last executing test programs: 13m3.090803034s ago: executing program 3 (id=6550): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1f, 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB='X'], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r0}, 0xc) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1080, 0x0, @perf_config_ext={0x7, 0x9}, 0x40}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r1) socket$kcm(0x2, 0x200000000000005, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$kcm(0x10, 0x2, 0x2) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x2, 0x20000}, 0x102065, 0x0, 0x0, 0x3, 0x7, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, 0x0) close(0x3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2b6e65745f636c73200063707561636374202d706572665f6576656e74200072646d61202b63707561636374fa7a598d57581848"], 0x34) r3 = socket$kcm(0x21, 0x2, 0x2) sendmsg$inet(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x100, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x3000c085) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f0000000100)=r5, 0x4) sendmsg$kcm(r4, &(0x7f0000005600)={0x0, 0x0, &(0x7f0000005000)=[{&(0x7f0000002c80)="640091ffc057", 0x6}], 0x1}, 0x0) sendmsg$inet(r4, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 13m2.909591091s ago: executing program 3 (id=6551): bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c80)={@fallback, 0xffffffffffffffff, 0x1b, 0x14}, 0x20) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x2, 0x20000}, 0x0, 0x0, 0x0, 0x3, 0x7, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x5, 0x7ff}, 0x104101, 0x4, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b06d25a806c8c6f94f90424fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x11c044, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0xd18c9b60, &(0x7f0000000080)=[{&(0x7f0000000100)="e03f03002a000b05d25a806c8c6f94f90524fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000000000d05e3a06507ad3c9641f"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x6, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) 13m1.194784976s ago: executing program 3 (id=6554): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x8, 0x3c, 0xb, 0x2, 0x0, 0x1, 0x10, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffd, 0x4, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x5, 0xff, 0x1, 0xd, 0x5, 0xfff9, 0x0, 0x3, 0x0, 0xf9}, 0xffffffffffffffff, 0x9, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="0a000000d2cf00003d36000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180), 0x3, r1}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r1, &(0x7f0000001940), &(0x7f00000002c0)=""/187}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x1ff) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r8) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x58000, 0x1, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r10, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) socketpair(0x6, 0x2, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r7, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xe, 0x11, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x2, 0x0, 0x9, 0x1, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}]}, 0x0, 0x4, 0xec, &(0x7f0000000680)=""/236, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x3, 0x66cf, 0x2}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f00000009c0)=[r11, 0xffffffffffffffff, r12, r6, 0xffffffffffffffff], 0x0, 0x10, 0xf}, 0x94) ioctl$SIOCSIFHWADDR(r5, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d0800fe007c05e8fe55a115000100ff11142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) 13m1.100686399s ago: executing program 2 (id=6555): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x8, 0x3c, 0xb, 0x2, 0x0, 0x1, 0x10, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffd, 0x4, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x5, 0xff, 0x1, 0xd, 0x5, 0xfff9, 0x0, 0x3, 0x0, 0xf9}, 0xffffffffffffffff, 0x9, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="0a000000d2cf00003d36000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180), 0x3, r1}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r1, &(0x7f0000001940), &(0x7f00000002c0)=""/187}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x1ff) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r8) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x58000, 0x1, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r10, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) socketpair(0x6, 0x2, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r7, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xe, 0x11, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x2, 0x0, 0x9, 0x1, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}]}, 0x0, 0x4, 0xec, &(0x7f0000000680)=""/236, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x3, 0x66cf, 0x2}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f00000009c0)=[r11, 0xffffffffffffffff, r12, r6, 0xffffffffffffffff], 0x0, 0x10, 0xf}, 0x94) ioctl$SIOCSIFHWADDR(r5, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d0800fe007c05e8fe55a115000100ff11142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) 13m0.633846268s ago: executing program 3 (id=6558): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) 13m0.57872159s ago: executing program 2 (id=6559): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1f, 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB='X'], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r0}, 0xc) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1080, 0x0, @perf_config_ext={0x7, 0x9}, 0x40}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r1) socket$kcm(0x2, 0x200000000000005, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$kcm(0x10, 0x2, 0x2) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x2, 0x20000}, 0x102065, 0x0, 0x0, 0x3, 0x7, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, 0x0) close(0x3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2b6e65745f636c73200063707561636374202d706572665f6576656e74200072646d61202b63707561636374fa7a598d57581848"], 0x34) r3 = socket$kcm(0x21, 0x2, 0x2) sendmsg$inet(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x100, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x3000c085) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f0000000100)=r5, 0x4) sendmsg$kcm(r4, &(0x7f0000005600)={0x0, 0x0, &(0x7f0000005000)=[{&(0x7f0000002c80)="640091ffc057", 0x6}], 0x1}, 0x0) sendmsg$inet(r4, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 13m0.406178417s ago: executing program 2 (id=6562): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1f, 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB="580000000000000000000000feffffff8500a24d54e7d45f0d02000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r0}, 0xc) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1080, 0x0, @perf_config_ext={0x7, 0x9}, 0x40}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r1) socket$kcm(0x2, 0x200000000000005, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x2, 0x20000}, 0x102065, 0x0, 0x0, 0x3, 0x7, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, 0x0) close(0x3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2b6e65745f636c73200063707561636374202d706572665f6576656e74200072646d61202b63707561636374fa7a598d57581848"], 0x34) r3 = socket$kcm(0x21, 0x2, 0x2) sendmsg$inet(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x100, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r4, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x3000c085) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f0000000100)=r5, 0x4) sendmsg$kcm(r4, &(0x7f0000005600)={0x0, 0x0, &(0x7f0000005000)=[{&(0x7f0000002c80)="640091ffc057", 0x6}], 0x1}, 0x0) sendmsg$inet(r4, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 13m0.31066228s ago: executing program 3 (id=6564): socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x5}, 0xa38, 0x0, 0x0, 0x0, 0x0, 0x800000, 0xfffd, 0x0, 0x0, 0x0, 0x3d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) socket$kcm(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$kcm(0x10, 0x2, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x98}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netdevsim0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 13m0.146938727s ago: executing program 2 (id=6566): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x8, 0x3c, 0xb, 0x2, 0x0, 0x1, 0x10, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffd, 0x4, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x5, 0xff, 0x1, 0xd, 0x5, 0xfff9, 0x0, 0x3, 0x0, 0xf9}, 0xffffffffffffffff, 0x9, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="0a000000d2cf00003d36000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180), 0x3, r1}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r1, &(0x7f0000001940), &(0x7f00000002c0)=""/187}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x1ff) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r8) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x58000, 0x1, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r10, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r7, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xe, 0x11, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x2, 0x0, 0x9, 0x1, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}]}, 0x0, 0x4, 0xec, &(0x7f0000000680)=""/236, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x3, 0x66cf, 0x2}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f00000009c0)=[r11, 0xffffffffffffffff, 0xffffffffffffffff, r6, 0xffffffffffffffff], 0x0, 0x10, 0xf}, 0x94) ioctl$SIOCSIFHWADDR(r5, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d0800fe007c05e8fe55a115000100ff11142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) 12m58.532418498s ago: executing program 3 (id=6567): bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c80)={@fallback, 0xffffffffffffffff, 0x1b, 0x14}, 0x20) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x2, 0x20000}, 0x0, 0x0, 0x0, 0x3, 0x7, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x5, 0x7ff}, 0x104101, 0x4, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b06d25a806c8c6f94f90424fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x11c044, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0xd18c9b60, &(0x7f0000000080)=[{&(0x7f0000000100)="e03f03002a000b05d25a806c8c6f94f90524fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000000000d05e3a06507ad3c9641f"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x6, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) 12m58.503530099s ago: executing program 2 (id=6568): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe327, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 12m58.314664447s ago: executing program 2 (id=6571): perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x13, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x4}, 0x0, 0x5, 0x3, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x300000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2a, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x702, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) 11m18.790015038s ago: executing program 32 (id=6569): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x8, 0x3c, 0xb, 0x2, 0x0, 0x1, 0x10, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffd, 0x4, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x5, 0xff, 0x1, 0xd, 0x5, 0xfff9, 0x0, 0x3, 0x0, 0xf9}, 0xffffffffffffffff, 0x9, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="0a000000d2cf00003d36000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180), 0x3, r1}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r1, &(0x7f0000001940), &(0x7f00000002c0)=""/187}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x1ff) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r8) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x58000, 0x1, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r10, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) socketpair(0x6, 0x2, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r7, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xe, 0x11, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x2, 0x0, 0x9, 0x1, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}]}, 0x0, 0x4, 0xec, &(0x7f0000000680)=""/236, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x3, 0x66cf, 0x2}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f00000009c0)=[r11, 0xffffffffffffffff, r12, r6, 0xffffffffffffffff], 0x0, 0x10, 0xf}, 0x94) ioctl$SIOCSIFHWADDR(r5, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d0800fe007c05e8fe55a115000100ff11142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) 11m18.669812042s ago: executing program 33 (id=6570): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x8, 0x3c, 0xb, 0x2, 0x0, 0x1, 0x10, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffd, 0x4, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x5, 0xff, 0x1, 0xd, 0x5, 0xfff9, 0x0, 0x3, 0x0, 0xf9}, 0xffffffffffffffff, 0x9, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="0a000000d2cf00003d36000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180), 0x3, r1}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r1, &(0x7f0000001940), &(0x7f00000002c0)=""/187}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x1ff) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r8) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x58000, 0x1, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r10, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) socketpair(0x6, 0x2, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r7, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xe, 0x11, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x2, 0x0, 0x9, 0x1, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}]}, 0x0, 0x4, 0xec, &(0x7f0000000680)=""/236, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x3, 0x66cf, 0x2}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f00000009c0)=[r11, 0xffffffffffffffff, r12, r6, 0xffffffffffffffff], 0x0, 0x10, 0xf}, 0x94) ioctl$SIOCSIFHWADDR(r5, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d0800fe007c05e8fe55a115000100ff11142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) 11m18.669651812s ago: executing program 34 (id=6571): perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x13, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x4}, 0x0, 0x5, 0x3, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x300000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2a, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x702, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) 11m18.550553307s ago: executing program 35 (id=6567): bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c80)={@fallback, 0xffffffffffffffff, 0x1b, 0x14}, 0x20) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x2, 0x20000}, 0x0, 0x0, 0x0, 0x3, 0x7, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x5, 0x7ff}, 0x104101, 0x4, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b06d25a806c8c6f94f90424fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x11c044, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0xd18c9b60, &(0x7f0000000080)=[{&(0x7f0000000100)="e03f03002a000b05d25a806c8c6f94f90524fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000000000d05e3a06507ad3c9641f"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x6, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) 11m3.950251708s ago: executing program 4 (id=6582): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000100)=r4) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 11m3.718428326s ago: executing program 7 (id=6583): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'macsec0\x00', @local}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="10000000040000000400000002"], 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00'], 0xb) sendmsg$inet(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000000400)="bc69e8126cea1e4c91d44e6915dc0f26a6b8e338b12f2b985aa1bb9c060c5d1e669745d7ef9035376c6753da16fcfd7b098da30d4f9439972546dc9dfe216596919a8b9cf6628545b838b64ce014bda1e035ebbba87f417eb7c65f51bdd9accb4c96d24aa0fb73ab8e2cf6bb4a924bb828811660db09cf7d46d73a3ccc2a2985dd7321db3dbe426617f3f7d334766554f43df06052c67d1be28647eb60fd78013217fc39d4ee5a777482ef2c6440", 0xae}, {&(0x7f0000000380)="33bf193ae3dd2b59fd89096afc987fad6cde361fe8eb3600be7633a577827d2cd92499fae553fe61a409242b42b56ac679830d0263ba0332188343f768c87256655f222cc7b910595fd9dce1b9e02489e8fd0916c32f1afb", 0x58}, {&(0x7f0000000200)="af951e44a36a80698cc5fa6565280d019ecbac008cb79d20785914f244ec29ceb37dee36b14905f51c12183894b02c2e0152ea261c5987fa714359b2ba382882b1fc5a7de500be3c08dc8223dc", 0x4d}, {&(0x7f0000000180)="f9466c1b60b7c7bee939323784e35110362fb18ce49cf0f3bccc9e457ec49a5bc424e6cda2e35ea447388d936a9ea319df27ff52e17a3ef2d46ebdf9683c4e8887a82a918ba4126ad6d8f62eac414de3", 0x50}, {&(0x7f0000000280)="8e7bdb92a4e210b8cd8ea36b5577ea2d58c7ca3b5b1ab2d4a33618605a3797505f66088939ba67c10f332a5b378f55d85b8310915fbb7eb957a8118f10c249e65bd93ea82d7bd058e6c70a827d29bea3b7ac5e7ca804e4abeb0aea5a42c692cc66273cbf742576b995030524bf1fd01c1599845b7a5a1cdb4058928e57826203e1e694eb60eb831950a650bab62f0f59bdbecef42a0c87dbfb27a859873dec8caa8718c7be3bd685fe16145aaed1d5ff9affbf31a85310677dac68cb02656f5538fd66bba8e4aaaea0a6a59d18062c", 0xcf}, {&(0x7f00000007c0)="852411538ae4ad41d737bdc6a07dee55fa6435f9e2cec04e45fb8ed2967c1ef6307196aab81bb3e1e48e2ec39ef022845454bd14d693", 0x36}, {&(0x7f0000000800)="892adbf769cdfd18d4db6908cd53e8970bd96ec0680bb2ed3344b1eeb143b301983c0b96259bb084d9fbd45fc6de712bfa9d7703000000000000001acaf1f6b92ffb42e100a9686b1d5d699814212b015d278aa736ccebc28904923059163d178f1199dcafa26de0abe0a97d2511a461df02358f42575e332e465c6e53d59406167914e543aa0d390616f365dbc3cd2c14fce35dc58662f205da", 0x9a}, {&(0x7f0000001940)="f7d1399eb70d2314c16b50065a0ae13cbe819556cfc229bac34919011ada8856f8eed81a3d8ec1658cbdfe8aa246d0aa9c42eb20931d691096fa17ba10ccfb0a262cf99e970f847a2abaa191378099dd416bdd72f2491d28c7d71fb187f785c2eb3027bcc86b90c819a761c8769852955626c28e80fe106ecf21f256c43cbbce4b6fca1d53c4cebee00de4042f7e86dd0bbb2883876870d626fded72d34992169ee5c3f370e54096291787791119280629a39b961050b53047a8443a266b8ad7581c9df37227ca56bd90db3b7b501b3b7604cb837f9197742d4ebed9b274c8d4172864ad1f165adbe61c64e29ba46f2eed1ca412f7bb47190950e7257250f0f7e23ba1b75a8ea6245cceb11b6fba8571b32328d0484e2b4efd0483872d1abc6371d5c9ba8cb13fab0c38af51e784b213464b38d204504420e129ece08393eb5045ddf065697d94a65ce3f0d04a7f9834e923296abba072d0639acfd483e309e20630e7c485b00fea383c4eebea49b6dc74bf9219800c92b7350abe0ba1bfb04ec83e0393177cd769a5544603a94f21691023a787e4f342bd13db7119fe114d462b51b7b6561ee58fcd566e841c8b6446f88374f2b70ed5631a7e6c448ee7ade8b1c42cc67208b9822d607c20a32e38dec0f0287661338fd608abc320ed69015fee779c078e15b73324b227baae113ba74542220125b9270832f6de0311b66e6025a74c9f54d8bbf181746d448e0a651223e499c84201c472101e58b6ae9f139baecab33a6a24fecdbcddb06431aa40ce08d3b5ccf01bf497093f66f6ad56d888a74d62b1e7e994ee2d1b2f02d4e96eae1d72f1ec49c6421b084fe8cac28d1d900623c1e077dfb4343cb4a029de651fc7639c87b786af6bd334523e69c572a0aecb4cd9d0a741721f753494605272694d91b45f96b0808c6e64bc0e56d0a559479509c13e96686e6d77b56ca99a97ef8eb108c3a9007447ad66ec08f57ba24d507720403d5d47d7ef0b7c46e2dde07d030e7352adc4827788a41fb7415c5ffd844d8a0e7b3b30f170e3ecb0f39f73460d1b16fb2470ffebdd311124fb034128d98d093693e6654f5120b96fef1d39bd9804c13e5df009080399c5ae93b019e2bd2fc0d70bf00d588203eb59d307cadb89a07a4d32cc02992c1b7ab762d8fa7e57f76c81d4e24af7dab36e22029b1c85c5a54b5f596c2e029e3e1440a153c4e150e9bf2a4c7aefea9fe9ba6b588447fed1b42ef4092fa22db138bf3ccd449bc9919d2d571369c65b770be3a426ee7885e7fa031fdd20eb625448611418f33dc2af2a8119c8144526e952548d59d568d9436abf737cde0939d2074789f08ca37af6bf99cc495a105f7feab5d8f23f327fc20f0939c049effe0df9c987e8a18d2f46411207692a9cec1cddea2361907dc90da7f411f26e7eee054b5506ae05ecb9725ed3cc5243558eb9349f9641876887215d01fbeda2bbc969cf8cfefed7ca226e5c3187b065a98c356415e552c2e9f7a2ad5737383e7fe3602dc60b463d082ac9003c81dc478336bdde4335657413a1c49a1a6da68d0a5329d0917233b80a7daa6cf1ebb331281f8412ac59ceacb8d7043483876c4e3f62fabd427119f898e3ad9c68695e2e2e6fe98fe9236d78846ad16452f9472f5d5d65b672da517cc6002d345cb406c7b5da8f6f7863e80262ebe0221b6d638e57602f383a1f50e6f3f9e0672b9fea5b933d7686a8706855ac6add92475053f9c5e393d2281f9d65e0e14a0fe8d9e002bc0e74418e2ada5a0bdac1faa1a9b7eab60a50d8eb40f306eac45f176833a85bddec66bbb8ffa046f47b6b7a227ccdc68a03f4a53d9512e4d5b8fe419d3e583579abd4e5166edbdf54cd31e2afdf4c33dc3230551b5742b2bf6d452cbbd2726930f0c74ddebaabba841645e0fc61f1db336167cf033e39a69ded2eced1ad530cdd5b73e34081906d75a2816baa4edbbd392bb94ac13f0ae78e7507c40c8e7879a6c165e6171578e4d3218327e99a3560c75a8b64464cfc67f7dc613de627dc92263711d3d874756e028ba57894b62135ca5319a4af19b6ade3b3d59f4c68e85279f64aeaa493a497e5c4ae0f5b35cf8c89457636c376b4041e3e080bea5bba1a543cee77764f0d15ebc7db4e2ec6facc641057d555a71e171dbb05421469bdfc11a05ca56645165cdf2e2e1e8ae412b195aff3ad45a98b44c0ea3b05476cd6dd260aedaa7d30d5446397c7087a5e88483386a49d6dfe10690e9b0f43e91909e820f90f1a787ce8bf7bcd143a3eae41f057363c1d548dbf9773f67518ad4ea54769ed96076545c6a22ebe4b30c9bf500fd5472bffe13e585a8fe4ffb2f35bb485496f90ce2f1402f3df31235efb44cdf85d07ef2cf25e52810e9d22c0a9c6e2b9968439cf9aacc10f09bb777baa8cb5e6e55008a3460c2d7febacf8966448e749544e66c5fe7ec66f84e7e75827b9b627b474b38c5cbd8b3c7b92601678ba63fdfc73d45f5a30ee396eefa35a04328a1778b9f26051c8ccd41618fc3703358db0a6f480cf393da98003fedd21b077f8145c41d997c4b62b0955bf9659be7540a6ee0b359c1daefe38af9e7d82559b659bc0b9dc16c91b95b525aea6b0e25a604457a8c833c847591c44cf95b0eca103c0f370d2fb5b6b82d283dae47c6de60a1edcbdf1f51cf5d3b313df7097957a142f4a5e92d39d77299b5a2dffe86f22f4cabba92d416ebc1ead28c0c7ae923f8e91b779c5ab2672c6c161245dde316eaefee82554cee69d18d698547d1e229ba2161bfe543d0ed4535efd378a4929fe98924259334924d779a3226d18a3e53f0521750d982805086554e48cacf3e79f335ce91a5acba1d5a15f5efeba4ab0ae1b2b5888d81bab5698e616d02d8982e0c4b14f898dcbd5c636ce5fbb9190ed246a5703bf982fe9f0eb8c33d89d2a8998c9710aa72c7d2b684e11ce03cef18e8d02caeb6541f913d2b21c76b7a967de10b5bad7af315365d631817d00fcd576dd26c555af7e1ddae65f76d74912a91aaa9d15605015384071c76201b1f86f6180989fcdd06a369ea839949e4ee4b8046b573b393808100372bb8d3222357a47f76b285060479a407f252c483804b1c79b28ae8ac7943d280e31428f755e9c8d735e05342442a95ba6358ccd0d6d2a6cc7e20c03b105b982d476811d486753087a0e6ed96d5814887d32098821200bfe99c44f9106dcc83c07fc458507eba838b4979063d9474c29f456b0fc80bf63119367b2b0915772c76d66a1a28e4cd81537c7aa02572cd4d70246227b5852f6d8d56ebfa6698496adaf5f6f741b31c5e33fc07ee5be33883bb7a4c9a32f1a47acf28bfe3dbfc59b2a020c210c1912ae9a68272e74ca0f821c31aa47997938ff0b048dcdb9d57eb75b83676274b56ac22013befa573ae7daee6c7a1d22970bb6e4a22687ab036d88e49ce0e8331cd13a536a0718f5164ed12c9928e13cd9d318d5a83cc3d0189310e2999b69fcdee9f052cb5c1b1f5cc2efa9abe0b41c73f2cc8397923bc225195f9e2e59496b3da502a481f62d6a9685a230ac6fd1ae1d31d676fd44c91706afc7d1a62b5aca4fcfb24b8d2a7cc956b1023a03c95d69e3e61c16e6b280b5b8a72dea41cbef04799fe1feb3aa82b004ce65461bcb63d92cd776d6aec9090336a151ab51a6688f93fc3735ddf7e4cd3e928a9f130444fc200f1864169caa994089d55edd1602c75e79cbf5c71de38615da71f2c2e822f239a3948f5e1a76b70296e44952ff0a032b092624755c908c520567a846109b3b12dff45bea84c8a283b713423c7d4921f1899a44e66c11ecedfd805b97b957a0dc84af4a0924dfc7266ab4a75d1aa5e238af4af5fb6e92724f366df6421073b30e87049bf0e1bd6b35940360710de26615e3544c1b37600c2d5cb707d8c3f8974ff6a96efcbd306672a78915ec3aa2f3e49778cee22595295fa1ef46f7d37493ce00974e733cb4435d94da116b4558d3c880739075ece7a4f86203d31fcd98fc71a40ca8e1bfad34b5be5139bc9ce9ab4180e0f0e51ca3775b4a29cedd5a2e8aaf9ffad1fa2d88eaa907cf919b588a4be7c948cdfca60084e08cb2c9b48d138386c18b5e5d79ce75de88a2de58648ab13e11b8cc56081dcee4d76de78f747b635521e1fc923402fa11e9b31608b684b66cd7c2331c686a87d50cf2cae70621783b38358ccfe4aad1b189278267b8c671b28b1e18713799aad7a886e552a5b41e1a38ba4e82c92868f00792f15ea485291dd1a71759eb38f7530f8370db8f2f7971ccc7f673a2e26479b54154e8c0f614698949137514b246b444d3223dce767bc6fc6c210aa5f6adbc6f8489e260cf527dbf5362aa8e5b11064c3e85f12062ccc595030b22b1ae0cbe5700322d6838d5a173498d9f0f2a44b958eefea98d4b06dd18f6dd34ae33aa27221ccffa38247e5961ea88fc76f6df9cac42d25bf9c26e3203e02f807d5cb92b0e77f494a4918c2268c03f08e02ad24443cfbea9bb3db688b5e86695600b536f3683bf8df8030e5f8d57bff37701418d9b89c71a4cb2a5c5853cd8d0c701ab10aa6acfe0eacd80f2062efdaab36bc0ac227bea6a8aabff14471a7c33e8ef9c40bcf2d8e55da9df27415c30ab13557a6d58afd801f9df9808112d919c228dbcaf6652c0ed24b021020c10ad62848fd061f911d80d3f61d39918d4533855dcd8b068ec313de3b0af2b10f1688f9c1745e42a66c69a5613ded9815a434468fa90a509acaf92d48777af19e11f4282bddc69755fd9f5260088cc4ae2454bcf759deb436ddb384b812f9d55e6d803c9d8934b176913a26eccf27ff1af5dc4b1ba537476bdad18b4cc8beea593551b6721541b2fe297c12ca002312e11a2feb614e090967d8c5a93677f3669a5cd8239d8679e99056119bc82b2ae595f51ec7c61ab495c2d2420a498996e0e52397fd04be238c2731f5cf36e54417d658b77782949484e00d34ef43be911cc13718550b7d473aea3814d60c0ff01093def64ad0e6664216fb78f85af4c70cb4549fa06a962c8a1303ac60f9cec593898e0920d554059887b7891d3b0135eb731468bd1ffb381364e3ed7f101cbe8e55f7431b704084c761cc46a1f7f31b08198b32f7c5f4ea0297a883ec24df943770f54c125e63692abca4799ec3b6912165d585afd1629e1be66aba9afc7482b0976f17efa779503d0a04c7472c049b1d2545aec1fc2c19fb2fbafce7a809120f2b0b607c974e0ac1c6110fffa0241757abcb0b129face387f94271aa59944972d47da7cb6e3008aba68ff993e3adc1498e15cc8e25cfd588b2e881ee212ca9d4e3dd3b6dc8a77f0afb608c3ed8090bd02bc6e6ba14b6d8d180daa8f8cabc49efa33a9d291a3270af66d317a516f1f8c58c8316666ef9b02ede98904412a75d1ada41610fcb1b90d32711125948f8ef387354394fecd0163d472e5023cd3c45a7934642e7a6d406f730f339b80d1290c45150a8886327260fc4f1dbe4ab88843dd1334d5bc380fb4f3e968acefe45005542572d951f54730a383d787fabfd482e66995ad36d6c692cdf0a38e5a5ef2591d71068e963f5cbf69963ba2885099cb0c1698c2e7b068cb4c628e8355f230ab0111f339c5a6dd560bf556360083ce8c57c0088026c6e611a65bcd729bd5369a7d064aa4554a2f17f4ce0a6d6631b9cdc3f6a50d8336d0731539463cea6d017031a4583ad831a5a6d246783463efb2bfcea4bb247f81dc030ba4673df60be22d44c7b6e2abf841c0105787eefc041d79ec", 0x1000}], 0x8, &(0x7f0000000540)}, 0x24008000) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x3, &(0x7f00000000c0)=[{0x8, 0x9, 0x1, 0x9}, {0x200, 0x1, 0x65, 0x20}, {0xf, 0xf5, 0x0, 0x7}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x6, 0x8, 0x8, 0x40, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x50) r5 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r5, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @private1}, 0x80, &(0x7f0000000080)=[{&(0x7f00000000c0)="81", 0x1}], 0x1, &(0x7f0000000040)=[{0x18, 0x84, 0x0, 'b'}, {0x10, 0x84, 0x8}], 0x28}, 0x41) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000640)={&(0x7f00000000c0)="615018cff8ddc4bd72a1e822fe169204286b5a0ba2d5e07d24510a045a4667b7ebfec91d956c370b19adf9e6426cb6f46d3d57d9a3da9ed50f50f1eda03e3d5b98ba", &(0x7f0000000300), &(0x7f0000000500)="4ff9b9dbd4dbe4b100d4373d21e73ce61e351c92172c3ebc75c8afd858574d38c02df86ebce7f17e953f3d8f11bc9deb06b5181ad5940352cbec049c046c8f9c5892bee99104cc2d8c8ceb27b755f0733233698b1949218d9f62437d2c7e49fb73b4504338e5bf85fe2c3928a9af7837ed58193b5f210c0d252c6dabc470c9ff8b0e8a32d5ad091f3a06f31f5ef02d0078ac5425e159d4e25223c62151f09341b78cb360ad9c26d4c8f3bc89fd9d6d2f15550caa06742f42d255c1c41f0dd39cf144d4f66aabd13e85384b571260", &(0x7f0000000600)="a08657ccaa92ef5cf1d34ce71834f14dcff3be3222fee515a4482b701ab4a55adfa7273840f86205c38f1287", 0xffffff4a, r4, 0x4}, 0x38) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1}, 0x1a220, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r4, 0xffffffffffffffff}, &(0x7f0000000680), &(0x7f00000006c0)=r6}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)={0x1b, 0x0, 0x0, 0x9, 0x0, r7, 0xc, '\x00', 0x0, r4, 0x5, 0x5}, 0x50) 11m2.989905645s ago: executing program 7 (id=6587): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000018d198000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) r1 = socket$kcm(0x15, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000140)={r1}) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) socket$kcm(0x10, 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000640), 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000680)=ANY=[@ANYBLOB="9feb010000800000000000007800001c780000000c0000000500000005ec000000080000000100000008000000040000000003000000010000100100000006000000020000000500e55d53e8f165000000e66851cff83c0000000100000000000009050000000e000000010000931800000004000000ff00000003000000007517e635fd5e966235008080afe01045964bec9ac076d7060501f6a5ae48543a973097b0ff57a79666922d6bd9abfc24e50226d800000000000000"], &(0x7f0000000500)=""/248, 0x9c, 0xf8, 0x0, 0x4, 0x10000, @value=r2}, 0x28) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x10, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0xffffffff}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@ldst={0x2, 0x2, 0x3, 0x9, 0x0, 0x20}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x9, 0xff9, &(0x7f0000000800)=""/4089, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r5, &(0x7f00000001c0), &(0x7f0000000080)=""/45}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r6}, &(0x7f0000000340), &(0x7f0000000380)=r7}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001880)={r2, 0x58, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$TOKEN_CREATE(0x24, &(0x7f0000001a40)={0x0, r4}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001980)={0x6, 0x10, &(0x7f0000000280)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xa9d, 0x0, 0x0, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x20}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @generic={0x40, 0x8, 0xe, 0x1000, 0x5}, @alu={0x7, 0xd9a3a263bc480367, 0xd, 0x2, 0x7, 0xffffffffffffffc0, 0xffffffffffffffff}], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x4e, &(0x7f0000000740)=""/78, 0x41000, 0x659cbf9c640d57db, '\x00', r8, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000001900)={0x1, 0x10, 0x7, 0xb3e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001940)=[r5, r5], 0x0, 0x10, 0x3, @value=r9}, 0x94) 11m2.558834071s ago: executing program 7 (id=6590): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x8, 0x3c, 0xb, 0x2, 0x0, 0x1, 0x10, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffd, 0x4, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x5, 0xff, 0x1, 0xd, 0x5, 0xfff9, 0x0, 0x3, 0x0, 0xf9}, 0xffffffffffffffff, 0x9, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="0a000000d2cf00003d36000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x3, r1}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r1, &(0x7f0000001940), &(0x7f00000002c0)=""/187}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x1ff) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r8) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x58000, 0x1, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r10, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x6, 0x2, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r7, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xe, 0x11, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x2, 0x0, 0x9, 0x1, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}]}, 0x0, 0x4, 0xec, &(0x7f0000000680)=""/236, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x3, 0x66cf, 0x2}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f00000009c0)=[r11, 0xffffffffffffffff, r12, r6, 0xffffffffffffffff], 0x0, 0x10, 0xf}, 0x94) ioctl$SIOCSIFHWADDR(r5, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d0800fe007c05e8fe55a115000100ff11142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) 11m0.737113191s ago: executing program 4 (id=6591): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x8, 0x3c, 0xb, 0x2, 0x0, 0x1, 0x10, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffd, 0x4, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x5, 0xff, 0x1, 0xd, 0x5, 0xfff9, 0x0, 0x3, 0x0, 0xf9}, 0xffffffffffffffff, 0x9, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="0a000000d2cf00003d36000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f0000000180), 0x3, r1}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r1, &(0x7f0000001940), &(0x7f00000002c0)=""/187}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x1ff) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r8) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x58000, 0x1, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r10, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x6, 0x2, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r7, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xe, 0x11, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x2, 0x0, 0x9, 0x1, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}]}, 0x0, 0x4, 0xec, &(0x7f0000000680)=""/236, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x3, 0x66cf, 0x2}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f00000009c0)=[r11, 0xffffffffffffffff, r12, r6, 0xffffffffffffffff], 0x0, 0x10, 0xf}, 0x94) ioctl$SIOCSIFHWADDR(r5, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d0800fe007c05e8fe55a115000100ff11142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) 11m0.394924384s ago: executing program 7 (id=6594): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000100)=r4) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 11m0.190577182s ago: executing program 5 (id=6595): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x8, 0x3c, 0xb, 0x2, 0x0, 0x1, 0x10, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffd, 0x4, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x5, 0xff, 0x1, 0xd, 0x5, 0xfff9, 0x0, 0x3, 0x0, 0xf9}, 0xffffffffffffffff, 0x9, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="0a000000d2cf00003d36"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180), 0x3, r1}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r1, &(0x7f0000001940), &(0x7f00000002c0)=""/187}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x1ff) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r8) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x58000, 0x1, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r10, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x6, 0x2, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r7, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xe, 0x11, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x2, 0x0, 0x9, 0x1, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}]}, 0x0, 0x4, 0xec, &(0x7f0000000680)=""/236, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x3, 0x66cf, 0x2}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f00000009c0)=[r11, 0xffffffffffffffff, r12, r6, 0xffffffffffffffff], 0x0, 0x10, 0xf}, 0x94) ioctl$SIOCSIFHWADDR(r5, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d0800fe007c05e8fe55a115000100ff11142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) 10m59.690193211s ago: executing program 4 (id=6596): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x8, 0x3c, 0xb, 0x2, 0x0, 0x1, 0x10, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffd, 0x4, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x5, 0xff, 0x1, 0xd, 0x5, 0xfff9, 0x0, 0x3, 0x0, 0xf9}, 0xffffffffffffffff, 0x9, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="0a000000d2cf00003d36"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180), 0x3, r1}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r1, &(0x7f0000001940), &(0x7f00000002c0)=""/187}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x1ff) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r8) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x58000, 0x1, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r10, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x6, 0x2, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r7, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xe, 0x11, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x2, 0x0, 0x9, 0x1, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}]}, 0x0, 0x4, 0xec, &(0x7f0000000680)=""/236, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x3, 0x66cf, 0x2}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f00000009c0)=[r11, 0xffffffffffffffff, r12, r6, 0xffffffffffffffff], 0x0, 0x10, 0xf}, 0x94) ioctl$SIOCSIFHWADDR(r5, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d0800fe007c05e8fe55a115000100ff11142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) 10m59.523777048s ago: executing program 6 (id=6597): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe327, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10m59.508127908s ago: executing program 5 (id=6598): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) 10m59.296179316s ago: executing program 5 (id=6599): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x8, 0x3c, 0xb, 0x2, 0x0, 0x1, 0x10, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffd, 0x4, @perf_bp={0x0, 0xf}, 0x400, 0x5, 0xff, 0x1, 0xd, 0x5, 0xfff9, 0x0, 0x3, 0x0, 0xf9}, 0xffffffffffffffff, 0x9, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="0a000000d2cf00003d36000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180), 0x3, r1}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r1, &(0x7f0000001940), &(0x7f00000002c0)=""/187}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x1ff) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r8) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x58000, 0x1, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r10, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x6, 0x2, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r7, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xe, 0x11, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x2, 0x0, 0x9, 0x1, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}]}, 0x0, 0x4, 0xec, &(0x7f0000000680)=""/236, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x3, 0x66cf, 0x2}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f00000009c0)=[r11, 0xffffffffffffffff, r12, r6, 0xffffffffffffffff], 0x0, 0x10, 0xf}, 0x94) ioctl$SIOCSIFHWADDR(r5, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d0800fe007c05e8fe55a115000100ff11142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) 10m59.237771249s ago: executing program 6 (id=6600): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x4, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xd) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000bc0)={&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x800, @loopback, 0x2, 0x2}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000340)="2ad5ef6952c3a985e2072ebde5adc93b921a6e6f2a5de8079d451809c9c3d11fbcc28b52b3b550133400b2cd4b55f4487f518f6a82c70f7dc25117a7a66def92618e555b552ed3e065", 0x49}, {&(0x7f0000000500)="740225b21f3623c746399de00b9345cf869ff8e63e35ecf8f83f528c52f6da1b6a72e2b13c1afea6b9fee3ca473564397d441c984d66cbb7e3638e3b237f54201a8fae0c5973747f0ecbb27942e7a6f8613301fe2e760f9aea50b56a4e31611071150633b9f909d111d161558a67093d25f4b2c4cf", 0x75}], 0x2, &(0x7f0000000980)=[{0x98, 0x111, 0x3a5, "8a2389eed6d90fb5ccd73c6ea7bcd2e710a8febfa9e752388996765c21858574db0f623af6a3ed87278ce97de07b1f4a4f799d14cbc58acee75854cb009dcda686a41495db6d890a3c6e466e5e78a7447e25c46ea0066d67757f728a6298858fa14f1cb51c48bda1c598b9e16a0fbf53bd98c9b0422e1897233faee219ec4fe53728213d00e936"}, {0x60, 0x6, 0x4, "6a6743972524aaba2de1c7d7a438e653d2087790f4afd2c41600800eadb64bf9aca63f6cced3ffa08dd2147d92d524dca1d41d8f08506d9622d7e6f31430782c01a7fcb4d4fd7351052a"}, {0xb8, 0x0, 0x40, "d416269976f0ca74a6a64e36064f918b3043955785f059fea39e7ee1ab89d275aee7807075a09bcfa7b701ef974a95b2e45002faf245fd55134e92d21e7c67246b1a9ad4ca6f4c83a489c2e02c9377501464be33fc3bb3823cb2073fb758925569d7b14a4dbfea4fb2367783706e6ded64aeb554a007381f5ac017e2899b3e2442f4995cc5003c8a676f4877cb03070705fdaa02307aa3aa58d9d03a1a0c66cf7a"}], 0x1b0}, 0x8800) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) close(r2) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000780)="5c00000013006bcc9e3be35c6e17aa31076b876c1d0000007ea60864160af36514000cc008001900030002000600010003800000000056a705251e638294ff0051f60a84c9f4d4938037e786a6d072c6c95300"/92, 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 10m57.415954079s ago: executing program 4 (id=6601): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="0a000000d2cf00003d36000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180), 0x3, r0}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r0, &(0x7f0000001940), &(0x7f00000002c0)=""/187}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f00000000c0)='syz0\x00', 0x1ff) r2 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r7) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x58000, 0x1, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r9, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x6, 0x2, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r6, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xe, 0x11, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x2, 0x0, 0x9, 0x1, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}]}, 0x0, 0x4, 0xec, &(0x7f0000000680)=""/236, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x3, 0x66cf, 0x2}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f00000009c0)=[r10, 0xffffffffffffffff, r11, r5, 0xffffffffffffffff], 0x0, 0x10, 0xf}, 0x94) ioctl$SIOCSIFHWADDR(r4, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d0800fe007c05e8fe55a115000100ff11142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) 10m57.38050769s ago: executing program 5 (id=6602): bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c80)={@fallback, 0xffffffffffffffff, 0x1b, 0x14}, 0x20) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x2, 0x20000}, 0x0, 0x0, 0x0, 0x3, 0x7, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x4, 0xc, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x5, 0x7ff}, 0x104101, 0x4, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b06d25a806c8c6f94f90424fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x11c044, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0xd18c9b60, &(0x7f0000000080)=[{&(0x7f0000000100)="e03f03002a000b05d25a806c8c6f94f90524fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000000000d05e3a06507ad3c9641f"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x6, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) 10m57.37924285s ago: executing program 6 (id=6603): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe327, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10m57.328545632s ago: executing program 7 (id=6604): bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c80)={@fallback, 0xffffffffffffffff, 0x1b, 0x14}, 0x20) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x2, 0x20000}, 0x0, 0x0, 0x0, 0x3, 0x7, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x5, 0x7ff}, 0x104101, 0x4, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b06d25a806c8c6f94f90424fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x11c044, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0xd18c9b60, &(0x7f0000000080)=[{&(0x7f0000000100)="e03f03002a000b05d25a806c8c6f94f90524fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000000000d05e3a06507ad3c9641f"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x6, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) 10m56.992456975s ago: executing program 6 (id=6605): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x8, 0x3c, 0xb, 0x2, 0x0, 0x1, 0x10, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffd, 0x4, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x5, 0xff, 0x1, 0xd, 0x5, 0xfff9, 0x0, 0x3, 0x0, 0xf9}, 0xffffffffffffffff, 0x9, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="0a000000d2cf00003d36000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180), 0x3, r1}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r1, &(0x7f0000001940), &(0x7f00000002c0)=""/187}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x1ff) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r8) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x58000, 0x1, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r10, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x6, 0x2, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r7, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xe, 0x11, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x2, 0x0, 0x9, 0x1, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}]}, 0x0, 0x4, 0xec, &(0x7f0000000680)=""/236, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x3, 0x66cf, 0x2}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f00000009c0)=[r11, 0xffffffffffffffff, r12, r6, 0xffffffffffffffff], 0x0, 0x10, 0xf}, 0x94) ioctl$SIOCSIFHWADDR(r5, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d0800fe007c05e8fe55a115000100ff11142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) 10m56.435145766s ago: executing program 4 (id=6606): perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x13, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x4}, 0x0, 0x5, 0x3, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00'}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x300000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000100)=r0, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x702, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) 10m56.202903405s ago: executing program 6 (id=6607): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x8, 0x3c, 0xb, 0x2, 0x0, 0x1, 0x10, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffd, 0x4, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x5, 0xff, 0x1, 0xd, 0x5, 0xfff9, 0x0, 0x3, 0x0, 0xf9}, 0xffffffffffffffff, 0x9, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="0a000000d2cf00003d36000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180), 0x3, r1}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r1, &(0x7f0000001940), &(0x7f00000002c0)=""/187}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r7) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x58000, 0x1, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r9, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x6, 0x2, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r6, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xe, 0x11, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x2, 0x0, 0x9, 0x1, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}]}, 0x0, 0x4, 0xec, &(0x7f0000000680)=""/236, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x3, 0x66cf, 0x2}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f00000009c0)=[r10, 0xffffffffffffffff, r11, r5, 0xffffffffffffffff], 0x0, 0x10, 0xf}, 0x94) ioctl$SIOCSIFHWADDR(r4, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d0800fe007c05e8fe55a115000100ff11142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) 10m56.046003181s ago: executing program 5 (id=6608): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe327, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10m55.752447153s ago: executing program 7 (id=6609): bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c80)={@fallback, 0xffffffffffffffff, 0x1b, 0x14}, 0x20) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x2, 0x20000}, 0x0, 0x0, 0x0, 0x3, 0x7, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x5, 0x7ff}, 0x104101, 0x4, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b06d25a806c8c6f94f90424fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x11c044, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0xd18c9b60, &(0x7f0000000080)=[{&(0x7f0000000100)="e03f03002a000b05d25a806c8c6f94f90524fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000000000d05e3a06507ad3c9641f"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x6, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) 10m55.629761488s ago: executing program 5 (id=6610): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x8, 0x3c, 0xb, 0x2, 0x0, 0x1, 0x10, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffd, 0x4, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x5, 0xff, 0x1, 0xd, 0x5, 0xfff9, 0x0, 0x3, 0x0, 0xf9}, 0xffffffffffffffff, 0x9, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="0a000000d2cf00003d36000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180), 0x3, r1}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r1, &(0x7f0000001940), &(0x7f00000002c0)=""/187}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x1ff) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r7) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x58000, 0x1, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r9, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x6, 0x2, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r6, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xe, 0x11, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x2, 0x0, 0x9, 0x1, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}]}, 0x0, 0x4, 0xec, &(0x7f0000000680)=""/236, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x3, 0x66cf, 0x2}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f00000009c0)=[r10, 0xffffffffffffffff, r11, r5, 0xffffffffffffffff], 0x0, 0x10, 0xf}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d0800fe007c05e8fe55a115000100ff11142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) 10m55.56429895s ago: executing program 4 (id=6611): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x8, 0x3c, 0xb, 0x2, 0x0, 0x1, 0x10, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffd, 0x4, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x5, 0xff, 0x1, 0xd, 0x5, 0xfff9, 0x0, 0x3, 0x0, 0xf9}, 0xffffffffffffffff, 0x9, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="0a000000d2cf00003d36000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180), 0x3, r1}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r1, &(0x7f0000001940), &(0x7f00000002c0)=""/187}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x1ff) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r7) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x58000, 0x1, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r9, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x6, 0x2, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r6, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xe, 0x11, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x2, 0x0, 0x9, 0x1, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}]}, 0x0, 0x4, 0xec, &(0x7f0000000680)=""/236, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x3, 0x66cf, 0x2}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f00000009c0)=[r10, 0xffffffffffffffff, r11, r5, 0xffffffffffffffff], 0x0, 0x10, 0xf}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d0800fe007c05e8fe55a115000100ff11142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) 10m55.530345191s ago: executing program 6 (id=6612): perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x13, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x4}, 0x0, 0x5, 0x3, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x300000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000100)=r0, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x702, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) 10m1.361747091s ago: executing program 36 (id=6611): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x8, 0x3c, 0xb, 0x2, 0x0, 0x1, 0x10, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffd, 0x4, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x5, 0xff, 0x1, 0xd, 0x5, 0xfff9, 0x0, 0x3, 0x0, 0xf9}, 0xffffffffffffffff, 0x9, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="0a000000d2cf00003d36000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180), 0x3, r1}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r1, &(0x7f0000001940), &(0x7f00000002c0)=""/187}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x1ff) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r7) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x58000, 0x1, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r9, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x6, 0x2, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r6, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xe, 0x11, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x2, 0x0, 0x9, 0x1, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}]}, 0x0, 0x4, 0xec, &(0x7f0000000680)=""/236, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x3, 0x66cf, 0x2}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f00000009c0)=[r10, 0xffffffffffffffff, r11, r5, 0xffffffffffffffff], 0x0, 0x10, 0xf}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d0800fe007c05e8fe55a115000100ff11142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) 10m1.263165335s ago: executing program 37 (id=6610): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x8, 0x3c, 0xb, 0x2, 0x0, 0x1, 0x10, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffd, 0x4, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x5, 0xff, 0x1, 0xd, 0x5, 0xfff9, 0x0, 0x3, 0x0, 0xf9}, 0xffffffffffffffff, 0x9, r0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="0a000000d2cf00003d36000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180), 0x3, r1}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r1, &(0x7f0000001940), &(0x7f00000002c0)=""/187}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0xfffffffffffffeee) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x1ff) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r7) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x58000, 0x1, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r9, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x6, 0x2, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r6, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xe, 0x11, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x70}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x2, 0x0, 0x9, 0x1, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}]}, 0x0, 0x4, 0xec, &(0x7f0000000680)=""/236, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x2, 0x3, 0x66cf, 0x2}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f00000009c0)=[r10, 0xffffffffffffffff, r11, r5, 0xffffffffffffffff], 0x0, 0x10, 0xf}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d0800fe007c05e8fe55a115000100ff11142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) 10m1.141402479s ago: executing program 38 (id=6612): perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x13, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x4}, 0x0, 0x5, 0x3, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x300000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000100)=r0, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x702, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) 10m1.018602224s ago: executing program 39 (id=6609): bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c80)={@fallback, 0xffffffffffffffff, 0x1b, 0x14}, 0x20) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x2, 0x20000}, 0x0, 0x0, 0x0, 0x3, 0x7, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x5, 0x7ff}, 0x104101, 0x4, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b06d25a806c8c6f94f90424fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x11c044, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0xd18c9b60, &(0x7f0000000080)=[{&(0x7f0000000100)="e03f03002a000b05d25a806c8c6f94f90524fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000000000d05e3a06507ad3c9641f"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x6, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) 10.077576646s ago: executing program 1 (id=8841): perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xc29a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x0, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 9.635229s ago: executing program 1 (id=8844): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x15, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x12, 0xa, 0x8, 0x2, 0x4}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x20000884) 9.315261242s ago: executing program 1 (id=8848): sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000006c0)="2e00000010008188e6b62aa73f72cc9f0ba1f848140000005e140602000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x0) 9.163261797s ago: executing program 1 (id=8850): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000a80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8a0700000000000000000000000070784d6f0e21da5f6f5fef00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x6, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24044840) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0xfffffff8}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x1, 0xb, &(0x7f0000000100), 0x20) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x806, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x4156, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffff8, 0xffff}, 0x12640, 0x0, 0xfffffffe, 0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$sock(0xffffffffffffffff, 0x0, 0x44) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x3) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x6, 0x2, &(0x7f0000000200)=@raw=[@call, @exit], &(0x7f0000000280)='GPL\x00', 0x5, 0x81, &(0x7f00000002c0)=""/123, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, 0x0, 0x0, 0x90, 0x0, 0x100000}, 0x80) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x4}, 0x0, 0x0, 0x0, 0x8, 0x2, 0xfffffffc}, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21bef5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9b24be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6eab1aa7d55545a34effa077faa56d59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e59a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d0faab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0480f94306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad9433269af3be5fa6a9a5c24e392955f4e979ea13201bafe4f0f6ea508000000a0c548552b571bed5647223c78a992810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ede62fc28839b5301160ecec37e83efceefd7ca2533659edc8be05cc85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d35a142a9ec9a7a3755e0f209150a07682c4e14e3a835701bea8240399c56ce8f58df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b262341c5e093fd66a2946501559335781092cf8ce3c7c56cd31121624d76517fd3666276c3c0e812b28e2f30d035cee5d0e77a3c70008ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856cf24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31651e0ecea5ece8fb11a4ee288eb149f1fa33669cc8d901fa8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463baf28345bde0c195bc9f021da8f3025ee9c8e3168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262fa3f1dabeb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@map=r1, 0x34, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000280)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0]}, 0x40) r5 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r5, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r5, &(0x7f0000000100)={&(0x7f0000000a80)=@hci={0x1f, 0x300, 0x6}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000013c0)="62031400d70000000010122f1eafbcf72be12b30087f5c582d26116642c4", 0x1e}, {&(0x7f0000002380)="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", 0xf4c}], 0x2}, 0x4041) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r1, 0x58, &(0x7f00000003c0)}, 0x10) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000005c0)={0x7}, 0x8) 7.641836689s ago: executing program 1 (id=8861): r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000020000800000000000000000850000004f0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000690f000085000000230000"], &(0x7f0000000080)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x58c8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) close(0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r3, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$LINK_DETACH(0x22, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x7}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000000)={0xffffffffffffffff, r5, 0x4, r6}, 0x10) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="d8000000100081046881f782db44b904021d080b01000000e8fe55a11800150006001400030000120800040043000000a8001600a400014020000700ffffff7fb94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a9d7c7c0b7a196e6f66112c88ac417898516277ce06bbace80177ccbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d0080000000000000b57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb14feb9f5588a63644caf1ce1bd6c769ad809d52a9ecbee", 0xd8}], 0x1}, 0x0) 7.175471065s ago: executing program 1 (id=8868): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) socket$kcm(0x11, 0x3, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000001400000000000018000000000200000000000000000000001c000000000000000000000008000000", @ANYRES32, @ANYRES32, @ANYBLOB="7f000001ac141400000000011c0e0000000000000000000007006fc946f1f569c01801"], 0x230}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000340)='+', 0x34000}], 0x1}, 0x900000000000000) 2.983058738s ago: executing program 8 (id=8897): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019000800004460bc06000000a701251e6182949a3651fbffffffd4d4938037e7c7a0a03400ac09c51c268811000096859fc57a00000000000000002571cd53b9851b30", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000340)=""/174, 0xae}, {&(0x7f0000000500)=""/232, 0xe8}, {&(0x7f0000001b40)=""/4065, 0xfe1}, {&(0x7f0000000940)=""/4124, 0x101c}, {&(0x7f0000000100)=""/55, 0x37}, {&(0x7f0000000000)=""/40, 0x28}], 0x6}, 0x20) recvmsg$kcm(r0, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x80) 2.472980055s ago: executing program 8 (id=8901): sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="d8000000100081046881f782db44b904021d080b01000000e8fe55a11800150006001400030000120800040043000000a8001600a400014020000700ffffff7fb94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a9d7c7c0b7a196e6f66112c88ac417898516277ce06bbace80177ccbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d0080000000000000b57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb14feb9f5588a63644caf1ce1bd6c769ad809d52a9ecbee", 0xd8}], 0x1}, 0x0) 2.371431579s ago: executing program 8 (id=8902): socket$kcm(0xa, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x189703, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000180)={'syzkaller0\x00'}) close(r0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20000000) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x2, 0x3cd, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x4) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) 1.985523282s ago: executing program 9 (id=8905): perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x16, 0x1c, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000100000850000008200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000008000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b80a000500000000", &(0x7f0000000300)=""/8, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 1.873806585s ago: executing program 9 (id=8906): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007044f16c01b1fbfd000000000000008af65f0df9928941994cc8c173fac5688671085a86d143c59fed0e57feb97f422c51d8e63b4ed9e295df3ccd1a55752dfc2f32f14b6c8f0e7413c3e9caaad30dcb412d0f54623f388bb2c63d2b1f7d83cd0cc021867bb4aee9967a6ee83e1b18fd8beca7d7eddcd96634"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000000c0)={0x0, 0x1}, 0x1}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000000000000000000000000000007fffffff0001"], 0xfdef) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="d8000000210081044e81f782db44a904020000000000000000000005100013", 0x1f}], 0x1}, 0x4090) r1 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0439000020"], 0x33fe0) 1.577142326s ago: executing program 9 (id=8908): socket$kcm(0xa, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x2}, 0x0, 0x0, 0xfffffffd, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$kcm(0x21, 0x2, 0x2) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, r2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x9, 0x1, 0x8c}]}, &(0x7f0000000080)='syzkaller\x00'}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000b80)=ANY=[@ANYBLOB="9feb010018000000060000000c0000004ce484bf84730c0000000200000000000000000000faaccb3fee8543cbe35b91216c0905cfdec9f485f4605064d9bdc702dd28efb26f90e5689689b3ca46c71f3d5d29c79d70a261f47e2d84d9b55ec83f75c96dce1e605163e8"], 0x0, 0x26}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x5, 0x5, 0x2d, 0x8c, 0x0, 0x0, 0x8020, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x400, 0xfffffffffffffff9}, 0x804, 0xc9, 0x0, 0x4, 0x9, 0x39, 0x0, 0x0, 0x6, 0x0, 0x9d7}, 0x0, 0x1, r2, 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r1) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000b05d25a806f8c6394f90424fc60", 0x14}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRESDEC, @ANYBLOB="43da2e"], 0x48) 1.532973877s ago: executing program 0 (id=8909): sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="d8000000100081046881f782db44b904021d080b01000000e8fe55a11800150006001400030000120800040043000000a8001600a400014020000700ffffff7fb94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a9d7c7c0b7a196e6f66112c88ac417898516277ce06bbace80177ccbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d0080000000000000b57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb14feb9f5588a63644caf1ce1bd6c769ad809d52a9ecbee", 0xd8}], 0x1}, 0x0) 1.409155832s ago: executing program 0 (id=8910): socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000005c0)=""/151, 0x84}, {&(0x7f00000003c0)=""/114}, {&(0x7f0000000240)=""/22}], 0x1, &(0x7f0000002f40)=""/244, 0x17}, 0x0) close(r1) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r2, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$kcm(0x2, 0x1, 0x84) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0xfffffffffffffffd, 0xf0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d40)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000b00)={0x0, 0xf22fff7f, &(0x7f0000000180)=[{&(0x7f0000000080)="31de76fb398bc62d058b8a96924594f5476a0824be53f7a5949f80614c42391e4b80412938c955d34d37eb96ba7849c3eb823bb36724bd6f6d0219cfe5c884afcd2bdea5acf9c877c03dcdbbb3e47417b6707c27d4c5c1db1924071f6b6f23c7d199c799c9b0c41101e625fcdb7bbfd12a3eeeef4540a5698f058aaf6a141e5d333929b92a7f64e925bf0ef424c3ef29fcd5fd4721c547fde6abe4d47048b64511693624b0d786711abe4a66e250fcbfe95ac9037e58f331b26b6ed0d08e5c73ba4c49", 0xc00e}], 0x9, &(0x7f00000001c0)=ANY=[@ANYBLOB="000026d4f47f000000000000010000000000000000000000140000000000000000000000020000000000000000000000140000000000000000000000020000000000000000000000110000000000000000000000010000000000000000000000110000000000000002000000010000001400000000000000000000000000000000000000070000008300000000960000206a77bdd1a004129054e7704a000000"], 0xf}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="12000000090000000800000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r5}, &(0x7f0000001d80), &(0x7f0000001d40)=r4}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r5, &(0x7f00000006c0), 0x0}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x0) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000050000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000d40)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000005fdb2971dfa2bff372df8cdbeb318ab2bec8fc36903c0ec359ca9daf3c914019395cc154010c693709800000000000000016a85adef34bf78c76e6222337923e1bea6ef682cc4375f594425d408ccc58187feb0e3d43347f989007a7c63f6dae682acb4af936461f34a8a32a50bbbb69ec85168947b86df9f2609bf93f7a1be259621818c3c75da30000bce645451b851111dd98ac4d8da9317c2c082020e0b2d6340809000000000000008e053645cc413790faf7e229c782845b5bb774f7f154263178151ea93ff2cac4b181332c9c9a1c7d85616c8100000000000000d8300d19d585000000fc005774b56a7142047326f940e95b8489e1c5650f5c61299a295f39c88456521cffdef93e29f10f4a11f0cfbfc0ff976b20fe"], &(0x7f0000000080)='GPL\x00', 0x0, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @fallback, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0xf5010000}, 0x6d) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/14], 0x22) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r8, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="d8000000180081054e81f782db4cb904021d080406037c09e8fe55a10a0015400200142603600e122f00160006000400a8000600200005400700027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1, 0x0, 0x0, 0x4a0f0000}, 0x0) 1.327165814s ago: executing program 9 (id=8911): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="010000000c0000000300000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000d00)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280), &(0x7f00000003c0), 0x3b, r0}, 0x38) socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x6c0ec0, 0x0) socket$kcm(0x21, 0x2, 0x2) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000100)='ns/time\x00') perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac59, 0x0, 0x6, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffdbc, &(0x7f0000000080)=[{&(0x7f0000000040)="180000006a00f96b1324", 0x18}], 0x1}, 0x4080) socket$kcm(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f0000"], 0x48) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46a, 0x1, @perf_bp={0x0}, 0x81, 0x3, 0x0, 0x0, 0x1, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f00000000c0)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x12}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)) syz_clone(0x2000, &(0x7f00000001c0)="a50f14127af702ba6fa84e539fe2b135dd812af8f78ed0962bd3e38f3cbeb989f495f05f639cc6ec5d4071384803d6a7a9", 0x31, &(0x7f00000002c0), 0x0, &(0x7f0000000dc0)) socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f00000005c0)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8}, 0x94) 1.227708658s ago: executing program 8 (id=8912): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x10c002, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, 0x0, &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x1000, 0x18}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r1, @ANYRES32, @ANYBLOB="0100"/28], 0x50) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open$cgroup(&(0x7f0000000b40)={0x2, 0x80, 0x8, 0x4, 0x7, 0x6, 0x0, 0xefd1, 0x80000, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xc8, 0x2, @perf_config_ext={0x7ff, 0x9}, 0x100000, 0x90c4, 0x2, 0x1, 0x2, 0xfffffff7, 0xff, 0x0, 0xe1}, r2, 0xf, 0xffffffffffffffff, 0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xd, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="850000006c0000009c0000000000000025000000fffffff195"], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x91, &(0x7f0000000180)=""/145, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r4 = socket$kcm(0x11, 0x200000000000003, 0x300) socket$kcm(0x1e, 0x4, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) r5 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r5, 0x0, 0x3000c085) socket$kcm(0x2, 0x0, 0x84) socket$kcm(0x2, 0x200000000000001, 0x106) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x8902, &(0x7f00000005c0)={r4, r3}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetlb.1GB.usage_in_bytes\x00', 0x26e1, 0x0) syz_clone(0x630c0700, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0x2ee0}], 0x13, 0x0, 0x0, 0x10000000}, 0x12cd) 907.707259ms ago: executing program 0 (id=8913): perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x16, 0x1c, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000100000850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000008000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b80a000500000000", &(0x7f0000000300)=""/8, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 657.497447ms ago: executing program 0 (id=8914): r0 = socket$kcm(0x11, 0x2, 0x300) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180)=r2, 0x4) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r3 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)='`\x00', 0x2}], 0x1}, 0x0) 569.66803ms ago: executing program 0 (id=8915): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000007044f16c01b1fbfd000000000000008af65f0df9928941994cc8c173fac5688671085a86d143c59fed0e57feb97f422c51d8e63b4ed9e295df3ccd1a55752dfc2f32f14b6c8f0e7413c3e9caaad30dcb412d0f54623f388bb2c63d2b1f7d83cd0cc021867bb4aee9967a6ee83e1b18fd8beca7d7eddcd96634"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000000c0)={0x0, 0x1}, 0x1}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000000000000000000000000000007fffffff0001"], 0xfdef) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="d8000000210081044e81f782db44a904020000000000000000000005100013", 0x1f}], 0x1}, 0x4090) r1 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0439000020"], 0x33fe0) 538.590591ms ago: executing program 8 (id=8916): socket$kcm(0xa, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x189703, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f0000000180)={'syzkaller0\x00'}) close(r0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000012000000000000000000"], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20000000) r2 = getpid() perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x2, 0x3cd, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, r2, 0x0, 0xffffffffffffffff, 0x2) 228.275012ms ago: executing program 9 (id=8917): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 227.457122ms ago: executing program 0 (id=8918): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019000800004460bc06000000a701251e6182949a3651fbffffffd4d4938037e7c7a0a03400ac09c51c268811000096859fc57a00000000000000002571cd53b9851b30", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000340)=""/174, 0xae}, {&(0x7f0000000500)=""/232, 0xe8}, {&(0x7f0000001b40)=""/4065, 0xfe1}, {&(0x7f0000000940)=""/4124, 0x101c}, {&(0x7f0000000100)=""/55, 0x37}, {&(0x7f0000000000)=""/40, 0x28}], 0x6}, 0x20) recvmsg$kcm(r0, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x80) 761.21µs ago: executing program 8 (id=8919): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x11, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000002e00)={&(0x7f0000000fc0)=@qipcrtr={0x2a, 0x3, 0x4001}, 0x80, &(0x7f0000002cc0)=[{0x0}, {&(0x7f0000002bc0)="78434bddd1e9fc8471790972292580cafad2e867e126997ef202e17c95b89f4cc62537355d972b6ecdcfac187cb4305205e8dec958ec3e0ff359960eed5110a51460161c156de9fc851a7d03dfe00ebcac20e6ab24b6dbe1f0a9533297ea98374fca12d02aa4390663750bf75b304cc4f2811da629751e284eb70560c7c5f1bc9f01bb55b08db5b475", 0x89}, {&(0x7f0000002c80)="0bd4fe3a86aad8954013a875403edb97bfcd821392bc64d27c9934ba8e323d2b528d085d8fbbd8ce", 0x28}], 0x3, &(0x7f0000002d00)=[@timestamping={{0x14, 0x1, 0x25, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @mark={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x79}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}], 0xc0}, 0x8000) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc", 0xae}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03", 0x70}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f354", 0x14}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {0x0}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002680)=@bpf_ext={0x1c, 0xc, &(0x7f00000014c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7ff}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0xd}, @call={0x85, 0x0, 0x0, 0x3d}]}, &(0x7f0000002640)='GPL\x00', 0x4333, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000025c0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x2caad, 0xffffffffffffffff, 0x0, &(0x7f0000002600), &(0x7f0000002f00), 0x10, 0x3275}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@cgroup, 0x34, 0x0, 0xfffffffa, 0x0, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)=[0x0, 0x0, 0x0], 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1f, 0xc, 0x0, 0x0, 0x4001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000002780)='syz0\x00', 0x200002, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002a40)={0x18, 0x13, &(0x7f00000027c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@btf_id={0x18, 0xa, 0x3, 0x0, 0x4}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffe}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000002880)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x43, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002900)={0x5, 0x7, 0x6, 0x8}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000002940)=[0x1, 0x1], &(0x7f0000002980)=[{0x5, 0x1, 0x8, 0x8}, {0x5, 0x2, 0x4, 0x4}, {0x3, 0x2, 0x0, 0x4}, {0x5, 0x2, 0x8, 0x1}, {0x4, 0x1, 0x3, 0xc}, {0x1, 0x2, 0x9, 0x9}, {0x2, 0x3, 0x2, 0x6}], 0x10, 0x4}, 0x94) perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="14000000040000000400000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000002740)={@cgroup=r4, 0xffffffffffffffff, 0x34, 0x1, r2, @void, @value=r5, @void, @void, r3}, 0x20) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000040), 0x4) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0x3f, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000780)='y', &(0x7f0000001a40), 0x1007, r6}, 0x38) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0}, 0x100080, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xdb}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000600)={0x0, &(0x7f00000006c0)=""/145, &(0x7f0000000480), &(0x7f0000000780), 0x4, r6}, 0x38) 0s ago: executing program 9 (id=8920): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xf6}, 0x10c002, 0xac5d, 0x6, 0x0, 0x405}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)="d8000000180081044e81f782db4cb9041c1d0800fe007c05e8fe55b204000100ff02142603600e12080005007a010401a80016002000034004020000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f01ea23b77edf704bc2ce8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350d3798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) socket$kcm(0x10, 0x3, 0x10) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x9, 0x7, 0x6, 0xf, 0x40000, 0xffffffffffffffff, 0x8, '\x00', r3, r2, 0x4, 0x4}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x4, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3, 0xffffffffffffffff, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000ff80850000002d00000018110000", @ANYRES32=r4, @ANYBLOB], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) socketpair(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8924, &(0x7f0000000080)) kernel console output (not intermixed with test programs): zkaller #0 [ 1739.540221][ T1322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1739.550299][ T1322] Call Trace: [ 1739.553600][ T1322] [ 1739.556550][ T1322] dump_stack_lvl+0x18c/0x250 [ 1739.561265][ T1322] ? show_regs_print_info+0x20/0x20 [ 1739.566489][ T1322] ? load_image+0x420/0x420 [ 1739.571019][ T1322] ? __might_sleep+0xe0/0xe0 [ 1739.575632][ T1322] ? __lock_acquire+0x7d40/0x7d40 [ 1739.580732][ T1322] should_fail_ex+0x39d/0x4d0 [ 1739.585432][ T1322] should_failslab+0x9/0x20 [ 1739.589935][ T1322] slab_pre_alloc_hook+0x59/0x310 [ 1739.594957][ T1322] ? bpf_prog_test_run_skb+0x238/0x12b0 [ 1739.600496][ T1322] ? bpf_prog_test_run_skb+0x238/0x12b0 [ 1739.606034][ T1322] __kmem_cache_alloc_node+0x53/0x250 [ 1739.611403][ T1322] ? bpf_prog_test_run_skb+0x238/0x12b0 [ 1739.616940][ T1322] __kmalloc+0xa4/0x230 [ 1739.621093][ T1322] bpf_prog_test_run_skb+0x238/0x12b0 [ 1739.626459][ T1322] ? __fget_files+0x28/0x4b0 [ 1739.631046][ T1322] ? __fget_files+0x28/0x4b0 [ 1739.635634][ T1322] ? __fget_files+0x43d/0x4b0 [ 1739.640317][ T1322] ? cpu_online+0x60/0x60 [ 1739.644639][ T1322] bpf_prog_test_run+0x321/0x390 [ 1739.649581][ T1322] __sys_bpf+0x49d/0x890 [ 1739.653825][ T1322] ? bpf_link_show_fdinfo+0x390/0x390 [ 1739.659200][ T1322] ? lock_chain_count+0x20/0x20 [ 1739.664051][ T1322] __x64_sys_bpf+0x7c/0x90 [ 1739.668457][ T1322] do_syscall_64+0x55/0xb0 [ 1739.672862][ T1322] ? clear_bhb_loop+0x40/0x90 [ 1739.677532][ T1322] ? clear_bhb_loop+0x40/0x90 [ 1739.682205][ T1322] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1739.688092][ T1322] RIP: 0033:0x7efcb8d9ce59 [ 1739.692506][ T1322] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1739.712114][ T1322] RSP: 002b:00007efcb9bec028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1739.720522][ T1322] RAX: ffffffffffffffda RBX: 00007efcb9015fa0 RCX: 00007efcb8d9ce59 [ 1739.728482][ T1322] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 1739.736444][ T1322] RBP: 00007efcb9bec090 R08: 0000000000000000 R09: 0000000000000000 [ 1739.744407][ T1322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1739.752369][ T1322] R13: 00007efcb9016038 R14: 00007efcb9015fa0 R15: 00007ffedc97a728 [ 1739.760341][ T1322] [ 1742.102957][ T1361] FAULT_INJECTION: forcing a failure. [ 1742.102957][ T1361] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1742.201789][ T1361] CPU: 1 PID: 1361 Comm: syz.1.8088 Not tainted syzkaller #0 [ 1742.209233][ T1361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1742.219315][ T1361] Call Trace: [ 1742.222613][ T1361] [ 1742.225564][ T1361] dump_stack_lvl+0x18c/0x250 [ 1742.230270][ T1361] ? show_regs_print_info+0x20/0x20 [ 1742.235491][ T1361] ? load_image+0x420/0x420 [ 1742.240031][ T1361] ? __lock_acquire+0x7d40/0x7d40 [ 1742.245086][ T1361] should_fail_ex+0x39d/0x4d0 [ 1742.249794][ T1361] _copy_from_user+0x2f/0xe0 [ 1742.254409][ T1361] __copy_msghdr+0x3bb/0x580 [ 1742.259029][ T1361] ___sys_sendmsg+0x214/0x360 [ 1742.263740][ T1361] ? __sys_sendmsg+0x2a0/0x2a0 [ 1742.268550][ T1361] ? trace_call_bpf+0xc3/0x6c0 [ 1742.273361][ T1361] __se_sys_sendmsg+0x1c2/0x2b0 [ 1742.278235][ T1361] ? __x64_sys_sendmsg+0x80/0x80 [ 1742.283214][ T1361] ? lockdep_hardirqs_on+0x98/0x150 [ 1742.288441][ T1361] do_syscall_64+0x55/0xb0 [ 1742.292876][ T1361] ? clear_bhb_loop+0x40/0x90 [ 1742.297581][ T1361] ? clear_bhb_loop+0x40/0x90 [ 1742.302280][ T1361] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1742.308195][ T1361] RIP: 0033:0x7efcb8d9ce59 [ 1742.312624][ T1361] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1742.332236][ T1361] RSP: 002b:00007efcb9bec028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1742.340648][ T1361] RAX: ffffffffffffffda RBX: 00007efcb9015fa0 RCX: 00007efcb8d9ce59 [ 1742.348611][ T1361] RDX: 000000000000e900 RSI: 0000200000000b40 RDI: 0000000000000003 [ 1742.356576][ T1361] RBP: 00007efcb9bec090 R08: 0000000000000000 R09: 0000000000000000 [ 1742.364541][ T1361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1742.372588][ T1361] R13: 00007efcb9016038 R14: 00007efcb9015fa0 R15: 00007ffedc97a728 [ 1742.380563][ T1361] [ 1742.833922][ T1365] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8090'. [ 1743.200964][ T1374] netlink: 'syz.9.8092': attribute type 39 has an invalid length. [ 1744.477808][ T1387] netlink: 'syz.0.8095': attribute type 19 has an invalid length. [ 1744.502687][ T1387] netlink: 40 bytes leftover after parsing attributes in process `syz.0.8095'. [ 1745.279748][ T1404] netlink: 199836 bytes leftover after parsing attributes in process `syz.8.8098'. [ 1746.406612][ T1423] netlink: 830 bytes leftover after parsing attributes in process `syz.8.8101'. [ 1747.986095][ T1442] netlink: 'syz.0.8107': attribute type 19 has an invalid length. [ 1748.025163][ T1442] netlink: 40 bytes leftover after parsing attributes in process `syz.0.8107'. [ 1748.463451][ T1449] netlink: 199836 bytes leftover after parsing attributes in process `syz.9.8109'. [ 1750.244306][ T1465] FAULT_INJECTION: forcing a failure. [ 1750.244306][ T1465] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1750.332692][ T1465] CPU: 1 PID: 1465 Comm: syz.1.8115 Not tainted syzkaller #0 [ 1750.340129][ T1465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1750.350204][ T1465] Call Trace: [ 1750.353500][ T1465] [ 1750.356449][ T1465] dump_stack_lvl+0x18c/0x250 [ 1750.361162][ T1465] ? show_regs_print_info+0x20/0x20 [ 1750.366395][ T1465] ? load_image+0x420/0x420 [ 1750.370925][ T1465] ? __might_fault+0xaa/0x120 [ 1750.375626][ T1465] ? __lock_acquire+0x7d40/0x7d40 [ 1750.380673][ T1465] should_fail_ex+0x39d/0x4d0 [ 1750.385390][ T1465] _copy_from_user+0x2f/0xe0 [ 1750.390000][ T1465] __sys_bpf+0x23e/0x890 [ 1750.394263][ T1465] ? bpf_link_show_fdinfo+0x390/0x390 [ 1750.399663][ T1465] ? lock_chain_count+0x20/0x20 [ 1750.404516][ T1465] __x64_sys_bpf+0x7c/0x90 [ 1750.408925][ T1465] do_syscall_64+0x55/0xb0 [ 1750.413347][ T1465] ? clear_bhb_loop+0x40/0x90 [ 1750.418292][ T1465] ? clear_bhb_loop+0x40/0x90 [ 1750.422973][ T1465] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1750.428873][ T1465] RIP: 0033:0x7efcb8d9ce59 [ 1750.433288][ T1465] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1750.452893][ T1465] RSP: 002b:00007efcb9bec028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1750.461301][ T1465] RAX: ffffffffffffffda RBX: 00007efcb9015fa0 RCX: 00007efcb8d9ce59 [ 1750.469263][ T1465] RDX: 0000000000000038 RSI: 00002000000001c0 RDI: 000000000000001a [ 1750.477222][ T1465] RBP: 00007efcb9bec090 R08: 0000000000000000 R09: 0000000000000000 [ 1750.485184][ T1465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1750.493150][ T1465] R13: 00007efcb9016038 R14: 00007efcb9015fa0 R15: 00007ffedc97a728 [ 1750.501127][ T1465] [ 1751.786305][ T1487] netlink: 'syz.1.8118': attribute type 19 has an invalid length. [ 1751.948203][ T1498] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.8121'. [ 1751.992220][ T1487] netlink: 40 bytes leftover after parsing attributes in process `syz.1.8118'. [ 1753.091793][ T1511] FAULT_INJECTION: forcing a failure. [ 1753.091793][ T1511] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1753.372730][ T1511] CPU: 0 PID: 1511 Comm: syz.1.8123 Not tainted syzkaller #0 [ 1753.380177][ T1511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1753.390253][ T1511] Call Trace: [ 1753.393550][ T1511] [ 1753.396495][ T1511] dump_stack_lvl+0x18c/0x250 [ 1753.401203][ T1511] ? show_regs_print_info+0x20/0x20 [ 1753.406426][ T1511] ? load_image+0x420/0x420 [ 1753.410955][ T1511] ? __might_fault+0xaa/0x120 [ 1753.415655][ T1511] ? __lock_acquire+0x7d40/0x7d40 [ 1753.420729][ T1511] should_fail_ex+0x39d/0x4d0 [ 1753.425437][ T1511] _copy_from_user+0x2f/0xe0 [ 1753.430080][ T1511] kstrtouint_from_user+0xde/0x170 [ 1753.435221][ T1511] ? kstrtol_from_user+0x190/0x190 [ 1753.440374][ T1511] proc_fail_nth_write+0x8f/0x250 [ 1753.445421][ T1511] ? proc_fail_nth_read+0x260/0x260 [ 1753.450643][ T1511] ? proc_fail_nth_read+0x260/0x260 [ 1753.455863][ T1511] vfs_write+0x296/0x990 [ 1753.460135][ T1511] ? file_end_write+0x250/0x250 [ 1753.465007][ T1511] ? __fget_files+0x28/0x4b0 [ 1753.469636][ T1511] ? __fget_files+0x28/0x4b0 [ 1753.474253][ T1511] ? __fget_files+0x43d/0x4b0 [ 1753.478976][ T1511] ? __fdget_pos+0x2a3/0x330 [ 1753.483604][ T1511] ? ksys_write+0x75/0x260 [ 1753.488052][ T1511] ksys_write+0x150/0x260 [ 1753.492407][ T1511] ? __ia32_sys_read+0x90/0x90 [ 1753.497197][ T1511] ? lockdep_hardirqs_on+0x98/0x150 [ 1753.502423][ T1511] do_syscall_64+0x55/0xb0 [ 1753.506859][ T1511] ? clear_bhb_loop+0x40/0x90 [ 1753.511558][ T1511] ? clear_bhb_loop+0x40/0x90 [ 1753.516258][ T1511] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1753.522176][ T1511] RIP: 0033:0x7efcb8d5d68e [ 1753.526609][ T1511] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1753.546234][ T1511] RSP: 002b:00007efcb9bcafe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1753.554699][ T1511] RAX: ffffffffffffffda RBX: 00007efcb9bcb6c0 RCX: 00007efcb8d5d68e [ 1753.562683][ T1511] RDX: 0000000000000001 RSI: 00007efcb9bcb0a0 RDI: 0000000000000004 [ 1753.570669][ T1511] RBP: 00007efcb9bcb090 R08: 0000000000000000 R09: 0000000000000000 [ 1753.578660][ T1511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1753.586649][ T1511] R13: 00007efcb9016128 R14: 00007efcb9016090 R15: 00007ffedc97a728 [ 1753.594659][ T1511] [ 1754.495748][ T1516] netlink: 'syz.8.8126': attribute type 10 has an invalid length. [ 1754.684352][ T1516] team0: Device ipvlan1 failed to register rx_handler [ 1755.863809][ T1543] FAULT_INJECTION: forcing a failure. [ 1755.863809][ T1543] name failslab, interval 1, probability 0, space 0, times 0 [ 1755.951014][ T1543] CPU: 1 PID: 1543 Comm: syz.9.8132 Not tainted syzkaller #0 [ 1755.958464][ T1543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1755.968542][ T1543] Call Trace: [ 1755.971840][ T1543] [ 1755.974789][ T1543] dump_stack_lvl+0x18c/0x250 [ 1755.979495][ T1543] ? show_regs_print_info+0x20/0x20 [ 1755.984710][ T1543] ? load_image+0x420/0x420 [ 1755.989221][ T1543] ? __might_sleep+0xe0/0xe0 [ 1755.993813][ T1543] ? __lock_acquire+0x7d40/0x7d40 [ 1755.998844][ T1543] should_fail_ex+0x39d/0x4d0 [ 1756.003543][ T1543] should_failslab+0x9/0x20 [ 1756.008071][ T1543] slab_pre_alloc_hook+0x59/0x310 [ 1756.013119][ T1543] ? perf_trace_lock_acquire+0x104/0x410 [ 1756.018775][ T1543] ? bpf_prog_test_run_flow_dissector+0x259/0x640 [ 1756.025270][ T1543] ? bpf_prog_test_run_flow_dissector+0x259/0x640 [ 1756.031684][ T1543] __kmem_cache_alloc_node+0x53/0x250 [ 1756.037081][ T1543] ? bpf_prog_test_run_flow_dissector+0x259/0x640 [ 1756.043521][ T1543] __kmalloc+0xa4/0x230 [ 1756.047696][ T1543] bpf_prog_test_run_flow_dissector+0x259/0x640 [ 1756.053962][ T1543] ? xdp_convert_buff_to_md+0x200/0x200 [ 1756.059529][ T1543] ? __fget_files+0x28/0x4b0 [ 1756.064133][ T1543] ? __fget_files+0x28/0x4b0 [ 1756.068735][ T1543] ? __fget_files+0x43d/0x4b0 [ 1756.073429][ T1543] ? xdp_convert_buff_to_md+0x200/0x200 [ 1756.078983][ T1543] bpf_prog_test_run+0x321/0x390 [ 1756.083927][ T1543] __sys_bpf+0x49d/0x890 [ 1756.088189][ T1543] ? bpf_link_show_fdinfo+0x390/0x390 [ 1756.093580][ T1543] ? lock_chain_count+0x20/0x20 [ 1756.098451][ T1543] __x64_sys_bpf+0x7c/0x90 [ 1756.102897][ T1543] do_syscall_64+0x55/0xb0 [ 1756.107331][ T1543] ? clear_bhb_loop+0x40/0x90 [ 1756.112034][ T1543] ? clear_bhb_loop+0x40/0x90 [ 1756.116742][ T1543] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1756.122734][ T1543] RIP: 0033:0x7ffa4d19ce59 [ 1756.127149][ T1543] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1756.146769][ T1543] RSP: 002b:00007ffa4e047028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1756.155196][ T1543] RAX: ffffffffffffffda RBX: 00007ffa4d415fa0 RCX: 00007ffa4d19ce59 [ 1756.163167][ T1543] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 1756.171146][ T1543] RBP: 00007ffa4e047090 R08: 0000000000000000 R09: 0000000000000000 [ 1756.179116][ T1543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1756.187108][ T1543] R13: 00007ffa4d416038 R14: 00007ffa4d415fa0 R15: 00007ffd52d64098 [ 1756.195092][ T1543] [ 1756.613326][ T1547] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.8133'. [ 1759.926335][ T1579] FAULT_INJECTION: forcing a failure. [ 1759.926335][ T1579] name failslab, interval 1, probability 0, space 0, times 0 [ 1760.063459][ T1579] CPU: 1 PID: 1579 Comm: syz.8.8142 Not tainted syzkaller #0 [ 1760.070933][ T1579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1760.081034][ T1579] Call Trace: [ 1760.084358][ T1579] [ 1760.087325][ T1579] dump_stack_lvl+0x18c/0x250 [ 1760.092057][ T1579] ? show_regs_print_info+0x20/0x20 [ 1760.097304][ T1579] ? load_image+0x420/0x420 [ 1760.101878][ T1579] ? __might_sleep+0xe0/0xe0 [ 1760.106525][ T1579] ? __lock_acquire+0x7d40/0x7d40 [ 1760.111618][ T1579] should_fail_ex+0x39d/0x4d0 [ 1760.116369][ T1579] should_failslab+0x9/0x20 [ 1760.120920][ T1579] slab_pre_alloc_hook+0x59/0x310 [ 1760.126004][ T1579] ? tomoyo_encode+0x28b/0x540 [ 1760.130816][ T1579] ? tomoyo_encode+0x28b/0x540 [ 1760.135622][ T1579] __kmem_cache_alloc_node+0x53/0x250 [ 1760.141067][ T1579] ? tomoyo_encode+0x28b/0x540 [ 1760.145873][ T1579] __kmalloc+0xa4/0x230 [ 1760.150091][ T1579] tomoyo_encode+0x28b/0x540 [ 1760.154753][ T1579] tomoyo_realpath_from_path+0x592/0x5d0 [ 1760.160480][ T1579] tomoyo_path_number_perm+0x248/0x620 [ 1760.165994][ T1579] ? tomoyo_path_number_perm+0x217/0x620 [ 1760.171684][ T1579] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 1760.177206][ T1579] ? trace_call_bpf+0xc3/0x6c0 [ 1760.182020][ T1579] ? trace_call_bpf+0xc3/0x6c0 [ 1760.186840][ T1579] ? trace_call_bpf+0x5e9/0x6c0 [ 1760.191858][ T1579] ? __fget_files+0x28/0x4b0 [ 1760.196492][ T1579] ? __fget_files+0x28/0x4b0 [ 1760.201173][ T1579] security_file_ioctl+0x70/0xa0 [ 1760.206170][ T1579] __se_sys_ioctl+0x48/0x170 [ 1760.210818][ T1579] do_syscall_64+0x55/0xb0 [ 1760.215275][ T1579] ? clear_bhb_loop+0x40/0x90 [ 1760.220000][ T1579] ? clear_bhb_loop+0x40/0x90 [ 1760.224736][ T1579] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1760.230674][ T1579] RIP: 0033:0x7f3ecab9ce59 [ 1760.235138][ T1579] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1760.254796][ T1579] RSP: 002b:00007f3ecb96e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1760.263263][ T1579] RAX: ffffffffffffffda RBX: 00007f3ecae15fa0 RCX: 00007f3ecab9ce59 [ 1760.271267][ T1579] RDX: 0000200000000040 RSI: 00000000000089e1 RDI: 0000000000000005 [ 1760.279278][ T1579] RBP: 00007f3ecb96e090 R08: 0000000000000000 R09: 0000000000000000 [ 1760.287295][ T1579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1760.295303][ T1579] R13: 00007f3ecae16038 R14: 00007f3ecae15fa0 R15: 00007fff0c6bff68 [ 1760.303367][ T1579] [ 1760.377438][ T1579] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1760.723584][ T1587] netlink: 'syz.8.8143': attribute type 10 has an invalid length. [ 1760.731645][ T1587] netlink: 55 bytes leftover after parsing attributes in process `syz.8.8143'. [ 1761.365854][ T1595] netlink: 199836 bytes leftover after parsing attributes in process `syz.9.8145'. [ 1762.747142][ T1588] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8143'. [ 1763.153986][ T1613] netlink: 'syz.8.8148': attribute type 19 has an invalid length. [ 1763.172953][ T1613] netlink: 40 bytes leftover after parsing attributes in process `syz.8.8148'. [ 1764.269370][ T1627] netlink: 'syz.1.8151': attribute type 19 has an invalid length. [ 1764.326747][ T1627] netlink: 40 bytes leftover after parsing attributes in process `syz.1.8151'. [ 1764.344392][ T1631] netlink: 'syz.8.8152': attribute type 4 has an invalid length. [ 1767.617654][ T1644] FAULT_INJECTION: forcing a failure. [ 1767.617654][ T1644] name failslab, interval 1, probability 0, space 0, times 0 [ 1767.678534][ T1644] CPU: 1 PID: 1644 Comm: syz.1.8157 Not tainted syzkaller #0 [ 1767.685964][ T1644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1767.696034][ T1644] Call Trace: [ 1767.699326][ T1644] [ 1767.702264][ T1644] dump_stack_lvl+0x18c/0x250 [ 1767.706971][ T1644] ? show_regs_print_info+0x20/0x20 [ 1767.712198][ T1644] ? load_image+0x420/0x420 [ 1767.716724][ T1644] ? __might_sleep+0xe0/0xe0 [ 1767.721331][ T1644] ? __lock_acquire+0x7d40/0x7d40 [ 1767.726382][ T1644] should_fail_ex+0x39d/0x4d0 [ 1767.731088][ T1644] should_failslab+0x9/0x20 [ 1767.735597][ T1644] slab_pre_alloc_hook+0x59/0x310 [ 1767.740627][ T1644] ? __lock_acquire+0x7d40/0x7d40 [ 1767.745655][ T1644] kmem_cache_alloc_node+0x60/0x320 [ 1767.750851][ T1644] ? __alloc_skb+0x103/0x2c0 [ 1767.755434][ T1644] __alloc_skb+0x103/0x2c0 [ 1767.759846][ T1644] netlink_sendmsg+0x66a/0xbf0 [ 1767.764616][ T1644] ? netlink_getsockopt+0x590/0x590 [ 1767.769811][ T1644] ? aa_sock_msg_perm+0x94/0x150 [ 1767.774744][ T1644] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1767.780022][ T1644] ? security_socket_sendmsg+0x80/0xa0 [ 1767.785472][ T1644] ? netlink_getsockopt+0x590/0x590 [ 1767.790672][ T1644] ____sys_sendmsg+0x5ba/0x960 [ 1767.795436][ T1644] ? __asan_memset+0x22/0x40 [ 1767.800020][ T1644] ? __sys_sendmsg_sock+0x30/0x30 [ 1767.805033][ T1644] ? __import_iovec+0x5f2/0x850 [ 1767.809881][ T1644] ? import_iovec+0x73/0xa0 [ 1767.814377][ T1644] ___sys_sendmsg+0x2a6/0x360 [ 1767.819048][ T1644] ? __sys_sendmsg+0x2a0/0x2a0 [ 1767.823821][ T1644] ? __lock_acquire+0x7d40/0x7d40 [ 1767.828858][ T1644] __se_sys_sendmsg+0x1c2/0x2b0 [ 1767.833700][ T1644] ? __x64_sys_sendmsg+0x80/0x80 [ 1767.838640][ T1644] ? lockdep_hardirqs_on+0x98/0x150 [ 1767.843834][ T1644] do_syscall_64+0x55/0xb0 [ 1767.848239][ T1644] ? clear_bhb_loop+0x40/0x90 [ 1767.852911][ T1644] ? clear_bhb_loop+0x40/0x90 [ 1767.857580][ T1644] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1767.863465][ T1644] RIP: 0033:0x7efcb8d9ce59 [ 1767.867873][ T1644] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1767.887472][ T1644] RSP: 002b:00007efcb9bec028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1767.895879][ T1644] RAX: ffffffffffffffda RBX: 00007efcb9015fa0 RCX: 00007efcb8d9ce59 [ 1767.903841][ T1644] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 1767.911801][ T1644] RBP: 00007efcb9bec090 R08: 0000000000000000 R09: 0000000000000000 [ 1767.919760][ T1644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1767.927721][ T1644] R13: 00007efcb9016038 R14: 00007efcb9015fa0 R15: 00007ffedc97a728 [ 1767.935696][ T1644] [ 1768.103002][ T1646] netlink: 199836 bytes leftover after parsing attributes in process `syz.9.8158'. [ 1768.364190][ T1652] netlink: 'syz.1.8159': attribute type 19 has an invalid length. [ 1768.392761][ T1652] netlink: 40 bytes leftover after parsing attributes in process `syz.1.8159'. [ 1768.869107][ T1662] FAULT_INJECTION: forcing a failure. [ 1768.869107][ T1662] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1768.883450][ T1662] CPU: 0 PID: 1662 Comm: syz.1.8162 Not tainted syzkaller #0 [ 1768.890855][ T1662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1768.900934][ T1662] Call Trace: [ 1768.904230][ T1662] [ 1768.907171][ T1662] dump_stack_lvl+0x18c/0x250 [ 1768.911878][ T1662] ? show_regs_print_info+0x20/0x20 [ 1768.917101][ T1662] ? load_image+0x420/0x420 [ 1768.921635][ T1662] ? __lock_acquire+0x7d40/0x7d40 [ 1768.926690][ T1662] should_fail_ex+0x39d/0x4d0 [ 1768.931402][ T1662] _copy_from_user+0x2f/0xe0 [ 1768.936020][ T1662] __copy_msghdr+0x3bb/0x580 [ 1768.940640][ T1662] ___sys_sendmsg+0x214/0x360 [ 1768.945348][ T1662] ? __sys_sendmsg+0x2a0/0x2a0 [ 1768.950155][ T1662] ? trace_call_bpf+0xc3/0x6c0 [ 1768.954956][ T1662] __se_sys_sendmsg+0x1c2/0x2b0 [ 1768.959806][ T1662] ? __x64_sys_sendmsg+0x80/0x80 [ 1768.964754][ T1662] ? lockdep_hardirqs_on+0x98/0x150 [ 1768.969952][ T1662] do_syscall_64+0x55/0xb0 [ 1768.974361][ T1662] ? clear_bhb_loop+0x40/0x90 [ 1768.979032][ T1662] ? clear_bhb_loop+0x40/0x90 [ 1768.983707][ T1662] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1768.989597][ T1662] RIP: 0033:0x7efcb8d9ce59 [ 1768.994006][ T1662] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1769.013705][ T1662] RSP: 002b:00007efcb9bec028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1769.022124][ T1662] RAX: ffffffffffffffda RBX: 00007efcb9015fa0 RCX: 00007efcb8d9ce59 [ 1769.030103][ T1662] RDX: 000000000004c810 RSI: 0000200000001280 RDI: 0000000000000003 [ 1769.038080][ T1662] RBP: 00007efcb9bec090 R08: 0000000000000000 R09: 0000000000000000 [ 1769.046050][ T1662] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1769.054016][ T1662] R13: 00007efcb9016038 R14: 00007efcb9015fa0 R15: 00007ffedc97a728 [ 1769.061995][ T1662] [ 1769.398611][ T1670] netlink: 'syz.1.8165': attribute type 39 has an invalid length. [ 1770.209602][ T1682] FAULT_INJECTION: forcing a failure. [ 1770.209602][ T1682] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1770.281693][ T1682] CPU: 0 PID: 1682 Comm: syz.8.8169 Not tainted syzkaller #0 [ 1770.289123][ T1682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1770.299175][ T1682] Call Trace: [ 1770.302447][ T1682] [ 1770.305378][ T1682] dump_stack_lvl+0x18c/0x250 [ 1770.310056][ T1682] ? show_regs_print_info+0x20/0x20 [ 1770.315251][ T1682] ? load_image+0x420/0x420 [ 1770.319754][ T1682] ? __lock_acquire+0x7d40/0x7d40 [ 1770.324778][ T1682] should_fail_ex+0x39d/0x4d0 [ 1770.329460][ T1682] _copy_from_user+0x2f/0xe0 [ 1770.334049][ T1682] __copy_msghdr+0x3bb/0x580 [ 1770.338635][ T1682] ___sys_sendmsg+0x214/0x360 [ 1770.343309][ T1682] ? __sys_sendmsg+0x2a0/0x2a0 [ 1770.348082][ T1682] ? __lock_acquire+0x7d40/0x7d40 [ 1770.353121][ T1682] __se_sys_sendmsg+0x1c2/0x2b0 [ 1770.357968][ T1682] ? __x64_sys_sendmsg+0x80/0x80 [ 1770.362909][ T1682] ? trace_sys_enter+0x1f/0x80 [ 1770.367672][ T1682] do_syscall_64+0x55/0xb0 [ 1770.372078][ T1682] ? clear_bhb_loop+0x40/0x90 [ 1770.376752][ T1682] ? clear_bhb_loop+0x40/0x90 [ 1770.381425][ T1682] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1770.387315][ T1682] RIP: 0033:0x7f3ecab9ce59 [ 1770.391723][ T1682] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1770.411328][ T1682] RSP: 002b:00007f3ecb96e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1770.419737][ T1682] RAX: ffffffffffffffda RBX: 00007f3ecae15fa0 RCX: 00007f3ecab9ce59 [ 1770.427703][ T1682] RDX: 000000000000ff00 RSI: 0000200000001180 RDI: 0000000000000003 [ 1770.435667][ T1682] RBP: 00007f3ecb96e090 R08: 0000000000000000 R09: 0000000000000000 [ 1770.443640][ T1682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1770.451601][ T1682] R13: 00007f3ecae16038 R14: 00007f3ecae15fa0 R15: 00007fff0c6bff68 [ 1770.459584][ T1682] [ 1770.515550][ T1683] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.8170'. [ 1770.909710][ T1689] netlink: 'syz.8.8171': attribute type 19 has an invalid length. [ 1770.933689][ T1689] netlink: 40 bytes leftover after parsing attributes in process `syz.8.8171'. [ 1771.091654][ T1692] FAULT_INJECTION: forcing a failure. [ 1771.091654][ T1692] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1771.112962][ T1692] CPU: 0 PID: 1692 Comm: syz.1.8173 Not tainted syzkaller #0 [ 1771.120381][ T1692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1771.130454][ T1692] Call Trace: [ 1771.133753][ T1692] [ 1771.136702][ T1692] dump_stack_lvl+0x18c/0x250 [ 1771.141413][ T1692] ? show_regs_print_info+0x20/0x20 [ 1771.146638][ T1692] ? load_image+0x420/0x420 [ 1771.151177][ T1692] ? __might_fault+0xaa/0x120 [ 1771.155877][ T1692] ? __lock_acquire+0x7d40/0x7d40 [ 1771.160932][ T1692] should_fail_ex+0x39d/0x4d0 [ 1771.165646][ T1692] _copy_to_user+0x2f/0xa0 [ 1771.170080][ T1692] bpf_prog_test_run_raw_tp+0x4ca/0x660 [ 1771.175668][ T1692] ? trace_bpf_test_finish+0x1a0/0x1a0 [ 1771.181168][ T1692] ? trace_bpf_test_finish+0x1a0/0x1a0 [ 1771.186651][ T1692] bpf_prog_test_run+0x321/0x390 [ 1771.191618][ T1692] __sys_bpf+0x49d/0x890 [ 1771.195885][ T1692] ? bpf_link_show_fdinfo+0x390/0x390 [ 1771.201294][ T1692] ? lock_chain_count+0x20/0x20 [ 1771.206179][ T1692] __x64_sys_bpf+0x7c/0x90 [ 1771.210617][ T1692] do_syscall_64+0x55/0xb0 [ 1771.215052][ T1692] ? clear_bhb_loop+0x40/0x90 [ 1771.219755][ T1692] ? clear_bhb_loop+0x40/0x90 [ 1771.224455][ T1692] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1771.230374][ T1692] RIP: 0033:0x7efcb8d9ce59 [ 1771.234809][ T1692] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1771.254436][ T1692] RSP: 002b:00007efcb9bec028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1771.262881][ T1692] RAX: ffffffffffffffda RBX: 00007efcb9015fa0 RCX: 00007efcb8d9ce59 [ 1771.270872][ T1692] RDX: 0000000000000010 RSI: 0000200000000740 RDI: 000000000000000a [ 1771.278866][ T1692] RBP: 00007efcb9bec090 R08: 0000000000000000 R09: 0000000000000000 [ 1771.286855][ T1692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1771.294843][ T1692] R13: 00007efcb9016038 R14: 00007efcb9015fa0 R15: 00007ffedc97a728 [ 1771.302844][ T1692] [ 1771.436863][ T1698] netlink: 'syz.9.8174': attribute type 2 has an invalid length. [ 1771.556213][ T1702] netlink: 'syz.8.8176': attribute type 39 has an invalid length. [ 1772.253890][ T1711] netlink: 199836 bytes leftover after parsing attributes in process `syz.8.8181'. [ 1773.026648][ T1715] netlink: 'syz.0.8183': attribute type 19 has an invalid length. [ 1773.063285][ T1715] netlink: 40 bytes leftover after parsing attributes in process `syz.0.8183'. [ 1773.255009][ T1730] netlink: 'syz.9.8188': attribute type 39 has an invalid length. [ 1773.508728][ T1735] netlink: 'syz.1.8192': attribute type 39 has an invalid length. [ 1773.535879][ T1736] FAULT_INJECTION: forcing a failure. [ 1773.535879][ T1736] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1773.582597][ T1736] CPU: 1 PID: 1736 Comm: syz.9.8191 Not tainted syzkaller #0 [ 1773.590039][ T1736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1773.600116][ T1736] Call Trace: [ 1773.603412][ T1736] [ 1773.606357][ T1736] dump_stack_lvl+0x18c/0x250 [ 1773.611061][ T1736] ? show_regs_print_info+0x20/0x20 [ 1773.616279][ T1736] ? load_image+0x420/0x420 [ 1773.620810][ T1736] ? __might_fault+0xaa/0x120 [ 1773.625509][ T1736] ? __lock_acquire+0x7d40/0x7d40 [ 1773.630552][ T1736] ? filp_close+0x10f/0x150 [ 1773.635080][ T1736] should_fail_ex+0x39d/0x4d0 [ 1773.639786][ T1736] _copy_to_user+0x2f/0xa0 [ 1773.644228][ T1736] bpf_prog_test_run_syscall+0x336/0x4a0 [ 1773.649889][ T1736] ? sock_gen_cookie+0x60/0x60 [ 1773.654678][ T1736] ? sock_gen_cookie+0x60/0x60 [ 1773.659462][ T1736] bpf_prog_test_run+0x321/0x390 [ 1773.664424][ T1736] __sys_bpf+0x49d/0x890 [ 1773.668691][ T1736] ? bpf_link_show_fdinfo+0x390/0x390 [ 1773.674100][ T1736] ? lock_chain_count+0x20/0x20 [ 1773.678980][ T1736] __x64_sys_bpf+0x7c/0x90 [ 1773.683438][ T1736] do_syscall_64+0x55/0xb0 [ 1773.687869][ T1736] ? clear_bhb_loop+0x40/0x90 [ 1773.692575][ T1736] ? clear_bhb_loop+0x40/0x90 [ 1773.697272][ T1736] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1773.703182][ T1736] RIP: 0033:0x7ffa4d19ce59 [ 1773.707603][ T1736] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1773.727203][ T1736] RSP: 002b:00007ffa4e047028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1773.735612][ T1736] RAX: ffffffffffffffda RBX: 00007ffa4d415fa0 RCX: 00007ffa4d19ce59 [ 1773.743581][ T1736] RDX: 0000000000000010 RSI: 00002000000006c0 RDI: 000000000000000a [ 1773.751545][ T1736] RBP: 00007ffa4e047090 R08: 0000000000000000 R09: 0000000000000000 [ 1773.759510][ T1736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1773.767472][ T1736] R13: 00007ffa4d416038 R14: 00007ffa4d415fa0 R15: 00007ffd52d64098 [ 1773.775450][ T1736] [ 1773.963269][ T1742] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.8193'. [ 1775.325398][ T1761] netlink: 'syz.1.8199': attribute type 19 has an invalid length. [ 1775.344727][ T1761] netlink: 40 bytes leftover after parsing attributes in process `syz.1.8199'. [ 1775.600253][ T1765] netlink: 'syz.1.8201': attribute type 39 has an invalid length. [ 1775.844225][ T1767] FAULT_INJECTION: forcing a failure. [ 1775.844225][ T1767] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1775.892528][ T1767] CPU: 0 PID: 1767 Comm: syz.0.8202 Not tainted syzkaller #0 [ 1775.899962][ T1767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1775.910039][ T1767] Call Trace: [ 1775.913339][ T1767] [ 1775.916282][ T1767] dump_stack_lvl+0x18c/0x250 [ 1775.920983][ T1767] ? show_regs_print_info+0x20/0x20 [ 1775.926204][ T1767] ? load_image+0x420/0x420 [ 1775.930737][ T1767] ? __lock_acquire+0x7d40/0x7d40 [ 1775.935806][ T1767] should_fail_ex+0x39d/0x4d0 [ 1775.940515][ T1767] _copy_from_user+0x2f/0xe0 [ 1775.945133][ T1767] __copy_msghdr+0x3bb/0x580 [ 1775.949756][ T1767] ___sys_sendmsg+0x214/0x360 [ 1775.954465][ T1767] ? __sys_sendmsg+0x2a0/0x2a0 [ 1775.959280][ T1767] ? __lock_acquire+0x7d40/0x7d40 [ 1775.964357][ T1767] __se_sys_sendmsg+0x1c2/0x2b0 [ 1775.969227][ T1767] ? __x64_sys_sendmsg+0x80/0x80 [ 1775.974202][ T1767] ? trace_sys_enter+0x1f/0x80 [ 1775.978989][ T1767] do_syscall_64+0x55/0xb0 [ 1775.983421][ T1767] ? clear_bhb_loop+0x40/0x90 [ 1775.988121][ T1767] ? clear_bhb_loop+0x40/0x90 [ 1775.992826][ T1767] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1775.998749][ T1767] RIP: 0033:0x7fcc5df9ce59 [ 1776.003186][ T1767] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1776.022812][ T1767] RSP: 002b:00007fcc5eee5028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1776.031250][ T1767] RAX: ffffffffffffffda RBX: 00007fcc5e215fa0 RCX: 00007fcc5df9ce59 [ 1776.039245][ T1767] RDX: 0000000000000040 RSI: 00002000000003c0 RDI: 0000000000000003 [ 1776.047236][ T1767] RBP: 00007fcc5eee5090 R08: 0000000000000000 R09: 0000000000000000 [ 1776.055233][ T1767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1776.063225][ T1767] R13: 00007fcc5e216038 R14: 00007fcc5e215fa0 R15: 00007ffddadbe528 [ 1776.071232][ T1767] [ 1776.206954][ T1779] syzkaller0: entered promiscuous mode [ 1776.233177][ T1779] syzkaller0: entered allmulticast mode [ 1776.562324][ T1784] FAULT_INJECTION: forcing a failure. [ 1776.562324][ T1784] name failslab, interval 1, probability 0, space 0, times 0 [ 1776.589461][ T1784] CPU: 1 PID: 1784 Comm: syz.0.8207 Not tainted syzkaller #0 [ 1776.596891][ T1784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1776.606965][ T1784] Call Trace: [ 1776.610258][ T1784] [ 1776.613212][ T1784] dump_stack_lvl+0x18c/0x250 [ 1776.617910][ T1784] ? show_regs_print_info+0x20/0x20 [ 1776.623127][ T1784] ? load_image+0x420/0x420 [ 1776.627657][ T1784] ? __lock_acquire+0x7d40/0x7d40 [ 1776.632706][ T1784] should_fail_ex+0x39d/0x4d0 [ 1776.637422][ T1784] should_failslab+0x9/0x20 [ 1776.641949][ T1784] slab_pre_alloc_hook+0x59/0x310 [ 1776.647006][ T1784] ? bpf_test_init+0x9f/0x140 [ 1776.651707][ T1784] ? bpf_test_init+0x9f/0x140 [ 1776.656405][ T1784] __kmem_cache_alloc_node+0x53/0x250 [ 1776.661807][ T1784] ? bpf_test_init+0x9f/0x140 [ 1776.666504][ T1784] __kmalloc+0xa4/0x230 [ 1776.670692][ T1784] bpf_test_init+0x9f/0x140 [ 1776.675226][ T1784] bpf_prog_test_run_xdp+0x4d1/0x10e0 [ 1776.680636][ T1784] ? dev_put+0x80/0x80 [ 1776.684744][ T1784] ? dev_put+0x80/0x80 [ 1776.688832][ T1784] bpf_prog_test_run+0x321/0x390 [ 1776.693793][ T1784] __sys_bpf+0x49d/0x890 [ 1776.698061][ T1784] ? bpf_link_show_fdinfo+0x390/0x390 [ 1776.703477][ T1784] ? lock_chain_count+0x20/0x20 [ 1776.708357][ T1784] __x64_sys_bpf+0x7c/0x90 [ 1776.712794][ T1784] do_syscall_64+0x55/0xb0 [ 1776.717225][ T1784] ? clear_bhb_loop+0x40/0x90 [ 1776.721928][ T1784] ? clear_bhb_loop+0x40/0x90 [ 1776.726627][ T1784] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1776.732537][ T1784] RIP: 0033:0x7fcc5df9ce59 [ 1776.736972][ T1784] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1776.756604][ T1784] RSP: 002b:00007fcc5eee5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1776.765046][ T1784] RAX: ffffffffffffffda RBX: 00007fcc5e215fa0 RCX: 00007fcc5df9ce59 [ 1776.773042][ T1784] RDX: 000000000000003a RSI: 0000200000000000 RDI: 000000000000000a [ 1776.781030][ T1784] RBP: 00007fcc5eee5090 R08: 0000000000000000 R09: 0000000000000000 [ 1776.789020][ T1784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1776.797012][ T1784] R13: 00007fcc5e216038 R14: 00007fcc5e215fa0 R15: 00007ffddadbe528 [ 1776.805021][ T1784] [ 1777.419092][ T1791] netlink: 'syz.8.8209': attribute type 19 has an invalid length. [ 1777.440816][ T1791] netlink: 40 bytes leftover after parsing attributes in process `syz.8.8209'. [ 1777.710060][ T1794] netlink: 'syz.1.8211': attribute type 39 has an invalid length. [ 1777.928253][ T1804] netlink: 'syz.1.8215': attribute type 13 has an invalid length. [ 1777.971578][ T1804] netlink: 24643 bytes leftover after parsing attributes in process `syz.1.8215'. [ 1778.047692][ T1804] netlink: 'syz.1.8215': attribute type 3 has an invalid length. [ 1778.082642][ T1804] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.8215'. [ 1778.227071][ T1812] netlink: 'syz.8.8216': attribute type 27 has an invalid length. [ 1778.249966][ T1812] netlink: 164 bytes leftover after parsing attributes in process `syz.8.8216'. [ 1778.280783][ T1812] skbuff: bad partial csum: csum=65535/127 headroom=178 headlen=65664 [ 1778.901828][ T1818] syzkaller0: entered promiscuous mode [ 1778.934273][ T1818] syzkaller0: entered allmulticast mode [ 1779.546975][ T1836] netlink: 'syz.8.8223': attribute type 39 has an invalid length. [ 1779.677477][ T1838] netlink: 'syz.8.8224': attribute type 19 has an invalid length. [ 1779.685617][ T1838] netlink: 40 bytes leftover after parsing attributes in process `syz.8.8224'. [ 1780.010997][ T1844] netlink: 'syz.9.8226': attribute type 10 has an invalid length. [ 1780.019529][ T1844] netlink: 55 bytes leftover after parsing attributes in process `syz.9.8226'. [ 1780.450605][ T1848] FAULT_INJECTION: forcing a failure. [ 1780.450605][ T1848] name failslab, interval 1, probability 0, space 0, times 0 [ 1780.467913][ T1848] CPU: 1 PID: 1848 Comm: syz.9.8228 Not tainted syzkaller #0 [ 1780.475327][ T1848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1780.485401][ T1848] Call Trace: [ 1780.488694][ T1848] [ 1780.491642][ T1848] dump_stack_lvl+0x18c/0x250 [ 1780.496344][ T1848] ? show_regs_print_info+0x20/0x20 [ 1780.501559][ T1848] ? load_image+0x420/0x420 [ 1780.506087][ T1848] ? __lock_acquire+0x7d40/0x7d40 [ 1780.511135][ T1848] should_fail_ex+0x39d/0x4d0 [ 1780.515840][ T1848] should_failslab+0x9/0x20 [ 1780.520364][ T1848] slab_pre_alloc_hook+0x59/0x310 [ 1780.525409][ T1848] ? bpf_test_init+0x9f/0x140 [ 1780.530083][ T1848] ? bpf_test_init+0x9f/0x140 [ 1780.534764][ T1848] __kmem_cache_alloc_node+0x53/0x250 [ 1780.540152][ T1848] ? bpf_test_init+0x9f/0x140 [ 1780.544828][ T1848] __kmalloc+0xa4/0x230 [ 1780.548980][ T1848] bpf_test_init+0x9f/0x140 [ 1780.553481][ T1848] bpf_prog_test_run_xdp+0x4d1/0x10e0 [ 1780.558863][ T1848] ? dev_put+0x80/0x80 [ 1780.562941][ T1848] ? dev_put+0x80/0x80 [ 1780.567005][ T1848] bpf_prog_test_run+0x321/0x390 [ 1780.571940][ T1848] __sys_bpf+0x49d/0x890 [ 1780.576182][ T1848] ? bpf_link_show_fdinfo+0x390/0x390 [ 1780.581559][ T1848] ? lock_chain_count+0x20/0x20 [ 1780.586412][ T1848] __x64_sys_bpf+0x7c/0x90 [ 1780.590822][ T1848] do_syscall_64+0x55/0xb0 [ 1780.595227][ T1848] ? clear_bhb_loop+0x40/0x90 [ 1780.599896][ T1848] ? clear_bhb_loop+0x40/0x90 [ 1780.604564][ T1848] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1780.610447][ T1848] RIP: 0033:0x7ffa4d19ce59 [ 1780.614856][ T1848] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1780.634461][ T1848] RSP: 002b:00007ffa4e047028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1780.642866][ T1848] RAX: ffffffffffffffda RBX: 00007ffa4d415fa0 RCX: 00007ffa4d19ce59 [ 1780.650826][ T1848] RDX: 0000000000000050 RSI: 0000200000000340 RDI: 000000000000000a [ 1780.658785][ T1848] RBP: 00007ffa4e047090 R08: 0000000000000000 R09: 0000000000000000 [ 1780.666746][ T1848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1780.674723][ T1848] R13: 00007ffa4d416038 R14: 00007ffa4d415fa0 R15: 00007ffd52d64098 [ 1780.682700][ T1848] [ 1781.942189][ T1863] netlink: 'syz.1.8233': attribute type 39 has an invalid length. [ 1781.963335][ T1867] netlink: 'syz.9.8234': attribute type 19 has an invalid length. [ 1781.971195][ T1867] netlink: 40 bytes leftover after parsing attributes in process `syz.9.8234'. [ 1782.164161][ T1873] netlink: 'syz.9.8236': attribute type 10 has an invalid length. [ 1782.172099][ T1873] netlink: 55 bytes leftover after parsing attributes in process `syz.9.8236'. [ 1782.299573][ T1875] FAULT_INJECTION: forcing a failure. [ 1782.299573][ T1875] name failslab, interval 1, probability 0, space 0, times 0 [ 1782.346168][ T1875] CPU: 0 PID: 1875 Comm: syz.9.8238 Not tainted syzkaller #0 [ 1782.353592][ T1875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1782.363658][ T1875] Call Trace: [ 1782.366936][ T1875] [ 1782.369865][ T1875] dump_stack_lvl+0x18c/0x250 [ 1782.374562][ T1875] ? show_regs_print_info+0x20/0x20 [ 1782.379762][ T1875] ? load_image+0x420/0x420 [ 1782.384265][ T1875] ? __lock_acquire+0x7d40/0x7d40 [ 1782.389286][ T1875] should_fail_ex+0x39d/0x4d0 [ 1782.393961][ T1875] should_failslab+0x9/0x20 [ 1782.398457][ T1875] slab_pre_alloc_hook+0x59/0x310 [ 1782.403477][ T1875] ? bpf_test_init+0x9f/0x140 [ 1782.408144][ T1875] ? bpf_test_init+0x9f/0x140 [ 1782.412811][ T1875] __kmem_cache_alloc_node+0x53/0x250 [ 1782.418184][ T1875] ? bpf_test_init+0x9f/0x140 [ 1782.422852][ T1875] __kmalloc+0xa4/0x230 [ 1782.427003][ T1875] bpf_test_init+0x9f/0x140 [ 1782.431499][ T1875] bpf_prog_test_run_xdp+0x4d1/0x10e0 [ 1782.436880][ T1875] ? dev_put+0x80/0x80 [ 1782.440950][ T1875] ? dev_put+0x80/0x80 [ 1782.445012][ T1875] bpf_prog_test_run+0x321/0x390 [ 1782.449943][ T1875] __sys_bpf+0x49d/0x890 [ 1782.454177][ T1875] ? bpf_link_show_fdinfo+0x390/0x390 [ 1782.459548][ T1875] ? lock_chain_count+0x20/0x20 [ 1782.464397][ T1875] __x64_sys_bpf+0x7c/0x90 [ 1782.468802][ T1875] do_syscall_64+0x55/0xb0 [ 1782.473207][ T1875] ? clear_bhb_loop+0x40/0x90 [ 1782.477880][ T1875] ? clear_bhb_loop+0x40/0x90 [ 1782.482552][ T1875] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1782.488436][ T1875] RIP: 0033:0x7ffa4d19ce59 [ 1782.492842][ T1875] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1782.512439][ T1875] RSP: 002b:00007ffa4e047028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1782.520849][ T1875] RAX: ffffffffffffffda RBX: 00007ffa4d415fa0 RCX: 00007ffa4d19ce59 [ 1782.528808][ T1875] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 1782.536771][ T1875] RBP: 00007ffa4e047090 R08: 0000000000000000 R09: 0000000000000000 [ 1782.544771][ T1875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1782.552734][ T1875] R13: 00007ffa4d416038 R14: 00007ffa4d415fa0 R15: 00007ffd52d64098 [ 1782.560706][ T1875] [ 1783.174416][ T1895] netlink: 'syz.0.8243': attribute type 39 has an invalid length. [ 1783.535983][ T1897] netlink: 'syz.0.8244': attribute type 19 has an invalid length. [ 1783.632636][ T1897] netlink: 40 bytes leftover after parsing attributes in process `syz.0.8244'. [ 1783.798610][ T1904] netlink: 'syz.1.8247': attribute type 10 has an invalid length. [ 1783.824003][ T1904] netlink: 55 bytes leftover after parsing attributes in process `syz.1.8247'. [ 1784.231309][ T1915] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.8249'. [ 1784.308991][ T1917] netlink: 199836 bytes leftover after parsing attributes in process `syz.9.8250'. [ 1784.970678][ T1927] netlink: 'syz.0.8252': attribute type 13 has an invalid length. [ 1785.012720][ T1927] netlink: 24643 bytes leftover after parsing attributes in process `syz.0.8252'. [ 1785.042597][ T1930] netlink: 'syz.8.8254': attribute type 19 has an invalid length. [ 1785.053113][ T1927] netlink: 'syz.0.8252': attribute type 3 has an invalid length. [ 1785.075734][ T1927] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.8252'. [ 1785.076557][ T1930] netlink: 40 bytes leftover after parsing attributes in process `syz.8.8254'. [ 1785.108288][ T1932] netlink: 'syz.1.8253': attribute type 39 has an invalid length. [ 1785.767552][ T1943] netlink: 199836 bytes leftover after parsing attributes in process `syz.8.8257'. [ 1786.343486][ T1958] FAULT_INJECTION: forcing a failure. [ 1786.343486][ T1958] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1786.396041][ T1958] CPU: 0 PID: 1958 Comm: syz.0.8263 Not tainted syzkaller #0 [ 1786.403485][ T1958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1786.413557][ T1958] Call Trace: [ 1786.414153][ T1964] netlink: 'syz.1.8264': attribute type 39 has an invalid length. [ 1786.416835][ T1958] [ 1786.416846][ T1958] dump_stack_lvl+0x18c/0x250 [ 1786.416873][ T1958] ? show_regs_print_info+0x20/0x20 [ 1786.416892][ T1958] ? load_image+0x420/0x420 [ 1786.416918][ T1958] ? __lock_acquire+0x7d40/0x7d40 [ 1786.435118][ T1965] netlink: 'syz.8.8262': attribute type 21 has an invalid length. [ 1786.437491][ T1958] should_fail_ex+0x39d/0x4d0 [ 1786.447823][ T1965] netlink: 156 bytes leftover after parsing attributes in process `syz.8.8262'. [ 1786.454797][ T1958] _copy_from_user+0x2f/0xe0 [ 1786.454828][ T1958] __copy_msghdr+0x3bb/0x580 [ 1786.454851][ T1958] ___sys_sendmsg+0x214/0x360 [ 1786.454868][ T1958] ? get_pid_task+0x20/0x1e0 [ 1786.454894][ T1958] ? __sys_sendmsg+0x2a0/0x2a0 [ 1786.454927][ T1958] ? __lock_acquire+0x7d40/0x7d40 [ 1786.496811][ T1958] __se_sys_sendmsg+0x1c2/0x2b0 [ 1786.501670][ T1958] ? __x64_sys_sendmsg+0x80/0x80 [ 1786.506617][ T1958] ? lockdep_hardirqs_on+0x98/0x150 [ 1786.511812][ T1958] do_syscall_64+0x55/0xb0 [ 1786.516220][ T1958] ? clear_bhb_loop+0x40/0x90 [ 1786.520887][ T1958] ? clear_bhb_loop+0x40/0x90 [ 1786.525563][ T1958] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1786.531455][ T1958] RIP: 0033:0x7fcc5df9ce59 [ 1786.535862][ T1958] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1786.555466][ T1958] RSP: 002b:00007fcc5eee5028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1786.563870][ T1958] RAX: ffffffffffffffda RBX: 00007fcc5e215fa0 RCX: 00007fcc5df9ce59 [ 1786.571830][ T1958] RDX: 0000000000000000 RSI: 0000200000001640 RDI: 0000000000000003 [ 1786.579789][ T1958] RBP: 00007fcc5eee5090 R08: 0000000000000000 R09: 0000000000000000 [ 1786.587749][ T1958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1786.595710][ T1958] R13: 00007fcc5e216038 R14: 00007fcc5e215fa0 R15: 00007ffddadbe528 [ 1786.603688][ T1958] [ 1786.619610][ T1290] ieee802154 phy0 wpan0: encryption failed: -22 [ 1786.625974][ T1290] ieee802154 phy1 wpan1: encryption failed: -22 [ 1786.683509][ T1968] netlink: 'syz.1.8265': attribute type 19 has an invalid length. [ 1786.691381][ T1968] netlink: 40 bytes leftover after parsing attributes in process `syz.1.8265'. [ 1786.864148][ T1960] netlink: 199836 bytes leftover after parsing attributes in process `syz.9.8260'. [ 1787.015222][ T1970] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.8266'. [ 1787.213966][ T1973] netlink: 14 bytes leftover after parsing attributes in process `syz.1.8267'. [ 1787.877659][ T1977] netlink: 14 bytes leftover after parsing attributes in process `syz.8.8268'. [ 1788.747107][ T1997] netlink: 'syz.8.8273': attribute type 39 has an invalid length. [ 1788.857087][ T2002] netlink: 'syz.9.8275': attribute type 19 has an invalid length. [ 1788.942677][ T2007] FAULT_INJECTION: forcing a failure. [ 1788.942677][ T2007] name failslab, interval 1, probability 0, space 0, times 0 [ 1788.982080][ T2007] CPU: 0 PID: 2007 Comm: syz.1.8277 Not tainted syzkaller #0 [ 1788.989506][ T2007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1788.999578][ T2007] Call Trace: [ 1789.002867][ T2007] [ 1789.005806][ T2007] dump_stack_lvl+0x18c/0x250 [ 1789.010501][ T2007] ? show_regs_print_info+0x20/0x20 [ 1789.015695][ T2007] ? load_image+0x420/0x420 [ 1789.020198][ T2007] ? __lock_acquire+0x7d40/0x7d40 [ 1789.025218][ T2007] should_fail_ex+0x39d/0x4d0 [ 1789.029892][ T2007] should_failslab+0x9/0x20 [ 1789.034388][ T2007] slab_pre_alloc_hook+0x59/0x310 [ 1789.039412][ T2007] ? bpf_test_init+0x9f/0x140 [ 1789.044084][ T2007] ? bpf_test_init+0x9f/0x140 [ 1789.048752][ T2007] __kmem_cache_alloc_node+0x53/0x250 [ 1789.054123][ T2007] ? bpf_test_init+0x9f/0x140 [ 1789.058811][ T2007] __kmalloc+0xa4/0x230 [ 1789.062980][ T2007] bpf_test_init+0x9f/0x140 [ 1789.067483][ T2007] bpf_prog_test_run_xdp+0x4d1/0x10e0 [ 1789.072860][ T2007] ? dev_put+0x80/0x80 [ 1789.076931][ T2007] ? dev_put+0x80/0x80 [ 1789.080999][ T2007] bpf_prog_test_run+0x321/0x390 [ 1789.085941][ T2007] __sys_bpf+0x49d/0x890 [ 1789.090187][ T2007] ? bpf_link_show_fdinfo+0x390/0x390 [ 1789.095566][ T2007] ? lock_chain_count+0x20/0x20 [ 1789.100417][ T2007] __x64_sys_bpf+0x7c/0x90 [ 1789.104826][ T2007] do_syscall_64+0x55/0xb0 [ 1789.109233][ T2007] ? clear_bhb_loop+0x40/0x90 [ 1789.113903][ T2007] ? clear_bhb_loop+0x40/0x90 [ 1789.118618][ T2007] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1789.124527][ T2007] RIP: 0033:0x7efcb8d9ce59 [ 1789.128942][ T2007] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1789.148543][ T2007] RSP: 002b:00007efcb9bec028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1789.156964][ T2007] RAX: ffffffffffffffda RBX: 00007efcb9015fa0 RCX: 00007efcb8d9ce59 [ 1789.164929][ T2007] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 1789.172889][ T2007] RBP: 00007efcb9bec090 R08: 0000000000000000 R09: 0000000000000000 [ 1789.180853][ T2007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1789.188814][ T2007] R13: 00007efcb9016038 R14: 00007efcb9015fa0 R15: 00007ffedc97a728 [ 1789.196794][ T2007] [ 1789.488322][ T2012] netlink: 'syz.9.8279': attribute type 27 has an invalid length. [ 1789.564847][ T2012] skbuff: bad partial csum: csum=65535/127 headroom=178 headlen=65664 [ 1790.673400][ T2035] FAULT_INJECTION: forcing a failure. [ 1790.673400][ T2035] name failslab, interval 1, probability 0, space 0, times 0 [ 1790.754753][ T2035] CPU: 1 PID: 2035 Comm: syz.9.8286 Not tainted syzkaller #0 [ 1790.762189][ T2035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1790.772266][ T2035] Call Trace: [ 1790.775564][ T2035] [ 1790.778506][ T2035] dump_stack_lvl+0x18c/0x250 [ 1790.783208][ T2035] ? show_regs_print_info+0x20/0x20 [ 1790.788422][ T2035] ? load_image+0x420/0x420 [ 1790.792956][ T2035] ? __might_sleep+0xe0/0xe0 [ 1790.797565][ T2035] ? __lock_acquire+0x7d40/0x7d40 [ 1790.802623][ T2035] should_fail_ex+0x39d/0x4d0 [ 1790.807328][ T2035] should_failslab+0x9/0x20 [ 1790.811852][ T2035] slab_pre_alloc_hook+0x59/0x310 [ 1790.816898][ T2035] ? __lock_acquire+0x7d40/0x7d40 [ 1790.821942][ T2035] kmem_cache_alloc_node+0x60/0x320 [ 1790.827161][ T2035] ? __alloc_skb+0x103/0x2c0 [ 1790.831769][ T2035] __alloc_skb+0x103/0x2c0 [ 1790.836205][ T2035] netlink_sendmsg+0x66a/0xbf0 [ 1790.841005][ T2035] ? netlink_getsockopt+0x590/0x590 [ 1790.846229][ T2035] ? aa_sock_msg_perm+0x94/0x150 [ 1790.851196][ T2035] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1790.856502][ T2035] ? security_socket_sendmsg+0x80/0xa0 [ 1790.861977][ T2035] ? netlink_getsockopt+0x590/0x590 [ 1790.867203][ T2035] ____sys_sendmsg+0x5ba/0x960 [ 1790.871995][ T2035] ? __asan_memset+0x22/0x40 [ 1790.876605][ T2035] ? __sys_sendmsg_sock+0x30/0x30 [ 1790.881637][ T2035] ? __import_iovec+0x5f2/0x850 [ 1790.886508][ T2035] ? import_iovec+0x73/0xa0 [ 1790.891021][ T2035] ___sys_sendmsg+0x2a6/0x360 [ 1790.895713][ T2035] ? get_pid_task+0x20/0x1e0 [ 1790.900328][ T2035] ? __sys_sendmsg+0x2a0/0x2a0 [ 1790.905129][ T2035] ? __lock_acquire+0x7d40/0x7d40 [ 1790.910196][ T2035] __se_sys_sendmsg+0x1c2/0x2b0 [ 1790.915075][ T2035] ? __x64_sys_sendmsg+0x80/0x80 [ 1790.920041][ T2035] ? lockdep_hardirqs_on+0x98/0x150 [ 1790.925314][ T2035] do_syscall_64+0x55/0xb0 [ 1790.929769][ T2035] ? clear_bhb_loop+0x40/0x90 [ 1790.934473][ T2035] ? clear_bhb_loop+0x40/0x90 [ 1790.939177][ T2035] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1790.945094][ T2035] RIP: 0033:0x7ffa4d19ce59 [ 1790.949522][ T2035] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1790.969151][ T2035] RSP: 002b:00007ffa4e047028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1790.977678][ T2035] RAX: ffffffffffffffda RBX: 00007ffa4d415fa0 RCX: 00007ffa4d19ce59 [ 1790.985755][ T2035] RDX: 0000000000040004 RSI: 00002000000001c0 RDI: 0000000000000007 [ 1790.993759][ T2035] RBP: 00007ffa4e047090 R08: 0000000000000000 R09: 0000000000000000 [ 1791.001746][ T2035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1791.009730][ T2035] R13: 00007ffa4d416038 R14: 00007ffa4d415fa0 R15: 00007ffd52d64098 [ 1791.017735][ T2035] [ 1791.092360][ T2041] netlink: 'syz.1.8288': attribute type 29 has an invalid length. [ 1791.101362][ T2041] netlink: 'syz.1.8288': attribute type 29 has an invalid length. [ 1791.127378][ T2038] netlink: 'syz.1.8288': attribute type 29 has an invalid length. [ 1791.141792][ T2041] FAULT_INJECTION: forcing a failure. [ 1791.141792][ T2041] name failslab, interval 1, probability 0, space 0, times 0 [ 1791.177333][ T2043] netlink: 'syz.0.8287': attribute type 39 has an invalid length. [ 1791.192827][ T2041] CPU: 1 PID: 2041 Comm: syz.1.8288 Not tainted syzkaller #0 [ 1791.200244][ T2041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1791.210321][ T2041] Call Trace: [ 1791.213620][ T2041] [ 1791.216568][ T2041] dump_stack_lvl+0x18c/0x250 [ 1791.221275][ T2041] ? show_regs_print_info+0x20/0x20 [ 1791.226495][ T2041] ? load_image+0x420/0x420 [ 1791.231025][ T2041] ? __lock_acquire+0x7d40/0x7d40 [ 1791.236077][ T2041] ? mark_lock+0x94/0x320 [ 1791.240433][ T2041] should_fail_ex+0x39d/0x4d0 [ 1791.245143][ T2041] should_failslab+0x9/0x20 [ 1791.249672][ T2041] slab_pre_alloc_hook+0x59/0x310 [ 1791.254726][ T2041] ? iovec_from_user+0x87/0x240 [ 1791.259603][ T2041] ? iovec_from_user+0x87/0x240 [ 1791.264474][ T2041] __kmem_cache_alloc_node+0x53/0x250 [ 1791.269878][ T2041] ? iovec_from_user+0x87/0x240 [ 1791.274752][ T2041] __kmalloc+0xa4/0x230 [ 1791.278938][ T2041] iovec_from_user+0x87/0x240 [ 1791.283638][ T2041] __import_iovec+0x13d/0x850 [ 1791.288341][ T2041] ? __might_fault+0xaa/0x120 [ 1791.293038][ T2041] import_iovec+0x73/0xa0 [ 1791.297387][ T2041] ___sys_recvmsg+0x4ba/0x590 [ 1791.302089][ T2041] ? __sys_recvmsg+0x2a0/0x2a0 [ 1791.306879][ T2041] ? ksys_write+0x1c4/0x260 [ 1791.311415][ T2041] ? __fget_files+0x43d/0x4b0 [ 1791.316131][ T2041] __x64_sys_recvmsg+0x20c/0x2e0 [ 1791.321094][ T2041] ? ___sys_recvmsg+0x590/0x590 [ 1791.325979][ T2041] ? lockdep_hardirqs_on+0x98/0x150 [ 1791.331201][ T2041] do_syscall_64+0x55/0xb0 [ 1791.335637][ T2041] ? clear_bhb_loop+0x40/0x90 [ 1791.340336][ T2041] ? clear_bhb_loop+0x40/0x90 [ 1791.345038][ T2041] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1791.350951][ T2041] RIP: 0033:0x7efcb8d9ce59 [ 1791.355385][ T2041] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1791.375009][ T2041] RSP: 002b:00007efcb9bcb028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1791.383445][ T2041] RAX: ffffffffffffffda RBX: 00007efcb9016090 RCX: 00007efcb8d9ce59 [ 1791.391431][ T2041] RDX: 0000000040000080 RSI: 0000200000000c40 RDI: 0000000000000003 [ 1791.399425][ T2041] RBP: 00007efcb9bcb090 R08: 0000000000000000 R09: 0000000000000000 [ 1791.407411][ T2041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1791.415400][ T2041] R13: 00007efcb9016128 R14: 00007efcb9016090 R15: 00007ffedc97a728 [ 1791.423407][ T2041] [ 1791.675854][ T2047] netlink: 'syz.1.8289': attribute type 29 has an invalid length. [ 1791.684172][ T2047] netlink: 'syz.1.8289': attribute type 29 has an invalid length. [ 1791.702686][ T2046] netlink: 'syz.1.8289': attribute type 29 has an invalid length. [ 1791.741462][ T2047] netlink: 'syz.1.8289': attribute type 29 has an invalid length. [ 1792.227575][ T2061] netlink: 'syz.1.8294': attribute type 27 has an invalid length. [ 1792.256260][ T2061] __nla_validate_parse: 3 callbacks suppressed [ 1792.256276][ T2061] netlink: 164 bytes leftover after parsing attributes in process `syz.1.8294'. [ 1792.304547][ T2066] skbuff: bad partial csum: csum=65535/127 headroom=178 headlen=65664 [ 1792.739069][ T2074] netlink: 199836 bytes leftover after parsing attributes in process `syz.9.8297'. [ 1793.673859][ T2083] netlink: 'syz.0.8298': attribute type 39 has an invalid length. [ 1794.102101][ T2096] skbuff: bad partial csum: csum=65535/127 headroom=178 headlen=65664 [ 1795.210785][ T2114] netlink: 2 bytes leftover after parsing attributes in process `syz.8.8311'. [ 1795.222302][ T2107] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.8308'. [ 1795.237846][ T2114] bond0: entered promiscuous mode [ 1795.244893][ T2114] bond_slave_0: entered promiscuous mode [ 1795.250893][ T2114] bond_slave_1: entered promiscuous mode [ 1798.247705][ T2156] FAULT_INJECTION: forcing a failure. [ 1798.247705][ T2156] name failslab, interval 1, probability 0, space 0, times 0 [ 1798.316036][ T2156] CPU: 1 PID: 2156 Comm: syz.0.8322 Not tainted syzkaller #0 [ 1798.323474][ T2156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1798.333537][ T2156] Call Trace: [ 1798.336811][ T2156] [ 1798.339734][ T2156] dump_stack_lvl+0x18c/0x250 [ 1798.344409][ T2156] ? show_regs_print_info+0x20/0x20 [ 1798.349595][ T2156] ? load_image+0x420/0x420 [ 1798.354098][ T2156] ? __might_sleep+0xe0/0xe0 [ 1798.358682][ T2156] ? __lock_acquire+0x7d40/0x7d40 [ 1798.363702][ T2156] should_fail_ex+0x39d/0x4d0 [ 1798.368376][ T2156] should_failslab+0x9/0x20 [ 1798.372872][ T2156] slab_pre_alloc_hook+0x59/0x310 [ 1798.377900][ T2156] kmem_cache_alloc_node+0x60/0x320 [ 1798.383092][ T2156] ? perf_event_alloc+0x15a/0x21b0 [ 1798.388198][ T2156] perf_event_alloc+0x15a/0x21b0 [ 1798.393131][ T2156] ? _raw_spin_unlock+0x28/0x40 [ 1798.397973][ T2156] ? alloc_fd+0x58f/0x630 [ 1798.402295][ T2156] ? find_lively_task_by_vpid+0x19/0x290 [ 1798.407922][ T2156] ? find_lively_task_by_vpid+0x19/0x290 [ 1798.413553][ T2156] __se_sys_perf_event_open+0x740/0x1c50 [ 1798.419183][ T2156] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 1798.424813][ T2156] ? lock_chain_count+0x20/0x20 [ 1798.429658][ T2156] ? lockdep_hardirqs_on+0x98/0x150 [ 1798.434846][ T2156] ? __x64_sys_perf_event_open+0x20/0xc0 [ 1798.440475][ T2156] do_syscall_64+0x55/0xb0 [ 1798.444879][ T2156] ? clear_bhb_loop+0x40/0x90 [ 1798.449548][ T2156] ? clear_bhb_loop+0x40/0x90 [ 1798.454217][ T2156] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1798.460104][ T2156] RIP: 0033:0x7fcc5df9ce59 [ 1798.464510][ T2156] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1798.484107][ T2156] RSP: 002b:00007fcc5eec4028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1798.492509][ T2156] RAX: ffffffffffffffda RBX: 00007fcc5e216090 RCX: 00007fcc5df9ce59 [ 1798.500470][ T2156] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000 [ 1798.508428][ T2156] RBP: 00007fcc5eec4090 R08: 0000000000000000 R09: 0000000000000000 [ 1798.516387][ T2156] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1798.524348][ T2156] R13: 00007fcc5e216128 R14: 00007fcc5e216090 R15: 00007ffddadbe528 [ 1798.532318][ T2156] [ 1799.136694][ T2163] netlink: 199836 bytes leftover after parsing attributes in process `syz.8.8325'. [ 1801.225044][ T2153] validate_nla: 2 callbacks suppressed [ 1801.225057][ T2153] netlink: 'syz.1.8323': attribute type 39 has an invalid length. [ 1801.242683][ T2155] netlink: 'syz.0.8322': attribute type 21 has an invalid length. [ 1801.250679][ T2155] netlink: 128 bytes leftover after parsing attributes in process `syz.0.8322'. [ 1801.263589][ T2155] netlink: 3 bytes leftover after parsing attributes in process `syz.0.8322'. [ 1804.332837][ T2209] netlink: 'syz.1.8335': attribute type 39 has an invalid length. [ 1804.563094][ T2213] FAULT_INJECTION: forcing a failure. [ 1804.563094][ T2213] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1804.596325][ T2213] CPU: 1 PID: 2213 Comm: syz.0.8337 Not tainted syzkaller #0 [ 1804.603752][ T2213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1804.613812][ T2213] Call Trace: [ 1804.617093][ T2213] [ 1804.620021][ T2213] dump_stack_lvl+0x18c/0x250 [ 1804.624700][ T2213] ? show_regs_print_info+0x20/0x20 [ 1804.629894][ T2213] ? load_image+0x420/0x420 [ 1804.634396][ T2213] ? __lock_acquire+0x7d40/0x7d40 [ 1804.639415][ T2213] ? snprintf+0xe9/0x140 [ 1804.643656][ T2213] should_fail_ex+0x39d/0x4d0 [ 1804.648337][ T2213] _copy_to_user+0x2f/0xa0 [ 1804.652751][ T2213] simple_read_from_buffer+0xe7/0x150 [ 1804.658147][ T2213] proc_fail_nth_read+0x1e8/0x260 [ 1804.663182][ T2213] ? proc_fault_inject_write+0x360/0x360 [ 1804.668812][ T2213] ? fsnotify_perm+0x271/0x5e0 [ 1804.673568][ T2213] ? proc_fault_inject_write+0x360/0x360 [ 1804.679193][ T2213] vfs_read+0x28b/0x970 [ 1804.683347][ T2213] ? kernel_read+0x1e0/0x1e0 [ 1804.687930][ T2213] ? __fget_files+0x28/0x4b0 [ 1804.692513][ T2213] ? __fget_files+0x28/0x4b0 [ 1804.697096][ T2213] ? __fget_files+0x43d/0x4b0 [ 1804.701770][ T2213] ? __fdget_pos+0x2a3/0x330 [ 1804.706357][ T2213] ? ksys_read+0x75/0x260 [ 1804.710690][ T2213] ksys_read+0x150/0x260 [ 1804.714931][ T2213] ? vfs_write+0x990/0x990 [ 1804.719346][ T2213] ? lockdep_hardirqs_on+0x98/0x150 [ 1804.724542][ T2213] do_syscall_64+0x55/0xb0 [ 1804.728950][ T2213] ? clear_bhb_loop+0x40/0x90 [ 1804.733628][ T2213] ? clear_bhb_loop+0x40/0x90 [ 1804.738298][ T2213] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1804.744183][ T2213] RIP: 0033:0x7fcc5df5d68e [ 1804.748591][ T2213] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1804.768193][ T2213] RSP: 002b:00007fcc5eee4fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1804.776601][ T2213] RAX: ffffffffffffffda RBX: 00007fcc5eee56c0 RCX: 00007fcc5df5d68e [ 1804.784564][ T2213] RDX: 000000000000000f RSI: 00007fcc5eee50a0 RDI: 0000000000000007 [ 1804.792525][ T2213] RBP: 00007fcc5eee5090 R08: 0000000000000000 R09: 0000000000000000 [ 1804.800484][ T2213] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1804.808445][ T2213] R13: 00007fcc5e216038 R14: 00007fcc5e215fa0 R15: 00007ffddadbe528 [ 1804.816423][ T2213] [ 1805.338860][ T2221] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.8338'. [ 1806.026023][ T2236] FAULT_INJECTION: forcing a failure. [ 1806.026023][ T2236] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1806.060490][ T2236] CPU: 1 PID: 2236 Comm: syz.0.8345 Not tainted syzkaller #0 [ 1806.067929][ T2236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1806.078002][ T2236] Call Trace: [ 1806.081293][ T2236] [ 1806.084237][ T2236] dump_stack_lvl+0x18c/0x250 [ 1806.088937][ T2236] ? show_regs_print_info+0x20/0x20 [ 1806.094154][ T2236] ? load_image+0x420/0x420 [ 1806.098682][ T2236] ? __lock_acquire+0x7d40/0x7d40 [ 1806.103732][ T2236] should_fail_ex+0x39d/0x4d0 [ 1806.108441][ T2236] _copy_from_user+0x2f/0xe0 [ 1806.113054][ T2236] __copy_msghdr+0x3bb/0x580 [ 1806.117670][ T2236] ___sys_sendmsg+0x214/0x360 [ 1806.122373][ T2236] ? get_pid_task+0x20/0x1e0 [ 1806.126992][ T2236] ? __sys_sendmsg+0x2a0/0x2a0 [ 1806.131796][ T2236] ? __lock_acquire+0x7d40/0x7d40 [ 1806.136863][ T2236] __se_sys_sendmsg+0x1c2/0x2b0 [ 1806.141734][ T2236] ? __x64_sys_sendmsg+0x80/0x80 [ 1806.146706][ T2236] ? lockdep_hardirqs_on+0x98/0x150 [ 1806.151931][ T2236] do_syscall_64+0x55/0xb0 [ 1806.156371][ T2236] ? clear_bhb_loop+0x40/0x90 [ 1806.158283][ T2233] delete_channel: no stack [ 1806.161051][ T2236] ? clear_bhb_loop+0x40/0x90 [ 1806.170145][ T2236] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1806.176057][ T2236] RIP: 0033:0x7fcc5df9ce59 [ 1806.180489][ T2236] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1806.200111][ T2236] RSP: 002b:00007fcc5eee5028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1806.208523][ T2236] RAX: ffffffffffffffda RBX: 00007fcc5e215fa0 RCX: 00007fcc5df9ce59 [ 1806.216489][ T2236] RDX: 0000000000040890 RSI: 0000200000000140 RDI: 0000000000000007 [ 1806.224451][ T2236] RBP: 00007fcc5eee5090 R08: 0000000000000000 R09: 0000000000000000 [ 1806.232412][ T2236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1806.240371][ T2236] R13: 00007fcc5e216038 R14: 00007fcc5e215fa0 R15: 00007ffddadbe528 [ 1806.248349][ T2236] [ 1806.414620][ T2240] netlink: 'syz.9.8347': attribute type 39 has an invalid length. [ 1806.836919][ T2251] netlink: 'syz.0.8349': attribute type 6 has an invalid length. [ 1806.872580][ T2251] netlink: 168 bytes leftover after parsing attributes in process `syz.0.8349'. [ 1807.513455][ T2243] delete_channel: no stack [ 1808.327602][ T2274] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.8354'. [ 1809.538528][ T2290] delete_channel: no stack [ 1810.049164][ T2306] FAULT_INJECTION: forcing a failure. [ 1810.049164][ T2306] name failslab, interval 1, probability 0, space 0, times 0 [ 1810.119388][ T2306] CPU: 0 PID: 2306 Comm: syz.8.8360 Not tainted syzkaller #0 [ 1810.126823][ T2306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1810.136894][ T2306] Call Trace: [ 1810.140192][ T2306] [ 1810.143138][ T2306] dump_stack_lvl+0x18c/0x250 [ 1810.147839][ T2306] ? show_regs_print_info+0x20/0x20 [ 1810.153054][ T2306] ? load_image+0x420/0x420 [ 1810.157581][ T2306] ? __might_sleep+0xe0/0xe0 [ 1810.162188][ T2306] ? __lock_acquire+0x7d40/0x7d40 [ 1810.167236][ T2306] should_fail_ex+0x39d/0x4d0 [ 1810.171961][ T2306] should_failslab+0x9/0x20 [ 1810.176497][ T2306] slab_pre_alloc_hook+0x59/0x310 [ 1810.181550][ T2306] ? tomoyo_encode+0x28b/0x540 [ 1810.186337][ T2306] ? tomoyo_encode+0x28b/0x540 [ 1810.191210][ T2306] __kmem_cache_alloc_node+0x53/0x250 [ 1810.196615][ T2306] ? tomoyo_encode+0x28b/0x540 [ 1810.201405][ T2306] __kmalloc+0xa4/0x230 [ 1810.205603][ T2306] tomoyo_encode+0x28b/0x540 [ 1810.210229][ T2306] tomoyo_realpath_from_path+0x592/0x5d0 [ 1810.215903][ T2306] tomoyo_path_number_perm+0x248/0x620 [ 1810.221384][ T2306] ? tomoyo_path_number_perm+0x217/0x620 [ 1810.227050][ T2306] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 1810.232538][ T2306] ? perf_trace_preemptirq_template+0x269/0x330 [ 1810.238835][ T2306] ? __fget_files+0x28/0x4b0 [ 1810.243449][ T2306] ? __fget_files+0x28/0x4b0 [ 1810.248075][ T2306] security_file_ioctl+0x70/0xa0 [ 1810.253034][ T2306] __se_sys_ioctl+0x48/0x170 [ 1810.257647][ T2306] do_syscall_64+0x55/0xb0 [ 1810.262078][ T2306] ? clear_bhb_loop+0x40/0x90 [ 1810.266775][ T2306] ? clear_bhb_loop+0x40/0x90 [ 1810.271469][ T2306] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1810.277379][ T2306] RIP: 0033:0x7f3ecab9ce59 [ 1810.281810][ T2306] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1810.301440][ T2306] RSP: 002b:00007f3ecb96e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1810.309874][ T2306] RAX: ffffffffffffffda RBX: 00007f3ecae15fa0 RCX: 00007f3ecab9ce59 [ 1810.317863][ T2306] RDX: 0000000000000000 RSI: 0000000000008b06 RDI: 0000000000000006 [ 1810.325851][ T2306] RBP: 00007f3ecb96e090 R08: 0000000000000000 R09: 0000000000000000 [ 1810.333837][ T2306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1810.341824][ T2306] R13: 00007f3ecae16038 R14: 00007f3ecae15fa0 R15: 00007fff0c6bff68 [ 1810.349825][ T2306] [ 1810.395862][ T2306] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1811.574176][ T2333] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.8367'. [ 1811.968676][ T2336] delete_channel: no stack [ 1812.093817][ T2339] netlink: 199836 bytes leftover after parsing attributes in process `syz.9.8377'. [ 1812.696582][ T2353] FAULT_INJECTION: forcing a failure. [ 1812.696582][ T2353] name failslab, interval 1, probability 0, space 0, times 0 [ 1812.765762][ T2353] CPU: 1 PID: 2353 Comm: syz.9.8375 Not tainted syzkaller #0 [ 1812.773207][ T2353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1812.783274][ T2353] Call Trace: [ 1812.786561][ T2353] [ 1812.789496][ T2353] dump_stack_lvl+0x18c/0x250 [ 1812.794192][ T2353] ? show_regs_print_info+0x20/0x20 [ 1812.799398][ T2353] ? load_image+0x420/0x420 [ 1812.803915][ T2353] ? __lock_acquire+0x7d40/0x7d40 [ 1812.808957][ T2353] should_fail_ex+0x39d/0x4d0 [ 1812.813651][ T2353] should_failslab+0x9/0x20 [ 1812.818171][ T2353] slab_pre_alloc_hook+0x59/0x310 [ 1812.823205][ T2353] ? bpf_test_init+0x9f/0x140 [ 1812.827898][ T2353] ? bpf_test_init+0x9f/0x140 [ 1812.832577][ T2353] __kmem_cache_alloc_node+0x53/0x250 [ 1812.837961][ T2353] ? bpf_test_init+0x9f/0x140 [ 1812.842642][ T2353] __kmalloc+0xa4/0x230 [ 1812.846809][ T2353] bpf_test_init+0x9f/0x140 [ 1812.851320][ T2353] bpf_prog_test_run_xdp+0x4d1/0x10e0 [ 1812.856712][ T2353] ? dev_put+0x80/0x80 [ 1812.860793][ T2353] ? bpf_prog_test_run+0x315/0x390 [ 1812.865910][ T2353] ? dev_put+0x80/0x80 [ 1812.869983][ T2353] bpf_prog_test_run+0x321/0x390 [ 1812.874927][ T2353] __sys_bpf+0x49d/0x890 [ 1812.879179][ T2353] ? bpf_link_show_fdinfo+0x390/0x390 [ 1812.884572][ T2353] ? lock_chain_count+0x20/0x20 [ 1812.889446][ T2353] __x64_sys_bpf+0x7c/0x90 [ 1812.893885][ T2353] do_syscall_64+0x55/0xb0 [ 1812.898314][ T2353] ? clear_bhb_loop+0x40/0x90 [ 1812.903018][ T2353] ? clear_bhb_loop+0x40/0x90 [ 1812.907722][ T2353] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1812.913627][ T2353] RIP: 0033:0x7ffa4d19ce59 [ 1812.918053][ T2353] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1812.937669][ T2353] RSP: 002b:00007ffa4e047028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1812.946096][ T2353] RAX: ffffffffffffffda RBX: 00007ffa4d415fa0 RCX: 00007ffa4d19ce59 [ 1812.954070][ T2353] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 1812.962044][ T2353] RBP: 00007ffa4e047090 R08: 0000000000000000 R09: 0000000000000000 [ 1812.970016][ T2353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1812.977991][ T2353] R13: 00007ffa4d416038 R14: 00007ffa4d415fa0 R15: 00007ffd52d64098 [ 1812.985978][ T2353] [ 1813.769582][ T2367] IPv6: NLM_F_CREATE should be specified when creating new route [ 1813.786267][ T2367] netlink: 1 bytes leftover after parsing attributes in process `syz.0.8380'. [ 1813.807391][ T2365] netlink: 1 bytes leftover after parsing attributes in process `syz.1.8379'. [ 1813.984028][ T2378] FAULT_INJECTION: forcing a failure. [ 1813.984028][ T2378] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1814.002988][ T2378] CPU: 0 PID: 2378 Comm: syz.9.8384 Not tainted syzkaller #0 [ 1814.010419][ T2378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1814.020501][ T2378] Call Trace: [ 1814.023806][ T2378] [ 1814.026764][ T2378] dump_stack_lvl+0x18c/0x250 [ 1814.031483][ T2378] ? show_regs_print_info+0x20/0x20 [ 1814.036714][ T2378] ? load_image+0x420/0x420 [ 1814.041256][ T2378] ? __might_fault+0xaa/0x120 [ 1814.045968][ T2378] ? __lock_acquire+0x7d40/0x7d40 [ 1814.051034][ T2378] should_fail_ex+0x39d/0x4d0 [ 1814.055757][ T2378] _copy_from_user+0x2f/0xe0 [ 1814.060388][ T2378] ___sys_sendmsg+0x1c7/0x360 [ 1814.065110][ T2378] ? __sys_sendmsg+0x2a0/0x2a0 [ 1814.069940][ T2378] ? __lock_acquire+0x7d40/0x7d40 [ 1814.075046][ T2378] __se_sys_sendmsg+0x1c2/0x2b0 [ 1814.079937][ T2378] ? __x64_sys_sendmsg+0x80/0x80 [ 1814.084931][ T2378] ? lockdep_hardirqs_on+0x98/0x150 [ 1814.090162][ T2378] do_syscall_64+0x55/0xb0 [ 1814.094601][ T2378] ? clear_bhb_loop+0x40/0x90 [ 1814.099306][ T2378] ? clear_bhb_loop+0x40/0x90 [ 1814.104014][ T2378] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1814.109937][ T2378] RIP: 0033:0x7ffa4d19ce59 [ 1814.114378][ T2378] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1814.134013][ T2378] RSP: 002b:00007ffa4e047028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1814.142465][ T2378] RAX: ffffffffffffffda RBX: 00007ffa4d415fa0 RCX: 00007ffa4d19ce59 [ 1814.150465][ T2378] RDX: 0000000000000000 RSI: 00002000000002c0 RDI: 0000000000000004 [ 1814.158466][ T2378] RBP: 00007ffa4e047090 R08: 0000000000000000 R09: 0000000000000000 [ 1814.166466][ T2378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1814.174465][ T2378] R13: 00007ffa4d416038 R14: 00007ffa4d415fa0 R15: 00007ffd52d64098 [ 1814.182490][ T2378] [ 1814.855310][ T2394] netlink: 'syz.9.8386': attribute type 6 has an invalid length. [ 1814.882945][ T2394] netlink: 168 bytes leftover after parsing attributes in process `syz.9.8386'. [ 1815.480891][ T2390] delete_channel: no stack [ 1816.154474][ T2414] netlink: 'syz.8.8397': attribute type 6 has an invalid length. [ 1816.162466][ T2414] netlink: 168 bytes leftover after parsing attributes in process `syz.8.8397'. [ 1817.172635][ T2412] delete_channel: no stack [ 1817.564139][ T2442] FAULT_INJECTION: forcing a failure. [ 1817.564139][ T2442] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1817.592850][ T2442] CPU: 1 PID: 2442 Comm: syz.8.8396 Not tainted syzkaller #0 [ 1817.600283][ T2442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1817.610356][ T2442] Call Trace: [ 1817.613651][ T2442] [ 1817.616591][ T2442] dump_stack_lvl+0x18c/0x250 [ 1817.621289][ T2442] ? show_regs_print_info+0x20/0x20 [ 1817.626505][ T2442] ? load_image+0x420/0x420 [ 1817.631035][ T2442] ? __lock_acquire+0x7d40/0x7d40 [ 1817.636091][ T2442] should_fail_ex+0x39d/0x4d0 [ 1817.640802][ T2442] _copy_from_user+0x2f/0xe0 [ 1817.645420][ T2442] __copy_msghdr+0x3bb/0x580 [ 1817.650031][ T2442] ___sys_sendmsg+0x214/0x360 [ 1817.654726][ T2442] ? get_pid_task+0x20/0x1e0 [ 1817.659345][ T2442] ? __sys_sendmsg+0x2a0/0x2a0 [ 1817.664144][ T2442] ? __lock_acquire+0x7d40/0x7d40 [ 1817.669210][ T2442] __se_sys_sendmsg+0x1c2/0x2b0 [ 1817.674088][ T2442] ? __x64_sys_sendmsg+0x80/0x80 [ 1817.679056][ T2442] ? lockdep_hardirqs_on+0x98/0x150 [ 1817.684278][ T2442] do_syscall_64+0x55/0xb0 [ 1817.688693][ T2442] ? clear_bhb_loop+0x40/0x90 [ 1817.693373][ T2442] ? clear_bhb_loop+0x40/0x90 [ 1817.698053][ T2442] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1817.703941][ T2442] RIP: 0033:0x7f3ecab9ce59 [ 1817.708351][ T2442] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1817.727946][ T2442] RSP: 002b:00007f3ecb96e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1817.736349][ T2442] RAX: ffffffffffffffda RBX: 00007f3ecae15fa0 RCX: 00007f3ecab9ce59 [ 1817.744310][ T2442] RDX: 0000000004008001 RSI: 0000200000000040 RDI: 0000000000000003 [ 1817.752269][ T2442] RBP: 00007f3ecb96e090 R08: 0000000000000000 R09: 0000000000000000 [ 1817.760230][ T2442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1817.768198][ T2442] R13: 00007f3ecae16038 R14: 00007f3ecae15fa0 R15: 00007fff0c6bff68 [ 1817.776174][ T2442] [ 1817.808926][ T2447] netlink: 16186 bytes leftover after parsing attributes in process `syz.9.8399'. [ 1817.977801][ T2444] netlink: 'syz.1.8398': attribute type 10 has an invalid length. [ 1818.037201][ T2444] netlink: 55 bytes leftover after parsing attributes in process `syz.1.8398'. [ 1818.177768][ T2460] netlink: 199836 bytes leftover after parsing attributes in process `syz.8.8400'. [ 1819.408986][ T2477] netlink: 'syz.9.8405': attribute type 9 has an invalid length. [ 1819.443232][ T2477] netlink: 209836 bytes leftover after parsing attributes in process `syz.9.8405'. [ 1819.522062][ T2478] netlink: 'syz.9.8405': attribute type 9 has an invalid length. [ 1819.612834][ T2478] netlink: 209836 bytes leftover after parsing attributes in process `syz.9.8405'. [ 1819.852580][ T2483] netlink: 'syz.1.8407': attribute type 9 has an invalid length. [ 1819.911690][ T2483] netlink: 209836 bytes leftover after parsing attributes in process `syz.1.8407'. [ 1820.027707][ T2497] FAULT_INJECTION: forcing a failure. [ 1820.027707][ T2497] name failslab, interval 1, probability 0, space 0, times 0 [ 1820.067139][ T2497] CPU: 0 PID: 2497 Comm: syz.9.8409 Not tainted syzkaller #0 [ 1820.074564][ T2497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1820.084636][ T2497] Call Trace: [ 1820.087926][ T2497] [ 1820.090862][ T2497] dump_stack_lvl+0x18c/0x250 [ 1820.095564][ T2497] ? show_regs_print_info+0x20/0x20 [ 1820.100778][ T2497] ? load_image+0x420/0x420 [ 1820.105308][ T2497] ? __lock_acquire+0x7d40/0x7d40 [ 1820.110347][ T2497] ? trace_call_bpf+0xc3/0x6c0 [ 1820.115131][ T2497] ? trace_call_bpf+0xc3/0x6c0 [ 1820.119920][ T2497] should_fail_ex+0x39d/0x4d0 [ 1820.124629][ T2497] should_failslab+0x9/0x20 [ 1820.129154][ T2497] slab_pre_alloc_hook+0x59/0x310 [ 1820.134204][ T2497] ? __bpf_trace_bpf_trace_printk+0x100/0x100 [ 1820.140304][ T2497] ? bpf_test_init+0x9f/0x140 [ 1820.145004][ T2497] ? bpf_test_init+0x9f/0x140 [ 1820.149711][ T2497] __kmem_cache_alloc_node+0x53/0x250 [ 1820.155114][ T2497] ? bpf_test_init+0x9f/0x140 [ 1820.159808][ T2497] __kmalloc+0xa4/0x230 [ 1820.163987][ T2497] bpf_test_init+0x9f/0x140 [ 1820.168517][ T2497] bpf_prog_test_run_xdp+0x4d1/0x10e0 [ 1820.173920][ T2497] ? dev_put+0x80/0x80 [ 1820.178027][ T2497] ? dev_put+0x80/0x80 [ 1820.182112][ T2497] bpf_prog_test_run+0x321/0x390 [ 1820.187070][ T2497] __sys_bpf+0x49d/0x890 [ 1820.191333][ T2497] ? bpf_link_show_fdinfo+0x390/0x390 [ 1820.196738][ T2497] ? lock_chain_count+0x20/0x20 [ 1820.201609][ T2497] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 1820.206237][ T2490] netlink: 'syz.1.8407': attribute type 9 has an invalid length. [ 1820.207601][ T2497] __x64_sys_bpf+0x7c/0x90 [ 1820.219736][ T2497] do_syscall_64+0x55/0xb0 [ 1820.224172][ T2497] ? clear_bhb_loop+0x40/0x90 [ 1820.228866][ T2497] ? clear_bhb_loop+0x40/0x90 [ 1820.233560][ T2497] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1820.239468][ T2497] RIP: 0033:0x7ffa4d19ce59 [ 1820.243900][ T2497] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1820.263520][ T2497] RSP: 002b:00007ffa4e047028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1820.271949][ T2497] RAX: ffffffffffffffda RBX: 00007ffa4d415fa0 RCX: 00007ffa4d19ce59 [ 1820.279933][ T2497] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 1820.287915][ T2497] RBP: 00007ffa4e047090 R08: 0000000000000000 R09: 0000000000000000 [ 1820.295901][ T2497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1820.303881][ T2497] R13: 00007ffa4d416038 R14: 00007ffa4d415fa0 R15: 00007ffd52d64098 [ 1820.311877][ T2497] [ 1820.425132][ T2490] netlink: 209836 bytes leftover after parsing attributes in process `syz.1.8407'. [ 1821.643909][ T2522] netlink: 199836 bytes leftover after parsing attributes in process `syz.9.8415'. [ 1822.093600][ T2532] FAULT_INJECTION: forcing a failure. [ 1822.093600][ T2532] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1822.164068][ T2527] netlink: 132 bytes leftover after parsing attributes in process `syz.8.8418'. [ 1822.174099][ T2532] CPU: 1 PID: 2532 Comm: syz.0.8417 Not tainted syzkaller #0 [ 1822.181511][ T2532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1822.191580][ T2532] Call Trace: [ 1822.194879][ T2532] [ 1822.197829][ T2532] dump_stack_lvl+0x18c/0x250 [ 1822.202532][ T2532] ? show_regs_print_info+0x20/0x20 [ 1822.207750][ T2532] ? load_image+0x420/0x420 [ 1822.212280][ T2532] ? __might_fault+0xaa/0x120 [ 1822.216977][ T2532] ? __lock_acquire+0x7d40/0x7d40 [ 1822.222022][ T2532] should_fail_ex+0x39d/0x4d0 [ 1822.226733][ T2532] _copy_from_user+0x2f/0xe0 [ 1822.231345][ T2532] __sys_bpf+0x23e/0x890 [ 1822.235608][ T2532] ? bpf_link_show_fdinfo+0x390/0x390 [ 1822.241011][ T2532] ? lock_chain_count+0x20/0x20 [ 1822.245894][ T2532] __x64_sys_bpf+0x7c/0x90 [ 1822.250344][ T2532] do_syscall_64+0x55/0xb0 [ 1822.254776][ T2532] ? clear_bhb_loop+0x40/0x90 [ 1822.259471][ T2532] ? clear_bhb_loop+0x40/0x90 [ 1822.264169][ T2532] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1822.270078][ T2532] RIP: 0033:0x7fcc5df9ce59 [ 1822.274506][ T2532] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1822.294128][ T2532] RSP: 002b:00007fcc5eec4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1822.302561][ T2532] RAX: ffffffffffffffda RBX: 00007fcc5e216090 RCX: 00007fcc5df9ce59 [ 1822.310546][ T2532] RDX: 0000000000000048 RSI: 00002000000017c0 RDI: 0000000000000005 [ 1822.318531][ T2532] RBP: 00007fcc5eec4090 R08: 0000000000000000 R09: 0000000000000000 [ 1822.326517][ T2532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1822.334503][ T2532] R13: 00007fcc5e216128 R14: 00007fcc5e216090 R15: 00007ffddadbe528 [ 1822.342508][ T2532] [ 1824.215237][ T2553] FAULT_INJECTION: forcing a failure. [ 1824.215237][ T2553] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1824.262710][ T2553] CPU: 1 PID: 2553 Comm: syz.9.8424 Not tainted syzkaller #0 [ 1824.270140][ T2553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1824.280211][ T2553] Call Trace: [ 1824.283500][ T2553] [ 1824.286441][ T2553] dump_stack_lvl+0x18c/0x250 [ 1824.291139][ T2553] ? show_regs_print_info+0x20/0x20 [ 1824.296360][ T2553] ? load_image+0x420/0x420 [ 1824.300893][ T2553] ? __might_fault+0xaa/0x120 [ 1824.305589][ T2553] ? __lock_acquire+0x7d40/0x7d40 [ 1824.310644][ T2553] should_fail_ex+0x39d/0x4d0 [ 1824.315354][ T2553] _copy_from_user+0x2f/0xe0 [ 1824.319970][ T2553] ___sys_sendmsg+0x1c7/0x360 [ 1824.324670][ T2553] ? __sys_sendmsg+0x2a0/0x2a0 [ 1824.329469][ T2553] ? seqcount_lockdep_reader_access+0x17b/0x1d0 [ 1824.335752][ T2553] __se_sys_sendmsg+0x1c2/0x2b0 [ 1824.340621][ T2553] ? __x64_sys_sendmsg+0x80/0x80 [ 1824.345589][ T2553] ? lockdep_hardirqs_on+0x98/0x150 [ 1824.350808][ T2553] do_syscall_64+0x55/0xb0 [ 1824.355236][ T2553] ? clear_bhb_loop+0x40/0x90 [ 1824.359929][ T2553] ? clear_bhb_loop+0x40/0x90 [ 1824.364627][ T2553] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1824.370542][ T2553] RIP: 0033:0x7ffa4d19ce59 [ 1824.374988][ T2553] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1824.394616][ T2553] RSP: 002b:00007ffa4e047028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1824.403049][ T2553] RAX: ffffffffffffffda RBX: 00007ffa4d415fa0 RCX: 00007ffa4d19ce59 [ 1824.411037][ T2553] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000007 [ 1824.419020][ T2553] RBP: 00007ffa4e047090 R08: 0000000000000000 R09: 0000000000000000 [ 1824.427003][ T2553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1824.434994][ T2553] R13: 00007ffa4d416038 R14: 00007ffa4d415fa0 R15: 00007ffd52d64098 [ 1824.443004][ T2553] [ 1825.355718][ T2574] netlink: 'syz.1.8429': attribute type 39 has an invalid length. [ 1825.844951][ T2590] FAULT_INJECTION: forcing a failure. [ 1825.844951][ T2590] name failslab, interval 1, probability 0, space 0, times 0 [ 1825.905655][ T2590] CPU: 1 PID: 2590 Comm: syz.1.8434 Not tainted syzkaller #0 [ 1825.913082][ T2590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1825.923155][ T2590] Call Trace: [ 1825.926451][ T2590] [ 1825.929397][ T2590] dump_stack_lvl+0x18c/0x250 [ 1825.934101][ T2590] ? show_regs_print_info+0x20/0x20 [ 1825.939341][ T2590] ? load_image+0x420/0x420 [ 1825.943873][ T2590] ? __might_sleep+0xe0/0xe0 [ 1825.948488][ T2590] ? __lock_acquire+0x7d40/0x7d40 [ 1825.953532][ T2590] should_fail_ex+0x39d/0x4d0 [ 1825.958233][ T2590] should_failslab+0x9/0x20 [ 1825.962759][ T2590] slab_pre_alloc_hook+0x59/0x310 [ 1825.967803][ T2590] ? bpf_prog_test_run_skb+0x238/0x12b0 [ 1825.973356][ T2590] ? bpf_prog_test_run_skb+0x238/0x12b0 [ 1825.978899][ T2590] __kmem_cache_alloc_node+0x53/0x250 [ 1825.984283][ T2590] ? bpf_prog_test_run_skb+0x238/0x12b0 [ 1825.989824][ T2590] __kmalloc+0xa4/0x230 [ 1825.993979][ T2590] bpf_prog_test_run_skb+0x238/0x12b0 [ 1825.999341][ T2590] ? __fget_files+0x28/0x4b0 [ 1826.003928][ T2590] ? __fget_files+0x28/0x4b0 [ 1826.008517][ T2590] ? __fget_files+0x43d/0x4b0 [ 1826.013198][ T2590] ? cpu_online+0x60/0x60 [ 1826.017522][ T2590] bpf_prog_test_run+0x321/0x390 [ 1826.022453][ T2590] __sys_bpf+0x49d/0x890 [ 1826.026696][ T2590] ? bpf_link_show_fdinfo+0x390/0x390 [ 1826.032070][ T2590] ? lock_chain_count+0x20/0x20 [ 1826.036924][ T2590] __x64_sys_bpf+0x7c/0x90 [ 1826.041337][ T2590] do_syscall_64+0x55/0xb0 [ 1826.045744][ T2590] ? clear_bhb_loop+0x40/0x90 [ 1826.050422][ T2590] ? clear_bhb_loop+0x40/0x90 [ 1826.055092][ T2590] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1826.060976][ T2590] RIP: 0033:0x7efcb8d9ce59 [ 1826.065382][ T2590] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1826.084979][ T2590] RSP: 002b:00007efcb9bec028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1826.093381][ T2590] RAX: ffffffffffffffda RBX: 00007efcb9015fa0 RCX: 00007efcb8d9ce59 [ 1826.101340][ T2590] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 1826.109318][ T2590] RBP: 00007efcb9bec090 R08: 0000000000000000 R09: 0000000000000000 [ 1826.117291][ T2590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1826.125262][ T2590] R13: 00007efcb9016038 R14: 00007efcb9015fa0 R15: 00007ffedc97a728 [ 1826.133249][ T2590] [ 1826.245201][ T2594] netlink: 'syz.9.8435': attribute type 10 has an invalid length. [ 1826.272615][ T2594] netlink: 152 bytes leftover after parsing attributes in process `syz.9.8435'. [ 1826.303205][ T2594] A link change request failed with some changes committed already. Interface bond0 may have been left with an inconsistent configuration, please check. [ 1826.634303][ T2617] FAULT_INJECTION: forcing a failure. [ 1826.634303][ T2617] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1826.752450][ T2617] CPU: 0 PID: 2617 Comm: syz.0.8437 Not tainted syzkaller #0 [ 1826.759894][ T2617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1826.769970][ T2617] Call Trace: [ 1826.773263][ T2617] [ 1826.776215][ T2617] dump_stack_lvl+0x18c/0x250 [ 1826.780913][ T2617] ? show_regs_print_info+0x20/0x20 [ 1826.786134][ T2617] ? load_image+0x420/0x420 [ 1826.790661][ T2617] ? __lock_acquire+0x7d40/0x7d40 [ 1826.795711][ T2617] ? snprintf+0xe9/0x140 [ 1826.799978][ T2617] should_fail_ex+0x39d/0x4d0 [ 1826.804683][ T2617] _copy_to_user+0x2f/0xa0 [ 1826.809120][ T2617] simple_read_from_buffer+0xe7/0x150 [ 1826.814523][ T2617] proc_fail_nth_read+0x1e8/0x260 [ 1826.819577][ T2617] ? proc_fault_inject_write+0x360/0x360 [ 1826.825235][ T2617] ? fsnotify_perm+0x271/0x5e0 [ 1826.830014][ T2617] ? proc_fault_inject_write+0x360/0x360 [ 1826.835673][ T2617] vfs_read+0x28b/0x970 [ 1826.839861][ T2617] ? kernel_read+0x1e0/0x1e0 [ 1826.844476][ T2617] ? __fget_files+0x28/0x4b0 [ 1826.849083][ T2617] ? __fget_files+0x28/0x4b0 [ 1826.853693][ T2617] ? __fget_files+0x43d/0x4b0 [ 1826.858398][ T2617] ? __fdget_pos+0x2a3/0x330 [ 1826.863006][ T2617] ? ksys_read+0x75/0x260 [ 1826.867361][ T2617] ksys_read+0x150/0x260 [ 1826.871630][ T2617] ? vfs_write+0x990/0x990 [ 1826.876072][ T2617] ? lockdep_hardirqs_on+0x98/0x150 [ 1826.881297][ T2617] do_syscall_64+0x55/0xb0 [ 1826.885728][ T2617] ? clear_bhb_loop+0x40/0x90 [ 1826.890425][ T2617] ? clear_bhb_loop+0x40/0x90 [ 1826.895123][ T2617] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1826.901037][ T2617] RIP: 0033:0x7fcc5df5d68e [ 1826.905465][ T2617] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1826.925086][ T2617] RSP: 002b:00007fcc5eea2fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1826.933521][ T2617] RAX: ffffffffffffffda RBX: 00007fcc5eea36c0 RCX: 00007fcc5df5d68e [ 1826.941506][ T2617] RDX: 000000000000000f RSI: 00007fcc5eea30a0 RDI: 0000000000000005 [ 1826.949496][ T2617] RBP: 00007fcc5eea3090 R08: 0000000000000000 R09: 0000000000000000 [ 1826.957486][ T2617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1826.965470][ T2617] R13: 00007fcc5e216218 R14: 00007fcc5e216180 R15: 00007ffddadbe528 [ 1826.973472][ T2617] [ 1827.832042][ T2628] netlink: 'syz.8.8443': attribute type 10 has an invalid length. [ 1827.879086][ T2628] netlink: 55 bytes leftover after parsing attributes in process `syz.8.8443'. [ 1828.044643][ T2642] FAULT_INJECTION: forcing a failure. [ 1828.044643][ T2642] name failslab, interval 1, probability 0, space 0, times 0 [ 1828.142580][ T2642] CPU: 0 PID: 2642 Comm: syz.1.8447 Not tainted syzkaller #0 [ 1828.150009][ T2642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1828.160085][ T2642] Call Trace: [ 1828.163380][ T2642] [ 1828.166322][ T2642] dump_stack_lvl+0x18c/0x250 [ 1828.171021][ T2642] ? show_regs_print_info+0x20/0x20 [ 1828.176240][ T2642] ? load_image+0x420/0x420 [ 1828.180763][ T2642] ? __might_sleep+0xe0/0xe0 [ 1828.185352][ T2642] ? __lock_acquire+0x7d40/0x7d40 [ 1828.190375][ T2642] should_fail_ex+0x39d/0x4d0 [ 1828.195056][ T2642] should_failslab+0x9/0x20 [ 1828.199554][ T2642] slab_pre_alloc_hook+0x59/0x310 [ 1828.204575][ T2642] ? tomoyo_encode+0x28b/0x540 [ 1828.209332][ T2642] ? tomoyo_encode+0x28b/0x540 [ 1828.214093][ T2642] __kmem_cache_alloc_node+0x53/0x250 [ 1828.219467][ T2642] ? tomoyo_encode+0x28b/0x540 [ 1828.224258][ T2642] __kmalloc+0xa4/0x230 [ 1828.228414][ T2642] tomoyo_encode+0x28b/0x540 [ 1828.232998][ T2642] tomoyo_realpath_from_path+0x592/0x5d0 [ 1828.238628][ T2642] tomoyo_path_number_perm+0x248/0x620 [ 1828.244106][ T2642] ? tomoyo_path_number_perm+0x217/0x620 [ 1828.249802][ T2642] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 1828.255286][ T2642] ? ksys_write+0x1c4/0x260 [ 1828.259811][ T2642] ? __fget_files+0x28/0x4b0 [ 1828.264396][ T2642] ? __fget_files+0x28/0x4b0 [ 1828.268992][ T2642] security_file_ioctl+0x70/0xa0 [ 1828.273931][ T2642] __se_sys_ioctl+0x48/0x170 [ 1828.278522][ T2642] do_syscall_64+0x55/0xb0 [ 1828.282933][ T2642] ? clear_bhb_loop+0x40/0x90 [ 1828.287602][ T2642] ? clear_bhb_loop+0x40/0x90 [ 1828.292273][ T2642] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1828.298157][ T2642] RIP: 0033:0x7efcb8d9ce59 [ 1828.302564][ T2642] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1828.322166][ T2642] RSP: 002b:00007efcb9bec028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1828.330581][ T2642] RAX: ffffffffffffffda RBX: 00007efcb9015fa0 RCX: 00007efcb8d9ce59 [ 1828.338542][ T2642] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000004 [ 1828.346511][ T2642] RBP: 00007efcb9bec090 R08: 0000000000000000 R09: 0000000000000000 [ 1828.354472][ T2642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1828.362433][ T2642] R13: 00007efcb9016038 R14: 00007efcb9015fa0 R15: 00007ffedc97a728 [ 1828.370410][ T2642] [ 1828.502587][ T2642] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1829.774956][ T2649] netlink: 'syz.9.8448': attribute type 28 has an invalid length. [ 1829.833770][ T2651] netlink: 'syz.9.8448': attribute type 10 has an invalid length. [ 1830.242370][ T2659] netlink: 'syz.8.8452': attribute type 39 has an invalid length. [ 1831.365328][ T2686] FAULT_INJECTION: forcing a failure. [ 1831.365328][ T2686] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1831.401297][ T2677] netlink: 'syz.0.8457': attribute type 10 has an invalid length. [ 1831.402652][ T2686] CPU: 0 PID: 2686 Comm: syz.1.8459 Not tainted syzkaller #0 [ 1831.416527][ T2686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1831.426591][ T2686] Call Trace: [ 1831.429861][ T2686] [ 1831.432808][ T2686] dump_stack_lvl+0x18c/0x250 [ 1831.437484][ T2686] ? show_regs_print_info+0x20/0x20 [ 1831.442682][ T2686] ? load_image+0x420/0x420 [ 1831.447185][ T2686] ? __might_fault+0xaa/0x120 [ 1831.451857][ T2686] ? __lock_acquire+0x7d40/0x7d40 [ 1831.456881][ T2686] should_fail_ex+0x39d/0x4d0 [ 1831.461561][ T2686] _copy_from_user+0x2f/0xe0 [ 1831.466151][ T2686] __sys_bpf+0x23e/0x890 [ 1831.470410][ T2686] ? bpf_link_show_fdinfo+0x390/0x390 [ 1831.475802][ T2686] ? lock_chain_count+0x20/0x20 [ 1831.480658][ T2686] __x64_sys_bpf+0x7c/0x90 [ 1831.485073][ T2686] do_syscall_64+0x55/0xb0 [ 1831.489487][ T2686] ? clear_bhb_loop+0x40/0x90 [ 1831.494164][ T2686] ? clear_bhb_loop+0x40/0x90 [ 1831.498841][ T2686] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1831.504760][ T2686] RIP: 0033:0x7efcb8d9ce59 [ 1831.509185][ T2686] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1831.528804][ T2686] RSP: 002b:00007efcb9bec028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1831.537219][ T2686] RAX: ffffffffffffffda RBX: 00007efcb9015fa0 RCX: 00007efcb8d9ce59 [ 1831.545184][ T2686] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000003 [ 1831.553151][ T2686] RBP: 00007efcb9bec090 R08: 0000000000000000 R09: 0000000000000000 [ 1831.561120][ T2686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1831.569104][ T2686] R13: 00007efcb9016038 R14: 00007efcb9015fa0 R15: 00007ffedc97a728 [ 1831.577104][ T2686] [ 1831.683476][ T2677] netlink: 152 bytes leftover after parsing attributes in process `syz.0.8457'. [ 1831.797637][ T2677] A link change request failed with some changes committed already. Interface bond0 may have been left with an inconsistent configuration, please check. [ 1832.354401][ T2698] netlink: 'syz.9.8461': attribute type 10 has an invalid length. [ 1832.392647][ T2698] netlink: 55 bytes leftover after parsing attributes in process `syz.9.8461'. [ 1833.834891][ T2709] netlink: 'syz.0.8463': attribute type 39 has an invalid length. [ 1835.663222][ T2741] FAULT_INJECTION: forcing a failure. [ 1835.663222][ T2741] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1835.829546][ T2741] CPU: 1 PID: 2741 Comm: syz.8.8470 Not tainted syzkaller #0 [ 1835.836977][ T2741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1835.847057][ T2741] Call Trace: [ 1835.850356][ T2741] [ 1835.853304][ T2741] dump_stack_lvl+0x18c/0x250 [ 1835.858007][ T2741] ? show_regs_print_info+0x20/0x20 [ 1835.863227][ T2741] ? load_image+0x420/0x420 [ 1835.867756][ T2741] ? __lock_acquire+0x7d40/0x7d40 [ 1835.872802][ T2741] ? snprintf+0xe9/0x140 [ 1835.877067][ T2741] should_fail_ex+0x39d/0x4d0 [ 1835.881819][ T2741] _copy_to_user+0x2f/0xa0 [ 1835.886257][ T2741] simple_read_from_buffer+0xe7/0x150 [ 1835.891660][ T2741] proc_fail_nth_read+0x1e8/0x260 [ 1835.896712][ T2741] ? proc_fault_inject_write+0x360/0x360 [ 1835.902380][ T2741] ? fsnotify_perm+0x271/0x5e0 [ 1835.907148][ T2741] ? proc_fault_inject_write+0x360/0x360 [ 1835.913127][ T2741] vfs_read+0x28b/0x970 [ 1835.917280][ T2741] ? kernel_read+0x1e0/0x1e0 [ 1835.921864][ T2741] ? __fget_files+0x28/0x4b0 [ 1835.926447][ T2741] ? __fget_files+0x28/0x4b0 [ 1835.931030][ T2741] ? __fget_files+0x43d/0x4b0 [ 1835.935707][ T2741] ? __fdget_pos+0x2a3/0x330 [ 1835.940291][ T2741] ? ksys_read+0x75/0x260 [ 1835.944618][ T2741] ksys_read+0x150/0x260 [ 1835.948854][ T2741] ? vfs_write+0x990/0x990 [ 1835.953268][ T2741] ? lockdep_hardirqs_on+0x98/0x150 [ 1835.958461][ T2741] do_syscall_64+0x55/0xb0 [ 1835.962865][ T2741] ? clear_bhb_loop+0x40/0x90 [ 1835.967536][ T2741] ? clear_bhb_loop+0x40/0x90 [ 1835.972208][ T2741] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1835.978092][ T2741] RIP: 0033:0x7f3ecab5d68e [ 1835.982501][ T2741] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1836.002118][ T2741] RSP: 002b:00007f3ec8dd4fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1836.010524][ T2741] RAX: ffffffffffffffda RBX: 00007f3ec8dd56c0 RCX: 00007f3ecab5d68e [ 1836.018485][ T2741] RDX: 000000000000000f RSI: 00007f3ec8dd50a0 RDI: 000000000000000b [ 1836.026450][ T2741] RBP: 00007f3ec8dd5090 R08: 0000000000000000 R09: 0000000000000000 [ 1836.034409][ T2741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1836.042367][ T2741] R13: 00007f3ecae16218 R14: 00007f3ecae16180 R15: 00007fff0c6bff68 [ 1836.050340][ T2741] [ 1836.087601][ T2751] netlink: 'syz.1.8475': attribute type 39 has an invalid length. [ 1838.844423][ T2794] FAULT_INJECTION: forcing a failure. [ 1838.844423][ T2794] name failslab, interval 1, probability 0, space 0, times 0 [ 1838.902706][ T2794] CPU: 0 PID: 2794 Comm: syz.1.8485 Not tainted syzkaller #0 [ 1838.910139][ T2794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1838.920216][ T2794] Call Trace: [ 1838.923511][ T2794] [ 1838.926454][ T2794] dump_stack_lvl+0x18c/0x250 [ 1838.931153][ T2794] ? show_regs_print_info+0x20/0x20 [ 1838.936375][ T2794] ? load_image+0x420/0x420 [ 1838.940909][ T2794] ? __might_sleep+0xe0/0xe0 [ 1838.945525][ T2794] ? __lock_acquire+0x7d40/0x7d40 [ 1838.950568][ T2794] should_fail_ex+0x39d/0x4d0 [ 1838.955266][ T2794] should_failslab+0x9/0x20 [ 1838.959785][ T2794] slab_pre_alloc_hook+0x59/0x310 [ 1838.964830][ T2794] ? tomoyo_encode+0x28b/0x540 [ 1838.969605][ T2794] ? tomoyo_encode+0x28b/0x540 [ 1838.974375][ T2794] __kmem_cache_alloc_node+0x53/0x250 [ 1838.979762][ T2794] ? tomoyo_encode+0x28b/0x540 [ 1838.984533][ T2794] __kmalloc+0xa4/0x230 [ 1838.988707][ T2794] tomoyo_encode+0x28b/0x540 [ 1838.993313][ T2794] tomoyo_realpath_from_path+0x592/0x5d0 [ 1838.998978][ T2794] tomoyo_path_number_perm+0x248/0x620 [ 1839.004465][ T2794] ? tomoyo_path_number_perm+0x217/0x620 [ 1839.010111][ T2794] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 1839.015588][ T2794] ? ksys_write+0x1c4/0x260 [ 1839.020131][ T2794] ? __fget_files+0x28/0x4b0 [ 1839.024730][ T2794] ? __fget_files+0x28/0x4b0 [ 1839.029340][ T2794] security_file_ioctl+0x70/0xa0 [ 1839.034298][ T2794] __se_sys_ioctl+0x48/0x170 [ 1839.038908][ T2794] do_syscall_64+0x55/0xb0 [ 1839.043331][ T2794] ? clear_bhb_loop+0x40/0x90 [ 1839.048019][ T2794] ? clear_bhb_loop+0x40/0x90 [ 1839.052707][ T2794] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1839.058609][ T2794] RIP: 0033:0x7efcb8d9ce59 [ 1839.063031][ T2794] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1839.082645][ T2794] RSP: 002b:00007efcb9bec028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1839.091071][ T2794] RAX: ffffffffffffffda RBX: 00007efcb9015fa0 RCX: 00007efcb8d9ce59 [ 1839.099059][ T2794] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 0000000000000012 [ 1839.107040][ T2794] RBP: 00007efcb9bec090 R08: 0000000000000000 R09: 0000000000000000 [ 1839.115022][ T2794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1839.123004][ T2794] R13: 00007efcb9016038 R14: 00007efcb9015fa0 R15: 00007ffedc97a728 [ 1839.131000][ T2794] [ 1839.292627][ T2794] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1841.709992][ T2850] FAULT_INJECTION: forcing a failure. [ 1841.709992][ T2850] name failslab, interval 1, probability 0, space 0, times 0 [ 1841.872821][ T2850] CPU: 1 PID: 2850 Comm: syz.0.8498 Not tainted syzkaller #0 [ 1841.880258][ T2850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1841.890330][ T2850] Call Trace: [ 1841.893620][ T2850] [ 1841.896563][ T2850] dump_stack_lvl+0x18c/0x250 [ 1841.901263][ T2850] ? show_regs_print_info+0x20/0x20 [ 1841.906477][ T2850] ? load_image+0x420/0x420 [ 1841.911006][ T2850] ? __might_sleep+0xe0/0xe0 [ 1841.915618][ T2850] ? __lock_acquire+0x7d40/0x7d40 [ 1841.920667][ T2850] should_fail_ex+0x39d/0x4d0 [ 1841.925373][ T2850] should_failslab+0x9/0x20 [ 1841.929899][ T2850] slab_pre_alloc_hook+0x59/0x310 [ 1841.934951][ T2850] ? tomoyo_encode+0x28b/0x540 [ 1841.939730][ T2850] ? tomoyo_encode+0x28b/0x540 [ 1841.944503][ T2850] __kmem_cache_alloc_node+0x53/0x250 [ 1841.949896][ T2850] ? tomoyo_encode+0x28b/0x540 [ 1841.954670][ T2850] __kmalloc+0xa4/0x230 [ 1841.958849][ T2850] tomoyo_encode+0x28b/0x540 [ 1841.963467][ T2850] tomoyo_realpath_from_path+0x592/0x5d0 [ 1841.969133][ T2850] tomoyo_path_number_perm+0x248/0x620 [ 1841.974616][ T2850] ? tomoyo_path_number_perm+0x217/0x620 [ 1841.980273][ T2850] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 1841.985751][ T2850] ? trace_call_bpf+0xc3/0x6c0 [ 1841.990524][ T2850] ? trace_call_bpf+0xc3/0x6c0 [ 1841.995288][ T2850] ? trace_call_bpf+0x5e9/0x6c0 [ 1842.000155][ T2850] ? __fget_files+0x28/0x4b0 [ 1842.004741][ T2850] ? __fget_files+0x28/0x4b0 [ 1842.009333][ T2850] security_file_ioctl+0x70/0xa0 [ 1842.014266][ T2850] __se_sys_ioctl+0x48/0x170 [ 1842.018852][ T2850] do_syscall_64+0x55/0xb0 [ 1842.023258][ T2850] ? clear_bhb_loop+0x40/0x90 [ 1842.027926][ T2850] ? clear_bhb_loop+0x40/0x90 [ 1842.032598][ T2850] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1842.038486][ T2850] RIP: 0033:0x7fcc5df9ce59 [ 1842.042892][ T2850] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1842.062491][ T2850] RSP: 002b:00007fcc5eee5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1842.070893][ T2850] RAX: ffffffffffffffda RBX: 00007fcc5e215fa0 RCX: 00007fcc5df9ce59 [ 1842.078860][ T2850] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 1842.086822][ T2850] RBP: 00007fcc5eee5090 R08: 0000000000000000 R09: 0000000000000000 [ 1842.094783][ T2850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1842.102742][ T2850] R13: 00007fcc5e216038 R14: 00007fcc5e215fa0 R15: 00007ffddadbe528 [ 1842.110716][ T2850] [ 1842.179189][ T2850] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1843.760280][ T2880] syzkaller0: entered promiscuous mode [ 1843.811665][ T2880] syzkaller0: entered allmulticast mode [ 1843.943092][ T2877] netlink: 201392 bytes leftover after parsing attributes in process `syz.9.8508'. [ 1844.063121][ T2877] netlink: 8446 bytes leftover after parsing attributes in process `syz.9.8508'. [ 1848.057740][ T1290] ieee802154 phy0 wpan0: encryption failed: -22 [ 1848.070283][ T1290] ieee802154 phy1 wpan1: encryption failed: -22 [ 1849.917935][ T2897] netlink: 'syz.8.8513': attribute type 39 has an invalid length. [ 1851.727239][ T2977] netlink: 'syz.8.8528': attribute type 39 has an invalid length. [ 1853.555613][ T3018] netlink: 'syz.0.8539': attribute type 39 has an invalid length. [ 1855.631810][ T3051] netlink: 'syz.0.8550': attribute type 39 has an invalid length. [ 1855.909844][ T3056] FAULT_INJECTION: forcing a failure. [ 1855.909844][ T3056] name failslab, interval 1, probability 0, space 0, times 0 [ 1856.026508][ T3056] CPU: 0 PID: 3056 Comm: syz.1.8552 Not tainted syzkaller #0 [ 1856.033946][ T3056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1856.044018][ T3056] Call Trace: [ 1856.047313][ T3056] [ 1856.050255][ T3056] dump_stack_lvl+0x18c/0x250 [ 1856.054957][ T3056] ? show_regs_print_info+0x20/0x20 [ 1856.060181][ T3056] ? load_image+0x420/0x420 [ 1856.064717][ T3056] ? __lock_acquire+0x7d40/0x7d40 [ 1856.069771][ T3056] should_fail_ex+0x39d/0x4d0 [ 1856.074479][ T3056] should_failslab+0x9/0x20 [ 1856.079007][ T3056] slab_pre_alloc_hook+0x59/0x310 [ 1856.084057][ T3056] ? bpf_prog_alloc+0x3d/0x1a0 [ 1856.088839][ T3056] ? bpf_prog_load+0x6eb/0x1670 [ 1856.093709][ T3056] ? __sys_bpf+0x5ba/0x890 [ 1856.098144][ T3056] kmem_cache_alloc_node+0x60/0x320 [ 1856.103365][ T3056] ? alloc_vmap_area+0x1b4/0x1e30 [ 1856.108413][ T3056] alloc_vmap_area+0x1b4/0x1e30 [ 1856.113297][ T3056] ? vm_map_ram+0xcb0/0xcb0 [ 1856.117801][ T3056] ? rcu_is_watching+0x15/0xb0 [ 1856.122581][ T3056] __get_vm_area_node+0x162/0x370 [ 1856.127617][ T3056] __vmalloc_node_range+0x36e/0x1330 [ 1856.132902][ T3056] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 1856.138447][ T3056] ? mark_lock+0x94/0x320 [ 1856.142775][ T3056] ? __lock_acquire+0x1347/0x7d40 [ 1856.147797][ T3056] ? verify_lock_unused+0x140/0x140 [ 1856.153000][ T3056] ? free_vm_area+0x50/0x50 [ 1856.157502][ T3056] ? end_current_label_crit_section+0x170/0x170 [ 1856.163747][ T3056] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 1856.169286][ T3056] __vmalloc+0x7a/0x90 [ 1856.173352][ T3056] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 1856.178891][ T3056] bpf_prog_alloc_no_stats+0x47/0x440 [ 1856.184254][ T3056] ? bpf_prog_alloc+0x2b/0x1a0 [ 1856.189011][ T3056] bpf_prog_alloc+0x3d/0x1a0 [ 1856.193596][ T3056] bpf_prog_load+0x6eb/0x1670 [ 1856.198273][ T3056] ? map_freeze+0x420/0x420 [ 1856.202773][ T3056] ? __might_fault+0xaa/0x120 [ 1856.207443][ T3056] ? __lock_acquire+0x7d40/0x7d40 [ 1856.212459][ T3056] ? file_end_write+0x159/0x250 [ 1856.217320][ T3056] ? __might_fault+0xaa/0x120 [ 1856.222007][ T3056] ? __might_fault+0xc6/0x120 [ 1856.226697][ T3056] ? __might_fault+0xaa/0x120 [ 1856.231378][ T3056] ? bpf_lsm_bpf+0x9/0x10 [ 1856.235709][ T3056] ? security_bpf+0x7e/0xa0 [ 1856.240216][ T3056] __sys_bpf+0x5ba/0x890 [ 1856.244466][ T3056] ? bpf_link_show_fdinfo+0x390/0x390 [ 1856.249851][ T3056] ? lock_chain_count+0x20/0x20 [ 1856.254707][ T3056] __x64_sys_bpf+0x7c/0x90 [ 1856.259117][ T3056] do_syscall_64+0x55/0xb0 [ 1856.263539][ T3056] ? clear_bhb_loop+0x40/0x90 [ 1856.268237][ T3056] ? clear_bhb_loop+0x40/0x90 [ 1856.272911][ T3056] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1856.278795][ T3056] RIP: 0033:0x7efcb8d9ce59 [ 1856.283214][ T3056] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1856.302819][ T3056] RSP: 002b:00007efcb9bec028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1856.311225][ T3056] RAX: ffffffffffffffda RBX: 00007efcb9015fa0 RCX: 00007efcb8d9ce59 [ 1856.319190][ T3056] RDX: 0000000000000094 RSI: 0000200000000ac0 RDI: 0000000000000005 [ 1856.327154][ T3056] RBP: 00007efcb9bec090 R08: 0000000000000000 R09: 0000000000000000 [ 1856.335115][ T3056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1856.343077][ T3056] R13: 00007efcb9016038 R14: 00007efcb9015fa0 R15: 00007ffedc97a728 [ 1856.351051][ T3056] [ 1856.467089][ T3056] syz.1.8552: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz1,mems_allowed=0-1 [ 1856.665805][ T3056] CPU: 0 PID: 3056 Comm: syz.1.8552 Not tainted syzkaller #0 [ 1856.673255][ T3056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1856.683336][ T3056] Call Trace: [ 1856.686633][ T3056] [ 1856.689581][ T3056] dump_stack_lvl+0x18c/0x250 [ 1856.694284][ T3056] ? show_regs_print_info+0x20/0x20 [ 1856.699505][ T3056] ? load_image+0x420/0x420 [ 1856.704038][ T3056] ? cpuset_print_current_mems_allowed+0x1f/0x360 [ 1856.710486][ T3056] ? cpuset_print_current_mems_allowed+0x2e7/0x360 [ 1856.717013][ T3056] warn_alloc+0x246/0x340 [ 1856.721374][ T3056] ? slab_free_freelist_hook+0x130/0x1a0 [ 1856.727036][ T3056] ? zone_watermark_ok_safe+0x230/0x230 [ 1856.732615][ T3056] ? __get_vm_area_node+0x17b/0x370 [ 1856.737844][ T3056] ? __get_vm_area_node+0x17b/0x370 [ 1856.743080][ T3056] __vmalloc_node_range+0x393/0x1330 [ 1856.748395][ T3056] ? mark_lock+0x94/0x320 [ 1856.752755][ T3056] ? __lock_acquire+0x1347/0x7d40 [ 1856.757807][ T3056] ? verify_lock_unused+0x140/0x140 [ 1856.763049][ T3056] ? free_vm_area+0x50/0x50 [ 1856.767577][ T3056] ? end_current_label_crit_section+0x170/0x170 [ 1856.773850][ T3056] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 1856.779420][ T3056] __vmalloc+0x7a/0x90 [ 1856.783518][ T3056] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 1856.789086][ T3056] bpf_prog_alloc_no_stats+0x47/0x440 [ 1856.794481][ T3056] ? bpf_prog_alloc+0x2b/0x1a0 [ 1856.799268][ T3056] bpf_prog_alloc+0x3d/0x1a0 [ 1856.803883][ T3056] bpf_prog_load+0x6eb/0x1670 [ 1856.808594][ T3056] ? map_freeze+0x420/0x420 [ 1856.813121][ T3056] ? __might_fault+0xaa/0x120 [ 1856.817823][ T3056] ? __lock_acquire+0x7d40/0x7d40 [ 1856.822869][ T3056] ? file_end_write+0x159/0x250 [ 1856.827744][ T3056] ? __might_fault+0xaa/0x120 [ 1856.832434][ T3056] ? __might_fault+0xc6/0x120 [ 1856.837121][ T3056] ? __might_fault+0xaa/0x120 [ 1856.841809][ T3056] ? bpf_lsm_bpf+0x9/0x10 [ 1856.846160][ T3056] ? security_bpf+0x7e/0xa0 [ 1856.850695][ T3056] __sys_bpf+0x5ba/0x890 [ 1856.854967][ T3056] ? bpf_link_show_fdinfo+0x390/0x390 [ 1856.860374][ T3056] ? lock_chain_count+0x20/0x20 [ 1856.865258][ T3056] __x64_sys_bpf+0x7c/0x90 [ 1856.869691][ T3056] do_syscall_64+0x55/0xb0 [ 1856.874122][ T3056] ? clear_bhb_loop+0x40/0x90 [ 1856.878823][ T3056] ? clear_bhb_loop+0x40/0x90 [ 1856.883525][ T3056] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1856.889553][ T3056] RIP: 0033:0x7efcb8d9ce59 [ 1856.893989][ T3056] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1856.913617][ T3056] RSP: 002b:00007efcb9bec028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1856.922062][ T3056] RAX: ffffffffffffffda RBX: 00007efcb9015fa0 RCX: 00007efcb8d9ce59 [ 1856.930060][ T3056] RDX: 0000000000000094 RSI: 0000200000000ac0 RDI: 0000000000000005 [ 1856.938055][ T3056] RBP: 00007efcb9bec090 R08: 0000000000000000 R09: 0000000000000000 [ 1856.946046][ T3056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1856.954034][ T3056] R13: 00007efcb9016038 R14: 00007efcb9015fa0 R15: 00007ffedc97a728 [ 1856.962043][ T3056] [ 1857.075072][ T3056] Mem-Info: [ 1857.083208][ T3056] active_anon:77058 inactive_anon:0 isolated_anon:0 [ 1857.083208][ T3056] active_file:20162 inactive_file:40607 isolated_file:0 [ 1857.083208][ T3056] unevictable:768 dirty:255 writeback:0 [ 1857.083208][ T3056] slab_reclaimable:11976 slab_unreclaimable:103742 [ 1857.083208][ T3056] mapped:37433 shmem:69911 pagetables:1153 [ 1857.083208][ T3056] sec_pagetables:0 bounce:0 [ 1857.083208][ T3056] kernel_misc_reclaimable:0 [ 1857.083208][ T3056] free:1260576 free_pcp:4367 free_cma:0 [ 1857.217155][ T3056] Node 0 active_anon:316232kB inactive_anon:0kB active_file:80648kB inactive_file:162228kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:151532kB dirty:1020kB writeback:0kB shmem:286008kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:12820kB pagetables:4612kB sec_pagetables:0kB all_unreclaimable? no [ 1857.298643][ T3056] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:200kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:1536kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB sec_pagetables:0kB all_unreclaimable? no [ 1857.365641][ T3056] Node 0 DMA free:15360kB boost:0kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1857.432573][ T3056] lowmem_reserve[]: 0 2521 2522 2522 2522 [ 1857.442776][ T3056] Node 0 DMA32 free:1106892kB boost:0kB min:34644kB low:43304kB high:51964kB reserved_highatomic:0KB active_anon:325696kB inactive_anon:0kB active_file:80648kB inactive_file:161404kB unevictable:1536kB writepending:1020kB present:3129332kB managed:2586944kB mlocked:0kB bounce:0kB free_pcp:6764kB local_pcp:5188kB free_cma:0kB [ 1857.519174][ T3056] lowmem_reserve[]: 0 0 0 0 0 [ 1857.524379][ T3056] Node 0 Normal free:0kB boost:0kB min:8kB low:8kB high:8kB reserved_highatomic:0KB active_anon:36kB inactive_anon:0kB active_file:0kB inactive_file:824kB unevictable:0kB writepending:0kB present:1048576kB managed:872kB mlocked:0kB bounce:0kB free_pcp:12kB local_pcp:12kB free_cma:0kB [ 1857.644584][ T3056] lowmem_reserve[]: 0 0 0 0 0 [ 1857.649372][ T3056] Node 1 Normal free:3901012kB boost:0kB min:55244kB low:69052kB high:82860kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:200kB unevictable:1536kB writepending:0kB present:4194304kB managed:4117312kB mlocked:0kB bounce:0kB free_pcp:11264kB local_pcp:11264kB free_cma:0kB [ 1857.822841][ T3056] lowmem_reserve[]: 0 0 0 0 0 [ 1857.827658][ T3056] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 1857.901294][ T3056] Node 0 DMA32: 1569*4kB (UME) 2066*8kB (UME) 1158*16kB (UME) 577*32kB (UME) 1434*64kB (UME) 982*128kB (UME) 281*256kB (UE) 206*512kB (UM) 60*1024kB (UME) 9*2048kB (UME) 139*4096kB (M) = 1103892kB [ 1858.032547][ T3056] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 1858.088854][ T3056] Node 1 Normal: 235*4kB (UE) 63*8kB (UE) 47*16kB (UE) 238*32kB (UE) 90*64kB (UME) 11*128kB (UME) 0*256kB 2*512kB (ME) 0*1024kB 2*2048kB (UE) 947*4096kB (M) = 3901012kB [ 1858.172633][ T3056] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1858.233897][ T3056] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 1858.274388][ T3056] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1858.352610][ T3056] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 1858.412656][ T3056] 134284 total pagecache pages [ 1858.417613][ T3056] 0 pages in swap cache [ 1858.452812][ T3056] Free swap = 124996kB [ 1858.457009][ T3056] Total swap = 124996kB [ 1858.461172][ T3056] 2097051 pages RAM [ 1858.522763][ T3056] 0 pages HighMem/MovableOnly [ 1858.575321][ T3056] 416929 pages reserved [ 1858.579543][ T3056] 0 pages cma reserved [ 1860.234079][ T3113] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.8570'. [ 1861.129747][ T3121] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.8573'. [ 1862.814505][ T3140] netlink: 'syz.8.8580': attribute type 39 has an invalid length. [ 1863.096482][ T3151] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.8583'. [ 1863.846532][ T3162] netlink: 'syz.0.8585': attribute type 28 has an invalid length. [ 1863.883200][ T3162] netlink: 'syz.0.8585': attribute type 29 has an invalid length. [ 1863.891074][ T3162] netlink: 132 bytes leftover after parsing attributes in process `syz.0.8585'. [ 1864.487020][ T3167] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.8587'. [ 1866.511948][ T3189] netlink: 'syz.9.8592': attribute type 39 has an invalid length. [ 1867.246806][ T3193] netlink: 199836 bytes leftover after parsing attributes in process `syz.8.8593'. [ 1869.828194][ T3217] netlink: 199836 bytes leftover after parsing attributes in process `syz.8.8601'. [ 1870.643940][ T3231] netlink: 'syz.1.8605': attribute type 39 has an invalid length. [ 1871.287951][ T3238] netlink: 199836 bytes leftover after parsing attributes in process `syz.9.8608'. [ 1872.893347][ T3257] netlink: 199836 bytes leftover after parsing attributes in process `syz.9.8620'. [ 1874.509821][ T3277] netlink: 199836 bytes leftover after parsing attributes in process `syz.8.8615'. [ 1875.938796][ T3292] netlink: 'syz.8.8618': attribute type 39 has an invalid length. [ 1876.835383][ T3304] netlink: 199836 bytes leftover after parsing attributes in process `syz.9.8623'. [ 1879.133347][ T3331] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.8629'. [ 1880.259262][ T3344] netlink: 'syz.8.8632': attribute type 39 has an invalid length. [ 1881.028329][ T3354] netlink: 199836 bytes leftover after parsing attributes in process `syz.8.8636'. [ 1882.107841][ T3388] netlink: 'syz.1.8645': attribute type 39 has an invalid length. [ 1882.950192][ T3400] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.8648'. [ 1884.229917][ T3421] netlink: 'syz.8.8654': attribute type 39 has an invalid length. [ 1884.952331][ T3425] netlink: 'syz.8.8655': attribute type 19 has an invalid length. [ 1885.010994][ T3425] netlink: 40 bytes leftover after parsing attributes in process `syz.8.8655'. [ 1885.746702][ T3436] netlink: 199836 bytes leftover after parsing attributes in process `syz.9.8661'. [ 1886.864825][ T3448] netlink: 'syz.9.8664': attribute type 39 has an invalid length. [ 1887.220352][ T3450] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.8665'. [ 1888.053363][ T3461] netlink: 'syz.9.8668': attribute type 19 has an invalid length. [ 1888.074135][ T3461] netlink: 40 bytes leftover after parsing attributes in process `syz.9.8668'. [ 1888.722250][ T3472] netlink: 199836 bytes leftover after parsing attributes in process `syz.9.8671'. [ 1890.306173][ T3491] syzkaller0: entered promiscuous mode [ 1890.392671][ T3491] syzkaller0: entered allmulticast mode [ 1892.775968][ T3524] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.8683'. [ 1896.496056][ T3517] netlink: 'syz.1.8682': attribute type 4 has an invalid length. [ 1899.308513][ T3565] netlink: 60 bytes leftover after parsing attributes in process `syz.1.8695'. [ 1899.330817][ T3565] netlink: 60 bytes leftover after parsing attributes in process `syz.1.8695'. [ 1899.346427][ T3565] netlink: 60 bytes leftover after parsing attributes in process `syz.1.8695'. [ 1899.471703][ T3567] netlink: 199836 bytes leftover after parsing attributes in process `syz.9.8694'. [ 1899.576044][ T3572] netlink: 'syz.0.8696': attribute type 39 has an invalid length. [ 1902.348732][ T3611] netlink: 60 bytes leftover after parsing attributes in process `syz.8.8708'. [ 1902.428250][ T3611] netlink: 60 bytes leftover after parsing attributes in process `syz.8.8708'. [ 1902.522053][ T3615] netlink: 60 bytes leftover after parsing attributes in process `syz.8.8708'. [ 1903.019852][ T3619] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.8710'. [ 1903.167827][ T3622] netlink: 'syz.9.8719': attribute type 39 has an invalid length. [ 1906.112712][ T3662] netlink: 'syz.9.8722': attribute type 39 has an invalid length. [ 1906.528889][ T3665] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.8723'. [ 1906.958396][ T3670] netlink: 'syz.9.8724': attribute type 9 has an invalid length. [ 1907.046266][ T3670] netlink: 209836 bytes leftover after parsing attributes in process `syz.9.8724'. [ 1907.443967][ T3671] netlink: 'syz.9.8724': attribute type 9 has an invalid length. [ 1907.472994][ T3671] netlink: 209836 bytes leftover after parsing attributes in process `syz.9.8724'. [ 1909.492752][ T1290] ieee802154 phy0 wpan0: encryption failed: -22 [ 1909.499113][ T1290] ieee802154 phy1 wpan1: encryption failed: -22 [ 1910.271000][ T3706] bond_slave_1: entered allmulticast mode [ 1910.663120][ T3714] netlink: 'syz.0.8740': attribute type 2 has an invalid length. [ 1910.731818][ T3714] netlink: 132 bytes leftover after parsing attributes in process `syz.0.8740'. [ 1910.812641][ T3720] netlink: 'syz.8.8743': attribute type 2 has an invalid length. [ 1910.850505][ T3720] netlink: 164 bytes leftover after parsing attributes in process `syz.8.8743'. [ 1911.085396][ T3726] netlink: 'syz.0.8745': attribute type 1 has an invalid length. [ 1911.391640][ T3737] netlink: 'syz.9.8749': attribute type 27 has an invalid length. [ 1911.699390][ T3744] netlink: 'syz.0.8752': attribute type 19 has an invalid length. [ 1911.778168][ T3744] netlink: 14552 bytes leftover after parsing attributes in process `syz.0.8752'. [ 1919.383178][ T3905] netlink: 128 bytes leftover after parsing attributes in process `syz.8.8809'. [ 1919.406685][ T3905] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1920.711644][ T3932] netlink: 'syz.8.8820': attribute type 10 has an invalid length. [ 1920.979244][ T3932] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1921.004216][ T3932] batadv0: entered promiscuous mode [ 1921.025576][ T3932] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1921.068001][ T3939] netlink: 128 bytes leftover after parsing attributes in process `syz.9.8823'. [ 1921.092767][ T3939] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1922.153119][ T3969] netlink: 'syz.0.8835': attribute type 10 has an invalid length. [ 1922.205455][ T3969] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1922.229292][ T3969] batadv0: entered promiscuous mode [ 1922.243800][ T3969] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1922.415250][ T3977] netlink: 'syz.9.8839': attribute type 10 has an invalid length. [ 1922.440384][ T3977] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1922.503771][ T3977] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1922.650747][ T3977] bond0: (slave batadv_slave_0): Enslaving as an active interface with an up link [ 1923.191363][ T3999] netlink: 65051 bytes leftover after parsing attributes in process `syz.9.8846'. [ 1924.767211][ T4038] netlink: 'syz.8.8860': attribute type 3 has an invalid length. [ 1924.777298][ T4038] netlink: 132 bytes leftover after parsing attributes in process `syz.8.8860'. [ 1924.867633][ T4039] netlink: 'syz.0.8858': attribute type 3 has an invalid length. [ 1924.960803][ T4039] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.8858'. [ 1925.183075][ T4046] netlink: 128 bytes leftover after parsing attributes in process `syz.1.8861'. [ 1925.217984][ T4046] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1925.387873][ T4055] mac80211_hwsim hwsim217 wlan1: left allmulticast mode [ 1926.243073][ T5777] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 1926.251703][ T5777] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 1926.265371][ T5777] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 1926.283642][ T5777] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 1926.291433][ T5777] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 1926.299950][ T5777] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 1927.080085][ T4087] netlink: 128 bytes leftover after parsing attributes in process `syz.9.8878'. [ 1927.125181][ T4087] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1927.389062][T26501] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1927.419716][ T4072] chnl_net:caif_netlink_parms(): no params data found [ 1927.514674][T26501] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1927.718230][T26501] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1927.955921][T26501] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1928.000825][ T4072] bridge0: port 1(bridge_slave_0) entered blocking state [ 1928.030605][ T4072] bridge0: port 1(bridge_slave_0) entered disabled state [ 1928.048078][ T4072] bridge_slave_0: entered allmulticast mode [ 1928.063590][ T4072] bridge_slave_0: entered promiscuous mode [ 1928.083444][ T4072] bridge0: port 2(bridge_slave_1) entered blocking state [ 1928.100759][ T4072] bridge0: port 2(bridge_slave_1) entered disabled state [ 1928.122706][ T4072] bridge_slave_1: entered allmulticast mode [ 1928.142596][ T4072] bridge_slave_1: entered promiscuous mode [ 1928.364054][ T5777] Bluetooth: hci0: command tx timeout [ 1929.194784][ T4072] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1929.237307][ T4072] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1929.365979][ T4072] team0: Port device team_slave_0 added [ 1929.387287][ T4072] team0: Port device team_slave_1 added [ 1929.508767][ T4072] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1929.548012][ T4072] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1929.632978][ T4072] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1929.664756][ T4072] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1929.689402][ T4072] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1929.727654][ T4137] netlink: 60 bytes leftover after parsing attributes in process `syz.8.8897'. [ 1929.761849][ T4072] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1929.819391][ T4137] netlink: 60 bytes leftover after parsing attributes in process `syz.8.8897'. [ 1929.842947][ T4141] netlink: 60 bytes leftover after parsing attributes in process `syz.8.8897'. [ 1929.993632][ T4137] netlink: 60 bytes leftover after parsing attributes in process `syz.8.8897'. [ 1930.009661][ T4072] hsr_slave_0: entered promiscuous mode [ 1930.060933][ T4072] hsr_slave_1: entered promiscuous mode [ 1930.442632][ T5777] Bluetooth: hci0: command tx timeout [ 1930.916146][ T4172] netlink: 'syz.9.8906': attribute type 19 has an invalid length. [ 1930.940068][ T4172] netlink: 14552 bytes leftover after parsing attributes in process `syz.9.8906'. [ 1931.398945][ T4184] netlink: 'syz.0.8910': attribute type 21 has an invalid length. [ 1931.429083][ T4184] netlink: 128 bytes leftover after parsing attributes in process `syz.0.8910'. [ 1931.453660][ T4184] netlink: 'syz.0.8910': attribute type 4 has an invalid length. [ 1931.461718][ T4184] netlink: 'syz.0.8910': attribute type 5 has an invalid length. [ 1931.482693][ T4184] netlink: 3 bytes leftover after parsing attributes in process `syz.0.8910'. [ 1932.209461][ T4215] netlink: 'syz.0.8915': attribute type 19 has an invalid length. [ 1932.244734][ T4215] netlink: 14552 bytes leftover after parsing attributes in process `syz.0.8915'. [ 1932.447112][ T4223] netlink: 60 bytes leftover after parsing attributes in process `syz.0.8918'. [ 1932.532802][ T5777] Bluetooth: hci0: command tx timeout [ 1932.617705][ T4072] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1932.647379][ T4223] netlink: 60 bytes leftover after parsing attributes in process `syz.0.8918'. [ 1932.679931][ T4226] netlink: 60 bytes leftover after parsing attributes in process `syz.0.8918'. [ 1932.717704][ T4072] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1932.745146][ T4072] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1932.783130][ T4230] netlink: 'syz.9.8920': attribute type 1 has an invalid length. [ 1932.863817][T26501] [ 1932.866186][T26501] ====================================================== [ 1932.873205][T26501] WARNING: possible circular locking dependency detected [ 1932.880240][T26501] syzkaller #0 Not tainted [ 1932.884670][T26501] ------------------------------------------------------ [ 1932.891684][T26501] kworker/u4:9/26501 is trying to acquire lock: [ 1932.897922][T26501] ffff88805feb0d00 (team->team_lock_key#20){+.+.}-{3:3}, at: team_del_slave+0x32/0x1c0 [ 1932.907612][T26501] [ 1932.907612][T26501] but task is already holding lock: [ 1932.914977][T26501] ffff888056fc8768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: ieee80211_remove_interfaces+0x29a/0x690 [ 1932.925420][T26501] [ 1932.925420][T26501] which lock already depends on the new lock. [ 1932.925420][T26501] [ 1932.935822][T26501] [ 1932.935822][T26501] the existing dependency chain (in reverse order) is: [ 1932.944836][T26501] [ 1932.944836][T26501] -> #1 (&rdev->wiphy.mtx){+.+.}-{3:3}: [ 1932.952584][T26501] __mutex_lock+0x136/0xcc0 [ 1932.957617][T26501] ieee80211_open+0x144/0x200 [ 1932.962827][T26501] __dev_open+0x2cb/0x430 [ 1932.967754][T26501] dev_open+0xab/0x190 [ 1932.972351][T26501] team_add_slave+0x75f/0x29a0 [ 1932.977649][T26501] do_setlink+0xdfe/0x4130 [ 1932.982672][T26501] rtnl_newlink+0x17da/0x20a0 [ 1932.987881][T26501] rtnetlink_rcv_msg+0x869/0xfa0 [ 1932.993350][T26501] netlink_rcv_skb+0x241/0x4d0 [ 1932.998646][T26501] netlink_unicast+0x751/0x8d0 [ 1933.003945][T26501] netlink_sendmsg+0x8d0/0xbf0 [ 1933.009242][T26501] ____sys_sendmsg+0x5ba/0x960 [ 1933.014532][T26501] ___sys_sendmsg+0x2a6/0x360 [ 1933.019737][T26501] __se_sys_sendmsg+0x1c2/0x2b0 [ 1933.025115][T26501] do_syscall_64+0x55/0xb0 [ 1933.030058][T26501] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1933.036481][T26501] [ 1933.036481][T26501] -> #0 (team->team_lock_key#20){+.+.}-{3:3}: [ 1933.044762][T26501] __lock_acquire+0x2df1/0x7d40 [ 1933.050148][T26501] lock_acquire+0x19e/0x420 [ 1933.055183][T26501] __mutex_lock+0x136/0xcc0 [ 1933.060212][T26501] team_del_slave+0x32/0x1c0 [ 1933.065349][T26501] team_device_event+0x28d/0xa20 [ 1933.070812][T26501] notifier_call_chain+0x197/0x380 [ 1933.076455][T26501] unregister_netdevice_many_notify+0x100d/0x1900 [ 1933.083399][T26501] unregister_netdevice_queue+0x32c/0x370 [ 1933.089651][T26501] _cfg80211_unregister_wdev+0x16b/0x580 [ 1933.095891][T26501] ieee80211_remove_interfaces+0x49e/0x690 [ 1933.102228][T26501] ieee80211_unregister_hw+0x5d/0x2a0 [ 1933.108187][T26501] mac80211_hwsim_del_radio+0x289/0x480 [ 1933.114272][T26501] hwsim_exit_net+0x58d/0x650 [ 1933.119479][T26501] cleanup_net+0x70a/0xbb0 [ 1933.124426][T26501] process_scheduled_works+0xa5d/0x15d0 [ 1933.130503][T26501] worker_thread+0xa55/0xfc0 [ 1933.135626][T26501] kthread+0x2fa/0x390 [ 1933.140225][T26501] ret_from_fork+0x48/0x80 [ 1933.145191][T26501] ret_from_fork_asm+0x11/0x20 [ 1933.150521][T26501] [ 1933.150521][T26501] other info that might help us debug this: [ 1933.150521][T26501] [ 1933.160751][T26501] Possible unsafe locking scenario: [ 1933.160751][T26501] [ 1933.168202][T26501] CPU0 CPU1 [ 1933.173568][T26501] ---- ---- [ 1933.178934][T26501] lock(&rdev->wiphy.mtx); [ 1933.183445][T26501] lock(team->team_lock_key#20); [ 1933.191000][T26501] lock(&rdev->wiphy.mtx); [ 1933.198030][T26501] lock(team->team_lock_key#20); [ 1933.203068][T26501] [ 1933.203068][T26501] *** DEADLOCK *** [ 1933.203068][T26501] [ 1933.211212][T26501] 5 locks held by kworker/u4:9/26501: [ 1933.216588][T26501] #0: ffff88801a254938 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x96f/0x15d0 [ 1933.227487][T26501] #1: ffffc90004807d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x96f/0x15d0 [ 1933.238041][T26501] #2: ffffffff8e3b6a50 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x14c/0xbb0 [ 1933.247454][T26501] #3: ffffffff8e3c3a88 (rtnl_mutex){+.+.}-{3:3}, at: ieee80211_unregister_hw+0x55/0x2a0 [ 1933.257305][T26501] #4: ffff888056fc8768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: ieee80211_remove_interfaces+0x29a/0x690 [ 1933.268108][T26501] [ 1933.268108][T26501] stack backtrace: [ 1933.273996][T26501] CPU: 1 PID: 26501 Comm: kworker/u4:9 Not tainted syzkaller #0 [ 1933.281634][T26501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1933.291794][T26501] Workqueue: netns cleanup_net [ 1933.296570][T26501] Call Trace: [ 1933.299856][T26501] [ 1933.302790][T26501] dump_stack_lvl+0x18c/0x250 [ 1933.307484][T26501] ? load_image+0x420/0x420 [ 1933.312000][T26501] ? show_regs_print_info+0x20/0x20 [ 1933.317208][T26501] ? print_circular_bug+0x12b/0x1a0 [ 1933.322424][T26501] check_noncircular+0x2fc/0x400 [ 1933.327373][T26501] ? print_deadlock_bug+0x5d0/0x5d0 [ 1933.332582][T26501] ? lockdep_lock+0xf5/0x230 [ 1933.337182][T26501] ? __lock_acquire+0x1273/0x7d40 [ 1933.342222][T26501] ? _find_first_zero_bit+0xd3/0x100 [ 1933.347524][T26501] __lock_acquire+0x2df1/0x7d40 [ 1933.352392][T26501] ? verify_lock_unused+0x140/0x140 [ 1933.357602][T26501] ? verify_lock_unused+0x140/0x140 [ 1933.362813][T26501] lock_acquire+0x19e/0x420 [ 1933.367323][T26501] ? team_del_slave+0x32/0x1c0 [ 1933.372101][T26501] ? __might_sleep+0xe0/0xe0 [ 1933.376700][T26501] ? read_lock_is_recursive+0x20/0x20 [ 1933.382086][T26501] __mutex_lock+0x136/0xcc0 [ 1933.386600][T26501] ? team_del_slave+0x32/0x1c0 [ 1933.391369][T26501] ? __lock_acquire+0x7d40/0x7d40 [ 1933.396401][T26501] ? rcu_is_watching+0x15/0xb0 [ 1933.401178][T26501] ? trace_contention_end+0x39/0xe0 [ 1933.406384][T26501] ? __mutex_lock+0x315/0xcc0 [ 1933.411066][T26501] ? team_del_slave+0x32/0x1c0 [ 1933.415836][T26501] ? mutex_lock_nested+0x20/0x20 [ 1933.420783][T26501] ? bond_netdev_event+0xeb/0xf20 [ 1933.425824][T26501] ? __mutex_unlock_slowpath+0x1b4/0x6c0 [ 1933.431471][T26501] team_del_slave+0x32/0x1c0 [ 1933.436068][T26501] team_device_event+0x28d/0xa20 [ 1933.441018][T26501] notifier_call_chain+0x197/0x380 [ 1933.446144][T26501] unregister_netdevice_many_notify+0x100d/0x1900 [ 1933.452573][T26501] ? lock_chain_count+0x20/0x20 [ 1933.457437][T26501] ? unregister_netdevice_many+0x20/0x20 [ 1933.463079][T26501] ? kernfs_remove_by_name_ns+0x117/0x150 [ 1933.468813][T26501] ? __lock_acquire+0x7d40/0x7d40 [ 1933.473857][T26501] unregister_netdevice_queue+0x32c/0x370 [ 1933.479591][T26501] ? list_netdevice+0x730/0x730 [ 1933.484449][T26501] ? kernfs_remove_by_name_ns+0x117/0x150 [ 1933.490175][T26501] _cfg80211_unregister_wdev+0x16b/0x580 [ 1933.495800][T26501] ieee80211_remove_interfaces+0x49e/0x690 [ 1933.501597][T26501] ? ieee80211_do_stop+0x1e20/0x1e20 [ 1933.506878][T26501] ? rcu_is_watching+0x15/0xb0 [ 1933.511640][T26501] ieee80211_unregister_hw+0x5d/0x2a0 [ 1933.517002][T26501] mac80211_hwsim_del_radio+0x289/0x480 [ 1933.522544][T26501] ? rhashtable_remove_fast+0xc00/0xc00 [ 1933.528090][T26501] hwsim_exit_net+0x58d/0x650 [ 1933.532757][T26501] ? hwsim_init_net+0x90/0x90 [ 1933.537424][T26501] ? __ip_vs_dev_cleanup_batch+0x238/0x250 [ 1933.543314][T26501] cleanup_net+0x70a/0xbb0 [ 1933.547723][T26501] ? ops_free_list+0x3b0/0x3b0 [ 1933.552473][T26501] ? _raw_spin_unlock_irq+0x23/0x50 [ 1933.557662][T26501] ? process_scheduled_works+0x96f/0x15d0 [ 1933.563373][T26501] ? process_scheduled_works+0x96f/0x15d0 [ 1933.569077][T26501] process_scheduled_works+0xa5d/0x15d0 [ 1933.574616][T26501] ? worker_attach_to_pool+0x380/0x380 [ 1933.580062][T26501] ? assign_work+0x3d2/0x5d0 [ 1933.584642][T26501] worker_thread+0xa55/0xfc0 [ 1933.589231][T26501] kthread+0x2fa/0x390 [ 1933.593303][T26501] ? pr_cont_work+0x560/0x560 [ 1933.597966][T26501] ? kthread_blkcg+0xd0/0xd0 [ 1933.602545][T26501] ret_from_fork+0x48/0x80 [ 1933.606947][T26501] ? kthread_blkcg+0xd0/0xd0 [ 1933.611519][T26501] ret_from_fork_asm+0x11/0x20 [ 1933.616276][T26501] [ 1933.730104][T26501] team0: Port device wlan1 removed [ 1933.749026][ T4072] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1933.903236][T26501] hsr_slave_0: left promiscuous mode [ 1933.910185][T26501] hsr_slave_1: left promiscuous mode [ 1933.924781][T26501] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1933.932191][T26501] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1933.953725][T26501] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1933.962331][T26501] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1933.972994][T26501] veth1_macvtap: left promiscuous mode [ 1933.978562][T26501] veth0_macvtap: left promiscuous mode [ 1934.159778][T26501] team0 (unregistering): Port device team_slave_1 removed [ 1934.201545][T26501] team0 (unregistering): Port device team_slave_0 removed [ 1934.226807][T26501] .` (unregistering): (slave bond_slave_1): Releasing backup interface [ 1934.251020][T26501] .` (unregistering): (slave bond_slave_0): Releasing backup interface [ 1934.354724][T26501] .` (unregistering): Released all slaves [ 1934.377121][ T4072] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1934.393115][ T4072] 8021q: adding VLAN 0 to HW filter on device team0 [ 1934.406897][ T2919] bridge0: port 1(bridge_slave_0) entered blocking state [ 1934.414009][ T2919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1934.435527][ T2906] bridge0: port 2(bridge_slave_1) entered blocking state [ 1934.442661][ T2906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1934.602656][ T5777] Bluetooth: hci0: command tx timeout [ 1934.688784][ T4072] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1934.761349][ T4072] veth0_vlan: entered promiscuous mode [ 1934.786760][ T4072] veth1_vlan: entered promiscuous mode [ 1934.815649][ T4072] veth0_macvtap: entered promiscuous mode [ 1934.833506][ T4072] veth1_macvtap: entered promiscuous mode [ 1934.852069][ T4072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1934.862684][ T4072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1934.886800][ T4072] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1934.901429][ T4072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1934.915251][ T4072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1934.928568][ T4072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1934.940883][ T4072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1934.950900][ T4072] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1934.963617][ T4072] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1934.975992][ T4072] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1934.998268][ T4072] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1935.007372][ T4072] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1935.016481][ T4072] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1935.025494][ T4072] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1935.068665][ T4072] ieee80211 phy276: Selected rate control algorithm 'minstrel_ht' [ 1935.117282][ T2906] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1935.128883][ T4072] ieee80211 phy277: Selected rate control algorithm 'minstrel_ht' [ 1935.140180][ T2906] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1935.178359][ T2917] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1935.191235][ T2917] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50