last executing test programs: 38m34.7555888s ago: executing program 2 (id=2953): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x20702, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) write$cgroup_pid(r0, &(0x7f00000005c0), 0x12) 38m32.460797869s ago: executing program 2 (id=2957): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000340)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r5}, &(0x7f0000000280), &(0x7f0000000240)=r2}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r6, 0x4) sendmsg$inet(r4, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 38m32.289754555s ago: executing program 2 (id=2959): bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2a, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$MAP_CREATE(0x0, 0x0, 0x37) 38m32.014839634s ago: executing program 2 (id=2961): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) close(0x3) 38m29.51204022s ago: executing program 2 (id=2966): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x1c1440, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454ce, 0x12) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) 38m27.779776239s ago: executing program 2 (id=2967): ioctl$TUNGETVNETBE(0xffffffffffffffff, 0x800454df, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x400, 0x2000001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000200)={0x0, 0x0}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r2, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r3, r1, 0x0, r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8983, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x89}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 38m11.640981051s ago: executing program 32 (id=2967): ioctl$TUNGETVNETBE(0xffffffffffffffff, 0x800454df, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x400, 0x2000001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000200)={0x0, 0x0}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r2, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r3, r1, 0x0, r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8983, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x89}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 37m49.979885532s ago: executing program 0 (id=3054): r0 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4430, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x4020, 0x0, 0x0, 0x5, 0x800}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="611230000000000061134c0000000000bf2000000000000015000500511b48013d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702000003000000360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586162c17600674290ca9d8d6413b8199e34f67ceaaa78710f9f8aba4765c91382f497585ca39c595b21afa6bce62b5ab0d44e9c32ad6f0349d92962a58d39494a19a9183362382792ac85578d3de07b7e155cf4ee5e3dd51212d2831bd8e2655b2fbd88791e4c66c832a774919b28b8a62711f0f156e636804e1d3f44a5ff3d63a3a51f0c7ec0c8c25e072194ddd83aa155a537e15c0d91f502deef03f83e826718705c9aef9613ac4a325a428d147c1749196e94226671fd9573ab0d079d44b13b56f793e98ab571c58e98e022f18a3be3f318e0690fff93f44f22473dc8004fc758218349bd3f0516a72a7ea913bfa7603063ed3118b2d680cbc"], &(0x7f0000000100)='GPL\x00'}, 0x48) 37m48.593190969s ago: executing program 0 (id=3057): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x86}}]}, 0x0, 0x3, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3}, &(0x7f0000000280), &(0x7f0000000240)=r0}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$inet(r2, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000000c0)=r7, 0x4) sendmsg$inet(r6, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 37m48.256355081s ago: executing program 0 (id=3058): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x4, 0x18, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000bf91000000000000b7020000000000008500000085000000b70000000000000095000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 37m46.954778785s ago: executing program 0 (id=3059): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) close(0x3) 37m41.801580182s ago: executing program 0 (id=3068): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x4, 0x18, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000bf91000000000000b7020000000000008500000085000000b70000000000000095000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 37m41.459541473s ago: executing program 0 (id=3069): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41040, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffcfe6}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="180100000000000000000003000000"], 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x11, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18070000000000000000000000000000dc000000400000009500000000000000cd57d5b164befe393683e6f51e68818977787e28b47f0caa1495759b9be394e1538418db7bc3995022c94742141ed83a7a5c26615e61eab3381b33f4f38062d3ed9ee05f8a61cc845a8de56d8e58c45f0039c68e0e12a4ffb4e5af000000000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5}, 0x80) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x403, 0x22a0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x7}, 0x0, 0xffffffffffffffff, r1, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000ffff", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8923, &(0x7f00000000c0)={'bond_slave_0\x00', @random="0131014010ff"}) close(r3) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) close(0xffffffffffffffff) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x3}, @ptr, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x52}, 0x20) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000010340)=@base={0x18, 0x4, 0x3399, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, r6, 0x4002, 0x5}, 0x50) r7 = syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)="2fd0ff0006094f492faff2f173e1ac871d48eef87bb90a19da77ed4bb5ae2e86f7b0cf112203043f022f05c93af58dc47d13e4ed9d9426f7db4e53422cbc58b6b2e48d2a7570b19a5bdcde") r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x2, 0x19a, &(0x7f0000014000)=""/4095, 0x0, 0x0, '\x00', 0x0, @fallback, r8, 0x14, &(0x7f0000000000), 0x1, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x5, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYRES64=r2], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) r9 = perf_event_open$cgroup(&(0x7f0000000400)={0x3, 0x80, 0x7, 0x10, 0xd, 0x2c, 0x0, 0x1, 0x0, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000240), 0xb}, 0x2000, 0x7, 0x7, 0x9, 0x0, 0x7, 0x4, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x95, 0x8, 0xb, 0x3, 0x0, 0xd7, 0x20040, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x1, 0x922a}, 0x109012, 0x6, 0x4, 0x2, 0x6, 0x2, 0x257, 0x0, 0x80000000, 0x0, 0x5}, r7, 0xd, r9, 0x0) 37m28.889837283s ago: executing program 3 (id=3092): r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x94021, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa16ae, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x8}, 0x90, 0xa4, 0x2, 0x1, 0xa1, 0x9b9b, 0x8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, r0, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1122}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x7, 0x9, 0x7, 0x9, 0x0, 0x4, 0x10, 0x9, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x5, 0x7}, 0x8800, 0x6, 0x8000, 0x9, 0x1ff, 0x7, 0x1000, 0x0, 0x3, 0x0, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) syz_clone(0x8001000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f00000000c0), 0x12) write$cgroup_int(r7, &(0x7f0000000100)=0x1, 0x12) write$cgroup_int(r5, &(0x7f00000000c0), 0x12) 37m25.966240794s ago: executing program 33 (id=3069): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41040, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffcfe6}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="180100000000000000000003000000"], 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x11, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18070000000000000000000000000000dc000000400000009500000000000000cd57d5b164befe393683e6f51e68818977787e28b47f0caa1495759b9be394e1538418db7bc3995022c94742141ed83a7a5c26615e61eab3381b33f4f38062d3ed9ee05f8a61cc845a8de56d8e58c45f0039c68e0e12a4ffb4e5af000000000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5}, 0x80) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x403, 0x22a0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x7}, 0x0, 0xffffffffffffffff, r1, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000ffff", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8923, &(0x7f00000000c0)={'bond_slave_0\x00', @random="0131014010ff"}) close(r3) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) close(0xffffffffffffffff) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x3}, @ptr, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x52}, 0x20) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000010340)=@base={0x18, 0x4, 0x3399, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, r6, 0x4002, 0x5}, 0x50) r7 = syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)="2fd0ff0006094f492faff2f173e1ac871d48eef87bb90a19da77ed4bb5ae2e86f7b0cf112203043f022f05c93af58dc47d13e4ed9d9426f7db4e53422cbc58b6b2e48d2a7570b19a5bdcde") r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x2, 0x19a, &(0x7f0000014000)=""/4095, 0x0, 0x0, '\x00', 0x0, @fallback, r8, 0x14, &(0x7f0000000000), 0x1, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x5, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYRES64=r2], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) r9 = perf_event_open$cgroup(&(0x7f0000000400)={0x3, 0x80, 0x7, 0x10, 0xd, 0x2c, 0x0, 0x1, 0x0, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000240), 0xb}, 0x2000, 0x7, 0x7, 0x9, 0x0, 0x7, 0x4, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x95, 0x8, 0xb, 0x3, 0x0, 0xd7, 0x20040, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x1, 0x922a}, 0x109012, 0x6, 0x4, 0x2, 0x6, 0x2, 0x257, 0x0, 0x80000000, 0x0, 0x5}, r7, 0xd, r9, 0x0) 37m22.199256803s ago: executing program 3 (id=3096): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x4, 0x18, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000bf91000000000000b7020000000000008500000085000000b70000000000000095000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 37m21.750670558s ago: executing program 3 (id=3099): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001", @ANYRES32=0x0, @ANYRES32], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r6}, &(0x7f0000000280), &(0x7f0000000240)=r3}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000000c0)=r7, 0x4) sendmsg$inet(r5, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 37m21.39621063s ago: executing program 3 (id=3100): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2a, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$MAP_CREATE(0x0, 0x0, 0x37) 37m20.889716307s ago: executing program 3 (id=3101): bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x3}, 0x10010, 0x2c2b, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0xfffffffffffffdf5, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x2000000, 0xe, 0x0, &(0x7f00000004c0)="630b008646dc3f0adf33c9f7b986", 0x0, 0x81ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x38) 37m20.399823914s ago: executing program 3 (id=3103): r0 = perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000340)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x9}, @map_fd={0x18, 0xb, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0xfffffffb, 0xb, &(0x7f0000000240)=""/11, 0x1e00, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x8, 0x81, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], 0x0, 0x10, 0xdc}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'batadv_slave_0\x00', 0x1}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8924, &(0x7f0000000080)) 37m5.000792261s ago: executing program 34 (id=3103): r0 = perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000340)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x9}, @map_fd={0x18, 0xb, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0xfffffffb, 0xb, &(0x7f0000000240)=""/11, 0x1e00, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x8, 0x81, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1], 0x0, 0x10, 0xdc}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'batadv_slave_0\x00', 0x1}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8924, &(0x7f0000000080)) 10.927875114s ago: executing program 6 (id=15428): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1007f}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa33"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000000000"], 0xfdef) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x5, 0x47, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 10.16465148s ago: executing program 6 (id=15434): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x4}, 0x0, 0x0, 0x0, 0x8, 0x2, 0xfffffffc}, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x8200, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000f40)={&(0x7f0000000c40)="b6ff94fe2bcd15a6c0f19407c3f50e91757f3e8cd9c24bebcc5c43d859a5b042c85d06762e1f20a631f6570d196b852109d9b2e9fed7cec52a84492f37e38942fcfd9a16162b7561355a21bcce7081e93d", &(0x7f0000000cc0)=""/206, &(0x7f0000000bc0)="535d87780f75df9840b5616af08a6aaca03a32bf61631192bd", &(0x7f0000000dc0)="366ab030c2790687e49afa4af3e88bf2b3769c0ba9f16c631bd195581f21641b3c804a0711b162e06e8c439cbf7d03fcaeecc84dadc28d25b1bce62d7c485330468242b9ad03f6a5a9c3d8d7e87d36e6699909372d461d50d8cd7c29071b1d931253b0275eb2d7e8f48ece491a89fc2f49072e641c13adf6bebbc047a2e21b64a13728f2ff0cd21c68173319a397b2d6ecb821b47772b2e33742e6a1e6e9b4c512651d7cc2956d7fb554c53cb1df3dc2153133f20ae30303792c0dbc", 0x1, 0xffffffffffffffff, 0x4}, 0x38) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x2, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) sendmsg(r4, &(0x7f0000003680)={0x0, 0x0, &(0x7f0000003140)=[{&(0x7f0000002d80)="0f", 0x1}, {0x0, 0x2}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x4d}, {0x0}], 0x9}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="9feb010018000000000000001000000010000000040000000200000000000000000000000000000000006100cf97770400000000000000baf71b679c73a0f7a2b4155d87b32dae3a9135d6f215e9a50da0a1f488082070eb792d2950bb373e7f1394532687436650ae5434b39b311bbe520fa6882447bf6a0999688badad0f4d77bdb635e393dfae5f9830e6448a07a4419684ff5f576faf8d990e6d95bf1990b425f60f71d360538e62619652b6bfab9b561ea45f80d9"], 0x0, 0x2c}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f00000003c0)="e097566f5bec64466cf0925782dd", 0x0, 0x8c9, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x420051, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0xc, 0x2}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e23, 0x0, @local}, 0x80, 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="c805"], 0x5c8}, 0xf7e5) write$cgroup_subtree(r5, 0x0, 0xfdef) socket$kcm(0x2b, 0x1, 0x0) r6 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r6, 0x29, 0x3e, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000b40)=ANY=[@ANYBLOB="b400000000000001691000000000000095000000000000000000000000000000b9bdfa5eeba0834e931b37e8b1ffe52a343365a2c84c08cb04f121faa6fe46c8ad3ecd92f8de5f9145acb307f12d0371e281037021b157acfa262a927ee13ede7de9f3db3611"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="17000000000000000400", @ANYRES8=r3, @ANYRESOCT=r7, @ANYRES32=r3, @ANYBLOB="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", @ANYRESDEC=r2], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21bef5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9b24be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6eab1aa7d55545a34effa077faa56d59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e59a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d0faab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0480f94306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad9433269af3be5fa6a9a5c24e392955f4e979ea13201bafe4f0f6ea508000000a0c548552b571bed5647223c78a992810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ede62fc28839b5301160ecec37e83efceefd7ca2533659edc8be05cc85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d35a142a9ec9a7a3755e0f209150a07682c4e14e3a835701bea8240399c56ce8f58df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b262341c5e093fd66a2946501559335781092cf8ce3c7c56cd31121624d76517fd3666276c3c0e812b28e2f30d035cee5d0e77a3c70008ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856cf24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31651e0ecea5ece8fb11a4ee288eb149f1fa33669cc8d901fa8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463baf28345bde0c195bc9f021da8f3025ee9c8e3168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262fa3f1dabeb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a4601adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cc50feeb7bfad9b7be3283b6450d014e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5671820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff2418a18217747ae442e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427a7f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d17eb0000000000000000000000fa08ad0731c4b839688b22c4da2a6b00008a1949a6ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282bffff2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae05334d5a44a020000001c0d882a564d74a7c72bf9a2152b261e58fea6d2f93589cfe261dc0410b5ccc92a5a0eab327a33431d62d2b7c75ce654d556c9e1817c1abca762ab53d40da51560351b673363652e1ecb56cfe4a746a45ab13c6014e9f361ab687d1cd1795ce9e05c817b83d76046bdb3709de5df7499a02d2f636a454b85b987580ada025d83bd7b8df28a540d5ec5537942e79f2f1ab25ea5f563bc77e4f9468bd309469880c7e34150ca886d1f9ac2f7e82dbe296c877d925c38c54cc8137b29028854b6bd57ca893927c331300e16aba792289e135589d93302fc37c73c303e383cdf8ef3f6d6265fe5ee01759d24027475c8901039a898582022bc"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r8) socketpair(0x3, 0x1, 0x4000000, &(0x7f0000000180)) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x803, 0x0) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90924fc60040011000a7403004700000037153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02002200356bd25a806f8c6394f91124fc60040011000a7403004800000037153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 8.832599647s ago: executing program 6 (id=15443): r0 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000005c0)=r0, 0x12) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x6, 0x4, 0x8, 0x3, 0x0, 0x3, 0x824a0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000100)}, 0x4, 0x5, 0x53e, 0x8, 0xfffffffffffffbff, 0x7, 0x5, 0x0, 0x400, 0x0, 0x1000}, r0, 0x10, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x4}, 0x108102, 0xac5d, 0xffffffff, 0x0, 0x51, 0x0, 0x0, 0x0, 0x4000}, r0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x1e) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x4, 0x80090, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffff7, 0x5}, 0x5000, 0xb44, 0x400000, 0x0, 0x9, 0xa, 0x0, 0x0, 0x2, 0x0, 0x26b0}, 0xffffffffffffffff, 0x0, r3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x12, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f088a847e08906", 0x0, 0xfe, 0x60000e1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x937}, 0x50) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0x30) 8.228621597s ago: executing program 6 (id=15449): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x3, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xff04}], 0x1}, 0x80d1) close(r0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x1, 0x0, 0x80000002009}, 0x0, 0x1, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x800000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r4 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r4, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000001040)="5346f7f875528ef24043c68e04180a332e94ee4784fffee263c06f2d924e8699b6af71aa257b5a316af31628e5148c7012f4d55ce4c29fea9e5b0b61fdf0b2dc866fa81b4e775e235eaebe330e16114548f147b8a966bf1f1fc6c24b9d47d349c87c3f789d2ba608cd25b17b6c80a7f0ceb4a06ff270ff8c9f0d3a19133f1fdfd51b767b8cef1f36e5490c5df5fcb378a6fb6eb5d8aaf7791ce81f61a05e1ebdd1789eb70ac1f3dfed378f6f3e237120052113a75ab977796117f7e7b2d6ee499f51dc070c820d10a0eaef4fc94ddc648bafae070caf70c465267497b3de963df649e113e2060c82b057abfae0798d424c81aeb42796189eb0936a2c547a5c4d6351ed786c75beb926118fb7af49ecc00b545fe2563bd4294a982980afed3f9cf390f304611db4c6d7b64d64f38db5fde5cf7cadb29c697013b710e0218660671d0051ddd7fb7f5eb72a34f469b2e20600000091817eb5b952af43d1a40f4770e7220fcdfe25d3e9747e2af76ece5922724840afdba6f6f9e1d11db8561e8e836413ee04d6e084700ec1ac0e00569f0e4d4844f4710299aabbef615c33e276544669ce074528938ec0cc6d2af1ce7a47a64ad676f08507aa08d4210f979ef4aacfa4d524c9952d4743d65c3c527302942a8880116ce7ebc6c84778346f02c806bb466db7d313d7ebc7ea87823d4a8de0b697929fb3277012327827801f75ca3c5776d1a81acb160007f73148dfaf05ab7eed5a0e603ac468eb2bcd9de5f140758e74c20a9931187e0cbc857aa62a4cec8a62f7e31af3a78cdb8608551cdd68e83aebb3c9e05519184ff996c336553fa6bf16865cd6c4eacf1e360b029cdae41070f5fd183ea0eaae427505d56994ccfd0737aae3abbc45f56710d2e3f2662bf4514044f7fa03cde28fa1783970d3c676cb23cb1923a9feb233267ef663936ccf25f7597a2270724527bf468d22786d0548b25582180b72c51742c4e5c373a1008dd4cfba508e8f3f8ec35e6f1375a11b1fbe2dc09e9fe609e80112c8f5c895c922cd547def707b7252d7afa0030d008b1dd10fd4a56e30237a6e0229fb4562cb8df3d4e64b28e15c075e59554e9d61a6065d49c1e765a49195cf5d6b1e2b6192447817fedfe41fcdf9a4fc5af567906e4b6453da7b97eac255cc253d7bceba09f67da4815438583c6843366b76d9e9277558e48681e9cfa920b47aea0e5c46ef86ea7f1ef534cf7565b24b833ba2cbfe60e6271614850dd68f2a8a6be4f315b83abb8e2699ed8e2a4b3506f9dacbb180c4deeef7489f49faf34cdf4e91a40295", 0x3a0}], 0x1, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010101, @loopback}}}], 0x20}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004158213ab3b730000003e21bee24b", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x3, 0x10) recvmsg$kcm(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x2000) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'pim6reg1\x00', 0x2}) ioctl$TUNSETLINK(r6, 0x400454cd, 0x6) close(r6) 6.9751044s ago: executing program 6 (id=15461): socket$kcm(0xa, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c00000003f90100"], 0x50) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x2, 0x922000000001, 0x106) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}], 0x58}, 0x2160) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 6.658095861s ago: executing program 6 (id=15465): write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140)='THAWED\x00', 0x7) r0 = socket$kcm(0x21, 0x2, 0xa) setsockopt$sock_attach_bpf(r0, 0x110, 0x2, &(0x7f0000000140), 0x16) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='rdma.current\x00', 0x26e1, 0x0) close(r4) ioctl$SIOCSIFHWADDR(r4, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random="000500030020"}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r4, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) socketpair(0x8, 0x1, 0x9, &(0x7f0000000080)) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="04ccdcbb0300000000100000010000000202000085ed44ff28153f824569152532b7aa8ee7fa66aa226cc1", @ANYRES32=r3, @ANYBLOB='\v\x00'/20, @ANYRES32=0x0, @ANYRES32=r6, @ANYBLOB="00000000040000000500"/28], 0x50) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000440)=ANY=[@ANYRES32=r3, @ANYRES32=r8, @ANYBLOB="050000000000000e00000000d9e974e94545afd277e821113cd6ebb798ba7e982bc9d829648dd8a65d0c3ebd2fcb2df8ec06adbfc142ef7ae142e9df3cb9a724eb64065178d63b0fbc1a0c3401000000eb0ed95a7916cdafeb280865743066ac2e8fb37860896734ff35", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000680)={&(0x7f0000000340)="95903e47dc7199d27904bd6b019883eed4ae524a17ed2c0309ab263d5dd16ed9a998994fd9d93a99f3db4c3a4eae17accbdb9008bde2ff43d8016537ef25d0f2aa64910eb06ec3f8cc7847815b6c9d977667017dd6eb260e68a1e45b203e4b0094b4", &(0x7f0000000540)=""/124, &(0x7f00000005c0)="cfafd3371d377a9d3cab1c927826f9dbe789567d446d97f423c866e50ed4779145d7e41775cae9e857de84942922ab1c2a4d38e9c0fe3a98bfd8f7bd8b20152626111f63c54dd9e575d2a4", &(0x7f00000003c0)="b3283f4cc8870fee02d5251139eba71181b70d6f26833fa5e7b03bc76d8a4ae39dc3", 0x7, r7, 0x4}, 0x38) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000640)="cc", 0x1}], 0x1, 0x0, 0x0, 0x6000}, 0x21) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x501004, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x8924, &(0x7f0000000140)={'macvtap0\x00'}) 5.055633776s ago: executing program 5 (id=15476): socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xc2ba, 0x1, 0x4000000, 0x0, 0x0, 0x0, 0x6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x15, 0x5, 0x0) socket$kcm(0x10, 0x400000002, 0x0) r0 = socket$kcm(0x15, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) sendmsg(r0, &(0x7f0000003ac0)={0x0, 0x0, &(0x7f0000003840), 0x0, &(0x7f0000003b80)=ANY=[], 0x228}, 0x89) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r1 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r1, 0x84, 0x85, &(0x7f0000000000), 0x90) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg(r0, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000000680), 0x0, 0x0, 0x1010}, 0xc000) r2 = socket$kcm(0x1e, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0x25, 0x1, 0x0) socketpair(0x1, 0x5, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r6}, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES32=r3, @ANYRES16=r2], 0x0, 0x37, 0x0, 0x0, 0x1}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000080)) socketpair(0x22, 0x80000, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a2, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) 4.637448591s ago: executing program 4 (id=15479): socketpair(0x1, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xb, &(0x7f0000000100), 0x4) r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0x0) r1 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r1, 0x0, 0x4394) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x101924, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r2, 0x0, 0x0) recvmsg(r2, 0x0, 0x40000042) recvmsg$kcm(r2, 0x0, 0x406) socket$kcm(0x10, 0x2, 0x4) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000072"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r3) r4 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r4, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x30004081) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r5}, &(0x7f0000000000), &(0x7f00000000c0)=r3}, 0x20) recvmsg(r4, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000a80)=""/20, 0x14}], 0x1}, 0x0) 4.447215237s ago: executing program 5 (id=15481): perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x8, 0x0, 0x4000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 4.313680632s ago: executing program 1 (id=15482): r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x8, 0x0, 0x4000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000aecd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad94ed406f21caf5adcf920569c00cc1199684fa75814709fea019af247c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c1faca0f9d9924be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6fab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b79db2e3d5986c82b5aa94e539b204d58f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c7160ec83070000020000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72b0000000000001cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2cc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78ac02ca3cdf6a662db1c9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad943e392955f4f979ea13201bafedcd2063d11dd665647223c78a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd89346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca2533659edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffca9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a294351c5356c1d06c92cf8ce3c7c56cd31121624d74517fd3666277f670e812b28e2f30d035cee5d0e77a3c7220000000000000005a474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f034b8d3ebce68663ef5af469abe75b314fae31a0445859a5ece8fb11a4ee8e46354c9c3a041e12282ce24463aaf28345bd168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f09000000000000004fc4bda3453602004535a976eacd3adaa4d2ee6fe0d072ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d401adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb40f7f02f750d6c977a191852c9ae031db044b2353199546609f9f69a6cfefdf879d447df53f3b9b70d10355b00300000000000000553d18a6cc50feeb7bfad9b7be3283b6450d264e7712d2f1d7004548b19162cef04d18d4f58fab987baab97a9bfbd8f185b5631820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe527340935aa3c0b4f3f45b418a18217747ae442e31560e5b741445ea2a1acee2a81425ff000000d2a0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51423b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f88735fce5115dc83ed73d8ee4a91322608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf5000000000000fa08ad0631c4b839688b22c4da2a6bc4cf45854d221a2d5f96bc64647f15daa2ba79cd0f4254ed55217912ef84bd2927df82fc061aef2920c49b2a90886da75561173fa186cb7ee86dd4285c4721eb428c953296bb2f5d825da54dbef07c1b349b4901e093d13e6b9a0000009b5b22e887bc061d40bcaf0aa18623fd9b7179ccc692ba74b531b65c4decf9d080a8ac7e82d4cde1267aa64b2a94fd87a009e6742c2ddc3a9d7eccbb1831b1fa218277c2814a91cab7cb59c697166d6f1bb1a360470000000000000000000000000000000000000000000000000000f9f9b4ce7e871f507084c8c88e0652decbe579b03ed84ea94597dd1059620a050f69ea03b99b4e19d35f4a3b54e96ae2172effecec80f6baa4bf69a6ebf5392882df78b0983e662dc0cb64b77f3f006b6b25443197ae93f0be6de5a703d003f00720943c0e4b33af00000000000000000021a688b2d7007fcc4b59f719afb0b3b7e0aee306ca70fe42bf4984a68f40e1fc043a03a17e4744359b87dc27c82d51cbeb64e52a28daeb6a78d6fe06181ecc840000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000a80)='!') r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x7) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="eb673468a1d4b3f1ac274e1633766522438f7d55a7f22df8e28fc6ec8d677cf78b41c22adf922d8bef985d6e2242f74b76e8ca5dabc1927dfeca095f5560d6d775f9ee1ad23211415025ae15790d7c3f2fcb9953bca2f88e0798e851b188cb7c44a90bae28cc85cf22b325ff568f85d0124eea958e8cc8ca5f5983730a7f86af2f24d36ad2db161c3083", 0x8a}], 0x1}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r3, &(0x7f00000000c0), &(0x7f0000000000)=""/3, 0x2}, 0x20) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x10c040, 0xac5d, 0x0, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000040)='cpu\t>0&&\t') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r3, &(0x7f0000000140), &(0x7f0000000000)=""/6, 0x2}, 0x20) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000011008108090f9becdb4cb92e264831371900000069bd6efb2502eaf60d002700020400bf050005001201", 0x2e}], 0x1}, 0x0) 4.260427394s ago: executing program 5 (id=15483): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c040, 0xac5d, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000004000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000076000000bf0900000000000026090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b703000000000000140000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xc2ba, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0xb3d6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x830d}, 0x102402, 0x4, 0xfffffffe, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r3 = socket$kcm(0x2a, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x8917, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r4}, &(0x7f0000000100), &(0x7f0000000280)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x19, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="5400020029000b05d25a806f8c6394f90424fc602f0011002e2f0100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 3.746574011s ago: executing program 1 (id=15485): r0 = perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0xe, 0x3, 0xd, 0x0, 0x6, 0x84200, 0xd, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x100000008, 0xf1}, 0x300, 0x4, 0x6, 0x3, 0x4, 0x0, 0x4, 0x0, 0x4, 0x0, 0x200000002000000}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r1, 0x0, 0x0}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r0, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000480)=[0x0, 0x0], &(0x7f00000004c0)=[0x0], 0x0, 0xf, &(0x7f0000000500)=[{}, {}], 0x10, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0xa3, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000740), 0x4) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xe1, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x2}, 0x50) (async) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r6, &(0x7f0000000c40)={&(0x7f0000000ac0)=@rc={0x1f, @fixed}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)=""/68, 0x44}], 0x1, &(0x7f0000000c00)=""/16, 0x10}, 0x2) (async) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xfffffff7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x3}, 0x50) (async) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000008c0), 0x8) (async) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)=@generic={&(0x7f0000000900)='./file0\x00'}, 0x18) (async, rerun: 32) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000980)={0x0, 0xf4e, 0x18}, 0xc) (async, rerun: 32) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x1f, 0x10, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000005000000000000008000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b702000003000000850000008600000018010000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000a600000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x11}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x7, 0x9, 0x1}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) (async) r13 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r14 = openat$cgroup_netprio_ifpriomap(r13, &(0x7f0000000080), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r14, &(0x7f0000000040)=ANY=[@ANYBLOB="76658e682a5f746f5f6261746164763231"], 0x12) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r12, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) (rerun: 64) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r15], 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r16, 0x2000000, 0x11, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1e, 0x29, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@map_idx={0x18, 0x9, 0x5, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0xc4}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xc0f1}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x32}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @alu={0x7, 0x1, 0xb, 0x7, 0x4, 0x8, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000140)='syzkaller\x00', 0x4, 0x16, &(0x7f0000000180)=""/22, 0x40f00, 0x1a, '\x00', r3, @sk_lookup, r4, 0x8, &(0x7f0000000780)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[0x1, 0xffffffffffffffff, r5, 0xffffffffffffffff, r7, r8, r9, r10, r11], 0x0, 0x10, 0x7}, 0x94) r17 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0x1}, 0x0, 0x0, 0xc2ba, 0x0, 0x4, 0x0, 0x6}, 0x0, 0xffffffffffffffff, r0, 0x0) r18 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r17, 0x40042408, r18) 3.645619404s ago: executing program 4 (id=15487): r0 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000005c0)=r0, 0x12) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x6, 0x4, 0x8, 0x3, 0x0, 0x3, 0x824a0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000100)}, 0x4, 0x5, 0x53e, 0x8, 0xfffffffffffffbff, 0x7, 0x5, 0x0, 0x400, 0x0, 0x1000}, r0, 0x10, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x4}, 0x108102, 0xac5d, 0xffffffff, 0x0, 0x51, 0x0, 0x0, 0x0, 0x4000}, r0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x1e) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x4, 0x80090, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffff7, 0x5}, 0x5000, 0xb44, 0x400000, 0x0, 0x9, 0xa, 0x0, 0x0, 0x2, 0x0, 0x26b0}, 0xffffffffffffffff, 0x0, r3, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x12, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f088a847e08906", 0x0, 0xfe, 0x60000e1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x937}, 0x50) close(r5) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0x30) 3.468026071s ago: executing program 1 (id=15488): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0xfffffffffffffe6c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) close(r0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xb, 0x7}, 0x80000, 0xca, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0xe, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x27, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x405, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x22) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0xffffffff, 0x0, 0xb}, {0x10000002, 0x0, 0x4, 0x2}]}, 0x94) close(0x3) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="5c00000016006bab9a3fe3d86e17a80a046b876c060048007ea60864160af36504811a0038001d60be06000000a705251e6182949a9a7b9b064acb84c9f4d4938037e70e4509c5bb4de385aa2adb88a899a655ab0000000000000000", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r2, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x2002) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$tipc(0xffffffffffffffff, 0x0, 0xd962baf708dae759) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000100)='cpuset.mem_exclusive\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f0000000040)=0x100, 0x12) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) 2.810246984s ago: executing program 5 (id=15490): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x3, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xff04}], 0x1}, 0x80d1) close(r0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x1, 0x0, 0x80000002009}, 0x0, 0x1, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x800000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r4 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r4, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000001040)="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", 0x3a0}], 0x1, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010101, @loopback}}}], 0x20}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004158213ab3b730000003e21bee24b", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x3, 0x10) recvmsg$kcm(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x2000) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'pim6reg1\x00', 0x2}) ioctl$TUNSETLINK(r6, 0x400454cd, 0x6) close(r6) 2.787479184s ago: executing program 4 (id=15491): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x3, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x41, 0x0, 0x11}, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xff04}], 0x1}, 0x80d1) close(r0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x1, 0x0, 0x80000002009}, 0x0, 0x1, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x800000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r4 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r4, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000001040)="5346f7f875528ef24043c68e04180a332e94ee4784fffee263c06f2d924e8699b6af71aa257b5a316af31628e5148c7012f4d55ce4c29fea9e5b0b61fdf0b2dc866fa81b4e775e235eaebe330e16114548f147b8a966bf1f1fc6c24b9d47d349c87c3f789d2ba608cd25b17b6c80a7f0ceb4a06ff270ff8c9f0d3a19133f1fdfd51b767b8cef1f36e5490c5df5fcb378a6fb6eb5d8aaf7791ce81f61a05e1ebdd1789eb70ac1f3dfed378f6f3e237120052113a75ab977796117f7e7b2d6ee499f51dc070c820d10a0eaef4fc94ddc648bafae070caf70c465267497b3de963df649e113e2060c82b057abfae0798d424c81aeb42796189eb0936a2c547a5c4d6351ed786c75beb926118fb7af49ecc00b545fe2563bd4294a982980afed3f9cf390f304611db4c6d7b64d64f38db5fde5cf7cadb29c697013b710e0218660671d0051ddd7fb7f5eb72a34f469b2e20600000091817eb5b952af43d1a40f4770e7220fcdfe25d3e9747e2af76ece5922724840afdba6f6f9e1d11db8561e8e836413ee04d6e084700ec1ac0e00569f0e4d4844f4710299aabbef615c33e276544669ce074528938ec0cc6d2af1ce7a47a64ad676f08507aa08d4210f979ef4aacfa4d524c9952d4743d65c3c527302942a8880116ce7ebc6c84778346f02c806bb466db7d313d7ebc7ea87823d4a8de0b697929fb3277012327827801f75ca3c5776d1a81acb160007f73148dfaf05ab7eed5a0e603ac468eb2bcd9de5f140758e74c20a9931187e0cbc857aa62a4cec8a62f7e31af3a78cdb8608551cdd68e83aebb3c9e05519184ff996c336553fa6bf16865cd6c4eacf1e360b029cdae41070f5fd183ea0eaae427505d56994ccfd0737aae3abbc45f56710d2e3f2662bf4514044f7fa03cde28fa1783970d3c676cb23cb1923a9feb233267ef663936ccf25f7597a2270724527bf468d22786d0548b25582180b72c51742c4e5c373a1008dd4cfba508e8f3f8ec35e6f1375a11b1fbe2dc09e9fe609e80112c8f5c895c922cd547def707b7252d7afa0030d008b1dd10fd4a56e30237a6e0229fb4562cb8df3d4e64b28e15c075e59554e9d61a6065d49c1e765a49195cf5d6b1e2b6192447817fedfe41fcdf9a4fc5af567906e4b6453da7b97eac255cc253d7bceba09f67da4815438583c6843366b76d9e9277558e48681e9cfa920b47aea0e5c46ef86ea7f1ef534cf7565b24b833ba2cbfe60e6271614850dd68f2a8a6be4f315b83abb8e2699ed8e2a4b3506f9dacbb180c4deeef7489f49faf34cdf4e91a40295", 0x3a0}], 0x1, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010101, @loopback}}}], 0x20}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004158213ab3b730000003e21bee24b", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x3, 0x10) recvmsg$kcm(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x2000) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'pim6reg1\x00', 0x2}) ioctl$TUNSETLINK(r6, 0x400454cd, 0x6) close(r6) 2.62985289s ago: executing program 7 (id=15492): perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x8, 0x0, 0x4000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 2.401265047s ago: executing program 1 (id=15493): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) close(r0) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000140)}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002f00000018", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d2f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) 2.367499489s ago: executing program 7 (id=15494): perf_event_open(0x0, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) socket$kcm(0x28, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=""/56, 0x38}, 0x10001) perf_event_open$cgroup(&(0x7f0000000040)={0x4, 0x80, 0xb2, 0x7, 0x3, 0xa, 0x0, 0x9, 0x1c448, 0x9, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x405, 0x2, @perf_config_ext={0xffffffff7fffffff, 0x2}, 0x100608, 0xffffffffffffffff, 0x2, 0x8, 0x10001, 0x80000003, 0xdb7d, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xd) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x1000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x1ff}, 0x100c, 0x7, 0x0, 0x2, 0x0, 0x7, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) close(r1) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="1c0000001e006bcd9e3fe3dc6e08000007000000000000007ea60864", 0x1c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000b40), 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0], 0x0, 0x25, &(0x7f0000000780)=[{}, {}], 0x10, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x97, 0x8, 0x8, &(0x7f0000000a40)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000ac0), 0x4) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001040)={0x6, 0x9, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000002f030000000000000a8a000018140000", @ANYRES32=r0, @ANYBLOB="000000000000000073cf197d", @ANYRES32=r0, @ANYBLOB="000000000800000018550000feffffff00000000000000009500000000000000"], &(0x7f0000000d00)='GPL\x00', 0x4, 0x26, &(0x7f0000000ec0)=""/38, 0x40f00, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000f00)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000f40)={0x2, 0xc, 0xa7, 0xc43c}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000f80)=[r0, r0, r0, r0, r0, r0], &(0x7f0000000fc0)=[{0x1, 0x5, 0x9, 0x4}, {0x4, 0x4, 0x5, 0xc}, {0x3, 0x2, 0xb}, {0x3, 0x2, 0x3}, {0x3, 0x2, 0x7, 0x1}, {0x4, 0x1, 0x3, 0xa}, {0x0, 0x2, 0x2, 0x7}, {0x0, 0x5, 0x0, 0x5}], 0x10, 0x401}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001180)={{r0}, &(0x7f0000001100), &(0x7f0000001140)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x6, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000080000000000000006000000c7a343bd9500"/32], &(0x7f00000002c0)='syzkaller\x00', 0xffff, 0x2f, &(0x7f0000000300)=""/47, 0x40f00, 0x1, '\x00', r2, @xdp, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000b00)={0x4, 0xa, 0x40, 0xffffffff}, 0x10, 0xffffffffffffffff, r4, 0xa, &(0x7f00000011c0)=[r0, r0], &(0x7f0000001200)=[{0x0, 0x4, 0x2, 0x2}, {0x3, 0x2, 0x5}, {0x1, 0x1, 0x5, 0x4}, {0x0, 0x1, 0x7, 0xb}, {0x3, 0x5, 0x6, 0xb}, {0x1, 0x3, 0xc, 0x1}, {0x4, 0x1, 0x7, 0x9}, {0x2, 0x5, 0x4, 0x2}, {0x5, 0x3, 0xb, 0xb}, {0x3, 0x2, 0xa, 0xa}], 0x10, 0x5}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85b46cfac318300000010000000000000003eda6f0"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[], 0x0, 0x4d}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e00000000000000080000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r6, @ANYBLOB="00000000000000e8ffffffff8edd"], 0x48) sendmsg$inet(r5, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000480)=""/258, 0x102}, {&(0x7f0000000d40)=""/244, 0xf4}, {&(0x7f0000004300)=""/4045, 0xfcd}, {&(0x7f00000007c0)=""/208, 0xd0}, {&(0x7f0000000340)=""/221, 0xdd}, {&(0x7f00000005c0)=""/211, 0xd3}, {&(0x7f0000000940)=""/198, 0xc6}], 0x7}, 0x40012100) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xda4}, 0x0, 0x0, 0x3, 0x1, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000011008108090f9becdb4cb92e264831371900000069bd6efb2502eaf60d002700020400bf050005001201", 0x2e}], 0x1}, 0x0) 1.830268107s ago: executing program 5 (id=15495): r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x8, 0x0, 0x4000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000a80)='!') r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x7) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="eb673468a1d4b3f1ac274e1633766522438f7d55a7f22df8e28fc6ec8d677cf78b41c22adf922d8bef985d6e2242f74b76e8ca5dabc1927dfeca095f5560d6d775f9ee1ad23211415025ae15790d7c3f2fcb9953bca2f88e0798e851b188cb7c44a90bae28cc85cf22b325ff568f85d0124eea958e8cc8ca5f5983730a7f86af2f24d36ad2db161c3083", 0x8a}], 0x1}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r3, &(0x7f00000000c0), &(0x7f0000000000)=""/3, 0x2}, 0x20) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x10c040, 0xac5d, 0x0, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000040)='cpu\t>0&&\t') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r3, &(0x7f0000000140), &(0x7f0000000000)=""/6, 0x2}, 0x20) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000011008108090f9becdb4cb92e264831371900000069bd6efb2502eaf60d002700020400bf050005001201", 0x2e}], 0x1}, 0x0) 1.828024617s ago: executing program 1 (id=15504): bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@cgroup, 0x9, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0x9, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000680), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 1.805750048s ago: executing program 7 (id=15496): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x48) close(0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000880)="f2", &(0x7f0000000000)=""/10, 0x2}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000009800000095"], &(0x7f0000000680)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r0, 0xffffffffffffffff}, &(0x7f0000000a00), &(0x7f0000000a40)=r3}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000cd03000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0xedf0e51957efc755, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x18000000000002a0, 0xd28, 0x0, &(0x7f0000000580)="b9ff03076804268c989e14f088a8", 0x0, 0x4fe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) r6 = socket$kcm(0x29, 0x5, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r7, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) sendmsg$inet(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000c40)="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", 0xfb4}, {&(0x7f00000001c0)="d636d12e7e7a2ba2e512fc082c2476e61f7cca704679e8af3f27da1063b63a2a959fdc709b0772c635f758e3f592d1ebfdca93eb1a83a5ae3370847e36a5d4", 0x3f}, {0x0}], 0x3, &(0x7f0000000680)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @empty}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @local, @rand_addr=0x64010102}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_tos_int={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x11}, @local}}}], 0xb0}, 0x4) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x3, '\x00', r8, r9, 0x2, 0x2, 0x2}, 0x50) 1.725609591s ago: executing program 4 (id=15497): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x2a040, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002e000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], &(0x7f0000000140)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x440, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x3, 0x10) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0xfd, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x1}, 0x8084) r3 = socket$kcm(0x29, 0x2, 0x0) write$cgroup_pressure(r3, &(0x7f0000000140)={'full'}, 0xfffffdef) sendmsg$inet(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x48840) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xff, 0xff, 0x5, 0xf9, 0x0, 0x1, 0x4062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x5}, 0x8400, 0xfffffffffffffff3, 0x6, 0x7, 0x800000003, 0xfff7ffff, 0x10, 0x0, 0x4, 0x0, 0xdf}, 0x0, 0x6, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x8, 0xf, 0x80, 0x5, 0x0, 0x3b5c, 0x41020, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x1, 0x10001}, 0x102000, 0x8, 0x6, 0x6, 0x7, 0xfffffffc, 0x1, 0x0, 0x2, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r1, 0xa) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000a300)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8b19, &(0x7f0000000000)={'wlan0\x00', @random="7cf1e97c9e4f"}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001d00)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff7ff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b70500000000e000720a23fe000000008500000012000000b70000000000000095000000000000004e6258941c823b7505608556ba4ababb42684e890d31ae450400373a0a5447a801b8c1c4f0c4bd97c6555e61345400f9bd42abeb9ade0105000000000000a21902ff07000094a2b51c21df74924f5436a6ed89b98f75e800230c49c90fe1336481f3b92a63336c36fcd745d61d7739c6554ca201000000bebbe8282f8b1e26407437a397bf8f50e87ed4d27adfd876bffc402887781979461c4363bc5c9b6202ea471428197ef88bc333fbcec0ea4334844d232279ae95a90fd41d528f58d305000000435883df6c10ce86188c92292b2d0226082960be682836bdff8b0971f2a5405e453228e7b1005bd73479358a90df3e481947de6453736aa572158af6ea63d6d418fbbd2bba050000001da000ef78df03000000d19913a5fb03c79dac2e489f68127892658115e7ffb588a71dffffff951b8535167ab8069a2c92a3aa18e22517000026637b4c34bf2d0aa304ed42bf70480e9e97203fd169411f37fddd1f7fbe16dbbc0f307bceb5064f388a0350c3dc928b0e638b1e2b2a9d25264233e5d45eb377f56b95241024dbe30f67191c2b56b70328d6d3215dfffe5d89af1d10599bd494d921d1fb2db99b6aba0fa978f41eb1d4c553e5a9326ed550c13f8dd36716a899a1e79234294707c5312b924d142c17b20bb80ee202222c03fa84ccc374e717f694018630366397266090a82343aedfbf7afe892390c2eb775b0d16073da2229958db05de7df6ab7600004000010000006d8081cb3bf251d906c00da0e23b50465f8394820be571e3592d0000c7ef10fdc462e7040e7074ec43aa461fc54401a76406db718d4efd6c1bd10ce1d087cf9bba461162555a95524c84df0952d32093082b7aa71304e0d2d9ec310d1b676b378a5879e47941de1a28c3a8f400000000000000000e032b7d2badd0bc6617a859b7ac273b6304555f664469cec152030f06cc0ca1765838eb5590264736fbccfc3a8f4e3b10daf6a275daf5db2dac7096fe8ac8876acaad043663b3b0fedb05e6d31408fa20140c9d2db1c59ac8a3ce28e489d67d87d3a107ccea3007f58f2c5017e8807107f79ac50cc1d4f546b4443d137eb706b71b1767a10cca7a7c82b76c96e874aff249f36329a6526b354b6e674b08f7ef492b804c4b08fb10de807d79fd782027318cd7632e22d2faa16209272b39b5ec8d239832ea02cc88e249a2e77753a58987547571fbc8de747faab724bebb6401412b496e078fcb6c78ab447e871b76a8b0506f49594aa1d610567e14d739a60ff3ce04d0d2e5681e787c7e1ad25467bb81f2f448128207fe07a83759ec30cf9e0a3fd3f2fcee97fe8d273f8e712a8a64eaf2d89a1fa44554357fcd7ab531ff7a41c27164fca430a62d015b477de61853f5ee2e25b00a63642ec32ece2ff3bb5883deb895f52a923b5c744d8dccdd6a09ded8b90f1eeda8e6e884a4f090edb6ab9fc8107846508d51f3735493d5860cf80200ce31b92eb3563d485b5a7d192092d7a9fd2bc67d305d1d4573aad5f6501d1cd27657ce17330402dacb78d72d776330711645eed7d4c292f4448733c0826c4eb950f3d40457f82d7f792d106518f6bde874aff9e2bea7d73f74bebeeacfc700000000000000000000d40d73be47803297db004264c8c70b7761b22a7114a078a87d63d63b0c9dcc263a5b773bfeba212abef4181ad9e4872e328c0f105d51e3d167a2b717051d7681ba04552eeba18a000000b22b50d76d85040c9000ea68a528049a60d5e26b20455194f4be3b8466fd66d0e6cefcff7891c485d61cb66f4076cd60a22733cb00cf7cc12ca7d9bb864c0e650236a79a5c85349a9b1e6bbc3bace197e72490c566431cd3a08e9d1b641c1ba1f661d01573b904c3fa1427370fa15cecd294ac21fefe3d161fdf58e8bc5957ef145839f4370176e1be88d2e3516a1998c1621a00b4438b85a4dfee6f61827a1e50e158038b037dfda3ffb35069e41fc740ae720800de53948f176c3c15f3a529c02434b920d87f12a6e3420a2fdcb3559e7a5b1ddbb06b7a5977f63bfac701e673bf626d126b213c92e7169a930beb8d76f9db34e8098bea301baa96916d6458c923866dc192928b320738d1b298fb55f2a64500000000000000000000000000509885a38d9d995a46817e7ff7acddcc5f9253c63f86baf33f92820c9ff497cf76b6482c3ab53fb6ecea6d220b91b99b2fb4279ab09ae0645ab92df309000000000000a4868411948f8e3e259b717d722a1eebd3f6860a17f1ae9e10a1178f6aef4951b192d13e9600c1f700ca7b1d127e451034469bf2a8f93dbae6ad8e932e431dc18323794156238625bb9c45c5a76a68a8646e701b29a71ffbd854f50f195823106a5625ff94221f1f04c72525b50aae69081de9626de9847bf53475d90642d9730101d80b1b0000000000000000822b0641698d60160d9157548302dd2636d12c431f96728ae4a45361e6d47a1c4a52d67c0f0a62585c09fcfd70d0f249f87c44b47283c1c6f2430d70c751e4ada9b646e6e7c1719faee476d88a2943c71a21db55b7497dd7ed385ac2e8cb916390a3a0ed52e7371e1a141e69afa07b46ac20f3521fb251b72c82ee1c7eb4f67c0deed5618d0db925ce7a7c50a99835544c540f5d528587d1a26e78df1bc9a8e4d90c57d0b8122eae7b23e4456624f5337c16c42648c7a3d0b799ad409befe0cbe2aa781ba826918df7aa80dff4f62258e54419629eb1d37de7f6a3512bd618781d1ad3a4d4b0da44df9f9a93f0487f79a9b16dfa6f68b06ce6a96ca344d194cded05702c2300d1a4f451b33830765f8131f6c28fada65701851bba089b8a8347900e72d68cea965feb6a06225dd3f0e135323a5bde3b43c9d242b73abf9e05336af040a4a6bb5918146393f1d50705c1d1e986bf2f690de51ee8727d37339df5391db535bb1e9bb3e5dadb6e5a2bb4faa2dcbc6ca9b40ac96e448b9dadeb08fc2cf3a960f22bf20b9e967b7a75687372b8e3edc543896c360674d901a7f56b07ba1479b46eea3d94026a9c7e670ab40bb2c1ca1a7c90299361239bef773140af974c7efc285a64633d21513481b3ac62dec9fa3e8ce6156d76b82baa145bc550b0ccbc0934ccfea45292caa2f0654fe18dc0669a4f2af9fa232a293ad94261f55675cc686db72783a6bacc0df6a1ea943ae266af112f35319980cd681811a369e0d03cf7d22bed7cbe1afe498b88942b1bf7edae441a0d0d88fce65cb4e848793a28cbd7373f6acd3b5a48c034e487750388929d37fa3165f205dab3be5f3e5781a84298687cbf02dcaf0e14a2b260293f349d076eb75a2ddc5382d106f0beea02aa45018fe36d1176cf7704383b6922d10dc80bc7feca3982ae232d4bb47c722c83a7cf6ee8832f038b072eb803a47cd7f753e80c9f6eedb8"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1d4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x300f000, 0xe, 0x0, &(0x7f0000000080)="0069c2704ade28eddb0000200000", 0x0, 0x48b8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 1.299774276s ago: executing program 1 (id=15498): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@var={0x2, 0x0, 0x0, 0x11, 0x3, 0xffffffff}, @const={0x0, 0x0, 0x0, 0x4}, @func_proto={0x2, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x44}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x5, 0xc, 0x8, 0x40, 0xc0, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r1}, 0x38) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x2d63}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="12000000050000000400000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000140)=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000180)=r6, 0x4) sendmsg$inet(r8, 0x0, 0x200400c0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={0xffffffffffffffff, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000640)={&(0x7f0000000180), 0x6e, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/214, 0xd6}, {&(0x7f0000000540)=""/129, 0x81}, {&(0x7f00000003c0)}], 0x3}, 0x101) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r10, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r11, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) setsockopt$sock_attach_bpf(r10, 0x1, 0x44, 0x0, 0x0) 1.271370347s ago: executing program 7 (id=15499): r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_config_ext, 0x1005e2, 0x2, 0x0, 0x0, 0x2, 0xfffffe, 0x0, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xffff) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020fe29817a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000400704000000000000b7040000100000206a0700fe000000008500000005000000b70000000a00000095000000000000000000c2c62f6004ad13aa957e2af5e49a53c2868f0399d909a63796c113a80c19aab9d607000000b6c9483be3f0d3253730e714c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dc86035b44174f7c0620254ab6d285e6b343185089a0f119e31975e551558050800000000000000125d67857f290870093f38153608561a2128a79cce912d1f05de330800a9f5422bee8ca49166f6a587f2f593775afcd071efc5a972f757521b7b38ec273c2ad3e406f8c124f7dc1c4553229a69df4b2780e6da4420d71489fe383e0b5ce08b750502f2b8add8d2dddde19ac050537e973782b4053150580035fb2c579e1b2100000033d1ee8cab6d236f05b1f7b9f78fd5abfe033eb79f7a0b498366f5edfe311258016fbf47d9c85bf5325bf61419372be377022433e20900a262b20bb8b36de7b0e6c5ebfc5baec1ebe58d4af587d33e2935ad68da6e0fea5c21301f5d002b51a5b60fc741cb2c5d4cd5e896774f9293a6435558795043404ac6eafc8310fbcacca7f971b260fd06d4590ded8429fcd1c9a8dbbdedb32675388df363c0bc536e00448208b72405ebf27ddb402e5a2d675aaad92e183cef1eadc1661140fb567b55c72907a1aca75277a5f0022b1e957ba737f10f1161c5ae6e2cc64072ff3b4e76084922242e63d4b7806e30f786cff147e4bc819060678319a0e5534f5a0db52526c30000000000000000000000a63705b1a60525620acca06d57c055059df7651768310c9085c5f86be6ab819506961ad51f18b35fdc3fd4d0a0dbbdcd494ef168931f27748787bee95d739fef7ee67dd21c34647de82707e41d7db6d981a4fcf0bbd3d38ebb7a2489e28c6b28c0f70092ffb016b7766399555f3e6b538c2c862d17e53eaeb2036f9f0ab6e95e71bda4b5bbf53344264ad93bac1207b31d6e9c78181c7fe204c0b7582d1c762857f2a2e0c60f4a4855591a4f70f94df9629e470701103c40c8f6d3a3068091d62b58999e0a046f9509cb8ddc2a9ad4e0f1f85e5f076218b4b931acdff0c34fc5bdbad17ec481f1c9b17727c14e053e315d0d8d03c24ddaba65c5ce5b1aa04d1f767e25662b155d49460ec720d54044ac2856c11407835f341e2614bcae270000000001000000df7f736aab5d713240b2f40ec7be8251eba969686b2670ddc1a84df6ab12ab3e0cf8747837062233935704ebbd943ef0c5fef29513c7c1d6d2611796dccb45bdfd9e6533ad3574be5b9ea70e0c3b41a32067c03f5f8ed147cd0655c90d656f66eaed18a3c284c4f19417b5d91431759356db5d45ea40c9866957105b6252b0c028c672049ce163126f143f5758faf2a43f4c4f45a69b4e9113f85ae531085c11c75edbdee5af454757cdaff396c15ab9b210c202ffaea96d1bac60c6d6c56a4babc659858789bd479334e13e1c7876f95429431e61400815788c1397b260600d78e7513c58d9ac9474d392cc06f789753e1e7ebf5f1b55e2a64b9150c6580bf48e7bff763034801cccf403108d127b959ffc425a563ea2b90fbe779fd7d2ebfe94"], &(0x7f0000000280)='GPL\x00'}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000140), 0x8) 763.437344ms ago: executing program 5 (id=15500): perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0x16f7cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x4c0, 0x200, 0x5, 0x7, 0x0, 0x80}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x1, 0x9, 0xae}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x48) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x3, 0x10, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffe}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000080)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0xe, 0x0, &(0x7f00000003c0)="c274386d178550cb864bd57221bc", 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 683.801216ms ago: executing program 7 (id=15501): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = getpid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000012c0)={0x3, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x200, 0xecd511409f1d3850, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xffff, 0x7fffffffffffffff}, 0xc280, 0x0, 0xffffffff, 0x0, 0x0, 0xffff4b07}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(0x0, r0, 0xe, r1, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 239.923662ms ago: executing program 4 (id=15502): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x88f}, [@call={0x85, 0x0, 0x0, 0x61}, @call={0x85, 0x0, 0x0, 0x9e}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="c8bb4e7dbde79f73008865000700", 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 202.018634ms ago: executing program 7 (id=15503): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x28}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000180)=r4) write$cgroup_devices(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 0s ago: executing program 4 (id=15505): bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r0}, 0xc) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) kernel console output (not intermixed with test programs): ? __might_sleep+0xd0/0xd0 [ 3043.218621][T17732] ? __lock_acquire+0x7d10/0x7d10 [ 3043.223755][T17732] should_fail_ex+0x399/0x4d0 [ 3043.228461][T17732] should_failslab+0x5/0x20 [ 3043.233004][T17732] slab_pre_alloc_hook+0x59/0x310 [ 3043.238082][T17732] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3043.243879][T17732] __kmem_cache_alloc_node+0x4f/0x260 [ 3043.249292][T17732] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3043.255026][T17732] __kmalloc+0xa0/0x240 [ 3043.259290][T17732] tomoyo_realpath_from_path+0xdf/0x5d0 [ 3043.264863][T17732] ? tomoyo_path_number_perm+0x205/0x650 [ 3043.270511][T17732] tomoyo_path_number_perm+0x22f/0x650 [ 3043.275994][T17732] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 3043.281577][T17732] ? ksys_write+0x1c0/0x250 [ 3043.286132][T17732] ? common_file_perm+0x171/0x1c0 [ 3043.291214][T17732] ? __fget_files+0x28/0x4b0 [ 3043.295821][T17732] ? __fget_files+0x28/0x4b0 [ 3043.300431][T17732] security_file_ioctl+0x6c/0xa0 [ 3043.305471][T17732] __se_sys_ioctl+0x48/0x170 [ 3043.310082][T17732] do_syscall_64+0x4c/0xa0 [ 3043.314517][T17732] ? clear_bhb_loop+0x60/0xb0 [ 3043.319206][T17732] ? clear_bhb_loop+0x60/0xb0 [ 3043.323893][T17732] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3043.329796][T17732] RIP: 0033:0x7ffa6099c819 [ 3043.334224][T17732] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3043.353839][T17732] RSP: 002b:00007ffa6193f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3043.362349][T17732] RAX: ffffffffffffffda RBX: 00007ffa60c15fa0 RCX: 00007ffa6099c819 [ 3043.370337][T17732] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 000000000000002b [ 3043.377995][ T7459] Bluetooth: hci5: command 0x0419 tx timeout [ 3043.378308][T17732] RBP: 00007ffa6193f090 R08: 0000000000000000 R09: 0000000000000000 [ 3043.392322][T17732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3043.400412][T17732] R13: 00007ffa60c16038 R14: 00007ffa60c15fa0 R15: 00007fff56ee7478 [ 3043.408505][T17732] [ 3043.413436][ T7459] Bluetooth: hci1: command 0x0406 tx timeout [ 3043.416049][T17732] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3043.856814][ T4327] team0 (unregistering): Port device team_slave_1 removed [ 3043.905795][ T4327] team0 (unregistering): Port device team_slave_0 removed [ 3043.950130][ T4327] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3044.002180][ T4327] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3044.250981][ T4327] bond0 (unregistering): Released all slaves [ 3044.520175][T17581] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 3044.550148][T17581] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 3044.590824][T17581] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 3044.618541][T17737] FAULT_INJECTION: forcing a failure. [ 3044.618541][T17737] name failslab, interval 1, probability 0, space 0, times 0 [ 3044.651334][T17581] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 3044.739061][T17737] CPU: 1 PID: 17737 Comm: syz.6.15177 Not tainted syzkaller #0 [ 3044.746795][T17737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3044.756910][T17737] Call Trace: [ 3044.760245][T17737] [ 3044.763232][T17737] dump_stack_lvl+0x188/0x24e [ 3044.767983][T17737] ? show_regs_print_info+0x12/0x12 [ 3044.773247][T17737] ? load_image+0x400/0x400 [ 3044.777811][T17737] ? __might_sleep+0xd0/0xd0 [ 3044.782457][T17737] ? __lock_acquire+0x7d10/0x7d10 [ 3044.787552][T17737] should_fail_ex+0x399/0x4d0 [ 3044.792289][T17737] should_failslab+0x5/0x20 [ 3044.796839][T17737] slab_pre_alloc_hook+0x59/0x310 [ 3044.801935][T17737] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3044.807810][T17737] __kmem_cache_alloc_node+0x4f/0x260 [ 3044.813244][T17737] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3044.819076][T17737] __kmalloc+0xa0/0x240 [ 3044.823310][T17737] tomoyo_realpath_from_path+0xdf/0x5d0 [ 3044.828937][T17737] ? tomoyo_path_number_perm+0x205/0x650 [ 3044.834632][T17737] tomoyo_path_number_perm+0x22f/0x650 [ 3044.840170][T17737] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 3044.845702][T17737] ? ksys_write+0x1c0/0x250 [ 3044.850316][T17737] ? common_file_perm+0x171/0x1c0 [ 3044.855433][T17737] ? __fget_files+0x28/0x4b0 [ 3044.860090][T17737] ? __fget_files+0x28/0x4b0 [ 3044.864861][T17737] security_file_ioctl+0x6c/0xa0 [ 3044.869866][T17737] __se_sys_ioctl+0x48/0x170 [ 3044.874536][T17737] do_syscall_64+0x4c/0xa0 [ 3044.879020][T17737] ? clear_bhb_loop+0x60/0xb0 [ 3044.883759][T17737] ? clear_bhb_loop+0x60/0xb0 [ 3044.888513][T17737] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3044.894478][T17737] RIP: 0033:0x7f8dd0f9c819 [ 3044.899015][T17737] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3044.918683][T17737] RSP: 002b:00007f8dd1f2e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3044.927169][T17737] RAX: ffffffffffffffda RBX: 00007f8dd1215fa0 RCX: 00007f8dd0f9c819 [ 3044.935287][T17737] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 0000000000000029 [ 3044.943313][T17737] RBP: 00007f8dd1f2e090 R08: 0000000000000000 R09: 0000000000000000 [ 3044.951430][T17737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3044.959463][T17737] R13: 00007f8dd1216038 R14: 00007f8dd1215fa0 R15: 00007ffeee187748 [ 3044.967509][T17737] [ 3045.107376][T17581] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3045.134642][T17749] netlink: 14548 bytes leftover after parsing attributes in process `syz.1.15180'. [ 3045.175141][T17581] 8021q: adding VLAN 0 to HW filter on device team0 [ 3045.186023][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3045.190767][T17737] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3045.206295][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3045.235512][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3045.245125][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3045.264557][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 3045.271792][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3045.281670][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3045.291926][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3045.301961][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 3045.309246][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3045.326747][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3045.390736][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3045.411228][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3045.458661][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3045.484563][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3045.504774][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3045.515374][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3045.534533][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3045.569940][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3045.628464][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3045.644575][T17762] netlink: 196 bytes leftover after parsing attributes in process `syz.1.15181'. [ 3045.664487][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3045.696957][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3045.738636][T17581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3046.893611][T17786] FAULT_INJECTION: forcing a failure. [ 3046.893611][T17786] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3046.920721][T17786] CPU: 0 PID: 17786 Comm: syz.6.15188 Not tainted syzkaller #0 [ 3046.928359][T17786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3046.938475][T17786] Call Trace: [ 3046.941798][T17786] [ 3046.944773][T17786] dump_stack_lvl+0x188/0x24e [ 3046.949608][T17786] ? show_regs_print_info+0x12/0x12 [ 3046.954867][T17786] ? load_image+0x400/0x400 [ 3046.959424][T17786] ? __lock_acquire+0x7d10/0x7d10 [ 3046.964702][T17786] should_fail_ex+0x399/0x4d0 [ 3046.969438][T17786] _copy_from_user+0x2c/0x170 [ 3046.974177][T17786] __sys_bpf+0x2ea/0x780 [ 3046.978477][T17786] ? bpf_link_show_fdinfo+0x380/0x380 [ 3046.983916][T17786] ? lock_chain_count+0x20/0x20 [ 3046.988837][T17786] __x64_sys_bpf+0x78/0x90 [ 3046.993304][T17786] do_syscall_64+0x4c/0xa0 [ 3046.997773][T17786] ? clear_bhb_loop+0x60/0xb0 [ 3047.002494][T17786] ? clear_bhb_loop+0x60/0xb0 [ 3047.007207][T17786] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3047.013132][T17786] RIP: 0033:0x7f8dd0f9c819 [ 3047.017578][T17786] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3047.037219][T17786] RSP: 002b:00007f8dd1f2e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3047.045659][T17786] RAX: ffffffffffffffda RBX: 00007f8dd1215fa0 RCX: 00007f8dd0f9c819 [ 3047.053658][T17786] RDX: 0000000000000070 RSI: 00002000000000c0 RDI: 0000000000000005 [ 3047.061792][T17786] RBP: 00007f8dd1f2e090 R08: 0000000000000000 R09: 0000000000000000 [ 3047.069789][T17786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3047.077798][T17786] R13: 00007f8dd1216038 R14: 00007f8dd1215fa0 R15: 00007ffeee187748 [ 3047.085811][T17786] [ 3047.176834][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3047.194445][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3047.209923][T17581] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3047.570243][T17802] FAULT_INJECTION: forcing a failure. [ 3047.570243][T17802] name failslab, interval 1, probability 0, space 0, times 0 [ 3047.585870][T17804] tap0: tun_chr_ioctl cmd 1074025692 [ 3047.629769][T17802] CPU: 1 PID: 17802 Comm: syz.4.15194 Not tainted syzkaller #0 [ 3047.637429][T17802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3047.647550][T17802] Call Trace: [ 3047.650887][T17802] [ 3047.653865][T17802] dump_stack_lvl+0x188/0x24e [ 3047.658621][T17802] ? show_regs_print_info+0x12/0x12 [ 3047.663901][T17802] ? load_image+0x400/0x400 [ 3047.668480][T17802] ? __might_sleep+0xd0/0xd0 [ 3047.673130][T17802] ? __lock_acquire+0x7d10/0x7d10 [ 3047.678239][T17802] ? __might_sleep+0xd0/0xd0 [ 3047.682888][T17802] should_fail_ex+0x399/0x4d0 [ 3047.687635][T17802] should_failslab+0x5/0x20 [ 3047.692304][T17802] slab_pre_alloc_hook+0x59/0x310 [ 3047.697402][T17802] kmem_cache_alloc_lru+0x49/0x2e0 [ 3047.702571][T17802] ? sock_alloc_inode+0x24/0xc0 [ 3047.707495][T17802] sock_alloc_inode+0x24/0xc0 [ 3047.712257][T17802] ? sockfs_init_fs_context+0xa0/0xa0 [ 3047.717696][T17802] new_inode_pseudo+0x5f/0x1c0 [ 3047.722531][T17802] __sock_create+0x129/0x940 [ 3047.727188][T17802] ? __might_fault+0xa6/0x120 [ 3047.731998][T17802] ? __might_fault+0xc2/0x120 [ 3047.736741][T17802] __sys_socketpair+0x1bd/0x540 [ 3047.741682][T17802] __x64_sys_socketpair+0x97/0xb0 [ 3047.746782][T17802] do_syscall_64+0x4c/0xa0 [ 3047.751266][T17802] ? clear_bhb_loop+0x60/0xb0 [ 3047.756009][T17802] ? clear_bhb_loop+0x60/0xb0 [ 3047.760749][T17802] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3047.766717][T17802] RIP: 0033:0x7f80c099c819 [ 3047.771188][T17802] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3047.790864][T17802] RSP: 002b:00007f80c180c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 3047.799345][T17802] RAX: ffffffffffffffda RBX: 00007f80c0c15fa0 RCX: 00007f80c099c819 [ 3047.807361][T17802] RDX: 0000000000000007 RSI: 0000000000000003 RDI: 0000000000000014 [ 3047.815361][T17802] RBP: 00007f80c180c090 R08: 0000000000000000 R09: 0000000000000000 [ 3047.823365][T17802] R10: 00002000000000c0 R11: 0000000000000246 R12: 0000000000000001 [ 3047.831371][T17802] R13: 00007f80c0c16038 R14: 00007f80c0c15fa0 R15: 00007ffd59c685a8 [ 3047.839406][T17802] [ 3048.293030][T17802] socket: no more sockets [ 3048.788308][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3048.805528][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3048.871890][T17581] device veth0_vlan entered promiscuous mode [ 3048.904088][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3048.922688][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3048.959038][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3049.017924][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3049.052555][T17581] device veth1_vlan entered promiscuous mode [ 3049.160287][T17849] netlink: 14 bytes leftover after parsing attributes in process `syz.4.15203'. [ 3049.250010][T17850] FAULT_INJECTION: forcing a failure. [ 3049.250010][T17850] name failslab, interval 1, probability 0, space 0, times 0 [ 3049.300321][T17850] CPU: 1 PID: 17850 Comm: syz.5.15202 Not tainted syzkaller #0 [ 3049.307974][T17850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3049.318080][T17850] Call Trace: [ 3049.321410][T17850] [ 3049.324385][T17850] dump_stack_lvl+0x188/0x24e [ 3049.329144][T17850] ? show_regs_print_info+0x12/0x12 [ 3049.334398][T17850] ? load_image+0x400/0x400 [ 3049.339053][T17850] ? __might_sleep+0xd0/0xd0 [ 3049.343689][T17850] ? __lock_acquire+0x7d10/0x7d10 [ 3049.348775][T17850] should_fail_ex+0x399/0x4d0 [ 3049.353500][T17850] should_failslab+0x5/0x20 [ 3049.358049][T17850] slab_pre_alloc_hook+0x59/0x310 [ 3049.363122][T17850] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3049.368902][T17850] __kmem_cache_alloc_node+0x4f/0x260 [ 3049.374326][T17850] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3049.380106][T17850] __kmalloc+0xa0/0x240 [ 3049.384321][T17850] tomoyo_realpath_from_path+0xdf/0x5d0 [ 3049.389943][T17850] ? tomoyo_path_number_perm+0x205/0x650 [ 3049.395633][T17850] tomoyo_path_number_perm+0x22f/0x650 [ 3049.401151][T17850] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 3049.406673][T17850] ? ksys_write+0x1c0/0x250 [ 3049.411235][T17850] ? common_file_perm+0x171/0x1c0 [ 3049.416345][T17850] ? __fget_files+0x28/0x4b0 [ 3049.420995][T17850] ? __fget_files+0x28/0x4b0 [ 3049.425651][T17850] security_file_ioctl+0x6c/0xa0 [ 3049.430648][T17850] __se_sys_ioctl+0x48/0x170 [ 3049.435299][T17850] do_syscall_64+0x4c/0xa0 [ 3049.439773][T17850] ? clear_bhb_loop+0x60/0xb0 [ 3049.444507][T17850] ? clear_bhb_loop+0x60/0xb0 [ 3049.449243][T17850] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3049.455190][T17850] RIP: 0033:0x7f17b8b9c819 [ 3049.459656][T17850] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3049.479332][T17850] RSP: 002b:00007f17b6dd5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3049.487806][T17850] RAX: ffffffffffffffda RBX: 00007f17b8e16090 RCX: 00007f17b8b9c819 [ 3049.495874][T17850] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 000000000000000e [ 3049.503899][T17850] RBP: 00007f17b6dd5090 R08: 0000000000000000 R09: 0000000000000000 [ 3049.511916][T17850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3049.519930][T17850] R13: 00007f17b8e16128 R14: 00007f17b8e16090 R15: 00007ffd6ee53328 [ 3049.527970][T17850] [ 3049.567979][T17850] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3049.810513][T17849] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3050.018751][T17849] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3050.079169][T17849] bond0 (unregistering): (slave bridge0): Releasing backup interface [ 3050.099250][T17849] bridge0: port 2(bridge_slave_1) entered disabled state [ 3050.130295][T17849] bond0 (unregistering): (slave netdevsim0): Releasing backup interface [ 3050.159154][T17849] bond0 (unregistering): Released all slaves [ 3050.195816][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3050.208534][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3050.347200][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3050.380658][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3050.402773][T17581] device veth0_macvtap entered promiscuous mode [ 3050.439515][T17581] device veth1_macvtap entered promiscuous mode [ 3050.476737][T17871] netlink: 14548 bytes leftover after parsing attributes in process `syz.4.15206'. [ 3050.507287][T17581] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3050.526078][T17581] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3050.571256][T17581] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3050.590643][T17875] FAULT_INJECTION: forcing a failure. [ 3050.590643][T17875] name failslab, interval 1, probability 0, space 0, times 0 [ 3050.605921][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3050.620833][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3050.641415][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3050.717606][T17875] CPU: 0 PID: 17875 Comm: syz.5.15208 Not tainted syzkaller #0 [ 3050.724182][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3050.725221][T17875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3050.743417][T17875] Call Trace: [ 3050.746743][T17875] [ 3050.749719][T17875] dump_stack_lvl+0x188/0x24e [ 3050.754464][T17875] ? show_regs_print_info+0x12/0x12 [ 3050.759725][T17875] ? load_image+0x400/0x400 [ 3050.764284][T17875] ? __might_sleep+0xd0/0xd0 [ 3050.768906][T17875] ? __lock_acquire+0x7d10/0x7d10 [ 3050.773971][T17875] ? verify_lock_unused+0x140/0x140 [ 3050.779207][T17875] should_fail_ex+0x399/0x4d0 [ 3050.783917][T17875] should_failslab+0x5/0x20 [ 3050.788443][T17875] slab_pre_alloc_hook+0x59/0x310 [ 3050.793503][T17875] ? __get_vm_area_node+0x122/0x330 [ 3050.798810][T17875] __kmem_cache_alloc_node+0x4f/0x260 [ 3050.804210][T17875] ? __get_vm_area_node+0x122/0x330 [ 3050.809435][T17875] kmalloc_node_trace+0x22/0xe0 [ 3050.814327][T17875] __get_vm_area_node+0x122/0x330 [ 3050.819430][T17875] ? __local_bh_enable_ip+0x136/0x1c0 [ 3050.824834][T17875] __vmalloc_node_range+0x357/0x13b0 [ 3050.830154][T17875] ? netlink_sendmsg+0x5ec/0xbd0 [ 3050.835234][T17875] ? netlink_insert+0x1034/0x13c0 [ 3050.840334][T17875] ? free_vm_area+0x50/0x50 [ 3050.844887][T17875] ? netlink_sendmsg+0x5ec/0xbd0 [ 3050.849872][T17875] vmalloc+0x75/0x80 [ 3050.853802][T17875] ? netlink_sendmsg+0x5ec/0xbd0 [ 3050.858773][T17875] netlink_sendmsg+0x5ec/0xbd0 [ 3050.863580][T17875] ? netlink_getsockopt+0x550/0x550 [ 3050.868816][T17875] ? aa_file_perm+0x3ea/0xf00 [ 3050.873521][T17875] ? aa_file_perm+0x112/0xf00 [ 3050.878221][T17875] ? aa_sock_msg_perm+0x94/0x150 [ 3050.883184][T17875] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 3050.888526][T17875] ? security_socket_sendmsg+0x7c/0xa0 [ 3050.894024][T17875] sock_write_iter+0x2d9/0x3e0 [ 3050.898859][T17875] ? sock_read_iter+0x3a0/0x3a0 [ 3050.903740][T17875] ? common_file_perm+0x171/0x1c0 [ 3050.908796][T17875] vfs_write+0x4b1/0xa30 [ 3050.913081][T17875] ? file_end_write+0x250/0x250 [ 3050.917965][T17875] ? __fget_files+0x43d/0x4b0 [ 3050.922679][T17875] ? __fdget_pos+0x1d4/0x360 [ 3050.927308][T17875] ? ksys_write+0x71/0x250 [ 3050.931763][T17875] ksys_write+0x14c/0x250 [ 3050.936132][T17875] ? __ia32_sys_read+0x80/0x80 [ 3050.940935][T17875] ? lockdep_hardirqs_on+0x94/0x140 [ 3050.946167][T17875] do_syscall_64+0x4c/0xa0 [ 3050.950615][T17875] ? clear_bhb_loop+0x60/0xb0 [ 3050.955324][T17875] ? clear_bhb_loop+0x60/0xb0 [ 3050.960031][T17875] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3050.965963][T17875] RIP: 0033:0x7f17b8b9c819 [ 3050.970426][T17875] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3050.990082][T17875] RSP: 002b:00007f17b6df6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3050.998526][T17875] RAX: ffffffffffffffda RBX: 00007f17b8e15fa0 RCX: 00007f17b8b9c819 [ 3051.006608][T17875] RDX: 0000000000033fe0 RSI: 0000200000000000 RDI: 0000000000000003 [ 3051.015122][T17875] RBP: 00007f17b6df6090 R08: 0000000000000000 R09: 0000000000000000 [ 3051.023285][T17875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3051.031307][T17875] R13: 00007f17b8e16038 R14: 00007f17b8e15fa0 R15: 00007ffd6ee53328 [ 3051.039327][T17875] [ 3051.080731][T17581] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3051.107631][T17581] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3051.125477][T17581] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3051.144861][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3051.160644][T17875] syz.5.15208: vmalloc error: size 213312, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz5,mems_allowed=0-1 [ 3051.175670][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3051.200454][T17581] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3051.222183][T17581] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3051.251816][T17581] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3051.265479][T17875] CPU: 1 PID: 17875 Comm: syz.5.15208 Not tainted syzkaller #0 [ 3051.273116][T17875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3051.283220][T17875] Call Trace: [ 3051.286568][T17875] [ 3051.289540][T17875] dump_stack_lvl+0x188/0x24e [ 3051.294276][T17875] ? cpuset_print_current_mems_allowed+0x1b/0x360 [ 3051.300919][T17875] ? show_regs_print_info+0x12/0x12 [ 3051.306264][T17875] ? load_image+0x400/0x400 [ 3051.310823][T17875] ? cpuset_print_current_mems_allowed+0x1b/0x360 [ 3051.317288][T17875] ? cpuset_print_current_mems_allowed+0x2e3/0x360 [ 3051.323841][T17875] warn_alloc+0x242/0x330 [ 3051.328251][T17875] ? __get_vm_area_node+0x122/0x330 [ 3051.333524][T17875] ? zone_watermark_ok_safe+0x270/0x270 [ 3051.339130][T17875] ? rcu_is_watching+0x11/0xa0 [ 3051.344122][T17875] ? __get_vm_area_node+0x318/0x330 [ 3051.349371][T17875] ? __local_bh_enable_ip+0x136/0x1c0 [ 3051.354795][T17875] __vmalloc_node_range+0x37c/0x13b0 [ 3051.360143][T17875] ? netlink_insert+0x1034/0x13c0 [ 3051.365247][T17875] ? free_vm_area+0x50/0x50 [ 3051.369812][T17875] ? netlink_sendmsg+0x5ec/0xbd0 [ 3051.374892][T17875] vmalloc+0x75/0x80 [ 3051.378837][T17875] ? netlink_sendmsg+0x5ec/0xbd0 [ 3051.383832][T17875] netlink_sendmsg+0x5ec/0xbd0 [ 3051.388662][T17875] ? netlink_getsockopt+0x550/0x550 [ 3051.393912][T17875] ? aa_file_perm+0x3ea/0xf00 [ 3051.398638][T17875] ? aa_file_perm+0x112/0xf00 [ 3051.403399][T17875] ? aa_sock_msg_perm+0x94/0x150 [ 3051.408385][T17875] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 3051.413730][T17875] ? security_socket_sendmsg+0x7c/0xa0 [ 3051.419249][T17875] sock_write_iter+0x2d9/0x3e0 [ 3051.424148][T17875] ? sock_read_iter+0x3a0/0x3a0 [ 3051.429055][T17875] ? common_file_perm+0x171/0x1c0 [ 3051.434134][T17875] vfs_write+0x4b1/0xa30 [ 3051.438435][T17875] ? file_end_write+0x250/0x250 [ 3051.443374][T17875] ? __fget_files+0x43d/0x4b0 [ 3051.448117][T17875] ? __fdget_pos+0x1d4/0x360 [ 3051.452860][T17875] ? ksys_write+0x71/0x250 [ 3051.457342][T17875] ksys_write+0x14c/0x250 [ 3051.461737][T17875] ? __ia32_sys_read+0x80/0x80 [ 3051.466565][T17875] ? lockdep_hardirqs_on+0x94/0x140 [ 3051.471908][T17875] do_syscall_64+0x4c/0xa0 [ 3051.476379][T17875] ? clear_bhb_loop+0x60/0xb0 [ 3051.481109][T17875] ? clear_bhb_loop+0x60/0xb0 [ 3051.485861][T17875] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3051.491801][T17875] RIP: 0033:0x7f17b8b9c819 [ 3051.496260][T17875] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3051.516004][T17875] RSP: 002b:00007f17b6df6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3051.524474][T17875] RAX: ffffffffffffffda RBX: 00007f17b8e15fa0 RCX: 00007f17b8b9c819 [ 3051.532500][T17875] RDX: 0000000000033fe0 RSI: 0000200000000000 RDI: 0000000000000003 [ 3051.540520][T17875] RBP: 00007f17b6df6090 R08: 0000000000000000 R09: 0000000000000000 [ 3051.548543][T17875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3051.556652][T17875] R13: 00007f17b8e16038 R14: 00007f17b8e15fa0 R15: 00007ffd6ee53328 [ 3051.564685][T17875] [ 3051.583061][T17581] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3051.731452][ T9105] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3051.759715][ T9105] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3051.787374][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 3051.832298][T11932] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3051.838565][T17875] Mem-Info: [ 3051.843812][T17875] active_anon:18227 inactive_anon:0 isolated_anon:0 [ 3051.843812][T17875] active_file:21474 inactive_file:41121 isolated_file:0 [ 3051.843812][T17875] unevictable:768 dirty:489 writeback:0 [ 3051.843812][T17875] slab_reclaimable:21888 slab_unreclaimable:99495 [ 3051.843812][T17875] mapped:42223 shmem:9043 pagetables:844 [ 3051.843812][T17875] sec_pagetables:0 bounce:0 [ 3051.843812][T17875] kernel_misc_reclaimable:0 [ 3051.843812][T17875] free:1301259 free_pcp:5475 free_cma:0 [ 3051.851461][T11932] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3051.942263][T11932] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 3051.977659][T17875] Node 0 active_anon:73108kB inactive_anon:0kB active_file:85896kB inactive_file:164280kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:156892kB dirty:1952kB writeback:0kB shmem:34936kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:10912kB pagetables:3276kB sec_pagetables:0kB all_unreclaimable? no [ 3052.139346][T17875] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:1536kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB sec_pagetables:0kB all_unreclaimable? no [ 3052.327580][T17875] Node 0 DMA free:15360kB boost:0kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3052.375119][T17911] FAULT_INJECTION: forcing a failure. [ 3052.375119][T17911] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3052.408618][T17911] CPU: 0 PID: 17911 Comm: syz.1.15214 Not tainted syzkaller #0 [ 3052.416253][T17911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3052.426363][T17911] Call Trace: [ 3052.429680][T17911] [ 3052.432650][T17911] dump_stack_lvl+0x188/0x24e [ 3052.437385][T17911] ? show_regs_print_info+0x12/0x12 [ 3052.442654][T17911] ? load_image+0x400/0x400 [ 3052.447252][T17911] ? __lock_acquire+0x7d10/0x7d10 [ 3052.452339][T17911] should_fail_ex+0x399/0x4d0 [ 3052.456123][T17875] lowmem_reserve[]: 0 [ 3052.457144][T17911] _copy_from_user+0x2c/0x170 [ 3052.465917][T17911] __sys_bpf+0x2ea/0x780 [ 3052.470199][T17911] ? bpf_link_show_fdinfo+0x380/0x380 [ 3052.475626][T17911] ? lock_chain_count+0x20/0x20 [ 3052.480504][T17911] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 3052.486535][T17911] __x64_sys_bpf+0x78/0x90 [ 3052.491003][T17911] do_syscall_64+0x4c/0xa0 [ 3052.495469][T17911] ? clear_bhb_loop+0x60/0xb0 [ 3052.500184][T17911] ? clear_bhb_loop+0x60/0xb0 [ 3052.504905][T17911] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3052.510919][T17911] RIP: 0033:0x7ffa6099c819 [ 3052.515396][T17911] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3052.535036][T17911] RSP: 002b:00007ffa6193f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3052.543488][T17911] RAX: ffffffffffffffda RBX: 00007ffa60c15fa0 RCX: 00007ffa6099c819 [ 3052.551494][T17911] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 3052.559489][T17911] RBP: 00007ffa6193f090 R08: 0000000000000000 R09: 0000000000000000 [ 3052.567500][T17911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3052.575527][T17911] R13: 00007ffa60c16038 R14: 00007ffa60c15fa0 R15: 00007fff56ee7478 [ 3052.583557][T17911] [ 3052.627580][T17875] 2527 2528 2528 2528 [ 3052.631841][T17875] Node 0 DMA32 free:1266800kB boost:0kB min:34692kB low:43364kB high:52036kB reserved_highatomic:0KB active_anon:85180kB inactive_anon:0kB active_file:85896kB inactive_file:164280kB unevictable:1536kB writepending:1952kB present:3129332kB managed:2592972kB mlocked:0kB bounce:0kB free_pcp:13636kB local_pcp:2532kB free_cma:0kB [ 3052.726079][T17875] lowmem_reserve[]: 0 0 1 1 1 [ 3052.766518][T17875] Node 0 Normal free:4kB boost:0kB min:16kB low:20kB high:24kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:1424kB mlocked:0kB bounce:0kB free_pcp:20kB local_pcp:12kB free_cma:0kB [ 3052.865907][T17920] netlink: 134056 bytes leftover after parsing attributes in process `syz.6.15217'. [ 3052.875960][T17875] lowmem_reserve[]: 0 0 0 0 0 [ 3052.927831][T17875] Node 1 Normal free:3912288kB boost:0kB min:55192kB low:68988kB high:82784kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB writepending:4kB present:4194304kB managed:4117620kB mlocked:0kB bounce:0kB free_pcp:7264kB local_pcp:7264kB free_cma:0kB [ 3052.997172][T17875] lowmem_reserve[]: 0 0 0 0 0 [ 3053.002465][T17875] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 3053.015824][T17875] Node 0 DMA32: 5*4kB (ME) 4*8kB (UME) 21*16kB (UME) 1353*32kB (UME) 1027*64kB (UME) 741*128kB (UME) 192*256kB (UM) 71*512kB (UME) 25*1024kB (UM) 17*2048kB (UM) 222*4096kB (UM) = 1259492kB [ 3053.034321][T17923] FAULT_INJECTION: forcing a failure. [ 3053.034321][T17923] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3053.036482][T17875] Node 0 Normal: 1*4kB (U) 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 4kB [ 3053.077046][T17923] CPU: 1 PID: 17923 Comm: syz.1.15218 Not tainted syzkaller #0 [ 3053.088465][T17923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3053.098567][T17923] Call Trace: [ 3053.101897][T17923] [ 3053.104925][T17923] dump_stack_lvl+0x188/0x24e [ 3053.109682][T17923] ? show_regs_print_info+0x12/0x12 [ 3053.114946][T17923] ? load_image+0x400/0x400 [ 3053.119507][T17923] ? __lock_acquire+0x7d10/0x7d10 [ 3053.124584][T17923] ? trace_call_bpf+0x5d6/0x6b0 [ 3053.129564][T17923] should_fail_ex+0x399/0x4d0 [ 3053.134295][T17923] _copy_from_user+0x2c/0x170 [ 3053.139024][T17923] __sys_bpf+0x2ea/0x780 [ 3053.143330][T17923] ? bpf_link_show_fdinfo+0x380/0x380 [ 3053.148813][T17923] ? lock_chain_count+0x20/0x20 [ 3053.153739][T17923] __x64_sys_bpf+0x78/0x90 [ 3053.158221][T17923] do_syscall_64+0x4c/0xa0 [ 3053.162696][T17923] ? clear_bhb_loop+0x60/0xb0 [ 3053.167432][T17923] ? clear_bhb_loop+0x60/0xb0 [ 3053.172209][T17923] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3053.178154][T17923] RIP: 0033:0x7ffa6099c819 [ 3053.182612][T17923] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3053.202291][T17923] RSP: 002b:00007ffa6193f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3053.210744][T17923] RAX: ffffffffffffffda RBX: 00007ffa60c15fa0 RCX: 00007ffa6099c819 [ 3053.218739][T17923] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 3053.226733][T17923] RBP: 00007ffa6193f090 R08: 0000000000000000 R09: 0000000000000000 [ 3053.234729][T17923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3053.242728][T17923] R13: 00007ffa60c16038 R14: 00007ffa60c15fa0 R15: 00007fff56ee7478 [ 3053.250735][T17923] [ 3053.289764][T17875] Node 1 Normal: 238*4kB (UME) 57*8kB (UME) 36*16kB (UME) 181*32kB (UE) 70*64kB (UME) 31*128kB (UME) 9*256kB (UM) 3*512kB (UM) 1*1024kB (E) 2*2048kB (UE) 949*4096kB (M) = 3912288kB [ 3053.417779][T17875] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3053.469254][T17875] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 3053.527360][T17875] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3053.614454][T17875] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 3053.675902][T17875] 78367 total pagecache pages [ 3053.736834][T17875] 0 pages in swap cache [ 3053.768145][T17875] Free swap = 124996kB [ 3053.790911][T17875] Total swap = 124996kB [ 3053.801532][T17875] 2097051 pages RAM [ 3053.824221][T17875] 0 pages HighMem/MovableOnly [ 3053.840993][T17875] 415207 pages reserved [ 3053.875691][T17875] 0 pages cma reserved [ 3054.080975][T17920] syz.6.15217 (17920) used greatest stack depth: 15768 bytes left [ 3054.161935][T17939] netlink: 14548 bytes leftover after parsing attributes in process `syz.1.15222'. [ 3054.198215][T17941] FAULT_INJECTION: forcing a failure. [ 3054.198215][T17941] name failslab, interval 1, probability 0, space 0, times 0 [ 3054.236323][T17941] CPU: 1 PID: 17941 Comm: syz.6.15223 Not tainted syzkaller #0 [ 3054.243957][T17941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3054.254067][T17941] Call Trace: [ 3054.257390][T17941] [ 3054.260363][T17941] dump_stack_lvl+0x188/0x24e [ 3054.265115][T17941] ? show_regs_print_info+0x12/0x12 [ 3054.270377][T17941] ? load_image+0x400/0x400 [ 3054.274933][T17941] ? __might_sleep+0xd0/0xd0 [ 3054.279661][T17941] ? __lock_acquire+0x7d10/0x7d10 [ 3054.284751][T17941] ? verify_lock_unused+0x140/0x140 [ 3054.290064][T17941] should_fail_ex+0x399/0x4d0 [ 3054.294792][T17941] should_failslab+0x5/0x20 [ 3054.299336][T17941] slab_pre_alloc_hook+0x59/0x310 [ 3054.304413][T17941] ? __get_vm_area_node+0x122/0x330 [ 3054.309663][T17941] __kmem_cache_alloc_node+0x4f/0x260 [ 3054.315097][T17941] ? __get_vm_area_node+0x122/0x330 [ 3054.320361][T17941] kmalloc_node_trace+0x22/0xe0 [ 3054.325286][T17941] __get_vm_area_node+0x122/0x330 [ 3054.330370][T17941] ? __local_bh_enable_ip+0x136/0x1c0 [ 3054.335800][T17941] __vmalloc_node_range+0x357/0x13b0 [ 3054.341148][T17941] ? netlink_sendmsg+0x5ec/0xbd0 [ 3054.346154][T17941] ? netlink_insert+0x1034/0x13c0 [ 3054.351279][T17941] ? free_vm_area+0x50/0x50 [ 3054.355853][T17941] ? netlink_sendmsg+0x5ec/0xbd0 [ 3054.360851][T17941] vmalloc+0x75/0x80 [ 3054.364797][T17941] ? netlink_sendmsg+0x5ec/0xbd0 [ 3054.369804][T17941] netlink_sendmsg+0x5ec/0xbd0 [ 3054.374639][T17941] ? netlink_getsockopt+0x550/0x550 [ 3054.379904][T17941] ? aa_file_perm+0x3ea/0xf00 [ 3054.384644][T17941] ? aa_file_perm+0x112/0xf00 [ 3054.389378][T17941] ? aa_sock_msg_perm+0x94/0x150 [ 3054.394366][T17941] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 3054.399705][T17941] ? security_socket_sendmsg+0x7c/0xa0 [ 3054.405278][T17941] sock_write_iter+0x2d9/0x3e0 [ 3054.410103][T17941] ? sock_read_iter+0x3a0/0x3a0 [ 3054.415018][T17941] ? common_file_perm+0x171/0x1c0 [ 3054.420229][T17941] vfs_write+0x4b1/0xa30 [ 3054.424559][T17941] ? file_end_write+0x250/0x250 [ 3054.429478][T17941] ? __fget_files+0x43d/0x4b0 [ 3054.434224][T17941] ? __fdget_pos+0x1d4/0x360 [ 3054.438876][T17941] ? ksys_write+0x71/0x250 [ 3054.443351][T17941] ksys_write+0x14c/0x250 [ 3054.447736][T17941] ? __ia32_sys_read+0x80/0x80 [ 3054.452559][T17941] ? lockdep_hardirqs_on+0x94/0x140 [ 3054.457815][T17941] do_syscall_64+0x4c/0xa0 [ 3054.462288][T17941] ? clear_bhb_loop+0x60/0xb0 [ 3054.467029][T17941] ? clear_bhb_loop+0x60/0xb0 [ 3054.471770][T17941] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3054.477721][T17941] RIP: 0033:0x7f8dd0f9c819 [ 3054.482184][T17941] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3054.501855][T17941] RSP: 002b:00007f8dd1f2e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3054.510346][T17941] RAX: ffffffffffffffda RBX: 00007f8dd1215fa0 RCX: 00007f8dd0f9c819 [ 3054.518377][T17941] RDX: 0000000000033fe0 RSI: 0000200000000000 RDI: 0000000000000003 [ 3054.526402][T17941] RBP: 00007f8dd1f2e090 R08: 0000000000000000 R09: 0000000000000000 [ 3054.534431][T17941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3054.542453][T17941] R13: 00007f8dd1216038 R14: 00007f8dd1215fa0 R15: 00007ffeee187748 [ 3054.550493][T17941] [ 3054.632459][T17947] FAULT_INJECTION: forcing a failure. [ 3054.632459][T17947] name failslab, interval 1, probability 0, space 0, times 0 [ 3054.645582][T17947] CPU: 1 PID: 17947 Comm: syz.1.15226 Not tainted syzkaller #0 [ 3054.653191][T17947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3054.663298][T17947] Call Trace: [ 3054.666630][T17947] [ 3054.669603][T17947] dump_stack_lvl+0x188/0x24e [ 3054.674350][T17947] ? show_regs_print_info+0x12/0x12 [ 3054.679622][T17947] ? load_image+0x400/0x400 [ 3054.684185][T17947] ? __lock_acquire+0x7d10/0x7d10 [ 3054.689281][T17947] ? __lock_acquire+0x7d10/0x7d10 [ 3054.694378][T17947] should_fail_ex+0x399/0x4d0 [ 3054.699123][T17947] should_failslab+0x5/0x20 [ 3054.703669][T17947] slab_pre_alloc_hook+0x59/0x310 [ 3054.708739][T17947] ? __mutex_unlock_slowpath+0x1b0/0x6c0 [ 3054.714478][T17947] kmem_cache_alloc_lru+0x49/0x2e0 [ 3054.719615][T17947] ? sock_alloc_inode+0x24/0xc0 [ 3054.724504][T17947] sock_alloc_inode+0x24/0xc0 [ 3054.729218][T17947] ? sockfs_init_fs_context+0xa0/0xa0 [ 3054.734621][T17947] new_inode_pseudo+0x5f/0x1c0 [ 3054.739419][T17947] __sock_create+0x129/0x940 [ 3054.744042][T17947] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 3054.750069][T17947] __sys_socket+0xc4/0x190 [ 3054.754524][T17947] __x64_sys_socket+0x76/0x80 [ 3054.759233][T17947] do_syscall_64+0x4c/0xa0 [ 3054.763685][T17947] ? clear_bhb_loop+0x60/0xb0 [ 3054.768392][T17947] ? clear_bhb_loop+0x60/0xb0 [ 3054.773102][T17947] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3054.779029][T17947] RIP: 0033:0x7ffa6099c819 [ 3054.783467][T17947] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3054.803096][T17947] RSP: 002b:00007ffa6193f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 3054.811564][T17947] RAX: ffffffffffffffda RBX: 00007ffa60c15fa0 RCX: 00007ffa6099c819 [ 3054.819563][T17947] RDX: 0000000000000002 RSI: 0000000000000003 RDI: 000000000000000f [ 3054.827553][T17947] RBP: 00007ffa6193f090 R08: 0000000000000000 R09: 0000000000000000 [ 3054.835546][T17947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3054.843545][T17947] R13: 00007ffa60c16038 R14: 00007ffa60c15fa0 R15: 00007fff56ee7478 [ 3054.851558][T17947] [ 3055.001117][T17949] netlink: 'syz.5.15224': attribute type 10 has an invalid length. [ 3055.023921][T17949] bond0: (slave netdevsim0): Enslaving as an active interface with an up link [ 3055.050824][T17947] socket: no more sockets [ 3056.012870][T17983] netlink: 14 bytes leftover after parsing attributes in process `syz.7.15235'. [ 3056.457218][T17983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3056.618832][T17983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3056.688313][T17983] bond0 (unregistering): Released all slaves [ 3056.813946][T17986] netlink: 14548 bytes leftover after parsing attributes in process `syz.4.15238'. [ 3057.242017][T18001] tap0: tun_chr_ioctl cmd 1074025677 [ 3057.255089][T18001] tap0: linktype set to 0 [ 3057.270543][T18001] tap0: tun_chr_ioctl cmd 2148553947 [ 3057.286632][T18001] tap0: tun_chr_ioctl cmd 1074025698 [ 3057.331600][T18002] FAULT_INJECTION: forcing a failure. [ 3057.331600][T18002] name failslab, interval 1, probability 0, space 0, times 0 [ 3057.413807][T18002] CPU: 1 PID: 18002 Comm: syz.5.15241 Not tainted syzkaller #0 [ 3057.421446][T18002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3057.431553][T18002] Call Trace: [ 3057.434872][T18002] [ 3057.437837][T18002] dump_stack_lvl+0x188/0x24e [ 3057.442578][T18002] ? show_regs_print_info+0x12/0x12 [ 3057.447833][T18002] ? load_image+0x400/0x400 [ 3057.452396][T18002] ? __might_sleep+0xd0/0xd0 [ 3057.457030][T18002] ? __lock_acquire+0x7d10/0x7d10 [ 3057.462109][T18002] ? perf_trace_preemptirq_template+0x268/0x320 [ 3057.468577][T18002] should_fail_ex+0x399/0x4d0 [ 3057.473310][T18002] should_failslab+0x5/0x20 [ 3057.477866][T18002] slab_pre_alloc_hook+0x59/0x310 [ 3057.482949][T18002] ? lock_chain_count+0x20/0x20 [ 3057.487857][T18002] ? __get_vm_area_node+0x122/0x330 [ 3057.493121][T18002] __kmem_cache_alloc_node+0x4f/0x260 [ 3057.498554][T18002] ? __get_vm_area_node+0x122/0x330 [ 3057.503809][T18002] kmalloc_node_trace+0x22/0xe0 [ 3057.508859][T18002] __get_vm_area_node+0x122/0x330 [ 3057.513929][T18002] ? __vmalloc_node_range+0xfc/0x13b0 [ 3057.519336][T18002] __vmalloc_node_range+0x357/0x13b0 [ 3057.524666][T18002] ? netlink_sendmsg+0x5ec/0xbd0 [ 3057.529648][T18002] ? netlink_insert+0x1034/0x13c0 [ 3057.534730][T18002] ? free_vm_area+0x50/0x50 [ 3057.539275][T18002] ? netlink_sendmsg+0x5ec/0xbd0 [ 3057.544245][T18002] vmalloc+0x75/0x80 [ 3057.548171][T18002] ? netlink_sendmsg+0x5ec/0xbd0 [ 3057.553153][T18002] netlink_sendmsg+0x5ec/0xbd0 [ 3057.557975][T18002] ? netlink_getsockopt+0x550/0x550 [ 3057.563219][T18002] ? aa_file_perm+0x3ea/0xf00 [ 3057.567933][T18002] ? aa_file_perm+0x112/0xf00 [ 3057.572640][T18002] ? aa_sock_msg_perm+0x94/0x150 [ 3057.577608][T18002] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 3057.582920][T18002] ? security_socket_sendmsg+0x7c/0xa0 [ 3057.588419][T18002] sock_write_iter+0x2d9/0x3e0 [ 3057.593215][T18002] ? sock_read_iter+0x3a0/0x3a0 [ 3057.598101][T18002] ? common_file_perm+0x171/0x1c0 [ 3057.603161][T18002] vfs_write+0x4b1/0xa30 [ 3057.607442][T18002] ? file_end_write+0x250/0x250 [ 3057.612333][T18002] ? __fget_files+0x43d/0x4b0 [ 3057.617049][T18002] ? __fdget_pos+0x1d4/0x360 [ 3057.621673][T18002] ? ksys_write+0x71/0x250 [ 3057.626135][T18002] ksys_write+0x14c/0x250 [ 3057.630501][T18002] ? __ia32_sys_read+0x80/0x80 [ 3057.635309][T18002] ? syscall_enter_from_user_mode+0x2a/0x80 [ 3057.641239][T18002] do_syscall_64+0x4c/0xa0 [ 3057.645687][T18002] ? clear_bhb_loop+0x60/0xb0 [ 3057.650404][T18002] ? clear_bhb_loop+0x60/0xb0 [ 3057.655113][T18002] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3057.661038][T18002] RIP: 0033:0x7f17b8b9c819 [ 3057.665475][T18002] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3057.685125][T18002] RSP: 002b:00007f17b6df6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3057.693573][T18002] RAX: ffffffffffffffda RBX: 00007f17b8e15fa0 RCX: 00007f17b8b9c819 [ 3057.701659][T18002] RDX: 0000000000033fe0 RSI: 0000200000000000 RDI: 0000000000000003 [ 3057.709657][T18002] RBP: 00007f17b6df6090 R08: 0000000000000000 R09: 0000000000000000 [ 3057.717656][T18002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3057.725651][T18002] R13: 00007f17b8e16038 R14: 00007f17b8e15fa0 R15: 00007ffd6ee53328 [ 3057.733667][T18002] [ 3058.350294][T18023] FAULT_INJECTION: forcing a failure. [ 3058.350294][T18023] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3058.387594][T18023] CPU: 0 PID: 18023 Comm: syz.1.15249 Not tainted syzkaller #0 [ 3058.395297][T18023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3058.405416][T18023] Call Trace: [ 3058.408769][T18023] [ 3058.411756][T18023] dump_stack_lvl+0x188/0x24e [ 3058.416619][T18023] ? show_regs_print_info+0x12/0x12 [ 3058.421890][T18023] ? load_image+0x400/0x400 [ 3058.426465][T18023] ? perf_trace_lock+0x301/0x390 [ 3058.431471][T18023] ? __lock_acquire+0x7d10/0x7d10 [ 3058.436560][T18023] ? __mutex_trylock_common+0x155/0x260 [ 3058.442365][T18023] should_fail_ex+0x399/0x4d0 [ 3058.447132][T18023] _copy_from_iter+0x1c0/0x1130 [ 3058.452147][T18023] ? copyout_mc+0x110/0x110 [ 3058.456753][T18023] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 3058.462815][T18023] ? lock_chain_count+0x20/0x20 [ 3058.467719][T18023] ? _raw_spin_lock_irq+0xb7/0xf0 [ 3058.472809][T18023] ? _raw_spin_lock_irqsave+0x100/0x100 [ 3058.478412][T18023] ? page_copy_sane+0x4e/0x390 [ 3058.483239][T18023] copy_page_from_iter+0x77/0x100 [ 3058.488314][T18023] pipe_write+0x87f/0x1b20 [ 3058.492824][T18023] ? pipe_read+0x1260/0x1260 [ 3058.497468][T18023] ? end_current_label_crit_section+0x14b/0x170 [ 3058.503831][T18023] ? common_file_perm+0x171/0x1c0 [ 3058.508916][T18023] vfs_write+0x4b1/0xa30 [ 3058.513227][T18023] ? file_end_write+0x250/0x250 [ 3058.518146][T18023] ? __fget_files+0x43d/0x4b0 [ 3058.522891][T18023] ? __fdget_pos+0x1d4/0x360 [ 3058.527527][T18023] ? ksys_write+0x71/0x250 [ 3058.531998][T18023] ksys_write+0x14c/0x250 [ 3058.536376][T18023] ? __ia32_sys_read+0x80/0x80 [ 3058.541194][T18023] ? lockdep_hardirqs_on+0x94/0x140 [ 3058.546432][T18023] do_syscall_64+0x4c/0xa0 [ 3058.550897][T18023] ? clear_bhb_loop+0x60/0xb0 [ 3058.555607][T18023] ? clear_bhb_loop+0x60/0xb0 [ 3058.560328][T18023] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3058.566264][T18023] RIP: 0033:0x7ffa6099c819 [ 3058.570723][T18023] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3058.590367][T18023] RSP: 002b:00007ffa6193f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3058.598820][T18023] RAX: ffffffffffffffda RBX: 00007ffa60c15fa0 RCX: 00007ffa6099c819 [ 3058.606824][T18023] RDX: 000000000000009a RSI: 0000200000000000 RDI: 0000000000000000 [ 3058.614824][T18023] RBP: 00007ffa6193f090 R08: 0000000000000000 R09: 0000000000000000 [ 3058.622825][T18023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3058.630831][T18023] R13: 00007ffa60c16038 R14: 00007ffa60c15fa0 R15: 00007fff56ee7478 [ 3058.638958][T18023] [ 3058.939551][T18032] FAULT_INJECTION: forcing a failure. [ 3058.939551][T18032] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3058.997693][T18032] CPU: 1 PID: 18032 Comm: syz.1.15252 Not tainted syzkaller #0 [ 3059.005336][T18032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3059.015444][T18032] Call Trace: [ 3059.018857][T18032] [ 3059.021834][T18032] dump_stack_lvl+0x188/0x24e [ 3059.026581][T18032] ? show_regs_print_info+0x12/0x12 [ 3059.031852][T18032] ? load_image+0x400/0x400 [ 3059.036494][T18032] ? __lock_acquire+0x7d10/0x7d10 [ 3059.041579][T18032] ? snprintf+0xe5/0x140 [ 3059.045874][T18032] should_fail_ex+0x399/0x4d0 [ 3059.050611][T18032] _copy_to_user+0x2c/0x130 [ 3059.055171][T18032] simple_read_from_buffer+0xe3/0x150 [ 3059.060603][T18032] proc_fail_nth_read+0x1a6/0x220 [ 3059.065681][T18032] ? proc_fault_inject_write+0x310/0x310 [ 3059.071370][T18032] ? fsnotify_perm+0x248/0x550 [ 3059.076177][T18032] ? proc_fault_inject_write+0x310/0x310 [ 3059.081940][T18032] vfs_read+0x2de/0xa00 [ 3059.086161][T18032] ? kernel_read+0x1e0/0x1e0 [ 3059.090810][T18032] ? __fget_files+0x28/0x4b0 [ 3059.095490][T18032] ? __fget_files+0x28/0x4b0 [ 3059.100129][T18032] ? __fget_files+0x43d/0x4b0 [ 3059.104949][T18032] ? __fdget_pos+0x2ae/0x360 [ 3059.109593][T18032] ? ksys_read+0x71/0x250 [ 3059.113981][T18032] ksys_read+0x14c/0x250 [ 3059.118266][T18032] ? vfs_write+0xa30/0xa30 [ 3059.122735][T18032] ? lockdep_hardirqs_on+0x94/0x140 [ 3059.127970][T18032] do_syscall_64+0x4c/0xa0 [ 3059.132452][T18032] ? clear_bhb_loop+0x60/0xb0 [ 3059.137242][T18032] ? clear_bhb_loop+0x60/0xb0 [ 3059.141956][T18032] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3059.147890][T18032] RIP: 0033:0x7ffa6095d04e [ 3059.152330][T18032] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 3059.171958][T18032] RSP: 002b:00007ffa6193efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3059.180397][T18032] RAX: ffffffffffffffda RBX: 00007ffa6193f6c0 RCX: 00007ffa6095d04e [ 3059.188395][T18032] RDX: 000000000000000f RSI: 00007ffa6193f0a0 RDI: 0000000000000006 [ 3059.196390][T18032] RBP: 00007ffa6193f090 R08: 0000000000000000 R09: 0000000000000000 [ 3059.204385][T18032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3059.212388][T18032] R13: 00007ffa60c16038 R14: 00007ffa60c15fa0 R15: 00007fff56ee7478 [ 3059.220400][T18032] [ 3059.447286][T18036] netlink: 156 bytes leftover after parsing attributes in process `syz.4.15254'. [ 3060.464497][T18060] FAULT_INJECTION: forcing a failure. [ 3060.464497][T18060] name failslab, interval 1, probability 0, space 0, times 0 [ 3060.517799][T18060] CPU: 1 PID: 18060 Comm: syz.6.15262 Not tainted syzkaller #0 [ 3060.525458][T18060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3060.535567][T18060] Call Trace: [ 3060.538901][T18060] [ 3060.541866][T18060] dump_stack_lvl+0x188/0x24e [ 3060.546598][T18060] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 3060.552807][T18060] ? show_regs_print_info+0x12/0x12 [ 3060.558068][T18060] ? load_image+0x400/0x400 [ 3060.562674][T18060] should_fail_ex+0x399/0x4d0 [ 3060.567406][T18060] should_failslab+0x5/0x20 [ 3060.571994][T18060] slab_pre_alloc_hook+0x59/0x310 [ 3060.577073][T18060] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3060.582847][T18060] __kmem_cache_alloc_node+0x4f/0x260 [ 3060.588252][T18060] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3060.594008][T18060] __kmalloc+0xa0/0x240 [ 3060.598198][T18060] tomoyo_realpath_from_path+0xdf/0x5d0 [ 3060.603789][T18060] ? tomoyo_path_number_perm+0x205/0x650 [ 3060.609462][T18060] tomoyo_path_number_perm+0x22f/0x650 [ 3060.614956][T18060] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 3060.620448][T18060] ? perf_trace_preemptirq_template+0xa8/0x320 [ 3060.626636][T18060] ? irqentry_enter+0x33/0x50 [ 3060.631348][T18060] ? perf_trace_preemptirq_template+0xa8/0x320 [ 3060.637544][T18060] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 3060.643589][T18060] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 3060.649795][T18060] ? tomoyo_file_ioctl+0xd/0x30 [ 3060.654695][T18060] security_file_ioctl+0x6c/0xa0 [ 3060.659673][T18060] __se_sys_ioctl+0x48/0x170 [ 3060.664332][T18060] do_syscall_64+0x4c/0xa0 [ 3060.668791][T18060] ? clear_bhb_loop+0x60/0xb0 [ 3060.673500][T18060] ? clear_bhb_loop+0x60/0xb0 [ 3060.678212][T18060] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3060.684297][T18060] RIP: 0033:0x7f8dd0f9c819 [ 3060.688756][T18060] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3060.708406][T18060] RSP: 002b:00007f8dd1f2e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3060.716863][T18060] RAX: ffffffffffffffda RBX: 00007f8dd1215fa0 RCX: 00007f8dd0f9c819 [ 3060.724865][T18060] RDX: 0000200000001200 RSI: 0000000000008b26 RDI: 0000000000000005 [ 3060.732875][T18060] RBP: 00007f8dd1f2e090 R08: 0000000000000000 R09: 0000000000000000 [ 3060.740892][T18060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3060.748915][T18060] R13: 00007f8dd1216038 R14: 00007f8dd1215fa0 R15: 00007ffeee187748 [ 3060.756937][T18060] [ 3060.783020][T18060] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3060.906396][T18065] netlink: 134056 bytes leftover after parsing attributes in process `syz.5.15263'. [ 3061.121702][T18068] FAULT_INJECTION: forcing a failure. [ 3061.121702][T18068] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3061.177927][T18068] CPU: 0 PID: 18068 Comm: syz.1.15265 Not tainted syzkaller #0 [ 3061.185567][T18068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3061.195682][T18068] Call Trace: [ 3061.199003][T18068] [ 3061.201977][T18068] dump_stack_lvl+0x188/0x24e [ 3061.206716][T18068] ? show_regs_print_info+0x12/0x12 [ 3061.211972][T18068] ? load_image+0x400/0x400 [ 3061.216539][T18068] ? __lock_acquire+0x7d10/0x7d10 [ 3061.221637][T18068] ? trace_call_bpf+0x5d6/0x6b0 [ 3061.226557][T18068] should_fail_ex+0x399/0x4d0 [ 3061.231295][T18068] _copy_from_user+0x2c/0x170 [ 3061.236034][T18068] __sys_bpf+0x2ea/0x780 [ 3061.240348][T18068] ? bpf_link_show_fdinfo+0x380/0x380 [ 3061.245808][T18068] ? lock_chain_count+0x20/0x20 [ 3061.250725][T18068] __x64_sys_bpf+0x78/0x90 [ 3061.255203][T18068] do_syscall_64+0x4c/0xa0 [ 3061.259675][T18068] ? clear_bhb_loop+0x60/0xb0 [ 3061.264407][T18068] ? clear_bhb_loop+0x60/0xb0 [ 3061.269151][T18068] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3061.275113][T18068] RIP: 0033:0x7ffa6099c819 [ 3061.279583][T18068] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3061.299251][T18068] RSP: 002b:00007ffa6193f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3061.307729][T18068] RAX: ffffffffffffffda RBX: 00007ffa60c15fa0 RCX: 00007ffa6099c819 [ 3061.315766][T18068] RDX: 0000000000000050 RSI: 0000200000001040 RDI: 000000000000000a [ 3061.323794][T18068] RBP: 00007ffa6193f090 R08: 0000000000000000 R09: 0000000000000000 [ 3061.331820][T18068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3061.339864][T18068] R13: 00007ffa60c16038 R14: 00007ffa60c15fa0 R15: 00007fff56ee7478 [ 3061.347909][T18068] [ 3062.094523][T18089] FAULT_INJECTION: forcing a failure. [ 3062.094523][T18089] name failslab, interval 1, probability 0, space 0, times 0 [ 3062.147579][T18089] CPU: 0 PID: 18089 Comm: syz.4.15271 Not tainted syzkaller #0 [ 3062.155226][T18089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3062.165338][T18089] Call Trace: [ 3062.168665][T18089] [ 3062.171638][T18089] dump_stack_lvl+0x188/0x24e [ 3062.176379][T18089] ? show_regs_print_info+0x12/0x12 [ 3062.181643][T18089] ? load_image+0x400/0x400 [ 3062.186205][T18089] ? __might_sleep+0xd0/0xd0 [ 3062.190931][T18089] ? __lock_acquire+0x7d10/0x7d10 [ 3062.196028][T18089] should_fail_ex+0x399/0x4d0 [ 3062.200846][T18089] should_failslab+0x5/0x20 [ 3062.205402][T18089] slab_pre_alloc_hook+0x59/0x310 [ 3062.210484][T18089] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3062.216271][T18089] __kmem_cache_alloc_node+0x4f/0x260 [ 3062.221705][T18089] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3062.227481][T18089] __kmalloc+0xa0/0x240 [ 3062.231700][T18089] tomoyo_realpath_from_path+0xdf/0x5d0 [ 3062.237314][T18089] ? tomoyo_path_number_perm+0x205/0x650 [ 3062.243009][T18089] tomoyo_path_number_perm+0x22f/0x650 [ 3062.248530][T18089] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 3062.254145][T18089] ? ksys_write+0x1c0/0x250 [ 3062.258709][T18089] ? common_file_perm+0x171/0x1c0 [ 3062.263814][T18089] ? __fget_files+0x28/0x4b0 [ 3062.268459][T18089] ? __fget_files+0x28/0x4b0 [ 3062.273131][T18089] security_file_ioctl+0x6c/0xa0 [ 3062.278130][T18089] __se_sys_ioctl+0x48/0x170 [ 3062.282782][T18089] do_syscall_64+0x4c/0xa0 [ 3062.287261][T18089] ? clear_bhb_loop+0x60/0xb0 [ 3062.292010][T18089] ? clear_bhb_loop+0x60/0xb0 [ 3062.296741][T18089] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3062.302686][T18089] RIP: 0033:0x7f80c099c819 [ 3062.307154][T18089] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3062.326834][T18089] RSP: 002b:00007f80c180c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3062.335308][T18089] RAX: ffffffffffffffda RBX: 00007f80c0c15fa0 RCX: 00007f80c099c819 [ 3062.343480][T18089] RDX: 0000200000000080 RSI: 00000000000089f4 RDI: 0000000000000004 [ 3062.351507][T18089] RBP: 00007f80c180c090 R08: 0000000000000000 R09: 0000000000000000 [ 3062.359539][T18089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3062.367573][T18089] R13: 00007f80c0c16038 R14: 00007f80c0c15fa0 R15: 00007ffd59c685a8 [ 3062.375619][T18089] [ 3062.426488][T18089] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3062.441369][T18092] FAULT_INJECTION: forcing a failure. [ 3062.441369][T18092] name failslab, interval 1, probability 0, space 0, times 0 [ 3062.483458][T18092] CPU: 0 PID: 18092 Comm: syz.7.15273 Not tainted syzkaller #0 [ 3062.491093][T18092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3062.501205][T18092] Call Trace: [ 3062.504540][T18092] [ 3062.507514][T18092] dump_stack_lvl+0x188/0x24e [ 3062.512253][T18092] ? show_regs_print_info+0x12/0x12 [ 3062.517527][T18092] ? load_image+0x400/0x400 [ 3062.522103][T18092] ? __might_sleep+0xd0/0xd0 [ 3062.526739][T18092] ? __lock_acquire+0x7d10/0x7d10 [ 3062.531826][T18092] should_fail_ex+0x399/0x4d0 [ 3062.536598][T18092] should_failslab+0x5/0x20 [ 3062.541150][T18092] slab_pre_alloc_hook+0x59/0x310 [ 3062.546227][T18092] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3062.552000][T18092] __kmem_cache_alloc_node+0x4f/0x260 [ 3062.557518][T18092] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3062.563289][T18092] __kmalloc+0xa0/0x240 [ 3062.567496][T18092] tomoyo_realpath_from_path+0xdf/0x5d0 [ 3062.573096][T18092] ? tomoyo_path_number_perm+0x205/0x650 [ 3062.578769][T18092] tomoyo_path_number_perm+0x22f/0x650 [ 3062.584265][T18092] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 3062.589771][T18092] ? ksys_write+0x1c0/0x250 [ 3062.594319][T18092] ? common_file_perm+0x171/0x1c0 [ 3062.599402][T18092] ? __fget_files+0x28/0x4b0 [ 3062.604025][T18092] ? __fget_files+0x28/0x4b0 [ 3062.608660][T18092] security_file_ioctl+0x6c/0xa0 [ 3062.613643][T18092] __se_sys_ioctl+0x48/0x170 [ 3062.618294][T18092] do_syscall_64+0x4c/0xa0 [ 3062.622818][T18092] ? clear_bhb_loop+0x60/0xb0 [ 3062.627533][T18092] ? clear_bhb_loop+0x60/0xb0 [ 3062.632249][T18092] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3062.638177][T18092] RIP: 0033:0x7f6a37f9c819 [ 3062.642625][T18092] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3062.662278][T18092] RSP: 002b:00007f6a38da8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3062.670746][T18092] RAX: ffffffffffffffda RBX: 00007f6a38215fa0 RCX: 00007f6a37f9c819 [ 3062.678748][T18092] RDX: 0000200000000040 RSI: 00000000400454ca RDI: 0000000000000004 [ 3062.686772][T18092] RBP: 00007f6a38da8090 R08: 0000000000000000 R09: 0000000000000000 [ 3062.694768][T18092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3062.702769][T18092] R13: 00007f6a38216038 R14: 00007f6a38215fa0 R15: 00007ffe3c31fe18 [ 3062.710778][T18092] [ 3062.864350][T18102] device veth1_macvtap left promiscuous mode [ 3062.998213][T18102] device macsec0 entered promiscuous mode [ 3063.014066][T18092] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3063.155986][T18100] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 3063.294373][T18108] FAULT_INJECTION: forcing a failure. [ 3063.294373][T18108] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3063.337989][T18108] CPU: 1 PID: 18108 Comm: syz.1.15277 Not tainted syzkaller #0 [ 3063.345638][T18108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3063.355736][T18108] Call Trace: [ 3063.359037][T18108] [ 3063.362003][T18108] dump_stack_lvl+0x188/0x24e [ 3063.366736][T18108] ? show_regs_print_info+0x12/0x12 [ 3063.371977][T18108] ? load_image+0x400/0x400 [ 3063.376516][T18108] ? __lock_acquire+0x7d10/0x7d10 [ 3063.381575][T18108] ? perf_trace_lock_acquire+0x100/0x3e0 [ 3063.387245][T18108] should_fail_ex+0x399/0x4d0 [ 3063.391958][T18108] _copy_from_user+0x2c/0x170 [ 3063.396666][T18108] ___sys_sendmsg+0x1c3/0x360 [ 3063.401386][T18108] ? __sys_sendmsg+0x290/0x290 [ 3063.406212][T18108] ? __lock_acquire+0x7d10/0x7d10 [ 3063.411332][T18108] __se_sys_sendmsg+0x1bb/0x2a0 [ 3063.416220][T18108] ? __x64_sys_sendmsg+0x80/0x80 [ 3063.421206][T18108] ? lockdep_hardirqs_on+0x94/0x140 [ 3063.426449][T18108] do_syscall_64+0x4c/0xa0 [ 3063.430900][T18108] ? clear_bhb_loop+0x60/0xb0 [ 3063.435611][T18108] ? clear_bhb_loop+0x60/0xb0 [ 3063.440327][T18108] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3063.446316][T18108] RIP: 0033:0x7ffa6099c819 [ 3063.450849][T18108] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3063.470483][T18108] RSP: 002b:00007ffa6193f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3063.478921][T18108] RAX: ffffffffffffffda RBX: 00007ffa60c15fa0 RCX: 00007ffa6099c819 [ 3063.486918][T18108] RDX: 0000000000000000 RSI: 0000200000001780 RDI: 0000000000000003 [ 3063.494935][T18108] RBP: 00007ffa6193f090 R08: 0000000000000000 R09: 0000000000000000 [ 3063.502961][T18108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3063.510975][T18108] R13: 00007ffa60c16038 R14: 00007ffa60c15fa0 R15: 00007fff56ee7478 [ 3063.518996][T18108] [ 3063.571753][T18100] device syzkaller0 entered promiscuous mode [ 3066.276661][T18131] device syzkaller0 entered promiscuous mode [ 3066.422321][T18146] netlink: 'syz.1.15287': attribute type 4 has an invalid length. [ 3067.011535][T18144] netlink: 'syz.4.15286': attribute type 39 has an invalid length. [ 3067.021939][T18146] netlink: 'syz.1.15287': attribute type 21 has an invalid length. [ 3067.046939][T18146] netlink: 'syz.1.15287': attribute type 6 has an invalid length. [ 3067.057308][T18146] netlink: 132 bytes leftover after parsing attributes in process `syz.1.15287'. [ 3069.826388][T18175] FAULT_INJECTION: forcing a failure. [ 3069.826388][T18175] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3069.829993][T18165] FAULT_INJECTION: forcing a failure. [ 3069.829993][T18165] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3069.862815][T18175] CPU: 0 PID: 18175 Comm: syz.4.15295 Not tainted syzkaller #0 [ 3069.870454][T18175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3069.880582][T18175] Call Trace: [ 3069.883913][T18175] [ 3069.886887][T18175] dump_stack_lvl+0x188/0x24e [ 3069.891635][T18175] ? show_regs_print_info+0x12/0x12 [ 3069.896910][T18175] ? load_image+0x400/0x400 [ 3069.901471][T18175] ? __lock_acquire+0x7d10/0x7d10 [ 3069.906561][T18175] should_fail_ex+0x399/0x4d0 [ 3069.911279][T18175] _copy_from_user+0x2c/0x170 [ 3069.915993][T18175] ___sys_sendmsg+0x1c3/0x360 [ 3069.920710][T18175] ? __sys_sendmsg+0x290/0x290 [ 3069.925522][T18175] ? __lock_acquire+0x7d10/0x7d10 [ 3069.930603][T18175] __se_sys_sendmsg+0x1bb/0x2a0 [ 3069.935496][T18175] ? __x64_sys_sendmsg+0x80/0x80 [ 3069.940480][T18175] ? lockdep_hardirqs_on+0x94/0x140 [ 3069.945716][T18175] do_syscall_64+0x4c/0xa0 [ 3069.950173][T18175] ? clear_bhb_loop+0x60/0xb0 [ 3069.954880][T18175] ? clear_bhb_loop+0x60/0xb0 [ 3069.959599][T18175] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3069.965556][T18175] RIP: 0033:0x7f80c099c819 [ 3069.969998][T18175] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3069.989638][T18175] RSP: 002b:00007f80c180c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3069.998088][T18175] RAX: ffffffffffffffda RBX: 00007f80c0c15fa0 RCX: 00007f80c099c819 [ 3070.006182][T18175] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 000000000000000a [ 3070.014187][T18175] RBP: 00007f80c180c090 R08: 0000000000000000 R09: 0000000000000000 [ 3070.022185][T18175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3070.030187][T18175] R13: 00007f80c0c16038 R14: 00007f80c0c15fa0 R15: 00007ffd59c685a8 [ 3070.038217][T18175] [ 3070.056716][T18165] CPU: 0 PID: 18165 Comm: syz.7.15291 Not tainted syzkaller #0 [ 3070.064354][T18165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3070.074455][T18165] Call Trace: [ 3070.077770][T18165] [ 3070.080740][T18165] dump_stack_lvl+0x188/0x24e [ 3070.085483][T18165] ? show_regs_print_info+0x12/0x12 [ 3070.090744][T18165] ? load_image+0x400/0x400 [ 3070.095309][T18165] ? __lock_acquire+0x7d10/0x7d10 [ 3070.100408][T18165] ? __local_bh_enable_ip+0x136/0x1c0 [ 3070.105831][T18165] ? _local_bh_enable+0xa0/0xa0 [ 3070.110736][T18165] should_fail_ex+0x399/0x4d0 [ 3070.115466][T18165] copy_fpstate_to_sigframe+0xaee/0xd50 [ 3070.121101][T18165] ? copy_fpstate_to_sigframe+0x284/0xd50 [ 3070.126961][T18165] ? fpregs_set+0x5f0/0x5f0 [ 3070.131515][T18165] ? ct_irq_exit_irqson+0x113/0x170 [ 3070.136843][T18165] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 3070.142887][T18165] ? lock_chain_count+0x20/0x20 [ 3070.147798][T18165] ? arch_do_signal_or_restart+0x23e/0x1350 [ 3070.153768][T18165] ? fpu__alloc_mathframe+0xa3/0x120 [ 3070.159102][T18165] arch_do_signal_or_restart+0x69f/0x1350 [ 3070.164890][T18165] ? vfs_write+0x61f/0xa30 [ 3070.169370][T18165] ? __mutex_unlock_slowpath+0x1b0/0x6c0 [ 3070.175065][T18165] ? get_sigframe_size+0x10/0x10 [ 3070.180061][T18165] ? __fget_files+0x28/0x4b0 [ 3070.184708][T18165] ? mutex_unlock+0x10/0x10 [ 3070.189286][T18165] ? ksys_write+0x1f7/0x250 [ 3070.193849][T18165] ? exit_to_user_mode_loop+0x3b/0x110 [ 3070.199453][T18165] exit_to_user_mode_loop+0x70/0x110 [ 3070.204899][T18165] exit_to_user_mode_prepare+0xee/0x180 [ 3070.210511][T18165] syscall_exit_to_user_mode+0x16/0x40 [ 3070.216021][T18165] do_syscall_64+0x58/0xa0 [ 3070.220512][T18165] ? clear_bhb_loop+0x60/0xb0 [ 3070.225238][T18165] ? clear_bhb_loop+0x60/0xb0 [ 3070.229961][T18165] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3070.235888][T18165] RIP: 0033:0x7f6a37f5d04e [ 3070.240330][T18165] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 3070.259971][T18165] RSP: 002b:00007f6a38da7fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3070.268411][T18165] RAX: 0000000000000001 RBX: 00007f6a38da86c0 RCX: 00007f6a37f5d04e [ 3070.276421][T18165] RDX: 0000000000000001 RSI: 00007f6a38da8090 RDI: 0000000000000006 [ 3070.284439][T18165] RBP: 00007f6a38da8090 R08: 0000000000000000 R09: 0000000000000000 [ 3070.292441][T18165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3070.300539][T18165] R13: 00007f6a38216038 R14: 00007f6a38215fa0 R15: 00007ffe3c31fe18 [ 3070.308548][T18165] [ 3070.616446][T18182] netlink: 'syz.7.15297': attribute type 3 has an invalid length. [ 3070.700791][T18182] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.15297'. [ 3071.104771][T18184] netlink: 'syz.5.15298': attribute type 10 has an invalid length. [ 3071.129973][T18184] netlink: 40 bytes leftover after parsing attributes in process `syz.5.15298'. [ 3071.144190][T18184] device ipvlan1 entered promiscuous mode [ 3071.188981][T18184] bridge0: port 3(ipvlan1) entered blocking state [ 3071.197205][T18184] bridge0: port 3(ipvlan1) entered disabled state [ 3071.230362][T18184] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 3071.628763][T18210] FAULT_INJECTION: forcing a failure. [ 3071.628763][T18210] name failslab, interval 1, probability 0, space 0, times 0 [ 3071.643250][T18210] CPU: 1 PID: 18210 Comm: syz.5.15306 Not tainted syzkaller #0 [ 3071.650855][T18210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3071.660952][T18210] Call Trace: [ 3071.664243][T18210] [ 3071.667205][T18210] dump_stack_lvl+0x188/0x24e [ 3071.671907][T18210] ? show_regs_print_info+0x12/0x12 [ 3071.677137][T18210] ? load_image+0x400/0x400 [ 3071.681668][T18210] ? __might_sleep+0xd0/0xd0 [ 3071.686264][T18210] ? __lock_acquire+0x7d10/0x7d10 [ 3071.691329][T18210] should_fail_ex+0x399/0x4d0 [ 3071.696047][T18210] should_failslab+0x5/0x20 [ 3071.700579][T18210] slab_pre_alloc_hook+0x59/0x310 [ 3071.705636][T18210] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3071.711392][T18210] __kmem_cache_alloc_node+0x4f/0x260 [ 3071.716798][T18210] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3071.722553][T18210] __kmalloc+0xa0/0x240 [ 3071.726765][T18210] tomoyo_realpath_from_path+0xdf/0x5d0 [ 3071.732359][T18210] ? tomoyo_path_number_perm+0x205/0x650 [ 3071.738027][T18210] tomoyo_path_number_perm+0x22f/0x650 [ 3071.743520][T18210] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 3071.749013][T18210] ? ksys_write+0x1c0/0x250 [ 3071.753555][T18210] ? common_file_perm+0x171/0x1c0 [ 3071.758630][T18210] ? __fget_files+0x28/0x4b0 [ 3071.763256][T18210] ? __fget_files+0x28/0x4b0 [ 3071.767887][T18210] security_file_ioctl+0x6c/0xa0 [ 3071.772866][T18210] __se_sys_ioctl+0x48/0x170 [ 3071.777502][T18210] do_syscall_64+0x4c/0xa0 [ 3071.781955][T18210] ? clear_bhb_loop+0x60/0xb0 [ 3071.786664][T18210] ? clear_bhb_loop+0x60/0xb0 [ 3071.791371][T18210] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3071.797294][T18210] RIP: 0033:0x7f17b8b9c819 [ 3071.801740][T18210] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3071.821369][T18210] RSP: 002b:00007f17b6df6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3071.829836][T18210] RAX: ffffffffffffffda RBX: 00007f17b8e15fa0 RCX: 00007f17b8b9c819 [ 3071.837847][T18210] RDX: 0000200000000000 RSI: 0000000000008b15 RDI: 0000000000000003 [ 3071.845872][T18210] RBP: 00007f17b6df6090 R08: 0000000000000000 R09: 0000000000000000 [ 3071.853878][T18210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3071.861877][T18210] R13: 00007f17b8e16038 R14: 00007f17b8e15fa0 R15: 00007ffd6ee53328 [ 3071.869893][T18210] [ 3071.891207][T18210] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3073.692428][T18199] netlink: 'syz.4.15302': attribute type 1 has an invalid length. [ 3073.702437][T18200] netlink: 'syz.4.15302': attribute type 10 has an invalid length. [ 3073.710677][T18200] netlink: 40 bytes leftover after parsing attributes in process `syz.4.15302'. [ 3073.721756][T18200] A link change request failed with some changes committed already. Interface virt_wifi0 may have been left with an inconsistent configuration, please check. [ 3074.069461][T18227] device veth1_macvtap left promiscuous mode [ 3074.075758][T18227] device macsec0 entered promiscuous mode [ 3074.321357][T18239] netlink: 830 bytes leftover after parsing attributes in process `syz.1.15315'. [ 3074.532922][T18245] netlink: 'syz.6.15316': attribute type 39 has an invalid length. [ 3075.647051][T18271] netlink: 'syz.5.15322': attribute type 9 has an invalid length. [ 3075.667649][T18271] netlink: 126588 bytes leftover after parsing attributes in process `syz.5.15322'. [ 3075.694765][T18274] FAULT_INJECTION: forcing a failure. [ 3075.694765][T18274] name failslab, interval 1, probability 0, space 0, times 0 [ 3075.780285][T18274] CPU: 0 PID: 18274 Comm: syz.7.15325 Not tainted syzkaller #0 [ 3075.787919][T18274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3075.798023][T18274] Call Trace: [ 3075.801347][T18274] [ 3075.804336][T18274] dump_stack_lvl+0x188/0x24e [ 3075.809085][T18274] ? show_regs_print_info+0x12/0x12 [ 3075.814353][T18274] ? load_image+0x400/0x400 [ 3075.818952][T18274] ? __might_sleep+0xd0/0xd0 [ 3075.823591][T18274] ? __lock_acquire+0x7d10/0x7d10 [ 3075.828679][T18274] should_fail_ex+0x399/0x4d0 [ 3075.833417][T18274] should_failslab+0x5/0x20 [ 3075.837968][T18274] slab_pre_alloc_hook+0x59/0x310 [ 3075.843054][T18274] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3075.848872][T18274] __kmem_cache_alloc_node+0x4f/0x260 [ 3075.854347][T18274] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3075.860171][T18274] __kmalloc+0xa0/0x240 [ 3075.864404][T18274] tomoyo_realpath_from_path+0xdf/0x5d0 [ 3075.870023][T18274] ? tomoyo_path_number_perm+0x205/0x650 [ 3075.875713][T18274] tomoyo_path_number_perm+0x22f/0x650 [ 3075.881267][T18274] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 3075.886777][T18274] ? ksys_write+0x1c0/0x250 [ 3075.891334][T18274] ? common_file_perm+0x171/0x1c0 [ 3075.896449][T18274] ? __fget_files+0x28/0x4b0 [ 3075.901101][T18274] ? __fget_files+0x28/0x4b0 [ 3075.905763][T18274] security_file_ioctl+0x6c/0xa0 [ 3075.910754][T18274] __se_sys_ioctl+0x48/0x170 [ 3075.915410][T18274] do_syscall_64+0x4c/0xa0 [ 3075.919882][T18274] ? clear_bhb_loop+0x60/0xb0 [ 3075.924611][T18274] ? clear_bhb_loop+0x60/0xb0 [ 3075.929341][T18274] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3075.935286][T18274] RIP: 0033:0x7f6a37f9c819 [ 3075.939748][T18274] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3075.959419][T18274] RSP: 002b:00007f6a38da8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3075.967891][T18274] RAX: ffffffffffffffda RBX: 00007f6a38215fa0 RCX: 00007f6a37f9c819 [ 3075.975934][T18274] RDX: 0000200000000080 RSI: 0000000000008914 RDI: 0000000000000003 [ 3075.983956][T18274] RBP: 00007f6a38da8090 R08: 0000000000000000 R09: 0000000000000000 [ 3075.991993][T18274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3076.000016][T18274] R13: 00007f6a38216038 R14: 00007f6a38215fa0 R15: 00007ffe3c31fe18 [ 3076.008067][T18274] [ 3076.130422][T18274] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3076.147306][T18262] device macvlan1 entered promiscuous mode [ 3076.186506][T18266] IPv6: Can't replace route, no match found [ 3076.225994][T18270] mac80211_hwsim hwsim55 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 3076.373693][T18274] device macvlan1 entered promiscuous mode [ 3078.814474][T18296] device veth1_macvtap left promiscuous mode [ 3078.830654][T18294] netlink: 'syz.7.15330': attribute type 1 has an invalid length. [ 3078.847775][T18296] device macsec0 entered promiscuous mode [ 3078.886318][T18294] netlink: 127868 bytes leftover after parsing attributes in process `syz.7.15330'. [ 3079.013724][T18294] netlink: 'syz.7.15330': attribute type 29 has an invalid length. [ 3079.059542][ T1360] wlan1: Trigger new scan to find an IBSS to join [ 3079.653726][T18294] netlink: 'syz.7.15330': attribute type 29 has an invalid length. [ 3079.664918][T18305] netlink: 'syz.6.15332': attribute type 39 has an invalid length. [ 3079.947658][T18314] netlink: 830 bytes leftover after parsing attributes in process `syz.4.15336'. [ 3079.967320][T18316] FAULT_INJECTION: forcing a failure. [ 3079.967320][T18316] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3079.997168][T18316] CPU: 1 PID: 18316 Comm: syz.6.15339 Not tainted syzkaller #0 [ 3080.004810][T18316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3080.014921][T18316] Call Trace: [ 3080.018244][T18316] [ 3080.021217][T18316] dump_stack_lvl+0x188/0x24e [ 3080.025960][T18316] ? show_regs_print_info+0x12/0x12 [ 3080.031226][T18316] ? load_image+0x400/0x400 [ 3080.035786][T18316] ? __lock_acquire+0x7d10/0x7d10 [ 3080.040882][T18316] should_fail_ex+0x399/0x4d0 [ 3080.045605][T18316] _copy_from_user+0x2c/0x170 [ 3080.050339][T18316] __sys_bpf+0x2ea/0x780 [ 3080.054640][T18316] ? lockdep_hardirqs_on+0x94/0x140 [ 3080.059884][T18316] ? bpf_link_show_fdinfo+0x380/0x380 [ 3080.065324][T18316] ? lock_chain_count+0x20/0x20 [ 3080.070234][T18316] __x64_sys_bpf+0x78/0x90 [ 3080.074788][T18316] do_syscall_64+0x4c/0xa0 [ 3080.079256][T18316] ? clear_bhb_loop+0x60/0xb0 [ 3080.083993][T18316] ? clear_bhb_loop+0x60/0xb0 [ 3080.088721][T18316] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3080.094662][T18316] RIP: 0033:0x7f8dd0f9c819 [ 3080.099125][T18316] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3080.118785][T18316] RSP: 002b:00007f8dd1f2e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3080.127351][T18316] RAX: ffffffffffffffda RBX: 00007f8dd1215fa0 RCX: 00007f8dd0f9c819 [ 3080.135358][T18316] RDX: 0000000000000050 RSI: 0000200000000440 RDI: 000000000000000a [ 3080.143399][T18316] RBP: 00007f8dd1f2e090 R08: 0000000000000000 R09: 0000000000000000 [ 3080.151492][T18316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3080.159501][T18316] R13: 00007f8dd1216038 R14: 00007f8dd1215fa0 R15: 00007ffeee187748 [ 3080.167522][T18316] [ 3080.840018][T18323] netlink: 'syz.5.15340': attribute type 39 has an invalid length. [ 3081.068548][T18328] netlink: 'syz.6.15342': attribute type 10 has an invalid length. [ 3081.086341][T18328] bridge0: port 2(bridge_slave_1) entered disabled state [ 3081.102553][T18330] FAULT_INJECTION: forcing a failure. [ 3081.102553][T18330] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3081.120384][T18330] CPU: 1 PID: 18330 Comm: syz.1.15343 Not tainted syzkaller #0 [ 3081.128013][T18330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3081.138127][T18330] Call Trace: [ 3081.141449][T18330] [ 3081.144422][T18330] dump_stack_lvl+0x188/0x24e [ 3081.149169][T18330] ? show_regs_print_info+0x12/0x12 [ 3081.154435][T18330] ? load_image+0x400/0x400 [ 3081.158989][T18330] ? __lock_acquire+0x7d10/0x7d10 [ 3081.164073][T18330] should_fail_ex+0x399/0x4d0 [ 3081.168802][T18330] _copy_from_user+0x2c/0x170 [ 3081.173534][T18330] ___sys_sendmsg+0x1c3/0x360 [ 3081.178273][T18330] ? __sys_sendmsg+0x290/0x290 [ 3081.183117][T18330] ? __lock_acquire+0x7d10/0x7d10 [ 3081.188228][T18330] __se_sys_sendmsg+0x1bb/0x2a0 [ 3081.193151][T18330] ? __x64_sys_sendmsg+0x80/0x80 [ 3081.198164][T18330] ? lockdep_hardirqs_on+0x94/0x140 [ 3081.203420][T18330] do_syscall_64+0x4c/0xa0 [ 3081.207891][T18330] ? clear_bhb_loop+0x60/0xb0 [ 3081.212615][T18330] ? clear_bhb_loop+0x60/0xb0 [ 3081.217341][T18330] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3081.223271][T18330] RIP: 0033:0x7ffa6099c819 [ 3081.227720][T18330] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3081.247362][T18330] RSP: 002b:00007ffa6193f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3081.255808][T18330] RAX: ffffffffffffffda RBX: 00007ffa60c15fa0 RCX: 00007ffa6099c819 [ 3081.263818][T18330] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 3081.271847][T18330] RBP: 00007ffa6193f090 R08: 0000000000000000 R09: 0000000000000000 [ 3081.279852][T18330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3081.287851][T18330] R13: 00007ffa60c16038 R14: 00007ffa60c15fa0 R15: 00007fff56ee7478 [ 3081.295874][T18330] [ 3081.535277][T18340] device bridge_slave_1 left promiscuous mode [ 3081.542704][T18340] bridge0: port 2(bridge_slave_1) entered disabled state [ 3081.564383][T18340] device bridge_slave_0 left promiscuous mode [ 3081.570896][T18340] bridge0: port 1(bridge_slave_0) entered disabled state [ 3081.626125][T18336] netlink: 122896 bytes leftover after parsing attributes in process `syz.6.15345'. [ 3081.968304][T18346] FAULT_INJECTION: forcing a failure. [ 3081.968304][T18346] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3081.986551][T18346] CPU: 0 PID: 18346 Comm: syz.1.15348 Not tainted syzkaller #0 [ 3081.994187][T18346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3082.004488][T18346] Call Trace: [ 3082.007897][T18346] [ 3082.010870][T18346] dump_stack_lvl+0x188/0x24e [ 3082.015604][T18346] ? show_regs_print_info+0x12/0x12 [ 3082.020862][T18346] ? load_image+0x400/0x400 [ 3082.025420][T18346] ? __lock_acquire+0x7d10/0x7d10 [ 3082.030506][T18346] ? perf_trace_lock+0xf8/0x390 [ 3082.035419][T18346] should_fail_ex+0x399/0x4d0 [ 3082.040147][T18346] _copy_from_user+0x2c/0x170 [ 3082.044860][T18346] ___sys_recvmsg+0x172/0x590 [ 3082.049583][T18346] ? __sys_recvmsg+0x290/0x290 [ 3082.054389][T18346] ? common_file_perm+0x171/0x1c0 [ 3082.059447][T18346] ? __fget_files+0x43d/0x4b0 [ 3082.064168][T18346] __x64_sys_recvmsg+0x205/0x2e0 [ 3082.069147][T18346] ? ___sys_recvmsg+0x590/0x590 [ 3082.074050][T18346] ? lockdep_hardirqs_on+0x94/0x140 [ 3082.079278][T18346] do_syscall_64+0x4c/0xa0 [ 3082.083729][T18346] ? clear_bhb_loop+0x60/0xb0 [ 3082.088439][T18346] ? clear_bhb_loop+0x60/0xb0 [ 3082.093143][T18346] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3082.099067][T18346] RIP: 0033:0x7ffa6099c819 [ 3082.103510][T18346] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3082.123143][T18346] RSP: 002b:00007ffa6193f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 3082.131614][T18346] RAX: ffffffffffffffda RBX: 00007ffa60c15fa0 RCX: 00007ffa6099c819 [ 3082.139623][T18346] RDX: 0000000000000000 RSI: 0000200000000400 RDI: 0000000000000004 [ 3082.147616][T18346] RBP: 00007ffa6193f090 R08: 0000000000000000 R09: 0000000000000000 [ 3082.155626][T18346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3082.163645][T18346] R13: 00007ffa60c16038 R14: 00007ffa60c15fa0 R15: 00007fff56ee7478 [ 3082.171659][T18346] [ 3082.178218][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 3082.184581][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 3082.202110][ T11] wlan1: Trigger new scan to find an IBSS to join [ 3082.278833][T18349] netlink: 'syz.5.15349': attribute type 39 has an invalid length. [ 3082.587067][T18363] FAULT_INJECTION: forcing a failure. [ 3082.587067][T18363] name failslab, interval 1, probability 0, space 0, times 0 [ 3082.612360][T18363] CPU: 1 PID: 18363 Comm: syz.5.15355 Not tainted syzkaller #0 [ 3082.619985][T18363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3082.630087][T18363] Call Trace: [ 3082.633401][T18363] [ 3082.636376][T18363] dump_stack_lvl+0x188/0x24e [ 3082.641122][T18363] ? show_regs_print_info+0x12/0x12 [ 3082.646373][T18363] ? load_image+0x400/0x400 [ 3082.650926][T18363] ? __might_sleep+0xd0/0xd0 [ 3082.655562][T18363] ? __lock_acquire+0x7d10/0x7d10 [ 3082.660642][T18363] should_fail_ex+0x399/0x4d0 [ 3082.665380][T18363] should_failslab+0x5/0x20 [ 3082.669939][T18363] slab_pre_alloc_hook+0x59/0x310 [ 3082.675010][T18363] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3082.680882][T18363] __kmem_cache_alloc_node+0x4f/0x260 [ 3082.686311][T18363] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3082.692084][T18363] __kmalloc+0xa0/0x240 [ 3082.696330][T18363] tomoyo_realpath_from_path+0xdf/0x5d0 [ 3082.701953][T18363] ? tomoyo_path_number_perm+0x205/0x650 [ 3082.707640][T18363] tomoyo_path_number_perm+0x22f/0x650 [ 3082.713247][T18363] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 3082.718926][T18363] ? ksys_write+0x1c0/0x250 [ 3082.723458][T18363] ? common_file_perm+0x171/0x1c0 [ 3082.728537][T18363] ? __fget_files+0x28/0x4b0 [ 3082.733149][T18363] ? __fget_files+0x28/0x4b0 [ 3082.737766][T18363] security_file_ioctl+0x6c/0xa0 [ 3082.742819][T18363] __se_sys_ioctl+0x48/0x170 [ 3082.747431][T18363] do_syscall_64+0x4c/0xa0 [ 3082.751909][T18363] ? clear_bhb_loop+0x60/0xb0 [ 3082.756694][T18363] ? clear_bhb_loop+0x60/0xb0 [ 3082.761431][T18363] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3082.767346][T18363] RIP: 0033:0x7f17b8b9c819 [ 3082.771790][T18363] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3082.791446][T18363] RSP: 002b:00007f17b6df6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3082.799919][T18363] RAX: ffffffffffffffda RBX: 00007f17b8e15fa0 RCX: 00007f17b8b9c819 [ 3082.807928][T18363] RDX: 0000200000001000 RSI: 0000000000008914 RDI: 0000000000000004 [ 3082.815917][T18363] RBP: 00007f17b6df6090 R08: 0000000000000000 R09: 0000000000000000 [ 3082.823914][T18363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3082.831908][T18363] R13: 00007f17b8e16038 R14: 00007f17b8e15fa0 R15: 00007ffd6ee53328 [ 3082.839928][T18363] [ 3082.853976][T18363] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3082.874042][T18365] netlink: 'syz.7.15354': attribute type 10 has an invalid length. [ 3082.891200][T18365] bridge0: port 2(bridge_slave_1) entered disabled state [ 3082.898798][T18365] bridge0: port 1(bridge_slave_0) entered disabled state [ 3082.972920][T18363] device lo entered promiscuous mode [ 3083.223614][T18382] device bridge_slave_1 left promiscuous mode [ 3083.250685][T18382] bridge0: port 2(bridge_slave_1) entered disabled state [ 3083.328987][T18382] device bridge_slave_0 left promiscuous mode [ 3083.361664][T18382] bridge0: port 1(bridge_slave_0) entered disabled state [ 3083.686841][T18388] netlink: 122896 bytes leftover after parsing attributes in process `syz.1.15363'. [ 3083.780677][T18388] debugfs: Directory '.!' with parent 'ieee80211' already present! [ 3084.044138][T18399] netlink: 'syz.5.15365': attribute type 39 has an invalid length. [ 3084.230473][T18404] FAULT_INJECTION: forcing a failure. [ 3084.230473][T18404] name failslab, interval 1, probability 0, space 0, times 0 [ 3084.267669][T18404] CPU: 1 PID: 18404 Comm: syz.6.15367 Not tainted syzkaller #0 [ 3084.275310][T18404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3084.285430][T18404] Call Trace: [ 3084.288763][T18404] [ 3084.291836][T18404] dump_stack_lvl+0x188/0x24e [ 3084.296591][T18404] ? show_regs_print_info+0x12/0x12 [ 3084.302118][T18404] ? load_image+0x400/0x400 [ 3084.306763][T18404] ? __might_sleep+0xd0/0xd0 [ 3084.311414][T18404] ? __lock_acquire+0x7d10/0x7d10 [ 3084.316497][T18404] should_fail_ex+0x399/0x4d0 [ 3084.321228][T18404] should_failslab+0x5/0x20 [ 3084.325771][T18404] slab_pre_alloc_hook+0x59/0x310 [ 3084.330849][T18404] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3084.336642][T18404] __kmem_cache_alloc_node+0x4f/0x260 [ 3084.342085][T18404] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3084.347872][T18404] __kmalloc+0xa0/0x240 [ 3084.352096][T18404] tomoyo_realpath_from_path+0xdf/0x5d0 [ 3084.357711][T18404] ? tomoyo_path_number_perm+0x205/0x650 [ 3084.363412][T18404] tomoyo_path_number_perm+0x22f/0x650 [ 3084.368938][T18404] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 3084.374497][T18404] ? ksys_write+0x1c0/0x250 [ 3084.379060][T18404] ? common_file_perm+0x171/0x1c0 [ 3084.384164][T18404] ? __fget_files+0x28/0x4b0 [ 3084.388812][T18404] ? __fget_files+0x28/0x4b0 [ 3084.393473][T18404] security_file_ioctl+0x6c/0xa0 [ 3084.398468][T18404] __se_sys_ioctl+0x48/0x170 [ 3084.403109][T18404] do_syscall_64+0x4c/0xa0 [ 3084.407574][T18404] ? clear_bhb_loop+0x60/0xb0 [ 3084.412294][T18404] ? clear_bhb_loop+0x60/0xb0 [ 3084.417037][T18404] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3084.422993][T18404] RIP: 0033:0x7f8dd0f9c819 [ 3084.427462][T18404] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3084.447382][T18404] RSP: 002b:00007f8dd1f2e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3084.455853][T18404] RAX: ffffffffffffffda RBX: 00007f8dd1215fa0 RCX: 00007f8dd0f9c819 [ 3084.463878][T18404] RDX: 0000200000000240 RSI: 0000000000008b30 RDI: 0000000000000003 [ 3084.471900][T18404] RBP: 00007f8dd1f2e090 R08: 0000000000000000 R09: 0000000000000000 [ 3084.480007][T18404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3084.488023][T18404] R13: 00007f8dd1216038 R14: 00007f8dd1215fa0 R15: 00007ffeee187748 [ 3084.496064][T18404] [ 3084.528406][T18404] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3084.564259][T18410] netlink: 'syz.1.15369': attribute type 10 has an invalid length. [ 3084.564336][T18408] FAULT_INJECTION: forcing a failure. [ 3084.564336][T18408] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3084.564438][T18408] CPU: 1 PID: 18408 Comm: syz.4.15370 Not tainted syzkaller #0 [ 3084.580605][T18410] netlink: 40 bytes leftover after parsing attributes in process `syz.1.15369'. [ 3084.585494][T18408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3084.585513][T18408] Call Trace: [ 3084.585522][T18408] [ 3084.585532][T18408] dump_stack_lvl+0x188/0x24e [ 3084.585577][T18408] ? show_regs_print_info+0x12/0x12 [ 3084.585610][T18408] ? load_image+0x400/0x400 [ 3084.585641][T18408] ? __lock_acquire+0x7d10/0x7d10 [ 3084.585680][T18408] should_fail_ex+0x399/0x4d0 [ 3084.585709][T18408] _copy_from_user+0x2c/0x170 [ 3084.585742][T18408] ___sys_sendmsg+0x1c3/0x360 [ 3084.585776][T18408] ? ct_nmi_exit+0x145/0x1c0 [ 3084.611513][T18410] device ipvlan1 entered promiscuous mode [ 3084.612459][T18408] ? __sys_sendmsg+0x290/0x290 [ 3084.612546][T18408] __se_sys_sendmsg+0x1bb/0x2a0 [ 3084.672291][T18408] ? ct_nmi_exit+0x145/0x1c0 [ 3084.676917][T18408] ? __x64_sys_sendmsg+0x80/0x80 [ 3084.681906][T18408] ? lockdep_hardirqs_on+0x94/0x140 [ 3084.687131][T18408] do_syscall_64+0x4c/0xa0 [ 3084.691584][T18408] ? clear_bhb_loop+0x60/0xb0 [ 3084.696288][T18408] ? clear_bhb_loop+0x60/0xb0 [ 3084.700994][T18408] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3084.706915][T18408] RIP: 0033:0x7f80c099c819 [ 3084.711358][T18408] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3084.731000][T18408] RSP: 002b:00007f80c180c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3084.739444][T18408] RAX: ffffffffffffffda RBX: 00007f80c0c15fa0 RCX: 00007f80c099c819 [ 3084.747438][T18408] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000008 [ 3084.755450][T18408] RBP: 00007f80c180c090 R08: 0000000000000000 R09: 0000000000000000 [ 3084.763444][T18408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3084.771443][T18408] R13: 00007f80c0c16038 R14: 00007f80c0c15fa0 R15: 00007ffd59c685a8 [ 3084.779451][T18408] [ 3084.818770][T18410] bridge0: port 1(ipvlan1) entered blocking state [ 3084.826641][T18410] bridge0: port 1(ipvlan1) entered disabled state [ 3084.862168][T18410] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 3085.058540][ T9105] wlan1: Trigger new scan to find an IBSS to join [ 3085.142084][ T11] wlan1: Creating new IBSS network, BSSID 7a:22:64:cf:63:f2 [ 3085.264554][T18429] FAULT_INJECTION: forcing a failure. [ 3085.264554][T18429] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3085.311939][T18429] CPU: 1 PID: 18429 Comm: syz.6.15378 Not tainted syzkaller #0 [ 3085.319571][T18429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3085.329687][T18429] Call Trace: [ 3085.333008][T18429] [ 3085.335981][T18429] dump_stack_lvl+0x188/0x24e [ 3085.340721][T18429] ? show_regs_print_info+0x12/0x12 [ 3085.345978][T18429] ? load_image+0x400/0x400 [ 3085.350536][T18429] ? __lock_acquire+0x7d10/0x7d10 [ 3085.355622][T18429] ? snprintf+0xe5/0x140 [ 3085.359923][T18429] should_fail_ex+0x399/0x4d0 [ 3085.364655][T18429] _copy_to_user+0x2c/0x130 [ 3085.369220][T18429] simple_read_from_buffer+0xe3/0x150 [ 3085.374642][T18429] proc_fail_nth_read+0x1a6/0x220 [ 3085.379819][T18429] ? proc_fault_inject_write+0x310/0x310 [ 3085.385530][T18429] ? fsnotify_perm+0x248/0x550 [ 3085.390371][T18429] ? proc_fault_inject_write+0x310/0x310 [ 3085.396061][T18429] vfs_read+0x2de/0xa00 [ 3085.400285][T18429] ? kernel_read+0x1e0/0x1e0 [ 3085.404955][T18429] ? __fget_files+0x28/0x4b0 [ 3085.409608][T18429] ? __fget_files+0x28/0x4b0 [ 3085.414275][T18429] ? __fget_files+0x43d/0x4b0 [ 3085.419035][T18429] ? __fdget_pos+0x2ae/0x360 [ 3085.423699][T18429] ? ksys_read+0x71/0x250 [ 3085.428180][T18429] ksys_read+0x14c/0x250 [ 3085.432561][T18429] ? vfs_write+0xa30/0xa30 [ 3085.437019][T18429] ? lockdep_hardirqs_on+0x94/0x140 [ 3085.442424][T18429] do_syscall_64+0x4c/0xa0 [ 3085.446885][T18429] ? clear_bhb_loop+0x60/0xb0 [ 3085.451597][T18429] ? clear_bhb_loop+0x60/0xb0 [ 3085.456390][T18429] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3085.462338][T18429] RIP: 0033:0x7f8dd0f5d04e [ 3085.466781][T18429] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 3085.486417][T18429] RSP: 002b:00007f8dd1f2dfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3085.494863][T18429] RAX: ffffffffffffffda RBX: 00007f8dd1f2e6c0 RCX: 00007f8dd0f5d04e [ 3085.502858][T18429] RDX: 000000000000000f RSI: 00007f8dd1f2e0a0 RDI: 0000000000000006 [ 3085.510897][T18429] RBP: 00007f8dd1f2e090 R08: 0000000000000000 R09: 0000000000000000 [ 3085.518946][T18429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3085.526957][T18429] R13: 00007f8dd1216038 R14: 00007f8dd1215fa0 R15: 00007ffeee187748 [ 3085.534969][T18429] [ 3085.646811][T18438] FAULT_INJECTION: forcing a failure. [ 3085.646811][T18438] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3085.668170][T18438] CPU: 1 PID: 18438 Comm: syz.1.15381 Not tainted syzkaller #0 [ 3085.675834][T18438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3085.685941][T18438] Call Trace: [ 3085.689272][T18438] [ 3085.692255][T18438] dump_stack_lvl+0x188/0x24e [ 3085.697000][T18438] ? show_regs_print_info+0x12/0x12 [ 3085.702278][T18438] ? load_image+0x400/0x400 [ 3085.706847][T18438] ? __lock_acquire+0x7d10/0x7d10 [ 3085.711940][T18438] should_fail_ex+0x399/0x4d0 [ 3085.716670][T18438] _copy_from_user+0x2c/0x170 [ 3085.721408][T18438] ___sys_recvmsg+0x172/0x590 [ 3085.726157][T18438] ? __sys_recvmsg+0x290/0x290 [ 3085.731008][T18438] ? common_file_perm+0x171/0x1c0 [ 3085.736099][T18438] ? __fget_files+0x43d/0x4b0 [ 3085.740859][T18438] __x64_sys_recvmsg+0x205/0x2e0 [ 3085.745862][T18438] ? ___sys_recvmsg+0x590/0x590 [ 3085.750796][T18438] ? lockdep_hardirqs_on+0x94/0x140 [ 3085.756051][T18438] do_syscall_64+0x4c/0xa0 [ 3085.760527][T18438] ? clear_bhb_loop+0x60/0xb0 [ 3085.765264][T18438] ? clear_bhb_loop+0x60/0xb0 [ 3085.770001][T18438] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3085.775950][T18438] RIP: 0033:0x7ffa6099c819 [ 3085.780417][T18438] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3085.800084][T18438] RSP: 002b:00007ffa6191e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 3085.808583][T18438] RAX: ffffffffffffffda RBX: 00007ffa60c16090 RCX: 00007ffa6099c819 [ 3085.816616][T18438] RDX: 0000000000000102 RSI: 0000200000001ac0 RDI: 0000000000000003 [ 3085.824638][T18438] RBP: 00007ffa6191e090 R08: 0000000000000000 R09: 0000000000000000 [ 3085.832669][T18438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3085.840681][T18438] R13: 00007ffa60c16128 R14: 00007ffa60c16090 R15: 00007fff56ee7478 [ 3085.848711][T18438] [ 3086.296335][T18441] netlink: 'syz.4.15382': attribute type 39 has an invalid length. [ 3086.494627][T18449] netlink: 830 bytes leftover after parsing attributes in process `syz.7.15386'. [ 3086.559020][T18455] netlink: 'syz.4.15387': attribute type 21 has an invalid length. [ 3086.568110][T18454] netlink: 'syz.1.15388': attribute type 10 has an invalid length. [ 3086.576489][T18454] netlink: 40 bytes leftover after parsing attributes in process `syz.1.15388'. [ 3086.594583][T18454] bridge0: port 1(ipvlan1) entered blocking state [ 3086.607133][T18454] bridge0: port 1(ipvlan1) entered disabled state [ 3086.625077][T18454] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 3086.751550][T18462] FAULT_INJECTION: forcing a failure. [ 3086.751550][T18462] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3086.767169][T18462] CPU: 1 PID: 18462 Comm: syz.1.15391 Not tainted syzkaller #0 [ 3086.774888][T18462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3086.785007][T18462] Call Trace: [ 3086.788352][T18462] [ 3086.791325][T18462] dump_stack_lvl+0x188/0x24e [ 3086.796074][T18462] ? show_regs_print_info+0x12/0x12 [ 3086.801334][T18462] ? load_image+0x400/0x400 [ 3086.805906][T18462] ? __lock_acquire+0x7d10/0x7d10 [ 3086.810995][T18462] should_fail_ex+0x399/0x4d0 [ 3086.815768][T18462] _copy_from_user+0x2c/0x170 [ 3086.820507][T18462] ___sys_sendmsg+0x1c3/0x360 [ 3086.825255][T18462] ? __sys_sendmsg+0x290/0x290 [ 3086.830098][T18462] ? __lock_acquire+0x7d10/0x7d10 [ 3086.835207][T18462] __se_sys_sendmsg+0x1bb/0x2a0 [ 3086.840191][T18462] ? __x64_sys_sendmsg+0x80/0x80 [ 3086.845217][T18462] ? lockdep_hardirqs_on+0x94/0x140 [ 3086.850481][T18462] do_syscall_64+0x4c/0xa0 [ 3086.854956][T18462] ? clear_bhb_loop+0x60/0xb0 [ 3086.859688][T18462] ? clear_bhb_loop+0x60/0xb0 [ 3086.864442][T18462] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3086.870414][T18462] RIP: 0033:0x7ffa6099c819 [ 3086.874892][T18462] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3086.894652][T18462] RSP: 002b:00007ffa6193f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3086.903126][T18462] RAX: ffffffffffffffda RBX: 00007ffa60c15fa0 RCX: 00007ffa6099c819 [ 3086.911139][T18462] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 3086.919140][T18462] RBP: 00007ffa6193f090 R08: 0000000000000000 R09: 0000000000000000 [ 3086.927131][T18462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3086.935126][T18462] R13: 00007ffa60c16038 R14: 00007ffa60c15fa0 R15: 00007fff56ee7478 [ 3086.943134][T18462] [ 3089.970532][T18475] netlink: 'syz.6.15396': attribute type 10 has an invalid length. [ 3089.982323][T18482] netlink: 144 bytes leftover after parsing attributes in process `syz.7.15399'. [ 3089.992238][T18483] netlink: 144 bytes leftover after parsing attributes in process `syz.7.15399'. [ 3090.002780][T18487] netlink: 'syz.1.15398': attribute type 39 has an invalid length. [ 3090.100570][T18495] FAULT_INJECTION: forcing a failure. [ 3090.100570][T18495] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3090.120983][T18495] CPU: 1 PID: 18495 Comm: syz.7.15400 Not tainted syzkaller #0 [ 3090.128615][T18495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3090.138731][T18495] Call Trace: [ 3090.142149][T18495] [ 3090.145128][T18495] dump_stack_lvl+0x188/0x24e [ 3090.149898][T18495] ? show_regs_print_info+0x12/0x12 [ 3090.155167][T18495] ? load_image+0x400/0x400 [ 3090.159718][T18495] ? __lock_acquire+0x7d10/0x7d10 [ 3090.164824][T18495] should_fail_ex+0x399/0x4d0 [ 3090.169563][T18495] _copy_from_user+0x2c/0x170 [ 3090.174294][T18495] ___sys_sendmsg+0x1c3/0x360 [ 3090.179029][T18495] ? __sys_sendmsg+0x290/0x290 [ 3090.183852][T18495] ? __lock_acquire+0x7d10/0x7d10 [ 3090.188983][T18495] __se_sys_sendmsg+0x1bb/0x2a0 [ 3090.193897][T18495] ? __x64_sys_sendmsg+0x80/0x80 [ 3090.198885][T18495] ? lockdep_hardirqs_on+0x94/0x140 [ 3090.204113][T18495] do_syscall_64+0x4c/0xa0 [ 3090.208563][T18495] ? clear_bhb_loop+0x60/0xb0 [ 3090.213271][T18495] ? clear_bhb_loop+0x60/0xb0 [ 3090.217978][T18495] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3090.223899][T18495] RIP: 0033:0x7f6a37f9c819 [ 3090.228336][T18495] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3090.247965][T18495] RSP: 002b:00007f6a38da8028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3090.256403][T18495] RAX: ffffffffffffffda RBX: 00007f6a38215fa0 RCX: 00007f6a37f9c819 [ 3090.264397][T18495] RDX: 0000000060044084 RSI: 0000200000000040 RDI: 0000000000000003 [ 3090.272404][T18495] RBP: 00007f6a38da8090 R08: 0000000000000000 R09: 0000000000000000 [ 3090.280399][T18495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3090.288410][T18495] R13: 00007f6a38216038 R14: 00007f6a38215fa0 R15: 00007ffe3c31fe18 [ 3090.296414][T18495] [ 3090.330130][T18497] netlink: 'syz.6.15401': attribute type 4 has an invalid length. [ 3090.354161][T18497] netlink: 152 bytes leftover after parsing attributes in process `syz.6.15401'. [ 3090.385779][T18497] A link change request failed with some changes committed already. Interface bond0 may have been left with an inconsistent configuration, please check. [ 3090.584642][T18505] netlink: 'syz.7.15404': attribute type 10 has an invalid length. [ 3090.608466][T18505] netlink: 40 bytes leftover after parsing attributes in process `syz.7.15404'. [ 3090.648126][T18505] device ipvlan1 entered promiscuous mode [ 3090.732137][T18505] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 3090.767444][T18508] netlink: 830 bytes leftover after parsing attributes in process `syz.6.15405'. [ 3091.050778][T18525] netlink: 'syz.1.15411': attribute type 33 has an invalid length. [ 3091.064390][T18525] netlink: 152 bytes leftover after parsing attributes in process `syz.1.15411'. [ 3091.189884][T18524] netlink: 'syz.7.15410': attribute type 3 has an invalid length. [ 3091.212040][T18527] netlink: 'syz.7.15410': attribute type 3 has an invalid length. [ 3091.245945][T18524] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.15410'. [ 3091.268542][T18527] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.15410'. [ 3091.365128][T18532] FAULT_INJECTION: forcing a failure. [ 3091.365128][T18532] name failslab, interval 1, probability 0, space 0, times 0 [ 3091.403337][T18532] CPU: 1 PID: 18532 Comm: syz.5.15413 Not tainted syzkaller #0 [ 3091.410975][T18532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3091.421101][T18532] Call Trace: [ 3091.424425][T18532] [ 3091.427399][T18532] dump_stack_lvl+0x188/0x24e [ 3091.432144][T18532] ? show_regs_print_info+0x12/0x12 [ 3091.437393][T18532] ? load_image+0x400/0x400 [ 3091.441958][T18532] ? __might_sleep+0xd0/0xd0 [ 3091.446619][T18532] ? __lock_acquire+0x7d10/0x7d10 [ 3091.451714][T18532] should_fail_ex+0x399/0x4d0 [ 3091.456462][T18532] should_failslab+0x5/0x20 [ 3091.461027][T18532] slab_pre_alloc_hook+0x59/0x310 [ 3091.466121][T18532] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3091.471921][T18532] __kmem_cache_alloc_node+0x4f/0x260 [ 3091.477357][T18532] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 3091.483138][T18532] __kmalloc+0xa0/0x240 [ 3091.487365][T18532] tomoyo_realpath_from_path+0xdf/0x5d0 [ 3091.492979][T18532] ? tomoyo_path_number_perm+0x205/0x650 [ 3091.498661][T18532] tomoyo_path_number_perm+0x22f/0x650 [ 3091.504170][T18532] ? trace_event_raw_event_lock_acquire+0x2c0/0x2c0 [ 3091.510795][T18532] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 3091.516292][T18532] ? ksys_write+0x1c0/0x250 [ 3091.520849][T18532] ? common_file_perm+0x171/0x1c0 [ 3091.525954][T18532] ? __fget_files+0x28/0x4b0 [ 3091.530685][T18532] ? __fget_files+0x28/0x4b0 [ 3091.535327][T18532] security_file_ioctl+0x6c/0xa0 [ 3091.540334][T18532] __se_sys_ioctl+0x48/0x170 [ 3091.544964][T18532] do_syscall_64+0x4c/0xa0 [ 3091.549417][T18532] ? clear_bhb_loop+0x60/0xb0 [ 3091.554125][T18532] ? clear_bhb_loop+0x60/0xb0 [ 3091.558847][T18532] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3091.564777][T18532] RIP: 0033:0x7f17b8b9c819 [ 3091.569218][T18532] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3091.588891][T18532] RSP: 002b:00007f17b6df6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3091.597342][T18532] RAX: ffffffffffffffda RBX: 00007f17b8e15fa0 RCX: 00007f17b8b9c819 [ 3091.605342][T18532] RDX: 0000200000000180 RSI: 00000000c008744c RDI: 0000000000000003 [ 3091.613377][T18532] RBP: 00007f17b6df6090 R08: 0000000000000000 R09: 0000000000000000 [ 3091.621406][T18532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3091.629494][T18532] R13: 00007f17b8e16038 R14: 00007f17b8e15fa0 R15: 00007ffd6ee53328 [ 3091.637519][T18532] [ 3091.847865][T18532] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3092.286233][T18545] netlink: 'syz.7.15418': attribute type 39 has an invalid length. [ 3093.407945][T18552] netlink: 'syz.6.15420': attribute type 2 has an invalid length. [ 3093.509372][T18559] FAULT_INJECTION: forcing a failure. [ 3093.509372][T18559] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3093.594575][T18559] CPU: 1 PID: 18559 Comm: syz.4.15422 Not tainted syzkaller #0 [ 3093.602210][T18559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3093.612314][T18559] Call Trace: [ 3093.615635][T18559] [ 3093.618593][T18559] dump_stack_lvl+0x188/0x24e [ 3093.623317][T18559] ? show_regs_print_info+0x12/0x12 [ 3093.628557][T18559] ? load_image+0x400/0x400 [ 3093.633099][T18559] ? __lock_acquire+0x7d10/0x7d10 [ 3093.638179][T18559] should_fail_ex+0x399/0x4d0 [ 3093.642894][T18559] _copy_from_user+0x2c/0x170 [ 3093.647634][T18559] ___sys_sendmsg+0x1c3/0x360 [ 3093.652380][T18559] ? __sys_sendmsg+0x290/0x290 [ 3093.657225][T18559] ? __lock_acquire+0x7d10/0x7d10 [ 3093.662339][T18559] __se_sys_sendmsg+0x1bb/0x2a0 [ 3093.667247][T18559] ? __x64_sys_sendmsg+0x80/0x80 [ 3093.672234][T18559] ? lockdep_hardirqs_on+0x94/0x140 [ 3093.677484][T18559] do_syscall_64+0x4c/0xa0 [ 3093.681947][T18559] ? clear_bhb_loop+0x60/0xb0 [ 3093.686654][T18559] ? clear_bhb_loop+0x60/0xb0 [ 3093.691368][T18559] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3093.697295][T18559] RIP: 0033:0x7f80c099c819 [ 3093.701734][T18559] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3093.721364][T18559] RSP: 002b:00007f80c180c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3093.729808][T18559] RAX: ffffffffffffffda RBX: 00007f80c0c15fa0 RCX: 00007f80c099c819 [ 3093.737849][T18559] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000003 [ 3093.745855][T18559] RBP: 00007f80c180c090 R08: 0000000000000000 R09: 0000000000000000 [ 3093.753859][T18559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3093.761857][T18559] R13: 00007f80c0c16038 R14: 00007f80c0c15fa0 R15: 00007ffd59c685a8 [ 3093.769870][T18559] [ 3094.380594][T18576] FAULT_INJECTION: forcing a failure. [ 3094.380594][T18576] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3094.394479][T18576] CPU: 1 PID: 18576 Comm: syz.5.15429 Not tainted syzkaller #0 [ 3094.402108][T18576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3094.412305][T18576] Call Trace: [ 3094.415620][T18576] [ 3094.418592][T18576] dump_stack_lvl+0x188/0x24e [ 3094.423329][T18576] ? show_regs_print_info+0x12/0x12 [ 3094.428578][T18576] ? load_image+0x400/0x400 [ 3094.433133][T18576] ? __lock_acquire+0x7d10/0x7d10 [ 3094.438219][T18576] should_fail_ex+0x399/0x4d0 [ 3094.442949][T18576] _copy_from_user+0x2c/0x170 [ 3094.447686][T18576] __sys_bpf+0x2ea/0x780 [ 3094.452010][T18576] ? bpf_link_show_fdinfo+0x380/0x380 [ 3094.457448][T18576] ? lock_chain_count+0x20/0x20 [ 3094.462375][T18576] __x64_sys_bpf+0x78/0x90 [ 3094.466855][T18576] do_syscall_64+0x4c/0xa0 [ 3094.471378][T18576] ? clear_bhb_loop+0x60/0xb0 [ 3094.476125][T18576] ? clear_bhb_loop+0x60/0xb0 [ 3094.481004][T18576] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3094.486950][T18576] RIP: 0033:0x7f17b8b9c819 [ 3094.491407][T18576] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3094.511242][T18576] RSP: 002b:00007f17b6df6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3094.519702][T18576] RAX: ffffffffffffffda RBX: 00007f17b8e15fa0 RCX: 00007f17b8b9c819 [ 3094.527718][T18576] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 3094.535731][T18576] RBP: 00007f17b6df6090 R08: 0000000000000000 R09: 0000000000000000 [ 3094.543739][T18576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3094.551757][T18576] R13: 00007f17b8e16038 R14: 00007f17b8e15fa0 R15: 00007ffd6ee53328 [ 3094.559790][T18576] [ 3094.681879][T18581] netlink: 122896 bytes leftover after parsing attributes in process `syz.5.15431'. [ 3094.864044][T18573] netlink: 'syz.7.15427': attribute type 33 has an invalid length. [ 3094.872741][T18573] netlink: 152 bytes leftover after parsing attributes in process `syz.7.15427'. [ 3094.885294][T18581] debugfs: Directory '.!' with parent 'ieee80211' already present! [ 3095.284651][T18585] netlink: 'syz.6.15434': attribute type 3 has an invalid length. [ 3095.293968][T18585] __nla_validate_parse: 1 callbacks suppressed [ 3095.293987][T18585] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.15434'. [ 3095.493459][T18597] netlink: 'syz.5.15436': attribute type 39 has an invalid length. [ 3095.515548][T18596] netlink: 'syz.6.15434': attribute type 3 has an invalid length. [ 3095.542327][T18596] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.15434'. [ 3096.382350][T18609] netlink: 'syz.1.15442': attribute type 41 has an invalid length. [ 3096.591053][T18623] FAULT_INJECTION: forcing a failure. [ 3096.591053][T18623] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3096.614505][T18623] CPU: 0 PID: 18623 Comm: syz.5.15445 Not tainted syzkaller #0 [ 3096.622145][T18623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3096.632252][T18623] Call Trace: [ 3096.635574][T18623] [ 3096.638542][T18623] dump_stack_lvl+0x188/0x24e [ 3096.643281][T18623] ? show_regs_print_info+0x12/0x12 [ 3096.648537][T18623] ? load_image+0x400/0x400 [ 3096.653166][T18623] ? __lock_acquire+0x7d10/0x7d10 [ 3096.658229][T18623] ? perf_trace_lock_acquire+0x100/0x3e0 [ 3096.663892][T18623] should_fail_ex+0x399/0x4d0 [ 3096.668599][T18623] _copy_from_user+0x2c/0x170 [ 3096.673313][T18623] ___sys_sendmsg+0x1c3/0x360 [ 3096.678031][T18623] ? __sys_sendmsg+0x290/0x290 [ 3096.682846][T18623] ? __lock_acquire+0x7d10/0x7d10 [ 3096.687924][T18623] __se_sys_sendmsg+0x1bb/0x2a0 [ 3096.692806][T18623] ? __x64_sys_sendmsg+0x80/0x80 [ 3096.697804][T18623] ? lockdep_hardirqs_on+0x94/0x140 [ 3096.703032][T18623] do_syscall_64+0x4c/0xa0 [ 3096.707480][T18623] ? clear_bhb_loop+0x60/0xb0 [ 3096.712206][T18623] ? clear_bhb_loop+0x60/0xb0 [ 3096.716919][T18623] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3096.722847][T18623] RIP: 0033:0x7f17b8b9c819 [ 3096.727285][T18623] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3096.746919][T18623] RSP: 002b:00007f17b6df6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3096.755367][T18623] RAX: ffffffffffffffda RBX: 00007f17b8e15fa0 RCX: 00007f17b8b9c819 [ 3096.763368][T18623] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000003 [ 3096.771401][T18623] RBP: 00007f17b6df6090 R08: 0000000000000000 R09: 0000000000000000 [ 3096.779396][T18623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3096.787409][T18623] R13: 00007f17b8e16038 R14: 00007f17b8e15fa0 R15: 00007ffd6ee53328 [ 3096.795422][T18623] [ 3097.011635][T18631] netlink: 'syz.5.15447': attribute type 33 has an invalid length. [ 3097.028146][T18631] netlink: 152 bytes leftover after parsing attributes in process `syz.5.15447'. [ 3097.562053][T18644] netlink: 'syz.7.15451': attribute type 39 has an invalid length. [ 3098.176500][T18657] netlink: 'syz.1.15456': attribute type 3 has an invalid length. [ 3098.203319][T18657] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.15456'. [ 3098.215156][T18667] netlink: 'syz.1.15456': attribute type 3 has an invalid length. [ 3098.268939][T18667] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.15456'. [ 3098.392212][T18673] FAULT_INJECTION: forcing a failure. [ 3098.392212][T18673] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3098.424884][T18673] CPU: 1 PID: 18673 Comm: syz.4.15463 Not tainted syzkaller #0 [ 3098.432531][T18673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3098.442635][T18673] Call Trace: [ 3098.445952][T18673] [ 3098.448932][T18673] dump_stack_lvl+0x188/0x24e [ 3098.453686][T18673] ? show_regs_print_info+0x12/0x12 [ 3098.458944][T18673] ? load_image+0x400/0x400 [ 3098.463501][T18673] ? __lock_acquire+0x7d10/0x7d10 [ 3098.468578][T18673] ? perf_trace_lock_acquire+0x100/0x3e0 [ 3098.474304][T18673] should_fail_ex+0x399/0x4d0 [ 3098.479063][T18673] _copy_from_user+0x2c/0x170 [ 3098.483825][T18673] ___sys_sendmsg+0x1c3/0x360 [ 3098.488580][T18673] ? __sys_sendmsg+0x290/0x290 [ 3098.493424][T18673] ? __lock_acquire+0x7d10/0x7d10 [ 3098.498535][T18673] __se_sys_sendmsg+0x1bb/0x2a0 [ 3098.503457][T18673] ? __x64_sys_sendmsg+0x80/0x80 [ 3098.508475][T18673] ? lockdep_hardirqs_on+0x94/0x140 [ 3098.513730][T18673] do_syscall_64+0x4c/0xa0 [ 3098.518201][T18673] ? clear_bhb_loop+0x60/0xb0 [ 3098.522936][T18673] ? clear_bhb_loop+0x60/0xb0 [ 3098.527681][T18673] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3098.533712][T18673] RIP: 0033:0x7f80c099c819 [ 3098.538168][T18673] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3098.557821][T18673] RSP: 002b:00007f80c180c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3098.566334][T18673] RAX: ffffffffffffffda RBX: 00007f80c0c15fa0 RCX: 00007f80c099c819 [ 3098.574357][T18673] RDX: 0000000000000020 RSI: 0000200000000980 RDI: 0000000000000003 [ 3098.582377][T18673] RBP: 00007f80c180c090 R08: 0000000000000000 R09: 0000000000000000 [ 3098.590402][T18673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3098.598422][T18673] R13: 00007f80c0c16038 R14: 00007f80c0c15fa0 R15: 00007ffd59c685a8 [ 3098.606462][T18673] [ 3098.636194][T18680] netlink: 'syz.5.15464': attribute type 10 has an invalid length. [ 3098.657704][T18680] netlink: 40 bytes leftover after parsing attributes in process `syz.5.15464'. [ 3098.696694][T18680] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 3099.001468][T18687] @: port 1(vlan0) entered blocking state [ 3099.010595][T18687] @: port 1(vlan0) entered disabled state [ 3099.019707][T18687] device vlan0 entered promiscuous mode [ 3099.066676][T18687] @: port 1(vlan0) entered blocking state [ 3099.072629][T18687] @: port 1(vlan0) entered forwarding state [ 3099.128500][T18695] @: port 1(vlan0) entered blocking state [ 3099.165343][T18695] @: port 1(vlan0) entered disabled state [ 3099.216976][T18695] device vlan0 entered promiscuous mode [ 3099.256093][T18699] FAULT_INJECTION: forcing a failure. [ 3099.256093][T18699] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3099.330304][T18699] CPU: 1 PID: 18699 Comm: syz.1.15471 Not tainted syzkaller #0 [ 3099.337938][T18699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3099.348060][T18699] Call Trace: [ 3099.351381][T18699] [ 3099.354354][T18699] dump_stack_lvl+0x188/0x24e [ 3099.359107][T18699] ? show_regs_print_info+0x12/0x12 [ 3099.364374][T18699] ? load_image+0x400/0x400 [ 3099.369026][T18699] ? __lock_acquire+0x7d10/0x7d10 [ 3099.374109][T18699] ? snprintf+0xe5/0x140 [ 3099.378489][T18699] should_fail_ex+0x399/0x4d0 [ 3099.383220][T18699] _copy_to_user+0x2c/0x130 [ 3099.387778][T18699] simple_read_from_buffer+0xe3/0x150 [ 3099.393201][T18699] proc_fail_nth_read+0x1a6/0x220 [ 3099.398274][T18699] ? proc_fault_inject_write+0x310/0x310 [ 3099.403951][T18699] ? fsnotify_perm+0x248/0x550 [ 3099.408829][T18699] ? proc_fault_inject_write+0x310/0x310 [ 3099.414498][T18699] vfs_read+0x2de/0xa00 [ 3099.418700][T18699] ? kernel_read+0x1e0/0x1e0 [ 3099.423325][T18699] ? __fget_files+0x28/0x4b0 [ 3099.427949][T18699] ? __fget_files+0x28/0x4b0 [ 3099.432588][T18699] ? __fget_files+0x43d/0x4b0 [ 3099.437312][T18699] ? __fdget_pos+0x2ae/0x360 [ 3099.441941][T18699] ? ksys_read+0x71/0x250 [ 3099.446316][T18699] ksys_read+0x14c/0x250 [ 3099.450596][T18699] ? vfs_write+0xa30/0xa30 [ 3099.455080][T18699] ? lockdep_hardirqs_on+0x94/0x140 [ 3099.460341][T18699] do_syscall_64+0x4c/0xa0 [ 3099.464809][T18699] ? clear_bhb_loop+0x60/0xb0 [ 3099.469569][T18699] ? clear_bhb_loop+0x60/0xb0 [ 3099.474287][T18699] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3099.480226][T18699] RIP: 0033:0x7ffa6095d04e [ 3099.484672][T18699] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 3099.504408][T18699] RSP: 002b:00007ffa618fcfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3099.512859][T18699] RAX: ffffffffffffffda RBX: 00007ffa618fd6c0 RCX: 00007ffa6095d04e [ 3099.520868][T18699] RDX: 000000000000000f RSI: 00007ffa618fd0a0 RDI: 000000000000000f [ 3099.528875][T18699] RBP: 00007ffa618fd090 R08: 0000000000000000 R09: 0000000000000000 [ 3099.536915][T18699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3099.544919][T18699] R13: 00007ffa60c16218 R14: 00007ffa60c16180 R15: 00007fff56ee7478 [ 3099.552952][T18699] [ 3099.890470][T21901] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 3099.949977][T21901] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 3099.962415][T21901] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 3099.989855][T21901] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 3099.997819][T21901] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 3100.005308][T21901] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 3100.242809][T18723] netlink: 463 bytes leftover after parsing attributes in process `syz.1.15477'. [ 3100.273025][T31256] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3100.390525][T18723] netlink: 'syz.1.15477': attribute type 29 has an invalid length. [ 3100.515893][T31256] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3100.575869][T18723] netlink: 'syz.1.15477': attribute type 29 has an invalid length. [ 3100.606960][T18730] netlink: 'syz.1.15477': attribute type 29 has an invalid length. [ 3100.648625][T31256] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3100.663212][T18731] netlink: 'syz.1.15477': attribute type 29 has an invalid length. [ 3100.750430][T31256] bond0: (slave netdevsim0): Releasing backup interface [ 3100.778899][T31256] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3101.105376][T18744] netlink: 'syz.1.15482': attribute type 39 has an invalid length. [ 3101.290715][T18713] chnl_net:caif_netlink_parms(): no params data found [ 3101.518704][T18748] netlink: 122896 bytes leftover after parsing attributes in process `syz.5.15483'. [ 3101.737209][T18748] sysfs: cannot create duplicate filename '/class/ieee80211/.!' [ 3101.755252][T18748] CPU: 0 PID: 18748 Comm: syz.5.15483 Not tainted syzkaller #0 [ 3101.762912][T18748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3101.773039][T18748] Call Trace: [ 3101.776374][T18748] [ 3101.779375][T18748] dump_stack_lvl+0x188/0x24e [ 3101.784154][T18748] ? show_regs_print_info+0x12/0x12 [ 3101.789437][T18748] ? load_image+0x400/0x400 [ 3101.794079][T18748] sysfs_warn_dup+0x8a/0xa0 [ 3101.798826][T18748] sysfs_do_create_link_sd+0xc0/0x110 [ 3101.804366][T18748] device_add+0x7ed/0xfb0 [ 3101.808867][T18748] wiphy_register+0x1d9f/0x2ac0 [ 3101.813912][T18748] ? cfg80211_event_work+0x40/0x40 [ 3101.819110][T18748] ? minstrel_ht_alloc+0x894/0xa20 [ 3101.824398][T18748] ? ieee80211_init_rate_ctrl_alg+0x55e/0x5e0 [ 3101.830599][T18748] ieee80211_register_hw+0x2d00/0x39f0 [ 3101.836321][T18748] ? ieee80211_register_hw+0xf11/0x39f0 [ 3101.841988][T18748] ? ieee80211_register_hw+0xf11/0x39f0 [ 3101.847634][T18748] ? ieee80211_tasklet_handler+0x20/0x20 [ 3101.853374][T18748] ? memset+0x1e/0x40 [ 3101.857428][T18748] ? __hrtimer_init+0x186/0x270 [ 3101.862418][T18748] mac80211_hwsim_new_radio+0x28c2/0x4c40 [ 3101.868343][T18748] hwsim_new_radio_nl+0xafa/0xce0 [ 3101.873489][T18748] genl_family_rcv_msg_doit+0x22a/0x330 [ 3101.879110][T18748] ? end_current_label_crit_section+0x170/0x170 [ 3101.885448][T18748] ? genl_family_rcv_msg_dumpit+0x3c0/0x3c0 [ 3101.891456][T18748] ? bpf_lsm_capable+0x5/0x10 [ 3101.896279][T18748] ? security_capable+0x85/0xb0 [ 3101.901228][T18748] genl_rcv_msg+0x604/0x790 [ 3101.905834][T18748] ? genl_bind+0x360/0x360 [ 3101.910320][T18748] ? hwsim_tx_info_frame_received_nl+0xfc0/0xfc0 [ 3101.916777][T18748] netlink_rcv_skb+0x1fb/0x450 [ 3101.921636][T18748] ? genl_bind+0x360/0x360 [ 3101.926133][T18748] ? netlink_ack+0x1170/0x1170 [ 3101.931005][T18748] ? down_read+0x1a8/0x2d0 [ 3101.935507][T18748] genl_rcv+0x24/0x40 [ 3101.939992][T18748] netlink_unicast+0x74d/0x8d0 [ 3101.944869][T18748] netlink_sendmsg+0x8ad/0xbd0 [ 3101.949729][T18748] ? netlink_getsockopt+0x550/0x550 [ 3101.955014][T18748] ? aa_sock_msg_perm+0x94/0x150 [ 3101.960117][T18748] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 3101.965473][T18748] ? security_socket_sendmsg+0x7c/0xa0 [ 3101.971021][T18748] ? netlink_getsockopt+0x550/0x550 [ 3101.976298][T18748] ____sys_sendmsg+0x5be/0x970 [ 3101.981133][T18748] ? __sys_sendmsg_sock+0x30/0x30 [ 3101.986205][T18748] ? __import_iovec+0x315/0x500 [ 3101.991197][T18748] ? import_iovec+0x6f/0xa0 [ 3101.995751][T18748] ___sys_sendmsg+0x2a2/0x360 [ 3102.000491][T18748] ? __sys_sendmsg+0x290/0x290 [ 3102.005391][T18748] __se_sys_sendmsg+0x1bb/0x2a0 [ 3102.010295][T18748] ? __x64_sys_sendmsg+0x80/0x80 [ 3102.015309][T18748] ? lockdep_hardirqs_on+0x94/0x140 [ 3102.020557][T18748] do_syscall_64+0x4c/0xa0 [ 3102.025018][T18748] ? clear_bhb_loop+0x60/0xb0 [ 3102.029732][T18748] ? clear_bhb_loop+0x60/0xb0 [ 3102.034464][T18748] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3102.040406][T18748] RIP: 0033:0x7f17b8b9c819 [ 3102.044908][T18748] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3102.064553][T18748] RSP: 002b:00007f17b6df6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3102.073011][T18748] RAX: ffffffffffffffda RBX: 00007f17b8e15fa0 RCX: 00007f17b8b9c819 [ 3102.081029][T18748] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000005 [ 3102.089032][T18748] RBP: 00007f17b8c32c91 R08: 0000000000000000 R09: 0000000000000000 [ 3102.097050][T18748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3102.105055][T18748] R13: 00007f17b8e16038 R14: 00007f17b8e15fa0 R15: 00007ffd6ee53328 [ 3102.113099][T18748] [ 3102.117652][ T7459] Bluetooth: hci0: command 0x0409 tx timeout [ 3102.132114][T18713] bridge0: port 1(bridge_slave_0) entered blocking state [ 3102.140108][T18713] bridge0: port 1(bridge_slave_0) entered disabled state [ 3102.148703][T18713] device bridge_slave_0 entered promiscuous mode [ 3102.232261][T18713] bridge0: port 2(bridge_slave_1) entered blocking state [ 3102.240011][T18713] bridge0: port 2(bridge_slave_1) entered disabled state [ 3102.248675][T18713] device bridge_slave_1 entered promiscuous mode [ 3102.338933][T18713] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3102.400570][T18713] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3102.620841][T18713] team0: Port device team_slave_0 added [ 3102.677774][T18713] team0: Port device team_slave_1 added [ 3102.945009][T18713] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3102.955126][T18713] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3102.996968][T18795] netlink: 'syz.7.15494': attribute type 29 has an invalid length. [ 3103.006621][T18713] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3103.155484][T18795] netlink: 'syz.7.15494': attribute type 29 has an invalid length. [ 3103.166624][T18713] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3103.181146][T18713] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3103.214271][T18713] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3103.235622][T18793] netlink: 'syz.7.15494': attribute type 39 has an invalid length. [ 3103.245131][T18798] netlink: 'syz.7.15494': attribute type 29 has an invalid length. [ 3103.364617][T18713] device hsr_slave_0 entered promiscuous mode [ 3103.398799][T18713] device hsr_slave_1 entered promiscuous mode [ 3103.437839][T18713] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 3103.445503][T18713] Cannot create hsr debugfs directory [ 3104.062725][T18812] netlink: 'syz.4.15497': attribute type 10 has an invalid length. [ 3104.177819][ T7459] Bluetooth: hci0: command 0x041b tx timeout [ 3105.183175][T18836] [ 3105.186093][T18836] ============================= [ 3105.191174][T18836] WARNING: suspicious RCU usage [ 3105.196107][T18836] syzkaller #0 Not tainted [ 3105.200643][T18836] ----------------------------- [ 3105.205525][T18836] kernel/events/callchain.c:161 suspicious rcu_dereference_check() usage! [ 3105.214367][T18836] [ 3105.214367][T18836] other info that might help us debug this: [ 3105.214367][T18836] [ 3105.224809][T18836] [ 3105.224809][T18836] rcu_scheduler_active = 2, debug_locks = 1 [ 3105.233080][T18836] 1 lock held by syz.4.15505/18836: [ 3105.238393][T18836] #0: ffffffff8cb2d720 (rcu_read_lock_trace){....}-{0:0}, at: rcu_read_lock_trace+0x37/0x70 [ 3105.248767][T18836] [ 3105.248767][T18836] stack backtrace: [ 3105.254707][T18836] CPU: 0 PID: 18836 Comm: syz.4.15505 Not tainted syzkaller #0 [ 3105.262299][T18836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 3105.272401][T18836] Call Trace: [ 3105.275730][T18836] [ 3105.278727][T18836] dump_stack_lvl+0x188/0x24e [ 3105.283482][T18836] ? show_regs_print_info+0x12/0x12 [ 3105.288751][T18836] ? load_image+0x400/0x400 [ 3105.293321][T18836] lockdep_rcu_suspicious+0x1dd/0x300 [ 3105.298758][T18836] get_callchain_entry+0x2a5/0x3b0 [ 3105.303980][T18836] get_perf_callchain+0xc4/0x490 [ 3105.308988][T18836] ? put_callchain_entry+0xb0/0xb0 [ 3105.314164][T18836] ? preempt_schedule+0xbc/0xd0 [ 3105.319079][T18836] ? preempt_schedule_common+0xa5/0xd0 [ 3105.324604][T18836] ? verify_lock_unused+0x140/0x140 [ 3105.329864][T18836] ? preempt_schedule+0xbc/0xd0 [ 3105.334782][T18836] __bpf_get_stack+0x2de/0x520 [ 3105.339614][T18836] ? stack_map_get_build_id_offset+0x970/0x970 [ 3105.346026][T18836] ? bpf_prog_14d9fb3786f83342+0x3d/0x41 [ 3105.351761][T18836] bpf_get_stack_raw_tp+0x189/0x1c0 [ 3105.357042][T18836] bpf_prog_14d9fb3786f83342+0x3d/0x41 [ 3105.362569][T18836] bpf_prog_run_pin_on_cpu+0xaa/0x150 [ 3105.368016][T18836] bpf_prog_test_run_syscall+0x313/0x4a0 [ 3105.373716][T18836] ? sock_gen_cookie+0x60/0x60 [ 3105.378551][T18836] ? sock_gen_cookie+0x60/0x60 [ 3105.383371][T18836] bpf_prog_test_run+0x31e/0x390 [ 3105.388358][T18836] __sys_bpf+0x62b/0x780 [ 3105.392648][T18836] ? bpf_link_show_fdinfo+0x380/0x380 [ 3105.398057][T18836] ? _raw_spin_unlock_irqrestore+0x82/0x120 [ 3105.403998][T18836] ? lock_chain_count+0x20/0x20 [ 3105.408901][T18836] __x64_sys_bpf+0x78/0x90 [ 3105.413365][T18836] do_syscall_64+0x4c/0xa0 [ 3105.417821][T18836] ? clear_bhb_loop+0x60/0xb0 [ 3105.422546][T18836] ? clear_bhb_loop+0x60/0xb0 [ 3105.427259][T18836] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3105.433181][T18836] RIP: 0033:0x7f80c099c819 [ 3105.437635][T18836] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3105.457273][T18836] RSP: 002b:00007f80c180c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3105.465718][T18836] RAX: ffffffffffffffda RBX: 00007f80c0c15fa0 RCX: 00007f80c099c819 [ 3105.473742][T18836] RDX: 000000000000000c RSI: 00002000000004c0 RDI: 000000000000000a [ 3105.481759][T18836] RBP: 00007f80c0a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 3105.489766][T18836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3105.497819][T18836] R13: 00007f80c0c16038 R14: 00007f80c0c15fa0 R15: 00007ffd59c685a8 [ 3105.505833][T18836] [ 3105.695238][T31256] device vlan0 left promiscuous mode [ 3105.703390][T31256] @: port 1(vlan0) entered disabled state [ 3105.725494][T31256] device bridge_slave_1 left promiscuous mode [ 3105.735505][T31256] bridge0: port 2(bridge_slave_1) entered disabled state [ 3105.775957][T31256] device veth1_macvtap left promiscuous mode [ 3105.783395][T31256] device veth1_vlan left promiscuous mode [ 3105.789862][T31256] device veth0_vlan left promiscuous mode [ 3106.261820][ T7459] Bluetooth: hci0: command 0x040f tx timeout [ 3106.392513][T31256] team0 (unregistering): Port device team_slave_1 removed [ 3106.476075][T31256] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3106.523899][T31256] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3106.774182][T31256] bond0 (unregistering): (slave bridge0): Releasing backup interface [ 3106.783586][T31256] bond0 (unregistering): Released all slaves [ 3106.924985][T18837] device syzkaller0 entered promiscuous mode [ 3108.338823][ T7459] Bluetooth: hci0: command 0x0419 tx timeout [ 3109.433118][T18713] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 3109.443495][T18713] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 3109.455589][T18713] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 3109.470602][T18713] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 3109.552784][T18713] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3109.572365][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3109.581802][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3109.596452][T18713] 8021q: adding VLAN 0 to HW filter on device team0 [ 3109.611706][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3109.621529][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3109.634194][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 3109.641386][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3109.663780][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3109.676165][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3109.686075][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3109.699500][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 3109.706654][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3109.716155][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3109.741550][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3109.752118][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3109.761788][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3109.770832][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3109.781169][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3109.792283][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3109.801058][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3109.809936][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3109.825984][T18713] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3109.840373][T18713] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3109.850523][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3109.859380][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3110.200907][T31256] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3110.212400][T31256] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3110.229773][T18713] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3110.648243][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3110.662732][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3110.694361][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3110.710804][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3110.724323][T18713] device veth0_vlan entered promiscuous mode [ 3110.733664][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3110.742985][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3110.759753][T18713] device veth1_vlan entered promiscuous mode [ 3110.791669][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3110.804020][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3110.813606][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3110.830929][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3110.844233][T18713] device veth0_macvtap entered promiscuous mode [ 3110.856937][T18713] device veth1_macvtap entered promiscuous mode [ 3110.884115][T18713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3110.896009][T18713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3110.908889][T18713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3110.919572][T18713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3110.938560][T18713] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3110.949868][ T4327] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3110.958426][ T4327] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3110.966780][ T4327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3110.984151][ T4327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3110.997772][T18713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3111.017576][T18713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3111.027597][T18713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3111.038408][T18713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3111.050121][T18713] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3111.061128][T31256] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3111.070455][T31256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3111.084085][T18713] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3111.102839][T18713] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3111.112659][T18713] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3111.122471][T18713] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3111.199772][T31256] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3111.216530][T31256] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3111.246720][ T9105] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 3111.264980][T31256] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3111.281196][T31256] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3111.306332][ T4327] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready Stopping sshd: stopped /usr/sbin/sshd (pid 4029) OK Stopping crond: stopped /usr/sbin/crond (pid 4014) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 3932) Stopping network: OK Stopping iptables: OK Stopping system message bus: done