last executing test programs: 5m1.840707401s ago: executing program 0 (id=5): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x4048841) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x36}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000033000b35d25a806c8c6f94f91124fc60", 0x14}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f90324fc60", 0x14}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b40)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x80000, 0xca, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0xe, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r3, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x1c0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYRES8=r4, @ANYBLOB="3eca", @ANYRES8=r5], 0x9a) close(r2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 5m1.297988563s ago: executing program 0 (id=6): bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) close(0xffffffffffffffff) socket$kcm(0x29, 0x4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x50) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x1, 0x3}, 0x2019, 0x0, 0x0, 0x9, 0xffb, 0x3, 0x7, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x3) socket$kcm(0x2c, 0x3, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000000000ee000095"], 0x0, 0x1}, 0x94) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="8c38f0ff10"], 0x0, 0x42, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa067707"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) 5m0.336064599s ago: executing program 2 (id=3): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/32], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{0x1, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000200)='%+9llu \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f0000000240)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0], 0x0, 0x1b, &(0x7f00000005c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0x60, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x7, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x56, 0x0, 0x76, 0x2}, @volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @float={0x1, 0x0, 0x0, 0x10, 0x10}, @var={0x4, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x5f, 0x5f, 0x30, 0x2e, 0x2e]}}, &(0x7f00000002c0)=""/7, 0x57, 0x7, 0x0, 0x1}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x8, 0x7ff, 0x5, 0x1, r2, 0x427, '\x00', r3, r4, 0x4, 0x2, 0x2, 0x1}, 0x50) r5 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x40016002) sendmsg$inet(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="1c0000005e007f029ea69801d76ab0a272a2a788bab6c95f79725074", 0xd5}], 0x1}, 0x0) recvmsg$kcm(r5, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x40000120) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r6, &(0x7f00000000c0)={&(0x7f0000000100)=@qipcrtr={0x2a, 0x4, 0x1}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000280)="27031600160014000000002f1eafacf706e105000000894f00050005ee0b80558ddbba9b37242d37a518fc9c5be50eaf07c3650596", 0xfc66}], 0x1}, 0x4) 5m0.292575051s ago: executing program 0 (id=7): bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) close(0xffffffffffffffff) socket$kcm(0x29, 0x4, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x50) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x1, 0x3}, 0x2019, 0x0, 0x0, 0x9, 0xffb, 0x3, 0x7, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x3) socket$kcm(0x2c, 0x3, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000000000ee000095"], 0x0, 0x1}, 0x94) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x1, &(0x7f0000000040)=ANY=[], 0x0, 0x42, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000c9"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffca4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1d38}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa067707"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) 5m0.13110936s ago: executing program 1 (id=2): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{0x1, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000200)='%+9llu \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f0000000240)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0], 0x0, 0x1b, &(0x7f00000005c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0x60, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x7, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x56, 0x0, 0x76, 0x2}, @volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @float={0x1, 0x0, 0x0, 0x10, 0x10}, @var={0x4, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x5f, 0x5f, 0x30, 0x2e, 0x2e]}}, &(0x7f00000002c0)=""/7, 0x57, 0x7, 0x0, 0x1}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x8, 0x7ff, 0x5, 0x1, r2, 0x427, '\x00', r3, r4, 0x4, 0x2, 0x2, 0x1}, 0x50) r5 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r5, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x40016002) sendmsg$inet(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="1c0000005e007f029ea69801d76ab0a272a2a788bab6c95f79725074", 0xd5}], 0x1}, 0x0) recvmsg$kcm(r5, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x40000120) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r6, &(0x7f00000000c0)={&(0x7f0000000100)=@qipcrtr={0x2a, 0x4, 0x1}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000280)="27031600160014000000002f1eafacf706e105000000894f00050005ee0b80558ddbba9b37242d37a518fc9c5be50eaf07c3650596", 0xfc66}], 0x1}, 0x4) 4m59.778589401s ago: executing program 3 (id=4): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x5, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x41100, 0x6c, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)=[0xffffffffffffffff, 0x1]}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func={0xe, 0x0, 0x0, 0xc, 0x1}, @volatile={0x9, 0x0, 0x0, 0x9, 0x2}, @volatile={0x0, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x0, 0x30, 0x61, 0x0, 0x61, 0x5f]}}, &(0x7f0000000300)=""/183, 0x44, 0xb7, 0x0, 0xf, 0x10000}, 0x28) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000003c0)=@base={0xa, 0x9, 0x8, 0x1ff, 0x10c}, 0x50) r1 = socket$kcm(0x11, 0x2, 0x0) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r2, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x8) close(r1) r3 = socket$kcm(0x11, 0x2, 0x0) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0x3}}, @enum64={0x1, 0x3, 0x0, 0x13, 0x1, 0x8, [{0xf, 0xca, 0xff}, {0x8, 0x4, 0x4}, {0x6, 0x9, 0x3}]}]}, {0x0, [0x5f, 0x61, 0x2e, 0x30]}}, &(0x7f00000008c0)=""/2, 0x66, 0x2, 0x1, 0x5}, 0x28) setsockopt$sock_attach_bpf(r4, 0x107, 0x12, &(0x7f00000000c0)=r3, 0x8) r5 = socket$kcm(0x10, 0x2, 0x0) r6 = getpid() perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x6, 0x3, 0x9, 0x7, 0x0, 0x4, 0x40002, 0x7, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000040), 0x1}, 0x10201, 0x7, 0x4, 0x2, 0x7ff, 0x5, 0x1, 0x0, 0x10, 0x0, 0x7}, r6, 0x8, r0, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x1f00, &(0x7f0000001840)=[{&(0x7f0000000580)="6700000011008188040f56ecdb4cb9cca7480ef436000000e3bd6efb440009000e000a0010000000ba80010000005a8c3774fa0af3dc59a933c1e7a6d3361d83b20000319cdf5656826edaaa11032701c61ec666d482078ccebcb9a4f187f7a4e98f09cdc2649f", 0x67}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000080)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x2, 0x3b}]}, &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) 4m59.736480544s ago: executing program 2 (id=8): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000500000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20000000}, 0xae) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1f, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x30}, 0x80) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="0c008275", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r2}, &(0x7f0000000a00), &(0x7f0000000400)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r2}, &(0x7f0000000880), &(0x7f00000008c0)=r1}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000010040), 0x0, 0xffffffffffffffff, 0x4}, 0x38) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0200000002"], 0x20) r4 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r4, 0x84, 0x84, &(0x7f0000000000), 0x90) ioctl$SIOCSIFHWADDR(r3, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random="000500000020"}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)=r3}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r3, 0x20, &(0x7f0000000280)={&(0x7f0000000200)=""/50, 0x32, 0x0, &(0x7f0000000240)=""/44, 0x2c}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, [@map_val={0x18, 0x2, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x1}, @generic={0x7f, 0x6, 0x1, 0x1c, 0x8}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xc}]}, &(0x7f0000000140)='GPL\x00', 0x5, 0x1000, &(0x7f0000000980)=""/4096, 0x40f00, 0x71, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0xb, 0x4909, 0x6}, 0x10, r6, 0x0, 0x4, 0x0, &(0x7f0000000300)=[{0x5, 0x2, 0x9}, {0x1, 0x3, 0xc}, {0x3, 0x4, 0x4, 0x2}, {0x4, 0x2, 0xe, 0x5}], 0x10, 0x8}, 0x94) 4m59.692526467s ago: executing program 1 (id=9): r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x5, 0x7f, 0x8, 0x9, 0x0, 0x6092, 0x8300a, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x101082, 0x1, 0x1ff, 0x9, 0x10, 0x378, 0xfff, 0x0, 0x8, 0x0, 0x6a9}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x3, 0xfffffffc, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0)='cpuset.cpu_exclusive\x00', 0x2, 0x0) r1 = socket$kcm(0xa, 0x1, 0x106) r2 = socket$kcm(0x21, 0x2, 0x2) setsockopt$sock_attach_bpf(r2, 0x1, 0x7, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[@rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x98}, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000000)=@in6={0xa, 0x41, 0x0, @loopback, 0x2}, 0x80, 0x0}, 0xe07e872424dfefca) recvmsg$kcm(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)=""/199, 0xc7}], 0x1}, 0x20) sendmsg(r1, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x20000840) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r4 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r4, 0x84, 0x82, &(0x7f0000000000), 0x8) close(r3) r5 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c01803001d000b63d25a80648c2594f91624fc60100c214002000012050582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x7f) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000300)='GPL\x00') r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r7, 0x27, 0xfffffffffffffd35, 0x0, &(0x7f0000000dc0)="f8ad1dcc02cb29dcc8003200810066a288a8c6617f50", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) 4m59.576494853s ago: executing program 0 (id=10): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x0, @perf_bp={0x0, 0x3}, 0x8000, 0x10000000005, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x1, 0x0, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0f000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000ff0700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_lookup=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r5, 0x2000300, 0xe, 0x0, &(0x7f0000000600)="63e4ed8e46080000003389f7f986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000ac0)=@generic={&(0x7f0000000a80)='./file0\x00', 0x0, 0x18}, 0x18) sendmsg$inet(r6, &(0x7f0000000a40)={&(0x7f0000000880)={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000000a00)=[{&(0x7f00000008c0)="801e442646cbdc39005d0e7980f791f284d98a9d8d59892a353dd4544985048db05dde8835e01860be100c618b4b8eb2d187fd7d361220c65facd17639e73cfdb417457c44536228415be5c88b6b091e8ff9ca53ca589df27865c2bb82047216dbc8a876", 0x64}, {&(0x7f0000000940)="4626d496054026fe4d61a7d3c4a8c40dc1891b49c05d05ad41311a7b473807f49db999bb7b82109a2446bdd926e1e026b574c95d6a1397b1eef2281ad8a865f54c95dde06f7aec64a915ebafb40777d7e71b6ca912d49df37c74", 0x5a}], 0x2}, 0xc815) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x5, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x0, @perf_bp={0x0, 0x6}, 0x14105, 0x2e, 0xffffebff, 0x3, 0x2, 0x9, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x400, 0x20565, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x4}, 0x104902, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={@map=r3, 0x2, 0x1, 0x1000, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0], &(0x7f0000000640)=[0x0]}, 0x40) perf_event_open$cgroup(&(0x7f0000000b40)={0x2, 0x80, 0x1, 0xff, 0x6, 0x5, 0x0, 0x9, 0x2129, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x500, 0x1, @perf_bp={0x0, 0x8}, 0x5200, 0x200000000000000, 0x7512, 0x1, 0x3, 0xb, 0x6, 0x0, 0xff, 0x0, 0x537fabb0}, r1, 0x2, r0, 0x4) r7 = bpf$ITER_CREATE(0xb, 0x0, 0x0) r8 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r8, 0x6, 0x22, &(0x7f0000000200)=r7, 0x4) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0xffffffffffffffff, 0x3}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x21, 0xe, 0x7, 0xb72, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x2}, 0x50) openat$cgroup_ro(r9, &(0x7f0000000580)='io.stat\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071120d000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r10 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020031000b05d25a806f8c6394f90424fc602f0009000a740100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x12, 0x4, &(0x7f0000000bc0)=ANY=[@ANYBLOB="180000000000000000000000fcffffff850000004000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @cgroup_sock_addr=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) 4m58.047452852s ago: executing program 0 (id=11): r0 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000340), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x20, 0xc, &(0x7f0000000140)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x30, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000004000000040000000800000014100000", @ANYRES32, @ANYBLOB="0001000000000000000000000000000000000000331727d80a832ed18d42fe70ee02a62bb222d19b1c361b8cee42dd85753dfc03e27c0c74ec1bcc086d61a92c585e50078d914062b255dee3033f5a1f98", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000380)=@framed={{}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xb6d}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000200)={r2, 0x1}, 0xc) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0a00000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x50) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x40004061) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x10}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x87, 0x87, 0x9, [@typedef={0x1, 0x0, 0x0, 0x8, 0x1}, @datasec={0xb, 0x2, 0x0, 0xf, 0x2, [{0x4, 0x5}, {0x1, 0x7, 0x1}], "d8a0"}, @func={0xf, 0x0, 0x0, 0xc, 0x5}, @datasec={0xc, 0x5, 0x0, 0xf, 0x1, [{0x2, 0x97, 0x19}, {0x5, 0x3, 0x8}, {0x1, 0xffffffff, 0xfff}, {0x5, 0xfff, 0x6}, {0x1, 0x3, 0xf}], 'E'}]}, {0x0, [0x61, 0x61, 0x0, 0x30, 0x0, 0x5f, 0x2e]}}, &(0x7f00000001c0)=""/104, 0xa9, 0x68, 0x1, 0x7fffffff, 0x10000, @value=r0}, 0x28) openat$cgroup_ro(r4, &(0x7f0000000040)='memory.swap.events\x00', 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a2, &(0x7f0000000080)) 4m57.90551659s ago: executing program 1 (id=12): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000004c0)="d8000000180081064e81f782db4cb904021d0800fe02fe02e8fe50a10a000725250000000c600e41b0000900ac00080325000000160015000a00ff150048035c3b61c1d67f6f94007134cf6efb8000a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667daffffffffff1f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5b7276505de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9000001008af26c8b7b55f4d2a6823a45", 0xd8}], 0x1}, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r0, &(0x7f0000000b40)={&(0x7f0000000080)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000800)="e9", 0x1}, {&(0x7f00000017c0)="ea0189bdebb0c16d420ee9b95082abd6431cc7afc22c4a6b8adecef68f76bd81a86e89f9c80e5c868a12b09e80ba8c01eb3f4b7be71f9fc2355c336cedc15eb778e3a3b35c3f72629ea4d9ae42cf4c17255815fb8a47aafd8b8ff0c202b4e09f7c42811261b5e113fcce27b4329ccb792df14b7d6dcfaf2cf8dbb51946e89c862e9252731f680ec5", 0x88}], 0x2, &(0x7f0000000100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xd}, @loopback}}}], 0x20}, 0xe900) socketpair$unix(0x1, 0xb2a0d273b8fa3021, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r1 = socket$kcm(0xa, 0x5, 0x0) recvmsg(r1, &(0x7f0000002740)={&(0x7f0000002580)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000002680)=[{&(0x7f0000000180)=""/42, 0x2a}, {&(0x7f0000002600)=""/92, 0x5c}], 0x2, &(0x7f00000026c0)=""/80, 0x50}, 0x141) setsockopt$sock_attach_bpf(r1, 0x29, 0x1a, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@caif=@util={0x25, "417216cbd6e101d0335ad1b4b7d40095"}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="371cfb904408bd3dc153279b56aa88ce63f6bc0b7c75812afc2b4fc3c39450eef5e8c9119c717c6146", 0x29}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="e6d35de9194d662ee1630f51414f6d1fb6f4a4777c3a4b9b2bb18fa26d88b6a1d4f225483ba19fcfe5a7b2e7bd7422c214ba8ccf064ed765e422247622da4c4fd0827dd290d734eeb7745d711b1c464f31a01bbbc9a1aaa713f6ee286a68862ddb428573c81fd774a324eca6ba17890f61b683b92b549ee981dbef8378fc22f67a67181f185be1498b194060473d46bb0e217f736269cf6ba5356a9b9bff5234cccbbbaae6beef3b7981c95ac366c134a2026e9f162b9f44e71ead6b696a115ade5a9458f4a85f0a5835", 0xca}], 0x3, &(0x7f0000001300)=ANY=[@ANYBLOB="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"], 0x1b0}, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x10001, 0x0, 0x0, 0x2}, {0x2}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0xfffffff9, @mcast2, 0xfffffffd}, 0x80, 0x0}, 0x44044) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="d8000000210081044e81f782db44b90402", 0x11}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x6e, &(0x7f0000000000)=r5, 0x2c) 4m57.779271608s ago: executing program 2 (id=13): r0 = socket$kcm(0x10, 0x2, 0x10) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r1, 0xffffffffffffffff}, 0x4) socket$kcm(0x11, 0x200000000000002, 0x300) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x3000, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0700000004000000800100000400000028000000", @ANYRES32, @ANYBLOB="00009500"/13, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_type(r4, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r5, &(0x7f0000000280), 0x9) r6 = openat$cgroup_procs(r4, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f00000001c0), 0x12) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x400000002, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r9, &(0x7f00000000c0), 0x12) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000b300000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r10}, 0xc) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="180000003d000b08d25a80648c7494f90324fc600b000240", 0x18}], 0x1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0xc, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1410, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x2) r11 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_bp={0x0, 0x2}, 0x5114, 0x80000001, 0x0, 0x0, 0x0, 0xc26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x40082406, &(0x7f00000001c0)='cpu&-0\t\t\t') 4m57.74482849s ago: executing program 3 (id=14): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000002000000000000000153888401"], 0x0, 0x3e, 0x0, 0x1}, 0x28) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) socket$kcm(0xa, 0x2, 0x3a) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x28, 0x3, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x10}, 0x10000, 0x32, 0x43a1bd74, 0x7, 0x7, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x3, r1, 0xb) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000680)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, 0x0, 0x0, &(0x7f0000000780)=""/180, 0xb4}, 0x10100) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) write$cgroup_type(r3, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0x5, &(0x7f0000000180)=ANY=[], 0x0, 0xd4d, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0}, 0x40, 0x0, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000d6000000000000000000000085000000410000008500000007"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0xe, 0x0, &(0x7f00000002c0)="83ea715d66a8c3f0a90e9df187bb", 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000580)}], 0x1, 0x0, 0x0, 0x7400}, 0x8800) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x1000000000000002, 0x0) r8 = socket$kcm(0xa, 0x3, 0x87) sendmsg$kcm(r8, &(0x7f0000000580)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x7, @dev={0xfe, 0x80, '\x00', 0x28}}, 0x80, 0x0}, 0x40810) sendmsg$inet(r7, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380), 0xff7a}], 0x1, &(0x7f0000007880)=[@ip_tos_u8={{0x11, 0x34000}}, @ip_pktinfo={{0x1c, 0xfd000f00, 0x8, {0x0, @remote, @multicast1}}}, @ip_pktinfo={{0x1c, 0x28f0700, 0x8, {0x0, @empty=0xa0050000}}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp={0x44, 0x10, 0x88, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}, @ip_tos_u8={{0x11}}], 0x98}, 0x0) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="d800000018008111e00212ba0d8105040a020000030f000b067c55a1bc000900b8000699030000000500160002008178a8001500050001400200000901ac040000d67f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e970300000000000000000000000000000000000000008dc5fb510162", 0xd8}], 0x1}, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00-\x00Y'], 0xfe33) 4m57.0508122s ago: executing program 1 (id=15): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x8) r0 = syz_clone(0x10004000, &(0x7f00000000c0)="036301c6b9b569612df5c9822b2ba799563192b873c5737a9a4ecb3fffcdb36c879eb8593a392000e6c551beffd4bf2acb7e9d354b1af8ea80cb9990310c034631c264f51c1bfb031181ba0f319b33717a79784e7f9e9291e68aeb", 0x5b, &(0x7f00000001c0), &(0x7f0000000340), &(0x7f00000006c0)="bc0fb7171567b68bfd0d6988373cb481b9351e1ecf38a9c3cc2f5c043406b4af6f959fd6a20f57cd8a09e13fd6c9dffc7b4acd64dd07e6791e51d019a370b05c31c92ff374e34363fe7c4580c973cdba484a9ade57b363b69427fc11e89c27f965bb64c2a05de1c0baa8240fac863bff4b6a6431f87a868d6298bf9307f90236b773331c20c24b567e0d9d488b11236fb247f3b088e25dd3aeebc328694ef330be49d85ecd39d09e4009dce546035066c6cf83cd31eb0b7e") perf_event_open(0x0, r0, 0x1000011, 0xffffffffffffffff, 0xb) r1 = socket$kcm(0x2, 0x5, 0x84) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000000000)={'batadv_slave_1\x00', @random="440000001000"}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x10819}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x6, 0x0, 0xfc, 0x0, 0xfffffffffffffffc, 0x852, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000300), 0x9}, 0x4208, 0x0, 0x0, 0x3, 0x3, 0x2, 0x401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe"], 0xfdef) syz_clone(0x2010c000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000080)={r3}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r7 = socket$kcm(0x10, 0x3, 0x0) write$cgroup_subtree(r7, &(0x7f0000001ec0)=ANY=[@ANYBLOB="13120000120091"], 0xfe33) write$cgroup_pid(r6, &(0x7f0000000380), 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r8, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 4m56.671715442s ago: executing program 0 (id=16): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x1f, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x8}}, {{0x6, 0x0, 0xb, 0x9, 0x0, 0x4}, {0x65, 0x0, 0x6, 0x9}}, [@printk={@ld, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0x2, 0xa, 0x9}, {0x4, 0x0, 0x3, 0x9}, {}, {}, {0x15}}], {{0x5, 0x1, 0x3, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000000040)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20111, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x2, 0x5, 0x84) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x10, &(0x7f00000009c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b5af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200000000df00850000008600000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x1, 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="91104e000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000f000000850000002e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$kcm(0x11, 0x20000000000000a, 0x300) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000040)=r4, 0x4) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000000082295"], &(0x7f0000000040)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x1f4, 0xe, 0x0, &(0x7f00000001c0)="ffffffff7f833e9762a536c801d7", 0x0, 0x304, 0x300, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe, 0x8}, 0x50) r7 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r7, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) sendmsg$sock(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="93a0", 0x2}], 0x1}, 0xc050) r8 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r8, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) sendmsg$inet(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000600)="024e", 0x2}], 0x1}, 0x408c4) sendmsg$inet(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000600)="024e2f", 0x3}], 0x1}, 0x408c4) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x58, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='\x86&-\x00') 4m56.501212932s ago: executing program 3 (id=17): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0xa0, 0x5, 0x2, 0x0, 0x0, 0x0, 0x9, 0x4022, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x5, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000, 0x0, 0x2, 0x0, 0x80}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f00000003c0)='%pI4 \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r2, 0xffffffffffffffff}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000ffff0b867b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0xb, 0x0, &(0x7f0000000300)="40f0538ef047b21fb60068", 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 4m41.583834286s ago: executing program 32 (id=13): r0 = socket$kcm(0x10, 0x2, 0x10) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r1, 0xffffffffffffffff}, 0x4) socket$kcm(0x11, 0x200000000000002, 0x300) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x3000, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0700000004000000800100000400000028000000", @ANYRES32, @ANYBLOB="00009500"/13, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_type(r4, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r5, &(0x7f0000000280), 0x9) r6 = openat$cgroup_procs(r4, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f00000001c0), 0x12) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x400000002, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r9, &(0x7f00000000c0), 0x12) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000b300000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r10}, 0xc) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="180000003d000b08d25a80648c7494f90324fc600b000240", 0x18}], 0x1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0xc, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1410, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x2) r11 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_bp={0x0, 0x2}, 0x5114, 0x80000001, 0x0, 0x0, 0x0, 0xc26, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x40082406, &(0x7f00000001c0)='cpu&-0\t\t\t') 4m40.543105327s ago: executing program 33 (id=16): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x1f, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x8}}, {{0x6, 0x0, 0xb, 0x9, 0x0, 0x4}, {0x65, 0x0, 0x6, 0x9}}, [@printk={@ld, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0x2, 0xa, 0x9}, {0x4, 0x0, 0x3, 0x9}, {}, {}, {0x15}}], {{0x5, 0x1, 0x3, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000000040)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20111, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x2, 0x5, 0x84) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x10, &(0x7f00000009c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b5af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200000000df00850000008600000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x1, 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="91104e000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000f000000850000002e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$kcm(0x11, 0x20000000000000a, 0x300) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000040)=r4, 0x4) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000000082295"], &(0x7f0000000040)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x1f4, 0xe, 0x0, &(0x7f00000001c0)="ffffffff7f833e9762a536c801d7", 0x0, 0x304, 0x300, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe, 0x8}, 0x50) r7 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r7, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) sendmsg$sock(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="93a0", 0x2}], 0x1}, 0xc050) r8 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r8, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) sendmsg$inet(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000600)="024e", 0x2}], 0x1}, 0x408c4) sendmsg$inet(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000600)="024e2f", 0x3}], 0x1}, 0x408c4) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x58, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='\x86&-\x00') 4m40.414246424s ago: executing program 34 (id=15): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x8) r0 = syz_clone(0x10004000, &(0x7f00000000c0)="036301c6b9b569612df5c9822b2ba799563192b873c5737a9a4ecb3fffcdb36c879eb8593a392000e6c551beffd4bf2acb7e9d354b1af8ea80cb9990310c034631c264f51c1bfb031181ba0f319b33717a79784e7f9e9291e68aeb", 0x5b, &(0x7f00000001c0), &(0x7f0000000340), &(0x7f00000006c0)="bc0fb7171567b68bfd0d6988373cb481b9351e1ecf38a9c3cc2f5c043406b4af6f959fd6a20f57cd8a09e13fd6c9dffc7b4acd64dd07e6791e51d019a370b05c31c92ff374e34363fe7c4580c973cdba484a9ade57b363b69427fc11e89c27f965bb64c2a05de1c0baa8240fac863bff4b6a6431f87a868d6298bf9307f90236b773331c20c24b567e0d9d488b11236fb247f3b088e25dd3aeebc328694ef330be49d85ecd39d09e4009dce546035066c6cf83cd31eb0b7e") perf_event_open(0x0, r0, 0x1000011, 0xffffffffffffffff, 0xb) r1 = socket$kcm(0x2, 0x5, 0x84) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8922, &(0x7f0000000000)={'batadv_slave_1\x00', @random="440000001000"}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x10819}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x6, 0x0, 0xfc, 0x0, 0xfffffffffffffffc, 0x852, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000300), 0x9}, 0x4208, 0x0, 0x0, 0x3, 0x3, 0x2, 0x401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe"], 0xfdef) syz_clone(0x2010c000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000080)={r3}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r7 = socket$kcm(0x10, 0x3, 0x0) write$cgroup_subtree(r7, &(0x7f0000001ec0)=ANY=[@ANYBLOB="13120000120091"], 0xfe33) write$cgroup_pid(r6, &(0x7f0000000380), 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r8, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 4m40.413219224s ago: executing program 35 (id=17): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0xa0, 0x5, 0x2, 0x0, 0x0, 0x0, 0x9, 0x4022, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x5, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000, 0x0, 0x2, 0x0, 0x80}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f00000003c0)='%pI4 \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r2, 0xffffffffffffffff}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000ffff0b867b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0xb, 0x0, &(0x7f0000000300)="40f0538ef047b21fb60068", 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 8.027633581s ago: executing program 7 (id=1222): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x6}, 0x2901, 0x35, 0x43a1bd76, 0x2, 0x3, 0x206, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x0, 0x0, 0x0, 0x7, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext={0x7, 0x7ff}, 0x0, 0x6, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000000000000000075000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={&(0x7f0000001340)=@hci={0x1f, 0xc00, 0xe}, 0x80, 0x0}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{0x1}, &(0x7f0000000040), &(0x7f0000000080)=r0}, 0xd) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="13000000100000000200"/20, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'/19, @ANYRES32=0x0, @ANYRES32], 0x48) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) close(0xffffffffffffffff) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000300000000000000000000f195"], 0x0}, 0x94) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r2, 0x2000012, 0xe, 0x0, &(0x7f0000000080)="63b0328e46002e92e40ccbbd6865", 0x0, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000fc59ecb1b70bda0cdd22b838f1bb73e1eaa5145f168540bbe94fcec304e3c0113af4f4e95662e1fc463152c4e66dcfe140253dc953bbac59ee900d6bb1fa5dade9d61a590ba3970ece7748a54f54a23c6553c036fe7fd6ee7c148d1091751a3bc2f012368c66e24ba89c5a4d56d43f404a608d3e5d82adc9795887c27efdd739a7fa54ebe8476f8affbf0a6efc9cd7", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0xd, 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000010000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r3, @ANYBLOB="0000000002000000b705000008000000850000005d00000095"], &(0x7f0000000000)='syzkaller\x00', 0x9, 0xfeb, &(0x7f0000001e00)=""/4075, 0x41000}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="00000000030000000300"/21], 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00', 0x4000}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 4.785576271s ago: executing program 7 (id=1225): bpf$BPF_PROG_QUERY(0x9, &(0x7f0000000400)={@map, 0x2b, 0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = socket$kcm(0xa, 0x5, 0x0) (async) r2 = syz_clone(0x21098400, &(0x7f0000000440)="1f20dbeb0e6ec44594a6f0a6ffdd02ab9ec52165cd621ae990394643227ab1160a47e194f9c3fdcbd53300", 0x2b, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000580)="dac194ec2a94805dc0578dc787ce2f3cb4c75b88f77556ea0b7ac2e9a19f3f16ae9ec3d00a5b2cec83da26ebfa3e7c7f2c7416f673feb0fc2621b9fc2f6ea2728fae6d7fd0212b35bb") r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0xba7a, 0x2, 0x0, 0x0, 0x0, 0x2009}, r2, 0x0, 0xffffffffffffffff, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f00000006c0)=ANY=[@ANYRESDEC, @ANYRES64=r0, @ANYBLOB="dac1ae55ff0eb6ade11800b0f05d36ecfd32a43863dbba5e3178b36d3a513ed6a59fb266be3297aba5659b05b03e84f34aa2052c7630e5fda489715e2068b6e3a3879550706e64f12d9d154af90ea3fe86a491925998dbd4"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) (async) r5 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x29, 0x3c, 0x0, 0x0) (async) setsockopt$sock_attach_bpf(r1, 0x29, 0x1d, 0x0, 0x3d) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000800)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000200000006000000020000054600002db4000014010000000000000006000000050000208000000005000000000000100c000000000019866dd8071f6e179597b60d90c5bb24913eecf7032a8590ab5143a38eaa92addcd25dffae2a8afede4f91c733cdf90792bc9acc19bb5cd5bccf67522c8b633b9b5543e173f39e1978094e47743b24b98a6af60bed344fa4b3c95fde4afb07456865d08207aad56419cdb6a9a91b27258480eb8d42b1df1015ef9e38d7da1535"], 0x0, 0x4a, 0x0, 0x1, 0x8}, 0x28) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000120000007f00000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r9}, &(0x7f00000007c0), &(0x7f0000000640)=r8}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r9, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000280)='%pS \x00'}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)=@generic={&(0x7f00000001c0)='./file0\x00', r10}, 0x18) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r11 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r11, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000b, 0xffffffffffffffff}, 0x18008, 0xffffffffffffffd, 0x1, 0x4, 0x6, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x400200000000003e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r12 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r12, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="d8000000140081044e81f782db44b904021d080207000000040000a118000200e000000100000e1208000f0100810401a80016ea1f000840032e5f54c92011148ed08734843c8802033d0803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c0100000000000000cb090000001fb791643a5ee4001b146218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e0060000000000000080bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd68adbef", 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x0) 4.775588301s ago: executing program 6 (id=1226): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x4, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x4, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3efd7ab4c41335d9, @perf_bp={0x0}, 0x0, 0x1, 0x310c, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x0) sendmsg$sock(r1, &(0x7f0000000080)={&(0x7f0000000140)=@in6={0x2, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x7}}], 0x18}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000700)=ANY=[], 0x31) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000040009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000300), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="d4010000100000001800000000000000000000000000000095", @ANYRESOCT, @ANYBLOB="0572c86b63b907a51783a16710530b9acd261a9a75ef057697b3fb6401d2689c9687a7456d6015c3badc1c61c68cd6c2b576a60008d13c67dc0aa0ea7d3623d18b3cc65900ddf36899c7611de1127d7144c4a7badbe62c78cdf7a57e7d5de18a2afb3508f14347"], &(0x7f00000000c0)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0xc}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f3, &(0x7f0000000080)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000180), 0x4a) r6 = socket$kcm(0x10, 0x2, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000240)={0x0, r4}, 0x8) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0xfd, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f8481100000003000000000000000e000a000f08000002800000121f", 0x2e}], 0x1}, 0x8084) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b702000008000000bfa300000000000007030000ffffffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000001404000001007d60b7030000000000006a0a00fe40000900850000001f000000b70000000000000095000000000000006623848adf1dc9a764ab51a064caff0c9b27a26293fddf0180000071ff31f1622271d5518193e09483c5a020c334f8c76334d8ce8303b81ddaa52e8756ad60a07d6f27c125e16d024098f755d8583da60f27c162dbba0700002ac9170f50f2568836077b7f711a18ebf608d87b885297b6b6981978d51514b00dcc4a2748b376358c33c9753beab62bdf27dc04e4cb4bc598affd989b1ca58949a54d5827df14feecea46408a05d572077f1252fbb72c3d099c501bc4ded6fca17a3447222c95edb47b770009524edd5fa5c53e9c37251709f1ff7f0000f07bf7f53ce129a9ecd3b4dd15100f2b450f98526a0d8cac7c97fc2f64015306a1bd88345710fb6379b4c53cf55eefb4c0974486a8d25a363adbd83b49e13fbd1757b27020bd9b8cff3f48c9411670c34f23ab8caf7851b290feb3045a1b622f20c4383a0280f040de7667f8b1d0842835e81c35af41e5b5b924275cb1749289b44e9728e7a73f148ac8206afe120c1437490d9900000011000003971b32fdffffffffffffffaf580278e1342aabd1b623f6c4f128858e4eb6b42f2173184c2b99b645f6ec0e14e5d7c95a0008000000f30f6c0000000000ff0000b8f5001a1d2a34dc0973ec302bc23211d3e3b6e6dad65a51e5497a3419cecec38126247b27113ad4c7915c8f82c333a7b350802f0311807010d1ed50c18411aa6900daccc02f4ba4b078f07e41f781eee222c7d071d5a94d82ca9a0846c1af59cee16639b4970f8f0a82c6a712fd5722d677d406160ffaffffffb4e0bde6749aa52c408b74251914c5d3255fd88a42e7ebb69ebcd8eee623e51dbb1f1b548c91a6825c0686fdc16be1cbb72c217fda18bd746253ca66093daf35923300b600000000ac376e0a4649a8a84e1d293a6b109c5e59b366bca5cc3d936c53d4a48c05099e6fc37e5aa23bff8cce0600000000000300a568a8532623d12b40b50ac26f2e8255470a04bfbe7acb581b90991d965a01d1f84cb6b973558e1e3f8118c77ccf0b3c6eb6443870004da10c75723b65f83769ad1f0e4ef6b9ef1cec23264fd8fdac6264af1cb467020bdc12b797b6c156c439105829d2ae1c45f7cfa40df68f536a03353a55a8a8e176e5d48887d31c8e0f77f2c1e68ec7c01bd5a2028a8fc107007f5f4c67600a6ade3deb1f200abe1f753754678dae8b4e3ba3d086d4b95dfc5817e3dafae2d38b522f942cc750399d9029f071fdb1e05882f8a4b8fbd219ccac3a895828b4f22b6527ce31ceb02b7b2b4492510134552f0b076b168394f8417f25cc82ae04007193cbe69de8bf35e4bebd15412426b2020ab1f05fc44ae9ae094c1b81d3ef947692b44d2afb09c7498dedf0f87c38bbcab7357836f03e8a7c392e535694a3ead2de11e6b1781e2a017ac341fda2e563ee95085742f5fee9f95f4741b226e428d20b00bc140000e4b2f5efd0a0b1ceba000830ba8634b5aa26bdbe91614e92fae3c7349531df9bf4c01ebf5d8eb7d53e5f30647661623fbdb3f6c3652c423ce6ecc1be5d4e8133fc32f68ea86a2df1e7df98a0ae216c405d0ae9eed114ff2d6fe27dfdff1cf9194849c4cc0da9533e5983863e526a7dc0d8728f3b573ca4427bdb44df9341e9b8420e896598a156c935c800436a312e7ae3c011e46851ac599f0427729ab9c55ae0ab4c0000000000000000000000000000c87bcc2ac5aed9467b51d92e0993af4beaf1f3d47dcdfab9165f98155d93e383d6b85158b54675c1585037508c1e9461a1c3d1a6e2402045cae150a7016f716eebbdf6afc4414d900be0bdf19f4a273f44f4357380b4387f1c8b104f0e406b2f04e5ed88631be6411f9927fe9f83412b7c5a676ceec8b454ebf6481c98e86b6933a02daea0b4ec0be5b3d916bd70208b4588626c27c318475802e2c62681bd1a331422a6e47bbd40857d52c4894944fae5c5000000000000000000000000e0c47613e950b6aefeae054fc723f62ac7d13941de11b018f1f48ac50335df91c771729f81929128135b2803562c1171ee00a3f4a31281aa363e087d53d86dd85e3ff979a7e72d16fdd7e1a0f07a1c8e6085d280d760f74975ceb3a5be6cfb4da8e0aeb769b8b75f4aad803ed77d34872eed2711aa40a3b38099dc2752e8ec9b520faf39e416752aa0830206736570f5d41a4df848c9052551cf8dcb1be000000000eb2577188e8e96bd825d462350905d3eb916b397d2a46a64081e85661d7a5a2716cc87cb1976d15d9b6418e94f165911803e43830432226c660f4da67bb7c8ceb3755c07197d8b80b8d16b12c2ec63bebe107aa2350a7ae564bf69a6c52a2da1496016dd66a1c1b112"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r7, 0x0, 0x22, 0x0, &(0x7f0000000380)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socket$kcm(0xf, 0x3, 0x2) 4.773639161s ago: executing program 4 (id=1227): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000200000000000000000000437a028000000000009500000000e200006a9b06eebac405a6ea212bc813c41debc634ebb389c0b70dfb14d728fd2e5d6f7b0183458cdfa35db73fd281756906cad7c265cd8f12434bbdad206b75254e4386329f7d657b2a49779d3133cf37578aa6b3a21878f2a86fd80631f70adabf0da11c6e270adaef92ea79485f5cd67d5fcb039920fd7bd9fa488920eb673e3e4de53fe5ba4722c1a8abf1a44734d58b9e0ac395c6ff0eb7410edb452b183e3ccd12f73a359086f068fb55c32e553f921f"], &(0x7f0000000000)='GPL\x00', 0x4, 0x4c, &(0x7f0000000080)=""/11, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb}, 0x24) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) sendmsg$inet(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000040)={0x2, 0x4e23, @private=0xa010101}, 0x10, 0x0}, 0xc000) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1100}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x101801, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000e3000000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000640)=ANY=[@ANYRESHEX], 0x201) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r3, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x5, 0x1ff003, 0x66, 0x82, 0x21, 0xffffffffffffffff, 0x0, '\x00', r4}, 0x50) r5 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x29, 0x15, &(0x7f00000000c0), 0xb9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00, 0x8, '\x00', 0x0, @cgroup_sockopt=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x80, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = openat$cgroup_type(r6, &(0x7f0000000140), 0x2, 0x0) write$cgroup_type(r7, &(0x7f0000000280), 0x9) r8 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000100)=0x1, 0x12) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdfd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000a000000080000000200000fffffffff0e0000000000000003000000"], 0x0, 0x46}, 0x28) 4.684896886s ago: executing program 5 (id=1228): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x26, 0xa, 0x0, 0x0, 0x20, 0x61, 0x11, 0x6c}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x181, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110c230000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=@raw=[@func, @map_fd, @exit, @jmp={0x5, 0x0, 0x4}], 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={@cgroup, 0xffffffffffffffff, 0x6, 0x1c}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f3, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x36}, 0x50) 4.303280319s ago: executing program 7 (id=1229): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b11d25a806c8c6f94f90424fc601000407a0a000600053582c137153e37000c11802f2ff4070300", 0x33fe0}], 0x1, 0x0, 0x0, 0x35}, 0x0) socket$kcm(0x2, 0x3, 0x106) perf_event_open(&(0x7f0000000380)={0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.kill\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x3, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x1000000}}, &(0x7f0000000300)='GPL\x00'}, 0x94) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848110000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) recvmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000047c0)=""/4039, 0xfc7}, {&(0x7f0000000ec0)=""/4073, 0xfe9}, {&(0x7f0000000800)=""/221, 0xdd}, {&(0x7f0000000600)=""/239, 0xef}, {&(0x7f00000002c0)=""/178, 0xb2}, {&(0x7f0000000700)=""/239, 0xef}], 0x6}, 0xbf9d5a5a4c2f3718) sendmsg$inet(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0a8187bae53dca2b007ea23e163ec40028e82fccdc09da15fef6a608649e7531765f0ef82e3c0076a705259a3651f60a84c9f4d4938037e70e4509c5bb0c9246444351db86078475483687054c", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x20000000) recvmsg$kcm(r5, &(0x7f0000000e80)={0x0, 0x0, 0x0}, 0x40000002) r6 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r6, 0x29, 0x1a, &(0x7f0000000140), 0x4) sendmsg$kcm(r6, &(0x7f00000003c0)={&(0x7f0000000040)=@in6={0xa, 0x4e23, 0xd, @local, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)="f1", 0x1}], 0x1}, 0x40040) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="0901020028000b05d25a806f8c6394f90324fc600d00030009000100ff3582c137153e370248018002000000d1bd", 0x33fe0}], 0x1}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2d75ae19", @ANYRESDEC=r0], 0xfe33) 3.59568139s ago: executing program 4 (id=1230): socketpair(0x1, 0x1, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000000c0)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1af06, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540), 0x10, 0x8}, 0x94) r0 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000180)=@phonet={0x23, 0x6, 0x7, 0xfa}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000200)="93f6556354d8137f49dde2", 0xb}, {&(0x7f0000000240)="70182e485ce8a4218bd673aae3bdb9754aaadb49cb18a2134c94951895b5c3b0fe569b5206d06842ddc14fcbffb4492f9635d7d7854cd4e9b0667044de7ac5f71bf2b4bd59305b8aea9c6041cffb46ee13243da54680c508707cd19725daa8a192477992e48dd5fb04adb7499d823fcd1579611fe1ccec9c58ffaf1109f51439a538d9f369ceff136c4497c59cb1d701b3b94841644b83f343b98787c299b35e8628a64e7431e6a8f705f1ecec74af74f0d565708c254f036a21f79766224f8f4e1c3ee061fd73503c28a83297fb62eb1ce6b74e8bb058", 0xd7}], 0x2}, 0x40000) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0xfffffffd, @empty}, 0x80, 0x0}, 0x20000001) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x400000000004, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7a, 0x2, @perf_bp={0x0, 0x4}, 0x19122, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1000000005d31, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xfffffffeffffffff}, 0x8, 0x0, 0x0, 0xd, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000003c0)="2e00000011008b88040f80ec59acbc0413a1f8480f0000005e2900421803001825000a001400000002800000121fb719b6", 0x31}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000940)={0x0, 0x300, &(0x7f0000000300)=[{&(0x7f0000000340)="d8000000210081044e81f782db44b9040200", 0x12}, {&(0x7f0000004200)="3d8c5ddb30a3718cef4f5210732f747226e8d7f41c83b136ac097b9a3c24c45639c2d70ee16c4b00790aca819a43b054bd01626eb0402783358806f064ef1fd963ab9b3f56cd18c60b0906d39e860184856b478f1ba6888cc780673762b0ee290d2b7dc0c21ff48175f779a7249c3f043c08a71a2f5abe07c7374fb92b8b3b61da1fa2d87a5263140bb672027b87cacc1b26a07901697eab4911135583935d28d3deb4720aad045d01d80f00db35ede34e1db4a9b9c9e4c8521575a0c0641a92ff7327130f1c", 0xc6}], 0x2}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r4 = socket$kcm(0x29, 0xf, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r5, &(0x7f0000000080)={0x0, 0x69, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000d00)=""/242, 0xfffffd63}, {&(0x7f0000000240)=""/205, 0xcd}, {&(0x7f0000000380)=""/210, 0xd2}, {&(0x7f00000006c0)=""/188, 0xc9}, {&(0x7f0000000f40)=""/213, 0xd5}, {&(0x7f0000002100)=""/4077, 0xfed}, {&(0x7f00000007c0)=""/211, 0xd3}, {&(0x7f0000000b00)=""/231, 0xe7}, {&(0x7f0000000480)=""/176, 0xb0}, {&(0x7f0000000c00)=""/208, 0xd0}], 0xa}, 0x40012100) recvmsg(r5, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x20) socket$kcm(0x2, 0x200000000000001, 0x0) r6 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000010000000002b70696473202b7065722b646500"/41], 0x29) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001040)={0x11, 0x1, &(0x7f00000005c0)=@raw=[@ldst={0x0, 0x3, 0x3, 0x8, 0xa, 0xffffffffffffffe0, 0x1}], &(0x7f0000000600)='GPL\x00', 0x4, 0xf6, &(0x7f0000000980)=""/246, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x3, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f00000008c0)=[{0x0, 0x1, 0xd, 0x6}, {0x2, 0x2, 0xd, 0x5}, {0x5, 0x4, 0xb, 0x2}, {0x2, 0x2, 0x10, 0x3}, {0x3, 0x5, 0xc, 0x1}], 0x10, 0x5}, 0x94) close(0x3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='pids.current\x00', 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000f00)={&(0x7f0000000a80)=@ieee802154={0x24, @short={0x2, 0xffff, 0xfffe}}, 0x80, &(0x7f00000014c0)=[{&(0x7f0000001100)="8ce0577af1cbcd96cc5117eac37c660d4b3d5712ff2c54c04e88d8fddd99b56afd064b227781ee49f0d85e9197053456b7c49c916a8d78fbc9b2dd694d144f4f95624ee60c96925f50a5e0eec3ef9f91a3306b450eda70661af8752215851aa8cc21929c751bd4d927bcc14cf52b1ad3635cc1eadf42f937a8e27ee66831d74decc84618a5c53d9f647cb8ccca518e574e8a780b94a3a864eb4187f70fa66788cf69db9688b2410d8e8902e6ebbddd9a779ba0ea96", 0xb5}, {&(0x7f00000011c0)="d10aed4ed272eca1eaf1e53a1563f54bebea8f32c19495db72fda98a2ebf20f0fb723e469c7f4b6be4612687ecdfb20b458581b564147800afd121d8699fb986d1ce77acbbbcc603c5b43e2e0e7ebb882ec4a10513d73eb5f7b3f73dc3a4aa342e0796f093b4b3731c8e", 0x6a}, {&(0x7f0000001240)="7d8cdd186632436ee5acb2fa190f3487a5327dd58944def081c51485a8c7e4b4577879c9708c0f9efabfc974ba7d22f6bd300d4ae0dafe0f27430b9439ab7ecca1272429e626551c16b3f9d1bb0931c17dd8eeba3a57aa748c82445d75011374cc4cf452e4ea134aeec9f3780e33d174e2f3e09189b429314b1e322347fa1c53829b9ce305064f02d44d0fea3efc865537e092351b7da62b6d320db15068f7cc6f2fb812f4bac641d348a998de869cf0", 0xb0}, {&(0x7f0000001300)="51fe211488b5726405e2eef5a2f8357178f28bbddcc1fe12641c9673adf6c7c069ec215e1f1da3f7a026ac143ee6b491e56d9b3fe5bafd82735d722b7c3fce5f47883f223693d5c54f43e9ca2c53daa6323d49e8e9aceacb0cf048eb226cf815c01e78e0147add0ce1a9d561262f85c0ab6cd4d55b5d16883484bd7ae02f274cf3d3c9cc151faf4baacb356fedc453fc5e62ca9e7b75348f49ec4babab216275ac01e303efd281b1ff1ddd80b3afc6c9c718cbefb0a8e23a08f9076ba1ecc716a7304e38289a3e5f56c7f540680641448671787819d0dcc2638e8d09f6c4e8b69559271cd51d7c19317ddb72a22910084ff66872d1454095", 0xf8}, {&(0x7f0000000680)="4739c5a7d79a90db22f818203472def72b622e63907509caec66160dc0ef7eee82994b5c21b2ffea9b63444ace7b40b21f25ef03564a6cd20d1bfc", 0x3b}, {&(0x7f0000001400)="41114270b050859bd3bc6eb2d25ce7735998878e718aba4ad6bb01b7cb6f48c3f8ce17894d44d5197083e6683518ce2c337735cbd5783e9b41d4ddf58c7a8cde03813f01dfb6568e23198f922160db3d73b3ccf99bb7551095d9dca354d4a7ffa209f91398f88204f4525d532ee8511dbca6fc2938fe7adbde4551e89b847cca0e516426e52c9c520cf7bc7175bd67e2cfdd", 0x92}, {&(0x7f0000000e00)="669086333fec33e763b21ad3e9ebfd98148b24616f879f5cdc70", 0x1a}], 0x7, &(0x7f0000001540)=[{0x48, 0x104, 0x4, "88164ed43aae9cf07b18cb43a6a1ddfe548a9e0b6b86af1485baf9bc85a42511c10c9943a6b06b0d560ff41a2933fb378548"}, {0x60, 0x113, 0x401, "ec70b054350d78c7085606823872c712fd7a4e0a696bfb38ddb29f68637a569afd41fa7cf4c6f9f6884bbb6adcb86cea43b72930742ab1ee710fbfbebcc8a52d60a767477deac3a6252b9396e12abc"}, {0xd0, 0x6, 0x1, "25b5719bc42a63ff4a8fa4d439b09f2f0bc7fbfede50b70f70791923ebe86c354ced3f2bbf4ddd3b0a3df9f54165a8c969214ebf9954be59ccc6a86525a0707794aba5d80927e1521a87fef2eba04abeeaea6659645000550be3320e7d4f42d6af519572eeefffeafcd4eb265d48b9b97a0c92941480bf9d16b439156bb2ba624bb644e0e30e965185e08e939712d7279cdb9b61290abeccbf4f20626038e619724e9b956592a24ccc1347acbf95f39106edeb7e994ed5240aedc985b2e8ea6a"}, {0x88, 0x113, 0xffffffff, "dca74271a2597703f456799216612feed3be2558b7ae4bdfe583585159c5ea1ff3183388bd6ce071bcb24191a4f135c3bd9de3cc142fe9e04efdc9bcf0b4b3165cc5ce8870763b0d6e809815d1a677172dd1372ea1968146d599526edbdfc1dd1cba00f68290c3599b43334570220b2628b99a"}, {0x68, 0x109, 0x7ff, "8769a7e072574a0134fc22b674747a633c669e6c435aa24077ef3d2da4a9df8b32b18749556fa8d49967404d5218e52609e30444e2f179876e7359d2a7399a300424bd17e147785397ecdacb07c64347706375"}, {0x108, 0x115, 0x8, "b423013b354923e4b286dabff6d51a41a8a98444bacdef9eaeeeff873a479208ad203c9ec06185dae54a325178d0b73838ce59efde635656f75c533389997b8a5422fb7294842932afc7a26609197f8fd6a2f6f2098d5a38bda6ac072a0b9fb141f927433b85a539d296685ba861fb430afa1d1f1194a28028d9dab663097dd90f4e9b3e11235a82e90c723ab2c0dd09970b54ec8e0b2b0fb6404d8bfec9a3dbacb89ff6e9cfdec60735c38aa5a1622d4c6961061281670627c8e6c55e5f220103184f9dec05ce780b56a11ec8a74d9d1ec303761a1ebc9543aed394e7447c579012da676f8ccdad043f3821c232b29e6de2"}, {0xf8, 0x104, 0x8ef8, "8fc4363310ad33b885a85cd07295be02d5e7327f8a7720d33547f9c8aff6c0171694d0e18c74866aaa41831308f9e5a8bce636a7507ac3d0912a2a16600e223d18c661f001b58af23293be7d3e47653bd974845baa7b9d9b814a5c08f9ab654ca31e4eb688fc1f6126a9244655ff2fa99e0b7ed92c26efd7a0e1689836e1453ffeee6efac6540645da9fddce0cdc9b943b3e3c6efc367c123035ec58be0a1137cf822b4705c294e97c97b2093e405a48cde27b5d93cc9bf3f5f11511886f5d53e1007fbdcce009d87c63d65546f774f4a87b307c6e2433700e8d9c76b81a15287de0a02031"}, {0xa0, 0x109, 0x7, "ed7a9b3803210a006c8f6429398ff4e697e5c16a69fd84078cf68d214d7f7542a160f3019cd27df18e5bc6204b0e9f3a67e26019e406d4cd907b09e16009fc49d9fc3c9eb3e6d15678e432b0f76ddaa01f43edea5b65685b0a49e4c116f02c16e8816037c566d050cdf59eb553e635391a5fdbb0b9a5ce5f4f225c0a53de13ed0ef527620983789acd4f"}, {0x78, 0x3, 0x1688, "678866efb636b1d1f225692bd9d39bf6713d9ae7d9c57534d560fb518f289edc14def19b42f425b7e339066e895e4cbd7283b3684eff2090526e6132b25619395ec4d1834243b942a0c9a61d7c81c84e369524ad34d2cc2f2c5c2acb7f739206387bf736a51a"}], 0x580}, 0x4000000) 3.490252596s ago: executing program 5 (id=1231): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x0, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0f000000040000000800000008"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1e, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_lookup=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x2000300, 0xe, 0x0, &(0x7f0000000600)="63e4ed8e46080000003389f7f986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000ac0)=@generic={&(0x7f0000000a80)='./file0\x00', 0x0, 0x18}, 0x18) (async) sendmsg$inet(r4, &(0x7f0000000a40)={&(0x7f0000000880)={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000000a00)=[{&(0x7f00000008c0)="801e442646cbdc39005d0e7980f791f284d98a9d8d59892a353dd4544985048db05dde8835e01860be100c618b4b8eb2d187fd7d361220c65facd17639e73cfdb417457c44536228415be5c88b6b091e8ff9ca53ca589df27865c2bb82047216dbc8a876", 0x64}, {&(0x7f0000000940)="4626d496054026fe4d61a7d3c4a8c40dc1891b49c05d05ad41311a7b473807f49db999bb7b82109a2446bdd926e1e026b574c95d6a1397b1eef2281ad8a865f54c95dde06f7aec64a915ebafb40777d7e71b6ca912d49df37c74", 0x5a}], 0x2}, 0xc815) (async) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x5, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x0, @perf_bp={0x0, 0x6}, 0x14105, 0x2e, 0xffffebff, 0x3, 0x2, 0x9, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x400, 0x20565, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x4}, 0x104902, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) (async, rerun: 32) perf_event_open$cgroup(&(0x7f0000000b40)={0x2, 0x80, 0x1, 0xff, 0x6, 0x5, 0x0, 0x9, 0x2129, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x500, 0x1, @perf_bp={0x0, 0x8}, 0x5200, 0x200000000000000, 0x7512, 0x1, 0x3, 0xb, 0x6, 0x0, 0xff, 0x0, 0x537fabb0}, r1, 0x2, r0, 0x4) (async) r6 = bpf$ITER_CREATE(0xb, 0x0, 0x0) (async) r7 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r7, 0x6, 0x22, &(0x7f0000000200)=r6, 0x4) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0xffffffffffffffff, 0x3}, 0xc) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180)={0x0, r5}, 0x8) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1d, 0xe, 0x7, 0xb72, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x2}, 0x50) openat$cgroup_ro(r8, &(0x7f0000000580)='io.stat\x00', 0x0, 0x0) (async) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020031000b05d25a806f8c6394f90424fc602f0009000a740100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 3.442129639s ago: executing program 6 (id=1232): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0e000000040000000400000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xd, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x7b}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10002}, 0x94) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xf}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x697, 0x0, 0x0, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @generic={0xe, 0xe, 0x3, 0x0, 0x401}, @jmp={0x5, 0x0, 0x8, 0xb, 0x6, 0x4, 0xffffffffffffffff}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100)={0x2, 0x9, 0x45a, 0x5}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000140)=[{0x3, 0x5, 0xf, 0x3}, {0x5, 0x4, 0xe, 0x1}, {0x1, 0x3, 0x2}, {0x5, 0x5, 0x4, 0x4}, {0x0, 0x3, 0x0, 0xc}, {0x1, 0x5, 0xd, 0xa}, {0x4, 0x4, 0x7, 0xa}, {0x5, 0x3, 0xc, 0x8}], 0x10, 0x9}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x80000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000100), 0x1001) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000003}, 0x2, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0xcdd, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 3.09535696s ago: executing program 6 (id=1233): r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000006c0)='b', 0x1}], 0x1}, 0x0) (async) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x108b84, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xf, &(0x7f0000000000), 0x49) (async) sendmsg$kcm(r2, &(0x7f0000000080)={&(0x7f00000001c0)=@phonet={0x23, 0x0, 0x0, 0x6}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000180)="670000001600140006004c78081d", 0xe}, {&(0x7f0000000bc0)="cb4e88a8e5104b098d05b717b6338173cc10268987551878", 0x18}], 0x2}, 0x14) (async) r3 = socket$kcm(0x2, 0x5, 0x84) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000080)=@framed, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000003c0)={r4, &(0x7f0000000080), &(0x7f00000008c0)=""/177}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000400008500000001000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000000c0)={r5}, 0xc) (async, rerun: 64) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) close(r7) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, &(0x7f00000003c0)=[{0x0, 0x0, 0x80000000}, {0x1000000a, 0x4}], 0x10, 0x4}, 0x2) (async) close(0x3) (async) socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000a"], 0x48) (async) r8 = socket$kcm(0xa, 0x6, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0xfffffe08, {0xa, 0x4e21, 0x0, @mcast2}}, 0x80, 0x0}, 0x0) (async, rerun: 32) setsockopt$sock_attach_bpf(r8, 0x29, 0x2f, &(0x7f0000000100), 0x120) (async, rerun: 32) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0xfffffffc, @dev, 0x805, 0x10000}, 0x80, 0x0, 0xfffffffffffffd67}, 0x50a0) setsockopt$sock_attach_bpf(r3, 0x84, 0x64, &(0x7f0000000000)=r9, 0x1c) (async, rerun: 32) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x3, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4c, '\x00', 0x0, @fallback=0x1e, r9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 32) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r10) (async) r11 = socket$kcm(0x10, 0x2, 0x0) (async, rerun: 64) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a80)={@map, 0xffffffffffffffff, 0x17, 0x2002}, 0x20) (rerun: 64) sendmsg$kcm(r11, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="2e00000011008188040f80ec59acbc0413a181003100000001010000000000000e000a000f000000028002002d1fb6", 0x2f}], 0x1}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0xc0189436, &(0x7f0000000440)={'veth1_to_team\x00', @remote}) 2.980777636s ago: executing program 5 (id=1234): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x1, 0x802b4}, 0x0, 0x10000, 0x0, 0x0, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(0xffffffffffffffff) close(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r0, 0x20, &(0x7f0000000040)={&(0x7f0000000380)=""/243, 0xf3, 0x0, &(0x7f00000002c0)=""/111, 0x6f}}, 0x10) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8953, &(0x7f0000000000)={'syzkaller1\x00', @multicast}) r4 = socket$kcm(0x15, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000bc0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x2c, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, r1}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x14869, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="180200000400000000000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0xc9, 0x0, &(0x7f0000000780)="b28474dce33de64ea62e7f8125ee8c59957cb3f18b934feafc85a6fce6cfe8a6007d487496de0f919155d3ea5a297c214e31b96f88fe2514f113fe32014ff1c1c25c6678084da093befd9975dda37cbbcaa936099579e22a1ba9b99552a8ea1997c067c8e6b81493be4c0ddc6cf6dfb2f9ef9c72a8c669d07814f38f520a258c9ef59e00e35fba19a0ea626597508efd96dae64ee9a1e07c8487470e9396d977722c08e6be2a2ba0af8506059853d8a3b2220b6705eec38fab622eb784ebbc431a1b4e5471e75403df", 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x1b, 0x0, &(0x7f0000000180)="b90103606908068c3c270040e700009e0ff008001ffff2e1ffff81", 0x0, 0x8104, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.979909167s ago: executing program 4 (id=1235): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=ANY=[@ANYBLOB="06000000040000000800000008000000000000004444270ef613252c78cc54e48c0a2ed5e91eefd112a9e21e79dcb0228052fb09e360162e5a9c3d7c2ee3f87404b0477298833cd063f78fc32770da17945f1ccbf0f2e1dbde5a95249ba0edc2e2246a5c96e570402ca077a51bac9e409fe5660bb880c0eeac34639d4f23533bc2a9ec8ce2e4c9363ab378c60f2f673fc59d0ddc5bbd185929aa3ae7a81f98e7976c237b09ed092e97b6ca3570981ad2adaced06afa89122f6170a", @ANYRES32, @ANYRES8=0x0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="008b2f89150f91c8708fb2e609f900"/41], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x6, 0x14, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000045000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x3, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000020000000000000000000009500000000000000"], &(0x7f0000000500)='GPL\x00', 0xb7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001500)={0x6, 0x14, &(0x7f00000013c0)=@raw=[@map_fd={0x18, 0x5, 0x1, 0x0, r0}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], &(0x7f0000000040)='GPL\x00', 0x2, 0x5d, &(0x7f0000000180)=""/93, 0x41100, 0x15, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x4, 0x1, 0x4, 0xdb00}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001480)=[r0, 0xffffffffffffffff], &(0x7f00000014c0)=[{0x0, 0x2, 0xa}, {0x5, 0x4, 0x5, 0x2}, {0x2, 0x5, 0x4, 0x1}, {0x1, 0x4, 0xb, 0x7}], 0x10, 0x6}, 0x94) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000024c0)=ANY=[@ANYRES32=0x1, @ANYRES32=r2, @ANYBLOB='.\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="60b08514d0b1cb25ada397a373fbd4baa7e7608d5aa94d4fc430d6c1f58308421825d1a7dc373eef98de9747e87b55a7bf713ad3a80ef9b1d478b767a7c9e9f7a09cee88555000a643c1073430f7a44a12ab1c591fe6d6949fc66f8df428661ce13a854f", @ANYRES32=0x0, @ANYBLOB, @ANYRES64=0x0], 0x20) (async, rerun: 64) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r4 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r4, 0x10d, 0x4, 0x0, 0xf000000) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)=ANY=[], 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002440)={r1, 0xe0, &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002200)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x68, &(0x7f0000002240)=[{}], 0x8, 0x10, &(0x7f0000002280), &(0x7f00000022c0), 0x8, 0x1a, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xc, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000400006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcff7ffa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d0f65acc0d06d1a1434e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622e03b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67e6ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c690220b87b20581e7be6ba0dc001c4510555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd713089856f756436303767d2e24f297446d22384e5dad9796edb697aeea0182babd18cace339f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff22dc518afc9ffc2cc788bee1b47683db01a2f9398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a833784456c386e22cc22ee17476d000000009682e24b92533ac2a997d3ae526aca54183fb01c73f979ca9857399537f5831808b0dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db00002e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e4845535a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9003f07000099d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f18215523167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3037ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cb8846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545b50f576b2b5cc7f819abd0f885cc4806f40300966f08294cd6f496e5dee734fe7da3770845cf442d488afd80e17000000000000000000000000000000000000000000000000052007563885a1105000000dc1c56d59f35d319909ea4a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f00000000000000010100000000000057a8abef8b64237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2c09000000bfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a8639034a75f4c7df3ea8fc2018d07000000ef060cd4403a099f32468f65bd06b4092140faed0c329be610c3082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbcbf2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa412af3bb4efb82055a3b61227ad40f52c9f2500579aca11033bb9cc16bd83a00a40e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f651600eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce1d9bc7ef3e3f40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff47547f164391c673b6079e65d7295eed164ca63e4ea26d65f6b3ce0f6591d80dfb8f386bb74b5589829b6b067903000000000000003d9950d48c774eaa35b24fce696af061c9e53addddc620ce73c5d177e3d097159f2768636fc10276c6a0adc57483b3f7083f66b87ef296ee85e9bb70009a5d30f479e293a3302e11350ea857b37e76ca2f50378e4092ce2c80c57ed04dbc574ad278b9b7b71792e523077d033d8cea3cc571afb2077b019fd9d89efd59b41f051ec5a8ff87ecc8df917a1e386d849fcd10e2f9ca52e02339c2f4666b0c545e62421c28d25994be0cff7271a0dee38d7ac4ac736b090e1d29f981179186e4000000000000646174b55d251f7f8ca5ccc22a5efb33b237eff559973c3a5f3a9bb54abb40e54593e1a7ce4cfa17b3c3fe91c06363496341eae20dcc59b6179b32ddddef5c34000096a54c0c571a91878f61f74912e2299e5501d4d6943bfd74c856511732f0ac8f7d17f1c6b4451c1bcdc6b6e1700e4cd87709d97afc5423c96fa981873d4369b04bbf1fb9f68f17991540868e408201ad1a74179e489aa61f021a437a3fa935588be2068f7ff9b253106326fde795e530b93626cc68e06e602198724249b4445eef08401cd1a3e266db55474e69902e4d8f5da4e94cc36794258fd4032de7ab36bc24c5efd5c8495c1ccd580033c55725f2d60354f8ad5914a0155eaa743350ddb388f486b6de0549ef3b1b3c3b7d4d3a8340000000000000008029be3788dd8422b1ab7b4c9d5b7d8682fd750947109c713108e1386f5843a9ee29af30ecbeb26ff81f0921be501ade32a81aa175f4f8f117fc23b2adb38200f0f360e213534e14fae98502f92017d32f29777b6890ad5a103352dd80f036db18220932a2d26e0f9f807c4eb9ae9ba0b77c54bcf501873ce30286cdd633346bc11ed2259ab31f0bc2630a23738a646833b4d03f0028835f71cee1a5bafec9de0cfe4b5f0197fa9c7f5bcac99dbd85fb924db68d7384d4c5ab109de2f36592f278036d2b81e02a3be90a6b8757ece967569d66c8399796825e80f4dc6b3920ed9813a259de560000000000000000000000000000aeecc3447c907474d2129496fc6f6bc804965f8caaac7e2ef733f77708d618dbeae5352a5bc32d826a1b62cd698b4cfdc74ba5e8f18e808783fd5f32ef793a3069ac0906609aa9ca7dca982d6e903aea749f60beb35e2bee8eb43b8c65f4526c61281d6517f1f6e9741365acdaf8ae916575459f7d14087f826f97c94b09cd1275e576d17f76b39a6ac9e33030d67262209a52012dd9c9c60e45c51dd06ee7ba3d0c53a16070536d583ab8639d4fafe62997819033338a5ea4a5d2b61d05de4d5ad4c8dd0de3b98a1f4d6142851571b8d61715c7cb557373854f7eaf2f4e4bfd3dcb6c1d2e7b0bcb4d896092e90f95a61df4ffeeb64dee29de77fba312943bc53efb61138a5a82f7a828c04faf679edf2fa31cdfc57a2cb7ce03f3cdc40a1a20e82e54d10ce35579d7e065a8840abf4ce792ced89bd4288c8d4274f4fe0525f0b1499b5d2e90e203fc2d05841e4a5de44153a7060104cd771e1a978eb9"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5, @fallback=0x34}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000001380)="b9ff0347eeac63403cf94bf088a8", 0x0, 0xfffffffe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000000)={0xffffffffffffffff, r1, 0x4, r6}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x9, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1e, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000611824000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001880)={r0, 0x58, &(0x7f0000001800)}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a40)={&(0x7f00000018c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x9, [@typedef={0x2, 0x0, 0x0, 0x8, 0x2}, @ptr={0x3, 0x0, 0x0, 0x2, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5, 0x80000001}}, @union={0xc, 0x2, 0x0, 0x5, 0x1, 0x0, [{0x2, 0x2, 0x7}, {0xc, 0x1, 0x4}]}, @typedef={0xe}, @typedef={0xa, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x61, 0x0, 0x30, 0x61, 0x5f, 0x0, 0x51]}}, &(0x7f0000001980)=""/141, 0x8d, 0x8d, 0x1, 0x100, 0x10000}, 0x28) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001dc0)={r6, 0xe0, &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001b00)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000001b40)=[0x0, 0x0], &(0x7f0000001b80)=[0x0], 0x0, 0x2f, &(0x7f0000001bc0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000001c00), &(0x7f0000001c40), 0x8, 0xd6, 0x8, 0x8, &(0x7f0000001c80)}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001e80)={{r0}, &(0x7f0000001e00), &(0x7f0000001e40)=r3}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001ec0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x5}, 0x50) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000002580)=r2, 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r8 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r7) 2.840765194s ago: executing program 7 (id=1236): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff7ffc}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x81, 0x0, 0x0, 0x0, 0x4, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x2, 0x5}, 0x1001c4, 0x506a, 0xfe, 0x5, 0x2, 0x6, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x15, 0x5, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x28080, 0x0) socket$kcm(0x2b, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1, @perf_config_ext={0x0, 0x1000000}, 0x0, 0x40, 0x1, 0x0, 0x0, 0xfffffffc, 0x2, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfefffffbffffffff, r1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="3504000040000511d25a35400c0002000200002037153e37", 0x18}], 0x1}, 0x10049014) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x39, 0xffffffffffffffff}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020023000b05d25a806f8c6394f91a", 0x11}], 0x1, 0x0, 0x0, 0x400300}, 0x20044050) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="33fe0000180091c8b14a0778a8123d18"], 0xfe33) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020023000b02d25a806f8c6394f90724fc60040f030047000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="1400000037000b63d2", 0x9}, {&(0x7f00000000c0)="06081833d0062d04944103", 0xb}], 0x2}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) 2.799265027s ago: executing program 4 (id=1237): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xa8, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x4, @perf_config_ext={0x1ff, 0x200}, 0x8000, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = syz_clone(0x81000000, &(0x7f0000000440)="eea8399c9cb8568a68dacfbffdb8db4c4a9b907e2229ba8d0741abe934fad7d1ed52865fd31803e553b343e2e9ba1d1971a5fa17d16770c69be274be3139294a5ea6b5ba7fc1d4d79e46e9c4bd", 0x4d, &(0x7f00000001c0), &(0x7f0000000640), &(0x7f0000000680)="d330f02b443fb12f71bba7a232c16cb69791cd8d534b6ac5a6e5f7538240f96e6642ed433909c2b1785777e7f3b5afd24a317b0f95aabcbe2ad473cfa617597072c10602c146b13c74341119cc49240b00f4f36926f2b96c0ebfe575d68ea1d3f6ba7df73c25d64889aa55d942e685b0") perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x5d31, 0x18100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0xa, 0x0, 0x0, 0x2, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='^+,!z,-\x00') (async) r2 = socket$kcm(0x2, 0x200000000000001, 0x106) r3 = socket$kcm(0x10, 0x2, 0x4) close(r3) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000800), 0x2, 0x0, 0x14, 0x1f00c00e}, 0x4040000) (async) sendmsg$inet(r3, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x16}, 0x30044891) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xff, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340), 0x10}, 0x94) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async) r5 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="1400000017000b63d25a80648c2594f92aa3c92b", 0x14}], 0x1}, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000080)="05804ab382844306d758e620b9dc", 0x0, 0x12c4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000004000)=ANY=[@ANYRESHEX], &(0x7f0000000340)='syzkaller\x00'}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000400)=r6, 0x51a) (async) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x1, 0x0, 0x20, 0x12504, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x7602, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$kcm(0xa, 0x5, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[], 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x890b, &(0x7f0000000000)) (async) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x4, 0xf, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fd1, 0x0, @perf_config_ext={0x0, 0x5}, 0x2000, 0xc8, 0x2000ffff, 0x4, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea032b00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) (async) socket$kcm(0xa, 0x2, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffff8, 0x3}, 0x0, 0x0, 0x2, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1200000001000000040000000800000000000000", @ANYRES32, @ANYBLOB="000000d02cce2d00"/24, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002f00000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r9, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.492993754s ago: executing program 6 (id=1238): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) close(0xffffffffffffffff) r0 = socket$kcm(0x29, 0x4, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x50) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', r1}, 0x18) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x1, 0x3}, 0x2019, 0x0, 0x0, 0x9, 0xffb, 0x3, 0x7, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x3) socket$kcm(0x2c, 0x3, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r0}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000c6ee000095"], 0x0, 0x1}, 0x94) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000004830000000000000fa40000007010000080020007500feff0000820095"], &(0x7f0000000100)='GPL\x00', 0x4}, 0x94) r3 = socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0x12, &(0x7f0000000340)=r6, 0x4) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4394) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0xfffffd83) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0x100000001}, 0x808, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1}}}], 0x20}, 0x200040c4) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x5, 0x1, 0x0, 0xff, 0x0, 0x40000004, 0xa825, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0xfffe, 0x0, 0x2, 0x8, 0xf4, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x5, 0xd50, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa067707"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x404, 0x9}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d00000003000000040000000108000001000000", @ANYRES32=r8, @ANYBLOB="b41500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="faffff0040000000"], 0x50) 1.461571305s ago: executing program 4 (id=1239): bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x1, 0x0}, 0x8) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x11, &(0x7f00000000c0)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xd62}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3824092e6c432c6d}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @ldst={0x2, 0x2, 0x4, 0x9, 0x0, 0xfffffffffffffff0, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], &(0x7f0000000180)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000001c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x9, 0xc}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000240)=[r2, 0x1, 0xffffffffffffffff], &(0x7f0000000280)=[{0x5, 0x2, 0xe0e6, 0x5}, {0x3, 0x3, 0x42f8, 0x7}, {0x3, 0x1, 0xf, 0x1}, {0x0, 0x2, 0xa, 0x1}, {0x2, 0x5, 0xb, 0x1}], 0x10, 0x66}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000004c0)={@fallback=r2, 0x0, 0x1, 0x800, &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x75, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x7d, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000840)={0x9483, 0x0}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@ifindex=r6, r3, 0x37, 0x28, 0x0, @void, @void, @void, @value=r7, r5}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000880)) r8 = perf_event_open(&(0x7f0000000900)={0x4, 0x80, 0x0, 0xfb, 0xf8, 0x40, 0x0, 0x6, 0x8018, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x101, 0x1, @perf_bp={&(0x7f00000008c0)}, 0x6008, 0x6, 0xb4a2, 0x4, 0x10000, 0x7ff, 0x1, 0x0, 0x6, 0x0, 0xfff}, 0xffffffffffffffff, 0x5, r4, 0x2) r9 = socket$kcm(0x29, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x15, 0x10, &(0x7f0000000980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4e}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@exit], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000a00)='GPL\x00', 0x2, 0x43, &(0x7f0000000a40)=""/67, 0x41100, 0x4c, '\x00', r6, @fallback=0x27, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000ac0)={0x1, 0x7, 0xe0, 0x8}, 0x10, r0, r3, 0x7, &(0x7f0000000b00)=[r4, r4, 0xffffffffffffffff, r4], &(0x7f0000000b40)=[{0x0, 0x1, 0x5, 0xb}, {0x4, 0x3, 0x7, 0x7}, {0x0, 0x4, 0xf, 0xc}, {0x1, 0x1, 0xb, 0x5}, {0x2, 0x3, 0x7, 0x3}, {0x2, 0x1, 0xe, 0xc}, {0x2, 0x1, 0x6, 0x4}], 0x10, 0x4}, 0x94) r11 = perf_event_open(&(0x7f0000000cc0)={0x5, 0x80, 0x6a, 0x9, 0x77, 0x7, 0x0, 0x2, 0x100, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000c80), 0xe}, 0x4, 0x8, 0x5, 0x6, 0xb5, 0xfffffe00, 0x9, 0x0, 0x1, 0x0, 0x41e}, 0x0, 0x4, r8, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x40082406, &(0x7f0000000d40)='GPL\x00') r12 = socket$kcm(0x29, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000dc0)={0x3, 0x80, 0x7, 0x2, 0xc, 0x1, 0x0, 0x7f, 0x600, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff800000, 0x28bafd90a7e1b0f0, @perf_bp={&(0x7f0000000d80), 0x1}, 0x10, 0x0, 0xe328, 0x0, 0x0, 0x2, 0x8, 0x0, 0x6, 0x0, 0x6}, r13, 0xf, r11, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000ec0)={r4, 0x58, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000000f00)=@bloom_filter={0x1e, 0x8, 0x5, 0x6, 0x10010, r4, 0x5, '\x00', r6, r4, 0x2, 0x5, 0x5, 0x9, @void, @value, @value=r4}, 0x50) r16 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000011c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xc08c, '\x00', r6, r4, 0x5, 0x4, 0x5}, 0x50) r17 = bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x7, 0x2e, &(0x7f0000000f80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r15}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r15}}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x10}, @ldst={0x3, 0x1, 0x2, 0xb, 0x4, 0xffffffffffffffc0}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x10}, @generic={0xf, 0x6, 0x8, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x101}}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001100)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x3b, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, &(0x7f0000001140)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000001180)={0x2, 0x6, 0x0, 0x8}, 0x10, r0, r3, 0x4, &(0x7f0000001240)=[r16], &(0x7f0000001280)=[{0x3, 0x4, 0xf, 0x7}, {0x2, 0x3, 0x9, 0xc}, {0x2, 0x5, 0x1, 0x9}, {0x4, 0x3, 0x2, 0xc}], 0x10, 0x80000000}, 0x94) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001380)='cgroup.procs\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r10) r18 = bpf$PROG_LOAD(0x5, &(0x7f0000001640)={0x1d, 0xd, &(0x7f00000013c0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}], &(0x7f0000001440)='syzkaller\x00', 0xd, 0x97, &(0x7f0000001480)=""/151, 0x40f00, 0x40, '\x00', r14, @lsm=0x1b, r4, 0x8, &(0x7f0000001540)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001580)={0x5, 0x1, 0xf, 0x2}, 0x10, 0xffffffffffffffff, r17, 0x2, &(0x7f00000015c0)=[0x1], &(0x7f0000001600)=[{0x3, 0x1, 0x6, 0x1}, {0x3, 0x3, 0x2, 0xa}], 0x10, 0x70}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001700)={@map=r4, 0xffffffffffffffff, 0x2d, 0x8, r18, @void, @value=r3, @void, @void, r5}, 0x20) sendmsg$inet(r12, &(0x7f00000019c0)={&(0x7f0000001740)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000001900)=[{&(0x7f0000001780)="308149e5e2f06a7bf1ff73451531f631a819a38b7b890137c091c30ce81d0d1f9cb32b852f62b46e7be2", 0x2a}, {&(0x7f00000017c0)="ac4a6218c8f638b53ffe94589e1c761cbfd1c842ee0d7df15bb261b849e13226436b2168dd9d13899f1300dc120b5e738a87fbe18ef45896f295df3f8e1098a445264b61c971437893e8", 0x4a}, {&(0x7f0000001840)="483b24fefebe019da4abbe8c35843f73be3adaba61ef10a2d3a31af221eaccb2c7b91f31d135cea617e3a7e65e54406eaa6a0729ca6077e2bf325478fb55034061f960a0e3882606fd0f2934ab2b1e1393b9995fcea07e6697c0352713f174bab2c79d71120980bb09e8aa6190e084f4a8d04e650a104be29ed9e18ab9f051bcca04c5c6dfdbc427802bfd28ce1802ec5b01ba8230f48426c25c1e961a067c17b6c1f57778b2028717ec1eea404a13145cdf0643f1a2730a53c67e1ddc296cfd", 0xc0}], 0x3, &(0x7f0000001940)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @multicast2, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r14, @local, @initdev={0xac, 0x1e, 0xe, 0x0}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @broadcast, @local}}}], 0x60}, 0x28000000) r19 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r19, &(0x7f0000002d80)={&(0x7f0000001a00)=@rc, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001a80)=""/199, 0xc7}, {&(0x7f0000001b80)=""/134, 0x86}, {&(0x7f0000001c40)=""/152, 0x98}, {&(0x7f0000001d00)=""/14, 0xe}], 0x4, &(0x7f0000001d80)=""/4096, 0x1000}, 0x40000000) close(r9) syz_open_procfs$namespace(r13, &(0x7f0000002dc0)='ns/net\x00') 497.109732ms ago: executing program 7 (id=1240): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x26, 0xa, 0x0, 0x0, 0x20, 0x61, 0x11, 0x6c}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x181, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110c230000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=@raw=[@func, @map_fd, @exit, @jmp={0x5, 0x0, 0x4}], 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={@cgroup, 0xffffffffffffffff, 0x6, 0x1c}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f3, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x36}, 0x50) 489.547412ms ago: executing program 5 (id=1248): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1e, 0x0, 0x0, 0x0, 0xfdfffffb, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{0x0, 0x0, 0x2, 0xa}, {0xfffffffd, 0x0, 0x3}, {0x0, 0x80004, 0x10100, 0x3}], 0x10, 0x1}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0x1, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)=r0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r0, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f00000003c0)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x67, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0xd, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@o_path={&(0x7f00000006c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x8, r0}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@bloom_filter={0x1e, 0xfffffff9, 0x1f, 0x1da000, 0x800, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4, 0xd}, 0x50) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x50) (async) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000940), 0x8) (async) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000980)={0xffffffffffffffff, 0x7fffffff, 0x30}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x9, &(0x7f0000000c80)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x6c, &(0x7f0000000240)=""/108, 0x40f00, 0x10, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x1, 0xb, 0xffffffff, 0x6}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000009c0)=[r3, r4, r5, r6, r7], &(0x7f0000000a00)=[{0x2, 0x2, 0xf, 0x2}, {0x2, 0x3, 0xc, 0x1}], 0x10, 0x5}, 0x94) (async) r8 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b11d25a806c8c6f94f90424fc601000407a0a000600053582c137153e37000c11802f2ff4070300", 0x33fe0}], 0x1, 0x0, 0x0, 0x35}, 0x0) 397.037007ms ago: executing program 4 (id=1241): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x4, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x4, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3efd7ab4c41335d9, @perf_bp={0x0}, 0x0, 0x1, 0x310c, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x0) sendmsg$sock(r1, &(0x7f0000000080)={&(0x7f0000000140)=@in6={0x2, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x7}}], 0x18}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000700)=ANY=[], 0x31) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000040009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000300), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="d4010000100000001800000000000000000000000000000095", @ANYRESOCT, @ANYBLOB="0572c86b63b907a51783a16710530b9acd261a9a75ef057697b3fb6401d2689c9687a7456d6015c3badc1c61c68cd6c2b576a60008d13c67dc0aa0ea7d3623d18b3cc65900ddf36899c7611de1127d7144c4a7badbe62c78cdf7a57e7d5de18a2afb3508f14347"], &(0x7f00000000c0)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0xc}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x49, &(0x7f0000000180), 0x4a) r5 = socket$kcm(0x10, 0x2, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000240)={0x0, r4}, 0x8) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0xfd, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f8481100000003000000000000000e000a000f08000002800000121f", 0x2e}], 0x1}, 0x8084) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r6, 0x0, 0x22, 0x0, &(0x7f0000000380)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socket$kcm(0xf, 0x3, 0x2) 394.749758ms ago: executing program 6 (id=1242): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0e000000040000000400000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xd, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x7b}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10002}, 0x94) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xf}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x697, 0x0, 0x0, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r0}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @generic={0xe, 0xe, 0x3, 0x0, 0x401}, @jmp={0x5, 0x0, 0x8, 0xb, 0x6, 0x4, 0xffffffffffffffff}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100)={0x2, 0x9, 0x45a, 0x5}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000140)=[{0x3, 0x5, 0xf, 0x3}, {0x5, 0x4, 0xe, 0x1}, {0x1, 0x3, 0x2}, {0x5, 0x5, 0x4, 0x4}, {0x0, 0x3, 0x0, 0xc}, {0x1, 0x5, 0xd, 0xa}, {0x4, 0x4, 0x7, 0xa}, {0x5, 0x3, 0xc, 0x8}], 0x10, 0x9}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x80000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000100), 0x1001) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000003}, 0x2, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0xcdd, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 272.952095ms ago: executing program 5 (id=1243): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x40009, 0x40f9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="140000000000004401b4aeff060000008902000000000000"], 0x18}, 0x20002800) r2 = socket$kcm(0x29, 0x2, 0x0) close(r2) r3 = socket$kcm(0x2b, 0x1, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x84) setsockopt$sock_attach_bpf(r2, 0x1, 0xd, &(0x7f0000000080), 0x2cb) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3, 0x0, 0x0, 0x7, 0x2100}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x28, 0x0, 0x1, 0x1}, 0x28) close(r3) r4 = socket$kcm(0x23, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x1, &(0x7f00000000c0)}, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x29, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d08007b490d4f1e81f8d815000100fe80000000000000080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) 102.888115ms ago: executing program 7 (id=1244): r0 = socket$kcm(0x22, 0x2, 0x21) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0xa2532, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = getpid() r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) r3 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) close(r3) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d00)={r3, 0x58, &(0x7f0000002040)}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d71, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x3, 0x3a) socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x10, 0x3, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000600000004000000000000040900000004000c030000000000000000000003000000000100000002000000ff010000030000000000001004000000002e615f5f00"], 0x0, 0x5a, 0x0, 0x1}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="140000002d000b63d25a00648c2594f90424f3db", 0x14}], 0x1}, 0x4000800) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x100904, 0x0, 0x0, 0x0, 0x200000, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x0, 0x9, 0x0, 0x0, 0x9, 0x29200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, @perf_config_ext={0xffffffff7fffffff, 0x69296873}, 0x0, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x9, 0xffff, 0x0, 0x0, 0x0, 0xfffffffffffff7fe}, 0x0, 0x3fffffb, r3, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="d80000001c0081044e81f782db44b904021d080304000000e8fe03a1180015000600142603600e1208000f0000810401a80016040a0001", 0x37}], 0x1, 0x0, 0x0, 0x7400}, 0x8008) r5 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfe33) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x6, 0x3, &(0x7f00000009c0)=ANY=[], &(0x7f0000000140)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x21}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0xf10, 0x0, 0x0, 0x800000, 0xfffd, 0x0, 0x0, 0x0, 0x40}, r1, 0xf, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001340), 0x888102, 0x0) 39.792039ms ago: executing program 5 (id=1245): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x7, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x80110, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x0, 0x5d}, 0x0, 0xca, 0x0, 0x4, 0x3, 0x3ff, 0xfffc, 0x0, 0x0, 0x0, 0x6c6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) gettid() close(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x1100a0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x9, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r3, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r4, 0x0, 0x80) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x8fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000040)='syz1\x00', 0x1ff) write$cgroup_int(r0, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 0s ago: executing program 6 (id=1246): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x0, &(0x7f00000000c0)}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000001680)="e01b20124e874aa6b60879e40d28511fc74e7ca215424c97793fcef77fe7fc59fe55f1c7c0f9db55d3132b4a4f2c52daaa8607d0a8f8aa2b25fd3c03238008c3310290f9dcf52c0e6bb61f388f7bca369f263d1f5eebd92407a0faedf3e41b52475ef854d0ecfb3933b51b26a4adb8c0e40d522d091366d568885e3b1b83fbaaec47cd672b64cb0ef94902ed3ed259872af7c50fd8876221ef203b0c058c95b9ddd555f3a7f045894f33ff643e34a4", 0x4, 0x0, 0x80000001}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752047714f2845c87fb0e60b74e6a66cbe20bb7c9807d2"], 0x5) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2d63707520cff4f40300"], 0x5) r2 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r2], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0xa}, 0x40, 0x0, 0x0, 0x0, 0x1, 0xbb6ed56, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x4100, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x3) write$cgroup_type(r2, &(0x7f0000000080), 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000280)={'wg2\x00', @local}) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) kernel console output (not intermixed with test programs): [ 182.691294][ T6873] netlink: 4595 bytes leftover after parsing attributes in process `syz.7.175'. [ 185.694401][ T6937] FAULT_INJECTION: forcing a failure. [ 185.694401][ T6937] name failslab, interval 1, probability 0, space 0, times 0 [ 185.809572][ T6937] CPU: 1 PID: 6937 Comm: syz.6.184 Not tainted syzkaller #0 [ 185.816971][ T6937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 185.827094][ T6937] Call Trace: [ 185.830433][ T6937] [ 185.833414][ T6937] dump_stack_lvl+0x18c/0x250 [ 185.838156][ T6937] ? __sctp_connect+0x5b7/0xd80 [ 185.843070][ T6937] ? sctp_setsockopt+0x6d8/0x11e0 [ 185.848157][ T6937] ? show_regs_print_info+0x20/0x20 [ 185.853438][ T6937] ? load_image+0x400/0x400 [ 185.858039][ T6937] should_fail_ex+0x39d/0x4d0 [ 185.862802][ T6937] should_failslab+0x9/0x20 [ 185.867375][ T6937] slab_pre_alloc_hook+0x59/0x310 [ 185.872481][ T6937] ? sctp_add_bind_addr+0x8c/0x360 [ 185.877664][ T6937] __kmem_cache_alloc_node+0x53/0x250 [ 185.883114][ T6937] ? sctp_add_bind_addr+0x8c/0x360 [ 185.888316][ T6937] kmalloc_trace+0x2a/0xe0 [ 185.892901][ T6937] sctp_add_bind_addr+0x8c/0x360 [ 185.897943][ T6937] sctp_copy_local_addr_list+0x315/0x4f0 [ 185.903662][ T6937] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 185.909505][ T6937] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 185.915655][ T6937] ? sctp_v4_is_any+0x35/0x60 [ 185.920392][ T6937] ? sctp_copy_one_addr+0x8c/0x350 [ 185.925577][ T6937] sctp_bind_addr_copy+0x189/0x3c0 [ 185.930773][ T6937] sctp_connect_new_asoc+0x2f9/0x6a0 [ 185.936250][ T6937] ? __sctp_connect+0xd80/0xd80 [ 185.941275][ T6937] ? mark_lock+0x94/0x320 [ 185.945674][ T6937] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 185.951571][ T6937] __sctp_connect+0x5b7/0xd80 [ 185.956519][ T6937] ? sctp_send_asconf+0x170/0x170 [ 185.961610][ T6937] ? __local_bh_enable_ip+0x13a/0x1c0 [ 185.967059][ T6937] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 185.972676][ T6937] ? security_sctp_bind_connect+0x89/0xb0 [ 185.978474][ T6937] sctp_setsockopt_connectx+0x104/0x1a0 [ 185.984194][ T6937] sctp_setsockopt+0x6d8/0x11e0 [ 185.989124][ T6937] ? sock_common_recvmsg+0x190/0x190 [ 185.994576][ T6937] do_sock_setsockopt+0x175/0x1a0 [ 185.999852][ T6937] ? __fdget+0x180/0x210 [ 186.004219][ T6937] __x64_sys_setsockopt+0x182/0x200 [ 186.009518][ T6937] do_syscall_64+0x55/0xa0 [ 186.014008][ T6937] ? clear_bhb_loop+0x40/0x90 [ 186.018738][ T6937] ? clear_bhb_loop+0x40/0x90 [ 186.023469][ T6937] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 186.029428][ T6937] RIP: 0033:0x7fb96039aeb9 [ 186.033910][ T6937] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 186.053584][ T6937] RSP: 002b:00007fb9611b5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 186.062080][ T6937] RAX: ffffffffffffffda RBX: 00007fb960615fa0 RCX: 00007fb96039aeb9 [ 186.070113][ T6937] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 186.078152][ T6937] RBP: 00007fb9611b5090 R08: 000000000000002c R09: 0000000000000000 [ 186.086287][ T6937] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 186.094331][ T6937] R13: 00007fb960616038 R14: 00007fb960615fa0 R15: 00007ffca7c3e428 [ 186.102487][ T6937] [ 186.518569][ T6949] netlink: 'syz.4.188': attribute type 10 has an invalid length. [ 189.155507][ T6961] netlink: 'syz.6.190': attribute type 10 has an invalid length. [ 189.169691][ T6961] netlink: 55 bytes leftover after parsing attributes in process `syz.6.190'. [ 189.248281][ T6978] Zero length message leads to an empty skb [ 191.440398][ T6994] FAULT_INJECTION: forcing a failure. [ 191.440398][ T6994] name failslab, interval 1, probability 0, space 0, times 0 [ 191.467707][ T6994] CPU: 0 PID: 6994 Comm: syz.4.199 Not tainted syzkaller #0 [ 191.475104][ T6994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 191.485209][ T6994] Call Trace: [ 191.488547][ T6994] [ 191.491523][ T6994] dump_stack_lvl+0x18c/0x250 [ 191.496302][ T6994] ? __sctp_connect+0x5b7/0xd80 [ 191.501242][ T6994] ? sctp_setsockopt+0x6d8/0x11e0 [ 191.506418][ T6994] ? show_regs_print_info+0x20/0x20 [ 191.511678][ T6994] ? load_image+0x400/0x400 [ 191.516260][ T6994] should_fail_ex+0x39d/0x4d0 [ 191.521004][ T6994] should_failslab+0x9/0x20 [ 191.525574][ T6994] slab_pre_alloc_hook+0x59/0x310 [ 191.530663][ T6994] ? sctp_add_bind_addr+0x8c/0x360 [ 191.535854][ T6994] __kmem_cache_alloc_node+0x53/0x250 [ 191.541294][ T6994] ? sctp_add_bind_addr+0x8c/0x360 [ 191.546470][ T6994] kmalloc_trace+0x2a/0xe0 [ 191.550952][ T6994] sctp_add_bind_addr+0x8c/0x360 [ 191.555958][ T6994] sctp_copy_local_addr_list+0x315/0x4f0 [ 191.561655][ T6994] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 191.567447][ T6994] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 191.573578][ T6994] ? sctp_v4_is_any+0x35/0x60 [ 191.578294][ T6994] ? sctp_copy_one_addr+0x8c/0x350 [ 191.583451][ T6994] sctp_bind_addr_copy+0x189/0x3c0 [ 191.588887][ T6994] sctp_connect_new_asoc+0x2f9/0x6a0 [ 191.594214][ T6994] ? __sctp_connect+0xd80/0xd80 [ 191.599139][ T6994] ? mark_lock+0x94/0x320 [ 191.603539][ T6994] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 191.609398][ T6994] __sctp_connect+0x5b7/0xd80 [ 191.614148][ T6994] ? sctp_send_asconf+0x170/0x170 [ 191.619414][ T6994] ? __local_bh_enable_ip+0x13a/0x1c0 [ 191.624823][ T6994] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 191.630417][ T6994] ? security_sctp_bind_connect+0x89/0xb0 [ 191.636193][ T6994] sctp_setsockopt_connectx+0x104/0x1a0 [ 191.641792][ T6994] sctp_setsockopt+0x6d8/0x11e0 [ 191.646685][ T6994] ? sock_common_recvmsg+0x190/0x190 [ 191.652013][ T6994] do_sock_setsockopt+0x175/0x1a0 [ 191.657088][ T6994] ? __fdget+0x180/0x210 [ 191.661377][ T6994] __x64_sys_setsockopt+0x182/0x200 [ 191.666632][ T6994] do_syscall_64+0x55/0xa0 [ 191.671086][ T6994] ? clear_bhb_loop+0x40/0x90 [ 191.675802][ T6994] ? clear_bhb_loop+0x40/0x90 [ 191.680534][ T6994] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 191.686898][ T6994] RIP: 0033:0x7f607d79aeb9 [ 191.691347][ T6994] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 191.711094][ T6994] RSP: 002b:00007f607e627028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 191.719632][ T6994] RAX: ffffffffffffffda RBX: 00007f607da15fa0 RCX: 00007f607d79aeb9 [ 191.727646][ T6994] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 191.735676][ T6994] RBP: 00007f607e627090 R08: 000000000000002c R09: 0000000000000000 [ 191.743690][ T6994] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 191.751704][ T6994] R13: 00007f607da16038 R14: 00007f607da15fa0 R15: 00007ffc5c1ddfa8 [ 191.759727][ T6994] [ 192.052130][ T6998] netlink: 'syz.4.200': attribute type 153 has an invalid length. [ 192.075079][ T6998] netlink: 112096 bytes leftover after parsing attributes in process `syz.4.200'. [ 192.670668][ T6974] netlink: 4 bytes leftover after parsing attributes in process `syz.7.192'. [ 194.119899][ T7025] netlink: 'syz.7.204': attribute type 10 has an invalid length. [ 194.788944][ T1284] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.797106][ T1284] ieee802154 phy1 wpan1: encryption failed: -22 [ 195.664871][ T7062] netlink: 'syz.7.211': attribute type 21 has an invalid length. [ 195.688416][ T7062] netlink: 'syz.7.211': attribute type 3 has an invalid length. [ 195.696156][ T7062] netlink: 144 bytes leftover after parsing attributes in process `syz.7.211'. [ 195.860372][ T7071] netlink: 14 bytes leftover after parsing attributes in process `syz.5.213'. [ 195.878261][ T7071] netlink: del zone limit has 4 unknown bytes [ 197.961510][ T7118] netlink: 61967 bytes leftover after parsing attributes in process `syz.5.224'. [ 197.983194][ T7121] netlink: 132 bytes leftover after parsing attributes in process `syz.4.227'. [ 200.228379][ T7152] wg2: entered allmulticast mode [ 200.324525][ T7156] wg2: entered promiscuous mode [ 201.649564][ T7184] FAULT_INJECTION: forcing a failure. [ 201.649564][ T7184] name failslab, interval 1, probability 0, space 0, times 0 [ 201.693461][ T7184] CPU: 0 PID: 7184 Comm: syz.4.238 Not tainted syzkaller #0 [ 201.700866][ T7184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 201.711067][ T7184] Call Trace: [ 201.714400][ T7184] [ 201.717382][ T7184] dump_stack_lvl+0x18c/0x250 [ 201.722133][ T7184] ? __sctp_connect+0x5b7/0xd80 [ 201.727042][ T7184] ? sctp_setsockopt+0x6d8/0x11e0 [ 201.732129][ T7184] ? show_regs_print_info+0x20/0x20 [ 201.737398][ T7184] ? load_image+0x400/0x400 [ 201.741979][ T7184] should_fail_ex+0x39d/0x4d0 [ 201.746733][ T7184] should_failslab+0x9/0x20 [ 201.751307][ T7184] slab_pre_alloc_hook+0x59/0x310 [ 201.756406][ T7184] ? sctp_add_bind_addr+0x8c/0x360 [ 201.761583][ T7184] __kmem_cache_alloc_node+0x53/0x250 [ 201.767006][ T7184] ? sctp_add_bind_addr+0x8c/0x360 [ 201.772172][ T7184] kmalloc_trace+0x2a/0xe0 [ 201.776636][ T7184] sctp_add_bind_addr+0x8c/0x360 [ 201.781727][ T7184] sctp_copy_local_addr_list+0x315/0x4f0 [ 201.787412][ T7184] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 201.793226][ T7184] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 201.799433][ T7184] ? sctp_v4_is_any+0x35/0x60 [ 201.804164][ T7184] ? sctp_copy_one_addr+0x8c/0x350 [ 201.809340][ T7184] sctp_bind_addr_copy+0x189/0x3c0 [ 201.814522][ T7184] sctp_connect_new_asoc+0x2f9/0x6a0 [ 201.819958][ T7184] ? __sctp_connect+0xd80/0xd80 [ 201.824907][ T7184] ? mark_lock+0x94/0x320 [ 201.829288][ T7184] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 201.835166][ T7184] __sctp_connect+0x5b7/0xd80 [ 201.839908][ T7184] ? sctp_send_asconf+0x170/0x170 [ 201.845035][ T7184] ? __local_bh_enable_ip+0x13a/0x1c0 [ 201.850547][ T7184] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 201.856329][ T7184] ? security_sctp_bind_connect+0x89/0xb0 [ 201.862118][ T7184] sctp_setsockopt_connectx+0x104/0x1a0 [ 201.867746][ T7184] sctp_setsockopt+0x6d8/0x11e0 [ 201.872664][ T7184] ? sock_common_recvmsg+0x190/0x190 [ 201.878034][ T7184] do_sock_setsockopt+0x175/0x1a0 [ 201.883167][ T7184] ? __fdget+0x180/0x210 [ 201.887494][ T7184] __x64_sys_setsockopt+0x182/0x200 [ 201.892818][ T7184] do_syscall_64+0x55/0xa0 [ 201.897295][ T7184] ? clear_bhb_loop+0x40/0x90 [ 201.902018][ T7184] ? clear_bhb_loop+0x40/0x90 [ 201.906787][ T7184] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 201.912718][ T7184] RIP: 0033:0x7f607d79aeb9 [ 201.917174][ T7184] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 201.936832][ T7184] RSP: 002b:00007f607e627028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 201.945300][ T7184] RAX: ffffffffffffffda RBX: 00007f607da15fa0 RCX: 00007f607d79aeb9 [ 201.953328][ T7184] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 201.961341][ T7184] RBP: 00007f607e627090 R08: 000000000000002c R09: 0000000000000000 [ 201.969883][ T7184] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.977894][ T7184] R13: 00007f607da16038 R14: 00007f607da15fa0 R15: 00007ffc5c1ddfa8 [ 201.985933][ T7184] [ 204.823605][ T7233] FAULT_INJECTION: forcing a failure. [ 204.823605][ T7233] name failslab, interval 1, probability 0, space 0, times 0 [ 204.892179][ T7233] CPU: 0 PID: 7233 Comm: syz.5.250 Not tainted syzkaller #0 [ 204.899605][ T7233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 204.909743][ T7233] Call Trace: [ 204.913086][ T7233] [ 204.916067][ T7233] dump_stack_lvl+0x18c/0x250 [ 204.920815][ T7233] ? __sctp_connect+0x5b7/0xd80 [ 204.925732][ T7233] ? sctp_setsockopt+0x6d8/0x11e0 [ 204.930814][ T7233] ? show_regs_print_info+0x20/0x20 [ 204.936073][ T7233] ? load_image+0x400/0x400 [ 204.940634][ T7233] should_fail_ex+0x39d/0x4d0 [ 204.945362][ T7233] should_failslab+0x9/0x20 [ 204.949922][ T7233] slab_pre_alloc_hook+0x59/0x310 [ 204.955117][ T7233] ? sctp_add_bind_addr+0x8c/0x360 [ 204.960387][ T7233] __kmem_cache_alloc_node+0x53/0x250 [ 204.965824][ T7233] ? sctp_add_bind_addr+0x8c/0x360 [ 204.970979][ T7233] kmalloc_trace+0x2a/0xe0 [ 204.975443][ T7233] sctp_add_bind_addr+0x8c/0x360 [ 204.980435][ T7233] sctp_copy_local_addr_list+0x315/0x4f0 [ 204.986125][ T7233] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 204.991907][ T7233] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 204.998032][ T7233] ? sctp_v4_is_any+0x35/0x60 [ 205.002754][ T7233] ? sctp_copy_one_addr+0x8c/0x350 [ 205.007920][ T7233] sctp_bind_addr_copy+0x189/0x3c0 [ 205.013105][ T7233] sctp_connect_new_asoc+0x2f9/0x6a0 [ 205.018457][ T7233] ? __sctp_connect+0xd80/0xd80 [ 205.023379][ T7233] ? mark_lock+0x94/0x320 [ 205.027785][ T7233] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 205.033656][ T7233] __sctp_connect+0x5b7/0xd80 [ 205.038459][ T7233] ? sctp_send_asconf+0x170/0x170 [ 205.043664][ T7233] ? __local_bh_enable_ip+0x13a/0x1c0 [ 205.049233][ T7233] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 205.054859][ T7233] ? security_sctp_bind_connect+0x89/0xb0 [ 205.060633][ T7233] sctp_setsockopt_connectx+0x104/0x1a0 [ 205.066274][ T7233] sctp_setsockopt+0x6d8/0x11e0 [ 205.071177][ T7233] ? sock_common_recvmsg+0x190/0x190 [ 205.076525][ T7233] do_sock_setsockopt+0x175/0x1a0 [ 205.081614][ T7233] ? __fdget+0x180/0x210 [ 205.085916][ T7233] __x64_sys_setsockopt+0x182/0x200 [ 205.091168][ T7233] do_syscall_64+0x55/0xa0 [ 205.095644][ T7233] ? clear_bhb_loop+0x40/0x90 [ 205.100366][ T7233] ? clear_bhb_loop+0x40/0x90 [ 205.105098][ T7233] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 205.111040][ T7233] RIP: 0033:0x7f214b19aeb9 [ 205.115588][ T7233] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 205.135410][ T7233] RSP: 002b:00007f214c051028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 205.143887][ T7233] RAX: ffffffffffffffda RBX: 00007f214b415fa0 RCX: 00007f214b19aeb9 [ 205.151936][ T7233] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 205.159957][ T7233] RBP: 00007f214c051090 R08: 000000000000002c R09: 0000000000000000 [ 205.168007][ T7233] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 205.176040][ T7233] R13: 00007f214b416038 R14: 00007f214b415fa0 R15: 00007fff47bb2038 [ 205.184099][ T7233] [ 205.378641][ T7219] netlink: 'syz.4.248': attribute type 10 has an invalid length. [ 205.386624][ T7219] netlink: 2 bytes leftover after parsing attributes in process `syz.4.248'. [ 205.408344][ T7219] bond0: entered promiscuous mode [ 205.418904][ T7219] bond_slave_0: entered promiscuous mode [ 205.424915][ T7219] bond_slave_1: entered promiscuous mode [ 205.529072][ T7219] bridge0: port 3(bond0) entered blocking state [ 205.558329][ T7219] bridge0: port 3(bond0) entered disabled state [ 205.565556][ T7219] bond0: entered allmulticast mode [ 205.591799][ T7219] bond_slave_0: entered allmulticast mode [ 205.597633][ T7219] bond_slave_1: entered allmulticast mode [ 205.621543][ T7219] bridge0: port 3(bond0) entered blocking state [ 205.628829][ T7219] bridge0: port 3(bond0) entered forwarding state [ 206.354958][ T7247] can: request_module (can-proto-0) failed. [ 207.093540][ T7265] bond0: entered promiscuous mode [ 207.108393][ T7265] bond_slave_0: entered promiscuous mode [ 207.125560][ T7265] bond_slave_1: entered promiscuous mode [ 207.453596][ T7273] netlink: 'syz.4.258': attribute type 29 has an invalid length. [ 207.519106][ T7273] netlink: 'syz.4.258': attribute type 29 has an invalid length. [ 207.543382][ T7271] netlink: 'syz.4.258': attribute type 29 has an invalid length. [ 209.401340][ T7291] netlink: 'syz.6.260': attribute type 2 has an invalid length. [ 209.443659][ T7291] netlink: 164 bytes leftover after parsing attributes in process `syz.6.260'. [ 209.559470][ T7287] syzkaller0: delete flow: hash 2550325919 index 1 [ 216.228600][ T7372] netlink: 'syz.6.272': attribute type 1 has an invalid length. [ 216.236684][ T7372] netlink: 193500 bytes leftover after parsing attributes in process `syz.6.272'. [ 217.086961][ T7401] netlink: 64859 bytes leftover after parsing attributes in process `syz.7.278'. [ 217.190572][ T7403] veth0_vlan: entered allmulticast mode [ 217.325475][ T7409] netlink: 180 bytes leftover after parsing attributes in process `syz.6.280'. [ 219.433641][ T7405] veth0_vlan: left promiscuous mode [ 219.441090][ T7405] veth0_vlan: entered promiscuous mode [ 220.833809][ T7448] netlink: 'syz.6.289': attribute type 2 has an invalid length. [ 220.863687][ T7448] netlink: 'syz.6.289': attribute type 1 has an invalid length. [ 220.892384][ T7448] netlink: 199820 bytes leftover after parsing attributes in process `syz.6.289'. [ 221.670641][ T7469] veth0_vlan: entered allmulticast mode [ 221.924566][ T7469] veth0_vlan: left promiscuous mode [ 221.942706][ T7469] veth0_vlan: entered promiscuous mode [ 222.489784][ T7492] sit0: entered promiscuous mode [ 222.504210][ T7492] sit0: entered allmulticast mode [ 223.546204][ T7507] netlink: 'syz.4.301': attribute type 2 has an invalid length. [ 223.561539][ T7507] netlink: 'syz.4.301': attribute type 8 has an invalid length. [ 223.570374][ T7507] netlink: 132 bytes leftover after parsing attributes in process `syz.4.301'. [ 223.965825][ T7520] FAULT_INJECTION: forcing a failure. [ 223.965825][ T7520] name failslab, interval 1, probability 0, space 0, times 0 [ 224.005075][ T7520] CPU: 1 PID: 7520 Comm: syz.6.305 Not tainted syzkaller #0 [ 224.012741][ T7520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 224.022865][ T7520] Call Trace: [ 224.026212][ T7520] [ 224.029204][ T7520] dump_stack_lvl+0x18c/0x250 [ 224.033964][ T7520] ? __sctp_connect+0x5b7/0xd80 [ 224.038886][ T7520] ? sctp_setsockopt+0x6d8/0x11e0 [ 224.043968][ T7520] ? show_regs_print_info+0x20/0x20 [ 224.049275][ T7520] ? load_image+0x400/0x400 [ 224.053873][ T7520] should_fail_ex+0x39d/0x4d0 [ 224.058644][ T7520] should_failslab+0x9/0x20 [ 224.063221][ T7520] slab_pre_alloc_hook+0x59/0x310 [ 224.068335][ T7520] ? sctp_add_bind_addr+0x8c/0x360 [ 224.073549][ T7520] __kmem_cache_alloc_node+0x53/0x250 [ 224.079004][ T7520] ? sctp_add_bind_addr+0x8c/0x360 [ 224.084197][ T7520] kmalloc_trace+0x2a/0xe0 [ 224.088694][ T7520] sctp_add_bind_addr+0x8c/0x360 [ 224.093720][ T7520] sctp_copy_local_addr_list+0x315/0x4f0 [ 224.099440][ T7520] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 224.105238][ T7520] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 224.111385][ T7520] ? sctp_v4_is_any+0x35/0x60 [ 224.116125][ T7520] ? sctp_copy_one_addr+0x8c/0x350 [ 224.121315][ T7520] sctp_bind_addr_copy+0x189/0x3c0 [ 224.126513][ T7520] sctp_connect_new_asoc+0x2f9/0x6a0 [ 224.131873][ T7520] ? __sctp_connect+0xd80/0xd80 [ 224.136805][ T7520] ? mark_lock+0x94/0x320 [ 224.141206][ T7520] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 224.147083][ T7520] __sctp_connect+0x5b7/0xd80 [ 224.151844][ T7520] ? sctp_send_asconf+0x170/0x170 [ 224.156932][ T7520] ? __local_bh_enable_ip+0x13a/0x1c0 [ 224.162397][ T7520] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 224.168018][ T7520] ? security_sctp_bind_connect+0x89/0xb0 [ 224.173818][ T7520] sctp_setsockopt_connectx+0x104/0x1a0 [ 224.179439][ T7520] sctp_setsockopt+0x6d8/0x11e0 [ 224.184367][ T7520] ? sock_common_recvmsg+0x190/0x190 [ 224.189735][ T7520] do_sock_setsockopt+0x175/0x1a0 [ 224.194838][ T7520] ? __fdget+0x180/0x210 [ 224.199152][ T7520] __x64_sys_setsockopt+0x182/0x200 [ 224.204447][ T7520] do_syscall_64+0x55/0xa0 [ 224.208949][ T7520] ? clear_bhb_loop+0x40/0x90 [ 224.213693][ T7520] ? clear_bhb_loop+0x40/0x90 [ 224.218442][ T7520] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 224.224412][ T7520] RIP: 0033:0x7fb96039aeb9 [ 224.228902][ T7520] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 224.248576][ T7520] RSP: 002b:00007fb9611b5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 224.257068][ T7520] RAX: ffffffffffffffda RBX: 00007fb960615fa0 RCX: 00007fb96039aeb9 [ 224.265114][ T7520] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 224.273154][ T7520] RBP: 00007fb9611b5090 R08: 000000000000002c R09: 0000000000000000 [ 224.281205][ T7520] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 224.289251][ T7520] R13: 00007fb960616038 R14: 00007fb960615fa0 R15: 00007ffca7c3e428 [ 224.297327][ T7520] [ 224.960398][ T7535] pimreg: tun_chr_ioctl cmd 1074025677 [ 224.987374][ T7535] pimreg: linktype set to 780 [ 225.076692][ T7535] netlink: 'syz.4.308': attribute type 10 has an invalid length. [ 225.124717][ T7535] netlink: 40 bytes leftover after parsing attributes in process `syz.4.308'. [ 225.139303][ T7535] team0: entered promiscuous mode [ 225.144606][ T7535] team_slave_0: entered promiscuous mode [ 225.176762][ T7535] team_slave_1: entered promiscuous mode [ 225.197906][ T7535] team0: entered allmulticast mode [ 225.228592][ T7535] team_slave_0: entered allmulticast mode [ 225.240356][ T7535] team_slave_1: entered allmulticast mode [ 225.300977][ T7535] bridge0: port 4(team0) entered blocking state [ 225.307598][ T7535] bridge0: port 4(team0) entered disabled state [ 225.415317][ T7535] bridge0: port 4(team0) entered blocking state [ 225.423115][ T7535] bridge0: port 4(team0) entered forwarding state [ 226.160267][ T7557] netlink: 'syz.4.314': attribute type 5 has an invalid length. [ 226.460764][ T7567] netlink: 208064 bytes leftover after parsing attributes in process `syz.5.315'. [ 226.481596][ T7567] openvswitch: netlink: ufid size 3064 bytes exceeds the range (1, 16) [ 226.498980][ T7567] openvswitch: netlink: Message has 4 unknown bytes. [ 226.822632][ T7575] sctp: [Deprecated]: syz.7.317 (pid 7575) Use of int in maxseg socket option. [ 226.822632][ T7575] Use struct sctp_assoc_value instead [ 226.847485][ T7575] netlink: 'syz.7.317': attribute type 4 has an invalid length. [ 226.869558][ T7575] netlink: 'syz.7.317': attribute type 16 has an invalid length. [ 226.877648][ T7575] netlink: 132 bytes leftover after parsing attributes in process `syz.7.317'. [ 226.919151][ T7575] syz.7.317 uses obsolete (PF_INET,SOCK_PACKET) [ 227.187299][ T7589] netlink: 'syz.4.319': attribute type 21 has an invalid length. [ 227.231121][ T7589] netlink: 156 bytes leftover after parsing attributes in process `syz.4.319'. [ 230.151565][ T7661] netlink: 'syz.7.338': attribute type 11 has an invalid length. [ 230.220441][ T7661] netlink: 184116 bytes leftover after parsing attributes in process `syz.7.338'. [ 230.626038][ T7662] pimreg: tun_chr_ioctl cmd 1074025677 [ 230.659985][ T7662] pimreg: linktype set to 780 [ 230.799054][ T7662] netlink: 'syz.5.336': attribute type 10 has an invalid length. [ 230.806967][ T7662] netlink: 40 bytes leftover after parsing attributes in process `syz.5.336'. [ 230.911120][ T7662] team0: entered promiscuous mode [ 230.928221][ T7662] team_slave_0: entered promiscuous mode [ 230.985000][ T7662] team_slave_1: entered promiscuous mode [ 231.005806][ T7662] team0: entered allmulticast mode [ 231.040187][ T7662] team_slave_0: entered allmulticast mode [ 231.046053][ T7662] team_slave_1: entered allmulticast mode [ 231.099592][ T7662] bridge0: port 3(team0) entered blocking state [ 231.106200][ T7662] bridge0: port 3(team0) entered disabled state [ 231.183165][ T7662] bridge0: port 3(team0) entered blocking state [ 231.189882][ T7662] bridge0: port 3(team0) entered forwarding state [ 231.369523][ T7677] netlink: 132 bytes leftover after parsing attributes in process `syz.6.341'. [ 231.538570][ T7675] netlink: 'syz.7.340': attribute type 39 has an invalid length. [ 232.202602][ T7696] netlink: 44 bytes leftover after parsing attributes in process `syz.4.345'. [ 232.448367][ T7696] syz.4.345 (7696) used greatest stack depth: 20264 bytes left [ 232.472046][ T7700] netlink: 'syz.6.346': attribute type 10 has an invalid length. [ 232.561629][ T7700] bond0: (slave netdevsim0): Enslaving as an active interface with an up link [ 232.825351][ T7714] netlink: 763 bytes leftover after parsing attributes in process `syz.6.350'. [ 232.936874][ T7716] netlink: 'syz.4.352': attribute type 3 has an invalid length. [ 232.961209][ T7716] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.352'. [ 233.368888][ T7738] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 233.507155][ T7744] netlink: 'syz.7.358': attribute type 9 has an invalid length. [ 233.528963][ T7744] netlink: 399 bytes leftover after parsing attributes in process `syz.7.358'. [ 233.589810][ T7752] netlink: 'syz.6.359': attribute type 7 has an invalid length. [ 234.624358][ T7773] bridge0: port 4(team0) entered disabled state [ 234.631954][ T7773] bridge0: port 3(bond0) entered disabled state [ 234.639179][ T7773] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.651157][ T7773] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.680209][ T7773] bridge0: entered allmulticast mode [ 235.891082][ T7803] netlink: 14593 bytes leftover after parsing attributes in process `syz.7.370'. [ 237.728440][ T7844] FAULT_INJECTION: forcing a failure. [ 237.728440][ T7844] name failslab, interval 1, probability 0, space 0, times 0 [ 237.760021][ T7844] CPU: 1 PID: 7844 Comm: syz.4.381 Not tainted syzkaller #0 [ 237.767447][ T7844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 237.777655][ T7844] Call Trace: [ 237.781086][ T7844] [ 237.784067][ T7844] dump_stack_lvl+0x18c/0x250 [ 237.788812][ T7844] ? __sctp_connect+0x5b7/0xd80 [ 237.793718][ T7844] ? sctp_setsockopt+0x6d8/0x11e0 [ 237.799001][ T7844] ? show_regs_print_info+0x20/0x20 [ 237.804262][ T7844] ? load_image+0x400/0x400 [ 237.808828][ T7844] should_fail_ex+0x39d/0x4d0 [ 237.813679][ T7844] should_failslab+0x9/0x20 [ 237.818262][ T7844] slab_pre_alloc_hook+0x59/0x310 [ 237.823450][ T7844] ? sctp_add_bind_addr+0x8c/0x360 [ 237.828647][ T7844] __kmem_cache_alloc_node+0x53/0x250 [ 237.834142][ T7844] ? sctp_add_bind_addr+0x8c/0x360 [ 237.839330][ T7844] kmalloc_trace+0x2a/0xe0 [ 237.843908][ T7844] sctp_add_bind_addr+0x8c/0x360 [ 237.848914][ T7844] sctp_copy_local_addr_list+0x315/0x4f0 [ 237.854609][ T7844] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 237.860385][ T7844] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 237.866526][ T7844] ? sctp_v4_is_any+0x35/0x60 [ 237.871256][ T7844] ? sctp_copy_one_addr+0x8c/0x350 [ 237.876433][ T7844] sctp_bind_addr_copy+0x189/0x3c0 [ 237.881605][ T7844] sctp_connect_new_asoc+0x2f9/0x6a0 [ 237.887033][ T7844] ? __sctp_connect+0xd80/0xd80 [ 237.891943][ T7844] ? mark_lock+0x94/0x320 [ 237.896318][ T7844] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 237.902173][ T7844] __sctp_connect+0x5b7/0xd80 [ 237.906908][ T7844] ? sctp_send_asconf+0x170/0x170 [ 237.912143][ T7844] ? __local_bh_enable_ip+0x13a/0x1c0 [ 237.917667][ T7844] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 237.923311][ T7844] ? security_sctp_bind_connect+0x89/0xb0 [ 237.929104][ T7844] sctp_setsockopt_connectx+0x104/0x1a0 [ 237.934710][ T7844] sctp_setsockopt+0x6d8/0x11e0 [ 237.939616][ T7844] ? sock_common_recvmsg+0x190/0x190 [ 237.944967][ T7844] do_sock_setsockopt+0x175/0x1a0 [ 237.950054][ T7844] ? __fdget+0x180/0x210 [ 237.954348][ T7844] __x64_sys_setsockopt+0x182/0x200 [ 237.959613][ T7844] do_syscall_64+0x55/0xa0 [ 237.964098][ T7844] ? clear_bhb_loop+0x40/0x90 [ 237.968820][ T7844] ? clear_bhb_loop+0x40/0x90 [ 237.973547][ T7844] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 237.979516][ T7844] RIP: 0033:0x7f607d79aeb9 [ 237.984004][ T7844] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 238.003752][ T7844] RSP: 002b:00007f607e627028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 238.012219][ T7844] RAX: ffffffffffffffda RBX: 00007f607da15fa0 RCX: 00007f607d79aeb9 [ 238.020244][ T7844] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 238.028278][ T7844] RBP: 00007f607e627090 R08: 000000000000002c R09: 0000000000000000 [ 238.036311][ T7844] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 238.044333][ T7844] R13: 00007f607da16038 R14: 00007f607da15fa0 R15: 00007ffc5c1ddfa8 [ 238.052366][ T7844] [ 238.167094][ T7848] netlink: 'syz.6.382': attribute type 22 has an invalid length. [ 239.832598][ T7892] FAULT_INJECTION: forcing a failure. [ 239.832598][ T7892] name failslab, interval 1, probability 0, space 0, times 0 [ 239.876567][ T7892] CPU: 1 PID: 7892 Comm: syz.5.393 Not tainted syzkaller #0 [ 239.884052][ T7892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 239.894157][ T7892] Call Trace: [ 239.897460][ T7892] [ 239.900422][ T7892] dump_stack_lvl+0x18c/0x250 [ 239.905322][ T7892] ? __sctp_connect+0x5b7/0xd80 [ 239.910201][ T7892] ? sctp_setsockopt+0x6d8/0x11e0 [ 239.915276][ T7892] ? show_regs_print_info+0x20/0x20 [ 239.920513][ T7892] ? load_image+0x400/0x400 [ 239.925080][ T7892] should_fail_ex+0x39d/0x4d0 [ 239.929809][ T7892] should_failslab+0x9/0x20 [ 239.934371][ T7892] slab_pre_alloc_hook+0x59/0x310 [ 239.939455][ T7892] ? sctp_add_bind_addr+0x8c/0x360 [ 239.944639][ T7892] __kmem_cache_alloc_node+0x53/0x250 [ 239.950164][ T7892] ? sctp_add_bind_addr+0x8c/0x360 [ 239.955334][ T7892] kmalloc_trace+0x2a/0xe0 [ 239.959798][ T7892] sctp_add_bind_addr+0x8c/0x360 [ 239.964811][ T7892] sctp_copy_local_addr_list+0x315/0x4f0 [ 239.970569][ T7892] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 239.976391][ T7892] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 239.982605][ T7892] ? sctp_v4_is_any+0x35/0x60 [ 239.987356][ T7892] ? sctp_copy_one_addr+0x8c/0x350 [ 239.992565][ T7892] sctp_bind_addr_copy+0x189/0x3c0 [ 239.997734][ T7892] sctp_connect_new_asoc+0x2f9/0x6a0 [ 240.003062][ T7892] ? __sctp_connect+0xd80/0xd80 [ 240.007949][ T7892] ? mark_lock+0x94/0x320 [ 240.012312][ T7892] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 240.018157][ T7892] __sctp_connect+0x5b7/0xd80 [ 240.022887][ T7892] ? sctp_send_asconf+0x170/0x170 [ 240.028038][ T7892] ? __local_bh_enable_ip+0x13a/0x1c0 [ 240.033447][ T7892] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 240.039034][ T7892] ? security_sctp_bind_connect+0x89/0xb0 [ 240.044792][ T7892] sctp_setsockopt_connectx+0x104/0x1a0 [ 240.050376][ T7892] sctp_setsockopt+0x6d8/0x11e0 [ 240.055309][ T7892] ? sock_common_recvmsg+0x190/0x190 [ 240.060646][ T7892] do_sock_setsockopt+0x175/0x1a0 [ 240.065716][ T7892] ? __fdget+0x180/0x210 [ 240.070005][ T7892] __x64_sys_setsockopt+0x182/0x200 [ 240.075353][ T7892] do_syscall_64+0x55/0xa0 [ 240.079919][ T7892] ? clear_bhb_loop+0x40/0x90 [ 240.084639][ T7892] ? clear_bhb_loop+0x40/0x90 [ 240.089365][ T7892] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 240.095302][ T7892] RIP: 0033:0x7f214b19aeb9 [ 240.099754][ T7892] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 240.119404][ T7892] RSP: 002b:00007f214c051028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 240.127856][ T7892] RAX: ffffffffffffffda RBX: 00007f214b415fa0 RCX: 00007f214b19aeb9 [ 240.135870][ T7892] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 240.143883][ T7892] RBP: 00007f214c051090 R08: 000000000000002c R09: 0000000000000000 [ 240.151886][ T7892] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 240.160013][ T7892] R13: 00007f214b416038 R14: 00007f214b415fa0 R15: 00007fff47bb2038 [ 240.168038][ T7892] [ 240.206002][ T7896] netlink: 209592 bytes leftover after parsing attributes in process `syz.7.394'. [ 240.896618][ T7909] delete_channel: no stack [ 241.596778][ T7933] FAULT_INJECTION: forcing a failure. [ 241.596778][ T7933] name failslab, interval 1, probability 0, space 0, times 0 [ 241.628403][ T7933] CPU: 1 PID: 7933 Comm: syz.4.403 Not tainted syzkaller #0 [ 241.635813][ T7933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 241.645922][ T7933] Call Trace: [ 241.649248][ T7933] [ 241.652220][ T7933] dump_stack_lvl+0x18c/0x250 [ 241.656951][ T7933] ? __sctp_connect+0x5b7/0xd80 [ 241.661832][ T7933] ? sctp_setsockopt+0x6d8/0x11e0 [ 241.666890][ T7933] ? show_regs_print_info+0x20/0x20 [ 241.672126][ T7933] ? load_image+0x400/0x400 [ 241.676681][ T7933] should_fail_ex+0x39d/0x4d0 [ 241.681398][ T7933] should_failslab+0x9/0x20 [ 241.685950][ T7933] slab_pre_alloc_hook+0x59/0x310 [ 241.691021][ T7933] ? sctp_add_bind_addr+0x8c/0x360 [ 241.696333][ T7933] __kmem_cache_alloc_node+0x53/0x250 [ 241.701791][ T7933] ? sctp_add_bind_addr+0x8c/0x360 [ 241.706963][ T7933] kmalloc_trace+0x2a/0xe0 [ 241.711439][ T7933] sctp_add_bind_addr+0x8c/0x360 [ 241.716435][ T7933] sctp_copy_local_addr_list+0x315/0x4f0 [ 241.722118][ T7933] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 241.727889][ T7933] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 241.734039][ T7933] ? sctp_v4_is_any+0x35/0x60 [ 241.738758][ T7933] ? sctp_copy_one_addr+0x8c/0x350 [ 241.743928][ T7933] sctp_bind_addr_copy+0x189/0x3c0 [ 241.749103][ T7933] sctp_connect_new_asoc+0x2f9/0x6a0 [ 241.754432][ T7933] ? __sctp_connect+0xd80/0xd80 [ 241.759331][ T7933] ? mark_lock+0x94/0x320 [ 241.763707][ T7933] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 241.769550][ T7933] __sctp_connect+0x5b7/0xd80 [ 241.774270][ T7933] ? sctp_send_asconf+0x170/0x170 [ 241.779330][ T7933] ? __local_bh_enable_ip+0x13a/0x1c0 [ 241.784740][ T7933] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 241.790384][ T7933] ? security_sctp_bind_connect+0x89/0xb0 [ 241.796151][ T7933] sctp_setsockopt_connectx+0x104/0x1a0 [ 241.801742][ T7933] sctp_setsockopt+0x6d8/0x11e0 [ 241.806625][ T7933] ? sock_common_recvmsg+0x190/0x190 [ 241.811954][ T7933] do_sock_setsockopt+0x175/0x1a0 [ 241.817051][ T7933] ? __fdget+0x180/0x210 [ 241.821362][ T7933] __x64_sys_setsockopt+0x182/0x200 [ 241.826618][ T7933] do_syscall_64+0x55/0xa0 [ 241.831076][ T7933] ? clear_bhb_loop+0x40/0x90 [ 241.835793][ T7933] ? clear_bhb_loop+0x40/0x90 [ 241.840514][ T7933] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 241.846448][ T7933] RIP: 0033:0x7f607d79aeb9 [ 241.850905][ T7933] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 241.870553][ T7933] RSP: 002b:00007f607e627028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 241.879005][ T7933] RAX: ffffffffffffffda RBX: 00007f607da15fa0 RCX: 00007f607d79aeb9 [ 241.887011][ T7933] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 241.895014][ T7933] RBP: 00007f607e627090 R08: 000000000000002c R09: 0000000000000000 [ 241.903023][ T7933] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 241.911028][ T7933] R13: 00007f607da16038 R14: 00007f607da15fa0 R15: 00007ffc5c1ddfa8 [ 241.919044][ T7933] [ 242.354476][ T7947] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 242.362297][ T7947] IPv6: NLM_F_CREATE should be set when creating new route [ 242.369724][ T7947] IPv6: NLM_F_CREATE should be set when creating new route [ 242.377021][ T7947] IPv6: NLM_F_CREATE should be set when creating new route [ 242.461271][ T7952] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 242.725818][ T7959] netlink: 763 bytes leftover after parsing attributes in process `syz.5.409'. [ 242.736614][ T7963] netlink: 9286 bytes leftover after parsing attributes in process `syz.7.410'. [ 242.925752][ T7967] netlink: 4 bytes leftover after parsing attributes in process `syz.6.411'. [ 242.944525][ T5780] Bluetooth: hci5: command 0x0406 tx timeout [ 242.946847][ T5084] Bluetooth: hci6: command 0x0406 tx timeout [ 242.957263][ T5084] Bluetooth: hci7: command 0x0406 tx timeout [ 242.960871][ T5782] Bluetooth: hci4: command 0x0406 tx timeout [ 243.597387][ T7986] FAULT_INJECTION: forcing a failure. [ 243.597387][ T7986] name failslab, interval 1, probability 0, space 0, times 0 [ 243.642870][ T7986] CPU: 1 PID: 7986 Comm: syz.4.416 Not tainted syzkaller #0 [ 243.650262][ T7986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 243.660365][ T7986] Call Trace: [ 243.663682][ T7986] [ 243.666659][ T7986] dump_stack_lvl+0x18c/0x250 [ 243.671487][ T7986] ? __sctp_connect+0x5b7/0xd80 [ 243.676451][ T7986] ? sctp_setsockopt+0x6d8/0x11e0 [ 243.681533][ T7986] ? show_regs_print_info+0x20/0x20 [ 243.686794][ T7986] ? load_image+0x400/0x400 [ 243.691472][ T7986] should_fail_ex+0x39d/0x4d0 [ 243.696241][ T7986] should_failslab+0x9/0x20 [ 243.700817][ T7986] slab_pre_alloc_hook+0x59/0x310 [ 243.705902][ T7986] ? sctp_add_bind_addr+0x8c/0x360 [ 243.711087][ T7986] __kmem_cache_alloc_node+0x53/0x250 [ 243.716525][ T7986] ? sctp_add_bind_addr+0x8c/0x360 [ 243.721790][ T7986] kmalloc_trace+0x2a/0xe0 [ 243.726313][ T7986] sctp_add_bind_addr+0x8c/0x360 [ 243.731330][ T7986] sctp_copy_local_addr_list+0x315/0x4f0 [ 243.737117][ T7986] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 243.742900][ T7986] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 243.749036][ T7986] ? sctp_v4_is_any+0x35/0x60 [ 243.753942][ T7986] ? sctp_copy_one_addr+0x8c/0x350 [ 243.759261][ T7986] sctp_bind_addr_copy+0x189/0x3c0 [ 243.764442][ T7986] sctp_connect_new_asoc+0x2f9/0x6a0 [ 243.769783][ T7986] ? __sctp_connect+0xd80/0xd80 [ 243.774696][ T7986] ? mark_lock+0x94/0x320 [ 243.779076][ T7986] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 243.784937][ T7986] __sctp_connect+0x5b7/0xd80 [ 243.789678][ T7986] ? sctp_send_asconf+0x170/0x170 [ 243.794751][ T7986] ? __local_bh_enable_ip+0x13a/0x1c0 [ 243.800180][ T7986] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 243.805800][ T7986] ? security_sctp_bind_connect+0x89/0xb0 [ 243.811601][ T7986] sctp_setsockopt_connectx+0x104/0x1a0 [ 243.817212][ T7986] sctp_setsockopt+0x6d8/0x11e0 [ 243.822124][ T7986] ? sock_common_recvmsg+0x190/0x190 [ 243.827507][ T7986] do_sock_setsockopt+0x175/0x1a0 [ 243.832596][ T7986] ? __fdget+0x180/0x210 [ 243.836898][ T7986] __x64_sys_setsockopt+0x182/0x200 [ 243.842157][ T7986] do_syscall_64+0x55/0xa0 [ 243.846628][ T7986] ? clear_bhb_loop+0x40/0x90 [ 243.851362][ T7986] ? clear_bhb_loop+0x40/0x90 [ 243.856141][ T7986] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 243.862081][ T7986] RIP: 0033:0x7f607d79aeb9 [ 243.866575][ T7986] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 243.886225][ T7986] RSP: 002b:00007f607e627028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 243.894684][ T7986] RAX: ffffffffffffffda RBX: 00007f607da15fa0 RCX: 00007f607d79aeb9 [ 243.902730][ T7986] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 243.910841][ T7986] RBP: 00007f607e627090 R08: 000000000000002c R09: 0000000000000000 [ 243.918875][ T7986] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 243.926911][ T7986] R13: 00007f607da16038 R14: 00007f607da15fa0 R15: 00007ffc5c1ddfa8 [ 243.934986][ T7986] [ 244.256245][ T8000] netlink: 'syz.4.418': attribute type 1 has an invalid length. [ 244.470885][ T8007] netlink: 4595 bytes leftover after parsing attributes in process `syz.5.422'. [ 244.571327][ T8007] netlink: 'syz.5.422': attribute type 9 has an invalid length. [ 244.597236][ T8007] netlink: 126588 bytes leftover after parsing attributes in process `syz.5.422'. [ 244.747989][ T8018] netlink: 'syz.7.425': attribute type 10 has an invalid length. [ 245.075094][ T8024] FAULT_INJECTION: forcing a failure. [ 245.075094][ T8024] name failslab, interval 1, probability 0, space 0, times 0 [ 245.129617][ T8024] CPU: 0 PID: 8024 Comm: syz.5.426 Not tainted syzkaller #0 [ 245.137096][ T8024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 245.147383][ T8024] Call Trace: [ 245.150722][ T8024] [ 245.153710][ T8024] dump_stack_lvl+0x18c/0x250 [ 245.158471][ T8024] ? __sctp_connect+0x5b7/0xd80 [ 245.163383][ T8024] ? sctp_setsockopt+0x6d8/0x11e0 [ 245.168466][ T8024] ? show_regs_print_info+0x20/0x20 [ 245.173819][ T8024] ? load_image+0x400/0x400 [ 245.178403][ T8024] should_fail_ex+0x39d/0x4d0 [ 245.183162][ T8024] should_failslab+0x9/0x20 [ 245.187736][ T8024] slab_pre_alloc_hook+0x59/0x310 [ 245.192842][ T8024] ? sctp_add_bind_addr+0x8c/0x360 [ 245.198082][ T8024] __kmem_cache_alloc_node+0x53/0x250 [ 245.203534][ T8024] ? sctp_add_bind_addr+0x8c/0x360 [ 245.208721][ T8024] kmalloc_trace+0x2a/0xe0 [ 245.213209][ T8024] sctp_add_bind_addr+0x8c/0x360 [ 245.218229][ T8024] sctp_copy_local_addr_list+0x315/0x4f0 [ 245.224031][ T8024] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 245.229828][ T8024] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 245.235961][ T8024] ? sctp_v4_is_any+0x35/0x60 [ 245.240671][ T8024] ? sctp_copy_one_addr+0x8c/0x350 [ 245.245844][ T8024] sctp_bind_addr_copy+0x189/0x3c0 [ 245.251016][ T8024] sctp_connect_new_asoc+0x2f9/0x6a0 [ 245.256345][ T8024] ? __sctp_connect+0xd80/0xd80 [ 245.261237][ T8024] ? mark_lock+0x94/0x320 [ 245.265643][ T8024] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 245.271605][ T8024] __sctp_connect+0x5b7/0xd80 [ 245.276365][ T8024] ? sctp_send_asconf+0x170/0x170 [ 245.281435][ T8024] ? __local_bh_enable_ip+0x13a/0x1c0 [ 245.286927][ T8024] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 245.292523][ T8024] ? security_sctp_bind_connect+0x89/0xb0 [ 245.298400][ T8024] sctp_setsockopt_connectx+0x104/0x1a0 [ 245.304092][ T8024] sctp_setsockopt+0x6d8/0x11e0 [ 245.308979][ T8024] ? sock_common_recvmsg+0x190/0x190 [ 245.314326][ T8024] do_sock_setsockopt+0x175/0x1a0 [ 245.319394][ T8024] ? __fdget+0x180/0x210 [ 245.323678][ T8024] __x64_sys_setsockopt+0x182/0x200 [ 245.328998][ T8024] do_syscall_64+0x55/0xa0 [ 245.333458][ T8024] ? clear_bhb_loop+0x40/0x90 [ 245.338175][ T8024] ? clear_bhb_loop+0x40/0x90 [ 245.342896][ T8024] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 245.348826][ T8024] RIP: 0033:0x7f214b19aeb9 [ 245.353288][ T8024] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 245.373034][ T8024] RSP: 002b:00007f214c051028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 245.381503][ T8024] RAX: ffffffffffffffda RBX: 00007f214b415fa0 RCX: 00007f214b19aeb9 [ 245.389541][ T8024] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 245.397636][ T8024] RBP: 00007f214c051090 R08: 000000000000002c R09: 0000000000000000 [ 245.405638][ T8024] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 245.413644][ T8024] R13: 00007f214b416038 R14: 00007f214b415fa0 R15: 00007fff47bb2038 [ 245.421672][ T8024] [ 245.446013][ T8028] netlink: 'syz.6.427': attribute type 21 has an invalid length. [ 245.464651][ T8028] IPv6: NLM_F_CREATE should be specified when creating new route [ 245.707538][ T8038] netlink: 'syz.4.429': attribute type 21 has an invalid length. [ 245.722448][ T8038] IPv6: NLM_F_CREATE should be specified when creating new route [ 245.748894][ T8037] netlink: 'syz.4.429': attribute type 21 has an invalid length. [ 246.269891][ T8057] netlink: 140 bytes leftover after parsing attributes in process `syz.5.434'. [ 246.952632][ T8078] netlink: 'syz.6.440': attribute type 21 has an invalid length. [ 246.978332][ T8078] netlink: 'syz.6.440': attribute type 1 has an invalid length. [ 246.996891][ T8078] netlink: 16050 bytes leftover after parsing attributes in process `syz.6.440'. [ 247.135949][ T8091] netlink: 9286 bytes leftover after parsing attributes in process `syz.7.441'. [ 249.289768][ T8154] netlink: 4595 bytes leftover after parsing attributes in process `syz.5.454'. [ 249.326863][ T8154] netlink: 4595 bytes leftover after parsing attributes in process `syz.5.454'. [ 249.399831][ T8154] netlink: 4595 bytes leftover after parsing attributes in process `syz.5.454'. [ 249.433590][ T8155] netlink: 4595 bytes leftover after parsing attributes in process `syz.5.454'. [ 250.043147][ T8168] mac80211_hwsim hwsim11 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 251.415171][ T8209] netlink: 16186 bytes leftover after parsing attributes in process `syz.6.467'. [ 252.254513][ T8242] netlink: 'syz.7.475': attribute type 16 has an invalid length. [ 252.283150][ T8242] netlink: 48 bytes leftover after parsing attributes in process `syz.7.475'. [ 252.312714][ T8242] veth1_macvtap: entered allmulticast mode [ 252.381032][ T1080] wlan1: Trigger new scan to find an IBSS to join [ 253.246927][ T8280] FAULT_INJECTION: forcing a failure. [ 253.246927][ T8280] name failslab, interval 1, probability 0, space 0, times 0 [ 253.309620][ T8280] CPU: 0 PID: 8280 Comm: syz.5.483 Not tainted syzkaller #0 [ 253.317005][ T8280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 253.327118][ T8280] Call Trace: [ 253.330447][ T8280] [ 253.333424][ T8280] dump_stack_lvl+0x18c/0x250 [ 253.338167][ T8280] ? __sctp_connect+0x5b7/0xd80 [ 253.343074][ T8280] ? sctp_setsockopt+0x6d8/0x11e0 [ 253.348159][ T8280] ? show_regs_print_info+0x20/0x20 [ 253.353417][ T8280] ? load_image+0x400/0x400 [ 253.357979][ T8280] should_fail_ex+0x39d/0x4d0 [ 253.362708][ T8280] should_failslab+0x9/0x20 [ 253.367251][ T8280] slab_pre_alloc_hook+0x59/0x310 [ 253.372320][ T8280] ? sctp_add_bind_addr+0x8c/0x360 [ 253.377521][ T8280] __kmem_cache_alloc_node+0x53/0x250 [ 253.382942][ T8280] ? sctp_add_bind_addr+0x8c/0x360 [ 253.388101][ T8280] kmalloc_trace+0x2a/0xe0 [ 253.392782][ T8280] sctp_add_bind_addr+0x8c/0x360 [ 253.397768][ T8280] sctp_copy_local_addr_list+0x315/0x4f0 [ 253.403455][ T8280] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 253.409222][ T8280] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 253.415339][ T8280] ? sctp_v4_is_any+0x35/0x60 [ 253.420053][ T8280] ? sctp_copy_one_addr+0x8c/0x350 [ 253.425219][ T8280] sctp_bind_addr_copy+0x189/0x3c0 [ 253.430422][ T8280] sctp_connect_new_asoc+0x2f9/0x6a0 [ 253.435740][ T8280] ? __sctp_connect+0xd80/0xd80 [ 253.440633][ T8280] ? mark_lock+0x94/0x320 [ 253.444999][ T8280] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 253.450846][ T8280] __sctp_connect+0x5b7/0xd80 [ 253.455660][ T8280] ? sctp_send_asconf+0x170/0x170 [ 253.460720][ T8280] ? __local_bh_enable_ip+0x13a/0x1c0 [ 253.466123][ T8280] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 253.471721][ T8280] ? security_sctp_bind_connect+0x89/0xb0 [ 253.477504][ T8280] sctp_setsockopt_connectx+0x104/0x1a0 [ 253.483098][ T8280] sctp_setsockopt+0x6d8/0x11e0 [ 253.487993][ T8280] ? sock_common_recvmsg+0x190/0x190 [ 253.493410][ T8280] do_sock_setsockopt+0x175/0x1a0 [ 253.498475][ T8280] ? __fdget+0x180/0x210 [ 253.502763][ T8280] __x64_sys_setsockopt+0x182/0x200 [ 253.508011][ T8280] do_syscall_64+0x55/0xa0 [ 253.512470][ T8280] ? clear_bhb_loop+0x40/0x90 [ 253.517184][ T8280] ? clear_bhb_loop+0x40/0x90 [ 253.522064][ T8280] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 253.528083][ T8280] RIP: 0033:0x7f214b19aeb9 [ 253.532538][ T8280] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 253.552184][ T8280] RSP: 002b:00007f214c051028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 253.560633][ T8280] RAX: ffffffffffffffda RBX: 00007f214b415fa0 RCX: 00007f214b19aeb9 [ 253.568637][ T8280] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 253.576646][ T8280] RBP: 00007f214c051090 R08: 000000000000002c R09: 0000000000000000 [ 253.584654][ T8280] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 253.592657][ T8280] R13: 00007f214b416038 R14: 00007f214b415fa0 R15: 00007fff47bb2038 [ 253.600678][ T8280] [ 255.373257][ T8322] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 255.388613][ T8322] syzkaller1: linktype set to 823 [ 255.936387][ T8330] netlink: 36 bytes leftover after parsing attributes in process `syz.7.496'. [ 255.958633][ T8330] netlink: 4 bytes leftover after parsing attributes in process `syz.7.496'. [ 256.229985][ T1284] ieee802154 phy0 wpan0: encryption failed: -22 [ 256.236385][ T1284] ieee802154 phy1 wpan1: encryption failed: -22 [ 256.384892][ T49] wlan1: Trigger new scan to find an IBSS to join [ 256.425451][ T8347] netlink: 'syz.7.498': attribute type 9 has an invalid length. [ 256.467536][ T8347] netlink: 209836 bytes leftover after parsing attributes in process `syz.7.498'. [ 257.044469][ T8375] netlink: 'syz.5.505': attribute type 1 has an invalid length. [ 257.073882][ T8375] netlink: 'syz.5.505': attribute type 2 has an invalid length. [ 257.091972][ T8375] netlink: 'syz.5.505': attribute type 2 has an invalid length. [ 257.141740][ T8373] bridge0: port 4(team0) entered disabled state [ 257.160759][ T8375] netlink: 'syz.5.505': attribute type 3 has an invalid length. [ 257.204849][ T8373] bond0: left allmulticast mode [ 257.210515][ T8375] netlink: 'syz.5.505': attribute type 4 has an invalid length. [ 257.244127][ T8373] bond_slave_0: left allmulticast mode [ 257.248841][ T8375] netlink: 'syz.5.505': attribute type 5 has an invalid length. [ 257.267867][ T8373] bond_slave_1: left allmulticast mode [ 257.286817][ T8375] netlink: 'syz.5.505': attribute type 6 has an invalid length. [ 257.294895][ T8373] bridge0: port 3(bond0) entered disabled state [ 257.343459][ T8375] netlink: 'syz.5.505': attribute type 7 has an invalid length. [ 257.344437][ T8373] bridge_slave_1: left allmulticast mode [ 257.388971][ T8373] bridge_slave_1: left promiscuous mode [ 257.396504][ T8373] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.406332][ T8375] netlink: 'syz.5.505': attribute type 9 has an invalid length. [ 257.408720][ T49] wlan1: Creating new IBSS network, BSSID fe:90:26:68:d9:0d [ 257.491228][ T8373] bridge_slave_0: left promiscuous mode [ 257.499074][ T8375] netlink: 'syz.5.505': attribute type 10 has an invalid length. [ 257.509999][ T8375] netlink: 'syz.5.505': attribute type 11 has an invalid length. [ 257.518472][ T8375] netlink: 'syz.5.505': attribute type 7 has an invalid length. [ 257.526664][ T8375] netlink: 126304 bytes leftover after parsing attributes in process `syz.5.505'. [ 257.538790][ T8373] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.546029][ T8376] netlink: 'syz.5.505': attribute type 1 has an invalid length. [ 257.546058][ T8376] netlink: 'syz.5.505': attribute type 2 has an invalid length. [ 257.546080][ T8376] netlink: 'syz.5.505': attribute type 2 has an invalid length. [ 257.546101][ T8376] netlink: 'syz.5.505': attribute type 3 has an invalid length. [ 257.546154][ T8376] netlink: 126304 bytes leftover after parsing attributes in process `syz.5.505'. [ 258.239723][ T8389] netlink: 132 bytes leftover after parsing attributes in process `syz.5.508'. [ 258.468950][ T8391] veth0_macvtap: left promiscuous mode [ 258.851272][ T8398] netlink: 40 bytes leftover after parsing attributes in process `syz.4.511'. [ 259.371856][ T8414] netlink: 209852 bytes leftover after parsing attributes in process `syz.6.515'. [ 259.935841][ T8426] netlink: 198800 bytes leftover after parsing attributes in process `syz.4.516'. [ 260.384602][ T8436] netlink: 36 bytes leftover after parsing attributes in process `syz.4.519'. [ 261.839397][ T8484] __nla_validate_parse: 1 callbacks suppressed [ 261.839415][ T8484] netlink: 9275 bytes leftover after parsing attributes in process `syz.5.532'. [ 263.586731][ T8511] FAULT_INJECTION: forcing a failure. [ 263.586731][ T8511] name failslab, interval 1, probability 0, space 0, times 0 [ 263.643116][ T8511] CPU: 1 PID: 8511 Comm: syz.7.535 Not tainted syzkaller #0 [ 263.650498][ T8511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 263.660698][ T8511] Call Trace: [ 263.664029][ T8511] [ 263.667011][ T8511] dump_stack_lvl+0x18c/0x250 [ 263.671780][ T8511] ? __sctp_connect+0x5b7/0xd80 [ 263.676688][ T8511] ? sctp_setsockopt+0x6d8/0x11e0 [ 263.681776][ T8511] ? show_regs_print_info+0x20/0x20 [ 263.687083][ T8511] ? load_image+0x400/0x400 [ 263.691673][ T8511] should_fail_ex+0x39d/0x4d0 [ 263.696443][ T8511] should_failslab+0x9/0x20 [ 263.701015][ T8511] slab_pre_alloc_hook+0x59/0x310 [ 263.706116][ T8511] ? sctp_add_bind_addr+0x8c/0x360 [ 263.711305][ T8511] __kmem_cache_alloc_node+0x53/0x250 [ 263.716760][ T8511] ? sctp_add_bind_addr+0x8c/0x360 [ 263.721991][ T8511] kmalloc_trace+0x2a/0xe0 [ 263.726486][ T8511] sctp_add_bind_addr+0x8c/0x360 [ 263.731502][ T8511] sctp_copy_local_addr_list+0x315/0x4f0 [ 263.737224][ T8511] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 263.743014][ T8511] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 263.749162][ T8511] ? sctp_v4_is_any+0x35/0x60 [ 263.753990][ T8511] ? sctp_copy_one_addr+0x8c/0x350 [ 263.759168][ T8511] sctp_bind_addr_copy+0x189/0x3c0 [ 263.764354][ T8511] sctp_connect_new_asoc+0x2f9/0x6a0 [ 263.769714][ T8511] ? __sctp_connect+0xd80/0xd80 [ 263.774635][ T8511] ? mark_lock+0x94/0x320 [ 263.779033][ T8511] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 263.784910][ T8511] __sctp_connect+0x5b7/0xd80 [ 263.789663][ T8511] ? sctp_send_asconf+0x170/0x170 [ 263.794756][ T8511] ? __local_bh_enable_ip+0x13a/0x1c0 [ 263.800210][ T8511] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 263.805814][ T8511] ? security_sctp_bind_connect+0x89/0xb0 [ 263.811600][ T8511] sctp_setsockopt_connectx+0x104/0x1a0 [ 263.817216][ T8511] sctp_setsockopt+0x6d8/0x11e0 [ 263.822182][ T8511] ? sock_common_recvmsg+0x190/0x190 [ 263.827605][ T8511] do_sock_setsockopt+0x175/0x1a0 [ 263.832783][ T8511] ? __fdget+0x180/0x210 [ 263.837089][ T8511] __x64_sys_setsockopt+0x182/0x200 [ 263.842365][ T8511] do_syscall_64+0x55/0xa0 [ 263.847117][ T8511] ? clear_bhb_loop+0x40/0x90 [ 263.851851][ T8511] ? clear_bhb_loop+0x40/0x90 [ 263.856591][ T8511] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 263.862541][ T8511] RIP: 0033:0x7f84c5f9aeb9 [ 263.867001][ T8511] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 263.886665][ T8511] RSP: 002b:00007f84c6ec3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 263.895146][ T8511] RAX: ffffffffffffffda RBX: 00007f84c6215fa0 RCX: 00007f84c5f9aeb9 [ 263.903173][ T8511] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 263.911195][ T8511] RBP: 00007f84c6ec3090 R08: 000000000000002c R09: 0000000000000000 [ 263.919223][ T8511] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 263.927256][ T8511] R13: 00007f84c6216038 R14: 00007f84c6215fa0 R15: 00007ffeff998608 [ 263.935307][ T8511] [ 263.994322][ T8517] netlink: 36 bytes leftover after parsing attributes in process `syz.6.533'. [ 264.011471][ T8517] netlink: 4 bytes leftover after parsing attributes in process `syz.6.533'. [ 264.314520][ T8529] validate_nla: 16 callbacks suppressed [ 264.314562][ T8529] netlink: 'syz.7.537': attribute type 1 has an invalid length. [ 264.387735][ T8529] netlink: 193500 bytes leftover after parsing attributes in process `syz.7.537'. [ 265.778029][ T8577] FAULT_INJECTION: forcing a failure. [ 265.778029][ T8577] name failslab, interval 1, probability 0, space 0, times 0 [ 265.836389][ T8577] CPU: 0 PID: 8577 Comm: syz.4.547 Not tainted syzkaller #0 [ 265.843779][ T8577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 265.854418][ T8577] Call Trace: [ 265.857732][ T8577] [ 265.860713][ T8577] dump_stack_lvl+0x18c/0x250 [ 265.865452][ T8577] ? __sctp_connect+0x5b7/0xd80 [ 265.870406][ T8577] ? sctp_setsockopt+0x6d8/0x11e0 [ 265.875484][ T8577] ? show_regs_print_info+0x20/0x20 [ 265.880744][ T8577] ? load_image+0x400/0x400 [ 265.885845][ T8577] should_fail_ex+0x39d/0x4d0 [ 265.890587][ T8577] should_failslab+0x9/0x20 [ 265.895151][ T8577] slab_pre_alloc_hook+0x59/0x310 [ 265.900367][ T8577] ? sctp_add_bind_addr+0x8c/0x360 [ 265.905553][ T8577] __kmem_cache_alloc_node+0x53/0x250 [ 265.910982][ T8577] ? sctp_add_bind_addr+0x8c/0x360 [ 265.916196][ T8577] kmalloc_trace+0x2a/0xe0 [ 265.920655][ T8577] sctp_add_bind_addr+0x8c/0x360 [ 265.925654][ T8577] sctp_copy_local_addr_list+0x315/0x4f0 [ 265.931353][ T8577] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 265.937123][ T8577] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 265.943405][ T8577] ? sctp_v4_is_any+0x35/0x60 [ 265.948301][ T8577] ? sctp_copy_one_addr+0x8c/0x350 [ 265.953495][ T8577] sctp_bind_addr_copy+0x189/0x3c0 [ 265.958663][ T8577] sctp_connect_new_asoc+0x2f9/0x6a0 [ 265.963986][ T8577] ? __sctp_connect+0xd80/0xd80 [ 265.968869][ T8577] ? mark_lock+0x94/0x320 [ 265.973237][ T8577] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 265.979080][ T8577] __sctp_connect+0x5b7/0xd80 [ 265.983797][ T8577] ? sctp_send_asconf+0x170/0x170 [ 265.989031][ T8577] ? __local_bh_enable_ip+0x13a/0x1c0 [ 265.994432][ T8577] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 266.000014][ T8577] ? security_sctp_bind_connect+0x89/0xb0 [ 266.005804][ T8577] sctp_setsockopt_connectx+0x104/0x1a0 [ 266.011391][ T8577] sctp_setsockopt+0x6d8/0x11e0 [ 266.016324][ T8577] ? sock_common_recvmsg+0x190/0x190 [ 266.021685][ T8577] do_sock_setsockopt+0x175/0x1a0 [ 266.026752][ T8577] ? __fdget+0x180/0x210 [ 266.031148][ T8577] __x64_sys_setsockopt+0x182/0x200 [ 266.036398][ T8577] do_syscall_64+0x55/0xa0 [ 266.040857][ T8577] ? clear_bhb_loop+0x40/0x90 [ 266.045563][ T8577] ? clear_bhb_loop+0x40/0x90 [ 266.050278][ T8577] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 266.056216][ T8577] RIP: 0033:0x7f607d79aeb9 [ 266.060675][ T8577] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 266.080328][ T8577] RSP: 002b:00007f607e627028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 266.088865][ T8577] RAX: ffffffffffffffda RBX: 00007f607da15fa0 RCX: 00007f607d79aeb9 [ 266.096868][ T8577] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 266.104888][ T8577] RBP: 00007f607e627090 R08: 000000000000002c R09: 0000000000000000 [ 266.112979][ T8577] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 266.121083][ T8577] R13: 00007f607da16038 R14: 00007f607da15fa0 R15: 00007ffc5c1ddfa8 [ 266.129344][ T8577] [ 266.547707][ T8591] netlink: 63503 bytes leftover after parsing attributes in process `syz.4.550'. [ 267.486467][ T8619] netlink: 209844 bytes leftover after parsing attributes in process `syz.4.555'. [ 267.624761][ T8622] netlink: 14 bytes leftover after parsing attributes in process `syz.4.555'. [ 267.994279][ T8622] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 268.013819][ T8622] bond_slave_0: left promiscuous mode [ 268.153280][ T8622] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 268.184113][ T8635] FAULT_INJECTION: forcing a failure. [ 268.184113][ T8635] name failslab, interval 1, probability 0, space 0, times 0 [ 268.218288][ T8635] CPU: 1 PID: 8635 Comm: syz.6.559 Not tainted syzkaller #0 [ 268.225671][ T8635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 268.235780][ T8635] Call Trace: [ 268.239212][ T8635] [ 268.242194][ T8635] dump_stack_lvl+0x18c/0x250 [ 268.246931][ T8635] ? __sctp_connect+0x5b7/0xd80 [ 268.251831][ T8635] ? sctp_setsockopt+0x6d8/0x11e0 [ 268.257000][ T8635] ? show_regs_print_info+0x20/0x20 [ 268.262283][ T8635] ? load_image+0x400/0x400 [ 268.266855][ T8635] should_fail_ex+0x39d/0x4d0 [ 268.271694][ T8635] should_failslab+0x9/0x20 [ 268.276265][ T8635] slab_pre_alloc_hook+0x59/0x310 [ 268.281367][ T8635] ? sctp_add_bind_addr+0x8c/0x360 [ 268.286537][ T8635] __kmem_cache_alloc_node+0x53/0x250 [ 268.291958][ T8635] ? sctp_add_bind_addr+0x8c/0x360 [ 268.297107][ T8635] kmalloc_trace+0x2a/0xe0 [ 268.301563][ T8635] sctp_add_bind_addr+0x8c/0x360 [ 268.306540][ T8635] sctp_copy_local_addr_list+0x315/0x4f0 [ 268.312265][ T8635] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 268.318030][ T8635] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 268.324164][ T8635] ? sctp_v4_is_any+0x35/0x60 [ 268.328910][ T8635] ? sctp_copy_one_addr+0x8c/0x350 [ 268.334114][ T8635] sctp_bind_addr_copy+0x189/0x3c0 [ 268.339284][ T8635] sctp_connect_new_asoc+0x2f9/0x6a0 [ 268.344641][ T8635] ? __sctp_connect+0xd80/0xd80 [ 268.349530][ T8635] ? mark_lock+0x94/0x320 [ 268.353889][ T8635] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 268.359731][ T8635] __sctp_connect+0x5b7/0xd80 [ 268.364452][ T8635] ? sctp_send_asconf+0x170/0x170 [ 268.369510][ T8635] ? __local_bh_enable_ip+0x13a/0x1c0 [ 268.374913][ T8635] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 268.380499][ T8635] ? security_sctp_bind_connect+0x89/0xb0 [ 268.386285][ T8635] sctp_setsockopt_connectx+0x104/0x1a0 [ 268.391868][ T8635] sctp_setsockopt+0x6d8/0x11e0 [ 268.396751][ T8635] ? sock_common_recvmsg+0x190/0x190 [ 268.402081][ T8635] do_sock_setsockopt+0x175/0x1a0 [ 268.407142][ T8635] ? __fdget+0x180/0x210 [ 268.411420][ T8635] __x64_sys_setsockopt+0x182/0x200 [ 268.416663][ T8635] do_syscall_64+0x55/0xa0 [ 268.421119][ T8635] ? clear_bhb_loop+0x40/0x90 [ 268.425830][ T8635] ? clear_bhb_loop+0x40/0x90 [ 268.430641][ T8635] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 268.436576][ T8635] RIP: 0033:0x7fb96039aeb9 [ 268.441031][ T8635] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 268.460668][ T8635] RSP: 002b:00007fb9611b5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 268.469115][ T8635] RAX: ffffffffffffffda RBX: 00007fb960615fa0 RCX: 00007fb96039aeb9 [ 268.477116][ T8635] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 268.485159][ T8635] RBP: 00007fb9611b5090 R08: 000000000000002c R09: 0000000000000000 [ 268.493162][ T8635] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 268.501205][ T8635] R13: 00007fb960616038 R14: 00007fb960615fa0 R15: 00007ffca7c3e428 [ 268.509240][ T8635] [ 268.583367][ T8622] bond_slave_1: left promiscuous mode [ 268.623234][ T8622] bond0 (unregistering): Released all slaves [ 269.422722][ T8647] netlink: 'syz.7.561': attribute type 10 has an invalid length. [ 269.468554][ T8647] hsr0: entered promiscuous mode [ 269.474174][ T8647] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 269.610754][ T8656] netlink: 'syz.4.562': attribute type 21 has an invalid length. [ 271.058878][ T8684] FAULT_INJECTION: forcing a failure. [ 271.058878][ T8684] name failslab, interval 1, probability 0, space 0, times 0 [ 271.126857][ T8684] CPU: 0 PID: 8684 Comm: syz.4.568 Not tainted syzkaller #0 [ 271.134240][ T8684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 271.144442][ T8684] Call Trace: [ 271.147773][ T8684] [ 271.150763][ T8684] dump_stack_lvl+0x18c/0x250 [ 271.155504][ T8684] ? __sctp_connect+0x5b7/0xd80 [ 271.160403][ T8684] ? sctp_setsockopt+0x6d8/0x11e0 [ 271.165481][ T8684] ? show_regs_print_info+0x20/0x20 [ 271.170752][ T8684] ? load_image+0x400/0x400 [ 271.175334][ T8684] should_fail_ex+0x39d/0x4d0 [ 271.180110][ T8684] should_failslab+0x9/0x20 [ 271.184670][ T8684] slab_pre_alloc_hook+0x59/0x310 [ 271.189774][ T8684] ? sctp_add_bind_addr+0x8c/0x360 [ 271.194953][ T8684] __kmem_cache_alloc_node+0x53/0x250 [ 271.200397][ T8684] ? sctp_add_bind_addr+0x8c/0x360 [ 271.205576][ T8684] kmalloc_trace+0x2a/0xe0 [ 271.210071][ T8684] sctp_add_bind_addr+0x8c/0x360 [ 271.215072][ T8684] sctp_copy_local_addr_list+0x315/0x4f0 [ 271.220784][ T8684] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 271.226568][ T8684] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 271.232704][ T8684] ? sctp_v4_is_any+0x35/0x60 [ 271.237443][ T8684] ? sctp_copy_one_addr+0x8c/0x350 [ 271.242625][ T8684] sctp_bind_addr_copy+0x189/0x3c0 [ 271.247819][ T8684] sctp_connect_new_asoc+0x2f9/0x6a0 [ 271.253160][ T8684] ? __sctp_connect+0xd80/0xd80 [ 271.258073][ T8684] ? mark_lock+0x94/0x320 [ 271.262460][ T8684] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 271.268323][ T8684] __sctp_connect+0x5b7/0xd80 [ 271.273074][ T8684] ? sctp_send_asconf+0x170/0x170 [ 271.278151][ T8684] ? __local_bh_enable_ip+0x13a/0x1c0 [ 271.283569][ T8684] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 271.289177][ T8684] ? security_sctp_bind_connect+0x89/0xb0 [ 271.294955][ T8684] sctp_setsockopt_connectx+0x104/0x1a0 [ 271.300559][ T8684] sctp_setsockopt+0x6d8/0x11e0 [ 271.305469][ T8684] ? sock_common_recvmsg+0x190/0x190 [ 271.310815][ T8684] do_sock_setsockopt+0x175/0x1a0 [ 271.315900][ T8684] ? __fdget+0x180/0x210 [ 271.320208][ T8684] __x64_sys_setsockopt+0x182/0x200 [ 271.325526][ T8684] do_syscall_64+0x55/0xa0 [ 271.330003][ T8684] ? clear_bhb_loop+0x40/0x90 [ 271.334745][ T8684] ? clear_bhb_loop+0x40/0x90 [ 271.339480][ T8684] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 271.345433][ T8684] RIP: 0033:0x7f607d79aeb9 [ 271.349902][ T8684] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 271.369569][ T8684] RSP: 002b:00007f607e627028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 271.378051][ T8684] RAX: ffffffffffffffda RBX: 00007f607da15fa0 RCX: 00007f607d79aeb9 [ 271.386076][ T8684] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 271.394108][ T8684] RBP: 00007f607e627090 R08: 000000000000002c R09: 0000000000000000 [ 271.402132][ T8684] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 271.410157][ T8684] R13: 00007f607da16038 R14: 00007f607da15fa0 R15: 00007ffc5c1ddfa8 [ 271.418207][ T8684] [ 273.063581][ T8729] sctp: [Deprecated]: syz.5.574 (pid 8729) Use of int in maxseg socket option. [ 273.063581][ T8729] Use struct sctp_assoc_value instead [ 273.277405][ T8738] FAULT_INJECTION: forcing a failure. [ 273.277405][ T8738] name failslab, interval 1, probability 0, space 0, times 0 [ 273.354987][ T8738] CPU: 1 PID: 8738 Comm: syz.6.578 Not tainted syzkaller #0 [ 273.362376][ T8738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 273.372532][ T8738] Call Trace: [ 273.375866][ T8738] [ 273.378903][ T8738] dump_stack_lvl+0x18c/0x250 [ 273.383680][ T8738] ? __sctp_connect+0x5b7/0xd80 [ 273.388597][ T8738] ? sctp_setsockopt+0x6d8/0x11e0 [ 273.393675][ T8738] ? show_regs_print_info+0x20/0x20 [ 273.398947][ T8738] ? load_image+0x400/0x400 [ 273.403534][ T8738] should_fail_ex+0x39d/0x4d0 [ 273.408291][ T8738] should_failslab+0x9/0x20 [ 273.412867][ T8738] slab_pre_alloc_hook+0x59/0x310 [ 273.418000][ T8738] ? sctp_add_bind_addr+0x8c/0x360 [ 273.423185][ T8738] __kmem_cache_alloc_node+0x53/0x250 [ 273.428632][ T8738] ? sctp_add_bind_addr+0x8c/0x360 [ 273.433811][ T8738] kmalloc_trace+0x2a/0xe0 [ 273.438301][ T8738] sctp_add_bind_addr+0x8c/0x360 [ 273.443317][ T8738] sctp_copy_local_addr_list+0x315/0x4f0 [ 273.449026][ T8738] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 273.454814][ T8738] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 273.461039][ T8738] ? sctp_v4_is_any+0x35/0x60 [ 273.465774][ T8738] ? sctp_copy_one_addr+0x8c/0x350 [ 273.470954][ T8738] sctp_bind_addr_copy+0x189/0x3c0 [ 273.476164][ T8738] sctp_connect_new_asoc+0x2f9/0x6a0 [ 273.481514][ T8738] ? __sctp_connect+0xd80/0xd80 [ 273.486527][ T8738] ? mark_lock+0x94/0x320 [ 273.490918][ T8738] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 273.496827][ T8738] __sctp_connect+0x5b7/0xd80 [ 273.501586][ T8738] ? sctp_send_asconf+0x170/0x170 [ 273.506665][ T8738] ? __local_bh_enable_ip+0x13a/0x1c0 [ 273.512100][ T8738] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 273.517802][ T8738] ? security_sctp_bind_connect+0x89/0xb0 [ 273.523595][ T8738] sctp_setsockopt_connectx+0x104/0x1a0 [ 273.529213][ T8738] sctp_setsockopt+0x6d8/0x11e0 [ 273.534112][ T8738] ? sock_common_recvmsg+0x190/0x190 [ 273.539508][ T8738] do_sock_setsockopt+0x175/0x1a0 [ 273.544607][ T8738] ? __fdget+0x180/0x210 [ 273.548924][ T8738] __x64_sys_setsockopt+0x182/0x200 [ 273.554205][ T8738] do_syscall_64+0x55/0xa0 [ 273.558694][ T8738] ? clear_bhb_loop+0x40/0x90 [ 273.563429][ T8738] ? clear_bhb_loop+0x40/0x90 [ 273.568176][ T8738] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 273.574130][ T8738] RIP: 0033:0x7fb96039aeb9 [ 273.578641][ T8738] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 273.598308][ T8738] RSP: 002b:00007fb9611b5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 273.606791][ T8738] RAX: ffffffffffffffda RBX: 00007fb960615fa0 RCX: 00007fb96039aeb9 [ 273.614827][ T8738] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 273.622855][ T8738] RBP: 00007fb9611b5090 R08: 000000000000002c R09: 0000000000000000 [ 273.630971][ T8738] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 273.639003][ T8738] R13: 00007fb960616038 R14: 00007fb960615fa0 R15: 00007ffca7c3e428 [ 273.647048][ T8738] [ 273.850336][ T8742] netlink: 55631 bytes leftover after parsing attributes in process `syz.4.579'. [ 273.891164][ T8742] netlink: 6324 bytes leftover after parsing attributes in process `syz.4.579'. [ 273.938475][ T8742] netlink: 2 bytes leftover after parsing attributes in process `syz.4.579'. [ 274.011436][ T8752] FAULT_INJECTION: forcing a failure. [ 274.011436][ T8752] name failslab, interval 1, probability 0, space 0, times 0 [ 274.168223][ T8752] CPU: 0 PID: 8752 Comm: syz.5.588 Not tainted syzkaller #0 [ 274.175606][ T8752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 274.185720][ T8752] Call Trace: [ 274.189129][ T8752] [ 274.192106][ T8752] dump_stack_lvl+0x18c/0x250 [ 274.196843][ T8752] ? __sctp_connect+0x5b7/0xd80 [ 274.201758][ T8752] ? sctp_setsockopt+0x6d8/0x11e0 [ 274.206843][ T8752] ? show_regs_print_info+0x20/0x20 [ 274.212112][ T8752] ? load_image+0x400/0x400 [ 274.216691][ T8752] should_fail_ex+0x39d/0x4d0 [ 274.221456][ T8752] should_failslab+0x9/0x20 [ 274.226194][ T8752] slab_pre_alloc_hook+0x59/0x310 [ 274.231282][ T8752] ? sctp_add_bind_addr+0x8c/0x360 [ 274.236467][ T8752] __kmem_cache_alloc_node+0x53/0x250 [ 274.241916][ T8752] ? sctp_add_bind_addr+0x8c/0x360 [ 274.247097][ T8752] kmalloc_trace+0x2a/0xe0 [ 274.251574][ T8752] sctp_add_bind_addr+0x8c/0x360 [ 274.256626][ T8752] sctp_copy_local_addr_list+0x315/0x4f0 [ 274.262327][ T8752] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 274.268111][ T8752] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 274.274244][ T8752] ? sctp_v4_is_any+0x35/0x60 [ 274.278966][ T8752] ? sctp_copy_one_addr+0x8c/0x350 [ 274.284141][ T8752] sctp_bind_addr_copy+0x189/0x3c0 [ 274.289329][ T8752] sctp_connect_new_asoc+0x2f9/0x6a0 [ 274.294674][ T8752] ? __sctp_connect+0xd80/0xd80 [ 274.299593][ T8752] ? mark_lock+0x94/0x320 [ 274.303976][ T8752] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 274.309839][ T8752] __sctp_connect+0x5b7/0xd80 [ 274.314583][ T8752] ? sctp_send_asconf+0x170/0x170 [ 274.319657][ T8752] ? __local_bh_enable_ip+0x13a/0x1c0 [ 274.325081][ T8752] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 274.330684][ T8752] ? security_sctp_bind_connect+0x89/0xb0 [ 274.336501][ T8752] sctp_setsockopt_connectx+0x104/0x1a0 [ 274.342104][ T8752] sctp_setsockopt+0x6d8/0x11e0 [ 274.347011][ T8752] ? sock_common_recvmsg+0x190/0x190 [ 274.352358][ T8752] do_sock_setsockopt+0x175/0x1a0 [ 274.357455][ T8752] ? __fdget+0x180/0x210 [ 274.361756][ T8752] __x64_sys_setsockopt+0x182/0x200 [ 274.367023][ T8752] do_syscall_64+0x55/0xa0 [ 274.371499][ T8752] ? clear_bhb_loop+0x40/0x90 [ 274.376223][ T8752] ? clear_bhb_loop+0x40/0x90 [ 274.380967][ T8752] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 274.386918][ T8752] RIP: 0033:0x7f214b19aeb9 [ 274.391382][ T8752] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 274.411055][ T8752] RSP: 002b:00007f214c051028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 274.419536][ T8752] RAX: ffffffffffffffda RBX: 00007f214b415fa0 RCX: 00007f214b19aeb9 [ 274.427556][ T8752] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 274.435577][ T8752] RBP: 00007f214c051090 R08: 000000000000002c R09: 0000000000000000 [ 274.443602][ T8752] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 274.451626][ T8752] R13: 00007f214b416038 R14: 00007f214b415fa0 R15: 00007fff47bb2038 [ 274.459670][ T8752] [ 275.700509][ T8796] netlink: 209844 bytes leftover after parsing attributes in process `syz.7.591'. [ 275.726239][ T8799] FAULT_INJECTION: forcing a failure. [ 275.726239][ T8799] name failslab, interval 1, probability 0, space 0, times 0 [ 275.740292][ T8799] CPU: 0 PID: 8799 Comm: syz.6.592 Not tainted syzkaller #0 [ 275.747658][ T8799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 275.757761][ T8799] Call Trace: [ 275.761081][ T8799] [ 275.764066][ T8799] dump_stack_lvl+0x18c/0x250 [ 275.768804][ T8799] ? __sctp_connect+0x5b7/0xd80 [ 275.773773][ T8799] ? sctp_setsockopt+0x6d8/0x11e0 [ 275.779030][ T8799] ? show_regs_print_info+0x20/0x20 [ 275.784426][ T8799] ? load_image+0x400/0x400 [ 275.789000][ T8799] should_fail_ex+0x39d/0x4d0 [ 275.793744][ T8799] should_failslab+0x9/0x20 [ 275.798306][ T8799] slab_pre_alloc_hook+0x59/0x310 [ 275.803402][ T8799] ? sctp_add_bind_addr+0x8c/0x360 [ 275.808574][ T8799] __kmem_cache_alloc_node+0x53/0x250 [ 275.813999][ T8799] ? sctp_add_bind_addr+0x8c/0x360 [ 275.819167][ T8799] kmalloc_trace+0x2a/0xe0 [ 275.823726][ T8799] sctp_add_bind_addr+0x8c/0x360 [ 275.828720][ T8799] sctp_copy_local_addr_list+0x315/0x4f0 [ 275.834392][ T8799] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 275.840146][ T8799] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 275.846261][ T8799] ? sctp_v4_is_any+0x35/0x60 [ 275.850968][ T8799] ? sctp_copy_one_addr+0x8c/0x350 [ 275.856123][ T8799] sctp_bind_addr_copy+0x189/0x3c0 [ 275.861294][ T8799] sctp_connect_new_asoc+0x2f9/0x6a0 [ 275.866621][ T8799] ? __sctp_connect+0xd80/0xd80 [ 275.871504][ T8799] ? mark_lock+0x94/0x320 [ 275.875870][ T8799] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 275.881706][ T8799] __sctp_connect+0x5b7/0xd80 [ 275.886425][ T8799] ? sctp_send_asconf+0x170/0x170 [ 275.891479][ T8799] ? __local_bh_enable_ip+0x13a/0x1c0 [ 275.896976][ T8799] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 275.902584][ T8799] ? security_sctp_bind_connect+0x89/0xb0 [ 275.908401][ T8799] sctp_setsockopt_connectx+0x104/0x1a0 [ 275.913987][ T8799] sctp_setsockopt+0x6d8/0x11e0 [ 275.918871][ T8799] ? sock_common_recvmsg+0x190/0x190 [ 275.924199][ T8799] do_sock_setsockopt+0x175/0x1a0 [ 275.929277][ T8799] ? __fdget+0x180/0x210 [ 275.933590][ T8799] __x64_sys_setsockopt+0x182/0x200 [ 275.938862][ T8799] do_syscall_64+0x55/0xa0 [ 275.943354][ T8799] ? clear_bhb_loop+0x40/0x90 [ 275.948087][ T8799] ? clear_bhb_loop+0x40/0x90 [ 275.952816][ T8799] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 275.958747][ T8799] RIP: 0033:0x7fb96039aeb9 [ 275.963195][ T8799] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 275.982841][ T8799] RSP: 002b:00007fb9611b5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 275.991326][ T8799] RAX: ffffffffffffffda RBX: 00007fb960615fa0 RCX: 00007fb96039aeb9 [ 275.999350][ T8799] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 276.007361][ T8799] RBP: 00007fb9611b5090 R08: 000000000000002c R09: 0000000000000000 [ 276.015365][ T8799] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 276.023380][ T8799] R13: 00007fb960616038 R14: 00007fb960615fa0 R15: 00007ffca7c3e428 [ 276.031395][ T8799] [ 276.302885][ T8796] netlink: 14 bytes leftover after parsing attributes in process `syz.7.591'. [ 276.576457][ T8796] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 276.716719][ T8796] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 276.808694][ T8796] bond0 (unregistering): Released all slaves [ 277.141665][ T8837] FAULT_INJECTION: forcing a failure. [ 277.141665][ T8837] name failslab, interval 1, probability 0, space 0, times 0 [ 277.174540][ T8835] netlink: 'syz.7.602': attribute type 10 has an invalid length. [ 277.198958][ T8837] CPU: 1 PID: 8837 Comm: syz.6.603 Not tainted syzkaller #0 [ 277.206335][ T8837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 277.216482][ T8837] Call Trace: [ 277.219817][ T8837] [ 277.222791][ T8837] dump_stack_lvl+0x18c/0x250 [ 277.227529][ T8837] ? __sctp_connect+0x5b7/0xd80 [ 277.232465][ T8837] ? sctp_setsockopt+0x6d8/0x11e0 [ 277.237636][ T8837] ? show_regs_print_info+0x20/0x20 [ 277.242912][ T8837] ? load_image+0x400/0x400 [ 277.247512][ T8837] should_fail_ex+0x39d/0x4d0 [ 277.252254][ T8837] should_failslab+0x9/0x20 [ 277.256799][ T8837] slab_pre_alloc_hook+0x59/0x310 [ 277.261860][ T8837] ? sctp_add_bind_addr+0x8c/0x360 [ 277.267052][ T8837] __kmem_cache_alloc_node+0x53/0x250 [ 277.272472][ T8837] ? sctp_add_bind_addr+0x8c/0x360 [ 277.277625][ T8837] kmalloc_trace+0x2a/0xe0 [ 277.282085][ T8837] sctp_add_bind_addr+0x8c/0x360 [ 277.287072][ T8837] sctp_copy_local_addr_list+0x315/0x4f0 [ 277.292748][ T8837] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 277.298515][ T8837] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 277.304641][ T8837] ? sctp_v4_is_any+0x35/0x60 [ 277.309343][ T8837] ? sctp_copy_one_addr+0x8c/0x350 [ 277.314496][ T8837] sctp_bind_addr_copy+0x189/0x3c0 [ 277.319655][ T8837] sctp_connect_new_asoc+0x2f9/0x6a0 [ 277.324980][ T8837] ? __sctp_connect+0xd80/0xd80 [ 277.329866][ T8837] ? mark_lock+0x94/0x320 [ 277.334233][ T8837] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 277.340073][ T8837] __sctp_connect+0x5b7/0xd80 [ 277.344798][ T8837] ? sctp_send_asconf+0x170/0x170 [ 277.349957][ T8837] ? __local_bh_enable_ip+0x13a/0x1c0 [ 277.355372][ T8837] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 277.360953][ T8837] ? security_sctp_bind_connect+0x89/0xb0 [ 277.366724][ T8837] sctp_setsockopt_connectx+0x104/0x1a0 [ 277.372310][ T8837] sctp_setsockopt+0x6d8/0x11e0 [ 277.377191][ T8837] ? sock_common_recvmsg+0x190/0x190 [ 277.382614][ T8837] do_sock_setsockopt+0x175/0x1a0 [ 277.387678][ T8837] ? __fdget+0x180/0x210 [ 277.391962][ T8837] __x64_sys_setsockopt+0x182/0x200 [ 277.397217][ T8837] do_syscall_64+0x55/0xa0 [ 277.401668][ T8837] ? clear_bhb_loop+0x40/0x90 [ 277.406377][ T8837] ? clear_bhb_loop+0x40/0x90 [ 277.411094][ T8837] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 277.417035][ T8837] RIP: 0033:0x7fb96039aeb9 [ 277.421493][ T8837] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 277.441140][ T8837] RSP: 002b:00007fb9611b5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 277.449634][ T8837] RAX: ffffffffffffffda RBX: 00007fb960615fa0 RCX: 00007fb96039aeb9 [ 277.457672][ T8837] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 277.465676][ T8837] RBP: 00007fb9611b5090 R08: 000000000000002c R09: 0000000000000000 [ 277.473696][ T8837] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 277.481697][ T8837] R13: 00007fb960616038 R14: 00007fb960615fa0 R15: 00007ffca7c3e428 [ 277.489752][ T8837] [ 278.096465][ T8844] netlink: 'syz.6.605': attribute type 46 has an invalid length. [ 278.104473][ T8844] netlink: 'syz.6.605': attribute type 46 has an invalid length. [ 278.835802][ T8879] netlink: 209844 bytes leftover after parsing attributes in process `syz.6.611'. [ 279.141496][ T8881] netlink: 14 bytes leftover after parsing attributes in process `syz.6.611'. [ 279.249936][ T8885] netlink: 'syz.7.612': attribute type 27 has an invalid length. [ 279.350158][ T8885] netlink: 164 bytes leftover after parsing attributes in process `syz.7.612'. [ 279.544087][ T8881] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 279.661524][ T8889] FAULT_INJECTION: forcing a failure. [ 279.661524][ T8889] name failslab, interval 1, probability 0, space 0, times 0 [ 279.680576][ T8881] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 279.696009][ T8889] CPU: 1 PID: 8889 Comm: syz.5.613 Not tainted syzkaller #0 [ 279.703397][ T8889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 279.713508][ T8889] Call Trace: [ 279.716921][ T8889] [ 279.719891][ T8889] dump_stack_lvl+0x18c/0x250 [ 279.724635][ T8889] ? __sctp_connect+0x5b7/0xd80 [ 279.729543][ T8889] ? sctp_setsockopt+0x6d8/0x11e0 [ 279.734622][ T8889] ? show_regs_print_info+0x20/0x20 [ 279.739889][ T8889] ? load_image+0x400/0x400 [ 279.744462][ T8889] should_fail_ex+0x39d/0x4d0 [ 279.749206][ T8889] should_failslab+0x9/0x20 [ 279.753798][ T8889] slab_pre_alloc_hook+0x59/0x310 [ 279.758887][ T8889] ? sctp_add_bind_addr+0x8c/0x360 [ 279.764062][ T8889] __kmem_cache_alloc_node+0x53/0x250 [ 279.769512][ T8889] ? sctp_add_bind_addr+0x8c/0x360 [ 279.774778][ T8889] kmalloc_trace+0x2a/0xe0 [ 279.779264][ T8889] sctp_add_bind_addr+0x8c/0x360 [ 279.784275][ T8889] sctp_copy_local_addr_list+0x315/0x4f0 [ 279.789973][ T8889] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 279.795754][ T8889] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 279.801917][ T8889] ? sctp_v4_is_any+0x35/0x60 [ 279.806646][ T8889] ? sctp_copy_one_addr+0x8c/0x350 [ 279.811830][ T8889] sctp_bind_addr_copy+0x189/0x3c0 [ 279.817021][ T8889] sctp_connect_new_asoc+0x2f9/0x6a0 [ 279.822378][ T8889] ? __sctp_connect+0xd80/0xd80 [ 279.827296][ T8889] ? mark_lock+0x94/0x320 [ 279.831682][ T8889] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 279.837553][ T8889] __sctp_connect+0x5b7/0xd80 [ 279.842299][ T8889] ? sctp_send_asconf+0x170/0x170 [ 279.847380][ T8889] ? __local_bh_enable_ip+0x13a/0x1c0 [ 279.852804][ T8889] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 279.858413][ T8889] ? security_sctp_bind_connect+0x89/0xb0 [ 279.864209][ T8889] sctp_setsockopt_connectx+0x104/0x1a0 [ 279.869824][ T8889] sctp_setsockopt+0x6d8/0x11e0 [ 279.874726][ T8889] ? sock_common_recvmsg+0x190/0x190 [ 279.880077][ T8889] do_sock_setsockopt+0x175/0x1a0 [ 279.885165][ T8889] ? __fdget+0x180/0x210 [ 279.889484][ T8889] __x64_sys_setsockopt+0x182/0x200 [ 279.894756][ T8889] do_syscall_64+0x55/0xa0 [ 279.899234][ T8889] ? clear_bhb_loop+0x40/0x90 [ 279.903972][ T8889] ? clear_bhb_loop+0x40/0x90 [ 279.908708][ T8889] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 279.914835][ T8889] RIP: 0033:0x7f214b19aeb9 [ 279.919309][ T8889] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 279.938980][ T8889] RSP: 002b:00007f214c051028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 279.947462][ T8889] RAX: ffffffffffffffda RBX: 00007f214b415fa0 RCX: 00007f214b19aeb9 [ 279.955501][ T8889] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 279.963539][ T8889] RBP: 00007f214c051090 R08: 000000000000002c R09: 0000000000000000 [ 279.971575][ T8889] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 279.979599][ T8889] R13: 00007f214b416038 R14: 00007f214b415fa0 R15: 00007fff47bb2038 [ 279.987690][ T8889] [ 280.067751][ T8881] bond0 (unregistering): (slave netdevsim0): Releasing backup interface [ 280.126448][ T8881] bond0 (unregistering): Released all slaves [ 280.230367][ T8891] netlink: 830 bytes leftover after parsing attributes in process `syz.5.614'. [ 280.851511][ T8901] netlink: 830 bytes leftover after parsing attributes in process `syz.7.615'. [ 280.880355][ T8901] veth0_to_bond: entered promiscuous mode [ 281.418301][ T59] wlan1: Trigger new scan to find an IBSS to join [ 281.582270][ T8933] FAULT_INJECTION: forcing a failure. [ 281.582270][ T8933] name failslab, interval 1, probability 0, space 0, times 0 [ 281.700613][ T8933] CPU: 1 PID: 8933 Comm: syz.7.622 Not tainted syzkaller #0 [ 281.708047][ T8933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 281.718163][ T8933] Call Trace: [ 281.721484][ T8933] [ 281.724454][ T8933] dump_stack_lvl+0x18c/0x250 [ 281.729201][ T8933] ? __sctp_connect+0x5b7/0xd80 [ 281.734119][ T8933] ? sctp_setsockopt+0x6d8/0x11e0 [ 281.739209][ T8933] ? show_regs_print_info+0x20/0x20 [ 281.744483][ T8933] ? load_image+0x400/0x400 [ 281.749510][ T8933] should_fail_ex+0x39d/0x4d0 [ 281.754278][ T8933] should_failslab+0x9/0x20 [ 281.758855][ T8933] slab_pre_alloc_hook+0x59/0x310 [ 281.763953][ T8933] ? sctp_add_bind_addr+0x8c/0x360 [ 281.769133][ T8933] __kmem_cache_alloc_node+0x53/0x250 [ 281.774554][ T8933] ? sctp_add_bind_addr+0x8c/0x360 [ 281.779708][ T8933] kmalloc_trace+0x2a/0xe0 [ 281.784171][ T8933] sctp_add_bind_addr+0x8c/0x360 [ 281.789159][ T8933] sctp_copy_local_addr_list+0x315/0x4f0 [ 281.794841][ T8933] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 281.800609][ T8933] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 281.806729][ T8933] ? sctp_v4_is_any+0x35/0x60 [ 281.811438][ T8933] ? sctp_copy_one_addr+0x8c/0x350 [ 281.816622][ T8933] sctp_bind_addr_copy+0x189/0x3c0 [ 281.821803][ T8933] sctp_connect_new_asoc+0x2f9/0x6a0 [ 281.827127][ T8933] ? __sctp_connect+0xd80/0xd80 [ 281.832018][ T8933] ? mark_lock+0x94/0x320 [ 281.836388][ T8933] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 281.842256][ T8933] __sctp_connect+0x5b7/0xd80 [ 281.847001][ T8933] ? sctp_send_asconf+0x170/0x170 [ 281.852091][ T8933] ? __local_bh_enable_ip+0x13a/0x1c0 [ 281.857506][ T8933] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 281.863100][ T8933] ? security_sctp_bind_connect+0x89/0xb0 [ 281.868862][ T8933] sctp_setsockopt_connectx+0x104/0x1a0 [ 281.874448][ T8933] sctp_setsockopt+0x6d8/0x11e0 [ 281.879329][ T8933] ? sock_common_recvmsg+0x190/0x190 [ 281.884667][ T8933] do_sock_setsockopt+0x175/0x1a0 [ 281.889744][ T8933] ? __fdget+0x180/0x210 [ 281.894033][ T8933] __x64_sys_setsockopt+0x182/0x200 [ 281.899282][ T8933] do_syscall_64+0x55/0xa0 [ 281.903743][ T8933] ? clear_bhb_loop+0x40/0x90 [ 281.908459][ T8933] ? clear_bhb_loop+0x40/0x90 [ 281.913172][ T8933] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 281.919101][ T8933] RIP: 0033:0x7f84c5f9aeb9 [ 281.923561][ T8933] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 281.943341][ T8933] RSP: 002b:00007f84c6ec3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 281.951804][ T8933] RAX: ffffffffffffffda RBX: 00007f84c6215fa0 RCX: 00007f84c5f9aeb9 [ 281.959879][ T8933] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 281.967898][ T8933] RBP: 00007f84c6ec3090 R08: 000000000000002c R09: 0000000000000000 [ 281.975910][ T8933] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000002 [ 281.983999][ T8933] R13: 00007f84c6216038 R14: 00007f84c6215fa0 R15: 00007ffeff998608 [ 281.992025][ T8933] [ 283.405286][ T8988] FAULT_INJECTION: forcing a failure. [ 283.405286][ T8988] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 283.455503][ T8988] CPU: 1 PID: 8988 Comm: syz.6.634 Not tainted syzkaller #0 [ 283.462900][ T8988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 283.473042][ T8988] Call Trace: [ 283.476376][ T8988] [ 283.479353][ T8988] dump_stack_lvl+0x18c/0x250 [ 283.484109][ T8988] ? show_regs_print_info+0x20/0x20 [ 283.489375][ T8988] ? load_image+0x400/0x400 [ 283.494112][ T8988] ? __might_fault+0xaa/0x120 [ 283.498850][ T8988] ? __lock_acquire+0x7d40/0x7d40 [ 283.503942][ T8988] should_fail_ex+0x39d/0x4d0 [ 283.508689][ T8988] _copy_from_user+0x2f/0xe0 [ 283.513341][ T8988] kstrtouint_from_user+0xde/0x170 [ 283.518503][ T8988] ? kstrtol_from_user+0x190/0x190 [ 283.523675][ T8988] proc_fail_nth_write+0x8f/0x250 [ 283.528751][ T8988] ? proc_fail_nth_read+0x260/0x260 [ 283.534000][ T8988] ? proc_fail_nth_read+0x260/0x260 [ 283.539266][ T8988] vfs_write+0x296/0x990 [ 283.543565][ T8988] ? file_end_write+0x250/0x250 [ 283.548453][ T8988] ? __fget_files+0x28/0x4b0 [ 283.553081][ T8988] ? __fget_files+0x28/0x4b0 [ 283.557704][ T8988] ? __fget_files+0x43d/0x4b0 [ 283.562421][ T8988] ? __fdget_pos+0x2a3/0x330 [ 283.567054][ T8988] ? ksys_write+0x75/0x260 [ 283.571515][ T8988] ksys_write+0x150/0x260 [ 283.575888][ T8988] ? __ia32_sys_read+0x90/0x90 [ 283.580695][ T8988] ? lockdep_hardirqs_on+0x98/0x150 [ 283.585933][ T8988] do_syscall_64+0x55/0xa0 [ 283.590388][ T8988] ? clear_bhb_loop+0x40/0x90 [ 283.595106][ T8988] ? clear_bhb_loop+0x40/0x90 [ 283.599822][ T8988] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 283.605758][ T8988] RIP: 0033:0x7fb96035b78e [ 283.610206][ T8988] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 283.629842][ T8988] RSP: 002b:00007fb9611b4fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 283.638303][ T8988] RAX: ffffffffffffffda RBX: 00007fb9611b56c0 RCX: 00007fb96035b78e [ 283.646306][ T8988] RDX: 0000000000000001 RSI: 00007fb9611b50a0 RDI: 0000000000000005 [ 283.654326][ T8988] RBP: 00007fb9611b5090 R08: 0000000000000000 R09: 0000000000000000 [ 283.662331][ T8988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 283.670418][ T8988] R13: 00007fb960616038 R14: 00007fb960615fa0 R15: 00007ffca7c3e428 [ 283.678440][ T8988] [ 285.458179][ T49] wlan1: Trigger new scan to find an IBSS to join [ 286.583154][ T59] wlan1: Creating new IBSS network, BSSID d6:41:f4:3b:cf:19 [ 287.330492][ T9061] netlink: 64 bytes leftover after parsing attributes in process `syz.5.648'. [ 287.463644][ T9061] netlink: 132 bytes leftover after parsing attributes in process `syz.5.648'. [ 287.991652][ T9076] netlink: 129384 bytes leftover after parsing attributes in process `syz.7.651'. [ 288.121654][ T9080] netlink: 'syz.6.652': attribute type 3 has an invalid length. [ 288.159423][ T9080] netlink: 'syz.6.652': attribute type 1 has an invalid length. [ 288.167185][ T9080] netlink: 191376 bytes leftover after parsing attributes in process `syz.6.652'. [ 288.363807][ T9082] pimreg1: tun_chr_ioctl cmd 1074025677 [ 288.398365][ T9082] pimreg1: linktype set to 64759 [ 289.114054][ T9113] netlink: 150456 bytes leftover after parsing attributes in process `syz.6.659'. [ 289.159465][ T9113] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 289.955838][ T9139] netlink: 'syz.7.665': attribute type 3 has an invalid length. [ 289.988176][ T9139] netlink: 132 bytes leftover after parsing attributes in process `syz.7.665'. [ 290.090047][ T9145] netlink: 'syz.6.666': attribute type 10 has an invalid length. [ 290.208763][ T9145] team0: Port device wlan1 added [ 290.769812][ T9167] netlink: 'syz.5.668': attribute type 64 has an invalid length. [ 291.094406][ T9177] sctp: [Deprecated]: syz.6.670 (pid 9177) Use of struct sctp_assoc_value in delayed_ack socket option. [ 291.094406][ T9177] Use struct sctp_sack_info instead [ 292.378480][ T11] wlan1: Trigger new scan to find an IBSS to join [ 292.468855][ T9218] netlink: 'syz.6.680': attribute type 3 has an invalid length. [ 292.507582][ T9218] netlink: 132 bytes leftover after parsing attributes in process `syz.6.680'. [ 292.850954][ T9217] netlink: 'syz.7.681': attribute type 10 has an invalid length. [ 293.293766][ T9217] team0: Port device dummy0 added [ 293.321489][ T9223] netlink: 'syz.7.681': attribute type 10 has an invalid length. [ 294.444677][ T9223] team0: Port device dummy0 removed [ 294.540476][ T9217] syz.7.681 (9217) used greatest stack depth: 18856 bytes left [ 294.946904][ T9265] netlink: 'syz.5.687': attribute type 1 has an invalid length. [ 295.293516][ T9276] netlink: 4595 bytes leftover after parsing attributes in process `syz.5.689'. [ 295.319089][ T9280] netlink: 208064 bytes leftover after parsing attributes in process `syz.7.691'. [ 295.368926][ T9276] netlink: 4595 bytes leftover after parsing attributes in process `syz.5.689'. [ 295.393211][ T9281] netlink: 4595 bytes leftover after parsing attributes in process `syz.5.689'. [ 296.994682][ T9321] netlink: 'syz.7.698': attribute type 2 has an invalid length. [ 297.012277][ T9321] netlink: 132 bytes leftover after parsing attributes in process `syz.7.698'. [ 297.053995][ T9327] netlink: 'syz.6.700': attribute type 17 has an invalid length. [ 297.091543][ T9328] netlink: 'syz.6.700': attribute type 17 has an invalid length. [ 298.288361][ T9372] netlink: 'syz.5.710': attribute type 3 has an invalid length. [ 298.296122][ T9372] netlink: 132 bytes leftover after parsing attributes in process `syz.5.710'. [ 298.391953][ T1072] wlan1: Trigger new scan to find an IBSS to join [ 299.415075][ T34] wlan1: Creating new IBSS network, BSSID 6e:8c:30:06:08:7c [ 299.466757][ T9405] netlink: 14 bytes leftover after parsing attributes in process `syz.4.718'. [ 299.501019][ T9405] netlink: 196 bytes leftover after parsing attributes in process `syz.4.718'. [ 299.602102][ T9405] netlink: 'syz.4.718': attribute type 29 has an invalid length. [ 300.295501][ T9405] netlink: 'syz.4.718': attribute type 29 has an invalid length. [ 300.303834][ T9416] netlink: 14 bytes leftover after parsing attributes in process `syz.7.721'. [ 300.317645][ T9412] netlink: 'syz.4.718': attribute type 29 has an invalid length. [ 300.331662][ T9414] netlink: 'syz.4.718': attribute type 29 has an invalid length. [ 300.959542][ T9442] netlink: 76 bytes leftover after parsing attributes in process `syz.6.726'. [ 301.264697][ T9451] netlink: 'syz.6.729': attribute type 11 has an invalid length. [ 301.275980][ T9451] netlink: 'syz.6.729': attribute type 15 has an invalid length. [ 301.299464][ T9451] netlink: 9286 bytes leftover after parsing attributes in process `syz.6.729'. [ 301.729707][ T9464] netlink: 'syz.6.731': attribute type 9 has an invalid length. [ 301.737528][ T9464] netlink: 126588 bytes leftover after parsing attributes in process `syz.6.731'. [ 302.322055][ T9478] syz.4.733[9478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.322207][ T9478] syz.4.733[9478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.668964][ T9488] netlink: 'syz.7.737': attribute type 10 has an invalid length. [ 302.935768][ T9497] C: renamed from team_slave_0 (while UP) [ 303.147843][ T9497] netlink: 'syz.5.739': attribute type 3 has an invalid length. [ 303.208499][ T9497] netlink: 152 bytes leftover after parsing attributes in process `syz.5.739'. [ 303.284366][ T9497] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 303.370168][ T9498] netlink: 'syz.6.740': attribute type 21 has an invalid length. [ 303.398487][ T9498] netlink: 164 bytes leftover after parsing attributes in process `syz.6.740'. [ 304.727160][ T9555] netlink: 'syz.7.752': attribute type 10 has an invalid length. [ 304.750503][ T9555] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.758531][ T9555] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.079652][ T9563] netlink: 40 bytes leftover after parsing attributes in process `syz.7.754'. [ 305.104602][ T9563] netlink: 40 bytes leftover after parsing attributes in process `syz.7.754'. [ 305.152404][ T9563] netlink: 40 bytes leftover after parsing attributes in process `syz.7.754'. [ 305.446220][ T9573] netlink: 'syz.6.756': attribute type 8 has an invalid length. [ 305.478457][ T9573] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 305.753428][ T9584] netlink: 'syz.4.761': attribute type 2 has an invalid length. [ 305.794081][ T9584] netlink: 'syz.4.761': attribute type 8 has an invalid length. [ 305.877301][ T9584] netlink: 132 bytes leftover after parsing attributes in process `syz.4.761'. [ 307.349149][ T9615] netlink: 16186 bytes leftover after parsing attributes in process `syz.5.771'. [ 309.979924][ T9633] netlink: 65051 bytes leftover after parsing attributes in process `syz.5.776'. [ 309.983149][ T9630] netlink: 'syz.6.774': attribute type 2 has an invalid length. [ 310.007521][ T9630] netlink: 17267 bytes leftover after parsing attributes in process `syz.6.774'. [ 310.822373][ T9655] netlink: 60 bytes leftover after parsing attributes in process `syz.6.783'. [ 311.657266][ T9678] IPv6: NLM_F_CREATE should be specified when creating new route [ 311.702978][ T9692] netlink: 'syz.7.792': attribute type 3 has an invalid length. [ 311.731778][ T9692] netlink: 132 bytes leftover after parsing attributes in process `syz.7.792'. [ 311.782810][ T9692] netlink: 16410 bytes leftover after parsing attributes in process `syz.7.792'. [ 312.065583][ T9703] netlink: 209852 bytes leftover after parsing attributes in process `syz.7.794'. [ 312.186144][ T9708] netlink: 16222 bytes leftover after parsing attributes in process `syz.5.795'. [ 312.208469][ T9707] netlink: 'syz.7.794': attribute type 10 has an invalid length. [ 312.254312][ T9707] team0: Port device dummy0 added [ 312.342242][ T9711] netlink: 'syz.7.794': attribute type 10 has an invalid length. [ 312.396945][ T9711] team0: Port device dummy0 removed [ 312.468824][ T9707] netlink: 60 bytes leftover after parsing attributes in process `syz.7.794'. [ 312.541885][ T9707] netlink: 60 bytes leftover after parsing attributes in process `syz.7.794'. [ 312.590905][ T9703] netlink: 60 bytes leftover after parsing attributes in process `syz.7.794'. [ 314.502828][ T9729] netlink: 'syz.4.800': attribute type 10 has an invalid length. [ 315.623712][ T9742] netlink: 'syz.4.805': attribute type 6 has an invalid length. [ 315.647243][ T9742] __nla_validate_parse: 2 callbacks suppressed [ 315.647261][ T9742] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.805'. [ 316.328869][ T9773] netlink: 'syz.4.812': attribute type 21 has an invalid length. [ 316.337306][ T9773] netlink: 132 bytes leftover after parsing attributes in process `syz.4.812'. [ 316.351979][ T9773] netlink: 20 bytes leftover after parsing attributes in process `syz.4.812'. [ 316.944996][ T9783] netlink: 'syz.6.818': attribute type 2 has an invalid length. [ 316.965958][ T9783] netlink: 'syz.6.818': attribute type 8 has an invalid length. [ 316.991387][ T9783] netlink: 132 bytes leftover after parsing attributes in process `syz.6.818'. [ 317.674190][ T1284] ieee802154 phy0 wpan0: encryption failed: -22 [ 317.680843][ T1284] ieee802154 phy1 wpan1: encryption failed: -22 [ 318.145930][ T9808] netlink: 'syz.5.825': attribute type 10 has an invalid length. [ 318.245352][ T9808] dummy0: entered promiscuous mode [ 318.259322][ T9808] dummy0: entered allmulticast mode [ 318.293360][ T9808] team0: Port device dummy0 added [ 318.308102][ T9813] netlink: 'syz.5.825': attribute type 10 has an invalid length. [ 318.329200][ T9813] dummy0: left promiscuous mode [ 318.343692][ T9813] dummy0: left allmulticast mode [ 318.411598][ T9813] team0: Port device dummy0 removed [ 318.490585][ T9808] syz.5.825 (9808) used greatest stack depth: 18088 bytes left [ 318.584867][ T9828] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 319.447953][ T9849] netlink: 'syz.4.834': attribute type 13 has an invalid length. [ 319.463203][ T9849] netlink: 24859 bytes leftover after parsing attributes in process `syz.4.834'. [ 319.496665][ T9850] netlink: 'syz.4.834': attribute type 4 has an invalid length. [ 319.822615][ T9854] netlink: 132 bytes leftover after parsing attributes in process `syz.7.837'. [ 320.027580][ T9863] netlink: 132 bytes leftover after parsing attributes in process `syz.7.840'. [ 320.081641][ T9866] netlink: 'syz.7.840': attribute type 4 has an invalid length. [ 320.094548][ T9861] netlink: 'syz.5.839': attribute type 10 has an invalid length. [ 320.113931][ T9863] netlink: 199836 bytes leftover after parsing attributes in process `syz.7.840'. [ 320.136760][ T9866] netlink: 199836 bytes leftover after parsing attributes in process `syz.7.840'. [ 320.164557][ T9861] dummy0: entered promiscuous mode [ 320.174275][ T9861] dummy0: entered allmulticast mode [ 320.195618][ T9861] team0: Port device dummy0 added [ 320.211151][ T9864] dummy0: left promiscuous mode [ 320.218403][ T9864] dummy0: left allmulticast mode [ 320.232617][ T9864] team0: Port device dummy0 removed [ 320.422747][ T9861] syz.5.839 (9861) used greatest stack depth: 17320 bytes left [ 322.871784][ T9914] validate_nla: 2 callbacks suppressed [ 322.871810][ T9914] netlink: 'syz.6.853': attribute type 10 has an invalid length. [ 323.023291][ T9914] team0: Port device dummy0 added [ 323.109001][ T9915] netlink: 'syz.6.853': attribute type 10 has an invalid length. [ 323.276274][ T9915] team0: Port device dummy0 removed [ 324.208962][ T9960] netlink: 126588 bytes leftover after parsing attributes in process `syz.6.865'. [ 324.259561][ T9965] netlink: 'syz.7.866': attribute type 7 has an invalid length. [ 324.267348][ T9965] netlink: 'syz.7.866': attribute type 6 has an invalid length. [ 324.382675][ T9968] netlink: 'syz.4.867': attribute type 3 has an invalid length. [ 324.397388][ T9968] netlink: 130984 bytes leftover after parsing attributes in process `syz.4.867'. [ 324.720876][ T9969] netlink: 'syz.5.868': attribute type 10 has an invalid length. [ 324.828046][ T9969] dummy0: entered promiscuous mode [ 324.907776][ T9969] dummy0: entered allmulticast mode [ 324.986492][ T9969] team0: Port device dummy0 added [ 325.154159][ T9980] netlink: 'syz.5.868': attribute type 10 has an invalid length. [ 325.190429][ T9980] dummy0: left promiscuous mode [ 325.195588][ T9980] dummy0: left allmulticast mode [ 325.324695][ T9980] team0: Port device dummy0 removed [ 325.420244][ T9969] syz.5.868 (9969) used greatest stack depth: 17256 bytes left [ 326.056114][T10014] netlink: 'syz.4.882': attribute type 39 has an invalid length. [ 326.263318][T10018] netlink: 'syz.5.883': attribute type 3 has an invalid length. [ 326.275472][T10018] netlink: 130984 bytes leftover after parsing attributes in process `syz.5.883'. [ 326.321723][T10021] netlink: 'syz.7.884': attribute type 39 has an invalid length. [ 326.344069][T10021] veth0_macvtap: left promiscuous mode [ 326.945629][T10043] syzkaller0: entered promiscuous mode [ 326.990721][T10043] syzkaller0: entered allmulticast mode [ 327.013458][T10045] netlink: 48 bytes leftover after parsing attributes in process `syz.5.893'. [ 327.057558][ T5784] Bluetooth: hci6: unexpected event 0x04 length: 15 > 10 [ 327.060404][T10050] ÿ: renamed from bond_slave_0 [ 327.409139][T10058] netlink: 152 bytes leftover after parsing attributes in process `syz.7.898'. [ 327.441000][T10058] `: renamed from team0 (while UP) [ 327.999461][T10077] netdevsim netdevsim6 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 329.098690][ T5784] Bluetooth: hci6: command 0x0406 tx timeout [ 329.520556][ T9693] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 331.572956][T10116] validate_nla: 4 callbacks suppressed [ 331.572974][T10116] netlink: 'syz.7.912': attribute type 10 has an invalid length. [ 331.596618][T10118] netlink: 'syz.6.915': attribute type 10 has an invalid length. [ 331.606105][T10116] netlink: 40 bytes leftover after parsing attributes in process `syz.7.912'. [ 331.615632][T10118] netlink: 'syz.6.915': attribute type 16 has an invalid length. [ 331.625074][T10118] netlink: 16 bytes leftover after parsing attributes in process `syz.6.915'. [ 331.634514][T10116] netlink: 'syz.7.912': attribute type 10 has an invalid length. [ 331.648326][T10116] netlink: 40 bytes leftover after parsing attributes in process `syz.7.912'. [ 331.678143][T10109] netlink: 'syz.7.912': attribute type 10 has an invalid length. [ 331.694676][T10109] netlink: 40 bytes leftover after parsing attributes in process `syz.7.912'. [ 332.240580][T10133] netlink: 'syz.5.916': attribute type 39 has an invalid length. [ 334.302964][T10172] netlink: 'syz.5.930': attribute type 10 has an invalid length. [ 334.343070][T10172] dummy0: entered promiscuous mode [ 334.350671][T10172] dummy0: entered allmulticast mode [ 334.362633][T10172] team0: Port device dummy0 added [ 334.401602][T10178] netlink: 'syz.5.930': attribute type 10 has an invalid length. [ 334.459697][T10178] dummy0: left promiscuous mode [ 334.521226][T10178] dummy0: left allmulticast mode [ 334.606511][T10178] team0: Port device dummy0 removed [ 334.918618][T10185] netlink: 'syz.7.934': attribute type 10 has an invalid length. [ 334.943474][T10185] `: Port device dummy0 added [ 334.962569][T10185] netlink: 'syz.7.934': attribute type 10 has an invalid length. [ 335.107664][T10185] `: Port device dummy0 removed [ 335.460796][T10208] netlink: 16186 bytes leftover after parsing attributes in process `syz.5.941'. [ 335.711462][T10218] netlink: 192 bytes leftover after parsing attributes in process `syz.5.941'. [ 335.970139][T10216] team0: Port device dummy0 added [ 336.105395][T10225] team0: Port device dummy0 removed [ 336.119097][T10230] netlink: 14560 bytes leftover after parsing attributes in process `syz.7.946'. [ 336.572600][T10259] netlink: 4595 bytes leftover after parsing attributes in process `syz.6.953'. [ 336.582732][T10258] netlink: 4595 bytes leftover after parsing attributes in process `syz.6.953'. [ 336.773296][T10271] netlink: 132 bytes leftover after parsing attributes in process `syz.6.955'. [ 336.935071][T10269] validate_nla: 2 callbacks suppressed [ 336.935096][T10269] netlink: 'syz.4.956': attribute type 10 has an invalid length. [ 337.125972][T10269] dummy0: entered promiscuous mode [ 337.159528][T10269] dummy0: entered allmulticast mode [ 337.202190][T10269] team0: Port device dummy0 added [ 337.231644][T10277] netlink: 'syz.4.956': attribute type 10 has an invalid length. [ 337.246796][T10277] dummy0: left promiscuous mode [ 337.254411][T10277] dummy0: left allmulticast mode [ 337.425842][T10277] team0: Port device dummy0 removed [ 337.449250][T10281] netlink: 'syz.6.958': attribute type 10 has an invalid length. [ 337.457623][T10281] netlink: 55 bytes leftover after parsing attributes in process `syz.6.958'. [ 337.574615][T10269] syz.4.956 (10269) used greatest stack depth: 17000 bytes left [ 337.732875][T10296] netlink: 63503 bytes leftover after parsing attributes in process `syz.6.961'. [ 337.766838][T10296] netlink: 'syz.6.961': attribute type 2 has an invalid length. [ 337.775530][T10296] netlink: 'syz.6.961': attribute type 8 has an invalid length. [ 337.800108][T10296] netlink: 132 bytes leftover after parsing attributes in process `syz.6.961'. [ 338.598626][T10304] tap0: tun_chr_ioctl cmd 35108 [ 338.638842][T10304] netlink: 'syz.5.964': attribute type 11 has an invalid length. [ 339.369053][T10324] netlink: 'syz.7.969': attribute type 1 has an invalid length. [ 339.391879][T10324] netlink: 193500 bytes leftover after parsing attributes in process `syz.7.969'. [ 339.846726][T10336] netlink: 64859 bytes leftover after parsing attributes in process `syz.7.974'. [ 339.859546][T10337] netlink: 64859 bytes leftover after parsing attributes in process `syz.7.974'. [ 340.064366][T10345] netlink: 'syz.4.976': attribute type 2 has an invalid length. [ 340.082780][ T5784] Bluetooth: hci4: ISO packet for unknown connection handle 1854 [ 340.113992][T10345] netlink: 'syz.4.976': attribute type 8 has an invalid length. [ 340.149193][T10345] netlink: 132 bytes leftover after parsing attributes in process `syz.4.976'. [ 340.219872][T10355] sock: sock_timestamping_bind_phc: sock not bind to device [ 344.496912][T10387] netlink: 'syz.5.987': attribute type 49 has an invalid length. [ 344.507411][T10387] netlink: set zone limit has 8 unknown bytes [ 344.707409][T10398] netlink: 63503 bytes leftover after parsing attributes in process `syz.5.991'. [ 345.254044][T10411] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.995'. [ 345.297867][T10411] openvswitch: netlink: IP tunnel attribute has 3052 unknown bytes. [ 345.354123][T10408] netlink: 65047 bytes leftover after parsing attributes in process `syz.7.994'. [ 345.591267][T10420] netlink: 763 bytes leftover after parsing attributes in process `syz.6.997'. [ 347.267422][T10460] netlink: 176 bytes leftover after parsing attributes in process `syz.4.1009'. [ 347.456819][T10464] netlink: 63503 bytes leftover after parsing attributes in process `syz.4.1010'. [ 347.492152][T10464] netlink: 'syz.4.1010': attribute type 2 has an invalid length. [ 347.512640][T10464] netlink: 'syz.4.1010': attribute type 8 has an invalid length. [ 347.525711][T10464] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1010'. [ 349.343307][T10487] netlink: 'syz.4.1016': attribute type 10 has an invalid length. [ 349.404105][T10487] macvlan0: entered promiscuous mode [ 349.419056][T10487] macvlan0: entered allmulticast mode [ 349.432085][T10487] veth1_vlan: entered allmulticast mode [ 349.442936][T10487] team0: Port device macvlan0 added [ 349.751918][T10500] netlink: 180 bytes leftover after parsing attributes in process `syz.6.1020'. [ 349.904981][T10506] netlink: 'syz.4.1022': attribute type 3 has an invalid length. [ 349.922097][T10506] netlink: 130984 bytes leftover after parsing attributes in process `syz.4.1022'. [ 350.080315][T10523] netlink: 'syz.6.1027': attribute type 1 has an invalid length. [ 350.104847][T10523] netlink: 112860 bytes leftover after parsing attributes in process `syz.6.1027'. [ 350.135360][T10523] netlink: 'syz.6.1027': attribute type 1 has an invalid length. [ 350.237319][T10532] netlink: 'syz.4.1029': attribute type 29 has an invalid length. [ 350.250099][T10535] netlink: 'syz.7.1026': attribute type 21 has an invalid length. [ 350.287062][T10535] netlink: 128 bytes leftover after parsing attributes in process `syz.7.1026'. [ 350.317010][T10535] netlink: 'syz.7.1026': attribute type 4 has an invalid length. [ 350.354508][T10535] netlink: 'syz.7.1026': attribute type 3 has an invalid length. [ 350.405223][T10535] netlink: 3 bytes leftover after parsing attributes in process `syz.7.1026'. [ 350.435814][T10532] netlink: 'syz.4.1029': attribute type 29 has an invalid length. [ 350.464327][T10544] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1030'. [ 350.498440][T10544] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1030'. [ 350.533814][T10544] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1030'. [ 350.565978][T10544] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1030'. [ 350.583256][T10544] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1030'. [ 350.985167][T10549] netlink: 'syz.4.1032': attribute type 64 has an invalid length. [ 351.025765][T10549] netlink: 'syz.4.1032': attribute type 64 has an invalid length. [ 351.340685][ T9690] wlan1: Trigger new scan to find an IBSS to join [ 354.392908][ T49] wlan1: Trigger new scan to find an IBSS to join [ 355.411743][T10617] __nla_validate_parse: 62 callbacks suppressed [ 355.411832][T10617] netlink: 180 bytes leftover after parsing attributes in process `syz.6.1049'. [ 355.776287][T10623] validate_nla: 36 callbacks suppressed [ 355.776323][T10623] netlink: 'syz.5.1051': attribute type 3 has an invalid length. [ 355.843573][T10623] netlink: 130984 bytes leftover after parsing attributes in process `syz.5.1051'. [ 356.942950][T10655] netlink: 'syz.7.1058': attribute type 33 has an invalid length. [ 356.970584][T10655] netlink: 152 bytes leftover after parsing attributes in process `syz.7.1058'. [ 357.070503][T10658] netlink: 4595 bytes leftover after parsing attributes in process `syz.6.1059'. [ 357.104959][T10658] netlink: 4595 bytes leftover after parsing attributes in process `syz.6.1059'. [ 357.158175][T10662] netlink: 4595 bytes leftover after parsing attributes in process `syz.6.1059'. [ 357.344139][ T49] wlan1: Trigger new scan to find an IBSS to join [ 357.708367][T10687] netlink: 'syz.7.1063': attribute type 3 has an invalid length. [ 357.716198][T10687] netlink: 130984 bytes leftover after parsing attributes in process `syz.7.1063'. [ 358.309308][ T49] wlan1: Creating new IBSS network, BSSID 42:52:d1:2a:6e:0e [ 358.843378][T10714] netlink: 'syz.7.1073': attribute type 10 has an invalid length. [ 358.862071][T10715] netlink: 'syz.7.1073': attribute type 4 has an invalid length. [ 358.882669][T10715] netlink: 152 bytes leftover after parsing attributes in process `syz.7.1073'. [ 359.256480][T10725] netlink: 176 bytes leftover after parsing attributes in process `syz.6.1076'. [ 361.718755][T10739] netlink: 55631 bytes leftover after parsing attributes in process `syz.7.1078'. [ 362.890911][T10771] netlink: 'syz.6.1087': attribute type 13 has an invalid length. [ 362.980383][T10771] netlink: 160 bytes leftover after parsing attributes in process `syz.6.1087'. [ 363.190378][T10771] erspan0: refused to change device tx_queue_len [ 363.223445][T10771] A link change request failed with some changes committed already. Interface erspan0 may have been left with an inconsistent configuration, please check. [ 363.242224][T10775] netlink: 'syz.6.1087': attribute type 11 has an invalid length. [ 364.051354][T10798] syzkaller0: entered promiscuous mode [ 364.057049][T10798] syzkaller0: entered allmulticast mode [ 364.937771][T10813] netlink: 'syz.4.1101': attribute type 10 has an invalid length. [ 364.956175][T10813] netlink: 65015 bytes leftover after parsing attributes in process `syz.4.1101'. [ 364.968491][T10808] netlink: 830 bytes leftover after parsing attributes in process `syz.7.1097'. [ 364.984033][T10815] netlink: 'syz.5.1100': attribute type 21 has an invalid length. [ 364.992586][T10815] netlink: 156 bytes leftover after parsing attributes in process `syz.5.1100'. [ 365.988300][ T9] page_pool_release_retry() stalled pool shutdown 1 inflight 60 sec [ 368.797840][T10868] netlink: 'syz.7.1113': attribute type 29 has an invalid length. [ 368.814441][T10868] netlink: 'syz.7.1113': attribute type 29 has an invalid length. [ 368.855511][T10872] netlink: 'syz.7.1113': attribute type 29 has an invalid length. [ 369.188855][T10886] netlink: 10 bytes leftover after parsing attributes in process `syz.6.1117'. [ 370.707307][T10921] netlink: 4595 bytes leftover after parsing attributes in process `syz.6.1123'. [ 373.282096][T10941] netlink: 209852 bytes leftover after parsing attributes in process `syz.6.1131'. [ 373.328206][T10941] openvswitch: netlink: Tunnel attr 0 has unexpected len 3060 expected 8 [ 374.835446][T10993] netlink: 132 bytes leftover after parsing attributes in process `syz.6.1144'. [ 374.899432][T10993] netlink: 144 bytes leftover after parsing attributes in process `syz.6.1144'. [ 374.952551][T10998] netlink: 'syz.4.1147': attribute type 11 has an invalid length. [ 374.972837][T10998] netlink: 212832 bytes leftover after parsing attributes in process `syz.4.1147'. [ 375.488976][T11003] lo: entered allmulticast mode [ 376.653720][T11017] netlink: 132 bytes leftover after parsing attributes in process `syz.7.1153'. [ 376.929411][T11026] netlink: 'syz.5.1155': attribute type 10 has an invalid length. [ 376.937319][T11026] netlink: 40 bytes leftover after parsing attributes in process `syz.5.1155'. [ 376.970181][T11026] batman_adv: batadv0: Adding interface: virt_wifi0 [ 376.988107][T11026] batman_adv: batadv0: The MTU of interface virt_wifi0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 377.047516][T11026] batman_adv: batadv0: Interface activated: virt_wifi0 [ 377.624658][T11053] netlink: 'syz.4.1160': attribute type 3 has an invalid length. [ 377.633450][T11053] netlink: 130984 bytes leftover after parsing attributes in process `syz.4.1160'. [ 378.179550][T11059] netlink: 4595 bytes leftover after parsing attributes in process `syz.6.1163'. [ 379.081855][T11088] netlink: 'syz.7.1174': attribute type 3 has an invalid length. [ 379.090944][T11088] netlink: 130984 bytes leftover after parsing attributes in process `syz.7.1174'. [ 379.159553][ T1284] ieee802154 phy0 wpan0: encryption failed: -22 [ 379.159668][ T1284] ieee802154 phy1 wpan1: encryption failed: -22 [ 379.556459][T11098] netlink: 'syz.7.1177': attribute type 3 has an invalid length. [ 379.589367][T11098] netlink: 130984 bytes leftover after parsing attributes in process `syz.7.1177'. [ 379.682064][T11100] netlink: 'syz.5.1178': attribute type 10 has an invalid length. [ 379.725925][T11100] dummy0: entered promiscuous mode [ 379.742865][T11100] dummy0: entered allmulticast mode [ 379.784596][T11100] team0: Port device dummy0 added [ 379.842628][T11101] netlink: 'syz.5.1178': attribute type 10 has an invalid length. [ 379.993472][T11101] dummy0: left promiscuous mode [ 380.123025][T11101] dummy0: left allmulticast mode [ 380.191657][T11101] team0: Port device dummy0 removed [ 380.475926][T11118] netlink: 209844 bytes leftover after parsing attributes in process `syz.6.1183'. [ 380.651441][T11120] syz.7.1184[11120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.651653][T11120] syz.7.1184[11120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.739409][T11120] netlink: 'syz.7.1184': attribute type 21 has an invalid length. [ 381.245792][T11131] netlink: 'syz.6.1187': attribute type 3 has an invalid length. [ 381.254352][T11131] netlink: 130984 bytes leftover after parsing attributes in process `syz.6.1187'. [ 381.774665][T11140] netlink: 'syz.5.1190': attribute type 3 has an invalid length. [ 381.788549][T11140] netlink: 130984 bytes leftover after parsing attributes in process `syz.5.1190'. [ 382.207344][T11153] netlink: 'syz.4.1194': attribute type 10 has an invalid length. [ 382.303183][T11153] dummy0: entered promiscuous mode [ 382.325239][T11153] dummy0: entered allmulticast mode [ 382.366614][T11153] team0: Port device dummy0 added [ 382.454020][T11160] netlink: 'syz.4.1194': attribute type 10 has an invalid length. [ 382.529045][T11160] dummy0: left promiscuous mode [ 382.534200][T11160] dummy0: left allmulticast mode [ 383.917682][T11160] team0: Port device dummy0 removed [ 384.587690][T11196] netlink: 'syz.4.1207': attribute type 3 has an invalid length. [ 384.600131][T11196] netlink: 130984 bytes leftover after parsing attributes in process `syz.4.1207'. [ 384.881924][T11203] netlink: 'syz.7.1210': attribute type 10 has an invalid length. [ 384.999563][T11203] `: Port device dummy0 added [ 385.104558][T11213] netlink: 'syz.7.1210': attribute type 10 has an invalid length. [ 385.488874][T11213] `: Port device dummy0 removed [ 386.014547][T11227] netlink: 208064 bytes leftover after parsing attributes in process `syz.6.1217'. [ 386.678965][T11251] netlink: 60 bytes leftover after parsing attributes in process `syz.6.1221'. [ 386.880157][T11253] netlink: 'syz.4.1224': attribute type 3 has an invalid length. [ 386.918144][T11253] netlink: 130984 bytes leftover after parsing attributes in process `syz.4.1224'. [ 389.311361][T11249] wg2: entered allmulticast mode [ 389.326154][T11251] netlink: 60 bytes leftover after parsing attributes in process `syz.6.1221'. [ 389.902061][T11266] netlink: 'syz.6.1226': attribute type 10 has an invalid length. [ 389.946849][T11266] team0: Port device dummy0 added [ 389.969442][T11272] netlink: 'syz.6.1226': attribute type 10 has an invalid length. [ 389.998778][T11276] netlink: 209852 bytes leftover after parsing attributes in process `syz.7.1229'. [ 390.030692][T11272] team0: Port device dummy0 removed [ 390.050084][T11276] sysfs: cannot create duplicate filename '/class/ieee80211/!!ô' [ 390.098962][T11276] CPU: 0 PID: 11276 Comm: syz.7.1229 Not tainted syzkaller #0 [ 390.106527][T11276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 390.116661][T11276] Call Trace: [ 390.120004][T11276] [ 390.122999][T11276] dump_stack_lvl+0x18c/0x250 [ 390.127761][T11276] ? show_regs_print_info+0x20/0x20 [ 390.133046][T11276] ? load_image+0x400/0x400 [ 390.137651][T11276] sysfs_warn_dup+0x8e/0xa0 [ 390.142223][T11276] sysfs_do_create_link_sd+0xc0/0x110 [ 390.147670][T11276] device_add_class_symlinks+0x1cf/0x240 [ 390.153393][T11276] device_add+0x507/0xc20 [ 390.157827][T11276] wiphy_register+0x1dad/0x2ae0 [ 390.162798][T11276] ? cfg80211_event_work+0x40/0x40 [ 390.167988][T11276] ? minstrel_ht_alloc+0x88a/0x990 [ 390.173198][T11276] ? ieee80211_init_rate_ctrl_alg+0x562/0x5e0 [ 390.179346][T11276] ieee80211_register_hw+0x3464/0x4250 [ 390.184905][T11276] ? ieee80211_tasklet_handler+0x20/0x20 [ 390.190594][T11276] ? _raw_spin_unlock_irqrestore+0xc5/0x120 [ 390.196623][T11276] ? __debug_object_init+0xec/0x450 [ 390.201874][T11276] ? __asan_memset+0x22/0x40 [ 390.206522][T11276] ? __hrtimer_init+0x186/0x270 [ 390.211435][T11276] mac80211_hwsim_new_radio+0x2a00/0x4d10 [ 390.217268][T11276] ? mac80211_hwsim_free+0x220/0x220 [ 390.222606][T11276] ? rcu_is_watching+0x15/0xb0 [ 390.227419][T11276] ? kstrndup+0xbd/0x140 [ 390.231760][T11276] hwsim_new_radio_nl+0xdc9/0x1a90 [ 390.236942][T11276] ? __nla_validate+0x50/0x50 [ 390.241688][T11276] ? hwsim_tx_info_frame_received_nl+0xd60/0xd60 [ 390.248094][T11276] ? __nla_parse+0x40/0x50 [ 390.252575][T11276] ? genl_family_rcv_msg_attrs_parse+0x1c6/0x290 [ 390.258964][T11276] genl_family_rcv_msg_doit+0x211/0x310 [ 390.264563][T11276] ? end_current_label_crit_section+0x170/0x170 [ 390.270866][T11276] ? genl_family_rcv_msg_dumpit+0x310/0x310 [ 390.276829][T11276] ? bpf_lsm_capable+0x9/0x10 [ 390.281573][T11276] ? security_capable+0x89/0xb0 [ 390.286481][T11276] genl_rcv_msg+0x619/0x7a0 [ 390.291057][T11276] ? genl_bind+0x360/0x360 [ 390.295551][T11276] ? hwsim_tx_info_frame_received_nl+0xd60/0xd60 [ 390.301947][T11276] ? perf_trace_lock+0x304/0x3b0 [ 390.306972][T11276] netlink_rcv_skb+0x241/0x4d0 [ 390.311805][T11276] ? genl_bind+0x360/0x360 [ 390.316278][T11276] ? netlink_ack+0x1180/0x1180 [ 390.321115][T11276] ? __lock_acquire+0x7d40/0x7d40 [ 390.326194][T11276] ? down_read+0x1ac/0x2e0 [ 390.330665][T11276] genl_rcv+0x28/0x40 [ 390.334698][T11276] netlink_unicast+0x751/0x8d0 [ 390.339550][T11276] netlink_sendmsg+0x8d0/0xbf0 [ 390.344364][T11276] ? perf_trace_lock+0x304/0x3b0 [ 390.349369][T11276] ? netlink_getsockopt+0x590/0x590 [ 390.354622][T11276] ? aa_sock_msg_perm+0x94/0x150 [ 390.359619][T11276] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 390.364951][T11276] ? security_socket_sendmsg+0x80/0xa0 [ 390.370455][T11276] ? netlink_getsockopt+0x590/0x590 [ 390.375728][T11276] ____sys_sendmsg+0x5ba/0x960 [ 390.380569][T11276] ? __asan_memset+0x22/0x40 [ 390.385229][T11276] ? __sys_sendmsg_sock+0x30/0x30 [ 390.390304][T11276] ? __import_iovec+0x5f2/0x850 [ 390.395228][T11276] ? import_iovec+0x73/0xa0 [ 390.399799][T11276] ___sys_sendmsg+0x2a6/0x360 [ 390.404533][T11276] ? __sys_sendmsg+0x2a0/0x2a0 [ 390.409394][T11276] ? debug_mutex_init+0x38/0x70 [ 390.414340][T11276] __se_sys_sendmsg+0x1c2/0x2b0 [ 390.419242][T11276] ? __x64_sys_sendmsg+0x80/0x80 [ 390.424266][T11276] ? lockdep_hardirqs_on+0x98/0x150 [ 390.429527][T11276] do_syscall_64+0x55/0xa0 [ 390.433995][T11276] ? clear_bhb_loop+0x40/0x90 [ 390.438761][T11276] ? clear_bhb_loop+0x40/0x90 [ 390.443500][T11276] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 390.449442][T11276] RIP: 0033:0x7f84c5f9aeb9 [ 390.453907][T11276] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 390.473651][T11276] RSP: 002b:00007f84c6ec3028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 390.482116][T11276] RAX: ffffffffffffffda RBX: 00007f84c6215fa0 RCX: 00007f84c5f9aeb9 [ 390.490132][T11276] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000005 [ 390.498147][T11276] RBP: 00007f84c6008c1f R08: 0000000000000000 R09: 0000000000000000 [ 390.506170][T11276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 390.514199][T11276] R13: 00007f84c6216038 R14: 00007f84c6215fa0 R15: 00007ffeff998608 [ 390.522246][T11276] [ 390.622091][ T9685] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 390.691600][T11280] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1230'. [ 390.708967][T11280] netlink: 196 bytes leftover after parsing attributes in process `syz.4.1230'. [ 390.732950][T11276] netlink: 'syz.7.1229': attribute type 10 has an invalid length. [ 390.744234][T11280] netlink: 'syz.4.1230': attribute type 29 has an invalid length. [ 390.763632][T11276] `: Port device dummy0 added [ 390.774354][T11276] netlink: 'syz.7.1229': attribute type 10 has an invalid length. [ 390.863310][T11276] `: Port device dummy0 removed [ 390.872828][T11280] netlink: 'syz.4.1230': attribute type 29 has an invalid length. [ 390.907771][T11276] netlink: 60 bytes leftover after parsing attributes in process `syz.7.1229'. [ 390.929565][T11276] netlink: 60 bytes leftover after parsing attributes in process `syz.7.1229'. [ 390.958321][T11278] netlink: 60 bytes leftover after parsing attributes in process `syz.7.1229'. [ 391.004752][T11281] netlink: 'syz.4.1230': attribute type 29 has an invalid length. [ 391.032514][T11276] netlink: 'syz.7.1229': attribute type 1 has an invalid length. [ 391.042046][T11285] netlink: 'syz.4.1230': attribute type 29 has an invalid length. [ 391.056720][T11276] netlink: 'syz.7.1229': attribute type 1 has an invalid length. [ 391.065828][T11276] __nla_validate_parse: 1 callbacks suppressed [ 391.065844][T11276] netlink: 110057 bytes leftover after parsing attributes in process `syz.7.1229'. [ 391.157927][T11276] netlink: 6 bytes leftover after parsing attributes in process `syz.7.1229'. [ 391.567905][T11305] netlink: 130984 bytes leftover after parsing attributes in process `syz.7.1236'. [ 393.996916][T11331] netlink: 132 bytes leftover after parsing attributes in process `syz.5.1243'. [ 395.052341][T11329] dummy0: entered promiscuous mode [ 395.226672][T11329] dummy0: entered allmulticast mode [ 395.641116][T11329] team0: Port device dummy0 added [ 395.932989][T11350] netlink: 152 bytes leftover after parsing attributes in process `syz.7.1244'. [ 499.258013][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 499.264739][ C1] rcu: 1-....: (10499 ticks this GP) idle=3c3c/1/0x4000000000000000 softirq=38601/38601 fqs=5237 [ 499.276521][ C1] rcu: hardirqs softirqs csw/system [ 499.282976][ C1] rcu: number: 1173882 0 0 [ 499.289425][ C1] rcu: cputime: 21093 31396 75 ==> 52520(ms) [ 499.297264][ C1] rcu: (t=10503 jiffies g=42593 q=1252 ncpus=2) [ 499.303730][ C1] CPU: 1 PID: 11333 Comm: syz.7.1244 Not tainted syzkaller #0 [ 499.311231][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 499.321323][ C1] RIP: 0010:__local_bh_enable_ip+0x142/0x1c0 [ 499.327409][ C1] Code: 8a e8 e2 ed 31 09 65 66 8b 05 ca 51 b1 7e 66 85 c0 75 54 bf 01 00 00 00 e8 cb 1a 0a 00 e8 36 20 3b 00 fb 65 8b 05 96 51 b1 7e <85> c0 75 05 e8 15 39 ae ff 48 c7 04 24 0e 36 e0 45 4b c7 04 37 00 [ 499.347264][ C1] RSP: 0018:ffffc900001f0600 EFLAGS: 00000286 [ 499.353404][ C1] RAX: 0000000000000101 RBX: 0000000000000200 RCX: b88725ca55f25600 [ 499.361415][ C1] RDX: dffffc0000000000 RSI: ffffffff8acac900 RDI: ffffffff8b1c81e0 [ 499.369427][ C1] RBP: ffffc900001f0690 R08: ffffffff911bf5ff R09: 1ffffffff2237ebf [ 499.377435][ C1] R10: dffffc0000000000 R11: fffffbfff2237ec0 R12: ffffffff8950b6b9 [ 499.385452][ C1] R13: dffffc0000000000 R14: dffffc0000000000 R15: 1ffff9200003e0c0 [ 499.393466][ C1] FS: 00007f84c6ec36c0(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 [ 499.402439][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 499.409061][ C1] CR2: 0000000100000000 CR3: 000000004abd6000 CR4: 00000000003506e0 [ 499.417077][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 499.425087][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 499.433101][ C1] Call Trace: [ 499.436440][ C1] [ 499.439329][ C1] ? _local_bh_enable+0xa0/0xa0 [ 499.444224][ C1] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 499.450255][ C1] ip6t_do_table+0x135e/0x1510 [ 499.455082][ C1] ? ip6t_do_table+0x1d9/0x1510 [ 499.459971][ C1] ? ip6t_alloc_initial_table+0x640/0x640 [ 499.465748][ C1] ? nf_nat_ipv6_local_fn+0x1f6/0x390 [ 499.471162][ C1] ? ip6t_alloc_initial_table+0x640/0x640 [ 499.476925][ C1] nf_hook_slow+0xbd/0x200 [ 499.481396][ C1] ndisc_send_skb+0x138a/0x14f0 [ 499.486295][ C1] ? ndisc_send_skb+0x1f5/0x14f0 [ 499.491275][ C1] ? ndisc_mc_map+0x680/0x680 [ 499.495986][ C1] ? skb_dst+0xd0/0xd0 [ 499.500113][ C1] addrconf_rs_timer+0x2d5/0x630 [ 499.505105][ C1] ? addrconf_disable_policy_idev+0x480/0x480 [ 499.511220][ C1] ? kasan_check_range+0x89/0x290 [ 499.516298][ C1] call_timer_fn+0x189/0x540 [ 499.520931][ C1] ? addrconf_disable_policy_idev+0x480/0x480 [ 499.527131][ C1] ? call_timer_fn+0xd2/0x540 [ 499.531857][ C1] ? __run_timers+0x800/0x800 [ 499.536572][ C1] ? addrconf_disable_policy_idev+0x480/0x480 [ 499.542695][ C1] ? addrconf_disable_policy_idev+0x480/0x480 [ 499.548806][ C1] ? addrconf_disable_policy_idev+0x480/0x480 [ 499.554920][ C1] __run_timers+0x542/0x800 [ 499.559475][ C1] ? detach_timer+0x2b0/0x2b0 [ 499.564232][ C1] run_timer_softirq+0x67/0xf0 [ 499.569037][ C1] handle_softirqs+0x280/0x820 [ 499.573850][ C1] ? __irq_exit_rcu+0xd3/0x190 [ 499.578657][ C1] ? do_softirq+0x1a0/0x1a0 [ 499.583214][ C1] ? irqtime_account_irq+0xb6/0x1c0 [ 499.588471][ C1] __irq_exit_rcu+0xd3/0x190 [ 499.593139][ C1] ? irq_exit_rcu+0x20/0x20 [ 499.597703][ C1] irq_exit_rcu+0x9/0x20 [ 499.601978][ C1] sysvec_apic_timer_interrupt+0xa4/0xc0 [ 499.607659][ C1] [ 499.610693][ C1] [ 499.613665][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 499.619693][ C1] RIP: 0010:generic_exec_single+0x481/0x4f0 [ 499.625630][ C1] Code: 75 11 e8 02 02 0b 00 48 85 db 75 16 e8 f8 01 0b 00 eb 15 e8 f1 01 0b 00 e8 0c 29 08 09 48 85 db 74 ea e8 e2 01 0b 00 fb 31 c0 <48> c7 44 24 20 0e 36 e0 45 4b c7 04 2c 00 00 00 00 43 c7 44 2c 08 [ 499.645402][ C1] RSP: 0018:ffffc9000d7bfa00 EFLAGS: 00000246 [ 499.651600][ C1] RAX: 0000000000000000 RBX: 0000000000000200 RCX: 0000000000080000 [ 499.659606][ C1] RDX: ffffc9001934e000 RSI: 00000000000021b8 RDI: 00000000000021b9 [ 499.667630][ C1] RBP: ffffc9000d7bfad0 R08: ffffffff911bf5ff R09: 1ffffffff2237ebf [ 499.675639][ C1] R10: dffffc0000000000 R11: fffffbfff2237ec0 R12: 1ffff92001af7f44 [ 499.683674][ C1] R13: dffffc0000000000 R14: 0000000000000000 R15: 1ffff92001af7f65 [ 499.691707][ C1] ? event_function+0x300/0x300 [ 499.696600][ C1] ? smp_call_function_single+0x5a0/0x5a0 [ 499.702372][ C1] ? percpu_counter_add_batch+0x1f1/0x2a0 [ 499.708198][ C1] ? lockdep_hardirqs_on+0x98/0x150 [ 499.713444][ C1] ? smp_call_function_single+0xb0/0x5a0 [ 499.719125][ C1] smp_call_function_single+0x36d/0x5a0 [ 499.724719][ C1] ? event_function+0x300/0x300 [ 499.729724][ C1] ? flush_smp_call_function_queue+0x250/0x250 [ 499.735957][ C1] ? event_function+0x300/0x300 [ 499.740882][ C1] perf_install_in_context+0x5be/0x920 [ 499.746393][ C1] ? exclusive_event_installable+0x2c0/0x2c0 [ 499.752419][ C1] ? add_event_to_ctx+0x1180/0x1180 [ 499.757684][ C1] ? anon_inode_getfile+0x109/0x1a0 [ 499.762930][ C1] ? perf_event__header_size+0x165/0x220 [ 499.768612][ C1] __se_sys_perf_event_open+0x1836/0x1c50 [ 499.774372][ C1] ? security_bpf+0x7e/0xa0 [ 499.778953][ C1] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 499.784666][ C1] ? lock_chain_count+0x20/0x20 [ 499.789571][ C1] ? lockdep_hardirqs_on+0x98/0x150 [ 499.794817][ C1] ? __x64_sys_perf_event_open+0x20/0xc0 [ 499.800494][ C1] do_syscall_64+0x55/0xa0 [ 499.804992][ C1] ? clear_bhb_loop+0x40/0x90 [ 499.809732][ C1] ? clear_bhb_loop+0x40/0x90 [ 499.814543][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 499.820655][ C1] RIP: 0033:0x7f84c5f9aeb9 [ 499.825109][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 499.844845][ C1] RSP: 002b:00007f84c6ec3028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 499.853563][ C1] RAX: ffffffffffffffda RBX: 00007f84c6215fa0 RCX: 00007f84c5f9aeb9 [ 499.861926][ C1] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000000480 [ 499.869942][ C1] RBP: 00007f84c6008c1f R08: 0000000000000000 R09: 0000000000000000 [ 499.878047][ C1] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 499.886069][ C1] R13: 00007f84c6216038 R14: 00007f84c6215fa0 R15: 00007ffeff998608 [ 499.894110][ C1]