last executing test programs: 25m5.374607012s ago: executing program 3 (id=3563): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8, 0x830d}, 0x400, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xb, 0xff, 0x24932, 0x7f, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000340)={{r0}, &(0x7f0000000000)=0x7d8, &(0x7f0000000180)='%ps \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000100)=0x7d8, &(0x7f0000000140)='%pi6 \x00'}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000480)={0x0, &(0x7f0000000200)=""/197, &(0x7f0000000380), &(0x7f0000000300), 0x2, r1}, 0x38) socketpair$unix(0x1, 0x1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000002c0)}, 0x24048811) recvmsg$unix(0xffffffffffffffff, 0x0, 0x2000) 25m5.23358061s ago: executing program 3 (id=3565): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005000000000000"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5, 0x2049}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xa, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="d8000000180081064e80f782db44b9040a1d080000000000000055a10a0015400100142603600e1208009e00000004010400160040000540fec00000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef409fd2ee0125b91643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d28a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3060000000000000081ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b4337812398", 0xd8}], 0x1}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x81, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x81, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)) 25m4.993438824s ago: executing program 3 (id=3566): perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x45a1, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61cd, 0x0, @perf_bp={&(0x7f0000000180), 0x3}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) recvmsg$kcm(r1, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x40002002) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000d03000000000000000000000105002000800000000000000000000003000000000200000002"], &(0x7f0000000340)=""/142, 0x4e, 0xfeaf, 0x1}, 0x20) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000000)="5c00000015006b05c84e21000ab16d6e230686f802000000440002005817d30461bc24eeb556a705251e6182149a36c23d3b48dfd8cdbf9367b098fa51f60a64c9f408000000e786a6d0bdd70000b6c0504bb9189d9193e9bd1c1b78", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x8040880) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000cd0300000b"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b70300000000ff80850000000400000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, r2, 0x4, 0x3, 0x4}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d2f, 0x10, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, 0x0, 0x0) close(0xffffffffffffffff) socketpair(0x1d, 0x2, 0x6, &(0x7f0000000300)) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r4}, 0xc) 25m3.974077033s ago: executing program 3 (id=3570): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8b36, &(0x7f0000000000)={'wlan1\x00', @multicast}) 25m3.820282732s ago: executing program 3 (id=3572): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x8, 0x5}, 0x9408, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.current\x00', 0x26e1, 0x0) close(r0) ioctl$SIOCSIFHWADDR(r0, 0x8b15, &(0x7f0000000200)={'veth0_virt_wifi\x00', @local}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r2, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r3}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r4, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r5 = socket$kcm(0x1e, 0x5, 0x0) sendmsg$kcm(r5, &(0x7f00000014c0)={&(0x7f0000001540)=@tipc, 0xc, 0x0}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r6}, 0x0, 0x0}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r7, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 25m3.362626759s ago: executing program 3 (id=3579): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f00000002c0), 0x161) sendmsg$inet(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) close(r0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x20) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4000010) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r3}, &(0x7f0000000040), &(0x7f0000000140)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r1}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r2}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r3, &(0x7f0000000640)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) syz_clone(0x61000600, 0x0, 0x0, 0x0, 0x0, 0x0) socket$kcm(0x1e, 0x4, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8a, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x401, 0x1000, 0x1, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0200000004000000080000000100001e80000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x6c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x6, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x15, 0x5, 0x0) sendmsg$kcm(r5, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x40) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={r3}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000500)={r4}, 0x4) 24m48.074735619s ago: executing program 32 (id=3579): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f00000002c0), 0x161) sendmsg$inet(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) close(r0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x20) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4000010) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r0], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r3}, &(0x7f0000000040), &(0x7f0000000140)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r1}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r2}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r3, &(0x7f0000000640)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) syz_clone(0x61000600, 0x0, 0x0, 0x0, 0x0, 0x0) socket$kcm(0x1e, 0x4, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8a, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x401, 0x1000, 0x1, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0200000004000000080000000100001e80000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x6c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x6, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x15, 0x5, 0x0) sendmsg$kcm(r5, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x40) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={r3}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000500)={r4}, 0x4) 8m21.329836041s ago: executing program 0 (id=9957): write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='8-N:'], 0x6a) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x202, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x4, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001bc0)={r1, 0x0, 0x138, 0x4c, &(0x7f0000001cc0)="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", &(0x7f0000001c40)=""/76, 0x4000, 0x0, 0x47, 0x50, &(0x7f0000001ac0)="9c01bd6f9a6028c80d7364240fd78867d9d62eca43c565f2c5ac65dd4a0fadceb6c65dcb07f2421e69087e0f17b4eb709e4805f2722709c46bef17c4cb9aed9fb1c342179ea349", &(0x7f0000001a40)="408fd0050dc7945b483103067eca9bd26ffbe35abf0f88a103f6893dc2b1d1cdc2195d4ae89abc04ff5fe5d2466892c81015df835a7d47be4f852161bc4015e7564b08584290fe1762f943a653008ac5", 0x1, 0x2f000000, 0x13}, 0x22) 8m21.222881917s ago: executing program 0 (id=9958): r0 = socket$kcm(0x2a, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x200040, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000880), 0x12) r3 = socket$kcm(0x23, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, 0x0) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x40002182) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x15, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x101048, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="5c00000014006b03000000d86e6c1d0010ffff0af32c6e021fffffff000000000f00000017d3a705251e6182949a369f3d3b48dfd8cd3f9367c1fa51f60a64c9f4d4938037e786a6d0bdd7000000000000eaffffffb3d59256a5a2fd", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x4, 0x0, 0xfe, 0x0, 0x800, 0x20000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x8}, 0x800, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0xbb8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xaa023400, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0) 8m21.17356726s ago: executing program 2 (id=9959): socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r1}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x6, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="180000000800000000000000060000009500000000"], &(0x7f0000000bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x13, 0x3, 0x3c2a, 0x5, 0x20000, 0xffffffffffffffff, 0x6, '\x00', r3, 0xffffffffffffffff, 0x2, 0x2, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) 8m20.258339373s ago: executing program 2 (id=9969): perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x40034, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x100000001, 0x8}, 0x1b, 0x0, 0x3, 0x1, 0x8, 0xfffffffd, 0x4, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000100081044e81f782db44b904021d080c48", 0x15}], 0x1}, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02002200356bd25a806f8c6394f91124fc60040006000a7403004700000037153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="33fe00002a0053ea"], 0xfe33) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000007000000000000000000000001050000a2200000000000000001000085100000000000000002000000000000ff00000100da"], 0x0, 0x52}, 0x20) recvmsg$kcm(r0, &(0x7f0000001dc0)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) r2 = socket$kcm(0xa, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000007000000000000001c0086c2921c0eb812209dfe569ca76ef443d5a5c054cbb51c579fd2f1134ed439e59d8aff079b26b194df0023d60f16106f191d483655a4f89ff9d776bf2a61b999d88840c90eef43f1534da3ea2ec0b5e98f06a651a30012ce20fd30c72840000b74f301742485966e8379f6c9dd9b6af8179ddd93655d9d7d622f87a131354c45f8a4e71e98bfc7c0d2e628b3f76df950"], 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={0xffffffffffffffff, r3}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) close(r4) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) syz_clone(0x28280000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110c23003d) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000080)=ANY=[], 0x0, 0x1a}, 0x28) write$cgroup_devices(r4, &(0x7f0000000080)=ANY=[@ANYBLOB], 0xa) socket$kcm(0x2, 0x2, 0x73) setsockopt$sock_attach_bpf(r2, 0x0, 0x4, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x400c080) 8m19.97450805s ago: executing program 0 (id=9970): socket$kcm(0xa, 0x3, 0x3a) r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) socketpair(0x1, 0x20000000000001, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) socket$kcm(0x10, 0x400000002, 0x0) socket$kcm(0xa, 0x5, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) setsockopt$sock_attach_bpf(r2, 0x88, 0x67, &(0x7f00000000c0)=r3, 0x4) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000080)={0x2, 0x4e22, @multicast1=0xe000004f}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000000)="813e785600", 0x5}, {&(0x7f0000000440)="739135680a1d6fb520a135d74fcb507ba32aad7141e7c84382b075f75900bfba6841728e5b4c8a67abb35cf32dabf4feff1183ecaeead6a4c72e99892e55e2159959e12d4c06b8bb0e3b92a227bcddfc9de9b16bac13757c6dfa3c8764ea3fea50e0664cf70a842c69d3e914d4fcef3d553f0cd60f1ddb1074f8e570e868e2068ca79d988a43bfd31c69e3b1393380bd163b85f4b6b15e", 0x97}], 0x2, &(0x7f0000000180)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x40}, @dev={0xac, 0x14, 0x14, 0x3a}}}}], 0x20}, 0x4840) 8m17.776817108s ago: executing program 0 (id=9972): r0 = socket$kcm(0x2a, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)="57ba9acf0c37ba548a46c0112892f41646d7c8b90265a13d22e59abae1e08a6c72cd1f4d2ed08e4c20cd3b824272a4ae59f1611b93ca6cc419aa193b58a3ce8fe70939b2181282b1777d2bec7b334249e1470ec094d128521ebc496d39b0b7d645897b470283a10d1fd229ef81ab4dad917dbe381e2c6864dc8c35f29bece9e175d1d2df695d4518fdca3695a1910c44fac8d25edcac9f3a2e6e8ce131c381317d66f653", 0xa4}, {&(0x7f00000000c0)="dbd94843e7676a05fe307e0d7ad2f6e27bf2fa41e53fc8", 0x17}, {&(0x7f0000000100)="9e89c88a56f37730df7a74e95b0e5408d02e072e9c6e3335c32b252d6d1a5bb36c6a9f5bd4c1906ed07786446436463a598bdc5565a33d1a7cbbda7eecea941085d5ec231da3b625cf37a5da9e0e4597d6dbac95", 0x54}, {&(0x7f0000000180)="400c7d9828423ba00ab1272a9dd020e3e1c1418c400f88b485b7df7fa0b523a67b3952", 0x23}, {&(0x7f00000001c0)="a75e0de1f209bc9ff608b1c785a6e42f8c5c8db838326aae3c022bc5288aa1f8f547f5f446d16430988968af18449dffb7756980361586c0056a279da27bcf8a19c09e2d41db471968808d9b8de85bc7b8a4434ca1698f45b5777b806a48941decbbfa2d9ce15753553b0b56a127a7ed790933b611bd58a1793fff7decf4643905b95626b0547f9eae89fc4b2c652090ac8c2d4ae6999ecb034f693721e89f436415a88c", 0xa4}, {&(0x7f0000000280)="507322bdf924334656710fbd121dc7a2f1a20cb0f909ecf28b4f438fa8fc82c3ee3216e03155ef76da61f009437f07f70151b63438952f90aecbc2f5d59848126ac1166e63489a3c6b1db397e8db82a6e0d251dc48c5a4ea6cc0802ad85b8d8d3ce08577b16aae6af589f15709ec388297c9e7c4eedfa1675ad4e4162787456a2502c749ebd7501d960e3b1ebeae4937066dbb6e0369fa25286b294388ce64e5150d25376220e4ed743973b20049d5a5b4de822ba6d6e58c29579fad7dffb97c11f72cf4a76de67cd666cd0308ee30b27fa574f755c3dad75ec4be92affe13", 0xdf}, {&(0x7f0000000380)="9811296d6ea0b2e69637155fcf81e7038a15323dc7510a72225e00294ff6e4e4011a9fcdc279ac885fdd7aeb3bf47f8ba19149db55f7c887ef75b3651a43b9cd7b55f4e07157f88980c19c22ce78a56a2411211694b75f02b58f920b0a5dea798295aead7f8b9e02d39223dcc7e4809df6d99988750756c6d020028736576871412153ce090921b2fbdab5b5b1f23079fa01328ce99b548a99762cf51056264defb7fc93ba4076a06bbbf1d41c29", 0xae}, {&(0x7f0000000440)="d3c683ff93583619ed45e94b1a57e94e7cb090aa09addcf0e122086e1a09bb885e89aaf48995d24654a40a05759cbd8f49b04cba151885e458e6af6a67b91423f11c31", 0x43}], 0x8, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1a8}, 0x40800) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000840), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000880)=':\x00') r4 = socket$kcm(0x1e, 0x4, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1d, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x4, 0x3, 0xfff}, 0x10}, 0x94) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f00000008c0), 0x43) write$cgroup_subtree(r4, &(0x7f0000000040)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x2, 0x9, 0x0, 0x20000, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x100) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000740)="d800000019008111e0020f060d8107040a6000003f000000001455a12a00090008000699e3ffffff14000500fe80817806000567b8b7b94002000009080016060000000000000000d67f6f9400f7d1d9bbe94fa27100a007a2f7457f01896034277ce06bbace8017cb39b62ee5a7cef4090000001fb791643a5e83d42365f003724a237e09000000b2a10000000014d6d930dfe1d9c322fe040000005025acca262f3d40fad95667e006dcdf634c1f215ce3bb9ad809d50b7b4338c9f1ac76efb42a9ecbee5de6ccd44242f4d643f6fd0f26187b51980dd6", 0xd8}], 0x1}, 0x80) r6 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r6, 0x0, 0xf, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1400000028000b6394f90509fc60000000000000", 0x14}], 0x1}, 0x20044000) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5411, 0x0) 8m17.677804243s ago: executing program 2 (id=9975): r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, 0x0, 0x106) recvmsg$kcm(r0, 0x0, 0x100) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000880)="d80000001e0081054e81f78206000000010000000a0014260360cf9808000f00245bde1625fcb8b20800094014000000035c0461c1d67f6f94007134cf6efb8000d74748420a963aa007a290457f01898102e807ad522a4807f13af8030ab316277ce07bbace8017cbec4c2ee5a7cef4090000001fb791433a5ee4ce1b14d6d930dfe1d9d322fe7c9f8716a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad909d5e1ca9781ed0bffece0b42a9eca0200e6d5d40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x40800) socket$kcm(0x10, 0x2, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b04, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x9, 0x0, 0x5, 0x94, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2, 0x3}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x36500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x62, 0x2}, 0x7602, 0x5, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x2) socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) 8m17.55464939s ago: executing program 2 (id=9977): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000180)="48286c1e5e97fb148f1ccef564aec3c090a18f07051841649e99cd4e2b", 0x1d}], 0x1, &(0x7f0000003540)=ANY=[@ANYBLOB="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"], 0x21b8}, 0x40) 8m17.492645354s ago: executing program 0 (id=9979): socket$kcm(0x29, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32, @ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r1}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x6, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="180000000800000000000000060000009500000000"], &(0x7f0000000bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x13, 0x3, 0x3c2a, 0x5, 0x20000, 0xffffffffffffffff, 0x6, '\x00', r3, 0xffffffffffffffff, 0x2, 0x2, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) 8m17.424595248s ago: executing program 2 (id=9980): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='\n', 0x1}], 0x1}, 0x5744935563dc1402) sendmsg(r0, &(0x7f0000003680)={0x0, 0x0, &(0x7f0000003140)=[{&(0x7f0000002d80)="0f", 0x1}, {0x0, 0x2}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x4d}, {0x0}], 0x9}, 0x0) 8m17.247402638s ago: executing program 2 (id=9981): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x4, 0x2, 0x0, 0x0, 0x3, 0x8f600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6002, 0x2, @perf_bp={&(0x7f00000005c0), 0x1}, 0x8824, 0xc8, 0x0, 0x2, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40018181) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r2 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r1}, 0x8) r3 = socket$kcm(0x2, 0x540fbde70a895002, 0x106) sendmsg$inet(r3, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x300080c1) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80720, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) r7 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r7, 0x6, 0x17, &(0x7f0000000200)=r7, 0x21) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000001c0)={r4, 0x0, 0x64, 0x0, &(0x7f0000000000)="d832210efc68a97c1019c8b0e97694dcab4fdf31c0e8758e52b881959d4d9ca22e34a69748f1dda289f3daab16be779ad8e30ab532623ce68e71ebd7698955c689d84c5cb5a17f291511a07e239f8d0a36eb8de9e3c1171321189abb55ba7a5a4135c78d", 0x0, 0x9, 0x0, 0x9c, 0x0, &(0x7f0000000280)="9d8a883fcc7d7f380cf64999f25ff69ad8a18856f0cc9ecbeaefb5f8fa69f3bacf6552f066d5a9238b713f5e4ccf2e8517b7e213af2739a6203b8ace28eb5a547a1ffc42f42af7f3de8f01f47d6c36e6b0f63ef2c021914d661468cf71edb7870cef8ff9d4f6fce99857754df59674105a359fe7fe9be82a8aeb0fbf48be726c6a5e864a16f2cb5757822a8f47f5d63bf5f64e566bfee34dcb08f8c1", 0x0, 0x2, 0x0, 0x1}, 0x50) r9 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x8, 0xfffdfffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x46fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0xffffffffffffffff, 0xfffffffffffffffe, r0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="d80000001e0081054e81f782db4cb9040a1d080006007c095dd2086518000a800000000003600e1208000f0000000406a80016c0080009", 0x37}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x0, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000720000001801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r10, &(0x7f0000000400)=ANY=[@ANYRES64=r10], 0xfe33) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000100200000000000000000850000002a0000001801000020786c2500000000000220207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = perf_event_open(&(0x7f0000000fc0)={0x4, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xa6, 0x4}, 0x0, 0x7, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, r2, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1, 0xc, &(0x7f0000000340)=ANY=[@ANYRES64=r1, @ANYRES16=0x0, @ANYRES8=r9], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r11, 0x40042408, r12) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{}, &(0x7f0000000180), 0x0}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0xffffffffffffffff, 0x2, 0x10}, 0xc) close(r8) 8m16.349773771s ago: executing program 0 (id=9987): r0 = syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x102, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9, 0x0, 0x7ff, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000022003567d25a806f8c6394f96724fc60", 0x14}], 0x1}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x8fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x101000, 0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) r3 = socket$kcm(0x10, 0x100000000002, 0x4) sendmsg$kcm(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)="39000000140081ae00002c000500015601618575e285af0180000000171300883795c04a31ba377a1b2cc32b38d3740000ffffffffffffffff", 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x0) mkdirat$cgroup(r2, 0x0, 0x1ff) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) 8m1.39071826s ago: executing program 33 (id=9981): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x4, 0x2, 0x0, 0x0, 0x3, 0x8f600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6002, 0x2, @perf_bp={&(0x7f00000005c0), 0x1}, 0x8824, 0xc8, 0x0, 0x2, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40018181) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r2 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r1}, 0x8) r3 = socket$kcm(0x2, 0x540fbde70a895002, 0x106) sendmsg$inet(r3, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x300080c1) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80720, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) r7 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r7, 0x6, 0x17, &(0x7f0000000200)=r7, 0x21) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000001c0)={r4, 0x0, 0x64, 0x0, &(0x7f0000000000)="d832210efc68a97c1019c8b0e97694dcab4fdf31c0e8758e52b881959d4d9ca22e34a69748f1dda289f3daab16be779ad8e30ab532623ce68e71ebd7698955c689d84c5cb5a17f291511a07e239f8d0a36eb8de9e3c1171321189abb55ba7a5a4135c78d", 0x0, 0x9, 0x0, 0x9c, 0x0, &(0x7f0000000280)="9d8a883fcc7d7f380cf64999f25ff69ad8a18856f0cc9ecbeaefb5f8fa69f3bacf6552f066d5a9238b713f5e4ccf2e8517b7e213af2739a6203b8ace28eb5a547a1ffc42f42af7f3de8f01f47d6c36e6b0f63ef2c021914d661468cf71edb7870cef8ff9d4f6fce99857754df59674105a359fe7fe9be82a8aeb0fbf48be726c6a5e864a16f2cb5757822a8f47f5d63bf5f64e566bfee34dcb08f8c1", 0x0, 0x2, 0x0, 0x1}, 0x50) r9 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x8, 0xfffdfffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x46fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0xffffffffffffffff, 0xfffffffffffffffe, r0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="d80000001e0081054e81f782db4cb9040a1d080006007c095dd2086518000a800000000003600e1208000f0000000406a80016c0080009", 0x37}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x0, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000720000001801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r10, &(0x7f0000000400)=ANY=[@ANYRES64=r10], 0xfe33) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000100200000000000000000850000002a0000001801000020786c2500000000000220207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = perf_event_open(&(0x7f0000000fc0)={0x4, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xa6, 0x4}, 0x0, 0x7, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, r2, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1, 0xc, &(0x7f0000000340)=ANY=[@ANYRES64=r1, @ANYRES16=0x0, @ANYRES8=r9], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r11, 0x40042408, r12) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{}, &(0x7f0000000180), 0x0}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0xffffffffffffffff, 0x2, 0x10}, 0xc) close(r8) 8m1.146023484s ago: executing program 34 (id=9987): r0 = syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x102, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9, 0x0, 0x7ff, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000022003567d25a806f8c6394f96724fc60", 0x14}], 0x1}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x8fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x101000, 0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) r3 = socket$kcm(0x10, 0x100000000002, 0x4) sendmsg$kcm(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)="39000000140081ae00002c000500015601618575e285af0180000000171300883795c04a31ba377a1b2cc32b38d3740000ffffffffffffffff", 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x0) mkdirat$cgroup(r2, 0x0, 0x1ff) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) 17.346262301s ago: executing program 1 (id=13665): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x4, 0x7fe2, 0x2}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000006c0)={r0, &(0x7f0000000500), &(0x7f0000000600)=""/155}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000480)=""/146}, 0x1d) (fail_nth: 4) 16.926056756s ago: executing program 1 (id=13670): socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="020000000400000008000000"], 0x50) r0 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000bc0)={r0, 0x0, 0x13d, 0x41, &(0x7f0000000dc0)="1ffe8c210f1436bfa5693eef427ac5250d674b29ede7eb1d18d6fcd70aca0374bc43e911e2170d0f2751d43004c792b3f01d3ac7ff6eb025f42c2634f5dedf766f41c37513af8f1730d9c3284f573d3a858f3b6f52bd1c3d92946e75463d9f16b4003145f235ea5386c45181cf14cc172f9c52606bdf745cd8f2a0bf04c7d2c279bf6417e1875ca48b234a70744f8101d7a0910cb386f5e7d74ff2b4325c30028dee8e97d61e22d0ec015b4e75ba75732fbe0f7bb10f35f6a89b1e75e3f691dad82ab906b524606a36ae68f0be96c1a7e47abd5dc30b304eab323c98a86d98633db6d901d56da8333881e19b2e72769f06e00ef6f5732b316cb2daf878c3487bc49624c351bbfffc89c7dc68804ea2661afca78c1854fde9d9684a84748979d0410963e2c886ca6cfe8ed27c1b473d433431b26047588199ba616bcea4", &(0x7f0000000780)=""/65, 0x10001, 0x0, 0x89, 0x0, &(0x7f0000000a40)="90495cddb5124d8b557afdb6e4db4de8e0029df50d6fbf0175bdb775c3d984f40c9b9af189023e68c8333c3a6cbc25b9ca1946c0931902c825013674f3b4696b14a311c99941a0a675bf8b09850f9720135e1052fde60bc8d1e76f2654c0962a3a5ed3d3724cb98037e5c1fb2e175d401c3c55f7a7f90c31eef7ce5ef99ee4371430430155ca9ed384", 0x0, 0x4, 0x0, 0x9}, 0x50) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="183200000100000000000000000000000c800200000000006952bb6cdf144ef0ebf4a806c496b19b5d4dae12ab33f0e3c37a7c670a19410ff591a8e3ec70db28366241d3cd3e30a834b0aec421451f05c8e81a47222ef56519c03c78242b9657061129a47c6caca53fb57cd14716df3098eed7bf8c8e9cb794a2240c394698d919c29dc3b0f4d73e06949a39e99e"], &(0x7f0000000300)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff9d, 0x10, &(0x7f0000000380)={0x2, 0x1, 0x1, 0x77ff}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f00000003c0)=[{0x2, 0x3, 0xe, 0xb}, {0x82, 0x1, 0x2, 0xb}, {0x1, 0x1, 0xa, 0xb}, {0x2, 0x1, 0x7, 0x2}], 0x10, 0x2}, 0x94) r2 = socket$kcm(0xa, 0x2, 0x73) setsockopt$sock_attach_bpf(r2, 0x29, 0x21, &(0x7f0000000200), 0x4) sendmsg$kcm(r2, &(0x7f0000000100)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x80000fb, @remote}, 0x80, 0x0, 0x0, &(0x7f0000003f40)=ANY=[], 0xf}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f0000000f40)=ANY=[@ANYBLOB="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", @ANYRESOCT=r2, @ANYBLOB="0000000000000000b705000000000000850000007100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x800}) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x90a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r8, &(0x7f00000000c0), 0x12) write$cgroup_pid(r6, &(0x7f0000000040), 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) r9 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="140000003b000b35d25a806c8c6f90623202d50e", 0x14}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000c40)=ANY=[@ANYBLOB="625dfb67c7d6b19d349feb010018000000babbeb00000000002400000024000000020000000000000001000004ffffffff0000000002000000000000000000000000000006040000000000"], 0x0, 0x3e}, 0x28) 16.784747174s ago: executing program 1 (id=13673): bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0x3) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={&(0x7f00000011c0)=ANY=[@ANYBLOB="9feb0100180e00047f87b73400000000ffff000000000000000200000000000000c3d5034f04"], 0x0, 0x26}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r0, 0x20, &(0x7f0000000400)={0xfffffffffffffffe, 0x0, 0x0, 0x0}}, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r1 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x80000005}, {0x2}]}, 0x94) sendmsg$inet(r1, &(0x7f00000029c0)={&(0x7f0000000100)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000002780)=[{&(0x7f00000006c0)='{', 0x1}], 0x1}, 0x4000040) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000002000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x7b, 0x0, 0x0) r4 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x5}, {0x2, 0x0, 0x0, 0x8}]}, 0x94) sendmsg$inet(r4, &(0x7f00000029c0)={&(0x7f0000000100)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000002780)=[{&(0x7f00000006c0)='{', 0x1}], 0x1}, 0x4000040) sendmsg$inet(r4, &(0x7f00000000c0)={&(0x7f0000001040)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000140)="71b674", 0x3}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xd, 0x3, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x10000000}, 0x94) close(r5) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x4, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000000000008500000029000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r6, 0x0, 0xe, 0x0, &(0x7f0000000280)="000000789dcd2e7a0c54883d6071", 0x0, 0x4bc7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 16.624737323s ago: executing program 1 (id=13678): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)=@o_path={&(0x7f00000001c0)='./file0\x00', r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000100000000000000000000850000007500000095"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) r4 = socket$kcm(0x2a, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x8917, 0x0) 16.434233444s ago: executing program 1 (id=13680): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed2, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b03d25a806c8c6f94f90624fc601000127a0a000600093582c137153e37080c188001ac0f000300", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0) 16.049386486s ago: executing program 1 (id=13682): perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0xffffffffffffffff}, 0x8, 0x0, 0x0, 0x0, 0x6, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x400200000000003e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff, 0x1}, 0x0, 0x0, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x5, 0x98128, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x8000000000000001}, 0x200, 0x7, 0xfffffffe, 0x0, 0x0, 0x4, 0x9, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') sendmsg$tipc(r1, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) close(r1) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) syz_clone(0x61000600, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e00e020023200b02d25a80ef8cee795c7e6292d4da9d0d", 0x17}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000720000001801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000006c0)="5c00000013006bcd9e3fe3dc6e48aa310b6b8703100000001f03000000000000040014000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000007, 0x4, @perf_config_ext={0x100, 0xffffffffffffffff}, 0x101000, 0x7, 0x8, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="33fe0000180091c8b14a0778a8123d181d"], 0xfe33) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x420, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) getpid() 4.993951659s ago: executing program 7 (id=13768): socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x880}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0x42, 0x40, 0xc2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)="cb423a11b33192d673ba4c831a9adca48ca7eb0d2f073f36dfc3a94144bfd9d81639fd65ac4e557e12e7b0d2dfea051a7b440ade19d879e209596bf44477ecf6370e0133e541ef9f9e3631dde33dabf7842deb7a72c3ffe0f611062628683e3db2c685af", &(0x7f0000000640), 0x1003, r1, 0x8000000}, 0x38) 4.337131478s ago: executing program 7 (id=13762): r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="85000000070000006a0a00ff000000000c00000000000000950000000000000018100000", @ANYRES32, @ANYBLOB="000000000000000005000000000000009500000000000000b1f8306e05d1e4aab009c16b5c05077115d0749619ca39f89974785ae0619b77c6585f678ac92a3b6b4148f56b43c3dd75d75f97c8f92f60a2def458df05e2fbfb3e849b2b3cffd4f29446ae60dd76654b2639b2bc14350706214a6ab7a712d4317fbc3ca01d0d3ed6110b3775903141a5091a4d3db8eb335414fbdb288aba73aaf6d18000a3a2a069cf7f9402e1425bb6bc370576aa1faea0fe222671ecf99038fce8dba53dcb11f87cca"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0900000004000000080000000d00000000000000", @ANYRES32, @ANYRESHEX=r1, @ANYRES32=0x0, @ANYRESOCT=r1, @ANYRES32=r0], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008060000b70401000200f6ff84000000030000009500002002000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r5, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0/../file0/../file0/file0\x00', 0x8c) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.stat\x00', 0x26e1, 0x0) close(r6) socket$kcm(0xa, 0x1, 0x106) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8948, &(0x7f0000000000)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x00 \'Y\x17]\x15c\xcaR\xdd\x98OGK\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb7s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0R\xd3\x8a\xe1n\x97\xea\xf1\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB\x01\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\tb\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18\x00\b\x00\x00Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000005300000095dbd0ff7fa57b0000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) ioctl$SIOCSIFHWADDR(r6, 0x8b28, &(0x7f0000000000)={'wlan1\x00', @random="0100"}) sendmsg$inet(0xffffffffffffffff, 0x0, 0x41a48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x9, 0x26, &(0x7f0000000d80)=ANY=[@ANYBLOB="180000006fe10000000000000500000018110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000181100008f9732a3f097679c86dcfe", @ANYRES32=0x1, @ANYBLOB="0000000000000000b7020000000000008500000086000000851000000100000085100000fbffffff18430000feffffff000000000000000085100000080000004c91e0ff10000000b7080000000000007b8af8ff00000000b7080000ffff00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x36, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x0, 0x5, 0x5, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000880)=[0x1, 0x1, r2], 0x0, 0x10, 0x2}, 0x94) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000080)={r4, r7}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000ac0)='GPL\x00', 0x3, 0x4c, &(0x7f0000000b00)=""/76, 0x40f00, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000bc0)={0x4, 0x4, 0x4, 0x3}, 0x10, 0x1820f, 0xffffffffffffffff, 0x2, &(0x7f0000000c00)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff], &(0x7f0000000c40)=[{0x2, 0x2, 0x7, 0x3}, {0x3, 0x3, 0x5, 0xb}], 0x10, 0x7fff}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000002c0)={'macvlan1\x00', @random="0100061f8145"}) 3.898791113s ago: executing program 5 (id=13766): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004ffffffff00000000030000000000000000000000000000020300"/67], 0x0, 0x4a}, 0x28) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4f34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x1, 0x3}, 0x42, 0xc8, 0x0, 0x4, 0x65, 0x0, 0x6, 0x0, 0x0, 0x0, 0x402}, 0x0, 0x4, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x2d}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xf7}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = socket$kcm(0x21, 0x2, 0xa) sendmsg$kcm(r1, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x0, 0x4, @dev, 0x8000000}}, 0x80, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000100100000100000000000000000000001000000000000000100100000b"], 0x28}, 0xfc40) r2 = socket$kcm(0x21, 0x2, 0xa) sendmsg$kcm(r2, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0xfffc, 0x2, 0x1c, {0xa, 0x0, 0x4, @dev}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0xfc00) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='syzkaller\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f3, &(0x7f0000000080)) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x11, 0xa, 0x300) sendmsg$inet(r4, &(0x7f0000000380)={&(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000001b40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xe}, @local}}}], 0x20}, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x1000, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f0000000140)='./file0\x00', 0x0, 0x18, r3}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000006c0)="5c00000013006bcd9e3fe3dc6e48aa310b6b8703100000001f03000000000000040014000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x4014) 3.568667842s ago: executing program 5 (id=13769): socket$kcm(0xa, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1042, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x1, 0x0, 0x0, 0x5, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001340)=ANY=[], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) write$cgroup_devices(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0700a3fcf070d1ff"], 0xffdd) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)="89000000120081ae08060cdc030000017f03e3f7000000006ee2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c0001000b080c00bdad01409bbc7a46e39a8285dcdf12176679df069163ce947ee2b49e33538afaeb2713f450ebd010a20ff27fff0000000000000000", 0x89}], 0x1}, 0xff0f000000000000) 2.537473562s ago: executing program 5 (id=13773): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x4002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x5, 0x4, &(0x7f0000000240)=ANY=[@ANYRES64=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)=@o_path={&(0x7f0000000080)='./file0\x00'}, 0x18) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$kcm(0x10, 0x100000000002, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0xae, 0x0, 0x0, 0x0, 0x5d34, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext={0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='{[\\]+\x00') socketpair(0x3f, 0x1, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYRES64=r1, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000000000000000000001759983f1b958500a7b0f654f9cb0ecdac2246875885671000002a00", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xb2, 0x0, &(0x7f0000000640)="7a7fa22c2af5eae5e6c9a586521b3a42d323e8c897abd13a62510ec4ffe7ff42e1e71418d3cbc707574993a63677809014ba709d36f0020d4fc38086dc08987f70908fcb8dca6cf5996e5cf1126cb3979631bb52d5e4c98a0c7a564479a9cdb8fe68d3ecece90aeb1fee5fad7841349e0cc600f0d1605b1de1e54ac5246961d66c86f96bbf9e89d1220856c1602cff8a8385878765bc252842cfacb6e61404986f3e786b71fa78309352a64f8e6d89509ac5", 0x0, 0x40a06, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100000000340000003400000005000000030000000000001008000000030000000000001103000017010000000000000001000004040000000000000002000000000000000061612e000000000000"], 0x0, 0x51}, 0x28) socket$kcm(0x10, 0x2, 0x0) r4 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001ac0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xbf, &(0x7f000000cf3d)=""/191, 0x0, 0x0, '\x00', 0x0, @fallback=0x23}, 0x66) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='freezer.self_freezing\x00', 0x26e1, 0x0) r6 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r6, &(0x7f0000001ac0)={&(0x7f00000011c0)=@in={0x2, 0x4e24, @broadcast}, 0x80, 0x0}, 0x0) 2.442078737s ago: executing program 7 (id=13775): perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xbd0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001001f000404000001007d60b7030000000000006a0a00fe00000100850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465cbf188ef10871b81ac7553358380b3a1f59916ffc9bf0bdf81524f07fb2819bf5774fedda52e39c90af27db5b56024df96b4673b4e8d5467e114604ea09b290a248a120c9c6cd87cef9000000a39c15a7ef365cc27dfeac7b9b0e9048517354b0ca4f9cf8b59ee6fa003fe1f2c4c15f20a07db4583a462d8be6602186fd68ee14a19ea2eb42122b8635a66ce6b5b92356081bc0f18a0ca83dbc089a9813c1efa26001b3f486ebfaae85c4d0b96778478ae5355e6f923b11056969f486f80a35f7f2339704fa93fa915ab8e1e0d7f31ebd19455e6827cd493907bf9d0000000000000000000000004e1fa60acabcf0553910ca2e5ea499fd5889dde9261f0848a5b8af657bfc96049308e8953431b269053627a1523551c160c813969925a892d266792352ec0204596a37ce8d6d260b32239bddbce2e79f93cb5a0ad897adb53b397d07c50f84b74f2605a565ee149016aa75ea31c0087dcd821b47c8b36efc6da4fb2ea7f1f36c85856b73ac9872babc62149699b6b8c796a79d833eb4b5ca668d430db5653a2b3c5b87e17ca1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f00000002c0)="b90103616908068c3c270040e70000", 0x0, 0x8104, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0, 0x2f}, 0x50) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000100)={0x1b, 0x0, 0x0, 0xc836, 0x0, 0xffffffffffffffff, 0xd8e, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x2}, 0x50) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x4, 0x3, 0x4, 0x2, {0xa, 0x4e20, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1d12000}}}, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000a40)="e48392e93996d267b80f", 0xa}], 0x1, &(0x7f0000000d80)}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0x58, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f00000005c0)=""/123, 0x7b, 0x0, &(0x7f0000000640)=""/23, 0x17}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x2, '\x00', r3, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x14, 0x1d, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @ringbuf_query, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000300)='GPL\x00', 0x141, 0x0, 0x0, 0x41000, 0x0, '\x00', r3, @fallback=0x6, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x4, 0x8, 0x7500, 0x1}, 0x10, r5, r0, 0x3, &(0x7f0000000700)=[r6], &(0x7f0000000900)=[{0x3, 0x4, 0x6, 0x8}, {0x1, 0x2, 0xe, 0xa}, {0x4, 0x5, 0x10, 0x2}], 0x10, 0x3}, 0x94) 2.352410613s ago: executing program 4 (id=13777): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)=@o_path={&(0x7f00000001c0)='./file0\x00', r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$kcm(0x2a, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x8917, 0x0) 2.312913445s ago: executing program 5 (id=13778): r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="85000000070000006a0a00ff000000000c00000000000000950000000000000018100000", @ANYRES32, @ANYBLOB="000000000000000005000000000000009500000000000000b1f8306e05d1e4aab009c16b5c05077115d0749619ca39f89974785ae0619b77c6585f678ac92a3b6b4148f56b43c3dd75d75f97c8f92f60a2def458df05e2fbfb3e849b2b3cffd4f29446ae60dd76654b2639b2bc14350706214a6ab7a712d4317fbc3ca01d0d3ed6110b3775903141a5091a4d3db8eb335414fbdb288aba73aaf6d18000a3a2a069cf7f9402e1425bb6bc370576aa1faea0fe222671ecf99038fce8dba53dcb11f87cca"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0900000004000000080000000d00000000000000", @ANYRES32, @ANYRESHEX=r1, @ANYRES32=0x0, @ANYRESOCT=r1, @ANYRES32=r0], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008060000b70401000200f6ff84000000030000009500002002000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r5, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0/../file0/../file0/file0\x00', 0x8c) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.stat\x00', 0x26e1, 0x0) close(r6) socket$kcm(0xa, 0x1, 0x106) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8948, &(0x7f0000000000)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x00 \'Y\x17]\x15c\xcaR\xdd\x98OGK\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb7s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0R\xd3\x8a\xe1n\x97\xea\xf1\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB\x01\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\tb\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18\x00\b\x00\x00Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000005300000095dbd0ff7fa57b0000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) ioctl$SIOCSIFHWADDR(r6, 0x8b28, &(0x7f0000000000)={'wlan1\x00', @random="0100"}) sendmsg$inet(0xffffffffffffffff, 0x0, 0x41a48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x9, 0x26, &(0x7f0000000d80)=ANY=[@ANYBLOB="180000006fe10000000000000500000018110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000181100008f9732a3f097679c86dcfe", @ANYRES32=0x1, @ANYBLOB="0000000000000000b7020000000000008500000086000000851000000100000085100000fbffffff18430000feffffff000000000000000085100000080000004c91e0ff10000000b7080000000000007b8af8ff00000000b7080000ffff00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x36, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x0, 0x5, 0x5, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000880)=[0x1, 0x1, r2], 0x0, 0x10, 0x2}, 0x94) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000080)={r4, r7}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000ac0)='GPL\x00', 0x3, 0x4c, &(0x7f0000000b00)=""/76, 0x40f00, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000bc0)={0x4, 0x4, 0x4, 0x3}, 0x10, 0x1820f, 0xffffffffffffffff, 0x2, &(0x7f0000000c00)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff], &(0x7f0000000c40)=[{0x2, 0x2, 0x7, 0x3}, {0x3, 0x3, 0x5, 0xb}], 0x10, 0x7fff}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) 2.156719924s ago: executing program 4 (id=13779): socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x880}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0x42, 0x40, 0xc2, 0x1}, 0x48) close(r0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)="cb423a11b33192d673ba4c831a9adca48ca7eb0d2f073f36dfc3a94144bfd9d81639fd65ac4e557e12e7b0d2dfea051a7b440ade19d879e209596bf44477ecf6370e0133e541ef9f9e3631dde33dabf7842deb7a72c3ffe0f611062628683e3db2c685af", &(0x7f0000000640), 0x1003, r2}, 0x38) 2.05669289s ago: executing program 5 (id=13780): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xbd9ddb11bfb6c30d}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) r0 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r0, &(0x7f0000000680)={&(0x7f0000000140)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000180)='W', 0xfe8a}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) socket$kcm(0x10, 0x3, 0x10) 1.901177649s ago: executing program 6 (id=13782): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500"], 0x48) r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f00000004c0)={&(0x7f0000000140)={0x2, 0x0, @local}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000180)="ba", 0x1}], 0x1}, 0x4008804) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000000)="c109000700000000001d1e020e71", 0xe}, {&(0x7f0000000500)="392696cbe26ae95948441e8fef48b36bd7", 0x11}], 0x2}, 0x20040000) 1.872847291s ago: executing program 4 (id=13783): r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa000000, &(0x7f0000000080)=[{&(0x7f0000000040)="140000001c000b63d25a80648c2594f91624fc60", 0x14}], 0x1}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x800, 0x0, 0x0, 0x0, 0x7, 0xffff, 0x0, 0x0, 0x0, 0xe000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x6, 0xf3, 0x6, 0x0, 0x2, 0xd006e1258c48b58c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0xffffffffffffff5a, 0x8}, 0x1c23, 0xca, 0x2, 0x8, 0x200, 0x0, 0x0, 0x0, 0x1000801, 0x0, 0x4000000800004}, 0x0, 0xc, 0xffffffffffffffff, 0xc) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0, 0x3c2cd06dd4e666f}, 0x880, 0x800, 0x0, 0x8, 0x0, 0x200007, 0xffff, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES64=r1], 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x47, 0x0, 0x5, 0xffff, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x35, &(0x7f0000000040), 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000000000000f37538e486dd630080fc09042c00db5bffffffffff000000060300060023000000000000"], 0xfdef) close(0x3) socket$kcm(0x2, 0x200000000000001, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) sendmsg$inet(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="1800000069006bcd8e3fe3dc6e0000000001000000", 0x15}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 1.844197433s ago: executing program 6 (id=13784): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f00000004c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0900000004000000080000000d000000000000", @ANYBLOB='\x00\x00\x00\a\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xd, &(0x7f00000009c0)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000ffffffffffffffff07020000f8ffffffb703000008000000b7040000020000008500000003de000095000020e800000000000000000000000000000092d85993efc93f03e8d965e8a19d1e6db9fe67821ec2450f4db998111fcbc511b3811b16e9d00653c532f09a7a92641809a4b156e3dc5c86dd2af7b15d007fc5970d5eadb84222dd09217a8e1a1c657c7b6b6e48ab"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000240)=ANY=[], 0xfe33) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, 0x0, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x3d) mkdir(0x0, 0x8c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000002c0)={'macvlan1\x00', @random="0100061f8145"}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sysnet/ipv4\b\x00\x03\x00\x00\x00\x00\x00\x00\x00ze\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x00'/59}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (fail_nth: 2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB, @ANYBLOB], 0x48) 1.747549858s ago: executing program 7 (id=13785): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f00000004c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0900000004000000080000000d000000000000", @ANYBLOB='\x00\x00\x00\a\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xd, &(0x7f00000009c0)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000ffffffffffffffff07020000f8ffffffb703000008000000b7040000020000008500000003de000095000020e800000000000000000000000000000092d85993efc93f03e8d965e8a19d1e6db9fe67821ec2450f4db998111fcbc511b3811b16e9d00653c532f09a7a92641809a4b156e3dc5c86dd2af7b15d007fc5970d5eadb84222dd09217a8e1a1c657c7b6b6e48ab"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000240)=ANY=[], 0xfe33) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, 0x0, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x3d) mkdir(0x0, 0x8c) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000002c0)={'macvlan1\x00', @random="0100061f8145"}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sysnet/ipv4\b\x00\x03\x00\x00\x00\x00\x00\x00\x00ze\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x00'/59}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB, @ANYBLOB], 0x48) 1.389517779s ago: executing program 6 (id=13786): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='GPL\x00'}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x4e, 0x1, 0x0, 0x0, 0x0, 0x210e, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0x10000}, 0x110104, 0x32, 0x6, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x9) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x0, 0x9, 0x6, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x0, 0x29, 0x0, 0x28) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000200)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netdevsim0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) write$cgroup_freezer_state(r3, &(0x7f00000000c0)='FREEZING\x00', 0x9) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000f000000e8bd6efb250314000e000100240248ff05000500", 0x2c}, {&(0x7f00000019c0)="06bb", 0x2}], 0x2}, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000100), 0x4) 1.275294795s ago: executing program 4 (id=13787): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x17, 0x1, 0x10, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x9, 0x83b2}, 0x0, 0x2000, 0x4000002}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETBE(0xffffffffffffffff, 0x800454df, &(0x7f00000004c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0900000004000000080000000d000000000000", @ANYBLOB='\x00\x00\x00\a\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xd, &(0x7f00000009c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x10, 0x400000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000580)={r2}) write$cgroup_subtree(r2, &(0x7f0000000240)=ANY=[], 0xfe33) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, 0x0, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x3d) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xbd, &(0x7f000000cf3d)=""/189, 0x0, 0x1, '\x00', 0x0, @sock_ops}, 0x94) r5 = socket$kcm(0x1e, 0x5, 0x0) socket$kcm(0x2, 0x2, 0x84) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x50) setsockopt$sock_attach_bpf(r1, 0x84, 0x85, &(0x7f0000000680)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x13, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xd, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) r8 = socket$kcm(0x10, 0x2, 0x10) recvmsg(r8, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x20) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003507d25a806f8c6394f90524fc600d001141090005000500000037153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(r5, 0x0, 0x2000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0x1, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4e, '\x00', r9, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="01f0ffffffffffffff00000029", @ANYRES64=r5, @ANYRES64=r10], 0x48) 1.169543292s ago: executing program 5 (id=13788): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0xcc3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r0}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b80)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)) close(r2) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001000)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = getpid() r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x1, 0x7fff, 0x7fffffff}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000380)=ANY=[@ANYBLOB='1-2:5/', @ANYBLOB='E'], 0x31) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'batadv0\x00', 0x800}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x2, 0x20000}, 0x0, 0x0, 0x0, 0x6, 0x7, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x5}, 0x10}, 0x94) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x20702, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$TUNSETQUEUE(r10, 0x400454d9, &(0x7f0000000780)={'pim6reg0\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000080)) 1.097681995s ago: executing program 6 (id=13789): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x4002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x5, 0x4, &(0x7f0000000240)=ANY=[@ANYRES64=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)=@o_path={&(0x7f0000000080)='./file0\x00'}, 0x18) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$kcm(0x10, 0x100000000002, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0xae, 0x0, 0x0, 0x0, 0x5d34, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext={0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='{[\\]+\x00') socketpair(0x3f, 0x1, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYRES64=r1, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000000000000000000001759983f1b958500a7b0f654f9cb0ecdac2246875885671000002a00", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xb2, 0x0, &(0x7f0000000640)="7a7fa22c2af5eae5e6c9a586521b3a42d323e8c897abd13a62510ec4ffe7ff42e1e71418d3cbc707574993a63677809014ba709d36f0020d4fc38086dc08987f70908fcb8dca6cf5996e5cf1126cb3979631bb52d5e4c98a0c7a564479a9cdb8fe68d3ecece90aeb1fee5fad7841349e0cc600f0d1605b1de1e54ac5246961d66c86f96bbf9e89d1220856c1602cff8a8385878765bc252842cfacb6e61404986f3e786b71fa78309352a64f8e6d89509ac5", 0x0, 0x40a06, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100000000340000003400000005000000030000000000001008000000030000000000001103000017010000000000000001000004040000000000000002000000000000000061612e000000000000"], 0x0, 0x51}, 0x28) socket$kcm(0x10, 0x2, 0x0) r4 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001ac0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xbf, &(0x7f000000cf3d)=""/191, 0x0, 0x0, '\x00', 0x0, @fallback=0x23}, 0x66) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='freezer.self_freezing\x00', 0x26e1, 0x0) r6 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r6, &(0x7f0000001ac0)={&(0x7f00000011c0)=@in={0x2, 0x4e24, @broadcast}, 0x80, 0x0}, 0x0) 963.936563ms ago: executing program 7 (id=13790): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)=@o_path={&(0x7f00000001c0)='./file0\x00', r0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$kcm(0x2a, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x8917, 0x0) 948.377194ms ago: executing program 35 (id=13682): perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0xffffffffffffffff}, 0x8, 0x0, 0x0, 0x0, 0x6, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x400200000000003e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff, 0x1}, 0x0, 0x0, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x5, 0x98128, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x8000000000000001}, 0x200, 0x7, 0xfffffffe, 0x0, 0x0, 0x4, 0x9, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') sendmsg$tipc(r1, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) close(r1) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) syz_clone(0x61000600, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e00e020023200b02d25a80ef8cee795c7e6292d4da9d0d", 0x17}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000720000001801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000006c0)="5c00000013006bcd9e3fe3dc6e48aa310b6b8703100000001f03000000000000040014000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000007, 0x4, @perf_config_ext={0x100, 0xffffffffffffffff}, 0x101000, 0x7, 0x8, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="33fe0000180091c8b14a0778a8123d181d"], 0xfe33) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x420, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) getpid() 884.418188ms ago: executing program 4 (id=13792): r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="85000000070000006a0a00ff000000000c00000000000000950000000000000018100000", @ANYRES32, @ANYBLOB="000000000000000005000000000000009500000000000000b1f8306e05d1e4aab009c16b5c05077115d0749619ca39f89974785ae0619b77c6585f678ac92a3b6b4148f56b43c3dd75d75f97c8f92f60a2def458df05e2fbfb3e849b2b3cffd4f29446ae60dd76654b2639b2bc14350706214a6ab7a712d4317fbc3ca01d0d3ed6110b3775903141a5091a4d3db8eb335414fbdb288aba73aaf6d18000a3a2a069cf7f9402e1425bb6bc370576aa1faea0fe222671ecf99038fce8dba53dcb11f87cca"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0900000004000000080000000d00000000000000", @ANYRES32, @ANYRESHEX=r1, @ANYRES32=0x0, @ANYRESOCT=r1, @ANYRES32=r0], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008060000b70401000200f6ff84000000030000009500002002000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r5, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0/../file0/../file0/file0\x00', 0x8c) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.stat\x00', 0x26e1, 0x0) close(r6) socket$kcm(0xa, 0x1, 0x106) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8948, &(0x7f0000000000)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x00 \'Y\x17]\x15c\xcaR\xdd\x98OGK\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb7s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0R\xd3\x8a\xe1n\x97\xea\xf1\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB\x01\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\tb\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18\x00\b\x00\x00Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000005300000095dbd0ff7fa57b0000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) ioctl$SIOCSIFHWADDR(r6, 0x8b28, &(0x7f0000000000)={'wlan1\x00', @random="0100"}) sendmsg$inet(0xffffffffffffffff, 0x0, 0x41a48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x9, 0x26, &(0x7f0000000d80)=ANY=[@ANYBLOB="180000006fe10000000000000500000018110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000181100008f9732a3f097679c86dcfe", @ANYRES32=0x1, @ANYBLOB="0000000000000000b7020000000000008500000086000000851000000100000085100000fbffffff18430000feffffff000000000000000085100000080000004c91e0ff10000000b7080000000000007b8af8ff00000000b7080000ffff00007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x36, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x0, 0x5, 0x5, 0x800}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000880)=[0x1, 0x1, r2], 0x0, 0x10, 0x2}, 0x94) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000080)={r4, r7}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f00000002c0)={'macvlan1\x00', @random="0100061f8145"}) 766.678175ms ago: executing program 6 (id=13793): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="1c0000005e007f029e3b470d649b72ab25399cd956c07dead6a93690", 0x1c}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x10122) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f90324fc60", 0x14}], 0x1}, 0x0) recvmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030020000b12d25a80648c2594f90124fc60100c07", 0x17}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x2) sendmsg$kcm(r3, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001280)='\x00', 0x1}], 0x1}, 0x480d0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0x1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={0x1, 0x58, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x8) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x5, [@const={0x2, 0x0, 0x0, 0xa, 0x2}, @enum={0x7, 0x1, 0x0, 0x6, 0x4, [{0x7, 0x5}]}, @restrict={0x8, 0x0, 0x0, 0xb, 0x1}, @enum={0x2, 0x2, 0x0, 0x6, 0x4, [{0x6, 0x3}, {0xa, 0x68000000}]}, @decl_tag={0x9, 0x0, 0x0, 0x11, 0x2, 0x8}, @restrict={0xc, 0x0, 0x0, 0xb, 0x4}, @enum={0x1, 0x5, 0x0, 0x6, 0x4, [{0xe, 0x83}, {0x5, 0xffff}, {0x1, 0x2}, {0xa, 0x9}, {0xf, 0x101}]}]}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000800)=""/156, 0xb5, 0x9c, 0x0, 0x5}, 0x28) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000000055099002ac61b2dc371510dd4e457f454876755771e9e9e8e5b6890f37f27cb6c4a6fb09691009a5630b506f87af205b7e7aff31f70e567dceb892a0856bf27ef2e1f59a5c0209d4261557b2a81a272526ffffffffffffffffb0c637e2ee5cc1a0533b94ac6e5153296b32d97b06129122b9ba42fa3b21ffbf1e90f09e9dc6b391dfeb07d04ceaae30c07bdc4088c2e0261fa9499ea5a5a2d7e9f7c8b6298e221bafbb5edea41cca43a0d21f"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r9, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0xf, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x107a654, 0x0, 0x0, 0x0, 0x1}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, r7, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000980), &(0x7f00000009c0)}, 0x20) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x8, 0xc000000, 0x1, 0x3, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x4, 0xf}, 0x50) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)=@o_path={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x8, r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x9, 0xd, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x38}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0xb, 0xb, 0x6, 0x1, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f00000002c0)='GPL\x00', 0x5, 0xc, &(0x7f0000000340)=""/12, 0x41100, 0x8, '\x00', r5, @cgroup_sock=0xd, r6, 0x8, &(0x7f0000000900)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000940)={0x0, 0x1, 0x401, 0x89}, 0x10, r10, r2, 0x0, &(0x7f0000000b40)=[0xffffffffffffffff, 0x1, r11, r12, r13], 0x0, 0x10, 0x5}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f00000004c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2c}}, 0x10, 0x0, 0x0, &(0x7f0000003a00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @multicast1}}}], 0x20}, 0x40008d4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@fallback, 0x8, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, &(0x7f0000000100)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x4, &(0x7f0000000300)=@framed={{}, [@ldst={0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x18}]}, &(0x7f0000000380)='GPL\x00', 0x7, 0x9c, &(0x7f00000003c0)=""/156}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x3, 0xe, &(0x7f00000029c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES32, @ANYRESHEX=0x0, @ANYRESOCT, @ANYBLOB="8243aac5718caab77c632612df2870695f989b8ae6ac3dd7531ce44f318e31d30245a9e84cfbc2963dfe0508f8419fe1089cbbf82fb875faf37ee3f8b0be28b9e07b8c920127d6735fe478949e910f8449e24a6e017c11c21a85c3ee41f74f872a72e94f32c8fe1d20f4e780cdfa8ec1d9e106da0bf0d3b0c1ec30520939434c977f4a1092b9e916c72470c7877da50cf9e6", @ANYRES32, @ANYRESOCT=0x0, @ANYRESOCT], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x33) 240.141636ms ago: executing program 7 (id=13794): r0 = socket$kcm(0x22, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x80044942, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext, 0x101000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0x1, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x2}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r5, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r6}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r8, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x6, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000080000000000000006000000950000000000000028"], &(0x7f0000000bc0)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', r9, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x13, 0x3, 0x3c2a, 0x5, 0x20000, r3, 0x40006, '\x00', r9, 0xffffffffffffffff, 0x2, 0xffffffff, 0x4}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000480)=[0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x3f, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0xb7, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) sendmsg$inet(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000200)="7c326821f69de5c5c0ad8cf827302876e07237563bcd72091415791dae07f7ed02e4ec5af104ea21545a6339cc92cc086ad6b3a63d09b2ba3f33a76bfbe93709e701402f0f0d1e27d884d43d9be223124cf129d70a0ef062", 0x58}, {&(0x7f0000000280)="c9553712b996b86757de9a27791c2ef61f25162c91d87803ad14eb6ffaeb36b4040c702b050043a75928a0d867f8c15633fcfa76df84631801365df903d59a7dda65b3765a6f017891e9505457db88fd69a675aaa29b88ce07006be0f358bcb0d041dd17b6ce8d4593cc3379f74e4eecdea15697351c8c8276e44e00608e22e035", 0x81}], 0x2, &(0x7f0000000740)=ANY=[@ANYBLOB="1400000000000000000000000200000000000000000000001c000000000000000000000008000000", @ANYRES32=r2, @ANYBLOB="ac1414aae0000001000000001c000000000000000000000008000000", @ANYRES32=r9, @ANYBLOB="0a0101016401010100000000140000000000000000000000010000002a0500000000000040000000000000000000000007000048f9b7dc00442ce6436401010100000002ac1414bb00000007ac1e0001003500000003e000000100000ff1830334001400000000000000000000000200000004000000000000001100000000000000000000000100000000000000000000001c0000000000000000000000080000000000", @ANYRES32=r10, @ANYBLOB="0a0101020a0101010000000014000000000000000000000001000000d6bc0000000000003800000000000000000000000700000044089f0000000fff00831f91e0000001ffffffffe0000002ffffffffe00000010a010100ac1e0001"], 0x150}, 0x40090) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xd, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="720ac4ff000000007110bb00000000009500000000000000"], &(0x7f0000000480)='GPL\x00'}, 0x80) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x82, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000180)={'veth0_to_team\x00', 0x1000}) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) write$cgroup_type(r12, &(0x7f0000000080), 0x11ffffce1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x3, 0xc, &(0x7f0000000ac0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r13 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r13, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="5c00000014006b04c84e21020af32c6e0aa875861fc85102500100000017d34460bc24eab556a705251e6182949a36c23d3b48dfd8ccbf9367b498fa51f60a64c9f4d4938037e7861400bdd70000b6c0504bb9189d9193e9bd1c1b78", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r14 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0xf, 0x0, 0x8, 0x1, 0x80, r12, 0x5, '\x00', r7, r12, 0x0, 0x3, 0x5}, 0x50) write$cgroup_int(r14, &(0x7f0000000080), 0x12) 35.820728ms ago: executing program 6 (id=13795): bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000400)={&(0x7f0000000040)="1d3efa78872e77b1a9ef2f69e477b8412376a038198bb6f6a69433d5268efeb5d2c311c2c21e620509eb351f48d59f", 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, 0x4}, 0x38) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r2 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0xc}, 0x4044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0f0000000400040004000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYBLOB='\x00'/28], 0x48) r4 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r4, 0x84, 0x8, &(0x7f0000000000), 0x8) sendmsg$kcm(r4, &(0x7f0000000240)={&(0x7f0000000040)=@l2tp={0x2, 0x0, @private=0xa010100, 0x1}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)='a', 0x1}], 0x1}, 0x0) sendmsg$inet(r4, &(0x7f0000000380)={&(0x7f0000000600)={0x2, 0x0, @private=0xa010100}, 0x10, &(0x7f0000000340)=[{&(0x7f00000006c0)="a584", 0xffe0}], 0x1}, 0x0) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000000700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000015c0)=ANY=[@ANYRES32=r3, @ANYRES32=r5, @ANYBLOB="05"], 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0600000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000b02d403f1be842465ac8e565fb000000f9ffff000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r7, 0x2000002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r8, 0x0, 0x40000100) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') r9 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r9, 0x84, 0xb, &(0x7f00000002c0), 0x50) socket$kcm(0x10, 0x3, 0x10) 0s ago: executing program 4 (id=13796): r0 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x2, 0x5, 0x84) (async) r1 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22}, 0x94) socketpair(0x1, 0x5, 0x3, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x65, 0xe, 0x0, 0x0, 0x0, 0x2000, 0xbf281, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000a, 0x0, @perf_bp={0x0, 0x2}, 0x1075, 0x4, 0x0, 0x0, 0xffffffffffffbbfe, 0x0, 0x1, 0x0, 0xfffffffe, 0x0, 0xfffffffffffffffe}, 0x0, 0x8000000000009, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x922000000004, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) (async) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000000)={&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="f4001100032b2c25fe8007000000007a2c080000000900"/40, 0x5dc}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x0) (async) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0xd, &(0x7f0000000180)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848120000005e0c0000000000000e000a001400000002800000121f", 0x82}], 0x1}, 0x0) (async) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0xd, &(0x7f0000000180)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848120000005e0c0000000000000e000a001400000002800000121f", 0x82}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x16, 0x0, 0x0) (async) setsockopt$sock_attach_bpf(r1, 0x84, 0x16, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000040)="d8000000190081054e81f782db4cb9040a1d080006007c02e8fe55a10a0015950900142603600e1208000f4f1b000401a8001200200005400400027c035c0461c1d67f6f94007134cf6efb8000a045a29045a20189b316277ce06bbace8017cbec4c2ee5a7def4090000001fb791643a5ee4ce1b147c9f8775000500000a0000004edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f2106e3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b4386b7401c13a5370e9703920723f9fea39f7418", 0xd8}], 0x1}, 0x2000) kernel console output (not intermixed with test programs): wlan0: link becomes ready [ 2027.582109][T13203] FAULT_INJECTION: forcing a failure. [ 2027.582109][T13203] name failslab, interval 1, probability 0, space 0, times 0 [ 2027.607046][T13203] CPU: 0 PID: 13203 Comm: syz.5.12849 Not tainted syzkaller #0 [ 2027.614642][T13203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2027.624722][T13203] Call Trace: [ 2027.628026][T13203] [ 2027.630980][T13203] dump_stack_lvl+0x188/0x250 [ 2027.635699][T13203] ? show_regs_print_info+0x20/0x20 [ 2027.640927][T13203] ? load_image+0x400/0x400 [ 2027.645464][T13203] ? __might_sleep+0xf0/0xf0 [ 2027.650073][T13203] ? __lock_acquire+0x7d10/0x7d10 [ 2027.655133][T13203] should_fail+0x38c/0x4c0 [ 2027.659619][T13203] should_failslab+0x5/0x20 [ 2027.663348][ T776] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2027.664172][T13203] slab_pre_alloc_hook+0x51/0xc0 [ 2027.676903][T13203] kmem_cache_alloc_node+0x47/0x2d0 [ 2027.682122][T13203] ? __alloc_skb+0xf4/0x750 [ 2027.686659][T13203] __alloc_skb+0xf4/0x750 [ 2027.691012][T13203] alloc_skb_with_frags+0xa7/0x730 [ 2027.696139][T13203] ? __lock_acquire+0x7d10/0x7d10 [ 2027.701188][T13203] ? trace_event_raw_event_lock+0x270/0x270 [ 2027.707111][T13203] sock_alloc_send_pskb+0x87f/0x9a0 [ 2027.712323][T13203] ? __might_fault+0xb3/0x110 [ 2027.717057][T13203] ? sock_kzfree_s+0x50/0x50 [ 2027.721658][T13203] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2027.727859][T13203] packet_sendmsg+0x343c/0x5060 [ 2027.732790][T13203] ? __might_sleep+0xf0/0xf0 [ 2027.737431][T13203] ? aa_sk_perm+0x7dc/0x910 [ 2027.741949][T13203] ? packet_getsockopt+0x9a0/0x9a0 [ 2027.747109][T13203] ? aa_sock_msg_perm+0x94/0x150 [ 2027.752079][T13203] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 2027.757391][T13203] ? security_socket_sendmsg+0x7c/0xa0 [ 2027.762873][T13203] ? packet_getsockopt+0x9a0/0x9a0 [ 2027.768010][T13203] ____sys_sendmsg+0x5b7/0x8f0 [ 2027.772824][T13203] ? __sys_sendmsg_sock+0x30/0x30 [ 2027.777901][T13203] ? import_iovec+0x6f/0xa0 [ 2027.782434][T13203] ___sys_sendmsg+0x236/0x2e0 [ 2027.787143][T13203] ? __sys_sendmsg+0x2a0/0x2a0 [ 2027.791950][T13203] ? trace_event_raw_event_lock+0x270/0x270 [ 2027.797856][T13203] ? vfs_write+0x8b2/0xd60 [ 2027.802350][T13203] __se_sys_sendmsg+0x1af/0x290 [ 2027.807219][T13203] ? __x64_sys_sendmsg+0x80/0x80 [ 2027.812162][T13203] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2027.818184][T13203] ? lockdep_hardirqs_on+0x94/0x140 [ 2027.823404][T13203] do_syscall_64+0x4c/0xa0 [ 2027.827828][T13203] ? clear_bhb_loop+0x30/0x80 [ 2027.832518][T13203] ? clear_bhb_loop+0x30/0x80 [ 2027.837212][T13203] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2027.843111][T13203] RIP: 0033:0x7f72fec80f79 [ 2027.847534][T13203] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2027.867144][T13203] RSP: 002b:00007f72fcedb028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2027.875568][T13203] RAX: ffffffffffffffda RBX: 00007f72feefafa0 RCX: 00007f72fec80f79 [ 2027.883552][T13203] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000007 [ 2027.891527][T13203] RBP: 00007f72fcedb090 R08: 0000000000000000 R09: 0000000000000000 [ 2027.899504][T13203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2027.907478][T13203] R13: 00007f72feefb038 R14: 00007f72feefafa0 R15: 00007ffeb3680fb8 [ 2027.915497][T13203] [ 2027.946940][ T776] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2027.967821][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2028.110384][T13217] netlink: 132 bytes leftover after parsing attributes in process `syz.5.12852'. [ 2028.237061][T13223] netlink: 'syz.5.12855': attribute type 21 has an invalid length. [ 2028.245756][T13223] netlink: 'syz.5.12855': attribute type 6 has an invalid length. [ 2028.257399][T13223] netlink: 132 bytes leftover after parsing attributes in process `syz.5.12855'. [ 2028.341390][T13225] netlink: 'syz.1.12856': attribute type 1 has an invalid length. [ 2028.379944][T13225] netlink: 161700 bytes leftover after parsing attributes in process `syz.1.12856'. [ 2028.400584][T13226] netlink: 'syz.6.12854': attribute type 10 has an invalid length. [ 2028.434504][T13226] bridge0: port 2(bridge_slave_1) entered disabled state [ 2028.473708][T13226] device bridge_slave_1 left promiscuous mode [ 2028.501405][T13226] bridge0: port 2(bridge_slave_1) entered disabled state [ 2028.542308][T13226] bond0: (slave bridge_slave_1): Enslaving as an active interface with an up link [ 2028.680823][T13244] netlink: 'syz.1.12861': attribute type 10 has an invalid length. [ 2028.770505][T13248] netlink: 'syz.4.12860': attribute type 3 has an invalid length. [ 2028.798620][T13248] netlink: 197324 bytes leftover after parsing attributes in process `syz.4.12860'. [ 2029.396192][T13286] FAULT_INJECTION: forcing a failure. [ 2029.396192][T13286] name failslab, interval 1, probability 0, space 0, times 0 [ 2029.422115][T13288] validate_nla: 2 callbacks suppressed [ 2029.422134][T13288] netlink: 'syz.1.12877': attribute type 10 has an invalid length. [ 2029.445091][T13286] CPU: 1 PID: 13286 Comm: syz.4.12875 Not tainted syzkaller #0 [ 2029.452670][T13286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2029.462728][T13286] Call Trace: [ 2029.466011][T13286] [ 2029.468944][T13286] dump_stack_lvl+0x188/0x250 [ 2029.473636][T13286] ? show_regs_print_info+0x20/0x20 [ 2029.478843][T13286] ? load_image+0x400/0x400 [ 2029.483360][T13286] ? perf_trace_lock+0xe4/0x390 [ 2029.488218][T13286] ? perf_trace_lock+0xe4/0x390 [ 2029.493084][T13286] should_fail+0x38c/0x4c0 [ 2029.497517][T13286] should_failslab+0x5/0x20 [ 2029.502020][T13286] slab_pre_alloc_hook+0x51/0xc0 [ 2029.506952][T13286] ? skb_clone+0x1bd/0x350 [ 2029.511372][T13286] kmem_cache_alloc+0x3d/0x290 [ 2029.516127][T13286] skb_clone+0x1bd/0x350 [ 2029.520364][T13286] __netlink_deliver_tap+0x3cd/0x7c0 [ 2029.525643][T13286] netlink_deliver_tap+0x16c/0x180 [ 2029.530736][T13286] netlink_unicast+0x74f/0x920 [ 2029.535491][T13286] netlink_sendmsg+0x8ba/0xbe0 [ 2029.540241][T13286] ? netlink_getsockopt+0x570/0x570 [ 2029.545423][T13286] ? aa_sock_msg_perm+0x94/0x150 [ 2029.550349][T13286] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 2029.555617][T13286] ? security_socket_sendmsg+0x7c/0xa0 [ 2029.561058][T13286] ? netlink_getsockopt+0x570/0x570 [ 2029.566241][T13286] ____sys_sendmsg+0x5b7/0x8f0 [ 2029.570996][T13286] ? __sys_sendmsg_sock+0x30/0x30 [ 2029.576011][T13286] ? import_iovec+0x6f/0xa0 [ 2029.580501][T13286] ___sys_sendmsg+0x236/0x2e0 [ 2029.585165][T13286] ? __sys_sendmsg+0x2a0/0x2a0 [ 2029.589918][T13286] ? trace_event_raw_event_lock+0x270/0x270 [ 2029.595793][T13286] ? vfs_write+0x8b2/0xd60 [ 2029.600209][T13286] __se_sys_sendmsg+0x1af/0x290 [ 2029.605044][T13286] ? __x64_sys_sendmsg+0x80/0x80 [ 2029.609963][T13286] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2029.615940][T13286] ? lockdep_hardirqs_on+0x94/0x140 [ 2029.621121][T13286] do_syscall_64+0x4c/0xa0 [ 2029.625518][T13286] ? clear_bhb_loop+0x30/0x80 [ 2029.630176][T13286] ? clear_bhb_loop+0x30/0x80 [ 2029.634836][T13286] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2029.640710][T13286] RIP: 0033:0x7fb74efb9f79 [ 2029.645108][T13286] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2029.664695][T13286] RSP: 002b:00007fb74d214028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2029.673092][T13286] RAX: ffffffffffffffda RBX: 00007fb74f233fa0 RCX: 00007fb74efb9f79 [ 2029.681045][T13286] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 2029.688997][T13286] RBP: 00007fb74d214090 R08: 0000000000000000 R09: 0000000000000000 [ 2029.696949][T13286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2029.704907][T13286] R13: 00007fb74f234038 R14: 00007fb74f233fa0 R15: 00007ffd35c5b1b8 [ 2029.712874][T13286] [ 2029.768697][T13288] bridge0: port 3(syz_tun) entered disabled state [ 2029.785559][T13288] bridge0: port 3(syz_tun) entered disabled state [ 2029.798162][T13288] bond0: (slave syz_tun): Enslaving as an active interface with an up link [ 2029.810545][T13284] netlink: 'syz.6.12874': attribute type 10 has an invalid length. [ 2029.851717][T13284] 8021q: adding VLAN 0 to HW filter on device team0 [ 2029.889614][T13284] bond0: (slave team0): Enslaving as an active interface with an up link [ 2029.989551][T13286] netlink: 'syz.4.12875': attribute type 21 has an invalid length. [ 2029.998783][T13286] netlink: 'syz.4.12875': attribute type 6 has an invalid length. [ 2030.029016][T13307] netlink: 'syz.1.12880': attribute type 4 has an invalid length. [ 2030.045451][T13286] netlink: 132 bytes leftover after parsing attributes in process `syz.4.12875'. [ 2030.059660][T13307] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.12880'. [ 2030.077368][T13305] netlink: 'syz.5.12878': attribute type 3 has an invalid length. [ 2030.103167][T13305] netlink: 'syz.5.12878': attribute type 8 has an invalid length. [ 2030.111189][T13305] netlink: 197324 bytes leftover after parsing attributes in process `syz.5.12878'. [ 2030.120727][T13293] netlink: 'syz.7.12876': attribute type 10 has an invalid length. [ 2030.244944][T13293] device bridge_slave_1 entered promiscuous mode [ 2030.252276][T13293] bond0: (slave bridge_slave_1): Enslaving as an active interface with an up link [ 2030.277475][T13317] netlink: 'syz.1.12882': attribute type 5 has an invalid length. [ 2030.655678][T13327] bond0: (slave team0): Error: Slave device does not support XDP [ 2030.718039][T13326] delete_channel: no stack [ 2030.885047][T13341] netlink: 'syz.6.12891': attribute type 10 has an invalid length. [ 2031.016400][T13348] FAULT_INJECTION: forcing a failure. [ 2031.016400][T13348] name failslab, interval 1, probability 0, space 0, times 0 [ 2031.029474][T13348] CPU: 1 PID: 13348 Comm: syz.6.12894 Not tainted syzkaller #0 [ 2031.037041][T13348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2031.047103][T13348] Call Trace: [ 2031.050397][T13348] [ 2031.053337][T13348] dump_stack_lvl+0x188/0x250 [ 2031.058039][T13348] ? show_regs_print_info+0x20/0x20 [ 2031.063250][T13348] ? load_image+0x400/0x400 [ 2031.067781][T13348] ? memcpy+0x3c/0x60 [ 2031.071775][T13348] ? nla_put+0x130/0x1e0 [ 2031.076039][T13348] ? skb_trim+0x7f/0x190 [ 2031.080307][T13348] should_fail+0x38c/0x4c0 [ 2031.084747][T13348] ? netlink_trim+0x180/0x220 [ 2031.089445][T13348] should_failslab+0x5/0x20 [ 2031.093957][T13348] slab_pre_alloc_hook+0x51/0xc0 [ 2031.098907][T13348] ? netlink_trim+0x180/0x220 [ 2031.103614][T13348] __kmalloc_node_track_caller+0x68/0x3a0 [ 2031.109354][T13348] ? netlink_trim+0x180/0x220 [ 2031.114035][T13348] ? if_nlmsg_size+0x830/0x830 [ 2031.118793][T13348] ? netlink_trim+0x180/0x220 [ 2031.123470][T13348] pskb_expand_head+0x127/0x10f0 [ 2031.128420][T13348] netlink_trim+0x180/0x220 [ 2031.132927][T13348] netlink_broadcast_filtered+0x7c/0x1170 [ 2031.138662][T13348] ? rtmsg_ifinfo_build_skb+0xdf/0x180 [ 2031.144120][T13348] nlmsg_notify+0xec/0x1a0 [ 2031.148531][T13348] rtnetlink_event+0x13a/0x1a0 [ 2031.153287][T13348] raw_notifier_call_chain+0xcb/0x160 [ 2031.158662][T13348] netdev_update_features+0xb3/0x100 [ 2031.163941][T13348] ? dev_disable_lro+0x290/0x290 [ 2031.168878][T13348] ? veth_enable_xdp+0x2b0/0x4c0 [ 2031.173816][T13348] veth_xdp+0x4ba/0x640 [ 2031.177971][T13348] bond_xdp+0x3b2/0x850 [ 2031.182130][T13348] ? bond_fix_features+0x2c0/0x2c0 [ 2031.187233][T13348] ? alloc_file+0x84/0x4f0 [ 2031.191658][T13348] dev_xdp_install+0xf2/0x240 [ 2031.196330][T13348] ? bond_fix_features+0x2c0/0x2c0 [ 2031.201434][T13348] ? bpf_xdp_link_fill_link_info+0xc0/0xc0 [ 2031.207245][T13348] ? bond_fix_features+0x2c0/0x2c0 [ 2031.212347][T13348] dev_xdp_attach+0xc47/0xed0 [ 2031.217030][T13348] bpf_xdp_link_attach+0x310/0x480 [ 2031.222136][T13348] ? dev_xdp_prog_id+0xe0/0xe0 [ 2031.226908][T13348] link_create+0x50e/0x690 [ 2031.231324][T13348] __sys_bpf+0x645/0x6f0 [ 2031.235561][T13348] ? bpf_link_show_fdinfo+0x380/0x380 [ 2031.240923][T13348] ? rcu_nmi_exit+0x6f/0xf0 [ 2031.245467][T13348] __x64_sys_bpf+0x78/0x90 [ 2031.249900][T13348] do_syscall_64+0x4c/0xa0 [ 2031.254322][T13348] ? clear_bhb_loop+0x30/0x80 [ 2031.258996][T13348] ? clear_bhb_loop+0x30/0x80 [ 2031.263666][T13348] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2031.269547][T13348] RIP: 0033:0x7f45a5cbef79 [ 2031.273954][T13348] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2031.293549][T13348] RSP: 002b:00007f45a3f19028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2031.301957][T13348] RAX: ffffffffffffffda RBX: 00007f45a5f38fa0 RCX: 00007f45a5cbef79 [ 2031.309917][T13348] RDX: 0000000000000040 RSI: 0000200000000240 RDI: 000000000000001c [ 2031.317876][T13348] RBP: 00007f45a3f19090 R08: 0000000000000000 R09: 0000000000000000 [ 2031.325838][T13348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2031.333795][T13348] R13: 00007f45a5f39038 R14: 00007f45a5f38fa0 R15: 00007ffee1c355e8 [ 2031.341781][T13348] [ 2031.362950][T13351] FAULT_INJECTION: forcing a failure. [ 2031.362950][T13351] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2031.376353][T13351] CPU: 0 PID: 13351 Comm: syz.1.12893 Not tainted syzkaller #0 [ 2031.383908][T13351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2031.393970][T13351] Call Trace: [ 2031.397260][T13351] [ 2031.400194][T13351] dump_stack_lvl+0x188/0x250 [ 2031.404886][T13351] ? show_regs_print_info+0x20/0x20 [ 2031.410097][T13351] ? load_image+0x400/0x400 [ 2031.414610][T13351] ? __lock_acquire+0x7d10/0x7d10 [ 2031.419640][T13351] ? slab_post_alloc_hook+0x4c/0x380 [ 2031.424931][T13351] ? __alloc_skb+0xf4/0x750 [ 2031.429437][T13351] ? alloc_skb_with_frags+0xa7/0x730 [ 2031.434726][T13351] ? sock_alloc_send_pskb+0x87f/0x9a0 [ 2031.440106][T13351] should_fail+0x38c/0x4c0 [ 2031.444538][T13351] prepare_alloc_pages+0x1e4/0x5f0 [ 2031.449665][T13351] __alloc_pages+0x11b/0x480 [ 2031.454270][T13351] ? zone_statistics+0x170/0x170 [ 2031.459227][T13351] kmalloc_large_node+0x7d/0x190 [ 2031.464163][T13351] __kmalloc_node_track_caller+0x22e/0x3a0 [ 2031.469953][T13351] ? alloc_skb_with_frags+0xa7/0x730 [ 2031.475223][T13351] ? kmem_cache_alloc_node+0x162/0x2d0 [ 2031.480664][T13351] ? __alloc_skb+0xf4/0x750 [ 2031.485152][T13351] ? alloc_skb_with_frags+0xa7/0x730 [ 2031.490426][T13351] __alloc_skb+0x22c/0x750 [ 2031.494830][T13351] alloc_skb_with_frags+0xa7/0x730 [ 2031.499923][T13351] ? mark_lock+0x94/0x320 [ 2031.504240][T13351] sock_alloc_send_pskb+0x87f/0x9a0 [ 2031.509430][T13351] ? sock_kzfree_s+0x50/0x50 [ 2031.514012][T13351] tun_get_user+0x7c8/0x3a70 [ 2031.518599][T13351] ? tun_ring_recv+0xc40/0xc40 [ 2031.523355][T13351] ? rcu_lock_release+0x5/0x20 [ 2031.528103][T13351] ? __lock_acquire+0x7d10/0x7d10 [ 2031.533120][T13351] tun_chr_write_iter+0x112/0x1e0 [ 2031.538145][T13351] vfs_write+0x745/0xd60 [ 2031.542376][T13351] ? file_end_write+0x250/0x250 [ 2031.547213][T13351] ? __fget_files+0x40f/0x480 [ 2031.551878][T13351] ? __fdget_pos+0x1e2/0x370 [ 2031.556444][T13351] ? ksys_write+0x71/0x260 [ 2031.560844][T13351] ksys_write+0x152/0x260 [ 2031.565154][T13351] ? __ia32_sys_read+0x80/0x80 [ 2031.569901][T13351] ? trace_sys_enter+0x1f/0x80 [ 2031.574647][T13351] do_syscall_64+0x4c/0xa0 [ 2031.579044][T13351] ? clear_bhb_loop+0x30/0x80 [ 2031.583701][T13351] ? clear_bhb_loop+0x30/0x80 [ 2031.588363][T13351] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2031.594250][T13351] RIP: 0033:0x7feab9cccf79 [ 2031.598648][T13351] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2031.618231][T13351] RSP: 002b:00007feab7f06028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2031.626629][T13351] RAX: ffffffffffffffda RBX: 00007feab9f47090 RCX: 00007feab9cccf79 [ 2031.634583][T13351] RDX: 000000000000fdef RSI: 0000200000000140 RDI: 00000000000000c8 [ 2031.642533][T13351] RBP: 00007feab7f06090 R08: 0000000000000000 R09: 0000000000000000 [ 2031.650484][T13351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2031.658433][T13351] R13: 00007feab9f47128 R14: 00007feab9f47090 R15: 00007fffde5cd768 [ 2031.666397][T13351] [ 2031.699191][T13348] bond0: (slave team0): Error: Slave device does not support XDP [ 2031.883136][T13343] netlink: 55 bytes leftover after parsing attributes in process `syz.7.12892'. [ 2032.138494][T13359] netlink: 197324 bytes leftover after parsing attributes in process `syz.6.12897'. [ 2032.183806][T13376] netlink: 60 bytes leftover after parsing attributes in process `syz.1.12901'. [ 2032.210108][T13376] netlink: 60 bytes leftover after parsing attributes in process `syz.1.12901'. [ 2032.246828][T13373] netlink: 60 bytes leftover after parsing attributes in process `syz.1.12901'. [ 2032.273293][T13378] netlink: 60 bytes leftover after parsing attributes in process `syz.1.12901'. [ 2032.574994][T13394] bridge0: port 2(bridge_slave_1) entered disabled state [ 2032.638019][T13394] device bridge_slave_1 left promiscuous mode [ 2032.665569][T13394] bridge0: port 2(bridge_slave_1) entered disabled state [ 2032.795972][T13401] delete_channel: no stack [ 2033.050614][T13411] delete_channel: no stack [ 2034.019067][T13448] __nla_validate_parse: 4 callbacks suppressed [ 2034.019084][T13448] netlink: 197324 bytes leftover after parsing attributes in process `syz.1.12922'. [ 2034.481345][T13465] netlink: 763 bytes leftover after parsing attributes in process `syz.5.12926'. [ 2034.503021][T13472] validate_nla: 12 callbacks suppressed [ 2034.503037][T13472] netlink: 'syz.6.12927': attribute type 39 has an invalid length. [ 2034.852432][T13493] netlink: 'syz.4.12936': attribute type 10 has an invalid length. [ 2035.081167][T13501] netlink: 65047 bytes leftover after parsing attributes in process `syz.4.12938'. [ 2035.188855][T13503] netlink: 16410 bytes leftover after parsing attributes in process `syz.4.12938'. [ 2035.484082][T13506] netlink: 'syz.1.12939': attribute type 21 has an invalid length. [ 2035.506934][T13506] netlink: 128 bytes leftover after parsing attributes in process `syz.1.12939'. [ 2035.517288][T13506] netlink: 'syz.1.12939': attribute type 5 has an invalid length. [ 2035.533073][T13506] netlink: 3 bytes leftover after parsing attributes in process `syz.1.12939'. [ 2035.939843][T13521] netlink: 'syz.6.12942': attribute type 3 has an invalid length. [ 2035.966576][T13521] netlink: 'syz.6.12942': attribute type 8 has an invalid length. [ 2036.033102][T13521] netlink: 197324 bytes leftover after parsing attributes in process `syz.6.12942'. [ 2036.191995][T13535] netlink: 'syz.5.12948': attribute type 10 has an invalid length. [ 2036.218327][T13537] netlink: 9275 bytes leftover after parsing attributes in process `syz.4.12949'. [ 2036.270970][T13537] netlink: 191416 bytes leftover after parsing attributes in process `syz.4.12949'. [ 2036.274300][T13539] FAULT_INJECTION: forcing a failure. [ 2036.274300][T13539] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2036.311822][T13537] netlink: 16770 bytes leftover after parsing attributes in process `syz.4.12949'. [ 2036.367119][T13539] CPU: 0 PID: 13539 Comm: syz.1.12950 Not tainted syzkaller #0 [ 2036.374705][T13539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2036.384763][T13539] Call Trace: [ 2036.388039][T13539] [ 2036.390969][T13539] dump_stack_lvl+0x188/0x250 [ 2036.395654][T13539] ? show_regs_print_info+0x20/0x20 [ 2036.400860][T13539] ? load_image+0x400/0x400 [ 2036.405365][T13539] ? ksys_write+0x152/0x260 [ 2036.409869][T13539] ? __lock_acquire+0x7d10/0x7d10 [ 2036.414902][T13539] should_fail+0x38c/0x4c0 [ 2036.419341][T13539] _copy_from_iter+0x22e/0x1170 [ 2036.424201][T13539] ? __lock_acquire+0x7d10/0x7d10 [ 2036.429249][T13539] ? copy_mc_pipe_to_iter+0x7d0/0x7d0 [ 2036.434630][T13539] ? __virt_addr_valid+0x3c6/0x470 [ 2036.439742][T13539] ? __phys_addr_symbol+0x2b/0x70 [ 2036.444767][T13539] ? __check_object_size+0x30c/0x410 [ 2036.450058][T13539] skb_copy_datagram_from_iter+0xf2/0x6a0 [ 2036.455780][T13539] ? napi_get_frags+0xb7/0x140 [ 2036.460551][T13539] tun_get_user+0xaf9/0x3a70 [ 2036.465169][T13539] ? tun_ring_recv+0xc40/0xc40 [ 2036.469946][T13539] ? rcu_lock_release+0x5/0x20 [ 2036.474716][T13539] ? __lock_acquire+0x7d10/0x7d10 [ 2036.479762][T13539] tun_chr_write_iter+0x112/0x1e0 [ 2036.484788][T13539] vfs_write+0x745/0xd60 [ 2036.489042][T13539] ? file_end_write+0x250/0x250 [ 2036.493901][T13539] ? __fget_files+0x40f/0x480 [ 2036.498592][T13539] ? __fdget_pos+0x1e2/0x370 [ 2036.503179][T13539] ? ksys_write+0x71/0x260 [ 2036.507599][T13539] ksys_write+0x152/0x260 [ 2036.511936][T13539] ? __ia32_sys_read+0x80/0x80 [ 2036.516705][T13539] ? lockdep_hardirqs_on+0x94/0x140 [ 2036.521913][T13539] do_syscall_64+0x4c/0xa0 [ 2036.526327][T13539] ? clear_bhb_loop+0x30/0x80 [ 2036.531008][T13539] ? clear_bhb_loop+0x30/0x80 [ 2036.535687][T13539] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2036.541579][T13539] RIP: 0033:0x7feab9cccf79 [ 2036.545995][T13539] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2036.565597][T13539] RSP: 002b:00007feab7f27028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2036.574018][T13539] RAX: ffffffffffffffda RBX: 00007feab9f46fa0 RCX: 00007feab9cccf79 [ 2036.581990][T13539] RDX: 0000000000000066 RSI: 0000200000000000 RDI: 0000000000000003 [ 2036.589961][T13539] RBP: 00007feab7f27090 R08: 0000000000000000 R09: 0000000000000000 [ 2036.597930][T13539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2036.605905][T13539] R13: 00007feab9f47038 R14: 00007feab9f46fa0 R15: 00007fffde5cd768 [ 2036.613900][T13539] [ 2037.490834][ T1421] ieee802154 phy0 wpan0: encryption failed: -22 [ 2037.497250][ T1421] ieee802154 phy1 wpan1: encryption failed: -22 [ 2037.958922][T13573] netlink: 'syz.6.12961': attribute type 10 has an invalid length. [ 2038.098440][T13586] FAULT_INJECTION: forcing a failure. [ 2038.098440][T13586] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2038.177306][T13586] CPU: 1 PID: 13586 Comm: syz.5.12966 Not tainted syzkaller #0 [ 2038.184896][T13586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2038.194963][T13586] Call Trace: [ 2038.198238][T13586] [ 2038.201158][T13586] dump_stack_lvl+0x188/0x250 [ 2038.205844][T13586] ? show_regs_print_info+0x20/0x20 [ 2038.211053][T13586] ? load_image+0x400/0x400 [ 2038.215561][T13586] ? __lock_acquire+0x7d10/0x7d10 [ 2038.220589][T13586] should_fail+0x38c/0x4c0 [ 2038.225012][T13586] _copy_to_user+0x2e/0x130 [ 2038.229523][T13586] simple_read_from_buffer+0xe3/0x150 [ 2038.234904][T13586] proc_fail_nth_read+0x1a6/0x220 [ 2038.239935][T13586] ? proc_fault_inject_write+0x310/0x310 [ 2038.245575][T13586] ? fsnotify_perm+0x254/0x560 [ 2038.250342][T13586] ? proc_fault_inject_write+0x310/0x310 [ 2038.255981][T13586] vfs_read+0x301/0xd60 [ 2038.260148][T13586] ? kernel_read+0x1e0/0x1e0 [ 2038.264740][T13586] ? __fget_files+0x40f/0x480 [ 2038.269420][T13586] ? mutex_lock_nested+0x17/0x20 [ 2038.274358][T13586] ? __fdget_pos+0x2bf/0x370 [ 2038.278943][T13586] ? ksys_read+0x71/0x260 [ 2038.283285][T13586] ksys_read+0x152/0x260 [ 2038.287533][T13586] ? vfs_write+0xd60/0xd60 [ 2038.291951][T13586] ? lockdep_hardirqs_on+0x94/0x140 [ 2038.297154][T13586] do_syscall_64+0x4c/0xa0 [ 2038.301567][T13586] ? clear_bhb_loop+0x30/0x80 [ 2038.306239][T13586] ? clear_bhb_loop+0x30/0x80 [ 2038.310918][T13586] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2038.316811][T13586] RIP: 0033:0x7f72fec4184e [ 2038.321229][T13586] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2038.340838][T13586] RSP: 002b:00007f72fcedafe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2038.349263][T13586] RAX: ffffffffffffffda RBX: 00007f72fcedb6c0 RCX: 00007f72fec4184e [ 2038.357242][T13586] RDX: 000000000000000f RSI: 00007f72fcedb0a0 RDI: 0000000000000006 [ 2038.365218][T13586] RBP: 00007f72fcedb090 R08: 0000000000000000 R09: 0000000000000000 [ 2038.373190][T13586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2038.381161][T13586] R13: 00007f72feefb038 R14: 00007f72feefafa0 R15: 00007ffeb3680fb8 [ 2038.389151][T13586] [ 2038.817038][T13619] netlink: 'syz.5.12977': attribute type 10 has an invalid length. [ 2039.234333][T13630] netlink: 'syz.6.12980': attribute type 10 has an invalid length. [ 2039.989218][T13647] netlink: 'syz.1.12987': attribute type 10 has an invalid length. [ 2040.056888][T13647] __nla_validate_parse: 6 callbacks suppressed [ 2040.057032][T13647] netlink: 40 bytes leftover after parsing attributes in process `syz.1.12987'. [ 2040.120581][T13647] batman_adv: batadv0: Adding interface: virt_wifi0 [ 2040.128150][T13647] batman_adv: batadv0: The MTU of interface virt_wifi0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2040.229295][T13647] batman_adv: batadv0: Interface activated: virt_wifi0 [ 2040.397583][T13671] netlink: 65047 bytes leftover after parsing attributes in process `syz.7.12992'. [ 2040.540793][T13673] netlink: 16410 bytes leftover after parsing attributes in process `syz.7.12992'. [ 2040.799586][T13679] netlink: 'syz.4.12993': attribute type 10 has an invalid length. [ 2041.350513][T13695] netlink: 'syz.1.13000': attribute type 21 has an invalid length. [ 2041.412954][T13691] netlink: 'syz.5.12999': attribute type 7 has an invalid length. [ 2041.523571][T13691] netlink: 'syz.5.12999': attribute type 10 has an invalid length. [ 2041.571864][T13691] netlink: 55 bytes leftover after parsing attributes in process `syz.5.12999'. [ 2041.784841][T13719] FAULT_INJECTION: forcing a failure. [ 2041.784841][T13719] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2041.806207][T13719] CPU: 0 PID: 13719 Comm: syz.4.13006 Not tainted syzkaller #0 [ 2041.813780][T13719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2041.823837][T13719] Call Trace: [ 2041.827117][T13719] [ 2041.830046][T13719] dump_stack_lvl+0x188/0x250 [ 2041.834734][T13719] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2041.840897][T13719] ? show_regs_print_info+0x20/0x20 [ 2041.846103][T13719] ? load_image+0x400/0x400 [ 2041.850612][T13719] ? ___ratelimit+0x11/0x5f0 [ 2041.855209][T13719] should_fail+0x38c/0x4c0 [ 2041.859610][T13719] _copy_to_user+0x2e/0x130 [ 2041.864099][T13719] simple_read_from_buffer+0xe3/0x150 [ 2041.869451][T13719] proc_fail_nth_read+0x1a6/0x220 [ 2041.874467][T13719] ? proc_fault_inject_write+0x310/0x310 [ 2041.880100][T13719] ? fsnotify_perm+0x254/0x560 [ 2041.884845][T13719] ? proc_fault_inject_write+0x310/0x310 [ 2041.890460][T13719] vfs_read+0x301/0xd60 [ 2041.894600][T13719] ? kernel_read+0x1e0/0x1e0 [ 2041.899174][T13719] ? __fget_files+0x40f/0x480 [ 2041.903829][T13719] ? mutex_lock_nested+0x17/0x20 [ 2041.908763][T13719] ? __fdget_pos+0x2bf/0x370 [ 2041.913332][T13719] ? ksys_read+0x71/0x260 [ 2041.917644][T13719] ksys_read+0x152/0x260 [ 2041.921872][T13719] ? vfs_write+0xd60/0xd60 [ 2041.926282][T13719] ? trace_sys_enter+0x1f/0x80 [ 2041.931024][T13719] do_syscall_64+0x4c/0xa0 [ 2041.935423][T13719] ? clear_bhb_loop+0x30/0x80 [ 2041.940081][T13719] ? clear_bhb_loop+0x30/0x80 [ 2041.944829][T13719] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2041.950700][T13719] RIP: 0033:0x7fb74ef7a84e [ 2041.955095][T13719] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2041.974686][T13719] RSP: 002b:00007fb74d213fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2041.983089][T13719] RAX: ffffffffffffffda RBX: 00007fb74d2146c0 RCX: 00007fb74ef7a84e [ 2041.991057][T13719] RDX: 000000000000000f RSI: 00007fb74d2140a0 RDI: 0000000000000006 [ 2041.999015][T13719] RBP: 00007fb74d214090 R08: 0000000000000000 R09: 0000000000000000 [ 2042.006965][T13719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2042.014917][T13719] R13: 00007fb74f234038 R14: 00007fb74f233fa0 R15: 00007ffd35c5b1b8 [ 2042.022887][T13719] [ 2042.172777][T13708] netlink: 'syz.6.13003': attribute type 1 has an invalid length. [ 2042.227273][T13731] device lo entered promiscuous mode [ 2042.643744][T13750] netlink: 65047 bytes leftover after parsing attributes in process `syz.5.13014'. [ 2044.693659][ T4173] Bluetooth: hci1: command 0x0406 tx timeout [ 2046.777984][T13786] netlink: 'syz.5.13026': attribute type 10 has an invalid length. [ 2046.799399][T13779] netlink: 'syz.6.13023': attribute type 7 has an invalid length. [ 2046.866413][T13779] netlink: 'syz.6.13023': attribute type 10 has an invalid length. [ 2046.886337][T13779] netlink: 55 bytes leftover after parsing attributes in process `syz.6.13023'. [ 2046.937771][T13791] netlink: 26 bytes leftover after parsing attributes in process `syz.7.13027'. [ 2049.820145][T13795] netlink: 4595 bytes leftover after parsing attributes in process `syz.5.13028'. [ 2051.958963][T13795] netlink: 4595 bytes leftover after parsing attributes in process `syz.5.13028'. [ 2051.991672][T13800] netlink: 'syz.5.13028': attribute type 5 has an invalid length. [ 2052.000642][T13800] netlink: 168 bytes leftover after parsing attributes in process `syz.5.13028'. [ 2052.012399][T13805] netlink: 65047 bytes leftover after parsing attributes in process `syz.4.13031'. [ 2052.107376][T13808] netlink: 16410 bytes leftover after parsing attributes in process `syz.4.13031'. [ 2056.738023][T13853] netlink: 'syz.6.13046': attribute type 10 has an invalid length. [ 2056.779060][T13853] team0: Device vxcan1 is of different type [ 2057.070032][T13868] netlink: 'syz.4.13045': attribute type 7 has an invalid length. [ 2057.159741][T13858] netlink: 'syz.4.13045': attribute type 10 has an invalid length. [ 2057.189898][T13858] netlink: 55 bytes leftover after parsing attributes in process `syz.4.13045'. [ 2057.299703][T13880] netlink: 13951 bytes leftover after parsing attributes in process `syz.1.13052'. [ 2057.314472][T13881] netlink: 13951 bytes leftover after parsing attributes in process `syz.1.13052'. [ 2057.574627][T13893] netlink: 'syz.4.13058': attribute type 21 has an invalid length. [ 2057.582774][T13893] netlink: 168 bytes leftover after parsing attributes in process `syz.4.13058'. [ 2059.533676][T13908] device sit0 entered promiscuous mode [ 2059.962174][T13938] FAULT_INJECTION: forcing a failure. [ 2059.962174][T13938] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2059.983121][T13938] CPU: 0 PID: 13938 Comm: syz.5.13084 Not tainted syzkaller #0 [ 2059.990717][T13938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2060.000776][T13938] Call Trace: [ 2060.004057][T13938] [ 2060.006974][T13938] dump_stack_lvl+0x188/0x250 [ 2060.011645][T13938] ? show_regs_print_info+0x20/0x20 [ 2060.016831][T13938] ? load_image+0x400/0x400 [ 2060.021325][T13938] ? __lock_acquire+0x7d10/0x7d10 [ 2060.026339][T13938] should_fail+0x38c/0x4c0 [ 2060.030745][T13938] _copy_to_user+0x2e/0x130 [ 2060.035231][T13938] simple_read_from_buffer+0xe3/0x150 [ 2060.040592][T13938] proc_fail_nth_read+0x1a6/0x220 [ 2060.045605][T13938] ? proc_fault_inject_write+0x310/0x310 [ 2060.051222][T13938] ? fsnotify_perm+0x254/0x560 [ 2060.055968][T13938] ? proc_fault_inject_write+0x310/0x310 [ 2060.061581][T13938] vfs_read+0x301/0xd60 [ 2060.065783][T13938] ? kernel_read+0x1e0/0x1e0 [ 2060.070385][T13938] ? __fget_files+0x40f/0x480 [ 2060.075068][T13938] ? mutex_lock_nested+0x17/0x20 [ 2060.079989][T13938] ? __fdget_pos+0x2bf/0x370 [ 2060.084560][T13938] ? ksys_read+0x71/0x260 [ 2060.088876][T13938] ksys_read+0x152/0x260 [ 2060.093101][T13938] ? vfs_write+0xd60/0xd60 [ 2060.097499][T13938] ? lockdep_hardirqs_on+0x94/0x140 [ 2060.102682][T13938] do_syscall_64+0x4c/0xa0 [ 2060.107077][T13938] ? clear_bhb_loop+0x30/0x80 [ 2060.111739][T13938] ? clear_bhb_loop+0x30/0x80 [ 2060.116403][T13938] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2060.122280][T13938] RIP: 0033:0x7f72fec4184e [ 2060.126678][T13938] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2060.146267][T13938] RSP: 002b:00007f72fcedafe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2060.154666][T13938] RAX: ffffffffffffffda RBX: 00007f72fcedb6c0 RCX: 00007f72fec4184e [ 2060.162628][T13938] RDX: 000000000000000f RSI: 00007f72fcedb0a0 RDI: 0000000000000004 [ 2060.170583][T13938] RBP: 00007f72fcedb090 R08: 0000000000000000 R09: 0000000000000000 [ 2060.178536][T13938] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2060.186490][T13938] R13: 00007f72feefb038 R14: 00007f72feefafa0 R15: 00007ffeb3680fb8 [ 2060.194454][T13938] [ 2060.353331][T13950] FAULT_INJECTION: forcing a failure. [ 2060.353331][T13950] name failslab, interval 1, probability 0, space 0, times 0 [ 2060.370854][T13950] CPU: 1 PID: 13950 Comm: syz.5.13086 Not tainted syzkaller #0 [ 2060.378444][T13950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2060.388509][T13950] Call Trace: [ 2060.391798][T13950] [ 2060.394733][T13950] dump_stack_lvl+0x188/0x250 [ 2060.399424][T13950] ? show_regs_print_info+0x20/0x20 [ 2060.404633][T13950] ? load_image+0x400/0x400 [ 2060.409140][T13950] ? __might_sleep+0xf0/0xf0 [ 2060.413733][T13950] ? __lock_acquire+0x7d10/0x7d10 [ 2060.418765][T13950] should_fail+0x38c/0x4c0 [ 2060.423185][T13950] should_failslab+0x5/0x20 [ 2060.427685][T13950] slab_pre_alloc_hook+0x51/0xc0 [ 2060.432628][T13950] kmem_cache_alloc_node_trace+0x4a/0x300 [ 2060.438345][T13950] ? __get_vm_area_node+0x119/0x2d0 [ 2060.443546][T13950] __get_vm_area_node+0x119/0x2d0 [ 2060.448574][T13950] __vmalloc_node_range+0xef/0x8b0 [ 2060.453689][T13950] ? array_map_alloc+0x27c/0x6f0 [ 2060.458631][T13950] ? apparmor_capable+0x12c/0x190 [ 2060.463653][T13950] ? bpf_lsm_capable+0x5/0x10 [ 2060.468327][T13950] bpf_map_area_alloc+0xd4/0xe0 [ 2060.473194][T13950] ? array_map_alloc+0x27c/0x6f0 [ 2060.478130][T13950] array_map_alloc+0x27c/0x6f0 [ 2060.482899][T13950] map_create+0x485/0x2350 [ 2060.487322][T13950] __sys_bpf+0x30a/0x6f0 [ 2060.491562][T13950] ? bpf_link_show_fdinfo+0x380/0x380 [ 2060.496944][T13950] ? rcu_nmi_exit+0x6f/0xf0 [ 2060.501458][T13950] ? vtime_user_exit+0x2c8/0x3e0 [ 2060.506402][T13950] __x64_sys_bpf+0x78/0x90 [ 2060.510819][T13950] do_syscall_64+0x4c/0xa0 [ 2060.515234][T13950] ? clear_bhb_loop+0x30/0x80 [ 2060.519907][T13950] ? clear_bhb_loop+0x30/0x80 [ 2060.524584][T13950] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2060.530476][T13950] RIP: 0033:0x7f72fec80f79 [ 2060.534897][T13950] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2060.554521][T13950] RSP: 002b:00007f72fceba028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2060.562948][T13950] RAX: ffffffffffffffda RBX: 00007f72feefb090 RCX: 00007f72fec80f79 [ 2060.570916][T13950] RDX: 0000000000000050 RSI: 00002000000001c0 RDI: 0000000000000000 [ 2060.578883][T13950] RBP: 00007f72fceba090 R08: 0000000000000000 R09: 0000000000000000 [ 2060.586850][T13950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2060.594818][T13950] R13: 00007f72feefb128 R14: 00007f72feefb090 R15: 00007ffeb3680fb8 [ 2060.602801][T13950] [ 2060.755059][T13957] netlink: 'syz.6.13089': attribute type 29 has an invalid length. [ 2060.769558][T13957] netlink: 'syz.6.13089': attribute type 29 has an invalid length. [ 2060.797200][T13957] netlink: 'syz.6.13089': attribute type 29 has an invalid length. [ 2060.818424][T13957] netlink: 'syz.6.13089': attribute type 29 has an invalid length. [ 2060.847117][T13957] netlink: 'syz.6.13089': attribute type 29 has an invalid length. [ 2060.869350][T13962] netlink: 40 bytes leftover after parsing attributes in process `syz.5.13079'. [ 2060.884430][T13957] netlink: 209852 bytes leftover after parsing attributes in process `syz.6.13089'. [ 2061.042201][T13973] netlink: 'syz.5.13083': attribute type 12 has an invalid length. [ 2061.083279][T13973] netlink: 132 bytes leftover after parsing attributes in process `syz.5.13083'. [ 2061.236003][T13976] netlink: 'syz.4.13085': attribute type 4 has an invalid length. [ 2061.457692][T14001] device lo entered promiscuous mode [ 2061.995336][T14019] netlink: 209836 bytes leftover after parsing attributes in process `syz.7.13098'. [ 2064.535274][T14027] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.13102'. [ 2065.054384][T14064] validate_nla: 2 callbacks suppressed [ 2065.054401][T14064] netlink: 'syz.4.13112': attribute type 10 has an invalid length. [ 2065.152918][T14072] netlink: 'syz.1.13111': attribute type 3 has an invalid length. [ 2065.197552][T14072] netlink: 'syz.1.13111': attribute type 8 has an invalid length. [ 2065.241155][T14072] netlink: 197324 bytes leftover after parsing attributes in process `syz.1.13111'. [ 2065.427864][T14088] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 2065.434525][T14088] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 2065.648942][T14088] netlink: 'syz.7.13116': attribute type 9 has an invalid length. [ 2065.683019][T14088] netlink: 209836 bytes leftover after parsing attributes in process `syz.7.13116'. [ 2066.212681][T14093] netlink: 'syz.4.13120': attribute type 11 has an invalid length. [ 2066.277329][T14098] netlink: 'syz.6.13121': attribute type 1 has an invalid length. [ 2066.299909][T14098] netlink: 112860 bytes leftover after parsing attributes in process `syz.6.13121'. [ 2066.318538][T14102] netlink: 40 bytes leftover after parsing attributes in process `syz.6.13121'. [ 2066.359410][T14102] bridge0: port 1(bridge_slave_0) entered disabled state [ 2066.469106][T14102] device bridge_slave_0 left promiscuous mode [ 2066.493284][T14102] bridge0: port 1(bridge_slave_0) entered disabled state [ 2066.570622][T14108] netlink: 'syz.5.13126': attribute type 10 has an invalid length. [ 2067.188633][T14142] FAULT_INJECTION: forcing a failure. [ 2067.188633][T14142] name failslab, interval 1, probability 0, space 0, times 0 [ 2067.229560][T14143] netlink: 'syz.7.13135': attribute type 3 has an invalid length. [ 2067.234556][T14145] FAULT_INJECTION: forcing a failure. [ 2067.234556][T14145] name failslab, interval 1, probability 0, space 0, times 0 [ 2067.250548][T14142] CPU: 0 PID: 14142 Comm: syz.6.13137 Not tainted syzkaller #0 [ 2067.258111][T14142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2067.268178][T14142] Call Trace: [ 2067.271459][T14142] [ 2067.274392][T14142] dump_stack_lvl+0x188/0x250 [ 2067.279084][T14142] ? show_regs_print_info+0x20/0x20 [ 2067.284295][T14142] ? load_image+0x400/0x400 [ 2067.288818][T14142] should_fail+0x38c/0x4c0 [ 2067.293245][T14142] should_failslab+0x5/0x20 [ 2067.297747][T14142] slab_pre_alloc_hook+0x51/0xc0 [ 2067.302692][T14142] kmem_cache_alloc_trace+0x47/0x2a0 [ 2067.307975][T14142] ? sctp_add_bind_addr+0x89/0x350 [ 2067.313105][T14142] sctp_add_bind_addr+0x89/0x350 [ 2067.318059][T14142] sctp_copy_local_addr_list+0x2dd/0x4a0 [ 2067.323704][T14142] ? sctp_do_8_2_transport_strike+0x840/0x840 [ 2067.329780][T14142] ? sctp_v6_is_any+0x60/0x70 [ 2067.334461][T14142] ? sctp_copy_one_addr+0x93/0x660 [ 2067.339582][T14142] sctp_bind_addr_copy+0xaf/0x3c0 [ 2067.344615][T14142] ? sctp_assoc_set_bind_addr_from_ep+0xa1/0x190 [ 2067.350953][T14142] sctp_connect_new_asoc+0x2f5/0x6a0 [ 2067.356248][T14142] ? __sctp_connect+0xd80/0xd80 [ 2067.360390][T14143] netlink: 'syz.7.13135': attribute type 8 has an invalid length. [ 2067.361095][T14142] ? __local_bh_enable_ip+0x136/0x1c0 [ 2067.374246][T14142] ? bpf_lsm_sctp_bind_connect+0x5/0x10 [ 2067.379797][T14142] ? security_sctp_bind_connect+0x85/0xb0 [ 2067.385528][T14142] sctp_sendmsg+0x158d/0x2900 [ 2067.390228][T14142] ? aa_sk_perm+0x7dc/0x910 [ 2067.394736][T14142] ? sctp_getsockopt+0x8a0/0x8a0 [ 2067.399682][T14142] ? aa_af_perm+0x340/0x340 [ 2067.404185][T14142] ? tomoyo_socket_sendmsg_permission+0x1dd/0x2f0 [ 2067.410606][T14142] ? sock_rps_record_flow+0x17/0x3b0 [ 2067.415899][T14142] ? inet_sendmsg+0xe5/0x2f0 [ 2067.420497][T14142] ? inet_send_prepare+0x260/0x260 [ 2067.425616][T14142] ____sys_sendmsg+0x5b7/0x8f0 [ 2067.430395][T14142] ? __sys_sendmsg_sock+0x30/0x30 [ 2067.435433][T14142] ? import_iovec+0x6f/0xa0 [ 2067.439946][T14142] ___sys_sendmsg+0x236/0x2e0 [ 2067.444637][T14142] ? __sys_sendmsg+0x2a0/0x2a0 [ 2067.449418][T14142] ? trace_event_raw_event_lock+0x270/0x270 [ 2067.455314][T14142] ? vfs_write+0x8b2/0xd60 [ 2067.459756][T14142] __se_sys_sendmsg+0x1af/0x290 [ 2067.464613][T14142] ? __x64_sys_sendmsg+0x80/0x80 [ 2067.469551][T14142] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2067.475552][T14142] ? lockdep_hardirqs_on+0x94/0x140 [ 2067.480756][T14142] do_syscall_64+0x4c/0xa0 [ 2067.485173][T14142] ? clear_bhb_loop+0x30/0x80 [ 2067.489857][T14142] ? clear_bhb_loop+0x30/0x80 [ 2067.494538][T14142] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2067.500433][T14142] RIP: 0033:0x7f45a5cbef79 [ 2067.504848][T14142] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2067.516678][T14143] netlink: 197324 bytes leftover after parsing attributes in process `syz.7.13135'. [ 2067.524448][T14142] RSP: 002b:00007f45a3f19028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2067.524474][T14142] RAX: ffffffffffffffda RBX: 00007f45a5f38fa0 RCX: 00007f45a5cbef79 [ 2067.524488][T14142] RDX: 0000000000000041 RSI: 0000200000002dc0 RDI: 0000000000000003 [ 2067.524499][T14142] RBP: 00007f45a3f19090 R08: 0000000000000000 R09: 0000000000000000 [ 2067.524509][T14142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2067.524519][T14142] R13: 00007f45a5f39038 R14: 00007f45a5f38fa0 R15: 00007ffee1c355e8 [ 2067.524546][T14142] [ 2067.550937][T14145] CPU: 0 PID: 14145 Comm: syz.1.13138 Not tainted syzkaller #0 [ 2067.593228][T14145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2067.603291][T14145] Call Trace: [ 2067.606578][T14145] [ 2067.609517][T14145] dump_stack_lvl+0x188/0x250 [ 2067.614223][T14145] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 2067.619956][T14145] ? show_regs_print_info+0x20/0x20 [ 2067.625168][T14145] ? load_image+0x400/0x400 [ 2067.629709][T14145] should_fail+0x38c/0x4c0 [ 2067.634155][T14145] should_failslab+0x5/0x20 [ 2067.638666][T14145] slab_pre_alloc_hook+0x51/0xc0 [ 2067.643616][T14145] ? skb_clone+0x1bd/0x350 [ 2067.648055][T14145] kmem_cache_alloc+0x3d/0x290 [ 2067.652848][T14145] skb_clone+0x1bd/0x350 [ 2067.657127][T14145] __netlink_deliver_tap+0x3cd/0x7c0 [ 2067.662458][T14145] netlink_deliver_tap+0x16c/0x180 [ 2067.667583][T14145] netlink_unicast+0x74f/0x920 [ 2067.672388][T14145] netlink_sendmsg+0x8ba/0xbe0 [ 2067.677183][T14145] ? netlink_getsockopt+0x570/0x570 [ 2067.682400][T14145] ? aa_sock_msg_perm+0x94/0x150 [ 2067.687357][T14145] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 2067.692652][T14145] ? security_socket_sendmsg+0x7c/0xa0 [ 2067.698129][T14145] ? netlink_getsockopt+0x570/0x570 [ 2067.703343][T14145] ____sys_sendmsg+0x5b7/0x8f0 [ 2067.708144][T14145] ? __sys_sendmsg_sock+0x30/0x30 [ 2067.713205][T14145] ? import_iovec+0x6f/0xa0 [ 2067.717734][T14145] ___sys_sendmsg+0x236/0x2e0 [ 2067.722444][T14145] ? __sys_sendmsg+0x2a0/0x2a0 [ 2067.727251][T14145] ? trace_event_raw_event_lock+0x270/0x270 [ 2067.733153][T14145] ? vfs_write+0x8b2/0xd60 [ 2067.737645][T14145] __se_sys_sendmsg+0x1af/0x290 [ 2067.742518][T14145] ? __x64_sys_sendmsg+0x80/0x80 [ 2067.747464][T14145] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2067.753491][T14145] ? lockdep_hardirqs_on+0x94/0x140 [ 2067.758715][T14145] do_syscall_64+0x4c/0xa0 [ 2067.763143][T14145] ? clear_bhb_loop+0x30/0x80 [ 2067.767828][T14145] ? clear_bhb_loop+0x30/0x80 [ 2067.772520][T14145] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2067.778422][T14145] RIP: 0033:0x7feab9cccf79 [ 2067.782853][T14145] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2067.802469][T14145] RSP: 002b:00007feab7f27028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2067.810910][T14145] RAX: ffffffffffffffda RBX: 00007feab9f46fa0 RCX: 00007feab9cccf79 [ 2067.818895][T14145] RDX: 0000000000044010 RSI: 0000200000000180 RDI: 0000000000000004 [ 2067.826880][T14145] RBP: 00007feab7f27090 R08: 0000000000000000 R09: 0000000000000000 [ 2067.834862][T14145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2067.842843][T14145] R13: 00007feab9f47038 R14: 00007feab9f46fa0 R15: 00007fffde5cd768 [ 2067.850861][T14145] [ 2068.135582][T14156] netlink: 'syz.1.13142': attribute type 10 has an invalid length. [ 2068.312361][T14173] netlink: 16178 bytes leftover after parsing attributes in process `syz.7.13148'. [ 2068.411783][T14180] syz.6.13151[14180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2068.411847][T14180] syz.6.13151[14180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2068.477178][T14180] netlink: 36 bytes leftover after parsing attributes in process `syz.6.13151'. [ 2069.068353][T14203] netlink: 197324 bytes leftover after parsing attributes in process `syz.4.13158'. [ 2069.101030][T14212] netlink: 14560 bytes leftover after parsing attributes in process `syz.7.13160'. [ 2069.801454][T14247] netlink: 147988 bytes leftover after parsing attributes in process `syz.1.13171'. [ 2069.853183][T14247] openvswitch: netlink: Geneve option length err (len 1788, max 255). [ 2069.905658][T14252] FAULT_INJECTION: forcing a failure. [ 2069.905658][T14252] name failslab, interval 1, probability 0, space 0, times 0 [ 2069.919385][T14252] CPU: 0 PID: 14252 Comm: syz.7.13172 Not tainted syzkaller #0 [ 2069.926964][T14252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2069.937038][T14252] Call Trace: [ 2069.940317][T14252] [ 2069.943237][T14252] dump_stack_lvl+0x188/0x250 [ 2069.947912][T14252] ? show_regs_print_info+0x20/0x20 [ 2069.953100][T14252] ? load_image+0x400/0x400 [ 2069.957589][T14252] ? mark_lock+0x94/0x320 [ 2069.961930][T14252] should_fail+0x38c/0x4c0 [ 2069.966346][T14252] should_failslab+0x5/0x20 [ 2069.970861][T14252] slab_pre_alloc_hook+0x51/0xc0 [ 2069.975784][T14252] ? skb_clone+0x1bd/0x350 [ 2069.980188][T14252] kmem_cache_alloc+0x3d/0x290 [ 2069.984974][T14252] skb_clone+0x1bd/0x350 [ 2069.989227][T14252] ? pfkey_broadcast_one+0x7d/0x340 [ 2069.994433][T14252] pfkey_broadcast_one+0x9b/0x340 [ 2069.999452][T14252] ? pfkey_broadcast+0x1e0/0x3a0 [ 2070.004384][T14252] pfkey_broadcast+0x1f0/0x3a0 [ 2070.009141][T14252] pfkey_promisc+0x1c3/0x380 [ 2070.013721][T14252] pfkey_sendmsg+0xbeb/0x1080 [ 2070.018407][T14252] ? pfkey_release+0x310/0x310 [ 2070.023189][T14252] ? aa_sock_msg_perm+0x94/0x150 [ 2070.028118][T14252] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 2070.033392][T14252] ? security_socket_sendmsg+0x7c/0xa0 [ 2070.038840][T14252] ? pfkey_release+0x310/0x310 [ 2070.043591][T14252] ____sys_sendmsg+0x5b7/0x8f0 [ 2070.048361][T14252] ? __sys_sendmsg_sock+0x30/0x30 [ 2070.053385][T14252] ? import_iovec+0x6f/0xa0 [ 2070.057884][T14252] ___sys_sendmsg+0x236/0x2e0 [ 2070.062559][T14252] ? __sys_sendmsg+0x2a0/0x2a0 [ 2070.067326][T14252] ? trace_event_raw_event_lock+0x270/0x270 [ 2070.073207][T14252] ? vfs_write+0x8b2/0xd60 [ 2070.077644][T14252] __se_sys_sendmsg+0x1af/0x290 [ 2070.082487][T14252] ? __x64_sys_sendmsg+0x80/0x80 [ 2070.087412][T14252] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2070.093400][T14252] ? lockdep_hardirqs_on+0x94/0x140 [ 2070.098591][T14252] do_syscall_64+0x4c/0xa0 [ 2070.103000][T14252] ? clear_bhb_loop+0x30/0x80 [ 2070.107663][T14252] ? clear_bhb_loop+0x30/0x80 [ 2070.112330][T14252] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2070.118211][T14252] RIP: 0033:0x7f929339ff79 [ 2070.122623][T14252] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2070.142224][T14252] RSP: 002b:00007f92915fa028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2070.150628][T14252] RAX: ffffffffffffffda RBX: 00007f9293619fa0 RCX: 00007f929339ff79 [ 2070.158588][T14252] RDX: 0000000000000000 RSI: 00002000000011c0 RDI: 0000000000000004 [ 2070.166547][T14252] RBP: 00007f92915fa090 R08: 0000000000000000 R09: 0000000000000000 [ 2070.174504][T14252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2070.182464][T14252] R13: 00007f929361a038 R14: 00007f9293619fa0 R15: 00007fffbae53248 [ 2070.190448][T14252] [ 2070.333848][T14258] tun0: tun_chr_ioctl cmd 2148553947 [ 2070.524051][T14262] validate_nla: 6 callbacks suppressed [ 2070.524067][T14262] netlink: 'syz.5.13176': attribute type 3 has an invalid length. [ 2070.578878][T14262] netlink: 'syz.5.13176': attribute type 8 has an invalid length. [ 2070.596508][T14262] netlink: 197324 bytes leftover after parsing attributes in process `syz.5.13176'. [ 2070.672129][T14275] tun0: tun_chr_ioctl cmd 1074025677 [ 2070.678367][T14275] tun0: linktype set to 768 [ 2070.910846][T14281] device syzkaller0 entered promiscuous mode [ 2071.046139][T14280] delete_channel: no stack [ 2071.350785][T14297] netlink: 207496 bytes leftover after parsing attributes in process `syz.4.13187'. [ 2071.373293][T14298] delete_channel: no stack [ 2071.463677][T14306] netlink: 'syz.4.13187': attribute type 10 has an invalid length. [ 2071.527451][T14306] device geneve0 entered promiscuous mode [ 2071.651437][T14306] bond0: (slave geneve0): Enslaving as an active interface with an up link [ 2071.669124][T14310] netlink: 'syz.4.13187': attribute type 10 has an invalid length. [ 2071.698675][T14310] device hsr_slave_0 left promiscuous mode [ 2071.750622][T14310] device hsr_slave_1 left promiscuous mode [ 2071.794449][T14312] netlink: 10 bytes leftover after parsing attributes in process `syz.7.13191'. [ 2071.868743][T14320] tun0: tun_chr_ioctl cmd 1074025677 [ 2071.892510][T14320] tun0: linktype set to 768 [ 2071.978946][T14340] netlink: 'syz.5.13194': attribute type 3 has an invalid length. [ 2072.005957][T14340] netlink: 'syz.5.13194': attribute type 8 has an invalid length. [ 2072.048293][T14340] netlink: 197324 bytes leftover after parsing attributes in process `syz.5.13194'. [ 2072.333279][T14354] netlink: 'syz.5.13204': attribute type 1 has an invalid length. [ 2072.342915][T14354] netlink: 112860 bytes leftover after parsing attributes in process `syz.5.13204'. [ 2072.378277][T14354] netlink: 40 bytes leftover after parsing attributes in process `syz.5.13204'. [ 2072.423622][T14354] bridge0: port 1(bridge_slave_0) entered disabled state [ 2072.513778][T14354] device bridge_slave_0 left promiscuous mode [ 2072.525906][T14366] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 2072.549928][T14354] bridge0: port 1(bridge_slave_0) entered disabled state [ 2072.774774][T14368] FAULT_INJECTION: forcing a failure. [ 2072.774774][T14368] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2072.823245][T14368] CPU: 0 PID: 14368 Comm: syz.7.13207 Not tainted syzkaller #0 [ 2072.830834][T14368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2072.840894][T14368] Call Trace: [ 2072.844178][T14368] [ 2072.847109][T14368] dump_stack_lvl+0x188/0x250 [ 2072.851798][T14368] ? show_regs_print_info+0x20/0x20 [ 2072.857000][T14368] ? load_image+0x400/0x400 [ 2072.861515][T14368] ? __lock_acquire+0x7d10/0x7d10 [ 2072.866556][T14368] should_fail+0x38c/0x4c0 [ 2072.870988][T14368] _copy_from_user+0x2e/0x170 [ 2072.875668][T14368] bpf_test_init+0x136/0x1b0 [ 2072.880269][T14368] bpf_prog_test_run_xdp+0x1cb/0x920 [ 2072.885565][T14368] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2072.891721][T14368] ? dev_put+0x70/0x70 [ 2072.895799][T14368] ? dev_put+0x70/0x70 [ 2072.899864][T14368] bpf_prog_test_run+0x31e/0x390 [ 2072.904804][T14368] __sys_bpf+0x5a5/0x6f0 [ 2072.909051][T14368] ? bpf_link_show_fdinfo+0x380/0x380 [ 2072.914432][T14368] ? vtime_user_exit+0x2c8/0x3e0 [ 2072.919380][T14368] __x64_sys_bpf+0x78/0x90 [ 2072.923805][T14368] do_syscall_64+0x4c/0xa0 [ 2072.928232][T14368] ? clear_bhb_loop+0x30/0x80 [ 2072.932909][T14368] ? clear_bhb_loop+0x30/0x80 [ 2072.937592][T14368] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2072.943488][T14368] RIP: 0033:0x7f929339ff79 [ 2072.947923][T14368] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2072.967535][T14368] RSP: 002b:00007f92915fa028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2072.975971][T14368] RAX: ffffffffffffffda RBX: 00007f9293619fa0 RCX: 00007f929339ff79 [ 2072.983955][T14368] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 000000000000000a [ 2072.991945][T14368] RBP: 00007f92915fa090 R08: 0000000000000000 R09: 0000000000000000 [ 2072.999924][T14368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2073.007909][T14368] R13: 00007f929361a038 R14: 00007f9293619fa0 R15: 00007fffbae53248 [ 2073.015904][T14368] [ 2073.835397][T14391] tun0: tun_chr_ioctl cmd 1074025677 [ 2073.841289][T14391] tun0: linktype set to 768 [ 2074.033102][T14392] netlink: 40 bytes leftover after parsing attributes in process `syz.7.13212'. [ 2074.104948][T14392] netlink: 3 bytes leftover after parsing attributes in process `syz.7.13212'. [ 2074.148737][T14411] netlink: 'syz.1.13222': attribute type 1 has an invalid length. [ 2074.153296][T14392] netlink: 3 bytes leftover after parsing attributes in process `syz.7.13212'. [ 2074.231336][T14411] bridge0: port 1(bridge_slave_0) entered disabled state [ 2074.297792][T14411] device bridge_slave_0 left promiscuous mode [ 2074.313222][T14411] bridge0: port 1(bridge_slave_0) entered disabled state [ 2074.376120][T14416] FAULT_INJECTION: forcing a failure. [ 2074.376120][T14416] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2074.395337][T14416] CPU: 0 PID: 14416 Comm: syz.4.13225 Not tainted syzkaller #0 [ 2074.402935][T14416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2074.412991][T14416] Call Trace: [ 2074.416267][T14416] [ 2074.419178][T14416] dump_stack_lvl+0x188/0x250 [ 2074.423853][T14416] ? show_regs_print_info+0x20/0x20 [ 2074.429067][T14416] ? load_image+0x400/0x400 [ 2074.433594][T14416] ? __lock_acquire+0x7d10/0x7d10 [ 2074.438637][T14416] should_fail+0x38c/0x4c0 [ 2074.443068][T14416] _copy_from_user+0x2e/0x170 [ 2074.447750][T14416] ___sys_recvmsg+0x173/0x5c0 [ 2074.452428][T14416] ? __sys_recvmsg+0x280/0x280 [ 2074.457175][T14416] ? __lock_acquire+0x7d10/0x7d10 [ 2074.462200][T14416] __x64_sys_recvmsg+0x1f9/0x2c0 [ 2074.467122][T14416] ? ___sys_recvmsg+0x5c0/0x5c0 [ 2074.471964][T14416] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2074.477934][T14416] ? lockdep_hardirqs_on+0x94/0x140 [ 2074.483117][T14416] do_syscall_64+0x4c/0xa0 [ 2074.487514][T14416] ? clear_bhb_loop+0x30/0x80 [ 2074.492168][T14416] ? clear_bhb_loop+0x30/0x80 [ 2074.496826][T14416] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2074.502698][T14416] RIP: 0033:0x7fb74efb9f79 [ 2074.507097][T14416] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2074.526685][T14416] RSP: 002b:00007fb74d214028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 2074.535081][T14416] RAX: ffffffffffffffda RBX: 00007fb74f233fa0 RCX: 00007fb74efb9f79 [ 2074.543057][T14416] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000003 [ 2074.551009][T14416] RBP: 00007fb74d214090 R08: 0000000000000000 R09: 0000000000000000 [ 2074.558960][T14416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2074.566915][T14416] R13: 00007fb74f234038 R14: 00007fb74f233fa0 R15: 00007ffd35c5b1b8 [ 2074.574875][T14416] [ 2074.796240][T14435] netlink: 'syz.4.13232': attribute type 10 has an invalid length. [ 2074.811670][T14435] team0: Device bond0 is already an upper device of the team interface [ 2074.834295][T14442] netlink: 'syz.5.13228': attribute type 3 has an invalid length. [ 2074.842167][T14442] __nla_validate_parse: 4 callbacks suppressed [ 2074.842183][T14442] netlink: 197324 bytes leftover after parsing attributes in process `syz.5.13228'. [ 2075.279209][T14462] tun0: tun_chr_ioctl cmd 1074025677 [ 2075.313790][T14462] tun0: linktype set to 768 [ 2075.349133][T14471] netlink: 15487 bytes leftover after parsing attributes in process `syz.4.13247'. [ 2075.478294][T14479] netlink: 10 bytes leftover after parsing attributes in process `syz.1.13248'. [ 2075.575533][T14487] validate_nla: 4 callbacks suppressed [ 2075.575550][T14487] netlink: 'syz.7.13245': attribute type 40 has an invalid length. [ 2075.847852][T14494] netlink: 'syz.5.13252': attribute type 10 has an invalid length. [ 2075.945387][T14498] netlink: 'syz.1.13251': attribute type 3 has an invalid length. [ 2075.974449][T14498] netlink: 'syz.1.13251': attribute type 8 has an invalid length. [ 2076.055361][T14498] netlink: 197324 bytes leftover after parsing attributes in process `syz.1.13251'. [ 2076.431811][T14512] IPv6: Can't replace route, no match found [ 2077.009759][T14524] netlink: 'syz.4.13262': attribute type 10 has an invalid length. [ 2077.069777][T14524] team0: Device bond0 is already an upper device of the team interface [ 2077.231010][T14529] netlink: 192436 bytes leftover after parsing attributes in process `syz.5.13264'. [ 2077.253382][T14529] openvswitch: netlink: Duplicate key (type 0). [ 2077.490251][T14555] netlink: 'syz.1.13268': attribute type 3 has an invalid length. [ 2077.552472][T14552] netlink: 40 bytes leftover after parsing attributes in process `syz.4.13271'. [ 2077.570862][T14555] netlink: 'syz.1.13268': attribute type 8 has an invalid length. [ 2077.583246][T14552] netlink: 3 bytes leftover after parsing attributes in process `syz.4.13271'. [ 2077.606905][T14552] netlink: 3 bytes leftover after parsing attributes in process `syz.4.13271'. [ 2077.622982][T14555] netlink: 197324 bytes leftover after parsing attributes in process `syz.1.13268'. [ 2077.651355][T14552] netlink: 3 bytes leftover after parsing attributes in process `syz.4.13271'. [ 2077.944072][T14563] netlink: 'syz.1.13273': attribute type 29 has an invalid length. [ 2078.298952][T14576] device bond0 entered promiscuous mode [ 2078.317873][T14576] device bond_slave_0 entered promiscuous mode [ 2078.326004][T14576] device bond_slave_1 entered promiscuous mode [ 2078.336483][T14576] device team0 entered promiscuous mode [ 2078.342331][T14576] device team_slave_0 entered promiscuous mode [ 2078.351069][T14576] device team_slave_1 entered promiscuous mode [ 2078.533709][T14596] netlink: 'syz.4.13285': attribute type 9 has an invalid length. [ 2078.680953][T14606] netlink: 'syz.5.13296': attribute type 10 has an invalid length. [ 2079.002588][T14612] FAULT_INJECTION: forcing a failure. [ 2079.002588][T14612] name failslab, interval 1, probability 0, space 0, times 0 [ 2079.015280][T14612] CPU: 0 PID: 14612 Comm: syz.5.13288 Not tainted syzkaller #0 [ 2079.022843][T14612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2079.032921][T14612] Call Trace: [ 2079.036220][T14612] [ 2079.039169][T14612] dump_stack_lvl+0x188/0x250 [ 2079.043879][T14612] ? show_regs_print_info+0x20/0x20 [ 2079.049104][T14612] ? load_image+0x400/0x400 [ 2079.053674][T14612] should_fail+0x38c/0x4c0 [ 2079.058130][T14612] should_failslab+0x5/0x20 [ 2079.062653][T14612] slab_pre_alloc_hook+0x51/0xc0 [ 2079.067616][T14612] ? skb_clone+0x1bd/0x350 [ 2079.072060][T14612] kmem_cache_alloc+0x3d/0x290 [ 2079.076925][T14612] skb_clone+0x1bd/0x350 [ 2079.081184][T14612] ? dev_queue_xmit_nit+0x1df/0xb00 [ 2079.086414][T14612] dev_queue_xmit_nit+0x2cc/0xb00 [ 2079.091479][T14612] ? validate_xmit_skb+0x7b3/0xe40 [ 2079.096631][T14612] dev_hard_start_xmit+0x13e/0x7e0 [ 2079.101805][T14612] __dev_queue_xmit+0x1a78/0x2fd0 [ 2079.106907][T14612] ? dev_queue_xmit+0x20/0x20 [ 2079.111612][T14612] ? __copy_skb_header+0x3ba/0x4f0 [ 2079.116760][T14612] ? memcpy+0x3c/0x60 [ 2079.120786][T14612] ? __copy_skb_header+0x3ba/0x4f0 [ 2079.125938][T14612] ? __skb_clone+0x480/0x790 [ 2079.130582][T14612] ? skb_clone+0x1f1/0x350 [ 2079.135040][T14612] __netlink_deliver_tap+0x53e/0x7c0 [ 2079.140410][T14612] netlink_deliver_tap+0x16c/0x180 [ 2079.145553][T14612] netlink_sendskb+0x64/0x130 [ 2079.150255][T14612] netlink_ack+0x87d/0xb50 [ 2079.154688][T14612] ? netlink_dump+0xcf0/0xcf0 [ 2079.159363][T14612] ? __skb_clone+0x480/0x790 [ 2079.163964][T14612] netlink_rcv_skb+0x27a/0x440 [ 2079.168721][T14612] ? rtnetlink_bind+0x80/0x80 [ 2079.173399][T14612] ? netlink_ack+0xb50/0xb50 [ 2079.178012][T14612] netlink_unicast+0x774/0x920 [ 2079.182789][T14612] netlink_sendmsg+0x8ba/0xbe0 [ 2079.187567][T14612] ? netlink_getsockopt+0x570/0x570 [ 2079.192765][T14612] ? aa_sock_msg_perm+0x94/0x150 [ 2079.197704][T14612] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 2079.202983][T14612] ? security_socket_sendmsg+0x7c/0xa0 [ 2079.208436][T14612] ? netlink_getsockopt+0x570/0x570 [ 2079.213627][T14612] ____sys_sendmsg+0x5b7/0x8f0 [ 2079.218405][T14612] ? __sys_sendmsg_sock+0x30/0x30 [ 2079.223444][T14612] ? import_iovec+0x6f/0xa0 [ 2079.227948][T14612] ___sys_sendmsg+0x236/0x2e0 [ 2079.232634][T14612] ? __sys_sendmsg+0x2a0/0x2a0 [ 2079.237425][T14612] ? trace_event_raw_event_lock+0x270/0x270 [ 2079.243310][T14612] ? vfs_write+0x8b2/0xd60 [ 2079.247767][T14612] __se_sys_sendmsg+0x1af/0x290 [ 2079.252614][T14612] ? __x64_sys_sendmsg+0x80/0x80 [ 2079.257542][T14612] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2079.263544][T14612] ? lockdep_hardirqs_on+0x94/0x140 [ 2079.268876][T14612] do_syscall_64+0x4c/0xa0 [ 2079.273297][T14612] ? clear_bhb_loop+0x30/0x80 [ 2079.277983][T14612] ? clear_bhb_loop+0x30/0x80 [ 2079.282684][T14612] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2079.288598][T14612] RIP: 0033:0x7f72fec80f79 [ 2079.293018][T14612] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2079.312630][T14612] RSP: 002b:00007f72fcedb028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2079.321071][T14612] RAX: ffffffffffffffda RBX: 00007f72feefafa0 RCX: 00007f72fec80f79 [ 2079.329070][T14612] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 2079.337055][T14612] RBP: 00007f72fcedb090 R08: 0000000000000000 R09: 0000000000000000 [ 2079.345028][T14612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2079.352997][T14612] R13: 00007f72feefb038 R14: 00007f72feefafa0 R15: 00007ffeb3680fb8 [ 2079.360996][T14612] [ 2079.545200][T14623] openvswitch: netlink: Geneve option length err (len 1788, max 255). [ 2080.083816][T14642] __nla_validate_parse: 5 callbacks suppressed [ 2080.083836][T14642] netlink: 17279 bytes leftover after parsing attributes in process `syz.6.13299'. [ 2080.611066][T14664] netlink: set zone limit has 8 unknown bytes [ 2080.738250][T14672] validate_nla: 2 callbacks suppressed [ 2080.738268][T14672] netlink: 'syz.6.13306': attribute type 3 has an invalid length. [ 2080.773067][T14672] netlink: 'syz.6.13306': attribute type 8 has an invalid length. [ 2080.826015][T14672] netlink: 197324 bytes leftover after parsing attributes in process `syz.6.13306'. [ 2081.019744][T14678] IPv6: Can't replace route, no match found [ 2081.534547][T14701] netlink: 'syz.4.13318': attribute type 10 has an invalid length. [ 2081.629195][T14706] delete_channel: no stack [ 2081.724748][T14708] IPv6: Can't replace route, no match found [ 2081.757198][T14714] netlink: 'syz.1.13323': attribute type 9 has an invalid length. [ 2081.786184][T14714] netlink: 126588 bytes leftover after parsing attributes in process `syz.1.13323'. [ 2082.653196][T14737] netlink: 209852 bytes leftover after parsing attributes in process `syz.6.13331'. [ 2082.698113][T14741] netlink: 'syz.4.13332': attribute type 10 has an invalid length. [ 2082.869516][T14746] FAULT_INJECTION: forcing a failure. [ 2082.869516][T14746] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2082.884486][T14746] CPU: 1 PID: 14746 Comm: syz.7.13334 Not tainted syzkaller #0 [ 2082.892053][T14746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2082.902105][T14746] Call Trace: [ 2082.905387][T14746] [ 2082.908312][T14746] dump_stack_lvl+0x188/0x250 [ 2082.912998][T14746] ? show_regs_print_info+0x20/0x20 [ 2082.918200][T14746] ? load_image+0x400/0x400 [ 2082.922716][T14746] ? __lock_acquire+0x7d10/0x7d10 [ 2082.927749][T14746] should_fail+0x38c/0x4c0 [ 2082.932159][T14746] _copy_to_user+0x2e/0x130 [ 2082.936648][T14746] simple_read_from_buffer+0xe3/0x150 [ 2082.942010][T14746] proc_fail_nth_read+0x1a6/0x220 [ 2082.947030][T14746] ? proc_fault_inject_write+0x310/0x310 [ 2082.952654][T14746] ? fsnotify_perm+0x254/0x560 [ 2082.957403][T14746] ? proc_fault_inject_write+0x310/0x310 [ 2082.963037][T14746] vfs_read+0x301/0xd60 [ 2082.967190][T14746] ? kernel_read+0x1e0/0x1e0 [ 2082.971767][T14746] ? __fget_files+0x40f/0x480 [ 2082.976438][T14746] ? mutex_lock_nested+0x17/0x20 [ 2082.981362][T14746] ? __fdget_pos+0x2bf/0x370 [ 2082.985950][T14746] ? ksys_read+0x71/0x260 [ 2082.990263][T14746] ksys_read+0x152/0x260 [ 2082.994490][T14746] ? vfs_write+0xd60/0xd60 [ 2082.998894][T14746] ? lockdep_hardirqs_on+0x94/0x140 [ 2083.004080][T14746] do_syscall_64+0x4c/0xa0 [ 2083.008482][T14746] ? clear_bhb_loop+0x30/0x80 [ 2083.013141][T14746] ? clear_bhb_loop+0x30/0x80 [ 2083.017802][T14746] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2083.023680][T14746] RIP: 0033:0x7f929336084e [ 2083.028082][T14746] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2083.047680][T14746] RSP: 002b:00007f92915f9fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2083.056091][T14746] RAX: ffffffffffffffda RBX: 00007f92915fa6c0 RCX: 00007f929336084e [ 2083.064055][T14746] RDX: 000000000000000f RSI: 00007f92915fa0a0 RDI: 0000000000000004 [ 2083.072009][T14746] RBP: 00007f92915fa090 R08: 0000000000000000 R09: 0000000000000000 [ 2083.079963][T14746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2083.087917][T14746] R13: 00007f929361a038 R14: 00007f9293619fa0 R15: 00007fffbae53248 [ 2083.095887][T14746] [ 2083.220386][T14751] pimreg: tun_chr_ioctl cmd 1074025677 [ 2083.233975][T14751] pimreg: linktype set to 805 [ 2083.411794][T14759] pimreg: tun_chr_ioctl cmd 1074025681 [ 2083.583563][T14754] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 2083.637667][T14754] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 2083.853504][T14767] netlink: 65047 bytes leftover after parsing attributes in process `syz.1.13343'. [ 2084.050728][T14771] netlink: 16410 bytes leftover after parsing attributes in process `syz.1.13343'. [ 2087.194432][T14786] netlink: 'syz.4.13346': attribute type 10 has an invalid length. [ 2087.408766][T14793] netlink: 4 bytes leftover after parsing attributes in process `syz.7.13348'. [ 2087.696807][T14813] netlink: 'syz.5.13357': attribute type 9 has an invalid length. [ 2087.751809][T14811] device bond0 entered promiscuous mode [ 2087.768382][T14811] device bond_slave_0 entered promiscuous mode [ 2087.782900][T14813] netlink: 209836 bytes leftover after parsing attributes in process `syz.5.13357'. [ 2087.801432][T14811] device bond_slave_1 entered promiscuous mode [ 2087.818494][T14811] device bridge_slave_1 entered promiscuous mode [ 2087.828032][T14811] device team0 entered promiscuous mode [ 2087.839052][T14811] device team_slave_0 entered promiscuous mode [ 2087.849437][T14811] device team_slave_1 entered promiscuous mode [ 2088.168349][T14834] netlink: 'syz.4.13362': attribute type 9 has an invalid length. [ 2088.179292][T14828] netlink: 65047 bytes leftover after parsing attributes in process `syz.7.13360'. [ 2088.189239][T14834] netlink: 209836 bytes leftover after parsing attributes in process `syz.4.13362'. [ 2088.201953][T14832] netlink: 'syz.1.13364': attribute type 10 has an invalid length. [ 2088.352979][T14847] netlink: 'syz.6.13363': attribute type 3 has an invalid length. [ 2088.373095][T14847] netlink: 'syz.6.13363': attribute type 8 has an invalid length. [ 2088.389028][T14847] netlink: 197324 bytes leftover after parsing attributes in process `syz.6.13363'. [ 2088.485153][T14850] netlink: 16410 bytes leftover after parsing attributes in process `syz.7.13360'. [ 2088.577040][T14853] netlink: 'syz.1.13367': attribute type 10 has an invalid length. [ 2088.641243][T14853] team0: Device vxcan1 is of different type [ 2088.998182][T14866] netlink: 'syz.1.13371': attribute type 6 has an invalid length. [ 2089.063452][T14866] netlink: 140 bytes leftover after parsing attributes in process `syz.1.13371'. [ 2089.260627][T14882] netlink: 'syz.1.13377': attribute type 10 has an invalid length. [ 2089.455969][T14893] netlink: 65047 bytes leftover after parsing attributes in process `syz.4.13382'. [ 2089.644292][T14896] netlink: 16410 bytes leftover after parsing attributes in process `syz.4.13382'. [ 2090.176762][T14912] netlink: 'syz.6.13388': attribute type 2 has an invalid length. [ 2090.320974][T14914] delete_channel: no stack [ 2091.617979][T14946] netlink: 65047 bytes leftover after parsing attributes in process `syz.1.13401'. [ 2091.701809][T14937] bond0: (slave bond_slave_0): Releasing backup interface [ 2091.740381][T14937] device bond_slave_0 left promiscuous mode [ 2095.682135][T15037] FAULT_INJECTION: forcing a failure. [ 2095.682135][T15037] name failslab, interval 1, probability 0, space 0, times 0 [ 2095.726276][T15037] CPU: 0 PID: 15037 Comm: syz.5.13414 Not tainted syzkaller #0 [ 2095.733868][T15037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2095.743931][T15037] Call Trace: [ 2095.747211][T15037] [ 2095.750121][T15037] dump_stack_lvl+0x188/0x250 [ 2095.754790][T15037] ? show_regs_print_info+0x20/0x20 [ 2095.759987][T15037] ? load_image+0x400/0x400 [ 2095.764481][T15037] ? __might_sleep+0xf0/0xf0 [ 2095.769077][T15037] ? __lock_acquire+0x7d10/0x7d10 [ 2095.774106][T15037] should_fail+0x38c/0x4c0 [ 2095.778525][T15037] should_failslab+0x5/0x20 [ 2095.783015][T15037] slab_pre_alloc_hook+0x51/0xc0 [ 2095.787953][T15037] ? __alloc_file+0x25/0x240 [ 2095.792545][T15037] kmem_cache_alloc+0x3d/0x290 [ 2095.797297][T15037] __alloc_file+0x25/0x240 [ 2095.801700][T15037] alloc_empty_file+0x90/0x180 [ 2095.806492][T15037] alloc_file+0x5b/0x4f0 [ 2095.810715][T15037] ? do_raw_spin_unlock+0x11d/0x230 [ 2095.815897][T15037] alloc_file_pseudo+0x180/0x200 [ 2095.820822][T15037] ? alloc_empty_file_noaccount+0x80/0x80 [ 2095.826525][T15037] ? put_pid+0xc3/0x120 [ 2095.830683][T15037] ? init_peercred+0x29f/0x340 [ 2095.835441][T15037] sock_alloc_file+0xb3/0x240 [ 2095.840117][T15037] __sys_socketpair+0x2cc/0x540 [ 2095.844963][T15037] __x64_sys_socketpair+0x97/0xb0 [ 2095.849988][T15037] do_syscall_64+0x4c/0xa0 [ 2095.854388][T15037] ? clear_bhb_loop+0x30/0x80 [ 2095.859056][T15037] ? clear_bhb_loop+0x30/0x80 [ 2095.863717][T15037] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2095.869612][T15037] RIP: 0033:0x7f72fec80f79 [ 2095.874030][T15037] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2095.893636][T15037] RSP: 002b:00007f72fcedb028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 2095.902062][T15037] RAX: ffffffffffffffda RBX: 00007f72feefafa0 RCX: 00007f72fec80f79 [ 2095.910051][T15037] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 2095.918014][T15037] RBP: 00007f72fcedb090 R08: 0000000000000000 R09: 0000000000000000 [ 2095.925980][T15037] R10: 0000200000000e00 R11: 0000000000000246 R12: 0000000000000002 [ 2095.933941][T15037] R13: 00007f72feefb038 R14: 00007f72feefafa0 R15: 00007ffeb3680fb8 [ 2095.941909][T15037] [ 2095.978016][T15033] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 2096.083943][T15033] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 2096.210919][T15049] __nla_validate_parse: 4 callbacks suppressed [ 2096.210951][T15049] netlink: 65039 bytes leftover after parsing attributes in process `syz.1.13417'. [ 2096.258171][T15057] netlink: 4 bytes leftover after parsing attributes in process `syz.5.13420'. [ 2096.606616][T15079] netlink: 65047 bytes leftover after parsing attributes in process `syz.1.13428'. [ 2096.769510][T15086] netlink: 16410 bytes leftover after parsing attributes in process `syz.1.13428'. [ 2097.065969][T15090] validate_nla: 3 callbacks suppressed [ 2097.066057][T15090] netlink: 'syz.5.13434': attribute type 3 has an invalid length. [ 2097.160015][T15095] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 2097.173335][T15090] netlink: 'syz.5.13434': attribute type 1 has an invalid length. [ 2097.181370][T15090] netlink: 60387 bytes leftover after parsing attributes in process `syz.5.13434'. [ 2097.219561][T15095] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 2097.562425][T15104] FAULT_INJECTION: forcing a failure. [ 2097.562425][T15104] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2097.721429][T15104] CPU: 0 PID: 15104 Comm: syz.7.13435 Not tainted syzkaller #0 [ 2097.729011][T15104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2097.739057][T15104] Call Trace: [ 2097.742358][T15104] [ 2097.745278][T15104] dump_stack_lvl+0x188/0x250 [ 2097.749957][T15104] ? show_regs_print_info+0x20/0x20 [ 2097.755139][T15104] ? load_image+0x400/0x400 [ 2097.759636][T15104] ? __lock_acquire+0x7d10/0x7d10 [ 2097.764646][T15104] should_fail+0x38c/0x4c0 [ 2097.769052][T15104] _copy_to_user+0x2e/0x130 [ 2097.773539][T15104] simple_read_from_buffer+0xe3/0x150 [ 2097.778896][T15104] proc_fail_nth_read+0x1a6/0x220 [ 2097.783906][T15104] ? proc_fault_inject_write+0x310/0x310 [ 2097.789520][T15104] ? fsnotify_perm+0x254/0x560 [ 2097.794265][T15104] ? proc_fault_inject_write+0x310/0x310 [ 2097.799880][T15104] vfs_read+0x301/0xd60 [ 2097.804021][T15104] ? kernel_read+0x1e0/0x1e0 [ 2097.808595][T15104] ? __fget_files+0x40f/0x480 [ 2097.813259][T15104] ? mutex_lock_nested+0x17/0x20 [ 2097.818180][T15104] ? __fdget_pos+0x2bf/0x370 [ 2097.822745][T15104] ? ksys_read+0x71/0x260 [ 2097.827057][T15104] ksys_read+0x152/0x260 [ 2097.831284][T15104] ? vfs_write+0xd60/0xd60 [ 2097.835683][T15104] ? lockdep_hardirqs_on+0x94/0x140 [ 2097.840866][T15104] do_syscall_64+0x4c/0xa0 [ 2097.845263][T15104] ? clear_bhb_loop+0x30/0x80 [ 2097.849920][T15104] ? clear_bhb_loop+0x30/0x80 [ 2097.854576][T15104] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2097.860453][T15104] RIP: 0033:0x7f929336084e [ 2097.864852][T15104] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2097.884440][T15104] RSP: 002b:00007f92915f9fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2097.892839][T15104] RAX: ffffffffffffffda RBX: 00007f92915fa6c0 RCX: 00007f929336084e [ 2097.900797][T15104] RDX: 000000000000000f RSI: 00007f92915fa0a0 RDI: 0000000000000004 [ 2097.908747][T15104] RBP: 00007f92915fa090 R08: 0000000000000000 R09: 0000000000000000 [ 2097.916700][T15104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2097.924655][T15104] R13: 00007f929361a038 R14: 00007f9293619fa0 R15: 00007fffbae53248 [ 2097.932619][T15104] [ 2098.722291][T15136] netlink: 129384 bytes leftover after parsing attributes in process `syz.5.13448'. [ 2098.770984][T15134] FAULT_INJECTION: forcing a failure. [ 2098.770984][T15134] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2098.820672][T15134] CPU: 1 PID: 15134 Comm: syz.5.13448 Not tainted syzkaller #0 [ 2098.828276][T15134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2098.838341][T15134] Call Trace: [ 2098.841618][T15134] [ 2098.844557][T15134] dump_stack_lvl+0x188/0x250 [ 2098.849248][T15134] ? show_regs_print_info+0x20/0x20 [ 2098.854456][T15134] ? load_image+0x400/0x400 [ 2098.858969][T15134] ? __lock_acquire+0x7d10/0x7d10 [ 2098.863996][T15134] should_fail+0x38c/0x4c0 [ 2098.868419][T15134] _copy_from_iter+0x22e/0x1170 [ 2098.873277][T15134] ? __lock_acquire+0x7d10/0x7d10 [ 2098.878327][T15134] ? copy_mc_pipe_to_iter+0x7d0/0x7d0 [ 2098.883714][T15134] ? __virt_addr_valid+0x3c6/0x470 [ 2098.888826][T15134] ? __phys_addr_symbol+0x2b/0x70 [ 2098.893849][T15134] ? __check_object_size+0x30c/0x410 [ 2098.899137][T15134] netlink_sendmsg+0x758/0xbe0 [ 2098.903917][T15134] ? netlink_getsockopt+0x570/0x570 [ 2098.909119][T15134] ? aa_sock_msg_perm+0x94/0x150 [ 2098.914062][T15134] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 2098.919353][T15134] ? security_socket_sendmsg+0x7c/0xa0 [ 2098.924811][T15134] ? netlink_getsockopt+0x570/0x570 [ 2098.930007][T15134] ____sys_sendmsg+0x5b7/0x8f0 [ 2098.933248][ T1421] ieee802154 phy0 wpan0: encryption failed: -22 [ 2098.934778][T15134] ? __sys_sendmsg_sock+0x30/0x30 [ 2098.941035][ T1421] ieee802154 phy1 wpan1: encryption failed: -22 [ 2098.945995][T15134] ? import_iovec+0x6f/0xa0 [ 2098.946020][T15134] ___sys_sendmsg+0x236/0x2e0 [ 2098.946048][T15134] ? __sys_sendmsg+0x2a0/0x2a0 [ 2098.966138][T15134] ? trace_event_raw_event_lock+0x270/0x270 [ 2098.972032][T15134] ? vfs_write+0x8b2/0xd60 [ 2098.976470][T15134] __se_sys_sendmsg+0x1af/0x290 [ 2098.981341][T15134] ? __x64_sys_sendmsg+0x80/0x80 [ 2098.986275][T15134] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2098.992267][T15134] ? lockdep_hardirqs_on+0x94/0x140 [ 2098.997469][T15134] do_syscall_64+0x4c/0xa0 [ 2099.001885][T15134] ? clear_bhb_loop+0x30/0x80 [ 2099.006557][T15134] ? clear_bhb_loop+0x30/0x80 [ 2099.011231][T15134] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2099.017123][T15134] RIP: 0033:0x7f72fec80f79 [ 2099.021545][T15134] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2099.041155][T15134] RSP: 002b:00007f72fceba028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2099.049573][T15134] RAX: ffffffffffffffda RBX: 00007f72feefb090 RCX: 00007f72fec80f79 [ 2099.057542][T15134] RDX: 0000000000000000 RSI: 0000200000000600 RDI: 0000000000000009 [ 2099.065508][T15134] RBP: 00007f72fceba090 R08: 0000000000000000 R09: 0000000000000000 [ 2099.073475][T15134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2099.081449][T15134] R13: 00007f72feefb128 R14: 00007f72feefb090 R15: 00007ffeb3680fb8 [ 2099.089441][T15134] [ 2100.867614][T15140] netlink: 65047 bytes leftover after parsing attributes in process `syz.4.13449'. [ 2100.992066][T15148] netlink: 9286 bytes leftover after parsing attributes in process `syz.5.13452'. [ 2101.013027][T31554] Bluetooth: hci2: command 0x0406 tx timeout [ 2101.121098][T15151] netlink: 16410 bytes leftover after parsing attributes in process `syz.4.13449'. [ 2101.162773][T15138] delete_channel: no stack [ 2101.440524][T15157] netlink: 129384 bytes leftover after parsing attributes in process `syz.7.13453'. [ 2101.466990][T15157] netlink: 'syz.7.13453': attribute type 10 has an invalid length. [ 2101.535127][T15157] 8021q: adding VLAN 0 to HW filter on device team0 [ 2101.621609][T15162] netlink: 105120 bytes leftover after parsing attributes in process `syz.6.13456'. [ 2101.693126][T15162] netlink: 16126 bytes leftover after parsing attributes in process `syz.6.13456'. [ 2101.770147][T15167] device syzkaller0 entered promiscuous mode [ 2101.863967][T15171] device syzkaller0 entered promiscuous mode [ 2101.961333][T15179] netlink: 'syz.5.13462': attribute type 10 has an invalid length. [ 2101.997650][T15177] netlink: 209592 bytes leftover after parsing attributes in process `syz.1.13463'. [ 2102.271600][T15194] netlink: 144316 bytes leftover after parsing attributes in process `syz.1.13468'. [ 2102.369112][T15192] device syzkaller0 entered promiscuous mode [ 2102.488561][T15200] netlink: 65047 bytes leftover after parsing attributes in process `syz.6.13470'. [ 2102.532415][T15204] FAULT_INJECTION: forcing a failure. [ 2102.532415][T15204] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2102.566221][T15204] CPU: 1 PID: 15204 Comm: syz.4.13471 Not tainted syzkaller #0 [ 2102.573813][T15204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2102.583866][T15204] Call Trace: [ 2102.587139][T15204] [ 2102.590065][T15204] dump_stack_lvl+0x188/0x250 [ 2102.594748][T15204] ? show_regs_print_info+0x20/0x20 [ 2102.599942][T15204] ? load_image+0x400/0x400 [ 2102.604450][T15204] ? __lock_acquire+0x7d10/0x7d10 [ 2102.609465][T15204] ? vfs_write+0x8b2/0xd60 [ 2102.613885][T15204] should_fail+0x38c/0x4c0 [ 2102.618327][T15204] _copy_from_user+0x2e/0x170 [ 2102.623024][T15204] __sys_bpf+0x26d/0x6f0 [ 2102.627284][T15204] ? bpf_link_show_fdinfo+0x380/0x380 [ 2102.632686][T15204] ? vtime_user_exit+0x2c8/0x3e0 [ 2102.637642][T15204] __x64_sys_bpf+0x78/0x90 [ 2102.642059][T15204] do_syscall_64+0x4c/0xa0 [ 2102.646473][T15204] ? clear_bhb_loop+0x30/0x80 [ 2102.651146][T15204] ? clear_bhb_loop+0x30/0x80 [ 2102.655817][T15204] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2102.661722][T15204] RIP: 0033:0x7fb74efb9f79 [ 2102.666152][T15204] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2102.685759][T15204] RSP: 002b:00007fb74d214028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2102.694177][T15204] RAX: ffffffffffffffda RBX: 00007fb74f233fa0 RCX: 00007fb74efb9f79 [ 2102.702142][T15204] RDX: 000000000000000c RSI: 0000200000000380 RDI: 000000000000000a [ 2102.710102][T15204] RBP: 00007fb74d214090 R08: 0000000000000000 R09: 0000000000000000 [ 2102.718065][T15204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2102.726029][T15204] R13: 00007fb74f234038 R14: 00007fb74f233fa0 R15: 00007ffd35c5b1b8 [ 2102.734026][T15204] [ 2102.764277][T15207] netlink: 16410 bytes leftover after parsing attributes in process `syz.6.13470'. [ 2102.816114][T15206] netlink: 'syz.1.13472': attribute type 5 has an invalid length. [ 2103.084578][T15218] netlink: 'syz.4.13477': attribute type 10 has an invalid length. [ 2103.408855][T15230] netlink: 65055 bytes leftover after parsing attributes in process `syz.1.13481'. [ 2103.512552][T15240] netlink: 'syz.5.13486': attribute type 10 has an invalid length. [ 2103.941152][T15259] netlink: 'syz.6.13491': attribute type 10 has an invalid length. [ 2104.016125][T15265] netlink: 65047 bytes leftover after parsing attributes in process `syz.5.13493'. [ 2104.218536][T15272] netlink: 16410 bytes leftover after parsing attributes in process `syz.5.13493'. [ 2104.908900][T15291] netlink: 'syz.1.13498': attribute type 3 has an invalid length. [ 2104.937817][T15291] netlink: 'syz.1.13498': attribute type 8 has an invalid length. [ 2105.826707][T15316] netlink: 'syz.1.13506': attribute type 10 has an invalid length. [ 2105.863488][T15316] batman_adv: batadv0: Adding interface: hsr_slave_1 [ 2105.883035][T15316] batman_adv: batadv0: The MTU of interface hsr_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2105.937923][T15316] batman_adv: batadv0: Interface activated: hsr_slave_1 [ 2106.010849][T15309] delete_channel: no stack [ 2106.484646][T15338] netlink: 'syz.7.13510': attribute type 1 has an invalid length. [ 2106.712118][T15347] netlink: 'syz.1.13513': attribute type 3 has an invalid length. [ 2106.758092][T15347] netlink: 'syz.1.13513': attribute type 8 has an invalid length. [ 2106.784202][T15347] __nla_validate_parse: 4 callbacks suppressed [ 2106.784329][T15347] netlink: 197324 bytes leftover after parsing attributes in process `syz.1.13513'. [ 2107.449265][T15365] device bond0 entered promiscuous mode [ 2107.455430][T15365] device bond_slave_0 entered promiscuous mode [ 2107.463516][T15365] device bond_slave_1 entered promiscuous mode [ 2107.471461][T15365] device team0 entered promiscuous mode [ 2107.491488][T15365] device team_slave_0 entered promiscuous mode [ 2107.502239][T15365] device team_slave_1 entered promiscuous mode [ 2107.511018][T15365] device bridge_slave_1 entered promiscuous mode [ 2107.530224][T15360] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.13518'. [ 2107.957820][T15388] netlink: 65047 bytes leftover after parsing attributes in process `syz.5.13528'. [ 2108.052541][T15392] netlink: 16410 bytes leftover after parsing attributes in process `syz.5.13528'. [ 2108.488806][T15397] validate_nla: 2 callbacks suppressed [ 2108.488822][T15397] netlink: 'syz.6.13531': attribute type 39 has an invalid length. [ 2109.048542][T15401] netlink: 'syz.4.13532': attribute type 3 has an invalid length. [ 2109.102845][T15401] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.13532'. [ 2109.310773][T15424] netlink: 'syz.6.13539': attribute type 21 has an invalid length. [ 2109.350536][T15424] netlink: 132 bytes leftover after parsing attributes in process `syz.6.13539'. [ 2109.375118][T15430] netlink: 'syz.5.13538': attribute type 3 has an invalid length. [ 2109.403022][T15430] netlink: 105116 bytes leftover after parsing attributes in process `syz.5.13538'. [ 2112.538257][T15448] netlink: 65047 bytes leftover after parsing attributes in process `syz.5.13545'. [ 2112.652483][T15448] netlink: 16410 bytes leftover after parsing attributes in process `syz.5.13545'. [ 2113.265119][T15467] netlink: 'syz.7.13549': attribute type 13 has an invalid length. [ 2113.380476][T15467] netlink: 160 bytes leftover after parsing attributes in process `syz.7.13549'. [ 2113.525191][T15467] erspan0: refused to change device tx_queue_len [ 2113.611056][T15467] A link change request failed with some changes committed already. Interface erspan0 may have been left with an inconsistent configuration, please check. [ 2114.122628][T15505] FAULT_INJECTION: forcing a failure. [ 2114.122628][T15505] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2114.173216][T15505] CPU: 0 PID: 15505 Comm: syz.5.13567 Not tainted syzkaller #0 [ 2114.180811][T15505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2114.190891][T15505] Call Trace: [ 2114.194185][T15505] [ 2114.197134][T15505] dump_stack_lvl+0x188/0x250 [ 2114.201827][T15505] ? show_regs_print_info+0x20/0x20 [ 2114.207036][T15505] ? load_image+0x400/0x400 [ 2114.211557][T15505] ? __lock_acquire+0x7d10/0x7d10 [ 2114.216593][T15505] should_fail+0x38c/0x4c0 [ 2114.221023][T15505] _copy_from_user+0x2e/0x170 [ 2114.225710][T15505] bpf_test_init+0x136/0x1b0 [ 2114.230310][T15505] bpf_prog_test_run_skb+0x181/0x1180 [ 2114.235679][T15505] ? __fget_files+0x40f/0x480 [ 2114.240355][T15505] ? cpu_online+0x60/0x60 [ 2114.244670][T15505] bpf_prog_test_run+0x31e/0x390 [ 2114.249593][T15505] __sys_bpf+0x5a5/0x6f0 [ 2114.253823][T15505] ? bpf_link_show_fdinfo+0x380/0x380 [ 2114.259186][T15505] ? vtime_user_exit+0x2c8/0x3e0 [ 2114.264113][T15505] __x64_sys_bpf+0x78/0x90 [ 2114.268515][T15505] do_syscall_64+0x4c/0xa0 [ 2114.272918][T15505] ? clear_bhb_loop+0x30/0x80 [ 2114.277579][T15505] ? clear_bhb_loop+0x30/0x80 [ 2114.282237][T15505] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2114.288112][T15505] RIP: 0033:0x7f72fec80f79 [ 2114.292516][T15505] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2114.312102][T15505] RSP: 002b:00007f72fcedb028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2114.320498][T15505] RAX: ffffffffffffffda RBX: 00007f72feefafa0 RCX: 00007f72fec80f79 [ 2114.328461][T15505] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 2114.336413][T15505] RBP: 00007f72fcedb090 R08: 0000000000000000 R09: 0000000000000000 [ 2114.344370][T15505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2114.352323][T15505] R13: 00007f72feefb038 R14: 00007f72feefafa0 R15: 00007ffeb3680fb8 [ 2114.360295][T15505] [ 2114.467023][T15511] netlink: 65047 bytes leftover after parsing attributes in process `syz.1.13568'. [ 2114.531441][T15514] netlink: 180 bytes leftover after parsing attributes in process `syz.6.13570'. [ 2114.588317][T15518] netlink: 16410 bytes leftover after parsing attributes in process `syz.1.13568'. [ 2114.718150][T15521] netlink: 'syz.4.13569': attribute type 3 has an invalid length. [ 2114.743852][T15521] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.13569'. [ 2115.338530][T15536] FAULT_INJECTION: forcing a failure. [ 2115.338530][T15536] name failslab, interval 1, probability 0, space 0, times 0 [ 2115.381270][T15536] CPU: 1 PID: 15536 Comm: syz.1.13576 Not tainted syzkaller #0 [ 2115.388843][T15536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2115.398905][T15536] Call Trace: [ 2115.402187][T15536] [ 2115.405118][T15536] dump_stack_lvl+0x188/0x250 [ 2115.409804][T15536] ? show_regs_print_info+0x20/0x20 [ 2115.415014][T15536] ? load_image+0x400/0x400 [ 2115.419522][T15536] ? __might_sleep+0xf0/0xf0 [ 2115.424110][T15536] ? __lock_acquire+0x7d10/0x7d10 [ 2115.429135][T15536] ? netlink_insert+0xe95/0x11f0 [ 2115.434084][T15536] should_fail+0x38c/0x4c0 [ 2115.438512][T15536] should_failslab+0x5/0x20 [ 2115.443010][T15536] slab_pre_alloc_hook+0x51/0xc0 [ 2115.447942][T15536] kmem_cache_alloc_node+0x47/0x2d0 [ 2115.453128][T15536] ? __alloc_skb+0xf4/0x750 [ 2115.457627][T15536] __alloc_skb+0xf4/0x750 [ 2115.461950][T15536] netlink_sendmsg+0x654/0xbe0 [ 2115.466703][T15536] ? netlink_getsockopt+0x570/0x570 [ 2115.471884][T15536] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2115.478019][T15536] ? aa_sock_msg_perm+0x94/0x150 [ 2115.482940][T15536] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 2115.488207][T15536] ? security_socket_sendmsg+0x7c/0xa0 [ 2115.493645][T15536] ? netlink_getsockopt+0x570/0x570 [ 2115.498828][T15536] ____sys_sendmsg+0x5b7/0x8f0 [ 2115.503586][T15536] ? memset_erms+0xb/0x10 [ 2115.507902][T15536] ? __sys_sendmsg_sock+0x30/0x30 [ 2115.512915][T15536] ? import_iovec+0x6f/0xa0 [ 2115.517405][T15536] ___sys_sendmsg+0x236/0x2e0 [ 2115.522069][T15536] ? __sys_sendmsg+0x2a0/0x2a0 [ 2115.526846][T15536] __se_sys_sendmsg+0x1af/0x290 [ 2115.531682][T15536] ? __x64_sys_sendmsg+0x80/0x80 [ 2115.536611][T15536] ? syscall_enter_from_user_mode+0x2a/0x70 [ 2115.542494][T15536] do_syscall_64+0x4c/0xa0 [ 2115.546895][T15536] ? clear_bhb_loop+0x30/0x80 [ 2115.551563][T15536] ? clear_bhb_loop+0x30/0x80 [ 2115.556224][T15536] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2115.562104][T15536] RIP: 0033:0x7feab9cccf79 [ 2115.566504][T15536] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2115.586092][T15536] RSP: 002b:00007feab7f27028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2115.594491][T15536] RAX: ffffffffffffffda RBX: 00007feab9f46fa0 RCX: 00007feab9cccf79 [ 2115.602446][T15536] RDX: 0000000000040800 RSI: 0000200000000040 RDI: 0000000000000005 [ 2115.610400][T15536] RBP: 00007feab7f27090 R08: 0000000000000000 R09: 0000000000000000 [ 2115.618351][T15536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2115.626304][T15536] R13: 00007feab9f47038 R14: 00007feab9f46fa0 R15: 00007fffde5cd768 [ 2115.634270][T15536] [ 2116.101054][T15532] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 2118.583369][T15573] netlink: 'syz.5.13586': attribute type 13 has an invalid length. [ 2118.591415][T15573] netlink: 160 bytes leftover after parsing attributes in process `syz.5.13586'. [ 2118.627440][T15575] netlink: 65047 bytes leftover after parsing attributes in process `syz.4.13587'. [ 2118.671407][T15573] erspan0: refused to change device tx_queue_len [ 2118.678535][T15573] A link change request failed with some changes committed already. Interface erspan0 may have been left with an inconsistent configuration, please check. [ 2118.700273][T15577] netlink: 180 bytes leftover after parsing attributes in process `syz.7.13588'. [ 2118.753545][T15584] netlink: 16410 bytes leftover after parsing attributes in process `syz.4.13587'. [ 2118.882144][T15583] netlink: 'syz.1.13589': attribute type 3 has an invalid length. [ 2118.898183][T15583] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.13589'. [ 2119.540932][T15605] FAULT_INJECTION: forcing a failure. [ 2119.540932][T15605] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2119.578178][T15605] CPU: 0 PID: 15605 Comm: syz.4.13595 Not tainted syzkaller #0 [ 2119.585770][T15605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2119.595831][T15605] Call Trace: [ 2119.599113][T15605] [ 2119.602040][T15605] dump_stack_lvl+0x188/0x250 [ 2119.606726][T15605] ? show_regs_print_info+0x20/0x20 [ 2119.611930][T15605] ? load_image+0x400/0x400 [ 2119.616440][T15605] ? __lock_acquire+0x7d10/0x7d10 [ 2119.621470][T15605] should_fail+0x38c/0x4c0 [ 2119.625896][T15605] _copy_from_iter+0x22e/0x1170 [ 2119.630759][T15605] ? __lock_acquire+0x7d10/0x7d10 [ 2119.635797][T15605] ? copy_mc_pipe_to_iter+0x7d0/0x7d0 [ 2119.641181][T15605] ? __virt_addr_valid+0x3c6/0x470 [ 2119.646297][T15605] ? __phys_addr_symbol+0x2b/0x70 [ 2119.651321][T15605] ? __check_object_size+0x30c/0x410 [ 2119.656607][T15605] netlink_sendmsg+0x758/0xbe0 [ 2119.661386][T15605] ? netlink_getsockopt+0x570/0x570 [ 2119.666590][T15605] ? aa_sock_msg_perm+0x94/0x150 [ 2119.671538][T15605] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 2119.676825][T15605] ? security_socket_sendmsg+0x7c/0xa0 [ 2119.682289][T15605] ? netlink_getsockopt+0x570/0x570 [ 2119.687487][T15605] ____sys_sendmsg+0x5b7/0x8f0 [ 2119.692260][T15605] ? __sys_sendmsg_sock+0x30/0x30 [ 2119.697294][T15605] ? import_iovec+0x6f/0xa0 [ 2119.701806][T15605] ___sys_sendmsg+0x236/0x2e0 [ 2119.706496][T15605] ? __sys_sendmsg+0x2a0/0x2a0 [ 2119.711278][T15605] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 2119.717015][T15605] __se_sys_sendmsg+0x1af/0x290 [ 2119.721867][T15605] ? __x64_sys_sendmsg+0x80/0x80 [ 2119.726815][T15605] ? syscall_enter_from_user_mode+0x2a/0x70 [ 2119.732714][T15605] do_syscall_64+0x4c/0xa0 [ 2119.737137][T15605] ? clear_bhb_loop+0x30/0x80 [ 2119.741814][T15605] ? clear_bhb_loop+0x30/0x80 [ 2119.746496][T15605] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2119.752394][T15605] RIP: 0033:0x7fb74efb9f79 [ 2119.756805][T15605] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2119.776413][T15605] RSP: 002b:00007fb74d214028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2119.784836][T15605] RAX: ffffffffffffffda RBX: 00007fb74f233fa0 RCX: 00007fb74efb9f79 [ 2119.792813][T15605] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 000000000000000a [ 2119.800786][T15605] RBP: 00007fb74d214090 R08: 0000000000000000 R09: 0000000000000000 [ 2119.808755][T15605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2119.816726][T15605] R13: 00007fb74f234038 R14: 00007fb74f233fa0 R15: 00007ffd35c5b1b8 [ 2119.824711][T15605] [ 2120.079604][T15621] netlink: 'syz.5.13600': attribute type 13 has an invalid length. [ 2120.092947][T15621] netlink: 168 bytes leftover after parsing attributes in process `syz.5.13600'. [ 2120.336504][T15631] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2120.365028][T15631] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2120.441054][T15631] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2120.485215][T15631] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2120.650222][T15628] netlink: 'syz.4.13601': attribute type 21 has an invalid length. [ 2120.696945][T15640] netlink: 65047 bytes leftover after parsing attributes in process `syz.5.13606'. [ 2120.819484][T15643] netlink: 16410 bytes leftover after parsing attributes in process `syz.5.13606'. [ 2121.339046][T15657] netlink: 'syz.6.13610': attribute type 10 has an invalid length. [ 2121.421312][T15657] device netdevsim0 entered promiscuous mode [ 2121.443647][T15657] bond0: (slave netdevsim0): Enslaving as an active interface with an up link [ 2121.483212][T15658] netlink: 'syz.4.13609': attribute type 5 has an invalid length. [ 2122.675189][T15693] netlink: 65047 bytes leftover after parsing attributes in process `syz.4.13625'. [ 2122.736533][T15695] netlink: 'syz.6.13624': attribute type 5 has an invalid length. [ 2122.801725][T15693] netlink: 16410 bytes leftover after parsing attributes in process `syz.4.13625'. [ 2124.037567][T15742] netlink: 'syz.6.13639': attribute type 1 has an invalid length. [ 2124.191881][T15749] netlink: 'syz.7.13642': attribute type 1 has an invalid length. [ 2124.202702][T15749] netlink: 105120 bytes leftover after parsing attributes in process `syz.7.13642'. [ 2124.307259][T15754] netlink: 65047 bytes leftover after parsing attributes in process `syz.6.13644'. [ 2124.380075][T15755] netlink: 16410 bytes leftover after parsing attributes in process `syz.6.13644'. [ 2125.167334][T15770] tap0: tun_chr_ioctl cmd 1074025672 [ 2125.172743][T15770] tap0: ignored: set checksum disabled [ 2125.405267][T15776] : port 1(batadv0) entered blocking state [ 2125.421990][T15776] : port 1(batadv0) entered disabled state [ 2125.484352][T15776] device batadv0 entered promiscuous mode [ 2125.499229][T13240] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 2125.509095][T13240] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 2125.838517][T15795] netlink: 'syz.1.13659': attribute type 9 has an invalid length. [ 2125.866922][T15795] netlink: 61951 bytes leftover after parsing attributes in process `syz.1.13659'. [ 2126.152183][T15802] netlink: 'syz.1.13663': attribute type 10 has an invalid length. [ 2126.194321][T15802] device netdevsim0 entered promiscuous mode [ 2126.216059][T15802] bond0: (slave netdevsim0): Enslaving as an active interface with an up link [ 2126.304950][T15809] FAULT_INJECTION: forcing a failure. [ 2126.304950][T15809] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2126.376395][T15809] CPU: 1 PID: 15809 Comm: syz.1.13665 Not tainted syzkaller #0 [ 2126.383984][T15809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2126.394045][T15809] Call Trace: [ 2126.397335][T15809] [ 2126.400270][T15809] dump_stack_lvl+0x188/0x250 [ 2126.404959][T15809] ? show_regs_print_info+0x20/0x20 [ 2126.410165][T15809] ? load_image+0x400/0x400 [ 2126.414678][T15809] ? __lock_acquire+0x7d10/0x7d10 [ 2126.419708][T15809] ? stack_trace_save+0xa6/0xf0 [ 2126.424561][T15809] ? stack_trace_snprint+0xf0/0xf0 [ 2126.429680][T15809] should_fail+0x38c/0x4c0 [ 2126.434110][T15809] prepare_alloc_pages+0x1e4/0x5f0 [ 2126.439233][T15809] __alloc_pages+0x11b/0x480 [ 2126.443842][T15809] ? zone_statistics+0x170/0x170 [ 2126.448788][T15809] ? __might_sleep+0xf0/0xf0 [ 2126.453386][T15809] ? __might_fault+0xb7/0x110 [ 2126.458079][T15809] kmalloc_large_node+0x7d/0x190 [ 2126.463021][T15809] __kmalloc_node+0x232/0x3b0 [ 2126.467697][T15809] kvmalloc_node+0x84/0x130 [ 2126.472191][T15809] map_lookup_elem+0x406/0x630 [ 2126.476944][T15809] ? bpf_lsm_bpf+0x5/0x10 [ 2126.481262][T15809] __sys_bpf+0x4c0/0x6f0 [ 2126.485498][T15809] ? bpf_link_show_fdinfo+0x380/0x380 [ 2126.490853][T15809] ? rcu_nmi_exit+0x6f/0xf0 [ 2126.495346][T15809] ? vtime_user_exit+0x2c8/0x3e0 [ 2126.500271][T15809] __x64_sys_bpf+0x78/0x90 [ 2126.504669][T15809] do_syscall_64+0x4c/0xa0 [ 2126.509079][T15809] ? clear_bhb_loop+0x30/0x80 [ 2126.513752][T15809] ? clear_bhb_loop+0x30/0x80 [ 2126.518422][T15809] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2126.524302][T15809] RIP: 0033:0x7feab9cccf79 [ 2126.528711][T15809] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2126.548303][T15809] RSP: 002b:00007feab7f27028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2126.556705][T15809] RAX: ffffffffffffffda RBX: 00007feab9f46fa0 RCX: 00007feab9cccf79 [ 2126.564661][T15809] RDX: 000000000000001d RSI: 00002000000000c0 RDI: 0000000000000001 [ 2126.572615][T15809] RBP: 00007feab7f27090 R08: 0000000000000000 R09: 0000000000000000 [ 2126.580569][T15809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2126.588522][T15809] R13: 00007feab9f47038 R14: 00007feab9f46fa0 R15: 00007fffde5cd768 [ 2126.596489][T15809] [ 2126.792956][T15822] netlink: 'syz.5.13671': attribute type 17 has an invalid length. [ 2126.908770][T15822] netlink: 'syz.5.13671': attribute type 16 has an invalid length. [ 2126.978454][T15822] netlink: 152 bytes leftover after parsing attributes in process `syz.5.13671'. [ 2127.013683][T15826] bridge_slave_1: mtu less than device minimum [ 2127.104836][T15834] netlink: 'syz.6.13675': attribute type 2 has an invalid length. [ 2127.143144][T15834] netlink: 17267 bytes leftover after parsing attributes in process `syz.6.13675'. [ 2127.227377][T15843] netlink: 'syz.5.13679': attribute type 3 has an invalid length. [ 2127.262145][T15843] netlink: 105116 bytes leftover after parsing attributes in process `syz.5.13679'. [ 2127.907712][T15854] netlink: 'syz.1.13682': attribute type 10 has an invalid length. [ 2127.974995][T15846] FAULT_INJECTION: forcing a failure. [ 2127.974995][T15846] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2127.988105][T15854] netlink: 40 bytes leftover after parsing attributes in process `syz.1.13682'. [ 2127.988876][T15854] 8021q: adding VLAN 0 to HW filter on device team0 [ 2128.016387][T15846] CPU: 1 PID: 15846 Comm: syz.7.13676 Not tainted syzkaller #0 [ 2128.023977][T15846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2128.034052][T15846] Call Trace: [ 2128.037346][T15846] [ 2128.040285][T15846] dump_stack_lvl+0x188/0x250 [ 2128.044984][T15846] ? show_regs_print_info+0x20/0x20 [ 2128.050202][T15846] ? load_image+0x400/0x400 [ 2128.054749][T15846] ? __lock_acquire+0x7d10/0x7d10 [ 2128.059806][T15846] should_fail+0x38c/0x4c0 [ 2128.064250][T15846] _copy_to_user+0x2e/0x130 [ 2128.068771][T15846] simple_read_from_buffer+0xe3/0x150 [ 2128.074168][T15846] proc_fail_nth_read+0x1a6/0x220 [ 2128.079223][T15846] ? proc_fault_inject_write+0x310/0x310 [ 2128.084879][T15846] ? fsnotify_perm+0x254/0x560 [ 2128.089658][T15846] ? proc_fault_inject_write+0x310/0x310 [ 2128.095305][T15846] vfs_read+0x301/0xd60 [ 2128.099486][T15846] ? kernel_read+0x1e0/0x1e0 [ 2128.104101][T15846] ? __fget_files+0x40f/0x480 [ 2128.108806][T15846] ? mutex_lock_nested+0x17/0x20 [ 2128.113759][T15846] ? __fdget_pos+0x2bf/0x370 [ 2128.118355][T15846] ? ksys_read+0x71/0x260 [ 2128.122698][T15846] ksys_read+0x152/0x260 [ 2128.126961][T15846] ? vfs_write+0xd60/0xd60 [ 2128.131396][T15846] ? lockdep_hardirqs_on+0x94/0x140 [ 2128.136618][T15846] do_syscall_64+0x4c/0xa0 [ 2128.141047][T15846] ? clear_bhb_loop+0x30/0x80 [ 2128.145734][T15846] ? clear_bhb_loop+0x30/0x80 [ 2128.150422][T15846] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2128.156329][T15846] RIP: 0033:0x7f929336084e [ 2128.160763][T15846] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2128.180385][T15846] RSP: 002b:00007f92915f9fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2128.188821][T15846] RAX: ffffffffffffffda RBX: 00007f92915fa6c0 RCX: 00007f929336084e [ 2128.196802][T15846] RDX: 000000000000000f RSI: 00007f92915fa0a0 RDI: 000000000000000a [ 2128.204785][T15846] RBP: 00007f92915fa090 R08: 0000000000000000 R09: 0000000000000000 [ 2128.212768][T15846] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2128.220750][T15846] R13: 00007f929361a038 R14: 00007f9293619fa0 R15: 00007fffbae53248 [ 2128.228769][T15846] [ 2128.233421][T15854] bond0: (slave team0): Releasing backup interface [ 2128.276840][T15854] bridge0: port 1(team0) entered blocking state [ 2128.289486][T15854] bridge0: port 1(team0) entered disabled state [ 2128.351808][T15862] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 2128.404873][T15862] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 2128.425541][T15861] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 2128.445744][T15861] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 2128.755766][T15881] netlink: 201392 bytes leftover after parsing attributes in process `syz.5.13690'. [ 2128.782327][T15881] netlink: 208188 bytes leftover after parsing attributes in process `syz.5.13690'. [ 2128.930733][T15885] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2128.957336][T15885] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2128.994830][T15885] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2129.002469][T15885] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2129.077784][T15894] netlink: 'syz.5.13691': attribute type 4 has an invalid length. [ 2129.385700][T15906] __nla_validate_parse: 1 callbacks suppressed [ 2129.385719][T15906] netlink: 65047 bytes leftover after parsing attributes in process `syz.5.13699'. [ 2130.196857][T15927] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 2130.203346][T15927] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 2130.621580][T15934] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2130.650473][T15934] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2130.668245][T15934] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2130.684497][T15934] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2131.237237][T15952] FAULT_INJECTION: forcing a failure. [ 2131.237237][T15952] name failslab, interval 1, probability 0, space 0, times 0 [ 2131.263215][T15952] CPU: 0 PID: 15952 Comm: syz.4.13716 Not tainted syzkaller #0 [ 2131.270809][T15952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2131.280882][T15952] Call Trace: [ 2131.284173][T15952] [ 2131.287113][T15952] dump_stack_lvl+0x188/0x250 [ 2131.291806][T15952] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2131.297977][T15952] ? show_regs_print_info+0x20/0x20 [ 2131.303190][T15952] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2131.309364][T15952] ? dump_stack+0x5/0x20 [ 2131.313625][T15952] should_fail+0x38c/0x4c0 [ 2131.318062][T15952] should_failslab+0x5/0x20 [ 2131.322575][T15952] slab_pre_alloc_hook+0x51/0xc0 [ 2131.327528][T15952] __kmalloc_node_track_caller+0x68/0x3a0 [ 2131.333258][T15952] ? netlink_sendmsg+0x654/0xbe0 [ 2131.338206][T15952] ? kmem_cache_alloc_node+0x162/0x2d0 [ 2131.343671][T15952] ? __alloc_skb+0xf4/0x750 [ 2131.348181][T15952] ? netlink_sendmsg+0x654/0xbe0 [ 2131.353125][T15952] __alloc_skb+0x22c/0x750 [ 2131.357556][T15952] netlink_sendmsg+0x654/0xbe0 [ 2131.362330][T15952] ? netlink_getsockopt+0x570/0x570 [ 2131.367530][T15952] ? __sanitizer_cov_trace_pc+0x4/0x60 [ 2131.372996][T15952] ? aa_sock_msg_perm+0x94/0x150 [ 2131.377939][T15952] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 2131.383227][T15952] ? security_socket_sendmsg+0x7c/0xa0 [ 2131.388684][T15952] ? netlink_getsockopt+0x570/0x570 [ 2131.393882][T15952] ____sys_sendmsg+0x5b7/0x8f0 [ 2131.398655][T15952] ? __sys_sendmsg_sock+0x30/0x30 [ 2131.403685][T15952] ? import_iovec+0x6f/0xa0 [ 2131.408195][T15952] ___sys_sendmsg+0x236/0x2e0 [ 2131.412879][T15952] ? __sys_sendmsg+0x2a0/0x2a0 [ 2131.417710][T15952] __se_sys_sendmsg+0x1af/0x290 [ 2131.422561][T15952] ? __x64_sys_sendmsg+0x80/0x80 [ 2131.427508][T15952] ? syscall_enter_from_user_mode+0x2a/0x70 [ 2131.433403][T15952] do_syscall_64+0x4c/0xa0 [ 2131.437814][T15952] ? clear_bhb_loop+0x30/0x80 [ 2131.442488][T15952] ? clear_bhb_loop+0x30/0x80 [ 2131.447163][T15952] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2131.453050][T15952] RIP: 0033:0x7fb74efb9f79 [ 2131.457466][T15952] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2131.477077][T15952] RSP: 002b:00007fb74d214028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2131.485490][T15952] RAX: ffffffffffffffda RBX: 00007fb74f233fa0 RCX: 00007fb74efb9f79 [ 2131.493462][T15952] RDX: 0000000000040000 RSI: 0000200000000040 RDI: 0000000000000008 [ 2131.501436][T15952] RBP: 00007fb74d214090 R08: 0000000000000000 R09: 0000000000000000 [ 2131.509409][T15952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2131.517371][T15952] R13: 00007fb74f234038 R14: 00007fb74f233fa0 R15: 00007ffd35c5b1b8 [ 2131.525351][T15952] [ 2131.722885][T16129] Bluetooth: hci3: command 0x0406 tx timeout [ 2131.770603][T15961] FAULT_INJECTION: forcing a failure. [ 2131.770603][T15961] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2131.813189][T15961] CPU: 0 PID: 15961 Comm: syz.4.13719 Not tainted syzkaller #0 [ 2131.820788][T15961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2131.830863][T15961] Call Trace: [ 2131.834159][T15961] [ 2131.837102][T15961] dump_stack_lvl+0x188/0x250 [ 2131.841806][T15961] ? show_regs_print_info+0x20/0x20 [ 2131.847022][T15961] ? load_image+0x400/0x400 [ 2131.851547][T15961] ? __lock_acquire+0x7d10/0x7d10 [ 2131.856613][T15961] should_fail+0x38c/0x4c0 [ 2131.861055][T15961] _copy_from_user+0x2e/0x170 [ 2131.865756][T15961] __copy_msghdr_from_user+0xc9/0x630 [ 2131.871155][T15961] ? verify_lock_unused+0x140/0x140 [ 2131.876390][T15961] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 2131.881735][T15961] ___sys_sendmsg+0x19a/0x2e0 [ 2131.886452][T15961] ? __sys_sendmsg+0x2a0/0x2a0 [ 2131.891255][T15961] ? trace_event_raw_event_lock+0x270/0x270 [ 2131.897167][T15961] ? vfs_write+0x8b2/0xd60 [ 2131.901631][T15961] __se_sys_sendmsg+0x1af/0x290 [ 2131.906499][T15961] ? __x64_sys_sendmsg+0x80/0x80 [ 2131.911445][T15961] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2131.917463][T15961] ? lockdep_hardirqs_on+0x94/0x140 [ 2131.922683][T15961] do_syscall_64+0x4c/0xa0 [ 2131.927112][T15961] ? clear_bhb_loop+0x30/0x80 [ 2131.931805][T15961] ? clear_bhb_loop+0x30/0x80 [ 2131.936498][T15961] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2131.942400][T15961] RIP: 0033:0x7fb74efb9f79 [ 2131.946830][T15961] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2131.966445][T15961] RSP: 002b:00007fb74d214028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2131.974883][T15961] RAX: ffffffffffffffda RBX: 00007fb74f233fa0 RCX: 00007fb74efb9f79 [ 2131.982871][T15961] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000004 [ 2131.990851][T15961] RBP: 00007fb74d214090 R08: 0000000000000000 R09: 0000000000000000 [ 2131.998829][T15961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2132.006810][T15961] R13: 00007fb74f234038 R14: 00007fb74f233fa0 R15: 00007ffd35c5b1b8 [ 2132.014821][T15961] [ 2132.829481][T15976] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.13727'. [ 2133.024851][T15982] device syzkaller0 entered promiscuous mode [ 2133.127937][T15983] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2133.233575][T15983] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2133.293537][T15983] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2133.419251][T15983] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2133.558930][T15983] batman_adv: batadv0: Interface deactivated: virt_wifi0 [ 2133.596891][T15983] batman_adv: batadv0: Removing interface: virt_wifi0 [ 2134.216499][T16004] netlink: 'syz.7.13735': attribute type 10 has an invalid length. [ 2134.318390][T16004] netlink: 40 bytes leftover after parsing attributes in process `syz.7.13735'. [ 2134.330994][T16004] device team0 entered promiscuous mode [ 2134.402711][T16004] device team_slave_0 entered promiscuous mode [ 2134.453137][T16004] device team_slave_1 entered promiscuous mode [ 2134.476323][T16004] 8021q: adding VLAN 0 to HW filter on device team0 [ 2134.537601][T16004] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 2134.622116][T16015] netlink: 164 bytes leftover after parsing attributes in process `syz.6.13741'. [ 2134.664215][T16026] netlink: set zone limit has 8 unknown bytes [ 2134.666632][T16017] netlink: 164 bytes leftover after parsing attributes in process `syz.6.13741'. [ 2134.712560][T16024] can: request_module (can-proto-0) failed. [ 2138.391777][T16056] netlink: 'syz.4.13753': attribute type 10 has an invalid length. [ 2138.411786][T16056] netlink: 40 bytes leftover after parsing attributes in process `syz.4.13753'. [ 2138.441469][T16056] 8021q: adding VLAN 0 to HW filter on device team0 [ 2138.454438][T16056] bond0: (slave team0): Releasing backup interface [ 2138.496660][T16056] bridge0: port 3(team0) entered blocking state [ 2138.505346][T16056] bridge0: port 3(team0) entered disabled state [ 2138.752044][T16073] netlink: 'syz.4.13759': attribute type 21 has an invalid length. [ 2139.291772][T16087] FAULT_INJECTION: forcing a failure. [ 2139.291772][T16087] name failslab, interval 1, probability 0, space 0, times 0 [ 2139.351353][T16087] CPU: 0 PID: 16087 Comm: syz.4.13763 Not tainted syzkaller #0 [ 2139.358951][T16087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2139.369014][T16087] Call Trace: [ 2139.372294][T16087] [ 2139.375227][T16087] dump_stack_lvl+0x188/0x250 [ 2139.379920][T16087] ? show_regs_print_info+0x20/0x20 [ 2139.385120][T16087] ? load_image+0x400/0x400 [ 2139.389636][T16087] ? __lock_acquire+0x7d10/0x7d10 [ 2139.394668][T16087] should_fail+0x38c/0x4c0 [ 2139.399117][T16087] should_failslab+0x5/0x20 [ 2139.403619][T16087] slab_pre_alloc_hook+0x51/0xc0 [ 2139.408562][T16087] __kmalloc+0x6b/0x330 [ 2139.412719][T16087] ? genl_family_rcv_msg_attrs_parse+0xa3/0x290 [ 2139.418967][T16087] genl_family_rcv_msg_attrs_parse+0xa3/0x290 [ 2139.425040][T16087] genl_start+0x2b2/0x4a0 [ 2139.429377][T16087] __netlink_dump_start+0x3e8/0x700 [ 2139.434588][T16087] genl_rcv_msg+0xa1d/0xf90 [ 2139.439113][T16087] ? genl_bind+0x380/0x380 [ 2139.443551][T16087] ? genl_rcv_msg+0xf90/0xf90 [ 2139.448222][T16087] ? genl_start+0x4a0/0x4a0 [ 2139.452719][T16087] ? genl_lock_dumpit+0x90/0x90 [ 2139.457575][T16087] ? perf_trace_lock+0xe4/0x390 [ 2139.462427][T16087] ? smc_clc_prfx_set4_rcu+0x490/0x490 [ 2139.467899][T16087] netlink_rcv_skb+0x1f5/0x440 [ 2139.472661][T16087] ? genl_bind+0x380/0x380 [ 2139.477076][T16087] ? netlink_ack+0xb50/0xb50 [ 2139.481669][T16087] ? __lock_acquire+0x7d10/0x7d10 [ 2139.486706][T16087] ? down_read+0x1aa/0x2e0 [ 2139.491126][T16087] genl_rcv+0x24/0x40 [ 2139.495102][T16087] netlink_unicast+0x774/0x920 [ 2139.499876][T16087] netlink_sendmsg+0x8ba/0xbe0 [ 2139.504645][T16087] ? netlink_getsockopt+0x570/0x570 [ 2139.509857][T16087] ? aa_sock_msg_perm+0x94/0x150 [ 2139.514815][T16087] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 2139.520110][T16087] ? security_socket_sendmsg+0x7c/0xa0 [ 2139.525576][T16087] ? netlink_getsockopt+0x570/0x570 [ 2139.530784][T16087] ____sys_sendmsg+0x5b7/0x8f0 [ 2139.535578][T16087] ? __sys_sendmsg_sock+0x30/0x30 [ 2139.540639][T16087] ? import_iovec+0x6f/0xa0 [ 2139.545165][T16087] ___sys_sendmsg+0x236/0x2e0 [ 2139.549994][T16087] ? __sys_sendmsg+0x2a0/0x2a0 [ 2139.554780][T16087] ? trace_event_raw_event_lock+0x270/0x270 [ 2139.560671][T16087] ? vfs_write+0x8b2/0xd60 [ 2139.565105][T16087] __se_sys_sendmsg+0x1af/0x290 [ 2139.569961][T16087] ? __x64_sys_sendmsg+0x80/0x80 [ 2139.574901][T16087] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2139.580900][T16087] ? lockdep_hardirqs_on+0x94/0x140 [ 2139.586096][T16087] do_syscall_64+0x4c/0xa0 [ 2139.590504][T16087] ? clear_bhb_loop+0x30/0x80 [ 2139.595172][T16087] ? clear_bhb_loop+0x30/0x80 [ 2139.599848][T16087] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2139.605743][T16087] RIP: 0033:0x7fb74efb9f79 [ 2139.610156][T16087] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2139.629756][T16087] RSP: 002b:00007fb74d214028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2139.638157][T16087] RAX: ffffffffffffffda RBX: 00007fb74f233fa0 RCX: 00007fb74efb9f79 [ 2139.646120][T16087] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 2139.654076][T16087] RBP: 00007fb74d214090 R08: 0000000000000000 R09: 0000000000000000 [ 2139.662038][T16087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2139.670000][T16087] R13: 00007fb74f234038 R14: 00007fb74f233fa0 R15: 00007ffd35c5b1b8 [ 2139.678006][T16087] [ 2139.750790][T16096] netlink: 'syz.5.13766': attribute type 10 has an invalid length. [ 2139.759667][T16096] netlink: 40 bytes leftover after parsing attributes in process `syz.5.13766'. [ 2139.777092][T16096] device team0 entered promiscuous mode [ 2139.784204][T16096] device team_slave_0 entered promiscuous mode [ 2139.791992][T16096] device team_slave_1 entered promiscuous mode [ 2139.804554][T16096] device geneve1 entered promiscuous mode [ 2139.815202][T16096] 8021q: adding VLAN 0 to HW filter on device team0 [ 2139.824336][T16096] bridge0: port 1(team0) entered blocking state [ 2139.832069][T16096] bridge0: port 1(team0) entered disabled state [ 2139.846096][T16096] bridge0: port 1(team0) entered blocking state [ 2139.852587][T16096] bridge0: port 1(team0) entered forwarding state [ 2140.073922][T16099] syz.4.13767[16099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2140.074068][T16099] syz.4.13767[16099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2140.939141][T16109] netlink: 55631 bytes leftover after parsing attributes in process `syz.4.13771'. [ 2141.841458][T16142] FAULT_INJECTION: forcing a failure. [ 2141.841458][T16142] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2141.936653][T16142] CPU: 0 PID: 16142 Comm: syz.6.13784 Not tainted syzkaller #0 [ 2141.944244][T16142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 2141.954312][T16142] Call Trace: [ 2141.957598][T16142] [ 2141.960530][T16142] dump_stack_lvl+0x188/0x250 [ 2141.965220][T16142] ? show_regs_print_info+0x20/0x20 [ 2141.970429][T16142] ? load_image+0x400/0x400 [ 2141.974944][T16142] ? __lock_acquire+0x7d10/0x7d10 [ 2141.979998][T16142] should_fail+0x38c/0x4c0 [ 2141.984427][T16142] strncpy_from_user+0x32/0x360 [ 2141.989291][T16142] getname_flags+0xef/0x500 [ 2141.993804][T16142] do_sys_openat2+0xdd/0x4b0 [ 2141.998401][T16142] ? perf_trace_preemptirq_template+0x2aa/0x360 [ 2142.004652][T16142] ? rcu_nmi_exit+0x6f/0xf0 [ 2142.009162][T16142] ? do_sys_open+0xe0/0xe0 [ 2142.013584][T16142] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2142.019576][T16142] ? lock_chain_count+0x20/0x20 [ 2142.024437][T16142] ? vtime_user_exit+0x2c8/0x3e0 [ 2142.029386][T16142] __x64_sys_openat+0x135/0x160 [ 2142.034250][T16142] do_syscall_64+0x4c/0xa0 [ 2142.038668][T16142] ? clear_bhb_loop+0x30/0x80 [ 2142.043347][T16142] ? clear_bhb_loop+0x30/0x80 [ 2142.048032][T16142] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2142.053933][T16142] RIP: 0033:0x7f45a5cbef79 [ 2142.058354][T16142] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2142.077969][T16142] RSP: 002b:00007f45a3f19028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2142.086401][T16142] RAX: ffffffffffffffda RBX: 00007f45a5f38fa0 RCX: 00007f45a5cbef79 [ 2142.094388][T16142] RDX: 0000000000200002 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 2142.102376][T16142] RBP: 00007f45a3f19090 R08: 0000000000000000 R09: 0000000000000000 [ 2142.110355][T16142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2142.118339][T16142] R13: 00007f45a5f39038 R14: 00007f45a5f38fa0 R15: 00007ffee1c355e8 [ 2142.126341][T16142] [ 2143.391708][T16156] device syzkaller0 entered promiscuous mode [ 2143.765969][T16186] netlink: 'syz.4.13796': attribute type 10 has an invalid length. [ 2143.793042][T16188] netlink: 'syz.4.13796': attribute type 10 has an invalid length. [ 2143.868033][T16192] netlink: 4 bytes leftover after parsing attributes in process `syz.5.13797'. [ 2143.950446][T16196] netlink: 'syz.5.13799': attribute type 8 has an invalid length. [ 2143.958792][T16196] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.13799'. [ 2143.971318][T16196] netlink: 65039 bytes leftover after parsing attributes in process `syz.5.13799'. [ 2144.014196][T16176] chnl_net:caif_netlink_parms(): no params data found [ 2144.135888][T16176] bridge0: port 1(bridge_slave_0) entered blocking state [ 2144.156645][T16176] bridge0: port 1(bridge_slave_0) entered disabled state [ 2144.169047][T16176] device bridge_slave_0 entered promiscuous mode [ 2144.196027][T16176] bridge0: port 2(bridge_slave_1) entered blocking state [ 2144.216533][T16176] bridge0: port 2(bridge_slave_1) entered disabled state [ 2144.230536][T16176] device bridge_slave_1 entered promiscuous mode [ 2144.279134][T16176] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2144.296268][T16176] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2144.334718][T16176] team0: Port device team_slave_0 added [ 2144.344543][T16176] team0: Port device team_slave_1 added [ 2144.368925][T16176] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2144.376289][T16176] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2144.403584][T16176] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2144.417154][T16176] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2144.426446][T16176] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2144.464252][T16176] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2144.537048][T16176] device hsr_slave_0 entered promiscuous mode [ 2144.543999][T16211] netlink: 192436 bytes leftover after parsing attributes in process `syz.6.13802'. [ 2144.554806][T16176] device hsr_slave_1 entered promiscuous mode [ 2144.561641][T16211] openvswitch: netlink: IP tunnel attribute has 20480 unknown bytes. [ 2144.778156][T16176] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 2144.812135][T16176] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 2144.825430][T16176] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 2144.837584][T16176] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 2145.002534][T16176] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2145.038715][T13178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2145.054656][T13178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2145.087888][T16176] 8021q: adding VLAN 0 to HW filter on device team0 [ 2145.203633][ T1252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2145.223309][ T1252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2145.231865][ T1252] bridge0: port 1(bridge_slave_0) entered blocking state [ 2145.238996][ T1252] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2145.253647][ T1252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2145.261929][ T1252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2145.271620][ T1252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2145.281057][ T1252] bridge0: port 2(bridge_slave_1) entered blocking state [ 2145.288174][ T1252] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2145.299842][ T1252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2145.329688][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2145.364185][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2145.380160][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2145.389042][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2145.402308][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2145.412147][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2145.413295][ T4173] Bluetooth: hci4: command 0x0409 tx timeout [ 2145.427350][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2145.437507][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2145.448647][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2145.458583][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2145.472356][T16176] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2145.627004][ T1252] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2145.635766][ T1252] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2145.654523][T16176] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2145.891784][ T1252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2145.901221][ T1252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2145.929549][ T1252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2145.940056][ T1252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2145.953536][T16176] device veth0_vlan entered promiscuous mode [ 2145.970557][ T1252] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2145.981799][ T1252] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2146.005948][T16176] device veth1_vlan entered promiscuous mode [ 2146.041219][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2146.050760][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2146.060031][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2146.069197][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2146.082756][T16176] device veth0_macvtap entered promiscuous mode [ 2146.099970][T16176] device veth1_macvtap entered promiscuous mode [ 2146.129019][T16176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2146.152937][T16176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2146.174299][T16176] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2146.182124][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2146.193298][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2146.206829][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2146.216788][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2146.231946][T16176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2146.242838][T16176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2146.252697][T16176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2146.269498][T16176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2146.280798][T16176] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2146.296293][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2146.309248][ T3628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2146.320522][T16176] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2146.333733][T16176] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2146.342439][T16176] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2146.354064][T16176] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2146.441129][ T3650] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2146.459665][ T3650] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2146.470755][T13178] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2146.492360][T13178] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2146.506071][T13178] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2146.516325][ T3650] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2147.493905][ T4173] Bluetooth: hci4: command 0x041b tx timeout [ 2149.563056][ T1385] Bluetooth: hci4: command 0x040f tx timeout [ 2149.627917][T15852] bond0: (slave syz_tun): Releasing backup interface [ 2151.643157][ T1385] Bluetooth: hci4: command 0x0419 tx timeout [ 2160.375290][ T1421] ieee802154 phy0 wpan0: encryption failed: -22 [ 2160.381590][ T1421] ieee802154 phy1 wpan1: encryption failed: -22 [ 2191.112611][T13178] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2191.177712][T13178] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2191.239189][T13178] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2191.277741][T13178] bond0: (slave netdevsim0): Releasing backup interface [ 2191.285100][T13178] device netdevsim0 left promiscuous mode [ 2191.291698][T13178] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2192.160512][T13178] device batadv0 left promiscuous mode [ 2192.166813][T13178] : port 1(batadv0) entered disabled state [ 2192.180268][T13178] device hsr_slave_0 left promiscuous mode [ 2192.186852][T13178] device hsr_slave_1 left promiscuous mode [ 2192.193936][T13178] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2192.201419][T13178] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2192.210160][T13178] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2192.217955][T13178] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2192.226453][T13178] batman_adv: batadv0: Interface deactivated: hsr_slave_1 [ 2192.234037][T13178] batman_adv: batadv0: Removing interface: hsr_slave_1 [ 2192.241654][T13178] batman_adv: batadv0: Interface deactivated: virt_wifi0 [ 2192.249351][T13178] batman_adv: batadv0: Removing interface: virt_wifi0 [ 2192.257313][T13178] bridge0: port 1(team0) entered disabled state [ 2192.269308][T13178] device veth1_macvtap left promiscuous mode [ 2192.275456][T13178] device veth0_macvtap left promiscuous mode [ 2192.281575][T13178] device veth1_vlan left promiscuous mode [ 2192.290527][T13178] device veth0_vlan left promiscuous mode [ 2192.483877][T13178] device team_slave_1 left promiscuous mode [ 2192.492294][T13178] team0 (unregistering): Port device team_slave_1 removed [ 2192.505009][T13178] device team_slave_0 left promiscuous mode [ 2192.511589][T13178] team0 (unregistering): Port device team_slave_0 removed [ 2192.525809][T13178] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2192.537348][T13178] device bond_slave_1 left promiscuous mode [ 2192.548157][T13178] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2192.557027][T13178] device bond_slave_0 left promiscuous mode [ 2192.569367][T13178] bond0 (unregistering): (slave bridge_slave_1): Releasing backup interface [ 2192.579228][T13178] device bridge_slave_1 left promiscuous mode [ 2192.618731][T13178] bond0 (unregistering): Released all slaves [ 2221.814984][ T1421] ieee802154 phy0 wpan0: encryption failed: -22 [ 2221.821290][ T1421] ieee802154 phy1 wpan1: encryption failed: -22 [ 2269.962824][T15035] Bluetooth: hci4: command 0x0406 tx timeout [ 2283.246527][ T1421] ieee802154 phy0 wpan0: encryption failed: -22 [ 2283.252873][ T1421] ieee802154 phy1 wpan1: encryption failed: -22 [ 2344.694679][ T1421] ieee802154 phy0 wpan0: encryption failed: -22 [ 2344.700973][ T1421] ieee802154 phy1 wpan1: encryption failed: -22 [ 2406.125855][ T1421] ieee802154 phy0 wpan0: encryption failed: -22 [ 2406.132136][ T1421] ieee802154 phy1 wpan1: encryption failed: -22