6990] do_syscall_64+0x3b/0xb0 [ 201.919329][ T6990] ? clear_bhb_loop+0x15/0x70 [ 201.924024][ T6990] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 201.929938][ T6990] RIP: 0033:0x7fd3bbc7d169 [ 201.934374][ T6990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 201.954001][ T6990] RSP: 002b:00007fd3b9ae6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 201.962450][ T6990] RAX: ffffffffffffffda RBX: 00007fd3bbe95fa0 RCX: 00007fd3bbc7d169 [ 201.970435][ T6990] RDX: 0000000000000020 RSI: 00004000000000c0 RDI: 0000000000000004 [ 201.978420][ T6990] RBP: 00007fd3b9ae6090 R08: 0000000000000000 R09: 0000000000000000 [ 201.986400][ T6990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 201.994382][ T6990] R13: 0000000000000000 R14: 00007fd3bbe95fa0 R15: 00007ffd87071e48 [ 202.002384][ T6990] [ 202.044720][ T4245] Bluetooth: hci1: command 0x0419 tx timeout [ 202.346921][ T6999] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 202.384170][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 202.401404][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 202.546753][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 202.563608][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 202.598216][ T7010] sctp: [Deprecated]: syz.5.1034 (pid 7010) Use of int in max_burst socket option deprecated. [ 202.598216][ T7010] Use struct sctp_assoc_value instead [ 202.618718][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 202.649250][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 202.682143][ T6787] device veth0_vlan entered promiscuous mode [ 202.716938][ T6787] device veth1_vlan entered promiscuous mode [ 202.890610][ T6787] device veth0_macvtap entered promiscuous mode [ 202.928500][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 202.952728][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 202.966736][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 202.979755][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 202.989381][ T7022] validate_nla: 4 callbacks suppressed [ 202.989418][ T7022] netlink: 'syz.5.1040': attribute type 10 has an invalid length. [ 203.005154][ T7022] __nla_validate_parse: 4 callbacks suppressed [ 203.005193][ T7022] netlink: 156 bytes leftover after parsing attributes in process `syz.5.1040'. [ 203.026517][ T6787] device veth1_macvtap entered promiscuous mode [ 203.045458][ T7028] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.1039'. [ 203.076049][ T7028] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 203.135386][ T7023] netlink: 'syz.2.1039': attribute type 10 has an invalid length. [ 203.164333][ T7023] netlink: 55 bytes leftover after parsing attributes in process `syz.2.1039'. [ 203.178975][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 203.188595][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 203.209485][ T6787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 203.240120][ T6787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.264404][ T6787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 203.275117][ T6787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.285212][ T6787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 203.295862][ T6787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.312771][ T6787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 203.335859][ T6787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.347713][ T6787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 203.358575][ T6787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.368661][ T6787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 203.379286][ T6787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.391403][ T6787] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 203.400495][ T7031] netlink: 'syz.5.1042': attribute type 10 has an invalid length. [ 203.413607][ T7031] netlink: 156 bytes leftover after parsing attributes in process `syz.5.1042'. [ 203.425296][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 203.435064][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 203.467218][ T6787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 203.498207][ T7039] sctp: [Deprecated]: syz.3.1046 (pid 7039) Use of int in max_burst socket option deprecated. [ 203.498207][ T7039] Use struct sctp_assoc_value instead [ 203.510094][ T7038] netlink: 'syz.2.1045': attribute type 29 has an invalid length. [ 203.514388][ T6787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.561877][ T6787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 203.590546][ T6787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.641667][ T6787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 203.684039][ T6787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.720048][ T6787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 203.732906][ T6787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.746599][ T6787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 203.758928][ T6787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.769417][ T6787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 203.781952][ T6787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.793834][ T7048] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.1047'. [ 203.808537][ T6787] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 203.816785][ T7048] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 203.836523][ T6787] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.845426][ T6787] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.860457][ T6787] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.873406][ T6787] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 203.885037][ T7038] netlink: 'syz.2.1045': attribute type 29 has an invalid length. [ 203.894834][ T7041] netlink: 'syz.5.1048': attribute type 10 has an invalid length. [ 203.903840][ T7041] netlink: 156 bytes leftover after parsing attributes in process `syz.5.1048'. [ 203.927265][ T7044] netlink: 'syz.4.1047': attribute type 10 has an invalid length. [ 203.948271][ T7044] netlink: 55 bytes leftover after parsing attributes in process `syz.4.1047'. [ 203.979255][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 203.990483][ T4389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 204.201817][ T4389] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 204.222145][ T7056] netlink: 'syz.2.1051': attribute type 10 has an invalid length. [ 204.245500][ T4389] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 204.254288][ T7056] netlink: 156 bytes leftover after parsing attributes in process `syz.2.1051'. [ 204.288214][ T695] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 204.434190][ T4389] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 204.442313][ T4389] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 204.516249][ T695] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 204.707990][ T7071] sctp: [Deprecated]: syz.2.1058 (pid 7071) Use of int in max_burst socket option deprecated. [ 204.707990][ T7071] Use struct sctp_assoc_value instead [ 204.760955][ T7069] netlink: 'syz.5.1057': attribute type 10 has an invalid length. [ 204.846532][ T7069] netlink: 55 bytes leftover after parsing attributes in process `syz.5.1057'. [ 205.108692][ T7080] netlink: 'syz.3.1061': attribute type 2 has an invalid length. [ 205.135284][ T7080] netlink: 17267 bytes leftover after parsing attributes in process `syz.3.1061'. [ 205.451374][ T7094] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 205.973320][ T7114] sctp: [Deprecated]: syz.3.1074 (pid 7114) Use of int in max_burst socket option deprecated. [ 205.973320][ T7114] Use struct sctp_assoc_value instead [ 206.451578][ T7127] FAULT_INJECTION: forcing a failure. [ 206.451578][ T7127] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 206.484397][ T7127] CPU: 1 PID: 7127 Comm: syz.2.1079 Not tainted 5.15.178-syzkaller #0 [ 206.492603][ T7127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 206.502675][ T7127] Call Trace: [ 206.505963][ T7127] [ 206.508893][ T7127] dump_stack_lvl+0x1e3/0x2d0 [ 206.513583][ T7127] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 206.519220][ T7127] ? panic+0x860/0x860 [ 206.523310][ T7127] should_fail+0x38a/0x4c0 [ 206.527745][ T7127] _copy_from_user+0x2d/0x170 [ 206.532424][ T7127] iovec_from_user+0x13b/0x390 [ 206.537198][ T7127] __import_iovec+0x72/0x4b0 [ 206.541795][ T7127] ? __ia32_sys_shutdown+0x60/0x60 [ 206.546915][ T7127] import_iovec+0xe6/0x120 [ 206.551343][ T7127] ___sys_sendmsg+0x215/0x2e0 [ 206.556024][ T7127] ? __sys_sendmsg+0x260/0x260 [ 206.560799][ T7127] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 206.566952][ T7127] ? lockdep_hardirqs_on+0x94/0x130 [ 206.572164][ T7127] ? __fdget+0x191/0x220 [ 206.576406][ T7127] __se_sys_sendmsg+0x19a/0x260 [ 206.581256][ T7127] ? __x64_sys_sendmsg+0x80/0x80 [ 206.586201][ T7127] ? syscall_enter_from_user_mode+0x2e/0x240 [ 206.592181][ T7127] ? lockdep_hardirqs_on+0x94/0x130 [ 206.597380][ T7127] ? syscall_enter_from_user_mode+0x2e/0x240 [ 206.603390][ T7127] do_syscall_64+0x3b/0xb0 [ 206.607804][ T7127] ? clear_bhb_loop+0x15/0x70 [ 206.612492][ T7127] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 206.618415][ T7127] RIP: 0033:0x7f605c5b2169 [ 206.622859][ T7127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 206.642577][ T7127] RSP: 002b:00007f605a41b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 206.651009][ T7127] RAX: ffffffffffffffda RBX: 00007f605c7cafa0 RCX: 00007f605c5b2169 [ 206.658998][ T7127] RDX: 0000000000000000 RSI: 0000400000000940 RDI: 0000000000000005 [ 206.666968][ T7127] RBP: 00007f605a41b090 R08: 0000000000000000 R09: 0000000000000000 [ 206.674942][ T7127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 206.683983][ T7127] R13: 0000000000000000 R14: 00007f605c7cafa0 R15: 00007ffcc0bdf178 [ 206.691998][ T7127] [ 206.971907][ T7126] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 207.065734][ T7143] bond0: (slave bond_slave_0): Releasing backup interface [ 207.521447][ T7152] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 207.967688][ T7181] FAULT_INJECTION: forcing a failure. [ 207.967688][ T7181] name failslab, interval 1, probability 0, space 0, times 0 [ 208.025939][ T7181] CPU: 1 PID: 7181 Comm: syz.4.1099 Not tainted 5.15.178-syzkaller #0 [ 208.034145][ T7181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 208.044216][ T7181] Call Trace: [ 208.047507][ T7181] [ 208.050454][ T7181] dump_stack_lvl+0x1e3/0x2d0 [ 208.055156][ T7181] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 208.060811][ T7181] ? panic+0x860/0x860 [ 208.064913][ T7181] ? __might_sleep+0xc0/0xc0 [ 208.069522][ T7181] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 208.075699][ T7181] should_fail+0x38a/0x4c0 [ 208.080139][ T7181] should_failslab+0x5/0x20 [ 208.084658][ T7181] slab_pre_alloc_hook+0x53/0xc0 [ 208.089621][ T7181] kmem_cache_alloc_trace+0x49/0x290 [ 208.094924][ T7181] ? dev_map_alloc+0x62/0x500 [ 208.099626][ T7181] dev_map_alloc+0x62/0x500 [ 208.104157][ T7181] map_create+0x446/0x2070 [ 208.108600][ T7181] __sys_bpf+0x276/0x670 [ 208.112869][ T7181] ? bpf_link_show_fdinfo+0x300/0x300 [ 208.118281][ T7181] ? trace_irq_enable_rcuidle+0x158/0x190 [ 208.124024][ T7181] ? syscall_enter_from_user_mode+0x37/0x240 [ 208.130024][ T7181] __x64_sys_bpf+0x78/0x90 [ 208.134460][ T7181] do_syscall_64+0x3b/0xb0 [ 208.138901][ T7181] ? clear_bhb_loop+0x15/0x70 [ 208.143593][ T7181] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 208.149509][ T7181] RIP: 0033:0x7f8cd3cde169 [ 208.153949][ T7181] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 208.173569][ T7181] RSP: 002b:00007f8cd1b47038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 208.182010][ T7181] RAX: ffffffffffffffda RBX: 00007f8cd3ef6fa0 RCX: 00007f8cd3cde169 [ 208.190051][ T7181] RDX: 0000000000000048 RSI: 00004000000009c0 RDI: 0000000000000000 [ 208.198059][ T7181] RBP: 00007f8cd1b47090 R08: 0000000000000000 R09: 0000000000000000 [ 208.206056][ T7181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 208.214051][ T7181] R13: 0000000000000000 R14: 00007f8cd3ef6fa0 R15: 00007fff87754b88 [ 208.222169][ T7181] [ 208.755633][ T7212] __nla_validate_parse: 9 callbacks suppressed [ 208.755654][ T7212] netlink: 194488 bytes leftover after parsing attributes in process `syz.3.1110'. [ 208.824120][ T7208] validate_nla: 7 callbacks suppressed [ 208.824176][ T7208] netlink: 'syz.5.1109': attribute type 10 has an invalid length. [ 208.869114][ T7208] netlink: 55 bytes leftover after parsing attributes in process `syz.5.1109'. [ 208.910713][ T7215] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.1109'. [ 208.927177][ T7215] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 209.164319][ T7226] netlink: 16410 bytes leftover after parsing attributes in process `syz.3.1114'. [ 209.586296][ T7242] netlink: 'syz.2.1120': attribute type 10 has an invalid length. [ 209.612354][ T7242] netlink: 156 bytes leftover after parsing attributes in process `syz.2.1120'. [ 209.626578][ T7246] netlink: 'syz.6.1123': attribute type 41 has an invalid length. [ 209.635203][ T7246] netlink: 40 bytes leftover after parsing attributes in process `syz.6.1123'. [ 209.646592][ T7246] A link change request failed with some changes committed already. Interface hsr_slave_1 may have been left with an inconsistent configuration, please check. [ 209.666718][ T7245] netlink: 'syz.3.1122': attribute type 10 has an invalid length. [ 209.732789][ T7245] bond0: (slave bond_slave_0): Releasing backup interface [ 209.742797][ T7250] FAULT_INJECTION: forcing a failure. [ 209.742797][ T7250] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 209.791438][ T7250] CPU: 1 PID: 7250 Comm: syz.2.1124 Not tainted 5.15.178-syzkaller #0 [ 209.799658][ T7250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 209.809793][ T7250] Call Trace: [ 209.813089][ T7250] [ 209.816026][ T7250] dump_stack_lvl+0x1e3/0x2d0 [ 209.820713][ T7250] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 209.826354][ T7250] ? panic+0x860/0x860 [ 209.830427][ T7250] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 209.836589][ T7250] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 209.842769][ T7250] ? lockdep_hardirqs_on+0x94/0x130 [ 209.848013][ T7250] should_fail+0x38a/0x4c0 [ 209.852443][ T7250] _copy_from_user+0x2d/0x170 [ 209.857120][ T7250] iovec_from_user+0x13b/0x390 [ 209.861976][ T7250] __import_iovec+0x72/0x4b0 [ 209.866564][ T7250] ? __ia32_sys_shutdown+0x60/0x60 [ 209.871685][ T7250] import_iovec+0xe6/0x120 [ 209.876105][ T7250] ___sys_sendmsg+0x215/0x2e0 [ 209.880788][ T7250] ? __sys_sendmsg+0x260/0x260 [ 209.885555][ T7250] ? rcu_nmi_exit+0x70/0xf0 [ 209.890069][ T7250] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 209.896243][ T7250] __se_sys_sendmsg+0x19a/0x260 [ 209.901093][ T7250] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 209.907247][ T7250] ? __x64_sys_sendmsg+0x80/0x80 [ 209.912184][ T7250] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 209.918351][ T7250] do_syscall_64+0x3b/0xb0 [ 209.922765][ T7250] ? clear_bhb_loop+0x15/0x70 [ 209.927439][ T7250] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 209.933333][ T7250] RIP: 0033:0x7f605c5b2169 [ 209.937763][ T7250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 209.957363][ T7250] RSP: 002b:00007f605a41b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 209.965775][ T7250] RAX: ffffffffffffffda RBX: 00007f605c7cafa0 RCX: 00007f605c5b2169 [ 209.973742][ T7250] RDX: 0000000000000000 RSI: 0000400000000100 RDI: 0000000000000004 [ 209.981711][ T7250] RBP: 00007f605a41b090 R08: 0000000000000000 R09: 0000000000000000 [ 209.989688][ T7250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 209.997660][ T7250] R13: 0000000000000000 R14: 00007f605c7cafa0 R15: 00007ffcc0bdf178 [ 210.005643][ T7250] [ 210.122030][ T7253] netlink: 'syz.6.1125': attribute type 10 has an invalid length. [ 210.156995][ T7253] netlink: 55 bytes leftover after parsing attributes in process `syz.6.1125'. [ 210.523705][ T7257] netlink: 199836 bytes leftover after parsing attributes in process `syz.6.1125'. [ 210.561370][ T7257] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 210.611886][ T7265] netlink: 'syz.2.1129': attribute type 3 has an invalid length. [ 210.716961][ T7265] netlink: 13435 bytes leftover after parsing attributes in process `syz.2.1129'. [ 210.813031][ T7271] FAULT_INJECTION: forcing a failure. [ 210.813031][ T7271] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 210.841897][ T7271] CPU: 0 PID: 7271 Comm: syz.5.1133 Not tainted 5.15.178-syzkaller #0 [ 210.850095][ T7271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 210.860181][ T7271] Call Trace: [ 210.863481][ T7271] [ 210.866423][ T7271] dump_stack_lvl+0x1e3/0x2d0 [ 210.871125][ T7271] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 210.876778][ T7271] ? panic+0x860/0x860 [ 210.880895][ T7271] should_fail+0x38a/0x4c0 [ 210.885338][ T7271] _copy_from_user+0x2d/0x170 [ 210.890041][ T7271] iovec_from_user+0x13b/0x390 [ 210.894830][ T7271] __import_iovec+0x72/0x4b0 [ 210.899454][ T7271] import_iovec+0xe6/0x120 [ 210.903904][ T7271] ___sys_recvmsg+0x56b/0x690 [ 210.908606][ T7271] ? __sys_recvmsg+0x260/0x260 [ 210.913423][ T7271] ? __fdget+0x191/0x220 [ 210.917689][ T7271] __x64_sys_recvmsg+0x1dc/0x2b0 [ 210.922647][ T7271] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 210.928824][ T7271] ? ___sys_recvmsg+0x690/0x690 [ 210.933715][ T7271] ? syscall_enter_from_user_mode+0x37/0x240 [ 210.939732][ T7271] ? syscall_enter_from_user_mode+0x2e/0x240 [ 210.945752][ T7271] do_syscall_64+0x3b/0xb0 [ 210.950269][ T7271] ? clear_bhb_loop+0x15/0x70 [ 210.954964][ T7271] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 210.960891][ T7271] RIP: 0033:0x7fd3bbc7d169 [ 210.965319][ T7271] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 210.985201][ T7271] RSP: 002b:00007fd3b9ae6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 210.993644][ T7271] RAX: ffffffffffffffda RBX: 00007fd3bbe95fa0 RCX: 00007fd3bbc7d169 [ 211.001618][ T7271] RDX: 0000000000001f00 RSI: 0000400000000500 RDI: 0000000000000007 [ 211.009584][ T7271] RBP: 00007fd3b9ae6090 R08: 0000000000000000 R09: 0000000000000000 [ 211.017548][ T7271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.025509][ T7271] R13: 0000000000000000 R14: 00007fd3bbe95fa0 R15: 00007ffd87071e48 [ 211.033490][ T7271] [ 211.169587][ T7277] FAULT_INJECTION: forcing a failure. [ 211.169587][ T7277] name failslab, interval 1, probability 0, space 0, times 0 [ 211.196670][ T7277] CPU: 0 PID: 7277 Comm: syz.3.1136 Not tainted 5.15.178-syzkaller #0 [ 211.204875][ T7277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 211.214951][ T7277] Call Trace: [ 211.218245][ T7277] [ 211.221194][ T7277] dump_stack_lvl+0x1e3/0x2d0 [ 211.225900][ T7277] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 211.231561][ T7277] ? panic+0x860/0x860 [ 211.235663][ T7277] ? __might_sleep+0xc0/0xc0 [ 211.240289][ T7277] should_fail+0x38a/0x4c0 [ 211.244736][ T7277] should_failslab+0x5/0x20 [ 211.249264][ T7277] slab_pre_alloc_hook+0x53/0xc0 [ 211.254234][ T7277] __kmalloc+0x6e/0x300 [ 211.258410][ T7277] ? tomoyo_encode+0x26b/0x530 [ 211.263203][ T7277] tomoyo_encode+0x26b/0x530 [ 211.267817][ T7277] ? sock_free_inode+0x20/0x20 [ 211.272620][ T7277] tomoyo_realpath_from_path+0x5a2/0x5e0 [ 211.278287][ T7277] tomoyo_path_number_perm+0x225/0x810 [ 211.283785][ T7277] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 211.289324][ T7277] ? __fget_files+0x413/0x480 [ 211.294120][ T7277] security_file_ioctl+0x6d/0xa0 [ 211.299084][ T7277] __se_sys_ioctl+0x47/0x160 [ 211.303699][ T7277] do_syscall_64+0x3b/0xb0 [ 211.308136][ T7277] ? clear_bhb_loop+0x15/0x70 [ 211.312842][ T7277] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 211.318776][ T7277] RIP: 0033:0x7fb470e29169 [ 211.323215][ T7277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 211.342851][ T7277] RSP: 002b:00007fb46ec92038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 211.351296][ T7277] RAX: ffffffffffffffda RBX: 00007fb471041fa0 RCX: 00007fb470e29169 [ 211.359298][ T7277] RDX: 0000400000000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 211.367294][ T7277] RBP: 00007fb46ec92090 R08: 0000000000000000 R09: 0000000000000000 [ 211.375290][ T7277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.383309][ T7277] R13: 0000000000000000 R14: 00007fb471041fa0 R15: 00007fffef47ffd8 [ 211.391316][ T7277] [ 211.405564][ T7277] ERROR: Out of memory at tomoyo_realpath_from_path. [ 211.436433][ T7275] netlink: 'syz.4.1134': attribute type 10 has an invalid length. [ 211.456036][ T7275] netlink: 156 bytes leftover after parsing attributes in process `syz.4.1134'. [ 211.562556][ T7284] netlink: 'syz.2.1138': attribute type 10 has an invalid length. [ 211.716830][ T7284] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 211.793739][ T7303] FAULT_INJECTION: forcing a failure. [ 211.793739][ T7303] name failslab, interval 1, probability 0, space 0, times 0 [ 211.869189][ T7303] CPU: 0 PID: 7303 Comm: syz.4.1144 Not tainted 5.15.178-syzkaller #0 [ 211.877398][ T7303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 211.887477][ T7303] Call Trace: [ 211.890777][ T7303] [ 211.893720][ T7303] dump_stack_lvl+0x1e3/0x2d0 [ 211.898419][ T7303] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 211.904072][ T7303] ? panic+0x860/0x860 [ 211.908172][ T7303] ? aa_get_newest_label+0xf9/0x6c0 [ 211.913393][ T7303] should_fail+0x38a/0x4c0 [ 211.917842][ T7303] should_failslab+0x5/0x20 [ 211.922365][ T7303] slab_pre_alloc_hook+0x53/0xc0 [ 211.927325][ T7303] kmem_cache_alloc_trace+0x49/0x290 [ 211.932628][ T7303] ? btf_new_fd+0x107/0x920 [ 211.937157][ T7303] btf_new_fd+0x107/0x920 [ 211.941537][ T7303] __sys_bpf+0x486/0x670 [ 211.945811][ T7303] ? bpf_link_show_fdinfo+0x300/0x300 [ 211.951224][ T7303] ? syscall_enter_from_user_mode+0x2e/0x240 [ 211.957226][ T7303] ? lockdep_hardirqs_on+0x94/0x130 [ 211.962454][ T7303] __x64_sys_bpf+0x78/0x90 [ 211.966898][ T7303] do_syscall_64+0x3b/0xb0 [ 211.971331][ T7303] ? clear_bhb_loop+0x15/0x70 [ 211.976038][ T7303] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 211.981951][ T7303] RIP: 0033:0x7f8cd3cde169 [ 211.986377][ T7303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 212.005996][ T7303] RSP: 002b:00007f8cd1b47038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 212.014425][ T7303] RAX: ffffffffffffffda RBX: 00007f8cd3ef6fa0 RCX: 00007f8cd3cde169 [ 212.022407][ T7303] RDX: 0000000000000028 RSI: 0000400000000000 RDI: 0000000000000012 [ 212.030385][ T7303] RBP: 00007f8cd1b47090 R08: 0000000000000000 R09: 0000000000000000 [ 212.038363][ T7303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 212.046351][ T7303] R13: 0000000000000001 R14: 00007f8cd3ef6fa0 R15: 00007fff87754b88 [ 212.054357][ T7303] [ 212.314046][ T7318] netlink: 'syz.5.1149': attribute type 10 has an invalid length. [ 212.347648][ T7318] bond0: (slave bond_slave_0): Releasing backup interface [ 212.593997][ T7325] netlink: 'syz.4.1152': attribute type 10 has an invalid length. [ 212.986203][ T7341] FAULT_INJECTION: forcing a failure. [ 212.986203][ T7341] name failslab, interval 1, probability 0, space 0, times 0 [ 213.010447][ T7341] CPU: 0 PID: 7341 Comm: syz.4.1159 Not tainted 5.15.178-syzkaller #0 [ 213.018752][ T7341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 213.028816][ T7341] Call Trace: [ 213.032099][ T7341] [ 213.035043][ T7341] dump_stack_lvl+0x1e3/0x2d0 [ 213.039728][ T7341] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 213.045371][ T7341] ? panic+0x860/0x860 [ 213.049467][ T7341] ? __might_sleep+0xc0/0xc0 [ 213.054066][ T7341] should_fail+0x38a/0x4c0 [ 213.058490][ T7341] should_failslab+0x5/0x20 [ 213.062993][ T7341] slab_pre_alloc_hook+0x53/0xc0 [ 213.067936][ T7341] __kmalloc+0x6e/0x300 [ 213.072090][ T7341] ? tomoyo_encode+0x26b/0x530 [ 213.076860][ T7341] tomoyo_encode+0x26b/0x530 [ 213.081481][ T7341] ? anon_inodefs_init_fs_context+0x60/0x60 [ 213.087375][ T7341] tomoyo_realpath_from_path+0x5a2/0x5e0 [ 213.093016][ T7341] tomoyo_path_number_perm+0x225/0x810 [ 213.098488][ T7341] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 213.103975][ T7341] ? __fget_files+0x413/0x480 [ 213.108658][ T7341] security_file_ioctl+0x6d/0xa0 [ 213.113596][ T7341] __se_sys_ioctl+0x47/0x160 [ 213.118196][ T7341] do_syscall_64+0x3b/0xb0 [ 213.122610][ T7341] ? clear_bhb_loop+0x15/0x70 [ 213.127287][ T7341] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 213.133179][ T7341] RIP: 0033:0x7f8cd3cde169 [ 213.137592][ T7341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 213.157193][ T7341] RSP: 002b:00007f8cd1b47038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 213.165617][ T7341] RAX: ffffffffffffffda RBX: 00007f8cd3ef6fa0 RCX: 00007f8cd3cde169 [ 213.173586][ T7341] RDX: 00004000000000c0 RSI: 00000000c008240a RDI: 0000000000000007 [ 213.181551][ T7341] RBP: 00007f8cd1b47090 R08: 0000000000000000 R09: 0000000000000000 [ 213.189516][ T7341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 213.197482][ T7341] R13: 0000000000000000 R14: 00007f8cd3ef6fa0 R15: 00007fff87754b88 [ 213.205465][ T7341] [ 213.260109][ T7341] ERROR: Out of memory at tomoyo_realpath_from_path. [ 213.627996][ T7354] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 214.121598][ T7373] FAULT_INJECTION: forcing a failure. [ 214.121598][ T7373] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 214.159657][ T7373] CPU: 1 PID: 7373 Comm: syz.4.1170 Not tainted 5.15.178-syzkaller #0 [ 214.167859][ T7373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 214.177942][ T7373] Call Trace: [ 214.181236][ T7373] [ 214.184181][ T7373] dump_stack_lvl+0x1e3/0x2d0 [ 214.188970][ T7373] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 214.194629][ T7373] ? panic+0x860/0x860 [ 214.198715][ T7373] ? validate_chain+0x112/0x5930 [ 214.203672][ T7373] ? validate_chain+0x112/0x5930 [ 214.208650][ T7373] should_fail+0x38a/0x4c0 [ 214.213093][ T7373] _copy_from_user+0x2d/0x170 [ 214.217792][ T7373] iovec_from_user+0x13b/0x390 [ 214.222595][ T7373] __import_iovec+0x72/0x4b0 [ 214.227204][ T7373] ? __ia32_sys_shutdown+0x60/0x60 [ 214.232348][ T7373] import_iovec+0xe6/0x120 [ 214.235667][ T7374] validate_nla: 1 callbacks suppressed [ 214.235704][ T7374] netlink: 'syz.3.1169': attribute type 10 has an invalid length. [ 214.236786][ T7373] ___sys_sendmsg+0x215/0x2e0 [ 214.236822][ T7373] ? __sys_sendmsg+0x260/0x260 [ 214.247674][ T7374] __nla_validate_parse: 6 callbacks suppressed [ 214.247712][ T7374] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1169'. [ 214.250219][ T7373] ? __fdget+0x191/0x220 [ 214.250254][ T7373] __se_sys_sendmsg+0x19a/0x260 [ 214.284240][ T7373] ? __x64_sys_sendmsg+0x80/0x80 [ 214.289226][ T7373] ? syscall_enter_from_user_mode+0x2e/0x240 [ 214.295242][ T7373] ? lockdep_hardirqs_on+0x94/0x130 [ 214.300471][ T7373] ? syscall_enter_from_user_mode+0x2e/0x240 [ 214.306488][ T7373] do_syscall_64+0x3b/0xb0 [ 214.310927][ T7373] ? clear_bhb_loop+0x15/0x70 [ 214.315626][ T7373] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 214.321540][ T7373] RIP: 0033:0x7f8cd3cde169 [ 214.325970][ T7373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 214.345585][ T7373] RSP: 002b:00007f8cd1b47038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 214.354016][ T7373] RAX: ffffffffffffffda RBX: 00007f8cd3ef6fa0 RCX: 00007f8cd3cde169 [ 214.361999][ T7373] RDX: 0000000000000000 RSI: 0000400000000940 RDI: 0000000000000003 [ 214.369991][ T7373] RBP: 00007f8cd1b47090 R08: 0000000000000000 R09: 0000000000000000 [ 214.377966][ T7373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 214.385934][ T7373] R13: 0000000000000000 R14: 00007f8cd3ef6fa0 R15: 00007fff87754b88 [ 214.393917][ T7373] [ 214.651788][ T7380] netlink: 'syz.6.1167': attribute type 10 has an invalid length. [ 214.715344][ T7380] bond0: (slave bond_slave_0): Releasing backup interface [ 214.860065][ T7395] netlink: 'syz.5.1178': attribute type 13 has an invalid length. [ 214.873264][ T7395] netlink: 152 bytes leftover after parsing attributes in process `syz.5.1178'. [ 214.902786][ T7395] syz_tun: refused to change device tx_queue_len [ 214.910146][ T7395] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 214.943706][ T7405] netlink: 'syz.4.1180': attribute type 10 has an invalid length. [ 214.958570][ T7405] netlink: 55 bytes leftover after parsing attributes in process `syz.4.1180'. [ 214.987023][ T7404] netlink: 'syz.2.1181': attribute type 10 has an invalid length. [ 215.009643][ T7406] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 215.056107][ T7405] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.1180'. [ 215.100142][ T7405] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 215.197452][ T7404] team0: Port device geneve1 added [ 215.239439][ T7412] netlink: 'syz.5.1183': attribute type 10 has an invalid length. [ 215.278770][ T7412] netlink: 156 bytes leftover after parsing attributes in process `syz.5.1183'. [ 215.313673][ T7404] syz.2.1181 (7404) used greatest stack depth: 16872 bytes left [ 215.904111][ T7436] sctp: [Deprecated]: syz.3.1192 (pid 7436) Use of int in max_burst socket option deprecated. [ 215.904111][ T7436] Use struct sctp_assoc_value instead [ 216.141302][ T7443] netlink: 'syz.2.1194': attribute type 10 has an invalid length. [ 216.172613][ T7443] netlink: 55 bytes leftover after parsing attributes in process `syz.2.1194'. [ 216.198850][ T7447] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.1194'. [ 216.241953][ T7447] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 216.632387][ T7460] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.641333][ T7460] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.029222][ T7475] sctp: [Deprecated]: syz.3.1206 (pid 7475) Use of int in max_burst socket option deprecated. [ 217.029222][ T7475] Use struct sctp_assoc_value instead [ 217.291631][ T7482] FAULT_INJECTION: forcing a failure. [ 217.291631][ T7482] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 217.321925][ T7482] CPU: 1 PID: 7482 Comm: syz.2.1208 Not tainted 5.15.178-syzkaller #0 [ 217.330149][ T7482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 217.340229][ T7482] Call Trace: [ 217.343525][ T7482] [ 217.346470][ T7482] dump_stack_lvl+0x1e3/0x2d0 [ 217.351178][ T7482] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 217.356845][ T7482] ? panic+0x860/0x860 [ 217.360955][ T7482] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 217.367160][ T7482] should_fail+0x38a/0x4c0 [ 217.371609][ T7482] _copy_from_user+0x2d/0x170 [ 217.376311][ T7482] __copy_msghdr_from_user+0x587/0x7c0 [ 217.381798][ T7482] ? __ia32_sys_shutdown+0x60/0x60 [ 217.386942][ T7482] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 217.393129][ T7482] ___sys_sendmsg+0x166/0x2e0 [ 217.397828][ T7482] ? __sys_sendmsg+0x260/0x260 [ 217.402656][ T7482] ? __fdget+0x191/0x220 [ 217.406925][ T7482] __se_sys_sendmsg+0x19a/0x260 [ 217.411799][ T7482] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 217.417976][ T7482] ? __x64_sys_sendmsg+0x80/0x80 [ 217.422957][ T7482] ? syscall_enter_from_user_mode+0x37/0x240 [ 217.428972][ T7482] ? syscall_enter_from_user_mode+0x2e/0x240 [ 217.434990][ T7482] do_syscall_64+0x3b/0xb0 [ 217.439432][ T7482] ? clear_bhb_loop+0x15/0x70 [ 217.444394][ T7482] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 217.450380][ T7482] RIP: 0033:0x7f605c5b2169 [ 217.454821][ T7482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 217.474449][ T7482] RSP: 002b:00007f605a41b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 217.482904][ T7482] RAX: ffffffffffffffda RBX: 00007f605c7cafa0 RCX: 00007f605c5b2169 [ 217.490903][ T7482] RDX: 0000000000000000 RSI: 0000400000000440 RDI: 0000000000000009 [ 217.498902][ T7482] RBP: 00007f605a41b090 R08: 0000000000000000 R09: 0000000000000000 [ 217.501930][ T7487] netlink: 'syz.4.1210': attribute type 3 has an invalid length. [ 217.506889][ T7482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 217.506908][ T7482] R13: 0000000000000000 R14: 00007f605c7cafa0 R15: 00007ffcc0bdf178 [ 217.506943][ T7482] [ 218.287267][ T7510] netlink: 'syz.4.1218': attribute type 10 has an invalid length. [ 218.332989][ T7510] netlink: 156 bytes leftover after parsing attributes in process `syz.4.1218'. [ 219.205807][ T7551] FAULT_INJECTION: forcing a failure. [ 219.205807][ T7551] name failslab, interval 1, probability 0, space 0, times 0 [ 219.263042][ T7547] netlink: 'syz.5.1236': attribute type 10 has an invalid length. [ 219.299597][ T7551] CPU: 0 PID: 7551 Comm: syz.6.1237 Not tainted 5.15.178-syzkaller #0 [ 219.307799][ T7551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 219.317884][ T7551] Call Trace: [ 219.321190][ T7551] [ 219.324137][ T7551] dump_stack_lvl+0x1e3/0x2d0 [ 219.328936][ T7551] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 219.334594][ T7551] ? panic+0x860/0x860 [ 219.338707][ T7551] ? __might_sleep+0xc0/0xc0 [ 219.343344][ T7551] should_fail+0x38a/0x4c0 [ 219.347841][ T7551] should_failslab+0x5/0x20 [ 219.352376][ T7551] slab_pre_alloc_hook+0x53/0xc0 [ 219.357341][ T7551] __kmalloc_node+0x71/0x390 [ 219.361953][ T7551] ? vmemdup_user+0x3e/0x160 [ 219.366664][ T7551] vmemdup_user+0x3e/0x160 [ 219.371109][ T7551] map_delete_elem+0x203/0x580 [ 219.375893][ T7551] ? bpf_lsm_bpf+0x5/0x10 [ 219.380252][ T7551] ? security_bpf+0x7d/0xa0 [ 219.384779][ T7551] __sys_bpf+0x311/0x670 [ 219.389050][ T7551] ? bpf_link_show_fdinfo+0x300/0x300 [ 219.394464][ T7551] ? syscall_enter_from_user_mode+0x2e/0x240 [ 219.400471][ T7551] ? syscall_enter_from_user_mode+0x2e/0x240 [ 219.406580][ T7551] ? lockdep_hardirqs_on+0x94/0x130 [ 219.411808][ T7551] __x64_sys_bpf+0x78/0x90 [ 219.416256][ T7551] do_syscall_64+0x3b/0xb0 [ 219.420689][ T7551] ? clear_bhb_loop+0x15/0x70 [ 219.425386][ T7551] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 219.431301][ T7551] RIP: 0033:0x7f3e32555169 [ 219.435735][ T7551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 219.455358][ T7551] RSP: 002b:00007f3e303be038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 219.463919][ T7551] RAX: ffffffffffffffda RBX: 00007f3e3276dfa0 RCX: 00007f3e32555169 [ 219.471920][ T7551] RDX: 0000000000000020 RSI: 0000400000000080 RDI: 0000000000000003 [ 219.479919][ T7551] RBP: 00007f3e303be090 R08: 0000000000000000 R09: 0000000000000000 [ 219.487915][ T7551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 219.495919][ T7551] R13: 0000000000000000 R14: 00007f3e3276dfa0 R15: 00007ffeec106af8 [ 219.503965][ T7551] [ 219.710598][ T7547] team0: Port device geneve1 added [ 219.770687][ T7553] netlink: 'syz.4.1238': attribute type 10 has an invalid length. [ 219.780756][ T7553] netlink: 156 bytes leftover after parsing attributes in process `syz.4.1238'. [ 220.087108][ T7561] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.097115][ T7561] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.320223][ T7567] netlink: 'syz.5.1244': attribute type 10 has an invalid length. [ 220.379685][ T7567] netlink: 156 bytes leftover after parsing attributes in process `syz.5.1244'. [ 220.432125][ T7575] FAULT_INJECTION: forcing a failure. [ 220.432125][ T7575] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 220.503710][ T7575] CPU: 1 PID: 7575 Comm: syz.3.1247 Not tainted 5.15.178-syzkaller #0 [ 220.511906][ T7575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 220.522065][ T7575] Call Trace: [ 220.525364][ T7575] [ 220.528309][ T7575] dump_stack_lvl+0x1e3/0x2d0 [ 220.533012][ T7575] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 220.538669][ T7575] ? panic+0x860/0x860 [ 220.542784][ T7575] ? validate_chain+0x112/0x5930 [ 220.547741][ T7575] ? validate_chain+0x112/0x5930 [ 220.552790][ T7575] should_fail+0x38a/0x4c0 [ 220.557233][ T7575] _copy_from_user+0x2d/0x170 [ 220.561937][ T7575] __copy_msghdr_from_user+0x587/0x7c0 [ 220.567433][ T7575] ? __ia32_sys_shutdown+0x60/0x60 [ 220.572580][ T7575] ___sys_sendmsg+0x166/0x2e0 [ 220.577284][ T7575] ? __sys_sendmsg+0x260/0x260 [ 220.582135][ T7575] ? __fdget+0x191/0x220 [ 220.586405][ T7575] __se_sys_sendmsg+0x19a/0x260 [ 220.591284][ T7575] ? __x64_sys_sendmsg+0x80/0x80 [ 220.596251][ T7575] ? syscall_enter_from_user_mode+0x2e/0x240 [ 220.602249][ T7575] ? lockdep_hardirqs_on+0x94/0x130 [ 220.607459][ T7575] ? syscall_enter_from_user_mode+0x2e/0x240 [ 220.613472][ T7575] do_syscall_64+0x3b/0xb0 [ 220.617904][ T7575] ? clear_bhb_loop+0x15/0x70 [ 220.622599][ T7575] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 220.628517][ T7575] RIP: 0033:0x7fb470e29169 [ 220.633036][ T7575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 220.652666][ T7575] RSP: 002b:00007fb46ec92038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 220.661110][ T7575] RAX: ffffffffffffffda RBX: 00007fb471041fa0 RCX: 00007fb470e29169 [ 220.669108][ T7575] RDX: 0000000004000080 RSI: 0000400000000580 RDI: 0000000000000003 [ 220.677102][ T7575] RBP: 00007fb46ec92090 R08: 0000000000000000 R09: 0000000000000000 [ 220.685089][ T7575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 220.693080][ T7575] R13: 0000000000000000 R14: 00007fb471041fa0 R15: 00007fffef47ffd8 [ 220.701259][ T7575] [ 220.920575][ T7588] sctp: [Deprecated]: syz.2.1253 (pid 7588) Use of int in max_burst socket option deprecated. [ 220.920575][ T7588] Use struct sctp_assoc_value instead [ 221.211587][ T7599] netlink: 'syz.6.1257': attribute type 10 has an invalid length. [ 221.328667][ T7599] team0: Port device geneve1 added [ 221.430597][ T7605] netlink: 'syz.3.1260': attribute type 10 has an invalid length. [ 221.486476][ T7613] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.1260'. [ 221.493632][ T7605] netlink: 55 bytes leftover after parsing attributes in process `syz.3.1260'. [ 221.519659][ T7613] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 221.546275][ T7608] netlink: 'syz.5.1261': attribute type 10 has an invalid length. [ 221.564713][ T7608] netlink: 156 bytes leftover after parsing attributes in process `syz.5.1261'. [ 221.991036][ T7623] netlink: 'syz.5.1264': attribute type 3 has an invalid length. [ 222.296110][ T7633] netlink: 'syz.3.1268': attribute type 10 has an invalid length. [ 222.352200][ T7633] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1268'. [ 222.380219][ T7630] netlink: 'syz.2.1270': attribute type 10 has an invalid length. [ 222.444659][ T7630] netlink: 55 bytes leftover after parsing attributes in process `syz.2.1270'. [ 222.470058][ T7638] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.1270'. [ 222.503209][ T7638] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 222.576574][ T7642] netlink: 'syz.3.1273': attribute type 10 has an invalid length. [ 222.669567][ T7642] team0: Port device geneve1 added [ 222.757636][ T7646] netlink: 156 bytes leftover after parsing attributes in process `syz.5.1275'. [ 222.902439][ T7648] netlink: 55 bytes leftover after parsing attributes in process `syz.6.1276'. [ 222.924221][ T7656] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 222.995197][ T7660] sctp: [Deprecated]: syz.3.1277 (pid 7660) Use of int in max_burst socket option deprecated. [ 222.995197][ T7660] Use struct sctp_assoc_value instead [ 223.321332][ T7665] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 223.695282][ T7684] team0: Port device geneve1 added [ 223.789393][ T7682] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 224.177919][ T7700] FAULT_INJECTION: forcing a failure. [ 224.177919][ T7700] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 224.253902][ T7700] CPU: 0 PID: 7700 Comm: syz.3.1294 Not tainted 5.15.178-syzkaller #0 [ 224.262239][ T7700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 224.272335][ T7700] Call Trace: [ 224.275625][ T7700] [ 224.278567][ T7700] dump_stack_lvl+0x1e3/0x2d0 [ 224.283535][ T7700] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 224.289194][ T7700] ? panic+0x860/0x860 [ 224.293300][ T7700] should_fail+0x38a/0x4c0 [ 224.297782][ T7700] _copy_from_user+0x2d/0x170 [ 224.302475][ T7700] kstrtouint_from_user+0xca/0x2a0 [ 224.307603][ T7700] ? kstrtol_from_user+0x310/0x310 [ 224.312746][ T7700] ? read_lock_is_recursive+0x10/0x10 [ 224.318237][ T7700] proc_fail_nth_write+0xa6/0x290 [ 224.323287][ T7700] ? rcu_read_lock_bh_held+0x110/0x110 [ 224.328774][ T7700] ? proc_fail_nth_read+0x210/0x210 [ 224.333999][ T7700] ? proc_fail_nth_read+0x210/0x210 [ 224.339229][ T7700] vfs_write+0x30c/0xe50 [ 224.343639][ T7700] ? file_end_write+0x250/0x250 [ 224.348528][ T7700] ? __fget_files+0x413/0x480 [ 224.353236][ T7700] ? mutex_lock_nested+0x17/0x20 [ 224.358201][ T7700] ? __fdget_pos+0x2cb/0x380 [ 224.362822][ T7700] ? ksys_write+0x77/0x2c0 [ 224.367260][ T7700] ksys_write+0x1a2/0x2c0 [ 224.371610][ T7700] ? print_irqtrace_events+0x210/0x210 [ 224.377098][ T7700] ? __ia32_sys_read+0x80/0x80 [ 224.381887][ T7700] ? syscall_enter_from_user_mode+0x2e/0x240 [ 224.387888][ T7700] ? lockdep_hardirqs_on+0x94/0x130 [ 224.393108][ T7700] ? syscall_enter_from_user_mode+0x2e/0x240 [ 224.399116][ T7700] do_syscall_64+0x3b/0xb0 [ 224.403568][ T7700] ? clear_bhb_loop+0x15/0x70 [ 224.408264][ T7700] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 224.414180][ T7700] RIP: 0033:0x7fb470e27c1f [ 224.418616][ T7700] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 224.438246][ T7700] RSP: 002b:00007fb46ec71030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 224.446688][ T7700] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb470e27c1f [ 224.454673][ T7700] RDX: 0000000000000001 RSI: 00007fb46ec710a0 RDI: 0000000000000005 [ 224.462659][ T7700] RBP: 00007fb46ec71090 R08: 0000000000000000 R09: 0000000000000000 [ 224.470654][ T7700] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 224.478639][ T7700] R13: 0000000000000001 R14: 00007fb471042080 R15: 00007fffef47ffd8 [ 224.486684][ T7700] [ 225.225345][ T7720] validate_nla: 8 callbacks suppressed [ 225.225364][ T7720] netlink: 'syz.2.1303': attribute type 10 has an invalid length. [ 225.278576][ T7720] __nla_validate_parse: 8 callbacks suppressed [ 225.278597][ T7720] netlink: 55 bytes leftover after parsing attributes in process `syz.2.1303'. [ 225.352451][ T7732] netlink: 'syz.3.1306': attribute type 10 has an invalid length. [ 225.463539][ T7732] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1306'. [ 226.585954][ T7762] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 226.664894][ T7762] device syzkaller0 entered promiscuous mode [ 226.687575][ T7774] FAULT_INJECTION: forcing a failure. [ 226.687575][ T7774] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 226.726262][ T7774] CPU: 1 PID: 7774 Comm: syz.2.1321 Not tainted 5.15.178-syzkaller #0 [ 226.734468][ T7774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 226.744528][ T7774] Call Trace: [ 226.747802][ T7774] [ 226.750727][ T7774] dump_stack_lvl+0x1e3/0x2d0 [ 226.755406][ T7774] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 226.761039][ T7774] ? panic+0x860/0x860 [ 226.765110][ T7774] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 226.771270][ T7774] ? lockdep_hardirqs_on+0x94/0x130 [ 226.776476][ T7774] should_fail+0x38a/0x4c0 [ 226.780895][ T7774] _copy_to_user+0x2d/0x130 [ 226.785409][ T7774] simple_read_from_buffer+0xc6/0x150 [ 226.790824][ T7774] proc_fail_nth_read+0x1a3/0x210 [ 226.795893][ T7774] ? proc_fault_inject_write+0x390/0x390 [ 226.801531][ T7774] ? fsnotify_perm+0x442/0x590 [ 226.806300][ T7774] ? proc_fault_inject_write+0x390/0x390 [ 226.811930][ T7774] vfs_read+0x2fc/0xe10 [ 226.816094][ T7774] ? kernel_read+0x1f0/0x1f0 [ 226.820686][ T7774] ? __fget_files+0x413/0x480 [ 226.825372][ T7774] ? mutex_lock_nested+0x17/0x20 [ 226.830305][ T7774] ? __fdget_pos+0x2cb/0x380 [ 226.834891][ T7774] ? ksys_read+0x77/0x2c0 [ 226.839227][ T7774] ksys_read+0x1a2/0x2c0 [ 226.843468][ T7774] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 226.849626][ T7774] ? vfs_write+0xe50/0xe50 [ 226.854064][ T7774] ? syscall_enter_from_user_mode+0x37/0x240 [ 226.860046][ T7774] ? syscall_enter_from_user_mode+0x2e/0x240 [ 226.866028][ T7774] do_syscall_64+0x3b/0xb0 [ 226.870443][ T7774] ? clear_bhb_loop+0x15/0x70 [ 226.875212][ T7774] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 226.881105][ T7774] RIP: 0033:0x7f605c5b0b7c [ 226.885520][ T7774] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 226.905122][ T7774] RSP: 002b:00007f605a41b030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 226.913540][ T7774] RAX: ffffffffffffffda RBX: 00007f605c7cafa0 RCX: 00007f605c5b0b7c [ 226.921518][ T7774] RDX: 000000000000000f RSI: 00007f605a41b0a0 RDI: 000000000000000a [ 226.929494][ T7774] RBP: 00007f605a41b090 R08: 0000000000000000 R09: 0000000000000000 [ 226.937460][ T7774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 226.945516][ T7774] R13: 0000000000000000 R14: 00007f605c7cafa0 R15: 00007ffcc0bdf178 [ 226.953496][ T7774] [ 227.501802][ T7793] netlink: 'syz.6.1329': attribute type 10 has an invalid length. [ 227.566017][ T7793] netlink: 55 bytes leftover after parsing attributes in process `syz.6.1329'. [ 227.578919][ T7805] netlink: 199836 bytes leftover after parsing attributes in process `syz.6.1329'. [ 228.293784][ T7805] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 228.572763][ T7822] netlink: 'syz.4.1339': attribute type 29 has an invalid length. [ 228.608703][ T7822] netlink: 'syz.4.1339': attribute type 29 has an invalid length. [ 228.782963][ T7834] FAULT_INJECTION: forcing a failure. [ 228.782963][ T7834] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 228.863471][ T7834] CPU: 1 PID: 7834 Comm: syz.5.1343 Not tainted 5.15.178-syzkaller #0 [ 228.871670][ T7834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 228.881758][ T7834] Call Trace: [ 228.885066][ T7834] [ 228.888022][ T7834] dump_stack_lvl+0x1e3/0x2d0 [ 228.892733][ T7834] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 228.898389][ T7834] ? panic+0x860/0x860 [ 228.902488][ T7834] ? __lock_acquire+0x1ff0/0x1ff0 [ 228.907547][ T7834] should_fail+0x38a/0x4c0 [ 228.911994][ T7834] _copy_from_iter+0x243/0xe90 [ 228.916793][ T7834] ? copy_mc_pipe_to_iter+0x760/0x760 [ 228.922238][ T7834] ? __virt_addr_valid+0x3bb/0x460 [ 228.927371][ T7834] ? 0xffffffff81000000 [ 228.931531][ T7834] ? __check_object_size+0x300/0x410 [ 228.936916][ T7834] kernfs_fop_write_iter+0x1a6/0x4f0 [ 228.942253][ T7834] vfs_write+0xacd/0xe50 [ 228.946530][ T7834] ? file_end_write+0x250/0x250 [ 228.951414][ T7834] ? __fget_files+0x413/0x480 [ 228.956125][ T7834] ? mutex_lock_nested+0x17/0x20 [ 228.961085][ T7834] ? __fdget_pos+0x2cb/0x380 [ 228.965690][ T7834] ? ksys_write+0x77/0x2c0 [ 228.970128][ T7834] ksys_write+0x1a2/0x2c0 [ 228.974483][ T7834] ? print_irqtrace_events+0x210/0x210 [ 228.979965][ T7834] ? __ia32_sys_read+0x80/0x80 [ 228.984747][ T7834] ? syscall_enter_from_user_mode+0x2e/0x240 [ 228.990750][ T7834] ? lockdep_hardirqs_on+0x94/0x130 [ 228.995970][ T7834] ? syscall_enter_from_user_mode+0x2e/0x240 [ 229.001978][ T7834] do_syscall_64+0x3b/0xb0 [ 229.006416][ T7834] ? clear_bhb_loop+0x15/0x70 [ 229.011132][ T7834] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 229.017054][ T7834] RIP: 0033:0x7fd3bbc7d169 [ 229.021484][ T7834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 229.041110][ T7834] RSP: 002b:00007fd3b9ae6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 229.049552][ T7834] RAX: ffffffffffffffda RBX: 00007fd3bbe95fa0 RCX: 00007fd3bbc7d169 [ 229.057548][ T7834] RDX: 0000000000000012 RSI: 0000400000000040 RDI: 0000000000000006 [ 229.065545][ T7834] RBP: 00007fd3b9ae6090 R08: 0000000000000000 R09: 0000000000000000 [ 229.073539][ T7834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 229.081524][ T7834] R13: 0000000000000000 R14: 00007fd3bbe95fa0 R15: 00007ffd87071e48 [ 229.089522][ T7834] [ 229.278503][ T7842] netlink: 'syz.4.1348': attribute type 10 has an invalid length. [ 241.464550][ T7894] netlink: 4093 bytes leftover after parsing attributes in process `syz.3.1363'. [ 243.869562][ T7905] netlink: 'syz.5.1365': attribute type 13 has an invalid length. [ 244.210195][ T7905] netlink: 152 bytes leftover after parsing attributes in process `syz.5.1365'. [ 348.200414][ T1422] ieee802154 phy0 wpan0: encryption failed: -22 [ 348.206957][ T1422] ieee802154 phy1 wpan1: encryption failed: -22 [ 348.215491][ T1422] ieee802154 phy0 wpan0: encryption failed: -22 [ 348.221790][ T1422] ieee802154 phy1 wpan1: encryption failed: -22 [ 348.422824][ T7905] syz_tun: refused to change device tx_queue_len [ 349.053186][ T7905] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 349.502995][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 349.509670][ C0] rcu: 0-....: (10405 ticks this GP) idle=669/1/0x4000000000000000 softirq=21169/21169 fqs=51 [ 349.521644][ C0] (t=10501 jiffies g=29829 q=521) [ 349.526822][ C0] NMI backtrace for cpu 0 [ 349.531164][ C0] CPU: 0 PID: 7873 Comm: syz.4.1355 Not tainted 5.15.178-syzkaller #0 [ 349.539332][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 349.549408][ C0] Call Trace: [ 349.552679][ C0] [ 349.555522][ C0] dump_stack_lvl+0x1e3/0x2d0 [ 349.560203][ C0] ? io_uring_drop_tctx_refs+0x1a0/0x1a0 [ 349.565828][ C0] ? panic+0x860/0x860 [ 349.569910][ C0] ? read_lock_is_recursive+0x10/0x10 [ 349.575276][ C0] nmi_cpu_backtrace+0x46a/0x4a0 [ 349.580210][ C0] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 349.586378][ C0] ? vprintk_emit+0xf5/0x150 [ 349.591075][ C0] ? _raw_spin_lock_irqsave+0xdd/0x120 [ 349.596527][ C0] ? _raw_spin_lock+0x40/0x40 [ 349.601201][ C0] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 349.607272][ C0] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 349.613258][ C0] rcu_dump_cpu_stacks+0x223/0x390 [ 349.618374][ C0] print_cpu_stall+0x320/0x600 [ 349.623130][ C0] rcu_sched_clock_irq+0x8d9/0x1150 [ 349.628320][ C0] ? rcutree_dead_cpu+0x20/0x20 [ 349.633156][ C0] ? do_raw_spin_unlock+0x137/0x8b0 [ 349.638346][ C0] ? hrtimer_run_queues+0x163/0x450 [ 349.643553][ C0] ? account_process_tick+0x232/0x3a0 [ 349.648932][ C0] update_process_times+0x196/0x200 [ 349.654127][ C0] tick_sched_timer+0x386/0x550 [ 349.659004][ C0] ? tick_setup_sched_timer+0x2d0/0x2d0 [ 349.664549][ C0] __hrtimer_run_queues+0x55b/0xcf0 [ 349.669781][ C0] ? hrtimer_interrupt+0x980/0x980 [ 349.674884][ C0] ? ktime_get_update_offsets_now+0x407/0x420 [ 349.680947][ C0] hrtimer_interrupt+0x392/0x980 [ 349.685910][ C0] __sysvec_apic_timer_interrupt+0x13b/0x4b0 [ 349.691885][ C0] sysvec_apic_timer_interrupt+0x4d/0xc0 [ 349.697522][ C0] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 349.703490][ C0] RIP: 0010:unwind_next_frame+0xa40/0x1fa0 [ 349.709288][ C0] Code: 00 49 0f bf 06 48 01 c3 48 89 1c 24 48 8d 5d 01 41 0f b6 04 14 84 c0 0f 85 b3 0e 00 00 49 89 dd 49 c1 ed 03 41 0f b6 44 15 00 <84> c0 0f 85 c7 0e 00 00 0f b6 75 01 83 e6 03 83 fe 02 0f 84 83 01 [ 349.728908][ C0] RSP: 0018:ffffc90000007428 EFLAGS: 00000a02 [ 349.734964][ C0] RAX: 0000000000000000 RBX: ffffffff8e8c0adb RCX: ffffffff8e1fc578 [ 349.742922][ C0] RDX: dffffc0000000000 RSI: ffffffff8e8c0a82 RDI: ffffffff8e1fc53c [ 349.750879][ C0] RBP: ffffffff8e8c0ada R08: 000000000000000f R09: ffffc900000075d0 [ 349.758836][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffffffff1d1815b [ 349.766793][ C0] R13: 1ffffffff1d1815b R14: ffffffff8e8c0ad6 R15: ffffc900000074e0 [ 349.774786][ C0] ? unwind_next_frame+0xbb/0x1fa0 [ 349.779918][ C0] ? kasan_set_track+0x4b/0x80 [ 349.784686][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 349.789705][ C0] arch_stack_walk+0x10d/0x140 [ 349.794471][ C0] ? kasan_set_track+0x4b/0x80 [ 349.799242][ C0] stack_trace_save+0x113/0x1c0 [ 349.804105][ C0] ? stack_trace_snprint+0xe0/0xe0 [ 349.809222][ C0] ? mark_lock+0x98/0x340 [ 349.813640][ C0] ? kmem_cache_free+0x91/0x1f0 [ 349.818488][ C0] kasan_set_track+0x4b/0x80 [ 349.823069][ C0] ? kasan_set_track+0x4b/0x80 [ 349.827865][ C0] kasan_set_free_info+0x1f/0x40 [ 349.832795][ C0] ____kasan_slab_free+0xd8/0x120 [ 349.837832][ C0] slab_free_freelist_hook+0xdd/0x160 [ 349.843198][ C0] ? tcp_write_queue_purge+0x132/0x3e0 [ 349.848650][ C0] kmem_cache_free+0x91/0x1f0 [ 349.853325][ C0] tcp_write_queue_purge+0x132/0x3e0 [ 349.858604][ C0] tcp_done_with_error+0x3d/0xc0 [ 349.863652][ C0] tcp_retransmit_timer+0x112b/0x2680 [ 349.869019][ C0] ? ktime_get+0x10/0x270 [ 349.873447][ C0] ? tcp_delack_timer_handler+0x780/0x780 [ 349.879164][ C0] ? ktime_get+0x242/0x270 [ 349.883576][ C0] tcp_write_timer_handler+0x1f7/0x970 [ 349.889210][ C0] tcp_write_timer+0x12e/0x280 [ 349.893987][ C0] call_timer_fn+0x16d/0x560 [ 349.898570][ C0] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 349.904732][ C0] ? tcp_init_xmit_timers+0xb0/0xb0 [ 349.909939][ C0] ? __run_timers+0x890/0x890 [ 349.914870][ C0] ? trace_irq_enable_rcuidle+0x158/0x190 [ 349.920750][ C0] ? tcp_init_xmit_timers+0xb0/0xb0 [ 349.925971][ C0] __run_timers+0x67c/0x890 [ 349.930498][ C0] ? detach_timer+0x2f0/0x2f0 [ 349.935212][ C0] ? run_timer_softirq+0x1e/0xf0 [ 349.940174][ C0] run_timer_softirq+0x63/0xf0 [ 349.944935][ C0] handle_softirqs+0x3a7/0x930 [ 349.949707][ C0] ? __irq_exit_rcu+0x157/0x240 [ 349.954556][ C0] ? do_softirq+0x240/0x240 [ 349.959052][ C0] ? irqtime_account_irq+0xd0/0x1e0 [ 349.964246][ C0] __irq_exit_rcu+0x157/0x240 [ 349.968911][ C0] ? irq_exit_rcu+0x20/0x20 [ 349.973421][ C0] irq_exit_rcu+0x5/0x20 [ 349.977652][ C0] sysvec_apic_timer_interrupt+0xa0/0xc0 [ 349.983280][ C0] [ 349.986199][ C0] [ 349.989119][ C0] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 349.995087][ C0] RIP: 0010:finish_lock_switch+0x91/0x100 [ 350.000814][ C0] Code: 45 31 c9 68 c7 ba 59 81 e8 3c 12 09 00 48 83 c4 08 4c 89 ff e8 90 db fe ff 66 90 4c 89 ff e8 b6 31 ef 08 e8 f1 48 2d 00 fb 5b <41> 5c 41 5d 41 5e 41 5f c3 44 89 f1 80 e1 07 80 c1 03 38 c1 7c 87 [ 350.020409][ C0] RSP: 0018:ffffc9000317f098 EFLAGS: 00000286 [ 350.026469][ C0] RAX: 5e9918d6f2082c00 RBX: ffff88813ff23bb4 RCX: ffffffff96a92f03 [ 350.034447][ C0] RDX: dffffc0000000000 RSI: ffffffff8aab2b80 RDI: ffffffff8af9f2c0 [ 350.042408][ C0] RBP: ffffc9000317f110 R08: ffffffff81870420 R09: ffffed10171c7461 [ 350.050381][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 350.058342][ C0] R13: 1ffff110171c760b R14: ffff8880b8e3b058 R15: ffff8880b8e3a300 [ 350.066312][ C0] ? trace_hardirqs_on+0x30/0x80 [ 350.071275][ C0] finish_task_switch+0x134/0x630 [ 350.076322][ C0] ? __switch_to_asm+0x34/0x60 [ 350.081083][ C0] __schedule+0x12cc/0x45b0 [ 350.085586][ C0] ? perf_trace_lock+0x138/0x440 [ 350.090518][ C0] ? mark_lock+0x98/0x340 [ 350.094967][ C0] ? release_firmware_map_entry+0x190/0x190 [ 350.100863][ C0] ? preempt_schedule+0xd9/0xe0 [ 350.105723][ C0] preempt_schedule_common+0x83/0xd0 [ 350.111016][ C0] preempt_schedule+0xd9/0xe0 [ 350.115700][ C0] ? schedule_preempt_disabled+0x20/0x20 [ 350.121335][ C0] preempt_schedule_thunk+0x16/0x18 [ 350.126532][ C0] _raw_spin_unlock+0x36/0x40 [ 350.131201][ C0] unmap_page_range+0x8a7/0x2630 [ 350.136159][ C0] ? mmu_notifier_invalidate_range_end+0xf0/0xf0 [ 350.142485][ C0] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 350.148628][ C0] ? lockdep_hardirqs_on+0x94/0x130 [ 350.153822][ C0] ? uprobe_munmap+0x18e/0x400 [ 350.158691][ C0] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 350.164859][ C0] ? unmap_single_vma+0x1a1/0x2d0 [ 350.169902][ C0] unmap_vmas+0x1f8/0x390 [ 350.174230][ C0] ? unmap_page_range+0x2630/0x2630 [ 350.179434][ C0] exit_mmap+0x3b6/0x620 [ 350.183675][ C0] ? vm_brk+0x20/0x20 [ 350.187743][ C0] ? __mmput+0xf1/0x3b0 [ 350.191886][ C0] ? __mmput+0xfb/0x3b0 [ 350.196028][ C0] ? exit_mmap+0x1/0x620 [ 350.200259][ C0] __mmput+0x112/0x3b0 [ 350.204321][ C0] exit_mm+0x688/0x7f0 [ 350.208379][ C0] ? _raw_spin_unlock+0x40/0x40 [ 350.213226][ C0] ? do_exit+0x2480/0x2480 [ 350.217639][ C0] ? taskstats_exit+0x491/0xa10 [ 350.222578][ C0] ? tty_audit_exit+0x150/0x1f0 [ 350.227422][ C0] do_exit+0x626/0x2480 [ 350.231579][ C0] ? put_task_struct+0x80/0x80 [ 350.236334][ C0] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 350.242488][ C0] ? lockdep_hardirqs_on+0x94/0x130 [ 350.247698][ C0] do_group_exit+0x144/0x310 [ 350.252309][ C0] get_signal+0xc66/0x14e0 [ 350.256727][ C0] ? __lock_acquire+0x1ff0/0x1ff0 [ 350.261762][ C0] arch_do_signal_or_restart+0xc3/0x1890 [ 350.267400][ C0] ? fd_install+0x2b1/0x4c0 [ 350.271893][ C0] ? __se_sys_perf_event_open+0x418b/0x4510 [ 350.277790][ C0] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 350.283761][ C0] ? print_irqtrace_events+0x210/0x210 [ 350.289219][ C0] ? get_sigframe_size+0x10/0x10 [ 350.294150][ C0] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 350.300399][ C0] exit_to_user_mode_loop+0x97/0x130 [ 350.305676][ C0] exit_to_user_mode_prepare+0xb1/0x140 [ 350.311209][ C0] syscall_exit_to_user_mode+0x5d/0x240 [ 350.316748][ C0] do_syscall_64+0x47/0xb0 [ 350.321174][ C0] ? clear_bhb_loop+0x15/0x70 [ 350.325837][ C0] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 350.331724][ C0] RIP: 0033:0x7f8cd3cde169 [ 350.336128][ C0] Code: Unable to access opcode bytes at RIP 0x7f8cd3cde13f. [ 350.343496][ C0] RSP: 002b:00007f8cd1b26038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 350.351962][ C0] RAX: 0000000000000005 RBX: 00007f8cd3ef7080 RCX: 00007f8cd3cde169 [ 350.359937][ C0] RDX: affffff7ffffffff RSI: 0000000000000000 RDI: 0000400000000180 [ 350.367898][ C0] RBP: 00007f8cd3d5f2a0 R08: 0000000000000000 R09: 0000000000000000 [ 350.375869][ C0] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 350.383850][ C0] R13: 0000000000000001 R14: 00007f8cd3ef7080 R15: 00007fff87754b88 [ 350.391846][ C0] SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 350.419117][ T21] Bluetooth: hci5: command 0x0406 tx timeout [ 353.723452][ T4157] Bluetooth: hci1: command 0x0406 tx timeout [ 354.629575][ T6] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 355.910260][ T6] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 356.842808][ T6] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 356.970159][ T6] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0