last executing test programs: 45m49.583947997s ago: executing program 32 (id=90): bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="18c0ad149d13fb1eeb0000000000001000000000000000000000000000000000efc8175db3ec885c0d9c8de5503344099e0118e49ad01a8539a3f9b2d2af1b8ba3be42c342f56c484bf99533f18e4489fa95047bf8e1a20fe7e5e3429b0cb48ae6a1c5b464684115638729f2086e7ccc102fff353802de09cc3296377d4f58ca0e27230002304cf6d6833ba39737ad80a12159e6148be797f46d2bfe9d8516e77ed34f97570b6ccdf5c4fa4763bad9a65611da6de47df198d8beb487be36c8dd2a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000e0ffff1e00000000000000009500fe2a12882b49d10bf4f1a6000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x180) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a00000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x80) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) sendmsg(r2, 0x0, 0x20004004) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000008000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000fcffffff000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r6}, 0x3d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4, 0x0, 0x0, 0x504}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) close(r7) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r9, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', r3, 0x4000, r1}, 0x18) sendmsg$inet(r9, &(0x7f00000008c0)={&(0x7f00000004c0)={0x2, 0x4e22, @empty}, 0x10, 0x0}, 0x20000014) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 44m8.076053033s ago: executing program 33 (id=333): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/../file0/../file0/file0\x00', 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb01001800000000000000000000c1809b314b4984d00000000000060000000000612e2e007f747916cdd3b6f4c5d5ebe667ffaee29cd998afd4126318acb55f9bf2b5bfa2e3b5f762c39156dc57bc90a2a410d530e26c928db9654a0e07086b485c39169e7d9274b653e6034b3270782c21803f572a749effabc3"], 0x0, 0x1e}, 0x28) perf_event_open$cgroup(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x3, 0x2, 0x0, 0x4, 0x21000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000300), 0xa}, 0x4000, 0x8000000000000001, 0x4, 0x3, 0x6, 0x3f, 0x16ae, 0x0, 0x5, 0x0, 0xffff}, r0, 0x1, r2, 0x7) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x20000000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x50) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1e) 43m25.658512721s ago: executing program 34 (id=350): bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="18c0ad149d13fb1eeb0000000000001000000000000000000000000000000000efc8175db3ec885c0d9c8de5503344099e0118e49ad01a8539a3f9b2d2af1b8ba3be42c342f56c484bf99533f18e4489fa95047bf8e1a20fe7e5e3429b0cb48ae6a1c5b464684115638729f2086e7ccc102fff353802de09cc3296377d4f58ca0e27230002304cf6d6833ba39737ad80a12159e6148be797f46d2bfe9d8516e77ed34f97570b6ccdf5c4fa4763bad9a65611da6de47df198d8beb487be36c8dd2a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000e0ffff1e00000000000000009500fe2a12882b49d10bf4f1a6000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000800000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) sendmsg(r2, 0x0, 0x20004004) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000008000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000fcffffff000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00'}, 0x3d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4, 0x0, 0x0, 0x504}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) close(r6) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r8, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', r3, 0x4000, r1}, 0x18) sendmsg$inet(r8, &(0x7f00000008c0)={&(0x7f00000004c0)={0x2, 0x4e22, @empty}, 0x10, 0x0}, 0x20000014) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 42m47.412766736s ago: executing program 4 (id=460): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r1}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r2}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.kill\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x31) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000040)=0x4000000081) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x2d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r6, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) syz_clone(0xc2002011, 0x0, 0x0, 0x0, 0x0, 0x0) 42m44.343139213s ago: executing program 4 (id=462): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x307, 0x0, 0x0, 0x1fffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x2b, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000600)=0xd, 0x18) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x40, 0xfd, 0x20, 0x80, 0x7602, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1886e5ad6ab3e97, 0x0, 0x0, 0x3, 0x0, 0x4, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_type(r5, 0x0, 0x2, 0x0) write$cgroup_type(r6, 0x0, 0x0) r7 = openat$cgroup_procs(r2, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000c40), 0x12) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r9, &(0x7f00000000c0), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f00000019c0)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8b1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffaf4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431410fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6daa790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c7070800000000000000433b809bdb9fbd48bc873495cbff90326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf8714d7bb2366fde41f94290c2a5fdecb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1f5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41ffc12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5eae593fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9db25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27832b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bb0800c51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d51a36a540f0c10ec3a11667290b075225fde44c4e0973171ad47d6b0fdf9743af932cd6db49a47613808bad95971030000007d00000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c6055bb164ab413d5467ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d7ab3753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa165099c5ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a3174b531f573fe0e5239c000be2733c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf06db539f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe6e7603d0a7a56fb09cd119ac06adb6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a1914b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d0104361c37c61a43b5afd865b60d4cae891b73220f17d25979a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c69a795927e3861654736804bed4214040b7724c056d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953e88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a72e1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e64701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8adc67ec92d13a4faa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a2689217380400a9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c027060697a7f10132b1c259d3f28b9ea81232fbef665f6212f875b2a000000000000000000000000000020bd79e41c682139c58ac1deb039a691ad640e12c12fe11d70fe495906f2d5d71778acbd4eee53a3996cb0de84bd2b059d60c0f96a53ea44e0b293865aa68df494f87db976e36ad6c06912244d4c883c4aaa60b4a1392ce0b2f2c519663b4652ff871e0f6dfff9f7d34ecf04be0a58c3d53174b67d1886e34b81ad8c60da56acc64739c3acab24aa8d0ac92d465074f915608b1b60a948bad401b1a7fb3627bbe6c45123ed44bfdf8cc143bd1b7a663dc3d0476b8e39becffc429e41f66b1e37ae52aacaff0f1dc8ea70b68c25072e20586b19127d75fa71577f265c51000000000000000000000000000000000000000000915c2cde78db002a20e370600f56b3803786ffff268fa1782c240a1d3b62bb5c9c5712bc58a0f276f5224b6efaceab36d1468b0800000000000000cbefec08ac7cb62a9f6abcc97daf83edafe4409ecba3050a321a180af12bc59b1b2f1a9cfdf4bf2d260000000000a62f09e2ede938ea300cbefada05c356f12cdc84f66c65e669f0ffcb4ad94f6a8ba978f89ab3d2e62bd2c3eae921e9871acbf36c259d3a86dd5d022bac5ee38f6eccd3e462e47a96dc9e653fb7d7a64405a7c97fb3946f6766f937119652e07464910290873e989f3798f5324de8584a1a8772d2bddfc6eea633f7be50d362159914a877d2fe0fc67783b4fb000000000000000000328b4ed8ac2f2d0440488e4b1d32280373df7ce8847683fae1c73ee4cb320ba8a820"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x49) 42m43.735739168s ago: executing program 4 (id=463): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='ib_mad_send_done_handler\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001000000800000", @ANYRES32=0x0, @ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7000000}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 42m42.673569062s ago: executing program 4 (id=465): perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc0189436, 0xf0ff1f00000000) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) unlink(&(0x7f0000000000)='./file0\x00') perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) close(r5) close(r6) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') 42m42.499066089s ago: executing program 3 (id=467): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x2e0, 0x12c, 0x60000004, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f90931dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) 42m42.078448707s ago: executing program 3 (id=469): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000980)={0x0, 0x7ff, 0x18}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000a00)='rxrpc_rx_icmp\x00', r1, 0x0, 0x4}, 0x18) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x58, &(0x7f0000000600)}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0xe, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0xfffffedf, 0x10, &(0x7f0000000040), 0xffffff95, 0x0, 0xffffffffffffffff, 0xd}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x0, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x9ffc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 42m41.014033071s ago: executing program 3 (id=472): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000cd00000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00'}, 0x2d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000340), 0x9) recvmsg(r3, &(0x7f00000003c0)={&(0x7f0000000880)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000900)=""/158, 0x9e}], 0x1, &(0x7f00000009c0)=""/214, 0xd6}, 0x81) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f00000002c0)='sched_kthread_work_queue_work\x00', r5}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={&(0x7f0000000300)}, 0x0, 0xc8, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x1, 0xffffffffffffffff, 0x1) 42m38.199982568s ago: executing program 1 (id=475): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='ib_mad_send_done_handler\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001000000800000", @ANYRES32=0x0, @ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7000000}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 42m38.199531658s ago: executing program 4 (id=476): perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000d60000000900000005"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000001680), &(0x7f0000002300), 0x8001, r0}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) 42m38.197711928s ago: executing program 3 (id=484): perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc0189436, 0xf0ff1f00000000) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) unlink(&(0x7f0000000000)='./file0\x00') perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) close(r5) close(r6) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') 42m36.409543182s ago: executing program 1 (id=477): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, 0x0, 0xfdef) 42m36.278546547s ago: executing program 1 (id=478): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000a0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000850000002a00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000069c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb01001800000000000000140000001400000002000000000000000100000d"], &(0x7f0000006900)=""/173, 0x2e, 0xad, 0x1}, 0x28) 42m36.007775889s ago: executing program 4 (id=479): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz1\x00', 0x1ff) openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 42m34.735208441s ago: executing program 3 (id=481): r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f0000000800)={&(0x7f0000000100)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000040)=[{0x0}], 0x1}, 0xc8d4) sendmsg$inet(r0, &(0x7f0000000e40)={&(0x7f0000000140)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000001180)=[{&(0x7f0000000340)="d9", 0x34000}], 0x1}, 0x4000) sendmsg$inet(r0, &(0x7f0000000b80)={&(0x7f00000004c0)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000b00)=[{&(0x7f0000000680)="82", 0x1}, {0x0}], 0x2}, 0x810) 42m34.727090282s ago: executing program 1 (id=483): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000004080)=@base={0x8, 0x4, 0x4, 0xbf26, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3000000, 0x4}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='sched_switch\x00', r1}, 0x18) 42m33.56485528s ago: executing program 1 (id=485): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180100002100"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000710000009500000000000000b3325798"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r2}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_int(r1, &(0x7f0000000340)='memory.min\x00', 0x2, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000404000000002e"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0x4, 0xa, 0x4, 0xffffffffffffffff, 0x0, '\x00', 0x0, r4, 0x2, 0x1}, 0x48) write$cgroup_int(r3, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x1}, 0x4, 0x800000000000c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x810) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) 42m33.495982022s ago: executing program 3 (id=487): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x2, 0x4, 0x4, 0x9}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000002c0)='rss_stat\x00', r3}, 0x18) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0xd, 0x809, 0x4, 0x1, 0x0, r1, 0x2}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000008600850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r4, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)=r1}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r7, &(0x7f0000000d40), 0x0}, 0x20) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3272a6bc}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r8}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=ANY=[@ANYBLOB], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r9, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r10], 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) 42m30.563100174s ago: executing program 1 (id=496): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r2, 0x0, 0x1ba8847c99}, 0x38) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000000000, 0x8}, 0x100104, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="120000721f093b52f00a8a00020000000000000054c72006389e7449dcc5ebb6367bfa83ae1518a295d60f415c9c80158f4d9a13a21f8200c45e0e57ae9847", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r4, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)=r3}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r5}, &(0x7f0000000240), &(0x7f0000000280)=r3, 0x600}, 0x20) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x23, &(0x7f0000000e80)=ANY=[@ANYBLOB="d50a00000100000063111400404c030018600000090000000000000095a200001800000004000000000000000800000018530000020000000000000000000000b708000084c7d113d2f65d4c4bc27e161902adbf000000007b8af8ff00000000b7080000050000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a5000000b7080000000000007b8af8ff00000000b7080000010400007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x9, 0x4, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3}, 0x94) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180200000700000000000000000000008500000041000000850000000500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r8, 0xfca804a0, 0x7, 0x0, &(0x7f00000001c0)="b884770fc6d886", 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)=ANY=[@ANYRES32=r7, @ANYRES32=r6, @ANYBLOB="d347fb6c34db2ba800000000", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r11}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 42m19.632879537s ago: executing program 35 (id=479): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz1\x00', 0x1ff) openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 42m17.042172424s ago: executing program 36 (id=487): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x2, 0x4, 0x4, 0x9}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000002c0)='rss_stat\x00', r3}, 0x18) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0xd, 0x809, 0x4, 0x1, 0x0, r1, 0x2}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000008600850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r4, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)=r1}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r7, &(0x7f0000000d40), 0x0}, 0x20) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3272a6bc}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r8}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=ANY=[@ANYBLOB], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r9, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r10], 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) 42m14.480607501s ago: executing program 37 (id=496): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r2, 0x0, 0x1ba8847c99}, 0x38) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000000000, 0x8}, 0x100104, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="120000721f093b52f00a8a00020000000000000054c72006389e7449dcc5ebb6367bfa83ae1518a295d60f415c9c80158f4d9a13a21f8200c45e0e57ae9847", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r4, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)=r3}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r5}, &(0x7f0000000240), &(0x7f0000000280)=r3, 0x600}, 0x20) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x23, &(0x7f0000000e80)=ANY=[@ANYBLOB="d50a00000100000063111400404c030018600000090000000000000095a200001800000004000000000000000800000018530000020000000000000000000000b708000084c7d113d2f65d4c4bc27e161902adbf000000007b8af8ff00000000b7080000050000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a5000000b7080000000000007b8af8ff00000000b7080000010400007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x9, 0x4, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3}, 0x94) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180200000700000000000000000000008500000041000000850000000500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r8, 0xfca804a0, 0x7, 0x0, &(0x7f00000001c0)="b884770fc6d886", 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)=ANY=[@ANYRES32=r7, @ANYRES32=r6, @ANYBLOB="d347fb6c34db2ba800000000", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r11}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 41m40.966417039s ago: executing program 7 (id=574): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="0a00000004000000dd0000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x26, 0xa, 0x0, 0x0, 0x20, 0x61, 0x11, 0x6c}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) 41m40.807500056s ago: executing program 7 (id=575): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) 41m39.556164238s ago: executing program 7 (id=584): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000007000000000f00000700000000", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="060000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x3, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2141, 0x9, 0x0, 0x5, 0xfffffffffff7bbfe, 0x3, 0x0, 0x0, 0x602}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 41m38.156879136s ago: executing program 7 (id=590): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='percpu_alloc_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x4, 0x4, 0x12, 0x2}, 0x50) 41m37.843763229s ago: executing program 7 (id=591): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="1801000000050000000000000000ea0485000000d00000"], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff8, 0x7fffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000240)=ANY=[], 0x31) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0200000004000000080000000100"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0xc, 0x10, &(0x7f0000000e40)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r4, 0xfffff000, 0xe, 0x0, &(0x7f0000000300)="61df712bc884fed5722780b605a7", 0x0, 0x2f00, 0x7000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xeb, '\x00', 0x0, @tracing=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x16941, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000080)) r7 = syz_clone(0x80100, &(0x7f0000000200)="12ab9bfe40586d398f122341904c6b666bebae", 0x13, 0x0, &(0x7f00000004c0), &(0x7f0000001340)) perf_event_open(0x0, r7, 0x5, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xe) 41m36.333358922s ago: executing program 7 (id=599): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000003c0)=""/147, 0x1a, 0x93, 0x1, 0x400}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)=@generic={&(0x7f00000001c0)='./file0\x00'}, 0x18) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000011000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e0000009500000000000000"], &(0x7f0000000080)='GPL\x00'}, 0x65) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xa5bc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) getpid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 41m20.671268841s ago: executing program 38 (id=599): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000003c0)=""/147, 0x1a, 0x93, 0x1, 0x400}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)=@generic={&(0x7f00000001c0)='./file0\x00'}, 0x18) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000011000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e0000009500000000000000"], &(0x7f0000000080)='GPL\x00'}, 0x65) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xa5bc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) getpid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 41m16.8330052s ago: executing program 6 (id=623): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x300000000000000, &(0x7f00000003c0)=ANY=[@ANYRES32=0x1, @ANYBLOB='\x00'/12, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000700), &(0x7f0000000540), 0x8, 0x496, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0x12a0, 0xa, 0x77ab69fc, 0x3, 0xffffffffffffffff, 0x8, '\x00', r0, 0xffffffffffffffff, 0x5, 0x3, 0x4, 0x9}, 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0), 0xc) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010100)={0xffffffffffffffff, &(0x7f00000102c0), &(0x7f0000010440)=""/198}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00)=r1, 0x4) mkdirat$cgroup(r4, &(0x7f0000000b80)='syz0\x00', 0x1ff) bpf$TOKEN_CREATE(0x24, &(0x7f0000000c00)={0x0, r2}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000ac0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x3}, [@btf_id={0x18, 0x3, 0x3, 0x0, 0x4}]}, &(0x7f0000000b00)='syzkaller\x00', 0x1000, 0xa2, &(0x7f0000000d00)=""/162, 0x40f00, 0x4, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000b40)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x3, 0xe, 0xfffffffe, 0x8}, 0x10, 0x6a8a, r3, 0x0, &(0x7f0000000e00)=[0xffffffffffffffff], &(0x7f0000000e40), 0x10, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x18, 0x2, 0x1, &(0x7f0000000000)) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) 41m15.046006904s ago: executing program 6 (id=628): bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e00000004000000040000"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) close(r0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffc7d) 41m14.364744122s ago: executing program 9 (id=630): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x10, 0x25, 0x4, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000007f3adc79c8bff3da5d0300000000"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x19, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000b7080000000000007b8af8ff00000000b7080000010000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000004080000000000000003000000000000000000000002000000000000000000000000000002000000000000000000000004"], 0x0, 0x56}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x12) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1d, 0x6, 0x7b, 0x4, 0x8, r1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x4}, 0x50) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) 41m14.289085005s ago: executing program 6 (id=631): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008bd6000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 41m11.116536357s ago: executing program 9 (id=632): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x9) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000000500000085000000a00000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="b702000026000000bfa300000000000007030000007effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000050404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf27fb6d2c643db7e2d5fb4b0936cdf827fb43a431ca711fcd0cdfa146ed3d09a6175037958e27106e225b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc525d78c07f34e4d5b3185b310efcfa89147a09000000f110026e6d2ef831ab7ea0c34f17e3ad6eecbb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b0a341a2d7cbdb9cd38bdb2ca8e050000003a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c214733a18c8b6619f28d9961b626c57c2691208173656d60a17e3c184b751c51160fbcbbdb5b1e7be6148ba532e60a0ac346dfebd31a08060000000200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86acac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e957bc73ddc4eabba08ab1e1ad828267d4eadd3964663e88535c133f7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc190ae2ebf8aad34732181feb215139f15ea7e8cb0bae7c34d5ac5e7c805210600000000000000c3dec04b25dfc17975238345d4f71ab158c36657b7218baa0700f781c0a99bd50499ccc421ace5e845885efb5b9964e4beba3da8223fe5308e4e65ee93e107000000f8ddebf70132a4d0175b989b8eccf707882042e716df9b57b290c661d4e85031086197bcc5cb0e221a0c34323c129102b6ff0100002e88a1940b3c02ed9c92d6f64b1282dc51bb0015982730711c599e1c72ffa11ed8be1a6830d7507005154c46bd3ca96318c570f0721fc7aa2a5836ba99fe1f86468694f22cdf550ef091a78098534f0d973059594119d06d5ea9a8d0857382ec6e2a071474cfc12346e47ad97f4ead7cf70a9d1cdac944779dc08a705414888700a30e2366c6a06b3367a389ca39059787790017b0689a173db9c24db65c1e00015c1d093dab18fd0699fe3304000000323e9c7080397bc49d70c060d57bc88fbe3bbaa058b040362ab926150363fb099408885afc2bf9a46a076b7babfcddeff8c35030669ea69f5e4be1b8e0d6697e97186f9ae97d5670dba6623279f73db9dec75070cd9ab0fda6b069ef6d2857ca3e4effcf7462710d133d541da86e0477e4a6cc999dc21c3ef408e6b178e7c9f274d7fafc8d757d33dfa35aa2000034837d365e63845f3c1092f8dde8af3904ea0f4b82649b83ed4fa0f873339c4cadecc13219ba7518aa4f7db34ead13484742067ab743c1d82a5687f2ed690000000000000000000000000000000000000000000099d4fa0000000000003f0ecdc7c82e72919c91d2039afe17e95edeeeba72205beff7771bcb293747b88486cacee403000000a2919a4bff2ed893f2c814679fa69fc7e0cf761f918725704a01c56009a9f748e5aaf30a10bd8c409b1870c1f75e26b45264e3d3f8e0048e55ae289ce2ad779ce71d4dc30cbb2cc4289d2f884d66cddc76eb7f601110ff39053c262279f4ef00fbdb8c328615a9ec84f27a9f3938ae736138b8c1ec220c1540bf3d162dc1c27fa30f0dc60b9f257db5d1c7ed2e152cb2cf06f8edb30177fead735a952ffce676a93110904d5ee2abdab2ef3ff84c4d61443f73552195c7ccfbf9f03c44432eaa3b7501d4239354da8de21eada75d3a3afb2c76ff0700007981699b6c0f0e946766f57544ff52cef0dd811bec4e3c0a30f2d7d19d26d2503a3ea376721b8eded3bc475958dd498ee2b2d6146e33fc0de1dc2e0516ac565ddb1d4ae89e6712824a85eb9ee0a3b68c9e209756623adf685dd715d68ed11e4b4d5502f5124948f8f98c615cac3666c58f785c3f758be352a71871d5c081197d37980e4f4e26b5476fb20407ff7098b7174bef66fa03a99b5c0c20b378065fac4ef9ac2d0d804b9400000060e5d3f1749f6aecf69ba83a71caa9bdddc679f1b826f54b6563a4be1fd82b73c8c2bc65f63982b951fb058fd3c7b6341c4580376b6c16bd94d2da66059de81abfa15eeeb88b6ae5882ad341032c73f1285e21fff5a1d138e061b1dc7bbda199b5fab8e0719e9cd69b47dcb52b0be6a3a73afdf328132e1d4f21065716be0c53a23940d07188b015fa341dbc92231c8b5e5717eac184f46c9f61b69f55cd2231bcf821052429a1f250e8b734be0605a15f25923d599544b319319ff0a32621019347df460a098119a6f47eb1bac47946d7a009cbc6ec74c19a93cc7c7138b28c95270116181fd5f553573c48104d2ad0e10d3663488e664401453f22f0d76d2162635365258af61ae1f46f4a7862f302d91e3f7c2781f602220522e84602a939a8d5e4137ae31ccd397404dc72e06715a6503d4d865182803ee6725da7293b23daeebefd6fce7411c9624a7e8d5ba5a13e1c32adc4f3274497c6882a72475e4280a4d9a47c003c6ed3071330c58145be813a10788a720a6b5a498ca2b42496c479a0a71e2f6f9bad8c84bc6be20281bde0b348cf2c60538a505ad4a0510eebb023e4954c9eb6cd70627f5c03d867dbf3ad5d1f1dc852064dd0efafc3df20ec8faf3d194db76127f88f284fa1b71ab964fdd2474471da76373e65e9a8bf844bdfdd348bc7d00c4c7e7afe8a1f8cde79b7a6c5aafe954b8ba37818e40c14b37c23f9f614576b689436fef2f27f8b1e756e00262e22bca49c43fd73e7e99b2fa44a8c1db99c2cf2735ad6c5fabf082e0df0f8ba7e24272165f2f5b28230c02b53d44bd84bf6770157e96bbb96b5e1f165c87e7ad68a3600b3d357fa9a7d53c281d88ebb175a4dbb82130e6870982947913110f091d21760d985afd3163f2e6880682432f9b3b97d57a9f980edfa1116a3d04d58872a07d6a7e12db673acd2f7b8988d833e71943fe2c1c65a3cf36b955c56b55bfd3ecf0af694c71a03f2996c15b1ba971de1cb9c7e6a0000000000000014783ef54c51199317413f98dca8ff3d0bda50f6c0af58dbd6c031b1a5a7512c5896514adfa17d31429c68db50a93d88199defd3b4625fea426ff9293a28a544a6a9e2a79b55daa1b3c6b14c4ec6d164e902ce4913843d65d841973468729ea12bf6d3499036dbb66718f3497855c3baa6cc07c0fa388ec9e70617c1a28ef5a595ee267a76175b8a057e6efaf4fefe46def451f2858fe71a53e77b1a44e98843bb3a40102da3703dfb9f61bdcea2fb810b32d52e2157a150a63ea6135d1cf6f864c2e68884d7245bc5d61dc5a114d10ffb22e76678bbfc1e3865d17d128306d1b81884a934cb00000000000000000098a4526e6468987dbc63bff7590eb388afaba43d811996333eef7e9f472bee293f0c40d434b8be07cbd52325296e22802493edb5c590ad208bac683a8b2d4c9d2d57ff846ae8c422e0b28546671f11d8157bb762c91f3fbcca8e21589c92446ae65d408c0637ffcc2d44d715ce003dd1e12b085e186d069a55c2e96efbe5024d61a56a36d988c0f51a973a6c238e545b28211a92000000001501aed8d72af0fcd540a9d4e293690c5e697b3a1480e46df5371bca1cfb28a57c1b3c956ec81397e81fbf870a67385fea04220423f52ad8178b9fd04bdc7e5fee4bd52db996e633792118efdb6b88023e80da74fdf723c7f0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r7, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001480)=[{0x0}, {0xfffffffffffffffd}], 0x2}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 41m5.702421981s ago: executing program 9 (id=641): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b9cbbefce3babab}, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x140) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{}, &(0x7f0000000a00), &(0x7f0000000a40)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00'}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000480)={{}, &(0x7f00000004c0), &(0x7f00000008c0)}, 0x20) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="d080", 0xfdef}], 0x1, 0x0, 0x0, 0x800300}, 0x20000801) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) 41m5.157996174s ago: executing program 9 (id=643): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f9ffffff00000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000040008007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x28, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 41m4.9997921s ago: executing program 6 (id=645): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="0a00000004000000dd0000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x26, 0xa, 0x0, 0x0, 0x20, 0x61, 0x11, 0x6c}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) 41m4.885127844s ago: executing program 9 (id=647): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0200ff0000000071107700000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000001c0)='kmem_cache_free\x00'}, 0x10) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r4}, 0x18) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) 41m4.801054708s ago: executing program 6 (id=649): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x9) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000000500000085000000a00000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r7, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001480)=[{0x0}, {0xfffffffffffffffd}], 0x2}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 41m3.707076723s ago: executing program 9 (id=651): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffd74) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001}, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000b80)=ANY=[@ANYBLOB="9feb01005ffc"], 0x0, 0xfc5f}, 0x28) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000800)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000070000000700000000000007000000000030612e303000c668d837e3614de5b16cb15bd530edbdb546370f09f75b9d5eb8ac5452192b194389a295a56f33385549ca08ae3b9aa54dc6df41f77d5eb7f59f3b547bc38a7a20a14be600a32b6d8d48319a65b4859947e6eadfa8af045bcf94b05685fd25fcceeb000000"], &(0x7f0000000700)=""/107, 0x2b, 0x6b, 0x1}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x84, 0x5, 0x0, 0x0, 0x0, 0x0, 0x322c6, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x4, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/13, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) sendmsg$tipc(r4, &(0x7f00000008c0)={0x0, 0x47, 0x0, 0x0, 0x0, 0x0, 0x80c0}, 0x0) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x8, 0x10, 0x0, 0x6, 0x0, 0xfffffffffffffffc, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fe, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x2c, 0x3, 0x0, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2020}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 41m1.806972952s ago: executing program 6 (id=654): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, 0x0, 0x0}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ioctl$TUNSETIFF(r2, 0xb701, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)}, 0x10) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x13, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000480)='syzkaller\x00'}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r4}, 0x10) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x2d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0189436, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 40m48.507567093s ago: executing program 39 (id=651): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffd74) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001}, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000b80)=ANY=[@ANYBLOB="9feb01005ffc"], 0x0, 0xfc5f}, 0x28) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000800)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000070000000700000000000007000000000030612e303000c668d837e3614de5b16cb15bd530edbdb546370f09f75b9d5eb8ac5452192b194389a295a56f33385549ca08ae3b9aa54dc6df41f77d5eb7f59f3b547bc38a7a20a14be600a32b6d8d48319a65b4859947e6eadfa8af045bcf94b05685fd25fcceeb000000"], &(0x7f0000000700)=""/107, 0x2b, 0x6b, 0x1}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x84, 0x5, 0x0, 0x0, 0x0, 0x0, 0x322c6, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x4, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/13, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) sendmsg$tipc(r4, &(0x7f00000008c0)={0x0, 0x47, 0x0, 0x0, 0x0, 0x0, 0x80c0}, 0x0) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x8, 0x10, 0x0, 0x6, 0x0, 0xfffffffffffffffc, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fe, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x2c, 0x3, 0x0, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2020}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 40m46.134963832s ago: executing program 40 (id=654): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, 0x0, 0x0}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') ioctl$TUNSETIFF(r2, 0xb701, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)}, 0x10) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x13, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000480)='syzkaller\x00'}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r4}, 0x10) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x2d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc0189436, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 11.756008919s ago: executing program 5 (id=10299): bpf$LINK_DETACH(0x22, &(0x7f0000000000), 0x4) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6, 0x6, 0x0, 0x80, 0x0, 0x80000000, 0x100, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x81, 0x5a6d}, 0x10000, 0x3ff, 0xfffffff9, 0x8, 0x6, 0x8, 0x3, 0x0, 0xfffffffa}, 0x0, 0x2, 0xffffffffffffffff, 0x3) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x13, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd0ac, 0x0, 0x0, 0x0, 0xe976}, [@tail_call, @jmp={0x5, 0x1, 0x2, 0x6, 0x1, 0xfffffffffffffff4, 0x10}, @exit, @printk={@llx}, @exit]}, &(0x7f0000000180)='GPL\x00', 0x0, 0xea, &(0x7f00000001c0)=""/234, 0x41000, 0x53, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x10, 0x1ff, 0x7}, 0x10, 0xb46c, 0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000340)=[{0x4, 0x3, 0x3, 0x5}, {0x5, 0x4, 0x0, 0xc}, {0x1, 0x1, 0xd}, {0x1, 0x5, 0x6, 0xc}, {0x1, 0x2, 0xa, 0x3}, {0x2, 0x1, 0x10, 0xb}, {0x3, 0x2, 0x3, 0x3}, {0x4, 0x5, 0x7, 0x8}]}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) r3 = perf_event_open$cgroup(&(0x7f0000000500)={0x1, 0x80, 0x5, 0x7, 0x7, 0x0, 0x0, 0x9, 0x24900, 0x9, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f00000004c0), 0x4}, 0x80, 0x3, 0x1, 0x2, 0x80, 0x7fff, 0x4, 0x0, 0x101, 0x0, 0x8}, r2, 0x8, r0, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) r4 = syz_clone(0x1000200, &(0x7f0000000580)="6472a003098882dd11bdc3909c7e05068609ad1e62803380241c8e676d9a7b", 0x1f, &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)="f8620722152a8d7bcc6e313226811a88cb65e66337ee4f825d9aea6d3ac2c4070be26a3627d1fa98887f846f81696ad03b328021a26243de1d60a6be2de357af067dd6efe1c2eb11b9839f9bc69090de462148e1bd4d764367798ee6a9291dba19093a020abb911fec33326084c5ba8ae9f9cc4ebcbdab8a93722b9723cd8a0819e9a4d23a90593e71894541135272ca275c535d91d50e188a88eb3e2cae8af8f6c9cc5cb535b2a55dde333ebb4508bcd39270332148624f82c39dc47ab3bdce329469b5") syz_open_procfs$namespace(r4, &(0x7f0000000740)='ns/uts\x00') mkdirat$cgroup(r2, &(0x7f0000000780)='syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r2, 0x58, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0x176, 0x8, 0xd, 0x20000, 0xffffffffffffffff, 0x0, '\x00', r5, r2, 0x3, 0x4, 0x0, 0xf}, 0x50) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000900)={0x8, 0x0}, 0x8) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000940)=""/34) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1c) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000980)={0x525, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000009c0)=r8, 0x4) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000c00)={0xffffffffffffffff, 0x0, 0xce, 0x0, &(0x7f0000000a00)="be53d78cfc611d3b1e9d908b7170736c2bce3515945cf7ed66475a913eb2cb3cd0921f40cfdc112cfe1bdc74f06212da076b036cf65d755fbffb9d5c45b6328d2e1aec56c807a77c9713915d518a75f5d876a330527f76a35b8c6fbfd42877a2141a62ba7a61704a65f2324f4370499da56e8e5efc452fc2a00cbb874612917a2ab6e3f156feb6848cdf7744519b73b29917572df1acbb1b6b3a5da6ea56ef395dea3f3b91bc604b02c173b4143e65ccbb9e218ac30544e57927bad90c2086bf6a83013cfb90ce15a11102b2d035", 0x0, 0x0, 0x0, 0xf3, 0x0, &(0x7f0000000b00)="fdcb2fd5e009055c29db8eeeeb9c3bdf142444f9fb4bd632d47e13ae589ec8e3a451dda0313011e7477a56f1c67d2bdcdba6eba0d65019f62cd5c58cec372e3b02dff32a005f7c9c2bf41307f25ec5f4db7e3fcf2395d0d4a62c59237abc3dfae9e64b2f08d66d93dd96443b8c30bdf6e05742ae7cb949e7d8285d2551e7775ee2f14c4ed1a4eb9bc313bb37ebc915fa79dbca00ed617dd75fb062e041c9edb2702b3ca61b28e4f4a04f7cdb60b3971acfd89ff5c1541ed6c8d52f3fa569a1c08993203950ab2dc1aea98873ab9c8239d940be525c50bf1b2ff849f23ff2c8f34b39f1e0897eb19e936771b0932def24ebe576", 0x0, 0x2, 0x0, 0x3}, 0x50) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000c80)={r7, 0x400, 0x10}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d40)={{r2, 0xffffffffffffffff}, &(0x7f0000000cc0), &(0x7f0000000d00)}, 0x20) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000d80)=r2) bpf$LINK_DETACH(0x22, &(0x7f0000000dc0)=r2, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000e40)=@generic={&(0x7f0000000e00)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000f80)={@map=r6, 0x13, 0x1, 0x5eb5, &(0x7f0000000e80)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000ec0)=[0x0], &(0x7f0000000f00)=[0x0], &(0x7f0000000f40)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000fc0)={@map=r10, r2, 0x1a, 0x2000, 0x0, @value=r2, @void, @void, @void, r11}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001040)=@generic={&(0x7f0000001000)='./file0\x00', 0x0, 0x8}, 0x18) openat$cgroup_subtree(r9, &(0x7f0000001080), 0x2, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001140)={{r2}, &(0x7f00000010c0), &(0x7f0000001100)='%pS \x00'}, 0x20) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000001180)={'erspan0\x00'}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000011c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x64f26d23, '\x00', r5, r2, 0x5, 0x3, 0x5}, 0x50) 11.475967212s ago: executing program 5 (id=10302): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000c40)={0x0, 0x2c, &(0x7f0000000140)=[{&(0x7f00000006c0)="d8000000180081064e81f782db4cb904021d0800fe007c05e8fe50a10a000700014002020c600e41b0000900ac000a0501000000160012000a00ff150048035c3b61c1d67f6f94007134cf6efb8007a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667daffffffffff1f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5b7276505de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9000001008af26c8b7b55f4d2a6823a45", 0xd8}], 0x1}, 0x40000) (fail_nth: 1) 10.663025317s ago: executing program 5 (id=10305): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x2002c040) 10.501628764s ago: executing program 5 (id=10307): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9b}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r2, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xb5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x344f1b07}, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x84, 0x4, 0x0, 0x0, 0x95df, 0x40040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2004, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x0, 0x0, 0x8, 0x100, 0x0, 0x0, 0x5ff}, 0x0, 0x800004, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) 10.045176554s ago: executing program 5 (id=10312): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000458c35d43ae7040019b06e5454f20a698b65cbec40bf1ac6553202c7b5f9bfd104ca34461bafca4d413462534c61b18de64b3de09bbcc585e72ffe304c4740fac1c352129526701ee9552a176601000000010000001e96d2296e7a8d828e2034924e79631c55765929b07b2ff2c144f9c717b3eac18d692b501df2b55943c728c0ee", @ANYRES32, @ANYBLOB="00000000000000006200000a00000000180000000000000000000000040000009500000000000000369a00000000000018010000202078250000000000202020631af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50200000000000085000000cb0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x26}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x8, &(0x7f0000000280)=@framed={{0x18, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7ff}, [@call={0x85, 0x0, 0x0, 0x53}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0xe, 0x0, &(0x7f0000000040)="e06921e8682d85ff9782762f86dd", 0x0, 0xc7d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) write$cgroup_devices(r2, &(0x7f0000000200)=ANY=[@ANYBLOB='b *:', @ANYRESDEC], 0xb) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0xda, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2}, 0x0, 0x6a, 0x0, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$nbd(0x1, 0x1, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r4 = openat$cgroup_devices(r3, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="62202a3a2a20720033e3e871ed566cdf2b6d03df22e9"], 0x8) write$cgroup_devices(r4, &(0x7f0000000140)=ANY=[@ANYBLOB='b *:4\tw'], 0xa) r5 = openat$cgroup_devices(r3, &(0x7f0000000240)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f0000000280)={'b', ' *:* ', 'rm\x00'}, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00', 0x800}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x28280000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) 6.971683207s ago: executing program 5 (id=10327): perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xbd, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x8000, 0x15b}, 0x8, 0xf, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100904}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f020033000b35d25a806c8c6f94f90a24fc6010000a000a000200053582c137153e37000c0980fc0b10000300", 0x33fe0}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000001000000000000001b00000091120600a8d4ffff9500000000000000"], &(0x7f0000000000)='GPL\x00', 0x7, 0x10, &(0x7f00000000c0)=""/16, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000038424a08000000ff0000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x7) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) close(r2) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140), 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850200000000000018100000", @ANYRES32, @ANYBLOB="00008cff07887e7cf83500000000000045"], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) 5.174689776s ago: executing program 0 (id=10344): perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xbd, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$ITER_CREATE(0xb, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x8000, 0x15b}, 0x8, 0xf, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100904}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f020033000b35d25a806c8c6f94f90a24fc6010000a000a000200053582c137153e37000c0980fc0b10000300", 0x33fe0}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000001000000000000001b00000091120600a8d4ffff9500000000000000"], &(0x7f0000000000)='GPL\x00', 0x7, 0x10, &(0x7f00000000c0)=""/16, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000038424a08000000ff0000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x7) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) close(r3) bpf$ITER_CREATE(0x21, &(0x7f0000001100)={r0}, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850200000000000018100000", @ANYRES32, @ANYBLOB="00008cff07887e7cf83500000000000045"], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) 3.623618642s ago: executing program 0 (id=10348): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x108b84, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r4, &(0x7f0000000040)={&(0x7f0000000240)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x4}, 0x80, 0x0}, 0x810) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$TUNGETVNETLE(r0, 0x40047451, &(0x7f00000002c0)) 3.202046591s ago: executing program 2 (id=10352): socket$kcm(0x10, 0x2, 0x10) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000003a80)={&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000003a00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1}}}], 0x20}, 0x4008804) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f00000002c0)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000c40)='2', 0x1}], 0x1}, 0x8400) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x104) sendmsg$inet(r0, &(0x7f0000000500)={&(0x7f00000005c0)={0x2, 0x0, @local}, 0x10, &(0x7f0000000240)=[{&(0x7f00000011c0)="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", 0x5b4}, {0x0}], 0x2}, 0x4000000) 3.118685605s ago: executing program 0 (id=10354): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="12000000040000040800000006"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0900000002000000080000004000000042", @ANYBLOB, @ANYBLOB], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r0}, 0x38) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, 0x0, &(0x7f00000000c0)='syzkaller\x00'}, 0x94) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) 3.026400159s ago: executing program 2 (id=10355): perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xbd, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$ITER_CREATE(0xb, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x8000, 0x15b}, 0x8, 0xf, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100904}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f020033000b35d25a806c8c6f94f90a24fc6010000a000a000200053582c137153e37000c0980fc0b10000300", 0x33fe0}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000001000000000000001b00000091120600a8d4ffff9500000000000000"], &(0x7f0000000000)='GPL\x00', 0x7, 0x10, &(0x7f00000000c0)=""/16, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000038424a08000000ff0000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x7) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) close(r3) bpf$ITER_CREATE(0x21, &(0x7f0000001100)={r0}, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850200000000000018100000", @ANYRES32, @ANYBLOB="00008cff07887e7cf83500000000000045"], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) 2.463169103s ago: executing program 2 (id=10356): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0x8) 2.143472697s ago: executing program 2 (id=10358): socket$kcm(0x10, 0x2, 0x10) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000003a80)={&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000003a00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1}}}], 0x20}, 0x4008804) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f00000002c0)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000c40)='2', 0x1}], 0x1}, 0x8400) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x104) sendmsg$inet(r0, &(0x7f0000000500)={&(0x7f00000005c0)={0x2, 0x0, @local}, 0x10, &(0x7f0000000240)=[{&(0x7f00000011c0)="6f380fcfdec19aef22100d79ee6744559f2d88215cf2bfcab54a39525f06ae22cb331091f1077ac9159fdc14139b98d01e37d599aa144edca64c70c5ac77a41b85402ebdd078fd95481d035d7be2c95408ed1213b7ffdf20750f9c3be031e3e4aadd1f8710377c22de7b6bb61a9ae53569cc39367632cf997924dff246985a2c029587b158750a22345076475b7d2c80b8320b646a34b3cedd9ba9752ead11d5b6e644ae052241dba088a25b7d4f023e3052e2dca12aab3fb0449dcfa68ddcd56866dd70d4216d9dece548c590537666b08d2dbbe2b8f1b7b483a9a8ee262edf4b3457d1e6cb33df75cb0191d17db1dc5bf1de3b121bcced1febb1589d51b5b05bc3d22fdaa884f28b0a3365987a982caf3dcf848ab2c3b5868f088a533897e4b8abbc4a40fdfd90047a58200814af887abbe438f2a03df142b5504ed74e12a80bf586d08207cb852ef73b165bc498d1b8438840adeb7e4f7ab68546ef445fcc349b3d73c8769dbe22404cd9fc05379b0e43e14f1027b72e8455e86e0f4a6361ab647215fec08d5bd34f1275670bccba6d9d569f65f3bb5b15f52b9632a882dcba80a47c90ab780d4fd4fa2f877b20add9fd93a4798b7aa15246226e487056b220bc5b7b76a9b0c077e1d398bb55c5ec51caa295fa425f7603529c0660b75465b4205a0a0edd9c1c153df027c462b0fc31328c27d336973d6cbee95f4340a46a269b45395f9834f292c73aba12a0c9d7b378a426ebaa2915579b0ed5a26787116298546df0248cefaa87997473c29d4b5bca43429b3c30430254beab736219c5ac24a685d8fd68a5131b91f8c3b4933f36c69965efd26aec16c1bbd9779eaf070ac813660148daa060883073ad349afff9bcbd9966884152095c92abe0ab2703cf1fd5d3568bf1cccd6069fc0aa71b819880fd1d294c9c34a84414bfec0b2651fb9c5a2617408803791853a779fcfc8bc9cd945b7b70ccee1cec10da606a60cb8bf984a4dcf5ad581dbdfc3d082ea5bf7f59f2d1ad464329e457d419311582c882d97cfb0a056493c67a9af7838d380c98c085c43fc1ac79b7beb21ed5d53766e275e09149151137c60e1a67af457ed4bc0977e6640ad8e4363096e048ee75313e91e8794758470efb9f609f2919ce389f90543625e2dc4173532f889ba2a1e97fb29c290ece1ca60e03e58f3c253e75b78b5fb9a0a4ea8890c5742e497865ee0208f5740e73c4f6f6492653540fcb5e45d94d9d18c5fe6030681283ab441852abb607fd97641845cd617d9ac08f33a2bfb458c773947d34821eaf404b1c5026771e518025f5d1cb2be45a708485dddf9583dc0811958f03bafe5e43ebd8c9312607415dd2192fef2e69c60de098066e0f6c4895cb932432ae062b0c876b8f5023f26ef0923ba21679f7cc3c25fdd0ef65d878e1efc6607a88f210cca00669f28c3c3c1670b8cefb4eb2ee399af5831163751a5a1cc4b7637ee87c63d705f79e901784ee8f14cb50c509c952360edbc7fce126e3bca6ce4a6197a5c1577d7e8359f99b6214c2fff17e637af4ea4b9ed31c0bda705fa50b8864f86128d0cd8f6410fcc4bf51d5977d4fcb7f86cf134f1967a72fe11e38881b92051fc9bbdc212ef699463ec2a5b5a8e8c9dd86454990741deef8a23ac7a71a998b0cf1fdd955e0c6653930c5dc39904f141672f5de5b86ed1184405290e2e88ce7bdd10f338ce7a8a8e9de51ec36f08bea720b7785d8c3ede3a1a7e5136b384bc014a6b8079cd68ee4409f20bc60f192170235b4a3ed27d12110983d2f6f4a5a8eb7b9474c4fcc8cbfff8f2177cad992dc9989c99c9133bf2198b8863ca6ebe85e8d4ea4fbc10e0be81af750ca1cd4207b2585917dc576f882e93235d33eb0a79a23fa68b8d65da078dc31e9213995c5fb8e294e8f891743dfbedb24c03cb7b0318250c922b18149fc9d238671ddd1967f60126e4ea14b6d88e228ca2ab9ceade5acc87544448eaa50217639654783baf2a448e28a14c0bf4ad06c209fe628fc17517829e7321026b9170770566db61e7f1b35163b4e0d6b261fda", 0x5b4}, {0x0}], 0x2}, 0x4000000) (fail_nth: 1) 2.030029222s ago: executing program 0 (id=10360): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0a000000040000000600000023"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b00), &(0x7f0000000300), 0x55, r0}, 0x38) (async) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="190000000400000004000000ffff010000000000", @ANYRES32=0x1, @ANYBLOB="0000f4d95b"], 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000400000000000000ec15cb0a01af1e7d70859ac578ee9b0000"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x15, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000200800000000009848000000180000000cb6a075eb9b0f0819bc461d24637cc6f0828a9056aef67fab1f2c7d0e1a8ed86119d381a5f69f74777b44a5bf36a767e5a0102f0e971decd3ccf3ef4f2baec6dc484b6cf12dcd99e448820974c3b81074f96fec508980561bbc77cc2406d27626f78b92606ab693707eb77c381d58e55ab86804a9c1547c1390d5036bcd966b1247091df59595dd9d5d30a77f6f424dec5d8efe5808293d2d09f3debcb18be39db436133fccc5eed13a2e0300000000000000f6d217352477be8aceccd5dd46529aafacee1ebe", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = socket$kcm(0x2b, 0x1, 0x0) close(r5) close(r5) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000140)=r2, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) 1.488988026s ago: executing program 0 (id=10362): sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x801, 0x2, 0x10, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{}, {0x10000002}]}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x6e, &(0x7f0000000000)=r3, 0x10) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x8a, 0x3, 0x0, 0x3, 0x0, 0x10000000000, 0x8808, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0, 0x6}, 0x4108, 0x3, 0x0, 0x6, 0x7, 0xffffffff, 0x802, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x19) r4 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x23, &(0x7f0000000000)=r7, 0x8) (fail_nth: 1) 1.436142537s ago: executing program 8 (id=10363): perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xbd, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$ITER_CREATE(0xb, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x8000, 0x15b}, 0x8, 0xf, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100904}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f020033000b35d25a806c8c6f94f90a24fc6010000a000a000200053582c137153e37000c0980fc0b10000300", 0x33fe0}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000001000000000000001b00000091120600a8d4ffff9500000000000000"], &(0x7f0000000000)='GPL\x00', 0x7, 0x10, &(0x7f00000000c0)=""/16, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000038424a08000000ff0000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x7) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) close(r3) bpf$ITER_CREATE(0x21, &(0x7f0000001100)={r0}, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850200000000000018100000", @ANYRES32, @ANYBLOB="00008cff07887e7cf83500000000000045"], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) 1.206023768s ago: executing program 8 (id=10364): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xa, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={&(0x7f0000000100)=@qipcrtr={0x2a, 0x4, 0x1}, 0x80, &(0x7f0000000500)=[{&(0x7f00000006c0)="27031c00160014000000002f1eafacf706e105400000894f00050004ee0b80558ddbba9b37242d37a518fc9c5be50eaf07c3650596", 0x35}], 0xf}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x48) r2 = perf_event_open(&(0x7f0000000700)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1c820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xe}, 0x4000, 0x0, 0x7, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xc000000000000001, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000ee07de1a6fc0000", @ANYRES32=r2, @ANYBLOB="00d697cdf077366950dec3c99100000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, 0x0, 0x0}, 0x94) r4 = openat$tun(0xffffffffffffff9c, 0x0, 0x402002, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000004c0)='inode_foreign_history\x00', r5}, 0x18) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000003680)={0x0, 0x0, 0x0}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1802000009000000000000000000000085000000410000e62d70230085000000a00000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r8, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) openat$cgroup_freezer_state(r0, &(0x7f0000000180), 0x2, 0x0) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000200)={'veth1_virt_wifi\x00', 0xc00}) recvmsg$kcm(r1, &(0x7f0000001e00)={&(0x7f0000000840)=@caif=@dbg, 0x80, &(0x7f0000001c80)=[{&(0x7f00000008c0)=""/241, 0xf1}, {&(0x7f0000000a00)=""/110, 0x6e}, {&(0x7f0000000400)=""/60, 0x3c}, {&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000001a80)=""/217, 0xd9}, {&(0x7f0000001b80)=""/239, 0xef}, {&(0x7f0000000480)=""/22, 0x16}], 0x7, &(0x7f0000001d00)=""/212, 0xd4}, 0x2040) close(r6) close(0x3) 1.133135501s ago: executing program 2 (id=10365): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000540)=ANY=[@ANYBLOB='+cpu'], 0x8) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="5c00000052006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038021d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d49380e78ff6a12fd4ab9d54a2b6a97a577ae18c8199", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x10) recvmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000002400)=""/4047, 0xfcf}, {&(0x7f0000000300)=""/172, 0xac}], 0x2}, 0x0) recvmsg$kcm(r4, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0xc001, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) syz_clone(0x10222000, &(0x7f0000000200)="1d5b1aa2b5345c5d73f0a66a57e157b4c130a20da7e24a6f7d5b25430260384302da0e545e74e736a7453ff0f7c6a74340fba90f26a7705f54641d5e9e752a8e75a66433d48e1458858757fc7d70c28fe7dfa71b0074ac95a6e770f2ab6223387d4fd173e34bec", 0x67, &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000580)="040e55429ce4079a05896fc4efa365bec9c2faf5ee85d3f8d9294177db8fb4015b3a61ebd22c8f8ffb15de80996f58ab44395251f44b71b9c98a12fec920d96c9743baa5ed60baee71791bb6af073ba7c21599c9401c114c111f0f44081e4fa427e0df878d826a60f1921184350c789129dcd59da8d0f3d05c2c5ab37d26486d8f24de4705afc392") socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYBLOB="0000000e00000000000000000000000000000000998447ed996026ffd8c4cdc7fa5b0f61eaee9f0f0fd03ad0e2dc33019bfeba324e210ae56c8d22f0b47234747c8454fed26440c7a8", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000005000000000000000200000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b70000000000000095000000000000003631e7a581eb015023a83bb19ff15e8153bf4fab1e6166da3fcd6145d6fb35933d56d4bfb46166f8d8e17cd15c681fc52987968a5926cdd1764b6f004942c877e399d90c7258abb60e6caf5054854f45"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xed41d0969ec4053c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r6}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, &(0x7f0000000040), &(0x7f0000000080)}, 0x73) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{}, &(0x7f0000000440)=0x2000000, &(0x7f0000000480)}, 0x20) r7 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b05d25a806c8c6f94f90424fc601000127a0a000600073582c137153e37080c18800cac0f000300", 0x33fe0}], 0x1, 0x0, 0x0, 0x8100000}, 0x0) 865.561663ms ago: executing program 8 (id=10366): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0x8) 716.762379ms ago: executing program 8 (id=10367): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}, 0x2002c040) 533.220467ms ago: executing program 0 (id=10368): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="12000000040000040800000006"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0900000002000000080000004000000042", @ANYBLOB, @ANYBLOB], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r0}, 0x38) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, 0x0, &(0x7f00000000c0)='syzkaller\x00'}, 0x94) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) 532.660827ms ago: executing program 8 (id=10369): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9b}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r2, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xb5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x344f1b07}, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x84, 0x4, 0x0, 0x0, 0x95df, 0x40040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2004, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x0, 0x0, 0x8, 0x100, 0x0, 0x0, 0x5ff}, 0x0, 0x800004, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) 219.356881ms ago: executing program 8 (id=10370): sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x801, 0x2, 0x10, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{}, {0x10000002}]}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x6e, &(0x7f0000000000)=r3, 0x10) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x8a, 0x3, 0x0, 0x3, 0x0, 0x10000000000, 0x8808, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0, 0x6}, 0x4108, 0x3, 0x0, 0x6, 0x7, 0xffffffff, 0x802, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x19) r4 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x23, &(0x7f0000000000)=r7, 0x8) 0s ago: executing program 2 (id=10371): perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xbd, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$ITER_CREATE(0xb, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x8000, 0x15b}, 0x8, 0xf, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100904}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f020033000b35d25a806c8c6f94f90a24fc6010000a000a000200053582c137153e37000c0980fc0b10000300", 0x33fe0}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000001000000000000001b00000091120600a8d4ffff9500000000000000"], &(0x7f0000000000)='GPL\x00', 0x7, 0x10, &(0x7f00000000c0)=""/16, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000038424a08000000ff0000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x7) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140), 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000001100)={r0}, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850200000000000018100000", @ANYRES32, @ANYBLOB="00008cff07887e7cf83500000000000045"], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) kernel console output (not intermixed with test programs): v6: Can't replace route, no match found [ 2972.121198][ T6515] mac80211_hwsim hwsim47 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 2972.271225][ T6509] netlink: 209844 bytes leftover after parsing attributes in process `syz.8.9892'. [ 2972.468419][ T6512] netlink: 'syz.0.9893': attribute type 10 has an invalid length. [ 2972.822452][ T6512] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 2973.193609][ T6532] syz.0.9897[6532] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2973.193880][ T6532] syz.0.9897[6532] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2973.210249][ T6531] sctp: [Deprecated]: syz.5.9898 (pid 6531) Use of int in maxseg socket option. [ 2973.210249][ T6531] Use struct sctp_assoc_value instead [ 2973.280168][ T6535] netlink: 'syz.2.9900': attribute type 21 has an invalid length. [ 2973.289134][ T6535] netlink: 'syz.2.9900': attribute type 5 has an invalid length. [ 2973.297301][ T6535] netlink: 128 bytes leftover after parsing attributes in process `syz.2.9900'. [ 2973.324679][ T6532] netlink: 'syz.0.9897': attribute type 10 has an invalid length. [ 2973.339935][ T6532] netlink: 2 bytes leftover after parsing attributes in process `syz.0.9897'. [ 2973.353281][ T6532] team0: entered promiscuous mode [ 2973.358394][ T6532] team_slave_0: entered promiscuous mode [ 2973.366939][ T6532] team_slave_1: entered promiscuous mode [ 2973.373217][ T6532] batadv0: entered promiscuous mode [ 2973.383671][ T6532] bridge0: port 3(team0) entered blocking state [ 2973.392066][ T6532] bridge0: port 3(team0) entered disabled state [ 2973.407770][ T6532] team0: entered allmulticast mode [ 2973.417686][ T6532] team_slave_0: entered allmulticast mode [ 2973.427794][ T6532] team_slave_1: entered allmulticast mode [ 2973.437071][ T6532] batadv0: entered allmulticast mode [ 2973.450259][ T6532] bridge0: port 3(team0) entered blocking state [ 2973.456841][ T6532] bridge0: port 3(team0) entered forwarding state [ 2973.469527][ T6535] netlink: 'syz.2.9900': attribute type 21 has an invalid length. [ 2973.492943][ T6535] netlink: 'syz.2.9900': attribute type 5 has an invalid length. [ 2973.510337][ T6535] netlink: 128 bytes leftover after parsing attributes in process `syz.2.9900'. [ 2973.528685][ T1069] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 2973.538680][ T1069] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 2973.855552][ T6549] netlink: 'syz.5.9901': attribute type 23 has an invalid length. [ 2974.026252][ T6554] netlink: zone id is out of range [ 2974.059237][ T6554] netlink: set zone limit has 8 unknown bytes [ 2974.177309][ T6560] mac80211_hwsim hwsim51 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 2974.204149][ T6556] IPv6: Can't replace route, no match found [ 2974.232287][ T6552] pim6reg1: entered promiscuous mode [ 2974.250513][ T6552] pim6reg1: entered allmulticast mode [ 2974.403521][ T6553] netlink: 'syz.2.9903': attribute type 10 has an invalid length. [ 2974.509898][ T6553] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 2975.213290][ T6566] netlink: 'syz.0.9907': attribute type 21 has an invalid length. [ 2975.928461][ T6575] sctp: [Deprecated]: syz.8.9909 (pid 6575) Use of int in maxseg socket option. [ 2975.928461][ T6575] Use struct sctp_assoc_value instead [ 2976.195600][ T6583] FAULT_INJECTION: forcing a failure. [ 2976.195600][ T6583] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2976.234178][ T6583] CPU: 1 PID: 6583 Comm: syz.0.9911 Not tainted syzkaller #0 [ 2976.241650][ T6583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2976.251747][ T6583] Call Trace: [ 2976.255080][ T6583] [ 2976.258045][ T6583] dump_stack_lvl+0x16c/0x230 [ 2976.262756][ T6583] ? show_regs_print_info+0x20/0x20 [ 2976.268158][ T6583] ? load_image+0x3b0/0x3b0 [ 2976.272676][ T6583] ? __might_fault+0xaa/0x120 [ 2976.277401][ T6583] ? __lock_acquire+0x7c80/0x7c80 [ 2976.282482][ T6583] should_fail_ex+0x39d/0x4d0 [ 2976.287201][ T6583] _copy_from_user+0x2f/0xe0 [ 2976.291815][ T6583] __sys_bpf+0x1e9/0x800 [ 2976.296077][ T6583] ? bpf_link_show_fdinfo+0x350/0x350 [ 2976.301484][ T6583] ? lock_chain_count+0x20/0x20 [ 2976.306356][ T6583] __x64_sys_bpf+0x7c/0x90 [ 2976.310786][ T6583] do_syscall_64+0x55/0xb0 [ 2976.315237][ T6583] ? clear_bhb_loop+0x40/0x90 [ 2976.319938][ T6583] ? clear_bhb_loop+0x40/0x90 [ 2976.324626][ T6583] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2976.330530][ T6583] RIP: 0033:0x7f6584b8f749 [ 2976.334959][ T6583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2976.354670][ T6583] RSP: 002b:00007f6582dd5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2976.363114][ T6583] RAX: ffffffffffffffda RBX: 00007f6584de6090 RCX: 00007f6584b8f749 [ 2976.371106][ T6583] RDX: 0000000000000094 RSI: 0000200000000600 RDI: 0000000000000005 [ 2976.379087][ T6583] RBP: 00007f6582dd5090 R08: 0000000000000000 R09: 0000000000000000 [ 2976.387163][ T6583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2976.395161][ T6583] R13: 00007f6584de6128 R14: 00007f6584de6090 R15: 00007ffdc0991938 [ 2976.403524][ T6583] [ 2977.567554][ T6605] validate_nla: 1 callbacks suppressed [ 2977.567572][ T6605] netlink: 'syz.8.9916': attribute type 10 has an invalid length. [ 2977.891180][ T6616] netlink: 119384 bytes leftover after parsing attributes in process `syz.8.9922'. [ 2977.992311][ T6616] IPv6: pim6reg1: Disabled Multicast RS [ 2978.091392][ T6621] netlink: 61211 bytes leftover after parsing attributes in process `syz.2.9924'. [ 2978.786042][ T6636] FAULT_INJECTION: forcing a failure. [ 2978.786042][ T6636] name failslab, interval 1, probability 0, space 0, times 1 [ 2978.846365][ T6636] CPU: 1 PID: 6636 Comm: syz.0.9930 Not tainted syzkaller #0 [ 2978.853926][ T6636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2978.864026][ T6636] Call Trace: [ 2978.867337][ T6636] [ 2978.870283][ T6636] dump_stack_lvl+0x16c/0x230 [ 2978.875012][ T6636] ? show_regs_print_info+0x20/0x20 [ 2978.880235][ T6636] ? load_image+0x3b0/0x3b0 [ 2978.884759][ T6636] ? __might_sleep+0xe0/0xe0 [ 2978.889421][ T6636] ? __lock_acquire+0x7c80/0x7c80 [ 2978.894469][ T6636] ? lock_chain_count+0x20/0x20 [ 2978.899341][ T6636] should_fail_ex+0x39d/0x4d0 [ 2978.904048][ T6636] should_failslab+0x9/0x20 [ 2978.908588][ T6636] slab_pre_alloc_hook+0x59/0x310 [ 2978.913681][ T6636] kmem_cache_alloc_node+0x60/0x330 [ 2978.918903][ T6636] ? __alloc_skb+0x108/0x2c0 [ 2978.923561][ T6636] __alloc_skb+0x108/0x2c0 [ 2978.928055][ T6636] alloc_skb_with_frags+0xca/0x7c0 [ 2978.933189][ T6636] ? __lock_acquire+0x1260/0x7c80 [ 2978.938355][ T6636] sock_alloc_send_pskb+0x857/0x990 [ 2978.943597][ T6636] ? sock_kzfree_s+0x50/0x50 [ 2978.948335][ T6636] tun_get_user+0x9dc/0x3bf0 [ 2978.953044][ T6636] ? aa_file_perm+0x120/0xec0 [ 2978.957769][ T6636] ? aa_file_perm+0x3e8/0xec0 [ 2978.962514][ T6636] ? rcu_read_unlock+0xa0/0xa0 [ 2978.967323][ T6636] ? tun_get+0x1c/0x2e0 [ 2978.971500][ T6636] ? __lock_acquire+0x7c80/0x7c80 [ 2978.976552][ T6636] ? tun_get+0x1c/0x2e0 [ 2978.980734][ T6636] tun_chr_write_iter+0x119/0x200 [ 2978.985878][ T6636] vfs_write+0x43b/0x940 [ 2978.990152][ T6636] ? file_end_write+0x250/0x250 [ 2978.995026][ T6636] ? __fget_files+0x44a/0x4d0 [ 2978.999854][ T6636] ? __fdget_pos+0x1d8/0x330 [ 2979.004463][ T6636] ? ksys_write+0x75/0x250 [ 2979.008901][ T6636] ksys_write+0x147/0x250 [ 2979.013263][ T6636] ? __ia32_sys_read+0x90/0x90 [ 2979.018140][ T6636] ? syscall_enter_from_user_mode+0x2e/0x80 [ 2979.024115][ T6636] do_syscall_64+0x55/0xb0 [ 2979.028551][ T6636] ? clear_bhb_loop+0x40/0x90 [ 2979.033366][ T6636] ? clear_bhb_loop+0x40/0x90 [ 2979.038062][ T6636] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2979.043975][ T6636] RIP: 0033:0x7f6584b8f749 [ 2979.048407][ T6636] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2979.068400][ T6636] RSP: 002b:00007f6582df6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2979.076858][ T6636] RAX: ffffffffffffffda RBX: 00007f6584de5fa0 RCX: 00007f6584b8f749 [ 2979.084882][ T6636] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 2979.092871][ T6636] RBP: 00007f6582df6090 R08: 0000000000000000 R09: 0000000000000000 [ 2979.100858][ T6636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2979.108842][ T6636] R13: 00007f6584de6038 R14: 00007f6584de5fa0 R15: 00007ffdc0991938 [ 2979.117635][ T6636] [ 2980.288035][ T6658] pim6reg1: entered promiscuous mode [ 2980.469422][ T6658] pim6reg1: entered allmulticast mode [ 2980.974203][ T6669] FAULT_INJECTION: forcing a failure. [ 2980.974203][ T6669] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2981.020912][ T6669] CPU: 0 PID: 6669 Comm: syz.0.9942 Not tainted syzkaller #0 [ 2981.028484][ T6669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2981.038738][ T6669] Call Trace: [ 2981.042131][ T6669] [ 2981.045099][ T6669] dump_stack_lvl+0x16c/0x230 [ 2981.049826][ T6669] ? show_regs_print_info+0x20/0x20 [ 2981.055093][ T6669] ? load_image+0x3b0/0x3b0 [ 2981.059644][ T6669] ? __might_fault+0xaa/0x120 [ 2981.064354][ T6669] ? __lock_acquire+0x7c80/0x7c80 [ 2981.069415][ T6669] should_fail_ex+0x39d/0x4d0 [ 2981.074136][ T6669] _copy_from_user+0x2f/0xe0 [ 2981.078762][ T6669] __sys_bpf+0x1e9/0x800 [ 2981.083042][ T6669] ? bpf_link_show_fdinfo+0x350/0x350 [ 2981.088463][ T6669] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 2981.094671][ T6669] __x64_sys_bpf+0x7c/0x90 [ 2981.099202][ T6669] do_syscall_64+0x55/0xb0 [ 2981.103650][ T6669] ? clear_bhb_loop+0x40/0x90 [ 2981.108354][ T6669] ? clear_bhb_loop+0x40/0x90 [ 2981.113062][ T6669] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2981.118981][ T6669] RIP: 0033:0x7f6584b8f749 [ 2981.123429][ T6669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2981.143158][ T6669] RSP: 002b:00007f6582df6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2981.151876][ T6669] RAX: ffffffffffffffda RBX: 00007f6584de5fa0 RCX: 00007f6584b8f749 [ 2981.160105][ T6669] RDX: 0000000000000094 RSI: 0000200000000500 RDI: 0000000000000005 [ 2981.168110][ T6669] RBP: 00007f6582df6090 R08: 0000000000000000 R09: 0000000000000000 [ 2981.176203][ T6669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2981.184199][ T6669] R13: 00007f6584de6038 R14: 00007f6584de5fa0 R15: 00007ffdc0991938 [ 2981.192217][ T6669] [ 2983.384062][ T6710] FAULT_INJECTION: forcing a failure. [ 2983.384062][ T6710] name failslab, interval 1, probability 0, space 0, times 0 [ 2983.417711][ T6710] CPU: 1 PID: 6710 Comm: syz.5.9958 Not tainted syzkaller #0 [ 2983.425169][ T6710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2983.435259][ T6710] Call Trace: [ 2983.438588][ T6710] [ 2983.441543][ T6710] dump_stack_lvl+0x16c/0x230 [ 2983.446355][ T6710] ? show_regs_print_info+0x20/0x20 [ 2983.451586][ T6710] ? load_image+0x3b0/0x3b0 [ 2983.456124][ T6710] ? __might_sleep+0xe0/0xe0 [ 2983.460757][ T6710] ? __lock_acquire+0x7c80/0x7c80 [ 2983.465820][ T6710] should_fail_ex+0x39d/0x4d0 [ 2983.470541][ T6710] should_failslab+0x9/0x20 [ 2983.475078][ T6710] slab_pre_alloc_hook+0x59/0x310 [ 2983.480145][ T6710] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 2983.485915][ T6710] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 2983.491672][ T6710] __kmem_cache_alloc_node+0x53/0x260 [ 2983.497109][ T6710] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 2983.502889][ T6710] __kmalloc+0xa4/0x240 [ 2983.507091][ T6710] tomoyo_realpath_from_path+0xe3/0x5d0 [ 2983.512706][ T6710] tomoyo_path_number_perm+0x1ea/0x590 [ 2983.518219][ T6710] ? tomoyo_path_number_perm+0x1ba/0x590 [ 2983.523990][ T6710] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 2983.529506][ T6710] ? ksys_write+0x1c1/0x250 [ 2983.534099][ T6710] ? __fget_files+0x28/0x4d0 [ 2983.538747][ T6710] security_file_ioctl+0x70/0xa0 [ 2983.543731][ T6710] __se_sys_ioctl+0x48/0x170 [ 2983.548373][ T6710] do_syscall_64+0x55/0xb0 [ 2983.552834][ T6710] ? clear_bhb_loop+0x40/0x90 [ 2983.557552][ T6710] ? clear_bhb_loop+0x40/0x90 [ 2983.562273][ T6710] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2983.568388][ T6710] RIP: 0033:0x7f17ab18f749 [ 2983.572851][ T6710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2983.593036][ T6710] RSP: 002b:00007f17abf84038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2983.601599][ T6710] RAX: ffffffffffffffda RBX: 00007f17ab3e5fa0 RCX: 00007f17ab18f749 [ 2983.609621][ T6710] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000007 [ 2983.617650][ T6710] RBP: 00007f17abf84090 R08: 0000000000000000 R09: 0000000000000000 [ 2983.625675][ T6710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2983.633696][ T6710] R13: 00007f17ab3e6038 R14: 00007f17ab3e5fa0 R15: 00007ffe461a1508 [ 2983.641745][ T6710] [ 2983.853041][ T6724] netlink: 16186 bytes leftover after parsing attributes in process `syz.2.9962'. [ 2983.893205][ T6710] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2983.906146][ T6726] syz.0.9961[6726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2983.906504][ T6726] syz.0.9961[6726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2983.920057][ T6727] netlink: 'syz.2.9962': attribute type 1 has an invalid length. [ 2984.029217][ T6727] netlink: 168864 bytes leftover after parsing attributes in process `syz.2.9962'. [ 2986.130987][ T6742] netlink: 119384 bytes leftover after parsing attributes in process `syz.2.9967'. [ 2986.711084][ T6744] IPv6: pim6reg1: Disabled Multicast RS [ 2987.419871][ T6764] syz.5.9974[6764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2987.420127][ T6764] syz.5.9974[6764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2987.474171][ T6767] FAULT_INJECTION: forcing a failure. [ 2987.474171][ T6767] name failslab, interval 1, probability 0, space 0, times 0 [ 2987.499036][ T6767] CPU: 0 PID: 6767 Comm: syz.8.9972 Not tainted syzkaller #0 [ 2987.506559][ T6767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2987.516861][ T6767] Call Trace: [ 2987.520181][ T6767] [ 2987.523178][ T6767] dump_stack_lvl+0x16c/0x230 [ 2987.527909][ T6767] ? show_regs_print_info+0x20/0x20 [ 2987.533149][ T6767] ? load_image+0x3b0/0x3b0 [ 2987.537691][ T6767] ? mark_lock+0x94/0x320 [ 2987.542102][ T6767] ? mark_lock+0x94/0x320 [ 2987.546507][ T6767] should_fail_ex+0x39d/0x4d0 [ 2987.551260][ T6767] should_failslab+0x9/0x20 [ 2987.555814][ T6767] slab_pre_alloc_hook+0x59/0x310 [ 2987.560906][ T6767] kmem_cache_alloc_node+0x60/0x330 [ 2987.566141][ T6767] ? __alloc_skb+0x108/0x2c0 [ 2987.570800][ T6767] __alloc_skb+0x108/0x2c0 [ 2987.575321][ T6767] tipc_buf_acquire+0x2b/0xe0 [ 2987.580201][ T6767] tipc_named_withdraw+0x1db/0x760 [ 2987.585364][ T6767] tipc_nametbl_withdraw+0xcc/0x280 [ 2987.590596][ T6767] ? tipc_group_self+0x26/0x1c0 [ 2987.595524][ T6767] tipc_sk_leave+0x463/0x4e0 [ 2987.600165][ T6767] ? __tipc_shutdown+0x1520/0x1520 [ 2987.605313][ T6767] ? _local_bh_enable+0xa0/0xa0 [ 2987.610222][ T6767] tipc_release+0x32a/0x2140 [ 2987.614975][ T6767] ? tipc_sock_destruct+0x180/0x180 [ 2987.620218][ T6767] ? down_write+0x162/0x1f0 [ 2987.624812][ T6767] ? down_read_killable+0x340/0x340 [ 2987.630151][ T6767] sock_close+0xbd/0x230 [ 2987.634459][ T6767] ? sock_mmap+0xa0/0xa0 [ 2987.638832][ T6767] __fput+0x234/0x970 [ 2987.642894][ T6767] __se_sys_close+0x15f/0x220 [ 2987.647616][ T6767] do_syscall_64+0x55/0xb0 [ 2987.652065][ T6767] ? clear_bhb_loop+0x40/0x90 [ 2987.656774][ T6767] ? clear_bhb_loop+0x40/0x90 [ 2987.661507][ T6767] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2987.667457][ T6767] RIP: 0033:0x7f39d338f749 [ 2987.671950][ T6767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2987.691690][ T6767] RSP: 002b:00007f39d41a3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 2987.700153][ T6767] RAX: ffffffffffffffda RBX: 00007f39d35e6090 RCX: 00007f39d338f749 [ 2987.708327][ T6767] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 2987.716330][ T6767] RBP: 00007f39d41a3090 R08: 0000000000000000 R09: 0000000000000000 [ 2987.724341][ T6767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2987.732342][ T6767] R13: 00007f39d35e6128 R14: 00007f39d35e6090 R15: 00007ffc64ba4a88 [ 2987.740392][ T6767] [ 2987.743660][ T6767] tipc: Withdrawal distribution failure [ 2988.401158][ T6771] netlink: 'syz.0.9977': attribute type 21 has an invalid length. [ 2988.410627][ T6771] netlink: 128 bytes leftover after parsing attributes in process `syz.0.9977'. [ 2988.428865][ T6771] netlink: 'syz.0.9977': attribute type 5 has an invalid length. [ 2988.434263][ T6773] netlink: 60 bytes leftover after parsing attributes in process `syz.5.9978'. [ 2988.442116][ T6771] netlink: 3 bytes leftover after parsing attributes in process `syz.0.9977'. [ 2988.564452][ T6771] netlink: 'syz.0.9977': attribute type 10 has an invalid length. [ 2988.608933][ T6771] bridge0: port 3(team0) entered disabled state [ 2988.627680][ T6780] sctp: [Deprecated]: syz.5.9987 (pid 6780) Use of int in maxseg socket option. [ 2988.627680][ T6780] Use struct sctp_assoc_value instead [ 2988.710665][ T6771] team0: left allmulticast mode [ 2988.843677][ T6771] team_slave_0: left allmulticast mode [ 2988.852875][ T6771] team_slave_1: left allmulticast mode [ 2988.872927][ T6771] batadv0: left allmulticast mode [ 2988.933967][ T6771] team0: left promiscuous mode [ 2988.986546][ T6771] team_slave_0: left promiscuous mode [ 2989.016692][ T6771] team_slave_1: left promiscuous mode [ 2989.062456][ T6771] batadv0: left promiscuous mode [ 2989.107922][ T6787] netlink: 119384 bytes leftover after parsing attributes in process `syz.5.9981'. [ 2989.195887][ T6771] bridge0: port 3(team0) entered disabled state [ 2991.390558][ T6771] team0: Cannot enslave team device to itself [ 2991.630516][ T6787] IPv6: pim6reg1: Disabled Multicast RS [ 2991.665748][ T6791] netlink: 61211 bytes leftover after parsing attributes in process `syz.8.9982'. [ 2991.953072][ T6802] netlink: 'syz.0.9985': attribute type 2 has an invalid length. [ 2991.960921][ T6802] netlink: 'syz.0.9985': attribute type 8 has an invalid length. [ 2991.995502][ T6802] netlink: 132 bytes leftover after parsing attributes in process `syz.0.9985'. [ 2992.211127][ T6813] netlink: 'syz.2.9988': attribute type 33 has an invalid length. [ 2992.236936][ T6813] netlink: 152 bytes leftover after parsing attributes in process `syz.2.9988'. [ 2992.271705][ T6813] `: renamed from team0 (while UP) [ 2992.288645][ T6815] sctp: [Deprecated]: syz.8.9990 (pid 6815) Use of int in maxseg socket option. [ 2992.288645][ T6815] Use struct sctp_assoc_value instead [ 2992.736481][ T6825] netlink: 119384 bytes leftover after parsing attributes in process `syz.8.9993'. [ 2992.853917][ T6831] FAULT_INJECTION: forcing a failure. [ 2992.853917][ T6831] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2992.888628][ T6831] CPU: 0 PID: 6831 Comm: syz.2.9994 Not tainted syzkaller #0 [ 2992.896091][ T6831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2992.906365][ T6831] Call Trace: [ 2992.910091][ T6831] [ 2992.913047][ T6831] dump_stack_lvl+0x16c/0x230 [ 2992.917786][ T6831] ? show_regs_print_info+0x20/0x20 [ 2992.923053][ T6831] ? load_image+0x3b0/0x3b0 [ 2992.927611][ T6831] ? __might_fault+0xaa/0x120 [ 2992.932351][ T6831] ? __lock_acquire+0x7c80/0x7c80 [ 2992.937431][ T6831] should_fail_ex+0x39d/0x4d0 [ 2992.942164][ T6831] _copy_from_user+0x2f/0xe0 [ 2992.946798][ T6831] __sys_bpf+0x1e9/0x800 [ 2992.951084][ T6831] ? bpf_link_show_fdinfo+0x350/0x350 [ 2992.956498][ T6831] ? lock_chain_count+0x20/0x20 [ 2992.961374][ T6831] __x64_sys_bpf+0x7c/0x90 [ 2992.965808][ T6831] do_syscall_64+0x55/0xb0 [ 2992.970379][ T6831] ? clear_bhb_loop+0x40/0x90 [ 2992.975111][ T6831] ? clear_bhb_loop+0x40/0x90 [ 2992.979963][ T6831] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2992.985927][ T6831] RIP: 0033:0x7fac0818f749 [ 2992.990360][ T6831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2993.010064][ T6831] RSP: 002b:00007fac063f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2993.018579][ T6831] RAX: ffffffffffffffda RBX: 00007fac083e5fa0 RCX: 00007fac0818f749 [ 2993.026561][ T6831] RDX: 000000000000000c RSI: 00002000000004c0 RDI: 000000000000000a [ 2993.034551][ T6831] RBP: 00007fac063f6090 R08: 0000000000000000 R09: 0000000000000000 [ 2993.042532][ T6831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2993.050797][ T6831] R13: 00007fac083e6038 R14: 00007fac083e5fa0 R15: 00007ffe50059928 [ 2993.058796][ T6831] [ 2993.255365][ T6835] syz.2.9996[6835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2993.255827][ T6835] syz.2.9996[6835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2993.806093][ T6846] FAULT_INJECTION: forcing a failure. [ 2993.806093][ T6846] name failslab, interval 1, probability 0, space 0, times 0 [ 2993.830486][ T6846] CPU: 1 PID: 6846 Comm: syz.5.10000 Not tainted syzkaller #0 [ 2993.838053][ T6846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2993.848210][ T6846] Call Trace: [ 2993.851497][ T6846] [ 2993.854443][ T6846] dump_stack_lvl+0x16c/0x230 [ 2993.859231][ T6846] ? show_regs_print_info+0x20/0x20 [ 2993.864801][ T6846] ? load_image+0x3b0/0x3b0 [ 2993.869499][ T6846] should_fail_ex+0x39d/0x4d0 [ 2993.874200][ T6846] ? __sigqueue_alloc+0x32/0x520 [ 2993.879242][ T6846] should_failslab+0x9/0x20 [ 2993.883975][ T6846] slab_pre_alloc_hook+0x59/0x310 [ 2993.889280][ T6846] ? __sigqueue_alloc+0x32/0x520 [ 2993.894426][ T6846] kmem_cache_alloc+0x5a/0x2e0 [ 2993.899208][ T6846] ? __sigqueue_alloc+0x40c/0x520 [ 2993.904256][ T6846] ? __sigqueue_alloc+0x32/0x520 [ 2993.909209][ T6846] __sigqueue_alloc+0x40c/0x520 [ 2993.914083][ T6846] __send_signal_locked+0x22f/0xe00 [ 2993.919390][ T6846] force_sig_info_to_task+0x308/0x450 [ 2993.924795][ T6846] force_sig+0xc9/0x110 [ 2993.929055][ T6846] ? send_sig+0xf0/0xf0 [ 2993.933230][ T6846] ? fixup_iopl_exception+0xdc/0x2e0 [ 2993.938581][ T6846] ? try_fixup_enqcmd_gp+0x230/0x230 [ 2993.943896][ T6846] exc_general_protection+0xdb/0x200 [ 2993.949207][ T6846] ? do_syscall_64+0x61/0xb0 [ 2993.953817][ T6846] asm_exc_general_protection+0x26/0x30 [ 2993.959460][ T6846] RIP: 0033:0x7f17ab168179 [ 2993.963986][ T6846] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 2993.984226][ T6846] RSP: 002b:00007f17abf837c8 EFLAGS: 00010283 [ 2993.990311][ T6846] RAX: 0000000000000999 RBX: 00007f17abf83d30 RCX: 00007f17ab3ab120 [ 2993.998295][ T6846] RDX: 9999999999999999 RSI: 00007f17ab213ca9 RDI: 9999999999999999 [ 2994.006298][ T6846] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 2994.014277][ T6846] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 2994.022432][ T6846] R13: 00007f17abf83eb0 R14: 9999999999999999 R15: 0000000000000000 [ 2994.030426][ T6846] [ 2994.036537][ T6845] sctp: [Deprecated]: syz.2.10001 (pid 6845) Use of int in maxseg socket option. [ 2994.036537][ T6845] Use struct sctp_assoc_value instead [ 2994.202508][ T6842] netlink: 61211 bytes leftover after parsing attributes in process `syz.0.9999'. [ 2994.556287][ T6857] netlink: 152 bytes leftover after parsing attributes in process `syz.5.10004'. [ 2994.567921][ T6857] tc_dump_action: action bad kind [ 2994.850872][ T6862] FAULT_INJECTION: forcing a failure. [ 2994.850872][ T6862] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2994.870063][ T6860] netlink: 'syz.5.10005': attribute type 10 has an invalid length. [ 2994.907452][ T6862] CPU: 1 PID: 6862 Comm: syz.8.10007 Not tainted syzkaller #0 [ 2994.914996][ T6862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2994.925088][ T6862] Call Trace: [ 2994.928485][ T6862] [ 2994.931443][ T6862] dump_stack_lvl+0x16c/0x230 [ 2994.936169][ T6862] ? show_regs_print_info+0x20/0x20 [ 2994.941403][ T6862] ? load_image+0x3b0/0x3b0 [ 2994.945946][ T6862] ? __might_fault+0xaa/0x120 [ 2994.950657][ T6862] ? __lock_acquire+0x7c80/0x7c80 [ 2994.955730][ T6862] should_fail_ex+0x39d/0x4d0 [ 2994.960542][ T6862] _copy_from_user+0x2f/0xe0 [ 2994.965182][ T6862] __sys_bpf+0x1e9/0x800 [ 2994.969465][ T6862] ? bpf_link_show_fdinfo+0x350/0x350 [ 2994.974897][ T6862] ? lock_chain_count+0x20/0x20 [ 2994.979791][ T6862] __x64_sys_bpf+0x7c/0x90 [ 2994.984330][ T6862] do_syscall_64+0x55/0xb0 [ 2994.988821][ T6862] ? clear_bhb_loop+0x40/0x90 [ 2994.993535][ T6862] ? clear_bhb_loop+0x40/0x90 [ 2994.998360][ T6862] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2995.004285][ T6862] RIP: 0033:0x7f39d338f749 [ 2995.008727][ T6862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2995.028382][ T6862] RSP: 002b:00007f39d41c4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2995.036846][ T6862] RAX: ffffffffffffffda RBX: 00007f39d35e5fa0 RCX: 00007f39d338f749 [ 2995.044861][ T6862] RDX: 000000000000000c RSI: 0000200000000000 RDI: 000000000000000a [ 2995.052995][ T6862] RBP: 00007f39d41c4090 R08: 0000000000000000 R09: 0000000000000000 [ 2995.061020][ T6862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2995.069112][ T6862] R13: 00007f39d35e6038 R14: 00007f39d35e5fa0 R15: 00007ffc64ba4a88 [ 2995.077308][ T6862] [ 2995.179090][ T6860] bridge0: port 3(team0) entered disabled state [ 2995.330447][ T6860] team0: left allmulticast mode [ 2995.362359][ T6860] team_slave_0: left allmulticast mode [ 2995.393897][ T6860] team_slave_1: left allmulticast mode [ 2995.417766][ T6864] netlink: 'syz.2.10006': attribute type 29 has an invalid length. [ 2995.426075][ T6860] batadv0: left allmulticast mode [ 2995.452076][ T6860] team0: left promiscuous mode [ 2995.490320][ T6860] team_slave_0: left promiscuous mode [ 2995.534963][ T6870] FAULT_INJECTION: forcing a failure. [ 2995.534963][ T6870] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2995.583094][ T6860] team_slave_1: left promiscuous mode [ 2995.588793][ T6860] batadv0: left promiscuous mode [ 2995.595175][ T6870] CPU: 1 PID: 6870 Comm: syz.0.10016 Not tainted syzkaller #0 [ 2995.602798][ T6870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2995.603387][ T6860] bridge0: port 3(team0) entered disabled state [ 2995.612873][ T6870] Call Trace: [ 2995.612892][ T6870] [ 2995.612903][ T6870] dump_stack_lvl+0x16c/0x230 [ 2995.612940][ T6870] ? show_regs_print_info+0x20/0x20 [ 2995.612966][ T6870] ? load_image+0x3b0/0x3b0 [ 2995.612989][ T6870] ? __might_fault+0xaa/0x120 [ 2995.644821][ T6870] ? __lock_acquire+0x7c80/0x7c80 [ 2995.649991][ T6870] should_fail_ex+0x39d/0x4d0 [ 2995.654718][ T6870] _copy_from_user+0x2f/0xe0 [ 2995.659345][ T6870] __sys_bpf+0x1e9/0x800 [ 2995.663626][ T6870] ? bpf_link_show_fdinfo+0x350/0x350 [ 2995.669052][ T6870] ? lock_chain_count+0x20/0x20 [ 2995.673945][ T6870] __x64_sys_bpf+0x7c/0x90 [ 2995.678388][ T6870] do_syscall_64+0x55/0xb0 [ 2995.682852][ T6870] ? clear_bhb_loop+0x40/0x90 [ 2995.687561][ T6870] ? clear_bhb_loop+0x40/0x90 [ 2995.692261][ T6870] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2995.698179][ T6870] RIP: 0033:0x7f6584b8f749 [ 2995.702892][ T6870] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2995.722737][ T6870] RSP: 002b:00007f6582df6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2995.731196][ T6870] RAX: ffffffffffffffda RBX: 00007f6584de5fa0 RCX: 00007f6584b8f749 [ 2995.739196][ T6870] RDX: 0000000000000094 RSI: 00002000000004c0 RDI: 0000000000000005 [ 2995.747369][ T6870] RBP: 00007f6582df6090 R08: 0000000000000000 R09: 0000000000000000 [ 2995.755367][ T6870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2995.763383][ T6870] R13: 00007f6584de6038 R14: 00007f6584de5fa0 R15: 00007ffdc0991938 [ 2995.771400][ T6870] [ 2995.852233][ T6860] 8021q: adding VLAN 0 to HW filter on device team0 [ 2995.886630][ T6860] bond0: (slave team0): Enslaving as an active interface with an up link [ 2995.973886][ T6864] netlink: 'syz.2.10006': attribute type 29 has an invalid length. [ 2996.182481][ T6875] netlink: 209844 bytes leftover after parsing attributes in process `syz.0.10009'. [ 2996.665768][ T6888] syz.5.10014[6888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2996.666024][ T6888] syz.5.10014[6888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2996.969037][ T6897] netlink: 119384 bytes leftover after parsing attributes in process `syz.8.10019'. [ 2997.276943][ T6904] FAULT_INJECTION: forcing a failure. [ 2997.276943][ T6904] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2997.322981][ T6904] CPU: 0 PID: 6904 Comm: syz.2.10021 Not tainted syzkaller #0 [ 2997.330529][ T6904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 2997.340710][ T6904] Call Trace: [ 2997.344103][ T6904] [ 2997.347060][ T6904] dump_stack_lvl+0x16c/0x230 [ 2997.351869][ T6904] ? show_regs_print_info+0x20/0x20 [ 2997.357103][ T6904] ? load_image+0x3b0/0x3b0 [ 2997.361642][ T6904] ? __might_fault+0xaa/0x120 [ 2997.366350][ T6904] ? __lock_acquire+0x7c80/0x7c80 [ 2997.371423][ T6904] should_fail_ex+0x39d/0x4d0 [ 2997.376148][ T6904] _copy_from_user+0x2f/0xe0 [ 2997.380777][ T6904] ___sys_sendmsg+0x159/0x290 [ 2997.385511][ T6904] ? __sys_sendmsg+0x270/0x270 [ 2997.390443][ T6904] ? __lock_acquire+0x7c80/0x7c80 [ 2997.395524][ T6904] __se_sys_sendmsg+0x1a5/0x270 [ 2997.400430][ T6904] ? __x64_sys_sendmsg+0x80/0x80 [ 2997.405484][ T6904] ? lockdep_hardirqs_on+0x98/0x150 [ 2997.410700][ T6904] do_syscall_64+0x55/0xb0 [ 2997.415145][ T6904] ? clear_bhb_loop+0x40/0x90 [ 2997.420006][ T6904] ? clear_bhb_loop+0x40/0x90 [ 2997.424782][ T6904] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2997.430694][ T6904] RIP: 0033:0x7fac0818f749 [ 2997.435133][ T6904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2997.455192][ T6904] RSP: 002b:00007fac063f6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2997.463707][ T6904] RAX: ffffffffffffffda RBX: 00007fac083e5fa0 RCX: 00007fac0818f749 [ 2997.471774][ T6904] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 2997.479846][ T6904] RBP: 00007fac063f6090 R08: 0000000000000000 R09: 0000000000000000 [ 2997.487925][ T6904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2997.495915][ T6904] R13: 00007fac083e6038 R14: 00007fac083e5fa0 R15: 00007ffe50059928 [ 2997.503908][ T6904] [ 2997.642997][ T6900] netlink: 'syz.0.10020': attribute type 29 has an invalid length. [ 2997.661183][ T6910] netlink: 822 bytes leftover after parsing attributes in process `syz.8.10024'. [ 2997.684377][ T6900] netlink: 'syz.0.10020': attribute type 29 has an invalid length. [ 2997.753274][ T6902] netlink: 'syz.0.10020': attribute type 29 has an invalid length. [ 2999.462518][ T6929] netlink: 822 bytes leftover after parsing attributes in process `syz.8.10028'. [ 2999.787291][ T6935] netlink: 209844 bytes leftover after parsing attributes in process `syz.2.10029'. [ 3000.175460][ T6937] netlink: 163260 bytes leftover after parsing attributes in process `syz.0.10030'. [ 3000.360017][ T6945] netlink: 119384 bytes leftover after parsing attributes in process `syz.8.10032'. [ 3001.393074][ T6966] netlink: 1010 bytes leftover after parsing attributes in process `syz.0.10040'. [ 3001.457052][ T6966] bridge: RTM_NEWNEIGH bridge0 without NUD_PERMANENT [ 3001.938527][ T6964] netlink: 'syz.8.10039': attribute type 29 has an invalid length. [ 3001.993296][ T6964] netlink: 'syz.8.10039': attribute type 29 has an invalid length. [ 3002.043473][ T6964] netlink: 'syz.8.10039': attribute type 29 has an invalid length. [ 3002.133840][ T6981] FAULT_INJECTION: forcing a failure. [ 3002.133840][ T6981] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3002.182955][ T6981] CPU: 1 PID: 6981 Comm: syz.5.10044 Not tainted syzkaller #0 [ 3002.190507][ T6981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3002.200616][ T6981] Call Trace: [ 3002.203932][ T6981] [ 3002.206980][ T6981] dump_stack_lvl+0x16c/0x230 [ 3002.211704][ T6981] ? show_regs_print_info+0x20/0x20 [ 3002.217042][ T6981] ? load_image+0x3b0/0x3b0 [ 3002.221673][ T6981] ? __might_fault+0xaa/0x120 [ 3002.226388][ T6981] ? __lock_acquire+0x7c80/0x7c80 [ 3002.231459][ T6981] should_fail_ex+0x39d/0x4d0 [ 3002.236185][ T6981] _copy_from_user+0x2f/0xe0 [ 3002.240821][ T6981] __sys_bpf+0x1e9/0x800 [ 3002.245109][ T6981] ? bpf_link_show_fdinfo+0x350/0x350 [ 3002.250550][ T6981] ? lock_chain_count+0x20/0x20 [ 3002.255462][ T6981] __x64_sys_bpf+0x7c/0x90 [ 3002.259904][ T6981] do_syscall_64+0x55/0xb0 [ 3002.264421][ T6981] ? clear_bhb_loop+0x40/0x90 [ 3002.269108][ T6981] ? clear_bhb_loop+0x40/0x90 [ 3002.273882][ T6981] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3002.279787][ T6981] RIP: 0033:0x7f17ab18f749 [ 3002.284219][ T6981] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3002.303865][ T6981] RSP: 002b:00007f17abf84038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3002.312292][ T6981] RAX: ffffffffffffffda RBX: 00007f17ab3e5fa0 RCX: 00007f17ab18f749 [ 3002.320281][ T6981] RDX: 0000000000000010 RSI: 00002000000005c0 RDI: 000000000000001d [ 3002.328296][ T6981] RBP: 00007f17abf84090 R08: 0000000000000000 R09: 0000000000000000 [ 3002.336313][ T6981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3002.344304][ T6981] R13: 00007f17ab3e6038 R14: 00007f17ab3e5fa0 R15: 00007ffe461a1508 [ 3002.352300][ T6981] [ 3002.772623][ T6991] netlink: 119384 bytes leftover after parsing attributes in process `syz.5.10047'. [ 3003.397940][ T7000] netlink: 1010 bytes leftover after parsing attributes in process `syz.2.10050'. [ 3003.470040][ T7000] bridge: RTM_NEWNEIGH bridge0 without NUD_PERMANENT [ 3003.512203][ T7005] netlink: 209844 bytes leftover after parsing attributes in process `syz.8.10049'. [ 3003.916730][ T7011] netlink: 'syz.2.10051': attribute type 11 has an invalid length. [ 3004.170677][ T7016] netlink: 209844 bytes leftover after parsing attributes in process `syz.0.10053'. [ 3004.322395][ T7019] netlink: 203516 bytes leftover after parsing attributes in process `syz.5.10056'. [ 3004.540375][ T7027] FAULT_INJECTION: forcing a failure. [ 3004.540375][ T7027] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3004.589603][ T7027] CPU: 0 PID: 7027 Comm: syz.5.10060 Not tainted syzkaller #0 [ 3004.597175][ T7027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3004.607293][ T7027] Call Trace: [ 3004.610605][ T7027] [ 3004.613597][ T7027] dump_stack_lvl+0x16c/0x230 [ 3004.618329][ T7027] ? show_regs_print_info+0x20/0x20 [ 3004.623576][ T7027] ? load_image+0x3b0/0x3b0 [ 3004.628137][ T7027] ? __might_fault+0xaa/0x120 [ 3004.632912][ T7027] ? __lock_acquire+0x7c80/0x7c80 [ 3004.637977][ T7027] should_fail_ex+0x39d/0x4d0 [ 3004.642708][ T7027] _copy_from_user+0x2f/0xe0 [ 3004.647332][ T7027] ___sys_sendmsg+0x159/0x290 [ 3004.652057][ T7027] ? __sys_sendmsg+0x270/0x270 [ 3004.656892][ T7027] ? __lock_acquire+0x7c80/0x7c80 [ 3004.661977][ T7027] __se_sys_sendmsg+0x1a5/0x270 [ 3004.666869][ T7027] ? __x64_sys_sendmsg+0x80/0x80 [ 3004.671865][ T7027] ? lockdep_hardirqs_on+0x98/0x150 [ 3004.677097][ T7027] do_syscall_64+0x55/0xb0 [ 3004.681580][ T7027] ? clear_bhb_loop+0x40/0x90 [ 3004.686288][ T7027] ? clear_bhb_loop+0x40/0x90 [ 3004.691001][ T7027] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3004.696925][ T7027] RIP: 0033:0x7f17ab18f749 [ 3004.701371][ T7027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3004.721018][ T7027] RSP: 002b:00007f17abf84038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3004.729478][ T7027] RAX: ffffffffffffffda RBX: 00007f17ab3e5fa0 RCX: 00007f17ab18f749 [ 3004.737572][ T7027] RDX: 00000000640ce0c0 RSI: 0000200000000340 RDI: 0000000000000003 [ 3004.745586][ T7027] RBP: 00007f17abf84090 R08: 0000000000000000 R09: 0000000000000000 [ 3004.753810][ T7027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3004.761824][ T7027] R13: 00007f17ab3e6038 R14: 00007f17ab3e5fa0 R15: 00007ffe461a1508 [ 3004.769855][ T7027] [ 3004.923796][ T7030] netlink: 'syz.0.10059': attribute type 29 has an invalid length. [ 3004.932170][ T7030] netlink: 'syz.0.10059': attribute type 29 has an invalid length. [ 3004.948833][ T7030] netlink: 'syz.0.10059': attribute type 29 has an invalid length. [ 3004.988583][ T7032] __nla_validate_parse: 3 callbacks suppressed [ 3004.988604][ T7032] netlink: 1010 bytes leftover after parsing attributes in process `syz.8.10061'. [ 3005.046070][ T7034] netlink: 119384 bytes leftover after parsing attributes in process `syz.5.10062'. [ 3005.053160][ T7032] bridge: RTM_NEWNEIGH bridge0 without NUD_PERMANENT [ 3005.199853][ T7039] netlink: 'syz.2.10063': attribute type 5 has an invalid length. [ 3005.752293][ T7048] netlink: 209844 bytes leftover after parsing attributes in process `syz.2.10068'. [ 3005.878874][ T7057] FAULT_INJECTION: forcing a failure. [ 3005.878874][ T7057] name failslab, interval 1, probability 0, space 0, times 0 [ 3005.924142][ T7057] CPU: 0 PID: 7057 Comm: syz.5.10071 Not tainted syzkaller #0 [ 3005.931780][ T7057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3005.942137][ T7057] Call Trace: [ 3005.945447][ T7057] [ 3005.948414][ T7057] dump_stack_lvl+0x16c/0x230 [ 3005.953145][ T7057] ? show_regs_print_info+0x20/0x20 [ 3005.958383][ T7057] ? load_image+0x3b0/0x3b0 [ 3005.962932][ T7057] ? __might_sleep+0xe0/0xe0 [ 3005.967552][ T7057] ? __lock_acquire+0x7c80/0x7c80 [ 3005.972610][ T7057] should_fail_ex+0x39d/0x4d0 [ 3005.977331][ T7057] should_failslab+0x9/0x20 [ 3005.981883][ T7057] slab_pre_alloc_hook+0x59/0x310 [ 3005.986952][ T7057] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 3005.992825][ T7057] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 3005.998585][ T7057] __kmem_cache_alloc_node+0x53/0x260 [ 3006.004007][ T7057] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 3006.009793][ T7057] __kmalloc+0xa4/0x240 [ 3006.014000][ T7057] tomoyo_realpath_from_path+0xe3/0x5d0 [ 3006.019615][ T7057] tomoyo_path_number_perm+0x1ea/0x590 [ 3006.025099][ T7057] ? tomoyo_path_number_perm+0x1ba/0x590 [ 3006.030755][ T7057] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 3006.036260][ T7057] ? ksys_write+0x1c1/0x250 [ 3006.040921][ T7057] ? __fget_files+0x28/0x4d0 [ 3006.045578][ T7057] security_file_ioctl+0x70/0xa0 [ 3006.050547][ T7057] __se_sys_ioctl+0x48/0x170 [ 3006.055162][ T7057] do_syscall_64+0x55/0xb0 [ 3006.059605][ T7057] ? clear_bhb_loop+0x40/0x90 [ 3006.064293][ T7057] ? clear_bhb_loop+0x40/0x90 [ 3006.068989][ T7057] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3006.074982][ T7057] RIP: 0033:0x7f17ab18f749 [ 3006.079421][ T7057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3006.099386][ T7057] RSP: 002b:00007f17abf84038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3006.107823][ T7057] RAX: ffffffffffffffda RBX: 00007f17ab3e5fa0 RCX: 00007f17ab18f749 [ 3006.115894][ T7057] RDX: 0000200000000000 RSI: 0000000000008b04 RDI: 0000000000000004 [ 3006.123976][ T7057] RBP: 00007f17abf84090 R08: 0000000000000000 R09: 0000000000000000 [ 3006.131963][ T7057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3006.139949][ T7057] R13: 00007f17ab3e6038 R14: 00007f17ab3e5fa0 R15: 00007ffe461a1508 [ 3006.148044][ T7057] [ 3006.445552][ T7057] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3006.666966][ T7059] netlink: 209844 bytes leftover after parsing attributes in process `syz.0.10072'. [ 3010.738981][ T7063] syzkaller0: entered promiscuous mode [ 3010.751409][ T7063] syzkaller0: entered allmulticast mode [ 3010.818730][ T7080] netlink: 119384 bytes leftover after parsing attributes in process `syz.8.10078'. [ 3010.883647][ T7078] netlink: 'syz.5.10079': attribute type 10 has an invalid length. [ 3011.367852][ T7096] netlink: 209844 bytes leftover after parsing attributes in process `syz.5.10081'. [ 3013.544196][ T7106] tap0: tun_chr_ioctl cmd 1074025677 [ 3013.549817][ T7106] tap0: linktype set to 1 [ 3013.647312][ T7111] netlink: 60 bytes leftover after parsing attributes in process `syz.8.10086'. [ 3014.158785][ T7117] netlink: 'syz.5.10089': attribute type 10 has an invalid length. [ 3014.529505][ T7123] netlink: 209844 bytes leftover after parsing attributes in process `syz.0.10092'. [ 3014.559172][ T7125] netlink: 'syz.8.10093': attribute type 7 has an invalid length. [ 3014.574007][ T7125] netlink: 'syz.8.10093': attribute type 6 has an invalid length. [ 3015.599677][ T7123] ieee80211 phy65: Failed to add default virtual iface [ 3015.615782][ T7127] netlink: 119384 bytes leftover after parsing attributes in process `syz.5.10094'. [ 3015.802692][ T7144] netlink: 'syz.0.10099': attribute type 10 has an invalid length. [ 3015.815432][ T7144] 8021q: adding VLAN 0 to HW filter on device team0 [ 3015.827336][ T7144] bond0: (slave team0): Enslaving as an active interface with an up link [ 3018.636699][ T7158] netlink: 'syz.5.10106': attribute type 1 has an invalid length. [ 3018.706163][ T7158] netlink: 'syz.5.10106': attribute type 4 has an invalid length. [ 3018.736794][ T7158] netlink: 9462 bytes leftover after parsing attributes in process `syz.5.10106'. [ 3018.774245][ T7162] FAULT_INJECTION: forcing a failure. [ 3018.774245][ T7162] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3018.813371][ T7162] CPU: 1 PID: 7162 Comm: syz.8.10104 Not tainted syzkaller #0 [ 3018.820935][ T7162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3018.831042][ T7162] Call Trace: [ 3018.834366][ T7162] [ 3018.837350][ T7162] dump_stack_lvl+0x16c/0x230 [ 3018.842184][ T7162] ? show_regs_print_info+0x20/0x20 [ 3018.847479][ T7162] ? load_image+0x3b0/0x3b0 [ 3018.852032][ T7162] ? __might_fault+0xaa/0x120 [ 3018.856782][ T7162] ? __lock_acquire+0x7c80/0x7c80 [ 3018.861870][ T7162] should_fail_ex+0x39d/0x4d0 [ 3018.866607][ T7162] _copy_from_user+0x2f/0xe0 [ 3018.871254][ T7162] __sys_bpf+0x1e9/0x800 [ 3018.875549][ T7162] ? bpf_link_show_fdinfo+0x350/0x350 [ 3018.881161][ T7162] ? lock_chain_count+0x20/0x20 [ 3018.886167][ T7162] __x64_sys_bpf+0x7c/0x90 [ 3018.890640][ T7162] do_syscall_64+0x55/0xb0 [ 3018.895131][ T7162] ? clear_bhb_loop+0x40/0x90 [ 3018.899942][ T7162] ? clear_bhb_loop+0x40/0x90 [ 3018.904673][ T7162] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3018.910602][ T7162] RIP: 0033:0x7f39d338f749 [ 3018.915038][ T7162] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3018.934852][ T7162] RSP: 002b:00007f39d41a3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3018.943283][ T7162] RAX: ffffffffffffffda RBX: 00007f39d35e6090 RCX: 00007f39d338f749 [ 3018.951355][ T7162] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 3018.959350][ T7162] RBP: 00007f39d41a3090 R08: 0000000000000000 R09: 0000000000000000 [ 3018.967382][ T7162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3018.975475][ T7162] R13: 00007f39d35e6128 R14: 00007f39d35e6090 R15: 00007ffc64ba4a88 [ 3018.983492][ T7162] [ 3019.008116][ T7170] netlink: 209844 bytes leftover after parsing attributes in process `syz.2.10108'. [ 3020.118669][ T7183] netlink: 119384 bytes leftover after parsing attributes in process `syz.2.10114'. [ 3020.831636][ T1290] ieee802154 phy0 wpan0: encryption failed: -22 [ 3020.838531][ T1290] ieee802154 phy1 wpan1: encryption failed: -22 [ 3020.899812][ T7191] netlink: 'syz.2.10118': attribute type 1 has an invalid length. [ 3020.953084][ T7191] netlink: 'syz.2.10118': attribute type 4 has an invalid length. [ 3020.961024][ T7191] netlink: 9462 bytes leftover after parsing attributes in process `syz.2.10118'. [ 3021.817367][ T7202] netlink: 'syz.2.10121': attribute type 1 has an invalid length. [ 3021.912877][ T7202] netlink: 193500 bytes leftover after parsing attributes in process `syz.2.10121'. [ 3021.971312][ T7195] netlink: 209844 bytes leftover after parsing attributes in process `syz.8.10119'. [ 3022.289830][ T7207] FAULT_INJECTION: forcing a failure. [ 3022.289830][ T7207] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3022.442347][ T7207] CPU: 0 PID: 7207 Comm: syz.5.10123 Not tainted syzkaller #0 [ 3022.449915][ T7207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3022.460015][ T7207] Call Trace: [ 3022.463327][ T7207] [ 3022.466292][ T7207] dump_stack_lvl+0x16c/0x230 [ 3022.471119][ T7207] ? show_regs_print_info+0x20/0x20 [ 3022.476386][ T7207] ? load_image+0x3b0/0x3b0 [ 3022.480941][ T7207] ? __might_fault+0xaa/0x120 [ 3022.485674][ T7207] ? __lock_acquire+0x7c80/0x7c80 [ 3022.490832][ T7207] ? __might_fault+0x9c/0x120 [ 3022.495561][ T7207] should_fail_ex+0x39d/0x4d0 [ 3022.500303][ T7207] _copy_from_user+0x2f/0xe0 [ 3022.504947][ T7207] __sys_bpf+0x1e9/0x800 [ 3022.509256][ T7207] ? bpf_link_show_fdinfo+0x350/0x350 [ 3022.514777][ T7207] ? lock_chain_count+0x20/0x20 [ 3022.519676][ T7207] ? lockdep_hardirqs_on_prepare+0x400/0x760 [ 3022.525728][ T7207] __x64_sys_bpf+0x7c/0x90 [ 3022.530196][ T7207] do_syscall_64+0x55/0xb0 [ 3022.534653][ T7207] ? clear_bhb_loop+0x40/0x90 [ 3022.539372][ T7207] ? clear_bhb_loop+0x40/0x90 [ 3022.544099][ T7207] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3022.550049][ T7207] RIP: 0033:0x7f17ab18f749 [ 3022.554512][ T7207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3022.574259][ T7207] RSP: 002b:00007f17abf84038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3022.582732][ T7207] RAX: ffffffffffffffda RBX: 00007f17ab3e5fa0 RCX: 00007f17ab18f749 [ 3022.590917][ T7207] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 3022.599032][ T7207] RBP: 00007f17abf84090 R08: 0000000000000000 R09: 0000000000000000 [ 3022.607042][ T7207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3022.615065][ T7207] R13: 00007f17ab3e6038 R14: 00007f17ab3e5fa0 R15: 00007ffe461a1508 [ 3022.623182][ T7207] [ 3025.403954][ T7223] netlink: 119384 bytes leftover after parsing attributes in process `syz.2.10128'. [ 3025.537346][ T7223] IPv6: …: Disabled Multicast RS [ 3025.663105][ T7229] netlink: 'syz.0.10130': attribute type 1 has an invalid length. [ 3025.683882][ T7229] netlink: 'syz.0.10130': attribute type 4 has an invalid length. [ 3025.691815][ T7229] netlink: 9462 bytes leftover after parsing attributes in process `syz.0.10130'. [ 3026.346093][ T7232] netlink: 209844 bytes leftover after parsing attributes in process `syz.2.10131'. [ 3027.410921][ T7239] netlink: 'syz.8.10133': attribute type 10 has an invalid length. [ 3027.537965][ T7239] 8021q: adding VLAN 0 to HW filter on device team0 [ 3027.577202][ T7239] bond0: (slave team0): Enslaving as an active interface with an up link [ 3028.125579][ T7256] netlink: 119384 bytes leftover after parsing attributes in process `syz.8.10139'. [ 3028.487910][ T7256] IPv6: …: Disabled Multicast RS [ 3029.277052][ T7265] netlink: 'syz.0.10141': attribute type 1 has an invalid length. [ 3029.349835][ T7265] netlink: 'syz.0.10141': attribute type 4 has an invalid length. [ 3029.392981][ T7265] netlink: 9462 bytes leftover after parsing attributes in process `syz.0.10141'. [ 3029.977167][ T7272] netlink: 'syz.2.10145': attribute type 3 has an invalid length. [ 3029.993518][ T7273] netlink: 'syz.2.10145': attribute type 3 has an invalid length. [ 3030.001415][ T7273] netlink: 130984 bytes leftover after parsing attributes in process `syz.2.10145'. [ 3030.027598][ T7272] netlink: 130984 bytes leftover after parsing attributes in process `syz.2.10145'. [ 3030.711188][ T7274] netlink: 209844 bytes leftover after parsing attributes in process `syz.0.10144'. [ 3030.740545][ T7280] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 3030.751548][ T7280] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 3030.762962][ T7280] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 3030.771748][ T7280] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 3030.780853][ T7280] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 3030.803138][ T7280] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 3030.862045][ T7284] FAULT_INJECTION: forcing a failure. [ 3030.862045][ T7284] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3030.875978][ T7284] CPU: 0 PID: 7284 Comm: syz.5.10147 Not tainted syzkaller #0 [ 3030.883488][ T7284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3030.893760][ T7284] Call Trace: [ 3030.897079][ T7284] [ 3030.900041][ T7284] dump_stack_lvl+0x16c/0x230 [ 3030.904775][ T7284] ? show_regs_print_info+0x20/0x20 [ 3030.909998][ T7284] ? load_image+0x3b0/0x3b0 [ 3030.914547][ T7284] ? __might_fault+0xaa/0x120 [ 3030.919262][ T7284] ? __lock_acquire+0x7c80/0x7c80 [ 3030.924332][ T7284] should_fail_ex+0x39d/0x4d0 [ 3030.929064][ T7284] _copy_from_user+0x2f/0xe0 [ 3030.933701][ T7284] ___sys_sendmsg+0x159/0x290 [ 3030.938434][ T7284] ? __sys_sendmsg+0x270/0x270 [ 3030.943270][ T7284] ? __lock_acquire+0x7c80/0x7c80 [ 3030.948360][ T7284] __se_sys_sendmsg+0x1a5/0x270 [ 3030.953261][ T7284] ? __x64_sys_sendmsg+0x80/0x80 [ 3030.958260][ T7284] ? lockdep_hardirqs_on+0x98/0x150 [ 3030.963508][ T7284] do_syscall_64+0x55/0xb0 [ 3030.967966][ T7284] ? clear_bhb_loop+0x40/0x90 [ 3030.972672][ T7284] ? clear_bhb_loop+0x40/0x90 [ 3030.977393][ T7284] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3030.983330][ T7284] RIP: 0033:0x7f17ab18f749 [ 3030.987861][ T7284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3031.007482][ T7284] RSP: 002b:00007f17abf84038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3031.015910][ T7284] RAX: ffffffffffffffda RBX: 00007f17ab3e5fa0 RCX: 00007f17ab18f749 [ 3031.023920][ T7284] RDX: 0000000000000000 RSI: 0000200000001780 RDI: 0000000000000003 [ 3031.031945][ T7284] RBP: 00007f17abf84090 R08: 0000000000000000 R09: 0000000000000000 [ 3031.039934][ T7284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3031.047927][ T7284] R13: 00007f17ab3e6038 R14: 00007f17ab3e5fa0 R15: 00007ffe461a1508 [ 3031.055933][ T7284] [ 3031.345440][ T6927] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3031.502005][ T7287] netlink: 'syz.2.10149': attribute type 10 has an invalid length. [ 3031.664243][ T7287] 8021q: adding VLAN 0 to HW filter on device ` [ 3031.692187][ T7287] bond0: (slave `): Enslaving as an active interface with an up link [ 3031.830443][ T7290] netlink: 119384 bytes leftover after parsing attributes in process `syz.5.10150'. [ 3031.867482][ T6927] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3031.928288][ T7291] netlink: 'syz.0.10151': attribute type 1 has an invalid length. [ 3031.937248][ T7291] netlink: 'syz.0.10151': attribute type 4 has an invalid length. [ 3031.969534][ T7291] netlink: 9462 bytes leftover after parsing attributes in process `syz.0.10151'. [ 3032.031673][ T6927] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3032.122219][ T7290] IPv6: …: Disabled Multicast RS [ 3032.259550][ T6927] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3032.605092][ T7278] chnl_net:caif_netlink_parms(): no params data found [ 3032.912847][T32342] Bluetooth: hci0: command tx timeout [ 3032.941830][ T7304] lo: entered allmulticast mode [ 3033.117165][ T7307] lo: entered promiscuous mode [ 3033.217897][ T7307] lo: left allmulticast mode [ 3033.384562][ T7278] bridge0: port 1(bridge_slave_0) entered blocking state [ 3033.422461][ T7278] bridge0: port 1(bridge_slave_0) entered disabled state [ 3033.455091][ T7278] bridge_slave_0: entered allmulticast mode [ 3033.485919][ T7278] bridge_slave_0: entered promiscuous mode [ 3033.661656][ T7314] netlink: 209844 bytes leftover after parsing attributes in process `syz.2.10157'. [ 3033.710750][ T7278] bridge0: port 2(bridge_slave_1) entered blocking state [ 3033.744611][ T7278] bridge0: port 2(bridge_slave_1) entered disabled state [ 3033.768692][ T7278] bridge_slave_1: entered allmulticast mode [ 3033.789317][ T7278] bridge_slave_1: entered promiscuous mode [ 3034.227343][ T7278] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3034.294505][ T7278] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3034.442136][ T7322] netlink: 209844 bytes leftover after parsing attributes in process `syz.2.10158'. [ 3034.704795][ T7327] netlink: 'syz.0.10160': attribute type 10 has an invalid length. [ 3034.892976][ T7328] netlink: 'syz.5.10159': attribute type 10 has an invalid length. [ 3034.984012][T32342] Bluetooth: hci0: command tx timeout [ 3035.028880][ T7328] bond0: (slave wlan1): Releasing backup interface [ 3035.136164][ T7328] team0: Port device wlan1 added [ 3035.255083][ T7278] team0: Port device team_slave_0 added [ 3035.283298][ T7326] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 3035.400669][ T7278] team0: Port device team_slave_1 added [ 3035.574290][ T7332] netlink: 119384 bytes leftover after parsing attributes in process `syz.0.10162'. [ 3035.653388][ T7333] netlink: 'syz.2.10161': attribute type 1 has an invalid length. [ 3035.675231][ T7333] netlink: 'syz.2.10161': attribute type 4 has an invalid length. [ 3035.703028][ T7333] netlink: 9462 bytes leftover after parsing attributes in process `syz.2.10161'. [ 3035.709880][ T7336] netlink: 202920 bytes leftover after parsing attributes in process `syz.5.10163'. [ 3035.743653][ T7278] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3035.750858][ T7278] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3035.797925][ T7278] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3035.828981][ T7278] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3035.840374][ T7278] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3035.874532][ T7278] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3035.992252][ T7337] pim6reg1: left promiscuous mode [ 3036.003077][ T7337] pim6reg1: left allmulticast mode [ 3036.177861][ T7278] hsr_slave_0: entered promiscuous mode [ 3036.196780][ T7278] hsr_slave_1: entered promiscuous mode [ 3036.883593][ T6927] hsr_slave_0: left promiscuous mode [ 3036.889707][ T6927] hsr_slave_1: left promiscuous mode [ 3036.896906][ T6927] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3036.905836][ T6927] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3036.917929][ T6927] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3036.925583][ T6927] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3036.936492][ T6927] bridge_slave_1: left allmulticast mode [ 3036.942232][ T6927] bridge_slave_1: left promiscuous mode [ 3036.948083][ T6927] bridge0: port 2(bridge_slave_1) entered disabled state [ 3036.957591][ T6927] bridge_slave_0: left allmulticast mode [ 3036.963398][ T6927] bridge_slave_0: left promiscuous mode [ 3036.969237][ T6927] bridge0: port 1(bridge_slave_0) entered disabled state [ 3036.996157][ T6927] veth1_macvtap: left promiscuous mode [ 3037.001764][ T6927] veth0_macvtap: left promiscuous mode [ 3037.007555][ T6927] veth1_vlan: left promiscuous mode [ 3037.062891][T32342] Bluetooth: hci0: command tx timeout [ 3037.613165][ T6927] team0 (unregistering): Port device team_slave_1 removed [ 3037.667938][ T6927] team0 (unregistering): Port device team_slave_0 removed [ 3037.729876][ T6927] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3037.789218][ T6927] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3038.053231][ T6927] team0 (unregistering): Port device batadv0 removed [ 3038.248807][ T6927] bond0 (unregistering): (slave team0): Releasing backup interface [ 3038.425694][ T6927] bond0 (unregistering): Released all slaves [ 3038.549378][ T7278] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 3038.577120][ T7278] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 3038.588234][ T7278] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 3038.601824][ T7278] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 3038.732212][ T7278] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3038.790240][ T7278] 8021q: adding VLAN 0 to HW filter on device team0 [ 3038.803515][ T6925] bridge0: port 1(bridge_slave_0) entered blocking state [ 3038.810625][ T6925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3038.829069][ T6931] bridge0: port 2(bridge_slave_1) entered blocking state [ 3038.836259][ T6931] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3039.063045][ T7278] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3039.143514][T32342] Bluetooth: hci0: command tx timeout [ 3039.286985][ T7278] veth0_vlan: entered promiscuous mode [ 3039.300557][ T7278] veth1_vlan: entered promiscuous mode [ 3039.332698][ T7278] veth0_macvtap: entered promiscuous mode [ 3039.343865][ T7278] veth1_macvtap: entered promiscuous mode [ 3039.361077][ T7278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3039.373003][ T7278] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3039.383071][ T7278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3039.393935][ T7278] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3039.403841][ T7278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3039.414336][ T7278] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3039.425727][ T7278] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3039.441612][ T7278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3039.453506][ T7278] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3039.465842][ T7278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3039.476407][ T7278] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3039.487660][ T7278] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3039.498144][ T7278] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3039.509908][ T7278] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3039.523871][ T7278] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3039.534992][ T7278] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3039.544108][ T7278] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3039.553035][ T7278] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3039.626986][ T6317] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3039.638046][ T6317] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3039.661399][ T6925] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3039.669650][ T6925] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3039.820444][ T7364] netlink: 119384 bytes leftover after parsing attributes in process `syz.0.10172'. [ 3041.209589][ T7371] netlink: 119384 bytes leftover after parsing attributes in process `syz.0.10176'. [ 3041.220595][ T7374] FAULT_INJECTION: forcing a failure. [ 3041.220595][ T7374] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3041.239845][ T7374] CPU: 1 PID: 7374 Comm: syz.5.10167 Not tainted syzkaller #0 [ 3041.247391][ T7374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3041.257491][ T7374] Call Trace: [ 3041.260843][ T7374] [ 3041.263811][ T7374] dump_stack_lvl+0x16c/0x230 [ 3041.268541][ T7374] ? show_regs_print_info+0x20/0x20 [ 3041.273789][ T7374] ? load_image+0x3b0/0x3b0 [ 3041.278341][ T7374] ? __might_fault+0xaa/0x120 [ 3041.283056][ T7374] ? __lock_acquire+0x7c80/0x7c80 [ 3041.288118][ T7374] ? perf_trace_lock+0xf7/0x380 [ 3041.293026][ T7374] should_fail_ex+0x39d/0x4d0 [ 3041.297763][ T7374] _copy_from_user+0x2f/0xe0 [ 3041.302413][ T7374] ___sys_sendmsg+0x159/0x290 [ 3041.307147][ T7374] ? __sys_sendmsg+0x270/0x270 [ 3041.311996][ T7374] ? __lock_acquire+0x7c80/0x7c80 [ 3041.317105][ T7374] __se_sys_sendmsg+0x1a5/0x270 [ 3041.322015][ T7374] ? __x64_sys_sendmsg+0x80/0x80 [ 3041.327110][ T7374] ? lockdep_hardirqs_on+0x98/0x150 [ 3041.332360][ T7374] do_syscall_64+0x55/0xb0 [ 3041.336819][ T7374] ? clear_bhb_loop+0x40/0x90 [ 3041.341520][ T7374] ? clear_bhb_loop+0x40/0x90 [ 3041.346219][ T7374] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3041.352141][ T7374] RIP: 0033:0x7f17ab18f749 [ 3041.356575][ T7374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3041.376412][ T7374] RSP: 002b:00007f17abf84038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3041.384853][ T7374] RAX: ffffffffffffffda RBX: 00007f17ab3e5fa0 RCX: 00007f17ab18f749 [ 3041.392936][ T7374] RDX: 0000000004008804 RSI: 0000200000003a80 RDI: 0000000000000003 [ 3041.400943][ T7374] RBP: 00007f17abf84090 R08: 0000000000000000 R09: 0000000000000000 [ 3041.408942][ T7374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3041.416928][ T7374] R13: 00007f17ab3e6038 R14: 00007f17ab3e5fa0 R15: 00007ffe461a1508 [ 3041.425023][ T7374] [ 3041.647730][ T7381] netlink: 209844 bytes leftover after parsing attributes in process `syz.2.10169'. [ 3041.692138][ T7385] netlink: 'syz.5.10170': attribute type 10 has an invalid length. [ 3042.139830][ T7388] netlink: 'syz.0.10171': attribute type 1 has an invalid length. [ 3042.202627][ T7388] netlink: 'syz.0.10171': attribute type 4 has an invalid length. [ 3042.234414][ T7388] netlink: 9462 bytes leftover after parsing attributes in process `syz.0.10171'. [ 3042.466689][ T7390] netlink: 'syz.2.10175': attribute type 10 has an invalid length. [ 3042.502822][ T7390] netlink: 40 bytes leftover after parsing attributes in process `syz.2.10175'. [ 3042.585932][ T7390] caif0: entered promiscuous mode [ 3042.617406][ T7390] caif0: entered allmulticast mode [ 3042.652921][ T7390] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 3043.451783][ T7396] FAULT_INJECTION: forcing a failure. [ 3043.451783][ T7396] name failslab, interval 1, probability 0, space 0, times 0 [ 3043.464708][ T7396] CPU: 0 PID: 7396 Comm: syz.0.10178 Not tainted syzkaller #0 [ 3043.472224][ T7396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3043.482344][ T7396] Call Trace: [ 3043.485660][ T7396] [ 3043.488633][ T7396] dump_stack_lvl+0x16c/0x230 [ 3043.493369][ T7396] ? show_regs_print_info+0x20/0x20 [ 3043.498626][ T7396] ? load_image+0x3b0/0x3b0 [ 3043.503182][ T7396] ? __might_sleep+0xe0/0xe0 [ 3043.507816][ T7396] ? __lock_acquire+0x7c80/0x7c80 [ 3043.512987][ T7396] should_fail_ex+0x39d/0x4d0 [ 3043.517732][ T7396] should_failslab+0x9/0x20 [ 3043.522521][ T7396] slab_pre_alloc_hook+0x59/0x310 [ 3043.527583][ T7396] ? do_raw_spin_unlock+0x121/0x230 [ 3043.532805][ T7396] ? kobject_uevent_env+0x274/0x8c0 [ 3043.538149][ T7396] __kmem_cache_alloc_node+0x53/0x260 [ 3043.543634][ T7396] ? kobject_uevent_env+0x274/0x8c0 [ 3043.548852][ T7396] kmalloc_trace+0x2a/0xe0 [ 3043.553287][ T7396] kobject_uevent_env+0x274/0x8c0 [ 3043.558411][ T7396] ? sysfs_remove_group+0x26e/0x2a0 [ 3043.563762][ T7396] __kobject_del+0xd2/0x300 [ 3043.568275][ T7396] ? kobject_put+0x22d/0x470 [ 3043.573054][ T7396] kobject_put+0x239/0x470 [ 3043.577488][ T7396] netdev_queue_update_kobjects+0x3ed/0x480 [ 3043.583476][ T7396] netif_set_real_num_tx_queues+0x183/0x8e0 [ 3043.589411][ T7396] ? _raw_spin_unlock+0x40/0x40 [ 3043.594283][ T7396] __tun_detach+0xbcd/0x1500 [ 3043.598912][ T7396] ? tun_chr_open+0x510/0x510 [ 3043.603611][ T7396] tun_chr_close+0x10d/0x1c0 [ 3043.608219][ T7396] __fput+0x234/0x970 [ 3043.612242][ T7396] __se_sys_close+0x15f/0x220 [ 3043.616963][ T7396] do_syscall_64+0x55/0xb0 [ 3043.621423][ T7396] ? clear_bhb_loop+0x40/0x90 [ 3043.626210][ T7396] ? clear_bhb_loop+0x40/0x90 [ 3043.630914][ T7396] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3043.636824][ T7396] RIP: 0033:0x7f6584b8f749 [ 3043.641254][ T7396] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3043.660963][ T7396] RSP: 002b:00007f6582df6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 3043.669481][ T7396] RAX: ffffffffffffffda RBX: 00007f6584de5fa0 RCX: 00007f6584b8f749 [ 3043.677469][ T7396] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 3043.685455][ T7396] RBP: 00007f6582df6090 R08: 0000000000000000 R09: 0000000000000000 [ 3043.693608][ T7396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3043.701588][ T7396] R13: 00007f6584de6038 R14: 00007f6584de5fa0 R15: 00007ffdc0991938 [ 3043.709586][ T7396] [ 3044.140391][ T7406] netlink: 'syz.2.10182': attribute type 10 has an invalid length. [ 3044.149466][ T7406] vlan0: entered allmulticast mode [ 3044.224178][ T7406] `: Port device vlan0 added [ 3044.515168][ T7411] netlink: 119384 bytes leftover after parsing attributes in process `syz.0.10183'. [ 3046.142559][ T7414] netlink: 209844 bytes leftover after parsing attributes in process `syz.5.10184'. [ 3046.364928][ T7417] netlink: 'syz.2.10185': attribute type 1 has an invalid length. [ 3046.393079][ T7417] netlink: 'syz.2.10185': attribute type 4 has an invalid length. [ 3046.400976][ T7417] netlink: 9462 bytes leftover after parsing attributes in process `syz.2.10185'. [ 3046.995735][ T7424] netlink: 'syz.2.10188': attribute type 10 has an invalid length. [ 3047.170843][ T7426] netlink: 'syz.8.10190': attribute type 7 has an invalid length. [ 3047.223562][ T7426] netlink: 'syz.8.10190': attribute type 6 has an invalid length. [ 3048.044361][ T7438] FAULT_INJECTION: forcing a failure. [ 3048.044361][ T7438] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3048.068024][ T7438] CPU: 0 PID: 7438 Comm: syz.8.10196 Not tainted syzkaller #0 [ 3048.075741][ T7438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3048.085871][ T7438] Call Trace: [ 3048.089193][ T7438] [ 3048.092169][ T7438] dump_stack_lvl+0x16c/0x230 [ 3048.096922][ T7438] ? show_regs_print_info+0x20/0x20 [ 3048.102179][ T7438] ? load_image+0x3b0/0x3b0 [ 3048.106731][ T7438] ? __lock_acquire+0x7c80/0x7c80 [ 3048.111799][ T7438] ? snprintf+0xdb/0x120 [ 3048.116124][ T7438] should_fail_ex+0x39d/0x4d0 [ 3048.120928][ T7438] _copy_to_user+0x2f/0xa0 [ 3048.125708][ T7438] simple_read_from_buffer+0xe7/0x150 [ 3048.132583][ T7438] proc_fail_nth_read+0x1e3/0x250 [ 3048.137745][ T7438] ? proc_fault_inject_write+0x340/0x340 [ 3048.143421][ T7438] ? fsnotify_perm+0x271/0x5e0 [ 3048.148229][ T7438] ? proc_fault_inject_write+0x340/0x340 [ 3048.153982][ T7438] vfs_read+0x27e/0x920 [ 3048.158199][ T7438] ? kernel_read+0x1e0/0x1e0 [ 3048.162837][ T7438] ? __fget_files+0x28/0x4d0 [ 3048.167441][ T7438] ? __fget_files+0x44a/0x4d0 [ 3048.172226][ T7438] ? __fdget_pos+0x2a3/0x330 [ 3048.176835][ T7438] ? ksys_read+0x75/0x250 [ 3048.181219][ T7438] ksys_read+0x147/0x250 [ 3048.185500][ T7438] ? vfs_write+0x940/0x940 [ 3048.190116][ T7438] ? lockdep_hardirqs_on+0x98/0x150 [ 3048.195473][ T7438] do_syscall_64+0x55/0xb0 [ 3048.199905][ T7438] ? clear_bhb_loop+0x40/0x90 [ 3048.204595][ T7438] ? clear_bhb_loop+0x40/0x90 [ 3048.209296][ T7438] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3048.215198][ T7438] RIP: 0033:0x7fadc518e15c [ 3048.219628][ T7438] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 3048.239475][ T7438] RSP: 002b:00007fadc60c1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3048.247917][ T7438] RAX: ffffffffffffffda RBX: 00007fadc53e5fa0 RCX: 00007fadc518e15c [ 3048.255991][ T7438] RDX: 000000000000000f RSI: 00007fadc60c10a0 RDI: 0000000000000004 [ 3048.263980][ T7438] RBP: 00007fadc60c1090 R08: 0000000000000000 R09: 0000000000000000 [ 3048.272048][ T7438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3048.280121][ T7438] R13: 00007fadc53e6038 R14: 00007fadc53e5fa0 R15: 00007fffea2c1418 [ 3048.288208][ T7438] [ 3048.301792][ T7280] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 3048.325684][ T7280] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 3048.342575][ T7280] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 3048.352223][ T7280] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 3048.365569][ T7280] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 3048.373253][ T7280] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 3048.481552][ T7447] FAULT_INJECTION: forcing a failure. [ 3048.481552][ T7447] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3048.501755][ T7447] CPU: 1 PID: 7447 Comm: syz.8.10199 Not tainted syzkaller #0 [ 3048.509378][ T7447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3048.519470][ T7447] Call Trace: [ 3048.522761][ T7447] [ 3048.525712][ T7447] dump_stack_lvl+0x16c/0x230 [ 3048.530419][ T7447] ? show_regs_print_info+0x20/0x20 [ 3048.535711][ T7447] ? load_image+0x3b0/0x3b0 [ 3048.540249][ T7447] ? __might_fault+0xaa/0x120 [ 3048.544949][ T7447] ? __lock_acquire+0x7c80/0x7c80 [ 3048.549985][ T7447] should_fail_ex+0x39d/0x4d0 [ 3048.554872][ T7447] _copy_from_user+0x2f/0xe0 [ 3048.559595][ T7447] ___sys_sendmsg+0x159/0x290 [ 3048.564325][ T7447] ? __sys_sendmsg+0x270/0x270 [ 3048.569159][ T7447] ? __lock_acquire+0x7c80/0x7c80 [ 3048.574250][ T7447] __se_sys_sendmsg+0x1a5/0x270 [ 3048.579163][ T7447] ? __x64_sys_sendmsg+0x80/0x80 [ 3048.584152][ T7447] ? lockdep_hardirqs_on+0x98/0x150 [ 3048.589451][ T7447] do_syscall_64+0x55/0xb0 [ 3048.593908][ T7447] ? clear_bhb_loop+0x40/0x90 [ 3048.598608][ T7447] ? clear_bhb_loop+0x40/0x90 [ 3048.603401][ T7447] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3048.609335][ T7447] RIP: 0033:0x7fadc518f749 [ 3048.613761][ T7447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3048.633376][ T7447] RSP: 002b:00007fadc60c1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3048.641976][ T7447] RAX: ffffffffffffffda RBX: 00007fadc53e5fa0 RCX: 00007fadc518f749 [ 3048.649954][ T7447] RDX: 0000000000008000 RSI: 0000200000001000 RDI: 0000000000000003 [ 3048.657947][ T7447] RBP: 00007fadc60c1090 R08: 0000000000000000 R09: 0000000000000000 [ 3048.665935][ T7447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3048.673912][ T7447] R13: 00007fadc53e6038 R14: 00007fadc53e5fa0 R15: 00007fffea2c1418 [ 3048.681897][ T7447] [ 3048.732115][ T7451] netlink: 'syz.5.10200': attribute type 1 has an invalid length. [ 3048.740302][ T7451] netlink: 'syz.5.10200': attribute type 4 has an invalid length. [ 3048.770424][ T7451] netlink: 9462 bytes leftover after parsing attributes in process `syz.5.10200'. [ 3048.840844][ T6927] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3048.992620][ T7456] netlink: 119384 bytes leftover after parsing attributes in process `syz.2.10202'. [ 3049.457834][ T6927] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3049.482465][ T7454] netlink: 209844 bytes leftover after parsing attributes in process `syz.8.10201'. [ 3049.845175][ T7460] netlink: 'syz.5.10203': attribute type 10 has an invalid length. [ 3049.982112][ T6927] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3050.108569][ T6927] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3050.149405][ T7470] netlink: 'syz.2.10206': attribute type 7 has an invalid length. [ 3050.171325][ T7470] netlink: 'syz.2.10206': attribute type 6 has an invalid length. [ 3050.423099][ T7280] Bluetooth: hci4: command tx timeout [ 3050.509238][ T7439] chnl_net:caif_netlink_parms(): no params data found [ 3050.541769][ T7482] netlink: 'syz.8.10211': attribute type 1 has an invalid length. [ 3050.550457][ T7482] netlink: 'syz.8.10211': attribute type 4 has an invalid length. [ 3050.559042][ T7482] netlink: 9462 bytes leftover after parsing attributes in process `syz.8.10211'. [ 3051.058733][ T7491] netlink: 119384 bytes leftover after parsing attributes in process `syz.5.10214'. [ 3051.846719][ T7488] netlink: 209844 bytes leftover after parsing attributes in process `syz.8.10213'. [ 3051.862135][ T7439] bridge0: port 1(bridge_slave_0) entered blocking state [ 3051.882395][ T7439] bridge0: port 1(bridge_slave_0) entered disabled state [ 3051.890184][ T7439] bridge_slave_0: entered allmulticast mode [ 3051.901844][ T7439] bridge_slave_0: entered promiscuous mode [ 3052.030017][ T7439] bridge0: port 2(bridge_slave_1) entered blocking state [ 3052.038728][ T7439] bridge0: port 2(bridge_slave_1) entered disabled state [ 3052.046661][ T7439] bridge_slave_1: entered allmulticast mode [ 3052.057881][ T7439] bridge_slave_1: entered promiscuous mode [ 3052.151601][ T7439] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3052.343489][ T7439] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3052.503571][ T7280] Bluetooth: hci4: command tx timeout [ 3052.558521][ T7439] team0: Port device team_slave_0 added [ 3052.730197][ T7439] team0: Port device team_slave_1 added [ 3052.997881][ T7439] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3053.029173][ T7439] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3053.083643][ T7439] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3053.113570][ T7511] validate_nla: 1 callbacks suppressed [ 3053.113590][ T7511] netlink: 'syz.2.10222': attribute type 1 has an invalid length. [ 3053.133132][ T7511] netlink: 'syz.2.10222': attribute type 4 has an invalid length. [ 3053.150609][ T7511] netlink: 9462 bytes leftover after parsing attributes in process `syz.2.10222'. [ 3053.283968][ T7439] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3053.290994][ T7439] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3053.405898][ T7516] netlink: 119384 bytes leftover after parsing attributes in process `syz.5.10224'. [ 3053.441666][ T7439] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3053.502548][ T7514] netlink: 'syz.8.10223': attribute type 10 has an invalid length. [ 3053.609792][ T7514] 8021q: adding VLAN 0 to HW filter on device team0 [ 3053.629156][ T7514] bond0: (slave team0): Enslaving as an active interface with an up link [ 3054.059286][ T7519] netlink: 209844 bytes leftover after parsing attributes in process `syz.2.10225'. [ 3054.171886][ T7439] hsr_slave_0: entered promiscuous mode [ 3054.179818][ T7439] hsr_slave_1: entered promiscuous mode [ 3054.189546][ T7439] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 3054.197271][ T7439] Cannot create hsr debugfs directory [ 3054.590678][ T7280] Bluetooth: hci4: command tx timeout [ 3054.693692][ T6927] bond0: (slave wlan1): Releasing backup interface [ 3054.860271][ T6927] hsr_slave_0: left promiscuous mode [ 3054.874782][ T6927] hsr_slave_1: left promiscuous mode [ 3054.881676][ T6927] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3054.891297][ T6927] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3054.899287][ T6927] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3054.906882][ T6927] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3054.915516][ T6927] bridge_slave_1: left allmulticast mode [ 3054.921185][ T6927] bridge_slave_1: left promiscuous mode [ 3054.927250][ T6927] bridge0: port 2(bridge_slave_1) entered disabled state [ 3054.936956][ T6927] bridge_slave_0: left allmulticast mode [ 3054.942785][ T6927] bridge_slave_0: left promiscuous mode [ 3054.948544][ T6927] bridge0: port 1(bridge_slave_0) entered disabled state [ 3054.969934][ T6927] veth1_macvtap: left promiscuous mode [ 3054.976577][ T6927] veth0_macvtap: left promiscuous mode [ 3054.982167][ T6927] veth1_vlan: left promiscuous mode [ 3055.571396][ T6927] team0 (unregistering): Port device team_slave_1 removed [ 3055.632193][ T6927] team0 (unregistering): Port device team_slave_0 removed [ 3055.686868][ T6927] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3055.743752][ T6927] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3055.981522][ T6927] team0 (unregistering): Port device batadv0 removed [ 3056.163437][ T6927] bond0 (unregistering): (slave team0): Releasing backup interface [ 3056.320686][ T6927] bond0 (unregistering): Released all slaves [ 3056.393714][ T7439] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 3056.406773][ T7439] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 3056.416805][ T7439] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 3056.429296][ T7439] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 3056.611461][ T7439] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3056.636196][ T7439] 8021q: adding VLAN 0 to HW filter on device team0 [ 3056.647923][ T2988] bridge0: port 1(bridge_slave_0) entered blocking state [ 3056.655079][ T2988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3056.662964][ T7280] Bluetooth: hci4: command tx timeout [ 3056.676281][ T6930] bridge0: port 2(bridge_slave_1) entered blocking state [ 3056.683576][ T6930] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3056.742501][ T7439] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3056.914054][ T7439] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3056.957357][ T7439] veth0_vlan: entered promiscuous mode [ 3056.969125][ T7439] veth1_vlan: entered promiscuous mode [ 3056.998140][ T7439] veth0_macvtap: entered promiscuous mode [ 3057.009114][ T7439] veth1_macvtap: entered promiscuous mode [ 3057.025539][ T7439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3057.037010][ T7439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3057.047584][ T7439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3057.058374][ T7439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3057.068290][ T7439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3057.078826][ T7439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3057.090062][ T7439] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3057.106541][ T7439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3057.117277][ T7439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3057.127167][ T7439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3057.137789][ T7439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3057.154518][ T7439] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3057.165457][ T7439] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3057.176727][ T7439] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3057.189707][ T7439] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3057.198709][ T7439] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3057.207718][ T7439] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3057.216516][ T7439] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3057.284298][ T6930] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3057.292168][ T6930] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3057.324998][T27602] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3057.334294][T27602] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3057.491192][ T7540] netlink: 'syz.2.10233': attribute type 1 has an invalid length. [ 3057.513799][ T7538] netlink: 119384 bytes leftover after parsing attributes in process `syz.8.10235'. [ 3057.522894][ T7540] netlink: 'syz.2.10233': attribute type 4 has an invalid length. [ 3057.531261][ T7540] netlink: 9462 bytes leftover after parsing attributes in process `syz.2.10233'. [ 3057.634947][ T7538] IPv6: pim6reg1: Disabled Multicast RS [ 3057.679359][ T7537] netlink: 209844 bytes leftover after parsing attributes in process `syz.5.10234'. [ 3058.386382][ T7553] FAULT_INJECTION: forcing a failure. [ 3058.386382][ T7553] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3058.450765][ T7553] CPU: 1 PID: 7553 Comm: syz.8.10230 Not tainted syzkaller #0 [ 3058.458311][ T7553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3058.468596][ T7553] Call Trace: [ 3058.471933][ T7553] [ 3058.474906][ T7553] dump_stack_lvl+0x16c/0x230 [ 3058.479636][ T7553] ? show_regs_print_info+0x20/0x20 [ 3058.484898][ T7553] ? load_image+0x3b0/0x3b0 [ 3058.489542][ T7553] ? __might_fault+0xaa/0x120 [ 3058.494286][ T7553] ? __lock_acquire+0x7c80/0x7c80 [ 3058.499367][ T7553] should_fail_ex+0x39d/0x4d0 [ 3058.504102][ T7553] _copy_from_user+0x2f/0xe0 [ 3058.508735][ T7553] ___sys_sendmsg+0x159/0x290 [ 3058.513461][ T7553] ? __sys_sendmsg+0x270/0x270 [ 3058.518558][ T7553] ? __lock_acquire+0x7c80/0x7c80 [ 3058.523657][ T7553] __se_sys_sendmsg+0x1a5/0x270 [ 3058.528559][ T7553] ? __x64_sys_sendmsg+0x80/0x80 [ 3058.533572][ T7553] ? lockdep_hardirqs_on+0x98/0x150 [ 3058.538808][ T7553] do_syscall_64+0x55/0xb0 [ 3058.543259][ T7553] ? clear_bhb_loop+0x40/0x90 [ 3058.548124][ T7553] ? clear_bhb_loop+0x40/0x90 [ 3058.552818][ T7553] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3058.558721][ T7553] RIP: 0033:0x7fadc518f749 [ 3058.563155][ T7553] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3058.583061][ T7553] RSP: 002b:00007fadc60c1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3058.591522][ T7553] RAX: ffffffffffffffda RBX: 00007fadc53e5fa0 RCX: 00007fadc518f749 [ 3058.599630][ T7553] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 3058.607636][ T7553] RBP: 00007fadc60c1090 R08: 0000000000000000 R09: 0000000000000000 [ 3058.615731][ T7553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3058.623806][ T7553] R13: 00007fadc53e6038 R14: 00007fadc53e5fa0 R15: 00007fffea2c1418 [ 3058.631806][ T7553] [ 3058.848710][ T7557] netlink: 'syz.5.10236': attribute type 10 has an invalid length. [ 3059.113662][ T7566] FAULT_INJECTION: forcing a failure. [ 3059.113662][ T7566] name failslab, interval 1, probability 0, space 0, times 0 [ 3059.172645][ T7566] CPU: 1 PID: 7566 Comm: syz.2.10239 Not tainted syzkaller #0 [ 3059.180206][ T7566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3059.190292][ T7566] Call Trace: [ 3059.193605][ T7566] [ 3059.196574][ T7566] dump_stack_lvl+0x16c/0x230 [ 3059.201307][ T7566] ? show_regs_print_info+0x20/0x20 [ 3059.206567][ T7566] ? load_image+0x3b0/0x3b0 [ 3059.211119][ T7566] ? __might_sleep+0xe0/0xe0 [ 3059.215754][ T7566] ? __lock_acquire+0x7c80/0x7c80 [ 3059.220830][ T7566] should_fail_ex+0x39d/0x4d0 [ 3059.225647][ T7566] should_failslab+0x9/0x20 [ 3059.230292][ T7566] slab_pre_alloc_hook+0x59/0x310 [ 3059.235377][ T7566] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 3059.241154][ T7566] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 3059.246943][ T7566] __kmem_cache_alloc_node+0x53/0x260 [ 3059.252380][ T7566] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 3059.258163][ T7566] __kmalloc+0xa4/0x240 [ 3059.262372][ T7566] tomoyo_realpath_from_path+0xe3/0x5d0 [ 3059.268074][ T7566] tomoyo_path_number_perm+0x1ea/0x590 [ 3059.273590][ T7566] ? tomoyo_path_number_perm+0x1ba/0x590 [ 3059.279271][ T7566] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 3059.284783][ T7566] ? ksys_write+0x1c1/0x250 [ 3059.289372][ T7566] ? __fget_files+0x28/0x4d0 [ 3059.294023][ T7566] security_file_ioctl+0x70/0xa0 [ 3059.299117][ T7566] __se_sys_ioctl+0x48/0x170 [ 3059.303765][ T7566] do_syscall_64+0x55/0xb0 [ 3059.308243][ T7566] ? clear_bhb_loop+0x40/0x90 [ 3059.312961][ T7566] ? clear_bhb_loop+0x40/0x90 [ 3059.317860][ T7566] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3059.323809][ T7566] RIP: 0033:0x7fac0818f749 [ 3059.328265][ T7566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3059.347922][ T7566] RSP: 002b:00007fac063f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3059.356570][ T7566] RAX: ffffffffffffffda RBX: 00007fac083e5fa0 RCX: 00007fac0818f749 [ 3059.364629][ T7566] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 0000000000000004 [ 3059.372638][ T7566] RBP: 00007fac063f6090 R08: 0000000000000000 R09: 0000000000000000 [ 3059.380650][ T7566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3059.388659][ T7566] R13: 00007fac083e6038 R14: 00007fac083e5fa0 R15: 00007ffe50059928 [ 3059.396760][ T7566] [ 3059.434173][ T7566] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3059.542176][ T7571] netlink: 119384 bytes leftover after parsing attributes in process `syz.5.10242'. [ 3060.041089][ T7582] netlink: 209844 bytes leftover after parsing attributes in process `syz.2.10244'. [ 3060.287437][ T7585] C: renamed from team_slave_0 (while UP) [ 3060.298662][ T7585] netlink: 'syz.0.10246': attribute type 1 has an invalid length. [ 3060.307312][ T7585] netlink: 116 bytes leftover after parsing attributes in process `syz.0.10246'. [ 3060.326356][ T7585] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 3060.584096][ T7591] FAULT_INJECTION: forcing a failure. [ 3060.584096][ T7591] name failslab, interval 1, probability 0, space 0, times 0 [ 3060.620525][ T7591] CPU: 0 PID: 7591 Comm: syz.2.10249 Not tainted syzkaller #0 [ 3060.628173][ T7591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3060.638442][ T7591] Call Trace: [ 3060.641749][ T7591] [ 3060.644798][ T7591] dump_stack_lvl+0x16c/0x230 [ 3060.649517][ T7591] ? show_regs_print_info+0x20/0x20 [ 3060.654858][ T7591] ? load_image+0x3b0/0x3b0 [ 3060.659388][ T7591] ? __might_sleep+0xe0/0xe0 [ 3060.664232][ T7591] ? __lock_acquire+0x7c80/0x7c80 [ 3060.669294][ T7591] should_fail_ex+0x39d/0x4d0 [ 3060.674006][ T7591] should_failslab+0x9/0x20 [ 3060.678529][ T7591] slab_pre_alloc_hook+0x59/0x310 [ 3060.683605][ T7591] ? __get_vm_area_node+0x125/0x370 [ 3060.688848][ T7591] __kmem_cache_alloc_node+0x53/0x260 [ 3060.694253][ T7591] ? __get_vm_area_node+0x125/0x370 [ 3060.699464][ T7591] kmalloc_node_trace+0x26/0xe0 [ 3060.704331][ T7591] __get_vm_area_node+0x125/0x370 [ 3060.709373][ T7591] __vmalloc_node_range+0x36e/0x1320 [ 3060.714774][ T7591] ? netlink_sendmsg+0x5f3/0xbe0 [ 3060.719829][ T7591] ? netlink_insert+0x106a/0x1370 [ 3060.724890][ T7591] ? netlink_insert+0x2b3/0x1370 [ 3060.729845][ T7591] ? netlink_data_ready+0x10/0x10 [ 3060.734897][ T7591] ? free_vm_area+0x50/0x50 [ 3060.739421][ T7591] ? netlink_sendmsg+0x5f3/0xbe0 [ 3060.744462][ T7591] vmalloc+0x79/0x90 [ 3060.748417][ T7591] ? netlink_sendmsg+0x5f3/0xbe0 [ 3060.753378][ T7591] netlink_sendmsg+0x5f3/0xbe0 [ 3060.758163][ T7591] ? netlink_getsockopt+0x580/0x580 [ 3060.763382][ T7591] ? aa_sock_msg_perm+0x94/0x150 [ 3060.768420][ T7591] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 3060.773769][ T7591] ? security_socket_sendmsg+0x80/0xa0 [ 3060.779244][ T7591] sock_write_iter+0x2bb/0x3f0 [ 3060.784026][ T7591] ? sock_read_iter+0x3b0/0x3b0 [ 3060.789019][ T7591] ? common_file_perm+0x198/0x1f0 [ 3060.794089][ T7591] vfs_write+0x43b/0x940 [ 3060.798363][ T7591] ? file_end_write+0x250/0x250 [ 3060.803259][ T7591] ? __fget_files+0x44a/0x4d0 [ 3060.807962][ T7591] ? __fdget_pos+0x1d8/0x330 [ 3060.812567][ T7591] ? ksys_write+0x75/0x250 [ 3060.817000][ T7591] ksys_write+0x147/0x250 [ 3060.821345][ T7591] ? __ia32_sys_read+0x90/0x90 [ 3060.826130][ T7591] ? lockdep_hardirqs_on+0x98/0x150 [ 3060.831345][ T7591] do_syscall_64+0x55/0xb0 [ 3060.835779][ T7591] ? clear_bhb_loop+0x40/0x90 [ 3060.840468][ T7591] ? clear_bhb_loop+0x40/0x90 [ 3060.845162][ T7591] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3060.851154][ T7591] RIP: 0033:0x7fac0818f749 [ 3060.855799][ T7591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3060.875417][ T7591] RSP: 002b:00007fac063f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3060.883865][ T7591] RAX: ffffffffffffffda RBX: 00007fac083e5fa0 RCX: 00007fac0818f749 [ 3060.891854][ T7591] RDX: 000000000000fe33 RSI: 0000200000000000 RDI: 0000000000000003 [ 3060.899928][ T7591] RBP: 00007fac063f6090 R08: 0000000000000000 R09: 0000000000000000 [ 3060.907916][ T7591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3060.915898][ T7591] R13: 00007fac083e6038 R14: 00007fac083e5fa0 R15: 00007ffe50059928 [ 3060.923904][ T7591] [ 3060.940917][ T7591] syz.2.10249: vmalloc error: size 65408, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz2,mems_allowed=0-1 [ 3060.977075][ T7591] CPU: 1 PID: 7591 Comm: syz.2.10249 Not tainted syzkaller #0 [ 3060.984595][ T7591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3060.994792][ T7591] Call Trace: [ 3060.998109][ T7591] [ 3061.001079][ T7591] dump_stack_lvl+0x16c/0x230 [ 3061.005819][ T7591] ? show_regs_print_info+0x20/0x20 [ 3061.011081][ T7591] ? load_image+0x3b0/0x3b0 [ 3061.015636][ T7591] ? cpuset_print_current_mems_allowed+0x1f/0x360 [ 3061.022102][ T7591] ? cpuset_print_current_mems_allowed+0x2e3/0x360 [ 3061.028660][ T7591] warn_alloc+0x210/0x300 [ 3061.033045][ T7591] ? __get_vm_area_node+0x125/0x370 [ 3061.038281][ T7591] ? zone_watermark_ok_safe+0x230/0x230 [ 3061.043862][ T7591] ? rcu_is_watching+0x15/0xb0 [ 3061.048672][ T7591] ? __get_vm_area_node+0x356/0x370 [ 3061.053927][ T7591] __vmalloc_node_range+0x393/0x1320 [ 3061.059263][ T7591] ? netlink_insert+0x106a/0x1370 [ 3061.064363][ T7591] ? netlink_insert+0x2b3/0x1370 [ 3061.069346][ T7591] ? netlink_data_ready+0x10/0x10 [ 3061.074407][ T7591] ? free_vm_area+0x50/0x50 [ 3061.079663][ T7591] ? netlink_sendmsg+0x5f3/0xbe0 [ 3061.084715][ T7591] vmalloc+0x79/0x90 [ 3061.088626][ T7591] ? netlink_sendmsg+0x5f3/0xbe0 [ 3061.093590][ T7591] netlink_sendmsg+0x5f3/0xbe0 [ 3061.098470][ T7591] ? netlink_getsockopt+0x580/0x580 [ 3061.103711][ T7591] ? aa_sock_msg_perm+0x94/0x150 [ 3061.108683][ T7591] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 3061.114003][ T7591] ? security_socket_sendmsg+0x80/0xa0 [ 3061.119573][ T7591] sock_write_iter+0x2bb/0x3f0 [ 3061.124368][ T7591] ? sock_read_iter+0x3b0/0x3b0 [ 3061.129259][ T7591] ? common_file_perm+0x198/0x1f0 [ 3061.134305][ T7591] vfs_write+0x43b/0x940 [ 3061.138575][ T7591] ? file_end_write+0x250/0x250 [ 3061.143455][ T7591] ? __fget_files+0x44a/0x4d0 [ 3061.148283][ T7591] ? __fdget_pos+0x1d8/0x330 [ 3061.152886][ T7591] ? ksys_write+0x75/0x250 [ 3061.157317][ T7591] ksys_write+0x147/0x250 [ 3061.161664][ T7591] ? __ia32_sys_read+0x90/0x90 [ 3061.166447][ T7591] ? lockdep_hardirqs_on+0x98/0x150 [ 3061.171670][ T7591] do_syscall_64+0x55/0xb0 [ 3061.176181][ T7591] ? clear_bhb_loop+0x40/0x90 [ 3061.180871][ T7591] ? clear_bhb_loop+0x40/0x90 [ 3061.185561][ T7591] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3061.191481][ T7591] RIP: 0033:0x7fac0818f749 [ 3061.195910][ T7591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3061.215618][ T7591] RSP: 002b:00007fac063f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3061.224045][ T7591] RAX: ffffffffffffffda RBX: 00007fac083e5fa0 RCX: 00007fac0818f749 [ 3061.232038][ T7591] RDX: 000000000000fe33 RSI: 0000200000000000 RDI: 0000000000000003 [ 3061.240017][ T7591] RBP: 00007fac063f6090 R08: 0000000000000000 R09: 0000000000000000 [ 3061.247997][ T7591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3061.256064][ T7591] R13: 00007fac083e6038 R14: 00007fac083e5fa0 R15: 00007ffe50059928 [ 3061.264075][ T7591] [ 3061.280981][ T7591] Mem-Info: [ 3061.284527][ T7591] active_anon:3698 inactive_anon:0 isolated_anon:0 [ 3061.284527][ T7591] active_file:19100 inactive_file:41002 isolated_file:0 [ 3061.284527][ T7591] unevictable:768 dirty:283 writeback:0 [ 3061.284527][ T7591] slab_reclaimable:11936 slab_unreclaimable:95217 [ 3061.284527][ T7591] mapped:24411 shmem:1395 pagetables:406 [ 3061.284527][ T7591] sec_pagetables:0 bounce:0 [ 3061.284527][ T7591] kernel_misc_reclaimable:0 [ 3061.284527][ T7591] free:1335151 free_pcp:15438 free_cma:0 [ 3061.331181][ T7591] Node 0 active_anon:14792kB inactive_anon:0kB active_file:76400kB inactive_file:163808kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:97644kB dirty:1132kB writeback:0kB shmem:4044kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:11000kB pagetables:1624kB sec_pagetables:0kB all_unreclaimable? no [ 3061.365643][ T7591] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:200kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:1536kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB sec_pagetables:0kB all_unreclaimable? no [ 3061.403562][ T7591] Node 0 DMA free:15360kB boost:0kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3061.437844][ T7591] lowmem_reserve[]: 0 2525 2526 2526 2526 [ 3061.445184][ T7591] Node 0 DMA32 free:1441496kB boost:0kB min:34676kB low:43344kB high:52012kB reserved_highatomic:0KB active_anon:14748kB inactive_anon:0kB active_file:76400kB inactive_file:162488kB unevictable:1536kB writepending:1132kB present:3129332kB managed:2589600kB mlocked:0kB bounce:0kB free_pcp:37024kB local_pcp:15836kB free_cma:0kB [ 3061.477191][ T7591] lowmem_reserve[]: 0 0 1 1 1 [ 3061.482230][ T7591] Node 0 Normal free:20kB boost:0kB min:16kB low:20kB high:24kB reserved_highatomic:0KB active_anon:44kB inactive_anon:0kB active_file:0kB inactive_file:1320kB unevictable:0kB writepending:0kB present:1048576kB managed:1384kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3061.521810][ T7591] lowmem_reserve[]: 0 0 0 0 0 [ 3061.526868][ T7591] Node 1 Normal free:3883728kB boost:0kB min:55208kB low:69008kB high:82808kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:200kB unevictable:1536kB writepending:0kB present:4194304kB managed:4117312kB mlocked:0kB bounce:0kB free_pcp:24776kB local_pcp:15360kB free_cma:0kB [ 3061.552023][ T7603] C: renamed from team_slave_0 (while UP) [ 3061.565527][ T7591] lowmem_reserve[]: 0 0 0 0 0 [ 3061.570488][ T7591] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 3061.586851][ T7603] netlink: 'syz.8.10253': attribute type 4 has an invalid length. [ 3061.589384][ T7591] Node 0 DMA32: 2152*4kB (UME) 1001*8kB (UME) 765*16kB (UME) 839*32kB (UME) 325*64kB (UME) 96*128kB (UM) 92*256kB (UME) 28*512kB (UME) 12*1024kB (UM) 2*2048kB (UM) 317*4096kB (UM) = 1441496kB [ 3061.597647][ T7603] netlink: 116 bytes leftover after parsing attributes in process `syz.8.10253'. [ 3061.625947][ T7603] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 3061.653542][ T7591] Node 0 Normal: 1*4kB (M) 0*8kB 1*16kB (M) 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 20kB [ 3061.669692][ T7591] Node 1 Normal: 236*4kB (UME) 56*8kB (UME) 54*16kB (UME) 62*32kB (UME) 17*64kB (UME) 10*128kB (UME) 1*256kB (M) 2*512kB (UE) 1*1024kB (U) 2*2048kB (UE) 945*4096kB (M) = 3883728kB [ 3061.714405][ T7591] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3061.724870][ T7591] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 3061.736075][ T7591] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3061.746284][ T7591] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 3061.781593][ T7591] 61497 total pagecache pages [ 3061.789026][ T7591] 0 pages in swap cache [ 3061.798319][ T7591] Free swap = 124996kB [ 3061.802536][ T7591] Total swap = 124996kB [ 3061.807660][ T7591] 2097051 pages RAM [ 3061.811594][ T7591] 0 pages HighMem/MovableOnly [ 3061.823004][ T7591] 416137 pages reserved [ 3061.835703][ T7605] netlink: 119384 bytes leftover after parsing attributes in process `syz.0.10254'. [ 3061.847160][ T7591] 0 pages cma reserved [ 3061.913474][ T7605] IPv6: pim6reg1: Disabled Multicast RS [ 3062.243918][ T7611] netlink: 209844 bytes leftover after parsing attributes in process `syz.2.10257'. [ 3062.903780][ T7619] netlink: 'syz.5.10260': attribute type 10 has an invalid length. [ 3063.201515][ T7627] FAULT_INJECTION: forcing a failure. [ 3063.201515][ T7627] name failslab, interval 1, probability 0, space 0, times 0 [ 3063.221779][ T7627] CPU: 1 PID: 7627 Comm: syz.2.10263 Not tainted syzkaller #0 [ 3063.229299][ T7627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3063.239372][ T7627] Call Trace: [ 3063.242677][ T7627] [ 3063.245714][ T7627] dump_stack_lvl+0x16c/0x230 [ 3063.250418][ T7627] ? show_regs_print_info+0x20/0x20 [ 3063.255659][ T7627] ? load_image+0x3b0/0x3b0 [ 3063.260202][ T7627] ? __might_sleep+0xe0/0xe0 [ 3063.264819][ T7627] ? __lock_acquire+0x7c80/0x7c80 [ 3063.269873][ T7627] should_fail_ex+0x39d/0x4d0 [ 3063.274576][ T7627] should_failslab+0x9/0x20 [ 3063.279184][ T7627] slab_pre_alloc_hook+0x59/0x310 [ 3063.284232][ T7627] kmem_cache_alloc_node+0x60/0x330 [ 3063.289457][ T7627] ? __alloc_skb+0x108/0x2c0 [ 3063.294159][ T7627] __alloc_skb+0x108/0x2c0 [ 3063.298594][ T7627] alloc_skb_with_frags+0xca/0x7c0 [ 3063.303724][ T7627] ? mark_lock+0x94/0x320 [ 3063.308072][ T7627] sock_alloc_send_pskb+0x857/0x990 [ 3063.313566][ T7627] ? sock_kzfree_s+0x50/0x50 [ 3063.318190][ T7627] tun_get_user+0x9dc/0x3bf0 [ 3063.322820][ T7627] ? aa_file_perm+0x120/0xec0 [ 3063.327542][ T7627] ? aa_file_perm+0x3e8/0xec0 [ 3063.332250][ T7627] ? rcu_read_unlock+0xa0/0xa0 [ 3063.337044][ T7627] ? tun_get+0x1c/0x2e0 [ 3063.341251][ T7627] ? __lock_acquire+0x7c80/0x7c80 [ 3063.346295][ T7627] ? tun_get+0x1c/0x2e0 [ 3063.350465][ T7627] tun_chr_write_iter+0x119/0x200 [ 3063.355541][ T7627] vfs_write+0x43b/0x940 [ 3063.359803][ T7627] ? file_end_write+0x250/0x250 [ 3063.364677][ T7627] ? __fget_files+0x44a/0x4d0 [ 3063.369378][ T7627] ? __fdget_pos+0x1d8/0x330 [ 3063.373987][ T7627] ? ksys_write+0x75/0x250 [ 3063.378507][ T7627] ksys_write+0x147/0x250 [ 3063.382864][ T7627] ? __ia32_sys_read+0x90/0x90 [ 3063.387652][ T7627] ? lockdep_hardirqs_on+0x98/0x150 [ 3063.392870][ T7627] do_syscall_64+0x55/0xb0 [ 3063.397320][ T7627] ? clear_bhb_loop+0x40/0x90 [ 3063.402006][ T7627] ? clear_bhb_loop+0x40/0x90 [ 3063.406700][ T7627] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3063.412865][ T7627] RIP: 0033:0x7fac0818f749 [ 3063.417295][ T7627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3063.436977][ T7627] RSP: 002b:00007fac063f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3063.445440][ T7627] RAX: ffffffffffffffda RBX: 00007fac083e5fa0 RCX: 00007fac0818f749 [ 3063.453441][ T7627] RDX: 000000000000fdef RSI: 0000200000000300 RDI: 00000000000000c8 [ 3063.461426][ T7627] RBP: 00007fac063f6090 R08: 0000000000000000 R09: 0000000000000000 [ 3063.469438][ T7627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3063.477440][ T7627] R13: 00007fac083e6038 R14: 00007fac083e5fa0 R15: 00007ffe50059928 [ 3063.485547][ T7627] [ 3063.744166][ T7631] netlink: 'syz.8.10265': attribute type 3 has an invalid length. [ 3063.783168][ T7631] netlink: 132 bytes leftover after parsing attributes in process `syz.8.10265'. [ 3063.807420][ T7634] netlink: 119384 bytes leftover after parsing attributes in process `syz.5.10267'. [ 3064.064919][ T7640] FAULT_INJECTION: forcing a failure. [ 3064.064919][ T7640] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3064.130653][ T7640] CPU: 1 PID: 7640 Comm: syz.8.10269 Not tainted syzkaller #0 [ 3064.138206][ T7640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3064.148391][ T7640] Call Trace: [ 3064.151810][ T7640] [ 3064.154835][ T7640] dump_stack_lvl+0x16c/0x230 [ 3064.159652][ T7640] ? show_regs_print_info+0x20/0x20 [ 3064.164894][ T7640] ? load_image+0x3b0/0x3b0 [ 3064.169439][ T7640] ? __might_fault+0xaa/0x120 [ 3064.174152][ T7640] ? __lock_acquire+0x7c80/0x7c80 [ 3064.179224][ T7640] should_fail_ex+0x39d/0x4d0 [ 3064.184134][ T7640] _copy_from_user+0x2f/0xe0 [ 3064.188760][ T7640] ___sys_sendmsg+0x159/0x290 [ 3064.193742][ T7640] ? __sys_sendmsg+0x270/0x270 [ 3064.198583][ T7640] ? __lock_acquire+0x7c80/0x7c80 [ 3064.203667][ T7640] __se_sys_sendmsg+0x1a5/0x270 [ 3064.208556][ T7640] ? __x64_sys_sendmsg+0x80/0x80 [ 3064.213647][ T7640] ? lockdep_hardirqs_on+0x98/0x150 [ 3064.219623][ T7640] do_syscall_64+0x55/0xb0 [ 3064.224097][ T7640] ? clear_bhb_loop+0x40/0x90 [ 3064.228830][ T7640] ? clear_bhb_loop+0x40/0x90 [ 3064.233548][ T7640] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3064.239573][ T7640] RIP: 0033:0x7fadc518f749 [ 3064.244018][ T7640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3064.263651][ T7640] RSP: 002b:00007fadc60c1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3064.272080][ T7640] RAX: ffffffffffffffda RBX: 00007fadc53e5fa0 RCX: 00007fadc518f749 [ 3064.280062][ T7640] RDX: 0000000000004840 RSI: 0000200000000380 RDI: 0000000000000003 [ 3064.288044][ T7640] RBP: 00007fadc60c1090 R08: 0000000000000000 R09: 0000000000000000 [ 3064.296025][ T7640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3064.304003][ T7640] R13: 00007fadc53e6038 R14: 00007fadc53e5fa0 R15: 00007fffea2c1418 [ 3064.312001][ T7640] [ 3064.548796][ T7642] netlink: 'syz.5.10270': attribute type 10 has an invalid length. [ 3064.741931][ T7647] netlink: 209844 bytes leftover after parsing attributes in process `syz.8.10272'. [ 3065.556007][ T7665] netlink: 119384 bytes leftover after parsing attributes in process `syz.5.10278'. [ 3065.628136][ T7670] netlink: 'syz.2.10281': attribute type 10 has an invalid length. [ 3065.678570][ T7672] FAULT_INJECTION: forcing a failure. [ 3065.678570][ T7672] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3065.705740][ T7672] CPU: 0 PID: 7672 Comm: syz.0.10282 Not tainted syzkaller #0 [ 3065.713296][ T7672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3065.723408][ T7672] Call Trace: [ 3065.726731][ T7672] [ 3065.729698][ T7672] dump_stack_lvl+0x16c/0x230 [ 3065.734423][ T7672] ? show_regs_print_info+0x20/0x20 [ 3065.739685][ T7672] ? load_image+0x3b0/0x3b0 [ 3065.744231][ T7672] ? __might_fault+0xaa/0x120 [ 3065.748951][ T7672] ? __lock_acquire+0x7c80/0x7c80 [ 3065.754031][ T7672] should_fail_ex+0x39d/0x4d0 [ 3065.758756][ T7672] _copy_from_user+0x2f/0xe0 [ 3065.763489][ T7672] sk_setsockopt+0x276/0x29d0 [ 3065.768217][ T7672] ? sockopt_capable+0x60/0x60 [ 3065.773027][ T7672] ? aa_sk_perm+0x7fc/0x930 [ 3065.777592][ T7672] ? aa_af_perm+0x2b0/0x2b0 [ 3065.782208][ T7672] ? __fget_files+0x28/0x4d0 [ 3065.786813][ T7672] ? aa_sock_opt_perm+0x74/0x100 [ 3065.791781][ T7672] ? bpf_lsm_socket_setsockopt+0x9/0x10 [ 3065.797338][ T7672] ? security_socket_setsockopt+0x7e/0xa0 [ 3065.803060][ T7672] do_sock_setsockopt+0x11b/0x1a0 [ 3065.808285][ T7672] __x64_sys_setsockopt+0x184/0x200 [ 3065.813505][ T7672] do_syscall_64+0x55/0xb0 [ 3065.818048][ T7672] ? clear_bhb_loop+0x40/0x90 [ 3065.822855][ T7672] ? clear_bhb_loop+0x40/0x90 [ 3065.827571][ T7672] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3065.833503][ T7672] RIP: 0033:0x7fd7b998f749 [ 3065.837953][ T7672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3065.857617][ T7672] RSP: 002b:00007fd7ba760038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 3065.866348][ T7672] RAX: ffffffffffffffda RBX: 00007fd7b9be5fa0 RCX: 00007fd7b998f749 [ 3065.874378][ T7672] RDX: 000000000000000f RSI: 0000000000000001 RDI: 0000000000000003 [ 3065.882527][ T7672] RBP: 00007fd7ba760090 R08: 0000000000000004 R09: 0000000000000000 [ 3065.890595][ T7672] R10: 00002000000002c0 R11: 0000000000000246 R12: 0000000000000001 [ 3065.898575][ T7672] R13: 00007fd7b9be6038 R14: 00007fd7b9be5fa0 R15: 00007ffcd1c08138 [ 3065.906559][ T7672] [ 3065.937292][ T7680] netlink: 'syz.8.10286': attribute type 10 has an invalid length. [ 3065.948918][ T7680] netlink: 40 bytes leftover after parsing attributes in process `syz.8.10286'. [ 3065.959020][ T7680] team0: Device lo is loopback device. Loopback devices can't be added as a team port [ 3065.971300][ T7680] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 3066.292507][ T7691] FAULT_INJECTION: forcing a failure. [ 3066.292507][ T7691] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3066.293077][ T7687] netlink: 209844 bytes leftover after parsing attributes in process `syz.8.10289'. [ 3066.310197][ T7691] CPU: 0 PID: 7691 Comm: syz.0.10291 Not tainted syzkaller #0 [ 3066.322816][ T7691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3066.332918][ T7691] Call Trace: [ 3066.336320][ T7691] [ 3066.339281][ T7691] dump_stack_lvl+0x16c/0x230 [ 3066.344006][ T7691] ? show_regs_print_info+0x20/0x20 [ 3066.349222][ T7691] ? load_image+0x3b0/0x3b0 [ 3066.349255][ T7691] ? __might_fault+0xaa/0x120 [ 3066.349276][ T7691] ? __lock_acquire+0x7c80/0x7c80 [ 3066.349304][ T7691] should_fail_ex+0x39d/0x4d0 [ 3066.349335][ T7691] _copy_from_user+0x2f/0xe0 [ 3066.349360][ T7691] ___sys_sendmsg+0x159/0x290 [ 3066.349391][ T7691] ? __sys_sendmsg+0x270/0x270 [ 3066.349439][ T7691] ? __lock_acquire+0x7c80/0x7c80 [ 3066.349484][ T7691] __se_sys_sendmsg+0x1a5/0x270 [ 3066.349515][ T7691] ? __x64_sys_sendmsg+0x80/0x80 [ 3066.349557][ T7691] ? lockdep_hardirqs_on+0x98/0x150 [ 3066.349580][ T7691] do_syscall_64+0x55/0xb0 [ 3066.349602][ T7691] ? clear_bhb_loop+0x40/0x90 [ 3066.349630][ T7691] ? clear_bhb_loop+0x40/0x90 [ 3066.349652][ T7691] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3066.349679][ T7691] RIP: 0033:0x7fd7b998f749 [ 3066.349699][ T7691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3066.349716][ T7691] RSP: 002b:00007fd7ba760038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3066.455964][ T7691] RAX: ffffffffffffffda RBX: 00007fd7b9be5fa0 RCX: 00007fd7b998f749 [ 3066.463975][ T7691] RDX: 00000000000052cc RSI: 0000200000000040 RDI: 0000000000000003 [ 3066.472070][ T7691] RBP: 00007fd7ba760090 R08: 0000000000000000 R09: 0000000000000000 [ 3066.480077][ T7691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3066.488085][ T7691] R13: 00007fd7b9be6038 R14: 00007fd7b9be5fa0 R15: 00007ffcd1c08138 [ 3066.496106][ T7691] [ 3066.641830][ T7693] netlink: 119384 bytes leftover after parsing attributes in process `syz.2.10292'. [ 3066.946006][ T7700] netlink: 'syz.2.10294': attribute type 10 has an invalid length. [ 3067.168851][ T7707] netlink: 'syz.2.10298': attribute type 7 has an invalid length. [ 3067.225632][ T7708] netlink: 'syz.8.10297': attribute type 25 has an invalid length. [ 3067.896919][ T7719] FAULT_INJECTION: forcing a failure. [ 3067.896919][ T7719] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3067.934615][ T7719] CPU: 0 PID: 7719 Comm: syz.5.10302 Not tainted syzkaller #0 [ 3067.942151][ T7719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3067.952233][ T7719] Call Trace: [ 3067.955538][ T7719] [ 3067.958497][ T7719] dump_stack_lvl+0x16c/0x230 [ 3067.963224][ T7719] ? show_regs_print_info+0x20/0x20 [ 3067.968472][ T7719] ? load_image+0x3b0/0x3b0 [ 3067.973037][ T7719] ? __might_fault+0xaa/0x120 [ 3067.977756][ T7719] ? __lock_acquire+0x7c80/0x7c80 [ 3067.982833][ T7719] should_fail_ex+0x39d/0x4d0 [ 3067.987639][ T7719] _copy_from_user+0x2f/0xe0 [ 3067.992260][ T7719] ___sys_sendmsg+0x159/0x290 [ 3067.996982][ T7719] ? __sys_sendmsg+0x270/0x270 [ 3068.001823][ T7719] ? __lock_acquire+0x7c80/0x7c80 [ 3068.007010][ T7719] __se_sys_sendmsg+0x1a5/0x270 [ 3068.011894][ T7719] ? perf_trace_preemptirq_template+0x281/0x340 [ 3068.018179][ T7719] ? __x64_sys_sendmsg+0x80/0x80 [ 3068.023179][ T7719] ? lockdep_hardirqs_on+0x98/0x150 [ 3068.028435][ T7719] do_syscall_64+0x55/0xb0 [ 3068.032868][ T7719] ? clear_bhb_loop+0x40/0x90 [ 3068.037593][ T7719] ? clear_bhb_loop+0x40/0x90 [ 3068.042282][ T7719] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3068.048275][ T7719] RIP: 0033:0x7f17ab18f749 [ 3068.052706][ T7719] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3068.072428][ T7719] RSP: 002b:00007f17abf84038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3068.080856][ T7719] RAX: ffffffffffffffda RBX: 00007f17ab3e5fa0 RCX: 00007f17ab18f749 [ 3068.088841][ T7719] RDX: 0000000000040000 RSI: 0000200000000c40 RDI: 0000000000000003 [ 3068.096845][ T7719] RBP: 00007f17abf84090 R08: 0000000000000000 R09: 0000000000000000 [ 3068.104842][ T7719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3068.113007][ T7719] R13: 00007f17ab3e6038 R14: 00007f17ab3e5fa0 R15: 00007ffe461a1508 [ 3068.121092][ T7719] [ 3068.298574][ T7720] netlink: 119384 bytes leftover after parsing attributes in process `syz.0.10303'. [ 3068.481951][ T7724] netlink: 209844 bytes leftover after parsing attributes in process `syz.2.10304'. [ 3068.702922][ T7732] netlink: 'syz.8.10306': attribute type 10 has an invalid length. [ 3068.771883][ T7735] netlink: 'syz.0.10308': attribute type 12 has an invalid length. [ 3068.780962][ T7735] netlink: 132 bytes leftover after parsing attributes in process `syz.0.10308'. [ 3068.818019][ T7735] netlink: 209852 bytes leftover after parsing attributes in process `syz.0.10308'. [ 3069.493477][ T7280] Bluetooth: hci4: unexpected event 0x1d length: 151 > 5 [ 3069.868997][ T7759] netlink: 119384 bytes leftover after parsing attributes in process `syz.2.10316'. [ 3070.299790][ T7762] netlink: 209844 bytes leftover after parsing attributes in process `syz.8.10317'. [ 3071.047241][ T7769] netlink: 'syz.0.10320': attribute type 10 has an invalid length. [ 3071.128450][ T7769] 8021q: adding VLAN 0 to HW filter on device team0 [ 3071.162600][ T7769] bond0: (slave team0): Enslaving as an active interface with an up link [ 3071.820327][ T7782] FAULT_INJECTION: forcing a failure. [ 3071.820327][ T7782] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3071.846628][ T7782] CPU: 0 PID: 7782 Comm: syz.0.10324 Not tainted syzkaller #0 [ 3071.854182][ T7782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3071.864283][ T7782] Call Trace: [ 3071.867599][ T7782] [ 3071.870573][ T7782] dump_stack_lvl+0x16c/0x230 [ 3071.875308][ T7782] ? show_regs_print_info+0x20/0x20 [ 3071.880562][ T7782] ? load_image+0x3b0/0x3b0 [ 3071.885124][ T7782] ? __might_fault+0xaa/0x120 [ 3071.889848][ T7782] ? __lock_acquire+0x7c80/0x7c80 [ 3071.894923][ T7782] should_fail_ex+0x39d/0x4d0 [ 3071.899664][ T7782] _copy_from_user+0x2f/0xe0 [ 3071.904408][ T7782] __sys_bpf+0x1e9/0x800 [ 3071.908701][ T7782] ? bpf_link_show_fdinfo+0x350/0x350 [ 3071.914121][ T7782] ? lock_chain_count+0x20/0x20 [ 3071.919010][ T7782] __x64_sys_bpf+0x7c/0x90 [ 3071.923453][ T7782] do_syscall_64+0x55/0xb0 [ 3071.927893][ T7782] ? clear_bhb_loop+0x40/0x90 [ 3071.932591][ T7782] ? clear_bhb_loop+0x40/0x90 [ 3071.937284][ T7782] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3071.943192][ T7782] RIP: 0033:0x7fd7b998f749 [ 3071.947621][ T7782] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3071.967336][ T7782] RSP: 002b:00007fd7ba760038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3071.975767][ T7782] RAX: ffffffffffffffda RBX: 00007fd7b9be5fa0 RCX: 00007fd7b998f749 [ 3071.983761][ T7782] RDX: 0000000000000040 RSI: 0000200000000180 RDI: 0000000000000010 [ 3071.991748][ T7782] RBP: 00007fd7ba760090 R08: 0000000000000000 R09: 0000000000000000 [ 3071.999835][ T7782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3072.007907][ T7782] R13: 00007fd7b9be6038 R14: 00007fd7b9be5fa0 R15: 00007ffcd1c08138 [ 3072.015907][ T7782] [ 3072.319061][ T7797] netlink: 119384 bytes leftover after parsing attributes in process `syz.5.10327'. [ 3072.506662][ T7806] netlink: 209844 bytes leftover after parsing attributes in process `syz.0.10332'. [ 3072.648519][ T7811] netlink: 'syz.2.10333': attribute type 10 has an invalid length. [ 3072.802784][ T7813] sctp: [Deprecated]: syz.8.10334 (pid 7813) Use of int in maxseg socket option. [ 3072.802784][ T7813] Use struct sctp_assoc_value instead [ 3073.141761][ T7820] sctp: [Deprecated]: syz.2.10337 (pid 7820) Use of int in maxseg socket option. [ 3073.141761][ T7820] Use struct sctp_assoc_value instead [ 3073.250276][T32342] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 3073.260743][T32342] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 3073.269595][T32342] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 3073.289885][T32342] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 3073.303748][T32342] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 3073.311399][T32342] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 3073.700745][ T7822] chnl_net:caif_netlink_parms(): no params data found [ 3073.838055][ T7834] netlink: 132 bytes leftover after parsing attributes in process `syz.2.10342'. [ 3073.971002][ T7843] netlink: 119384 bytes leftover after parsing attributes in process `syz.0.10344'. [ 3074.114813][ T7822] bridge0: port 1(bridge_slave_0) entered blocking state [ 3074.137027][ T7847] netlink: 209844 bytes leftover after parsing attributes in process `syz.8.10343'. [ 3074.153089][ T7822] bridge0: port 1(bridge_slave_0) entered disabled state [ 3074.178888][ T7822] bridge_slave_0: entered allmulticast mode [ 3074.238104][ T7822] bridge_slave_0: entered promiscuous mode [ 3074.368112][ T7845] netlink: 'syz.2.10345': attribute type 10 has an invalid length. [ 3074.430320][ T7822] bridge0: port 2(bridge_slave_1) entered blocking state [ 3074.472973][ T7822] bridge0: port 2(bridge_slave_1) entered disabled state [ 3074.500310][ T7822] bridge_slave_1: entered allmulticast mode [ 3074.519491][ T7822] bridge_slave_1: entered promiscuous mode [ 3074.677693][T27602] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3074.897365][ T7822] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3074.958919][T27602] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3074.981199][ T7822] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3075.055525][ T7849] FAULT_INJECTION: forcing a failure. [ 3075.055525][ T7849] name failslab, interval 1, probability 0, space 0, times 0 [ 3075.094406][ T7849] CPU: 1 PID: 7849 Comm: syz.8.10346 Not tainted syzkaller #0 [ 3075.101982][ T7849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3075.112099][ T7849] Call Trace: [ 3075.115434][ T7849] [ 3075.118424][ T7849] dump_stack_lvl+0x16c/0x230 [ 3075.123192][ T7849] ? show_regs_print_info+0x20/0x20 [ 3075.128556][ T7849] ? load_image+0x3b0/0x3b0 [ 3075.133139][ T7849] ? __might_sleep+0xe0/0xe0 [ 3075.134088][ T7822] team0: Port device team_slave_0 added [ 3075.137859][ T7849] ? __lock_acquire+0x7c80/0x7c80 [ 3075.148756][ T7849] should_fail_ex+0x39d/0x4d0 [ 3075.153528][ T7849] should_failslab+0x9/0x20 [ 3075.158083][ T7849] slab_pre_alloc_hook+0x59/0x310 [ 3075.163278][ T7849] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 3075.169081][ T7849] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 3075.174966][ T7849] __kmem_cache_alloc_node+0x53/0x260 [ 3075.176992][ T7822] team0: Port device team_slave_1 added [ 3075.180453][ T7849] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 3075.191790][ T7849] __kmalloc+0xa4/0x240 [ 3075.196027][ T7849] tomoyo_realpath_from_path+0xe3/0x5d0 [ 3075.201699][ T7849] tomoyo_path_number_perm+0x1ea/0x590 [ 3075.207233][ T7849] ? tomoyo_path_number_perm+0x1ba/0x590 [ 3075.212962][ T7849] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 3075.218596][ T7849] ? ksys_write+0x1c1/0x250 [ 3075.223383][ T7849] ? __fget_files+0x28/0x4d0 [ 3075.228107][ T7849] security_file_ioctl+0x70/0xa0 [ 3075.233136][ T7849] __se_sys_ioctl+0x48/0x170 [ 3075.237849][ T7849] do_syscall_64+0x55/0xb0 [ 3075.242320][ T7849] ? clear_bhb_loop+0x40/0x90 [ 3075.247028][ T7849] ? clear_bhb_loop+0x40/0x90 [ 3075.251771][ T7849] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3075.257792][ T7849] RIP: 0033:0x7fadc518f749 [ 3075.262332][ T7849] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3075.282232][ T7849] RSP: 002b:00007fadc60c1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3075.290684][ T7849] RAX: ffffffffffffffda RBX: 00007fadc53e5fa0 RCX: 00007fadc518f749 [ 3075.298682][ T7849] RDX: 00002000000002c0 RSI: 0000000040047451 RDI: 0000000000000003 [ 3075.306689][ T7849] RBP: 00007fadc60c1090 R08: 0000000000000000 R09: 0000000000000000 [ 3075.314782][ T7849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3075.322877][ T7849] R13: 00007fadc53e6038 R14: 00007fadc53e5fa0 R15: 00007fffea2c1418 [ 3075.330918][ T7849] [ 3075.392937][T32342] Bluetooth: hci2: command tx timeout [ 3075.412890][ T7849] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3075.525814][T27602] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3075.581444][ T7822] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3075.589061][ T7822] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3075.625967][ T7822] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3075.639747][ T7822] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3075.647532][ T7822] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3075.722785][ T7822] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3075.770345][T27602] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3075.935986][ T7822] hsr_slave_0: entered promiscuous mode [ 3075.957108][ T7822] hsr_slave_1: entered promiscuous mode [ 3075.997036][ T7822] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 3076.082908][ T7822] Cannot create hsr debugfs directory [ 3076.178451][ T7872] netlink: 119384 bytes leftover after parsing attributes in process `syz.2.10355'. [ 3076.221800][ T7870] netlink: 'syz.0.10354': attribute type 10 has an invalid length. [ 3076.326708][ T7865] netlink: 209844 bytes leftover after parsing attributes in process `syz.8.10353'. [ 3077.023839][ T7884] FAULT_INJECTION: forcing a failure. [ 3077.023839][ T7884] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3077.060816][ T7884] CPU: 1 PID: 7884 Comm: syz.2.10358 Not tainted syzkaller #0 [ 3077.068367][ T7884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3077.078464][ T7884] Call Trace: [ 3077.081808][ T7884] [ 3077.084878][ T7884] dump_stack_lvl+0x16c/0x230 [ 3077.089618][ T7884] ? show_regs_print_info+0x20/0x20 [ 3077.094881][ T7884] ? load_image+0x3b0/0x3b0 [ 3077.099433][ T7884] ? __might_fault+0xaa/0x120 [ 3077.104155][ T7884] ? __lock_acquire+0x7c80/0x7c80 [ 3077.109374][ T7884] should_fail_ex+0x39d/0x4d0 [ 3077.114106][ T7884] _copy_from_user+0x2f/0xe0 [ 3077.118759][ T7884] ___sys_sendmsg+0x159/0x290 [ 3077.123568][ T7884] ? __sys_sendmsg+0x270/0x270 [ 3077.128371][ T7884] ? __lock_acquire+0x7c80/0x7c80 [ 3077.133428][ T7884] __se_sys_sendmsg+0x1a5/0x270 [ 3077.138296][ T7884] ? __x64_sys_sendmsg+0x80/0x80 [ 3077.143263][ T7884] ? lockdep_hardirqs_on+0x98/0x150 [ 3077.148567][ T7884] do_syscall_64+0x55/0xb0 [ 3077.153001][ T7884] ? clear_bhb_loop+0x40/0x90 [ 3077.157688][ T7884] ? clear_bhb_loop+0x40/0x90 [ 3077.162375][ T7884] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3077.168369][ T7884] RIP: 0033:0x7fac0818f749 [ 3077.172801][ T7884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3077.192591][ T7884] RSP: 002b:00007fac063d5038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3077.201017][ T7884] RAX: ffffffffffffffda RBX: 00007fac083e6090 RCX: 00007fac0818f749 [ 3077.209001][ T7884] RDX: 0000000004000000 RSI: 0000200000000500 RDI: 0000000000000004 [ 3077.217083][ T7884] RBP: 00007fac063d5090 R08: 0000000000000000 R09: 0000000000000000 [ 3077.225073][ T7884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3077.233074][ T7884] R13: 00007fac083e6128 R14: 00007fac083e6090 R15: 00007ffe50059928 [ 3077.241153][ T7884] [ 3077.391412][ T7888] netlink: 'syz.8.10361': attribute type 10 has an invalid length. [ 3077.421662][ T7888] team0: Port device dummy0 added [ 3077.437784][ T7891] netlink: 'syz.8.10361': attribute type 10 has an invalid length. [ 3077.463146][T32342] Bluetooth: hci2: command tx timeout [ 3077.479721][ T7891] team0: Port device dummy0 removed [ 3077.490767][ T7891] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 3077.665060][ T7896] netlink: 119384 bytes leftover after parsing attributes in process `syz.8.10363'. [ 3077.946611][ T7898] ªªªªªª: renamed from vlan0 (while UP) [ 3077.957191][ T7822] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 3077.978216][ T7822] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 3078.001988][ T7822] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 3078.057308][ T7822] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 3078.072035][ T7900] netlink: 209844 bytes leftover after parsing attributes in process `syz.2.10365'. [ 3079.022934][ T7910] netlink: 'syz.0.10368': attribute type 10 has an invalid length. [ 3079.279588][T27602] [ 3079.282001][T27602] ====================================================== [ 3079.289059][T27602] WARNING: possible circular locking dependency detected [ 3079.296191][T27602] syzkaller #0 Not tainted [ 3079.300621][T27602] ------------------------------------------------------ [ 3079.307738][T27602] kworker/u4:7/27602 is trying to acquire lock: [ 3079.313996][T27602] ffff8880683dcd00 (team->team_lock_key#24){+.+.}-{3:3}, at: team_del_slave+0x32/0x1c0 [ 3079.323796][T27602] [ 3079.323796][T27602] but task is already holding lock: [ 3079.331183][T27602] ffff88802e638768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: ieee80211_remove_interfaces+0x292/0x680 [ 3079.341773][T27602] [ 3079.341773][T27602] which lock already depends on the new lock. [ 3079.341773][T27602] [ 3079.352381][T27602] [ 3079.352381][T27602] the existing dependency chain (in reverse order) is: [ 3079.361412][T27602] [ 3079.361412][T27602] -> #1 (&rdev->wiphy.mtx){+.+.}-{3:3}: [ 3079.369178][T27602] __mutex_lock+0x129/0xcc0 [ 3079.374244][T27602] ieee80211_open+0x144/0x200 [ 3079.379483][T27602] __dev_open+0x2bc/0x430 [ 3079.384355][T27602] dev_open+0xab/0x170 [ 3079.388962][T27602] team_add_slave+0xae7/0x2660 [ 3079.394266][T27602] do_setlink+0xe14/0x3fb0 [ 3079.399217][T27602] rtnl_newlink+0x175b/0x2020 [ 3079.404496][T27602] rtnetlink_rcv_msg+0x7c7/0xf10 [ 3079.409970][T27602] netlink_rcv_skb+0x216/0x480 [ 3079.415279][T27602] netlink_unicast+0x751/0x8d0 [ 3079.420600][T27602] netlink_sendmsg+0x8c1/0xbe0 [ 3079.425909][T27602] ____sys_sendmsg+0x5bf/0x950 [ 3079.431223][T27602] ___sys_sendmsg+0x220/0x290 [ 3079.436458][T27602] __se_sys_sendmsg+0x1a5/0x270 [ 3079.441868][T27602] do_syscall_64+0x55/0xb0 [ 3079.446836][T27602] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3079.453364][T27602] [ 3079.453364][T27602] -> #0 (team->team_lock_key#24){+.+.}-{3:3}: [ 3079.461935][T27602] __lock_acquire+0x2ddb/0x7c80 [ 3079.467331][T27602] lock_acquire+0x197/0x410 [ 3079.472383][T27602] __mutex_lock+0x129/0xcc0 [ 3079.477434][T27602] team_del_slave+0x32/0x1c0 [ 3079.482650][T27602] team_device_event+0x28d/0xa20 [ 3079.488134][T27602] notifier_call_chain+0x197/0x390 [ 3079.493796][T27602] unregister_netdevice_many_notify+0xf36/0x1810 [ 3079.500789][T27602] unregister_netdevice_queue+0x324/0x360 [ 3079.507060][T27602] _cfg80211_unregister_wdev+0x16b/0x580 [ 3079.513485][T27602] ieee80211_remove_interfaces+0x496/0x680 [ 3079.519863][T27602] ieee80211_unregister_hw+0x5d/0x2a0 [ 3079.525856][T27602] mac80211_hwsim_del_radio+0x274/0x450 [ 3079.531975][T27602] hwsim_exit_net+0x585/0x640 [ 3079.537209][T27602] cleanup_net+0x6f4/0xb90 [ 3079.542171][T27602] process_scheduled_works+0xa45/0x15b0 [ 3079.548268][T27602] worker_thread+0xa55/0xfc0 [ 3079.553415][T27602] kthread+0x2fa/0x390 [ 3079.558108][T27602] ret_from_fork+0x48/0x80 [ 3079.563087][T27602] ret_from_fork_asm+0x11/0x20 [ 3079.568506][T27602] [ 3079.568506][T27602] other info that might help us debug this: [ 3079.568506][T27602] [ 3079.578783][T27602] Possible unsafe locking scenario: [ 3079.578783][T27602] [ 3079.586262][T27602] CPU0 CPU1 [ 3079.591682][T27602] ---- ---- [ 3079.597070][T27602] lock(&rdev->wiphy.mtx); [ 3079.601692][T27602] lock(team->team_lock_key#24); [ 3079.609356][T27602] lock(&rdev->wiphy.mtx); [ 3079.616489][T27602] lock(team->team_lock_key#24); [ 3079.621548][T27602] [ 3079.621548][T27602] *** DEADLOCK *** [ 3079.621548][T27602] [ 3079.629739][T27602] 5 locks held by kworker/u4:7/27602: [ 3079.635126][T27602] #0: ffff888017873938 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x957/0x15b0 [ 3079.646048][T27602] #1: ffffc9000ee6fd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x957/0x15b0 [ 3079.656624][T27602] #2: ffffffff8dfaeed0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x136/0xb90 [ 3079.666063][T27602] #3: ffffffff8dfbbd08 (rtnl_mutex){+.+.}-{3:3}, at: ieee80211_unregister_hw+0x55/0x2a0 [ 3079.676196][T27602] #4: ffff88802e638768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: ieee80211_remove_interfaces+0x292/0x680 [ 3079.687027][T27602] [ 3079.687027][T27602] stack backtrace: [ 3079.692938][T27602] CPU: 1 PID: 27602 Comm: kworker/u4:7 Not tainted syzkaller #0 [ 3079.700596][T27602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 3079.710782][T27602] Workqueue: netns cleanup_net [ 3079.715609][T27602] Call Trace: [ 3079.719008][T27602] [ 3079.721960][T27602] dump_stack_lvl+0x16c/0x230 [ 3079.726706][T27602] ? load_image+0x3b0/0x3b0 [ 3079.731241][T27602] ? show_regs_print_info+0x20/0x20 [ 3079.736478][T27602] ? print_circular_bug+0x12b/0x1a0 [ 3079.741704][T27602] check_noncircular+0x2bd/0x3c0 [ 3079.746725][T27602] ? print_deadlock_bug+0x5d0/0x5d0 [ 3079.752038][T27602] ? lockdep_lock+0xe0/0x220 [ 3079.756653][T27602] ? perf_trace_lock_acquire+0xfb/0x3e0 [ 3079.762317][T27602] ? _find_first_zero_bit+0xd3/0x100 [ 3079.767641][T27602] __lock_acquire+0x2ddb/0x7c80 [ 3079.772531][T27602] ? verify_lock_unused+0x140/0x140 [ 3079.777758][T27602] ? perf_trace_lock_acquire+0xfb/0x3e0 [ 3079.783344][T27602] ? trace_event_raw_event_lock_acquire+0x2a0/0x2a0 [ 3079.790394][T27602] ? perf_trace_lock_acquire+0xfb/0x3e0 [ 3079.796069][T27602] lock_acquire+0x197/0x410 [ 3079.800600][T27602] ? team_del_slave+0x32/0x1c0 [ 3079.805398][T27602] ? __might_sleep+0xe0/0xe0 [ 3079.810016][T27602] ? read_lock_is_recursive+0x20/0x20 [ 3079.815419][T27602] __mutex_lock+0x129/0xcc0 [ 3079.819948][T27602] ? team_del_slave+0x32/0x1c0 [ 3079.824736][T27602] ? __lock_acquire+0x7c80/0x7c80 [ 3079.829907][T27602] ? rcu_is_watching+0x15/0xb0 [ 3079.834963][T27602] ? trace_contention_end+0x39/0xe0 [ 3079.840205][T27602] ? __mutex_lock+0x304/0xcc0 [ 3079.844924][T27602] ? team_del_slave+0x32/0x1c0 [ 3079.849720][T27602] ? mutex_lock_nested+0x20/0x20 [ 3079.854688][T27602] ? bond_netdev_event+0xe1/0xef0 [ 3079.859734][T27602] ? __mutex_unlock_slowpath+0x1a2/0x6a0 [ 3079.865577][T27602] ? bond_ipsec_offload_ok+0x410/0x410 [ 3079.871065][T27602] team_del_slave+0x32/0x1c0 [ 3079.875783][T27602] team_device_event+0x28d/0xa20 [ 3079.880747][T27602] notifier_call_chain+0x197/0x390 [ 3079.885900][T27602] unregister_netdevice_many_notify+0xf36/0x1810 [ 3079.892262][T27602] ? lock_chain_count+0x20/0x20 [ 3079.897145][T27602] ? unregister_netdevice_many+0x20/0x20 [ 3079.902811][T27602] ? kernfs_remove_by_name_ns+0x117/0x150 [ 3079.908559][T27602] ? __lock_acquire+0x7c80/0x7c80 [ 3079.913627][T27602] unregister_netdevice_queue+0x324/0x360 [ 3079.919381][T27602] ? list_netdevice+0x730/0x730 [ 3079.924267][T27602] ? kernfs_remove_by_name_ns+0x117/0x150 [ 3079.930019][T27602] _cfg80211_unregister_wdev+0x16b/0x580 [ 3079.935734][T27602] ieee80211_remove_interfaces+0x496/0x680 [ 3079.941593][T27602] ? ieee80211_do_stop+0x1db0/0x1db0 [ 3079.946992][T27602] ? rcu_is_watching+0x15/0xb0 [ 3079.951790][T27602] ieee80211_unregister_hw+0x5d/0x2a0 [ 3079.957278][T27602] mac80211_hwsim_del_radio+0x274/0x450 [ 3079.962850][T27602] ? rhashtable_remove_fast+0xbf0/0xbf0 [ 3079.968422][T27602] hwsim_exit_net+0x585/0x640 [ 3079.973130][T27602] ? hwsim_init_net+0x90/0x90 [ 3079.977832][T27602] ? __ip_vs_dev_cleanup_batch+0x238/0x250 [ 3079.983746][T27602] cleanup_net+0x6f4/0xb90 [ 3079.988201][T27602] ? ops_free_list+0x3b0/0x3b0 [ 3079.993093][T27602] ? _raw_spin_unlock_irq+0x23/0x50 [ 3079.998321][T27602] ? process_scheduled_works+0x957/0x15b0 [ 3080.004071][T27602] ? process_scheduled_works+0x957/0x15b0 [ 3080.009821][T27602] process_scheduled_works+0xa45/0x15b0 [ 3080.015411][T27602] ? assign_work+0x400/0x400 [ 3080.020033][T27602] ? assign_work+0x39e/0x400 [ 3080.024662][T27602] worker_thread+0xa55/0xfc0 [ 3080.029292][T27602] kthread+0x2fa/0x390 [ 3080.033380][T27602] ? pr_cont_work+0x560/0x560 [ 3080.038090][T27602] ? kthread_blkcg+0xd0/0xd0 [ 3080.042700][T27602] ret_from_fork+0x48/0x80 [ 3080.047145][T27602] ? kthread_blkcg+0xd0/0xd0 [ 3080.051756][T27602] ret_from_fork_asm+0x11/0x20 [ 3080.056566][T27602] [ 3080.092831][T32342] Bluetooth: hci2: command tx timeout [ 3080.093336][T27602] team0: Port device wlan1 removed [ 3080.143631][ T7921] netlink: 119384 bytes leftover after parsing attributes in process `syz.2.10371'. [ 3080.252279][ T7822] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3080.287530][T27602] hsr_slave_0: left promiscuous mode [ 3080.296076][T27602] hsr_slave_1: left promiscuous mode [ 3080.302017][T27602] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3080.310133][T27602] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3080.318147][T27602] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3080.325882][T27602] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3080.333772][T27602] bridge_slave_1: left allmulticast mode [ 3080.339530][T27602] bridge_slave_1: left promiscuous mode [ 3080.345443][T27602] bridge0: port 2(bridge_slave_1) entered disabled state [ 3080.354609][T27602] bridge_slave_0: left allmulticast mode [ 3080.360380][T27602] bridge_slave_0: left promiscuous mode [ 3080.366274][T27602] bridge0: port 1(bridge_slave_0) entered disabled state [ 3080.376414][T27602] veth1_macvtap: left promiscuous mode [ 3080.381929][T27602] veth0_macvtap: left promiscuous mode [ 3080.388116][T27602] veth1_vlan: left promiscuous mode [ 3080.551395][T27602] team0 (unregistering): Port device team_slave_1 removed [ 3080.582634][T27602] team0 (unregistering): Port device team_slave_0 removed [ 3080.629307][T27602] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3080.661406][T27602] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3080.785785][T27602] team0 (unregistering): Port device batadv0 removed [ 3080.934164][T27602] bond0 (unregistering): (slave team0): Releasing backup interface [ 3080.959669][T27602] bond0 (unregistering): Released all slaves [ 3081.035816][ T7822] 8021q: adding VLAN 0 to HW filter on device team0 [ 3081.048825][ T6930] bridge0: port 1(bridge_slave_0) entered blocking state [ 3081.055985][ T6930] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3081.076973][ T6317] bridge0: port 2(bridge_slave_1) entered blocking state [ 3081.084250][ T6317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3081.310243][ T7822] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3081.469733][ T7822] veth0_vlan: entered promiscuous mode [ 3081.479712][ T7822] veth1_vlan: entered promiscuous mode [ 3081.504606][ T7822] veth0_macvtap: entered promiscuous mode [ 3081.513592][ T7822] veth1_macvtap: entered promiscuous mode [ 3081.527833][ T7822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3081.538974][ T7822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3081.549858][ T7822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3081.561611][ T7822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3081.571578][ T7822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3081.582066][ T7822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3081.593831][ T7822] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3081.606864][ T7822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3081.617752][ T7822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3081.627814][ T7822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3081.638271][ T7822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3081.648398][ T7822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3081.658866][ T7822] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3081.669800][ T7822] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3081.681049][ T7822] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3081.690396][ T7822] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3081.699700][ T7822] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3081.709363][ T7822] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3081.740441][ T7822] ieee80211 phy91: Selected rate control algorithm 'minstrel_ht' [ 3081.763878][ T6317] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3081.765325][ T7822] ieee80211 phy92: Selected rate control algorithm 'minstrel_ht' [ 3081.771832][ T6317] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3081.798194][ T6317] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3081.807082][ T6317] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3082.103146][T32342] Bluetooth: hci2: command tx timeout [ 3082.266037][ T1290] ieee802154 phy0 wpan0: encryption failed: -22 [ 3082.272637][ T1290] ieee802154 phy1 wpan1: encryption failed: -22