last executing test programs: 3m12.391949529s ago: executing program 2 (id=691): perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x55}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x2002) socket$kcm(0x2, 0x5, 0x84) socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x2, 0x922000000001, 0x106) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000100)=r1, 0x4) sendmsg$inet(r0, 0x0, 0x4008041) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 3m12.215179042s ago: executing program 2 (id=695): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x61}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0xac03}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x65, 0x0, 0x0, 0x0, 0x6}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xb, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @exit, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x1, 0x3d, &(0x7f0000000740)=""/61, 0x40f00, 0x10, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x3, 0x0, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xff}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x445f78a2b7d164c5, 0x4, &(0x7f0000000440)=ANY=[@ANYRES64=r1], &(0x7f00000003c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffd2) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002100), 0x48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000900)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x8, &(0x7f0000000000)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}]}, &(0x7f0000000640)='syzkaller\x00', 0x7, 0xf9, &(0x7f0000000080)=""/249}, 0x70) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018123300000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x2b) recvmsg$unix(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}], 0xc8}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x0) syz_clone(0x3001100, 0x0, 0x0, 0x0, 0x0, 0x0) 3m2.529537496s ago: executing program 2 (id=695): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x61}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0xac03}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x65, 0x0, 0x0, 0x0, 0x6}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xb, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @exit, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x1, 0x3d, &(0x7f0000000740)=""/61, 0x40f00, 0x10, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x3, 0x0, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xff}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x445f78a2b7d164c5, 0x4, &(0x7f0000000440)=ANY=[@ANYRES64=r1], &(0x7f00000003c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffd2) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002100), 0x48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000900)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x8, &(0x7f0000000000)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}]}, &(0x7f0000000640)='syzkaller\x00', 0x7, 0xf9, &(0x7f0000000080)=""/249}, 0x70) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018123300000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x2b) recvmsg$unix(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}], 0xc8}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x0) syz_clone(0x3001100, 0x0, 0x0, 0x0, 0x0, 0x0) 2m55.53207504s ago: executing program 3 (id=836): perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000040), 0x12b) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100008, 0x0, @perf_config_ext={0x1ff, 0x800000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x1, 0x8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0xc0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0x69, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r1, 0x58, &(0x7f0000000500)}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='svcrdma_decode_rseg\x00', r3, 0x0, 0x6}, 0x18) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000e40)=ANY=[@ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="02"], 0x10) gettid() r4 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r4, 0x84, 0x9, &(0x7f0000000380), 0x98) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB='N-N:N/'], 0x6a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000008071120700000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f}, 0x80) r5 = socket$kcm(0x11, 0x3, 0x0) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000440)={r0, r3}) sendmsg$kcm(r5, &(0x7f0000001480)={&(0x7f0000001340)=@hci={0x1f, 0xc00, 0xe}, 0x80, &(0x7f0000002540)=[{&(0x7f00000006c0)='b', 0x1}], 0x1}, 0x0) 2m55.039261578s ago: executing program 3 (id=841): perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x2, 0x20022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000, 0x3}, 0x0, 0x0, 0x9, 0x9, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x20000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs$namespace(r0, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) r7 = bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000000240)=ANY=[@ANYBLOB="1e00000004000000010000000100000004000000", @ANYRES64=r3, @ANYBLOB="0500"/15, @ANYRES32=r1, @ANYRES32=r6, @ANYBLOB], 0x50) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000001140)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a39484809539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323478a99681cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b304723177d356c46e83efceefd78a2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bd43b5b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebcef5af469abe753314fae31a09c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5a71e0d7696caba172745c7dd919ffb631820420b75b6522c0e21c882c66f4f25ffb6d95e07e068000000000000eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6f0100000000000000f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f8790c95dde218446a1f1eca93bd115e986c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e09d24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868db06fd892d68a547477f8ef686ff0dba7b8c18c94d5a89b0567a851750a35d9cc2217db890d89385fcaa00f0f2e524672e6f4c8bedfd5da5b157709b8265cf511dc5846ab1d85916c4a6b2d1b408575982e11230cbac0a9c6eaa03c945645581f678403c2a936c53ae72940aa92bcf22b82c6bc028e0acdddf9fef595f0f7a9f80c0e4c659ced769ec463d26a81e468846761a8e1efd6a031ab7adc8665e267be0065cc315aa23012423ec8b8492d9b50fa4d8c5891959b761eec6dc988532782fda13239c63737039350db5"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x5e) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r7, &(0x7f0000001600), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYRESDEC, @ANYRES32=0x1, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000049777389100000000000000068f604000000000000000000"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000012c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7, r8}, 0x38) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)=0xfff, 0x12) close(r2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd"], 0xfdef) 2m54.17141481s ago: executing program 3 (id=845): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2f}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x0, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x4, 0xab, &(0x7f0000000140)=""/171, 0x41100, 0x69, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x4, 0x10, 0x0, 0x80000001}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1], &(0x7f0000000340), 0x10, 0x2}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0x7, 0x9, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x7}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x6, 0x1, 0x6, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x4000, 0x2, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0xffffbfffffffff81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{}, &(0x7f0000000880), &(0x7f00000008c0)=r1}, 0x20) 2m48.004382022s ago: executing program 2 (id=695): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x61}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0xac03}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x65, 0x0, 0x0, 0x0, 0x6}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xb, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @exit, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x1, 0x3d, &(0x7f0000000740)=""/61, 0x40f00, 0x10, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x3, 0x0, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xff}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x445f78a2b7d164c5, 0x4, &(0x7f0000000440)=ANY=[@ANYRES64=r1], &(0x7f00000003c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffd2) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002100), 0x48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000900)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x8, &(0x7f0000000000)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}]}, &(0x7f0000000640)='syzkaller\x00', 0x7, 0xf9, &(0x7f0000000080)=""/249}, 0x70) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018123300000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x2b) recvmsg$unix(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}], 0xc8}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x0) syz_clone(0x3001100, 0x0, 0x0, 0x0, 0x0, 0x0) 2m35.759621534s ago: executing program 3 (id=845): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2f}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x0, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x4, 0xab, &(0x7f0000000140)=""/171, 0x41100, 0x69, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x4, 0x10, 0x0, 0x80000001}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1], &(0x7f0000000340), 0x10, 0x2}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0x7, 0x9, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x7}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x6, 0x1, 0x6, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x4000, 0x2, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0xffffbfffffffff81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{}, &(0x7f0000000880), &(0x7f00000008c0)=r1}, 0x20) 2m31.398599819s ago: executing program 2 (id=695): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x61}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0xac03}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x65, 0x0, 0x0, 0x0, 0x6}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xb, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @exit, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x1, 0x3d, &(0x7f0000000740)=""/61, 0x40f00, 0x10, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x3, 0x0, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xff}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x445f78a2b7d164c5, 0x4, &(0x7f0000000440)=ANY=[@ANYRES64=r1], &(0x7f00000003c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffd2) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002100), 0x48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000900)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x8, &(0x7f0000000000)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}]}, &(0x7f0000000640)='syzkaller\x00', 0x7, 0xf9, &(0x7f0000000080)=""/249}, 0x70) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018123300000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x2b) recvmsg$unix(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}], 0xc8}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x0) syz_clone(0x3001100, 0x0, 0x0, 0x0, 0x0, 0x0) 2m17.984202799s ago: executing program 3 (id=845): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2f}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x0, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x4, 0xab, &(0x7f0000000140)=""/171, 0x41100, 0x69, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x4, 0x10, 0x0, 0x80000001}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1], &(0x7f0000000340), 0x10, 0x2}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0x7, 0x9, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x7}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x6, 0x1, 0x6, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x4000, 0x2, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0xffffbfffffffff81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{}, &(0x7f0000000880), &(0x7f00000008c0)=r1}, 0x20) 2m15.099519841s ago: executing program 0 (id=1010): socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="89000000120081ae08060cdc030ec0007f03e3f70000000000e2ffca1b1f0000000004", 0x23}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0xfffffffb) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000540)}, 0x20) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)=ANY=[@ANYRES32=r1, @ANYRES32, @ANYBLOB="000400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000010000000300"/28], 0x50) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000640), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xd, &(0x7f0000000180)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x24}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, @generic={0x1, 0x5, 0x1, 0x5, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @generic={0xc, 0x0, 0x6, 0x1ff, 0x216}], &(0x7f0000000200)='syzkaller\x00', 0x1c9, 0xfa, &(0x7f0000000380)=""/250, 0x41000, 0x7b, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0xa, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x10, 0x7, 0x6f0}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r3, r4, 0xffffffffffffffff, r5, r6], 0x0, 0x10, 0x2}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x31) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x8, 0x100000001}, 0x880, 0x800, 0x0, 0x6, 0x4, 0x3, 0xffff, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r8 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000240)=[0x0], 0x0, 0x0, 0x94, &(0x7f0000000300)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x43, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) r10 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030033000b07d25a806c8c6f94f90624fc60100005000a000200053582c137153e37000c0980fc0b10000300", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r10) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r8, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x50) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x800, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x5}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0xc9b, 0x0, 0x0, 0x41000, 0x40, '\x00', r9, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff, r11, r12], 0x0, 0x10, 0x1ff}, 0x94) r13 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r7, @ANYBLOB="32060000000000000000acf90c6ab84ccb6a00000800000000000000", @ANYRES32=r9, @ANYRES32=r13, @ANYBLOB="00000000000000000300"/28], 0x50) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc70, 0x0, 0x8, 0x0, 0x0, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) 2m14.207403395s ago: executing program 0 (id=1015): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x2, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x4, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x0, @perf_config_ext={0x3, 0x8001}, 0x0, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc038, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x3, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r1}, 0x8) 2m13.848007s ago: executing program 0 (id=1019): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x4110, 0x0, 0x1, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)=0x100008000) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair$unix(0x1, 0x7134b47f08079f9c, 0x0, 0x0) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x1) r1 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair(0x27, 0x5, 0xb4, &(0x7f00000000c0)={0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="1c0000001a007f049e", 0x9}, {&(0x7f0000000140)="03000000fb73fc8040250080f2dc06a9258f2e", 0x13}], 0x2}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@struct={0x8, 0x2, 0x0, 0xf, 0x0, 0xffffffff, [{0xe, 0x0, 0x3}, {0x7, 0x3, 0xfffffffd}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000040)=""/249, 0x46, 0x85, 0x6}, 0x28) ioctl$SIOCSIFHWADDR(r3, 0x8b2b, &(0x7f0000000040)={'wlan1\x00', @random="8dffffff06ff"}) recvmsg$kcm(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000008c0)=""/134, 0x86}], 0x1, &(0x7f0000000980)=""/186, 0xba}, 0x10140) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x1, 0x3, 0x10004, 0x5}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00'}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000ac0)={0xffffffffffffffff, r1}, 0x10) 2m13.353829988s ago: executing program 0 (id=1022): r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x8110, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7a, 0x0, @perf_bp={0x0, 0x2}, 0x14105, 0x2e, 0xfffffbff, 0xa, 0x2, 0x7, 0x6, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = syz_clone(0x160480, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000640)=r2, 0x12) (async, rerun: 32) r3 = socket$kcm(0x29, 0x2, 0x0) (async, rerun: 32) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={@map=0x1, 0x13, 0x1, 0x7, &(0x7f0000000680)=[0x0], 0x1, 0x0, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0], 0x0}, 0x40) (async) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000007c0)={@fallback=r5, r3, 0x30, 0x8, r1, @void, @value=r1, @void, @void, r4}, 0x20) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100108}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r6 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r6, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) (async, rerun: 64) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) (rerun: 64) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f0000000100)=r7, 0x4) (async, rerun: 32) sendmsg$inet(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000cc0)="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", 0x5a1}], 0x1}, 0x4008041) (async, rerun: 32) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYRES8=r6], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r8}, 0x10) (async, rerun: 64) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x7c, 0x4000000}, [@ldst={0x6, 0x3}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x3c) (async) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000006c0)=[{0x0}], 0x1}, 0x4c080) (async) sendmsg$inet(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x10000000}, 0x20045288) (async) sendmsg$kcm(r3, &(0x7f0000000600)={&(0x7f0000000180)=@isdn={0x22, 0xd2, 0xb, 0x7}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000840)="f023d61e10364b474de2eb3ec9421eb832ec721418619e063de62b2a48c05c7f22620e4881a7388b82dcf308707ab8ceaa198e88fed8dd4d92e27c39eda7ab1736163e57b70d20", 0x47}, {&(0x7f0000000080)="1c116808669e7d0d1a7a82380559ad55f33b3e56598074ae0b7b8cb2803b8d23bd4a6a8edc7782b776ed4d283bfe8574b21802a4", 0x34}, {&(0x7f0000000380)="1c3cebf243e2fa14ce9d0c6188a89b3ce9cd55b531fb6d366033249029e2", 0x1e}, {&(0x7f00000003c0)="8bcf77a8e5d370895c95ac814a4c30415d671f1a8ed9407602359c30276d6afb9059b8df6000da953f1511ba0cddcb074b2b17d4124fc723aef9567b785bba3422548c26472a79558bf5bcc459a003f1486f195b2d0ec92e62aea51aaae84d1c0e75963395a02287d5f8f3f1e66c80f963d8887fe67bd413239ba52bd6169edab2c6", 0x82}], 0x4, &(0x7f00000004c0)=[{0x108, 0x0, 0x7, "705bd1ef30d781a4d5f68a8e7bebac2a527c7c49e736803da18ef5a9e6d8911ef3b935ff269353606c4f1ef2bb5c6f7dfd191e3fa1f81bbf689cf49bff5e583babe1d84955780493222b1eacc9f78cea7b0cac671e95e4d42ee489e651e6abce06e6bebab80393afa89425dbe6b11fface805a5b9e0ca420bcaae39f63f0d15bb9c3b47011b157fa84408ab1117c20676045bab8001fef0e32340cc4937210c8568b173bf252ac9f45032f764f655de2c615dde278536e974f4389f615545d0bd132c65bb4ee604f565ea3c6e1f5118e59ce0149b496eb742ae08994abfdc5a17af181968448e294c08cc33c47c2102e7fee11112bf09fe0"}], 0x108}, 0x44000480) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x5f}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) (async, rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x5) 2m13.15542945s ago: executing program 0 (id=1023): perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x55}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2002) socket$kcm(0x2, 0x5, 0x84) socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x100, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x2, 0x922000000001, 0x106) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000100)=r1, 0x4) sendmsg$inet(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000cc0)}], 0x1}, 0x4008041) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 2m12.587670789s ago: executing program 0 (id=1026): r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f0000002800)=[{0x0}, {&(0x7f0000001740)}], 0x2, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x10}, @multicast1}}}], 0x20}, 0x0) (fail_nth: 1) 2m12.587221709s ago: executing program 3 (id=845): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2f}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x0, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x4, 0xab, &(0x7f0000000140)=""/171, 0x41100, 0x69, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x4, 0x10, 0x0, 0x80000001}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1], &(0x7f0000000340), 0x10, 0x2}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0x7, 0x9, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x7}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x6, 0x1, 0x6, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x4000, 0x2, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0xffffbfffffffff81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{}, &(0x7f0000000880), &(0x7f00000008c0)=r1}, 0x20) 2m12.291925673s ago: executing program 32 (id=845): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2f}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x0, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x4, 0xab, &(0x7f0000000140)=""/171, 0x41100, 0x69, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x4, 0x10, 0x0, 0x80000001}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1], &(0x7f0000000340), 0x10, 0x2}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0x7, 0x9, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x7}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x6, 0x1, 0x6, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x4000, 0x2, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0xffffbfffffffff81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_freezer_state(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{}, &(0x7f0000000880), &(0x7f00000008c0)=r1}, 0x20) 2m12.260617854s ago: executing program 33 (id=1026): r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f0000002800)=[{0x0}, {&(0x7f0000001740)}], 0x2, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x10}, @multicast1}}}], 0x20}, 0x0) (fail_nth: 1) 2m12.253392044s ago: executing program 2 (id=695): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x61}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0xac03}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x65, 0x0, 0x0, 0x0, 0x6}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xb, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @exit, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x1, 0x3d, &(0x7f0000000740)=""/61, 0x40f00, 0x10, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x3, 0x0, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xff}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x445f78a2b7d164c5, 0x4, &(0x7f0000000440)=ANY=[@ANYRES64=r1], &(0x7f00000003c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffd2) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002100), 0x48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000900)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x8, &(0x7f0000000000)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}]}, &(0x7f0000000640)='syzkaller\x00', 0x7, 0xf9, &(0x7f0000000080)=""/249}, 0x70) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018123300000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x2b) recvmsg$unix(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}], 0xc8}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x0) syz_clone(0x3001100, 0x0, 0x0, 0x0, 0x0, 0x0) 2m12.123960736s ago: executing program 34 (id=695): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x61}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0xac03}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x65, 0x0, 0x0, 0x0, 0x6}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x4}, @map_fd={0x18, 0xb, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @exit, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000000600)='syzkaller\x00', 0x1, 0x3d, &(0x7f0000000740)=""/61, 0x40f00, 0x10, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000007c0)={0x5, 0x3, 0x0, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xff}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x445f78a2b7d164c5, 0x4, &(0x7f0000000440)=ANY=[@ANYRES64=r1], &(0x7f00000003c0)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', r2, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffd2) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002100), 0x48) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000900)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x8, &(0x7f0000000000)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}]}, &(0x7f0000000640)='syzkaller\x00', 0x7, 0xf9, &(0x7f0000000080)=""/249}, 0x70) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018123300000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x2b) recvmsg$unix(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}], 0xc8}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x0) syz_clone(0x3001100, 0x0, 0x0, 0x0, 0x0, 0x0) 1m29.374695331s ago: executing program 4 (id=1188): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x0, 0x4, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b06d25a806c8c6f94f90424fc600400037a0a000900050282c137153e370e0c1180fc", 0x29}], 0x1}, 0x0) 1m10.931680905s ago: executing program 4 (id=1188): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x0, 0x4, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b06d25a806c8c6f94f90424fc600400037a0a000900050282c137153e370e0c1180fc", 0x29}], 0x1}, 0x0) 53.656284903s ago: executing program 4 (id=1188): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x0, 0x4, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b06d25a806c8c6f94f90424fc600400037a0a000900050282c137153e370e0c1180fc", 0x29}], 0x1}, 0x0) 37.709890329s ago: executing program 4 (id=1188): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x0, 0x4, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b06d25a806c8c6f94f90424fc600400037a0a000900050282c137153e370e0c1180fc", 0x29}], 0x1}, 0x0) 22.302949309s ago: executing program 4 (id=1188): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x0, 0x4, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b06d25a806c8c6f94f90424fc600400037a0a000900050282c137153e370e0c1180fc", 0x29}], 0x1}, 0x0) 6.365200036s ago: executing program 4 (id=1188): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x0, 0x4, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b06d25a806c8c6f94f90424fc600400037a0a000900050282c137153e370e0c1180fc", 0x29}], 0x1}, 0x0) 3.743038594s ago: executing program 6 (id=1912): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x210e, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x32, 0xfffffbff, 0x3, 0x2, 0x0, 0xfffa, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) recvmsg$unix(r0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x1a3803, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7daa00000000000071101b00"/23], &(0x7f0000000480)='syzkaller\x00'}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) r3 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x65, &(0x7f0000000000), 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{0x1}, &(0x7f0000000040), &(0x7f00000000c0)='%pS \x00'}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0x20, &(0x7f00000004c0)={&(0x7f00000007c0)=""/197, 0xc5, 0x0, 0x0}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x26e1, 0x0) 3.091845714s ago: executing program 7 (id=1920): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x0, 0x4, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xf6) 3.055230405s ago: executing program 1 (id=1921): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="5c00000015006b03000000d86e6c1d0002847ea622fb56450000822be3f58e76110165f450e71b0075e3002500028d459e37000f0000000000bf9367b47e51f60a64c9f4d4938037e786a6d0bdd700"/92, 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x22}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x70) 2.957873986s ago: executing program 7 (id=1923): perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000780), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x800, 0x0, 0xfffffffe, 0x2, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x82d7) r2 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002380)="1b0000001af87e029e5d1683c28f7b33000000000000eb291a6b00", 0x1b}], 0x1}, 0x20000000) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000006000000000000000500000095000000000000009fb010fd59d9d2c6d967a1e8f552aeb0fd9c43a4fd88850d711ada1192d66a6bac9e9e78e33f3ad9618ed6c0a853621b97838b31e349297c61abef89783aa7ac7d6de3803b1402b547769f5951485b088c74d2"], &(0x7f0000000300)='GPL\x00', 0x5, 0x6f, &(0x7f0000000580)=""/111, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x2, 0x9, 0x9, 0x319}, 0x10, 0x15212, 0xffffffffffffffff, 0x7, &(0x7f0000000640)=[r1, 0x1, r0, r0, r0], &(0x7f0000000700)=[{0x4, 0x1, 0x2, 0x2}, {0x0, 0x3, 0x9, 0xc}, {0x5, 0x3, 0x9, 0x5}, {0x0, 0x2, 0x6, 0xc}, {0x1, 0x4, 0xa, 0xb}, {0x1, 0x3, 0x5, 0x6}, {0x1, 0x5, 0xc}], 0x10, 0x6}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r3, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e030023000b02d25a806f8c6394f91d24fc60040f03", 0x17}], 0x1}, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) r5 = socket$kcm(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r5, 0x6, 0x10, &(0x7f0000000200)=r7, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000720000001801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffe1) write$cgroup_subtree(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="33fe0000180091c8b14a0778a8123d181d"], 0xfe33) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x0, 0x4, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8942, &(0x7f0000001f40)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\x06\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') r10 = openat$cgroup(r8, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r10, &(0x7f00000001c0)='cpuset.cpu_exclusive\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x30]}}, &(0x7f0000000240)=""/106, 0x1b, 0x6a, 0x1, 0xb99d, 0x10000, @value=r7}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405030000000000611052000000060063c60700000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xf7}, 0x39) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 2.650488201s ago: executing program 1 (id=1924): r0 = socket$kcm(0xa, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020692500000000000020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072000000850000005000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001b40)={r2, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x6) r3 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r3, 0x6, 0x4, &(0x7f0000000200)=r3, 0x21) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000003100)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8b04, &(0x7f0000000040)={'wlan1\x00', @local}) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000180)=@in6={0xa, 0xce20, 0x0, @mcast2}, 0x80, 0x0}, 0x0) 2.604975472s ago: executing program 5 (id=1925): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r1}, 0x8) 2.604382842s ago: executing program 6 (id=1926): socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x14869}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100108}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x400000002, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.time\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, &(0x7f0000000000)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8918, &(0x7f0000000000)={r1}) 2.483503843s ago: executing program 5 (id=1927): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8f"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x4b, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f0000000000)) close(r3) mkdirat$cgroup(r3, &(0x7f0000000040)='syz1\x00', 0x1ff) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) 2.482909333s ago: executing program 6 (id=1928): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030033000b63d25a80648c2594f91224fc60100c214002000003050582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x43cd, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x800) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000380), 0x2, 0x0) r4 = openat$cgroup_freezer_state(r3, &(0x7f0000002b00), 0x2, 0x0) close(r4) r5 = getpid() perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_bp={&(0x7f0000000200), 0xe}, 0x16185, 0x2e, 0xfffffbff, 0x1, 0x2, 0x2000, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) unlink(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x3, 0x10) 2.290570466s ago: executing program 1 (id=1929): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x9, 0x93594, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x5, 0x100000001}, 0x889, 0x800, 0x0, 0x7, 0x4, 0x3, 0xffff, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x34, &(0x7f0000000040), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x42}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001b40), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x47, 0x0}}, 0x3d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0xc, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x7, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_pressure(r3, &(0x7f0000000180)='io.pressure\x00', 0x2, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfe3a) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 2.078818899s ago: executing program 6 (id=1930): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'hsr0\x00', 0x2}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d0000008500000050"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000980)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="180000006a00810200afef3a0b04a2377caf604bf96b1324", 0x18}], 0x1}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r3, &(0x7f0000000100), &(0x7f0000000000), 0x2}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{0x1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)=r1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0], 0x0, 0x25, &(0x7f0000000640)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0x3b, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000700)=r7, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x1d, 0x3cb, 0x4, 0x5, 0x40000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2}, 0x50) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) close(r9) ioctl$SIOCSIFHWADDR(r9, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0xb}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000000400000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000085000000a000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="12000000020000000400000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r13}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r12}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1b, 0x1f, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_fd={0x18, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x400}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @generic={0x7, 0x1, 0x0, 0xffc7, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x10001}]}, &(0x7f0000000480)='GPL\x00', 0x6, 0x57, &(0x7f00000004c0)=""/87, 0x0, 0x0, '\x00', r6, @fallback=0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, r7, r1, 0x7, &(0x7f0000000940)=[r8, r9, r10, 0x1, r11, r13, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x0, 0x3, 0x6, 0xa}, {0x5, 0x2, 0xb, 0x8}, {0x3, 0x2, 0xe, 0x3}, {0x4, 0x1, 0xe, 0x1}, {0x5, 0x5, 0xf, 0x6}, {0x4, 0x1, 0x3, 0x4}, {0x5, 0x1, 0xf, 0xc}], 0x10, 0x7}, 0x94) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r14, 0x0, 0xe40, 0x0, &(0x7f00000000c0)="5cdd3086ddffff6633c9bbac88a8862608dffd00139fb7a884bdfc14f4870800", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x9, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x61, 0x10, 0x30}, [@ldst={0x5, 0x0, 0x2}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x22) 1.996105861s ago: executing program 7 (id=1931): perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x50) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0x40047451, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x82, 0x1, 0xfe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b33, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0}, 0x4400, 0x2, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000080)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80800, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x5, 0x4, &(0x7f0000000d80)=@framed={{0x18, 0x8}, [@call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000c80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x4, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000098b10000000000000000000005000200000000008500000000ee210085000000000000000500feff00000000956a2d74bf00"], &(0x7f00000003c0)='GPL\x00', 0x5, 0xff9, &(0x7f0000000a80)=""/4089, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000280)={0xffffffffffffffff, r3, 0x0, r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000", @ANYRES32, @ANYBLOB="0000000002000000b705000008000000850000005e00000095", @ANYRES16], &(0x7f0000000300)='GPL\x00', 0x2, 0x100a, &(0x7f0000002500)=""/4106}, 0x94) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 1.890392962s ago: executing program 1 (id=1932): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8264, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10320, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x24, 0x2, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x2}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 1.827361923s ago: executing program 6 (id=1933): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x0, 0x4, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) (fail_nth: 7) 1.547636967s ago: executing program 5 (id=1934): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000004000000020000000000000f0400000000005f"], 0x0, 0x28}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x4, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x1}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r1, 0x3, '\x00', 0x0, r0, 0x3, 0x80}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x9, 0x2, 0x7, 0x6, 0x0, 0x3, 0x80210, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0x4}, 0x201a, 0x6, 0x9, 0x9, 0xe62d, 0x6, 0x9, 0x0, 0x400, 0x0, 0x77c1543a}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffa3}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0x8, 0x0, r2, 0x8000, '\x00', r3, r0, 0x5, 0x3, 0x5}, 0x50) 1.545016537s ago: executing program 1 (id=1935): socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x14869}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100108}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x400000002, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.time\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, r2}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, &(0x7f0000000000)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8936, &(0x7f0000000000)={r1}) (fail_nth: 7) 1.270179881s ago: executing program 5 (id=1936): r0 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x3a, 0x0, 0x0) 1.171102673s ago: executing program 5 (id=1937): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x210e, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x32, 0xfffffbff, 0x3, 0x2, 0x0, 0xfffa, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) recvmsg$unix(r0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x1a3803, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7daa00000000000071101b00"/23], &(0x7f0000000480)='syzkaller\x00'}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) r3 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x65, &(0x7f0000000000), 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{0x1}, &(0x7f0000000040), &(0x7f00000000c0)='%pS \x00'}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0x20, &(0x7f00000004c0)={&(0x7f00000007c0)=""/197, 0xc5, 0x0, 0x0}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x26e1, 0x0) 839.142308ms ago: executing program 7 (id=1938): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r1}, 0x8) 775.486979ms ago: executing program 6 (id=1939): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000003080)=ANY=[@ANYBLOB="850000002200000007000000000000089500000000000000e26c9bd1a6361b80cdd64bdf00000000000869045aac0000659f55df08f9b90788ff7f00000010000029c21ebbcde61d8ab5920aef6c3e007fe61241638962cf0b89ef506cfd3f1d4163d3cfca3733b30070a7cf53021a9554328a702688f92b6b71569d65e33d46f8d8ae24ba69c657afac04379cb536008c219991704f11c5a01ba62ed8f2c6a503dd1b1d076f03b0f917c766f3a7598bbc00feb3bc8e88f79df517b37b56bcbc290080000000000000e675458a43b8a8935bf9cf0be7d0aeaac41405e341d13d244359718ac3dad595712a4051bb6cf826ab757193fc093b8b3353fbbb278d19000000000000007b61805ed430ef06000000000000001e93f640f159320c8b088f4d64977b2eb312d4967aff9e4c14c66c90000054ed82c7cba4c81f91d6dfed18767bf0df584b4b6c4204df411f921e3aa02a67dd324b8176020e9c024751df38c05727f82c92046bfe64babb6d7ba86526b7886a0c2481c5812812a6fa3fca3758cbd8c32b25c28be225bd1f16297baa065f5bf96330fad0aaa4388c06c0eb2ecdf829af9577fcd868cc269b740000b777d73a63246ce6f0467167626329ab91df7a13d9ec9a64e7f6b56aeab8c38f69a213c96e2d2ad7978c9d721c230f27e7025d576535198742d403ec43572d7d0baf00e882617b260627805ca44200335ea4363066944d0aa6feb9705b09ba40d4642519281151f875cbf13a582f90ad719f0eccf02a473dd508a16138904933689ea6ee02412064730700aeff2b69c2f2bf6f691c3560e068743ae8e8771280dac7fd8fdc3f7a35ea352e35753c59ebc1bd27ab6603e6afb1b3f057fbb7ed3aabe702b3c6301d3f5c295d1d69d1541d0e64631c95d6c0999e27e8d1a58f6a00f19102d2bfaf53f25a45637b1c577ae50c4c56d9abc40c64a20c14ff0b1bf4d23fe07ae90f503ba9c64bf89b26e7d8d70710b04f9ece69023acadbb4582272e5b3a0429a5675e5a9554de54945d9a270180e0545b0c824ad36f7cc8be12b3874d5a19349b0ede845e9ece24d546d3af1bae069b89f6ecf2aabb17eb1840bc8e0ed1dd8b9b7eeaf32a185d8fc9a28c6b8e00250a7f2eeb756eadafe20bbc616bc44b347abc8caf722b2c3b06884c1d1690f23b06fa4541bb2a81073b452764f04bd39008b65ee222cf697ac21b087548e9708dffaff2859e973b1e88668c8022cc6dac8548167e5798ec9c7d288a7fa7749f07513187cd8f060abbbc5e37dd1be3aab927be1b409be733b7408534e5b0951e9ecfd0a1c77e3a29be4c4093330124615056e3ce0ce6ac91b1242d3bb2e787a186dc2ec284d60e9d8a03884a22eeaa1efa497ee88c6cb565b164a260afb5157e392b1ebb1a4d4f992011ecbac4a0a6df5bdc6f7994a422bb2761edd2d8f20f5f879a88f89d48b8314f862585e4b7a9d6a6681f40e8b82cc6555dcdb951d164cc9a70e640ac8974faa2587a6e3af3b9458f7d4b4077b3002536b10ea24d73307a33090c4c270909a5322eac32cb175e68fa83457b21465c08c02c0c714c2862ddbe567755f05a1e671328d160d3752345ca1db6e74c720e42afca982ba6befd96c5575f1e88f87ff6606301c0000000000000000000000000000000000000004d0d54b4caf78018766cdb971e8b168d4763c21181f00000003d4e1d842caf457797f93db93e4f38a9dbd79f6bf5dc40b55fdbf9b856665061b2e2924f27eb2d2b5a181ccfd9eeb11dec165b6f12433f00bb06124041ffdcdcdc91f3b3b76635a689c9249cf69bcae65e9f2cc9a5129e385b883c56026d83520395b7d511f607cf2f899c7b1c75e2192f775d72247167285857588ace1115fbebfe63c16b84cf7036d41c493a63c09f2ce46c1f5995c2d7fe58c15e64bb4cb7e7f336cc22fa1ea1363bce375bd3d579be1dddb08ed5147b629e4b3f0e65783ee5e20d9270802f2a7500738bf356131ca53e9d7ba8d486fb26252d684b84fa24639089064ca7b93057c041f12d544dab4d24a4f952b4f265a69ba279929959991b7ac63786055b3c029a0e8b6e4c26497c029bb61462623a58556cd62844d4d23cc738ee5b36c71d2c010b089251d5806000b1ade92dd9f441468967c052aecd9de817394eb580240d556d0f0b4b55d06670597991f37ddc4fa19a6369d5bf76c474633a337f676ad255869881da5cadcf49ce9188129cc978977f87b32bd49457536430ffbd3e01e67ff087644f52fcf0a3c732b0586cb87972c43d2616bf4e521dc3126bf1760243d51a197d3ecfd74bd625e9f496175cfeaaa020817d33d513f3e97854ea76e04e96a8639a297871485a8609f8ca842b3321932c4d9e224a0cec5946cec9e359fd3687415cad5fb8c678136f36d9f781fade9f2469477748f4dfa0f56c3b5a620fc84e1c735647895713cbcea57b2277831f8f633f0d29371e645e5544e57010a9b76457f6ad73231a9f31f6bbb1b95248aeda5a9df9dea643a792bb0910e45fce298ab0a0298fc33a423e860d5b308d7849381b294106af25f15fec047d5b844a99f36e342165df728e381b48c20e0900f8d265157467d3494f2b96acf060f74084760d226f50edb115c2e075f3c663a4b4169b900fa0a13cf796e0d7a9dad86953c13ed6241206d68ae194c64c491de6a531e9bd45abe705f07000a82ccd41a2c1b9d5dd8bf6c28653eb84f117e476e052a9db790e0a71dac9d8b343efebdc026860000000000000000000000000000aad579302085dfdf75bea24798c680b3de341e3bd57543bf74fd58bcebdbb883c743ed43ba7f540f2c4e0310c21e7deff9e45b8bd2cf65bb584091b8e80e34b3e59185fe32d1d73dd4f62712a39b1366c71420b339ec1295f79b1516723b6b80a7e99e5aa6536982c02275fc53fa3ef14d9fccb05f9c4e69a3af0fde863af2d9a0f8a94fc571b0ab4ad714f41fa4ee0bf14a8b44e3c41a3125be95e4b23d5f05395852761bfaebe0db979d5f3991d826cc74542b85cfd0dba66bc93cfd79178ab0b79fa3b29ff9c19e0424513c91980187c9d94b8354337a1fc782505db900c47d83bd49276cfe6e242ba8365b1ea4598a21f50f5415a70990b5bb4a1f6bd8acdf2c7da3d648754767089c9b5ceb556fafa3cc5afd2f3e9a62a90262a76ff89a2751b59a744f0d3f36ca503357daa3e29ce6f357dc1e4839277d003e93fdbb955e1a1302a76aea7e73835094fb15464e94e814c77c293121d0433e80d444c4ca17abaf32b521d8686666055da023aef9c8df3e80d2ed640ed10aa19a036dcef172dbd3b3600b69d7b90c6222e167d7c76059f2b5f3b3004e8a20d1f6612efeb629573be97aa949c6016e7e56283e84986aaa4fc8a098708ebe36f377ada63d9b464c39342e0682549862de3ec75e7b031bc49f341a21417fb6375e8701481b59d1722c836961804666801678eb25750b520bf1615a4bbf30aa74d60ec6b657f2dd298b0419da43fc708a60c94a7ff2fd6a2d08005ad73c9e2d6143d2857be8fb3f12bfa6628bccb153e39172d07563d6a1dc75c347c08060304f091230bd74b49ecdd13bf480db3984622a167c8603b8c501280059a7b6123c8f8cd217f64eccc2dffe4f3a1e8c9a96a13d8126f3ea26779fbd0069d729a7764d4ddd7d9d820b0de2530969362b94b974678527f5bac7eb8d6e321b2be0b2f7534634a5ecd1248d7ad7e8e03163e92e9f1d620e28597bd881eea0981e8adfd70b670b0763ce9226f7c3e156b353e22fdea6942b577bbc539aab23cbd46bdd0ea1e67140c759f208c12dc57f3100000000000000e4965fcb6c2749955eac9476687e63b41c6282bbcb0c3d8b0c9493a3a5f6d879d7257b4b68dc7cac3d9d5f5bbe937c501866ee4042b250e516ec074559e1e551167138766eeecb6941e8305d9cde1800c821536f9d25bd14163890842a08135bdb7a90db630b18f099855a7d9de65c80fa71ff90e873361d0e11a7dfebe56ffb2000b711a0b7914d6351ff60593e48af60e1ffecba7cd6f8ab662eb3c8f3164139e994d6a706afb92722595d649a04f1ff64e5634e7cb9106173a96bf47f7085e7eecdfdc1b6507b851c4ba43312726cfec58dedece1355a087c1b60882713a6161914f09267e2ce8aa886b380add5cd92e185d345c9b2933a78a4215133e8e7247fa444aee30bfb6c17ef537fba43aad323f552c01e17514d5db387e4bf9341ccf5931fc75350f8dcef3ed3e74d674865249b879466f0e3cf0dc9e3d8720ea261e6996b844501e374a0e9878c1d02fd3d6e2ae5d7677892d7a5cdf4b7fa8f315b41552d07495f034e1fa0a2c9a34b7f66638e775dacb33e9b5cd3f4193bdebb7e86090dd265ee2b3ca9bd32d19ef229a050e910263d916670d8006067f5c0a1d8219b4a74b6092656f3b96f060000005ca3eca5d6295a1c11be907fad3bf9ccdf9898a084bbcc0a3714691c6c28fc34c44f9a46d6caf3b93d5d9ad8e3a25d34da57b203af917f5359952468fcddbf43d8fd1add972fd5d361c5be3e8b3280bbfa97e9826163537c99ff461123a1d9f93880feb5f953217f1e633bfb221a7822513278c36abcb6a4009e5037b3f56f9172bd70331817862c5e129d830d4f13e9793dad49b6bf286d2a539d089393d481931735a544f4e86b51a91106ce86d278a0712eab917d843ecc7d031e99d230689210e5afbcbb0a6cff33b40e7b637a8171d7b28fcaee54bb0fb7e2dd92c6cf2130f9fa4482512ae356c5907533108113a9a98b0508e4041df8e99b4136a66f58a6e91e2017dc7e095e8e4776d396797e089e9b42fdee33e76c28a636893510ed71166086bb4c1f3363dfd0abf0b2ea8ceba68c7d9a22a8342059862985d987083d80761bd699c3ee77473263a77ea65eac8a4c3b6b87f399575a15a2db143f6aac363644fd45372d6f43baebc7c3547780d1d079e225962733e0c0d3f364cbe9bcec7caaa8d372da63b213d4554e9ced54c2d59a97b814f1d700"/3584], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x103a, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2a3}, 0x48) r1 = socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x408a62, 0x0) socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$kcm(0x23, 0x5, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb7020000080000001821", @ANYRES32=r2, @ANYBLOB], &(0x7f0000000300)='GPL\x00', 0x2}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000011008108090f9becdb4cb92e264831371600000069bd6efb2502eaf60d002700020400bf050005001201", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = getpid() sendmsg$unix(r3, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [r3]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0x0, 0xee00}}}], 0x38, 0x20000900}, 0x0) recvmsg(r4, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1d, 0x3, 0x1, &(0x7f00000014c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x3a, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a00000000072feb311ccd3ec8a755c1e1380081ffad008036e8d50000ff010000001400000500242f09880bd320d98a61a90057e9bf", 0x0, 0x401, 0x0, 0x327, 0xaf, &(0x7f00000011c0)="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", &(0x7f0000000140)="b33620dad49cc786c86a5c5444e76c2a1ef9224fb91083d2ba4368e98a14467703e9ee585196fa95320bd53c6a76ad443b81dc833b22816aeaafb4597c06919ecf7e5ea4d0a8995feaaf9a9feb0c4b5277398049a2f5475f6ceb26bd128189f4b1b3c662d3d1630717791de0cdac3ce6e01c5719b670da5ded7dfa9dda53f04ad151cb952d708eaae9e983dcfab36b2dac3f3fe85e1d86b3d73d4879fb11cfac51f3cb669a5007074be302b33ebb30", 0x1, 0xfffffffd}, 0x50) 774.866689ms ago: executing program 1 (id=1940): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030033000b63d25a80648c2594f91224fc60100c214002000003050582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x43cd, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x800) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000380), 0x2, 0x0) r4 = openat$cgroup_freezer_state(r3, &(0x7f0000002b00), 0x2, 0x0) close(r4) r5 = getpid() perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_bp={&(0x7f0000000200), 0xe}, 0x16185, 0x2e, 0xfffffbff, 0x1, 0x2, 0x2000, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) unlink(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x10, 0x3, 0x10) 706.28287ms ago: executing program 7 (id=1941): r0 = socket$kcm(0xa, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x1, 0x4, 0x6d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3ffff}, 0x0, 0x4000000000000200, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x3}, 0x6000, 0x0, 0x4, 0x6, 0x0, 0x2000000a, 0xfffc, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0xd) r4 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x29, 0x23, &(0x7f0000000040), 0xcf) sendmsg$kcm(r4, &(0x7f00000001c0)={&(0x7f0000000a00)=@in6={0xa, 0x4e23, 0xe, @empty, 0x7}, 0x80, 0x0}, 0x48084) r5 = socket$kcm(0xa, 0x2, 0x88) sendmsg$inet(r5, &(0x7f0000000800)={&(0x7f0000000640)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0x18, 0x0, 0x34, {[@rr={0x7, 0x3}, @ra={0x94, 0x4}]}}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e27, 0x0, @mcast1}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x5d8, 0x29, 0x3, "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"}], 0x5c8}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x6d}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x800005, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 582.340191ms ago: executing program 7 (id=1942): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x9, 0x93594, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x5, 0x100000001}, 0x889, 0x800, 0x0, 0x7, 0x4, 0x3, 0xffff, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x34, &(0x7f0000000040), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x42}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001b40), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x47, 0x0}}, 0x3d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0xc, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x7, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_pressure(r3, &(0x7f0000000180)='io.pressure\x00', 0x2, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfe3a) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 0s ago: executing program 5 (id=1943): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x0, 0x4, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) setsockopt$sock_attach_bpf(r0, 0x84, 0x7b, &(0x7f0000000000), 0x8) sendmsg$inet(r0, &(0x7f0000000380)={&(0x7f0000000100)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000240)="b2", 0x34000}], 0x1}, 0x80) socket$kcm(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) r2 = socket$kcm(0xa, 0x2, 0x88) gettid() sendmsg$kcm(r2, &(0x7f0000000340)={&(0x7f00000002c0)=@in6={0xa, 0x4e22, 0x0, @dev}, 0x80, 0x0}, 0x200ce0c0) sendmsg$inet(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000440)=[{0x0}], 0x1}, 0x20000081) kernel console output (not intermixed with test programs): ? vtime_user_exit+0x2dc/0x400 [ 318.604863][T10364] __x64_sys_bpf+0x78/0x90 [ 318.609295][T10364] do_syscall_64+0x4c/0xa0 [ 318.613725][T10364] ? clear_bhb_loop+0x30/0x80 [ 318.618431][T10364] ? clear_bhb_loop+0x30/0x80 [ 318.623118][T10364] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 318.629024][T10364] RIP: 0033:0x7f7bb52b3929 [ 318.633451][T10364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 318.653089][T10364] RSP: 002b:00007f7bb311b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 318.661515][T10364] RAX: ffffffffffffffda RBX: 00007f7bb54dafa0 RCX: 00007f7bb52b3929 [ 318.669495][T10364] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 318.677474][T10364] RBP: 00007f7bb311b090 R08: 0000000000000000 R09: 0000000000000000 [ 318.685454][T10364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.693434][T10364] R13: 0000000000000000 R14: 00007f7bb54dafa0 R15: 00007ffcd2876fe8 [ 318.701431][T10364] [ 318.822027][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 318.852110][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 318.910171][T10090] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 319.097245][T10387] FAULT_INJECTION: forcing a failure. [ 319.097245][T10387] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 319.137455][T10387] CPU: 0 PID: 10387 Comm: syz.7.1624 Not tainted 5.15.186-syzkaller #0 [ 319.146087][T10387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 319.156178][T10387] Call Trace: [ 319.159471][T10387] [ 319.162431][T10387] dump_stack_lvl+0x168/0x230 [ 319.167133][T10387] ? show_regs_print_info+0x20/0x20 [ 319.172354][T10387] ? load_image+0x3b0/0x3b0 [ 319.176888][T10387] ? __lock_acquire+0x7c60/0x7c60 [ 319.181926][T10387] ? tomoyo_path_number_perm+0x48f/0x5d0 [ 319.187578][T10387] ? do_syscall_64+0x4c/0xa0 [ 319.192182][T10387] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 319.198271][T10387] should_fail+0x38c/0x4c0 [ 319.202720][T10387] _copy_from_user+0x2e/0x170 [ 319.207511][T10387] bond_do_ioctl+0x1ae/0x8c0 [ 319.212124][T10387] ? bond_eth_ioctl+0x200/0x200 [ 319.217022][T10387] bond_siocdevprivate+0x13c/0x320 [ 319.222152][T10387] ? rcu_lock_release+0x20/0x20 [ 319.227451][T10387] ? bond_do_ioctl+0x8c0/0x8c0 [ 319.232255][T10387] ? dev_ioctl+0x5e8/0xe50 [ 319.236683][T10387] ? __mutex_lock_common+0x431/0x2390 [ 319.242073][T10387] ? full_name_hash+0x8e/0xe0 [ 319.246776][T10387] dev_ifsioc+0xaf5/0xe70 [ 319.251134][T10387] ? dev_ioctl+0xe50/0xe50 [ 319.255573][T10387] ? full_name_hash+0x8e/0xe0 [ 319.260375][T10387] dev_ioctl+0x5f9/0xe50 [ 319.264633][T10387] ? get_user_ifreq+0xc7/0x170 [ 319.269421][T10387] sock_ioctl+0x67b/0x6e0 [ 319.273772][T10387] ? sock_poll+0x3f0/0x3f0 [ 319.278216][T10387] ? bpf_lsm_file_ioctl+0x5/0x10 [ 319.283167][T10387] ? security_file_ioctl+0x7c/0xa0 [ 319.288302][T10387] ? sock_poll+0x3f0/0x3f0 [ 319.292742][T10387] __se_sys_ioctl+0xfa/0x170 [ 319.297362][T10387] do_syscall_64+0x4c/0xa0 [ 319.301798][T10387] ? clear_bhb_loop+0x30/0x80 [ 319.306487][T10387] ? clear_bhb_loop+0x30/0x80 [ 319.311185][T10387] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 319.317095][T10387] RIP: 0033:0x7f7bb52b3929 [ 319.321547][T10387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 319.341314][T10387] RSP: 002b:00007f7bb311b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 319.349761][T10387] RAX: ffffffffffffffda RBX: 00007f7bb54dafa0 RCX: 00007f7bb52b3929 [ 319.357742][T10387] RDX: 0000200000000080 RSI: 00000000000089fb RDI: 0000000000000004 [ 319.365725][T10387] RBP: 00007f7bb311b090 R08: 0000000000000000 R09: 0000000000000000 [ 319.373704][T10387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 319.381699][T10387] R13: 0000000000000000 R14: 00007f7bb54dafa0 R15: 00007ffcd2876fe8 [ 319.389699][T10387] [ 319.555466][T10396] FAULT_INJECTION: forcing a failure. [ 319.555466][T10396] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 319.619173][T10396] CPU: 0 PID: 10396 Comm: syz.6.1629 Not tainted 5.15.186-syzkaller #0 [ 319.627489][T10396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 319.637573][T10396] Call Trace: [ 319.640960][T10396] [ 319.643910][T10396] dump_stack_lvl+0x168/0x230 [ 319.648625][T10396] ? show_regs_print_info+0x20/0x20 [ 319.653887][T10396] ? load_image+0x3b0/0x3b0 [ 319.658455][T10396] ? __lock_acquire+0x7c60/0x7c60 [ 319.663613][T10396] should_fail+0x38c/0x4c0 [ 319.668073][T10396] _copy_from_user+0x2e/0x170 [ 319.672878][T10396] bpf_test_init+0x136/0x1b0 [ 319.677507][T10396] bpf_prog_test_run_skb+0x181/0x1180 [ 319.682911][T10396] ? __fget_files+0x40f/0x480 [ 319.687710][T10396] ? cpu_online+0x60/0x60 [ 319.692074][T10396] bpf_prog_test_run+0x31e/0x390 [ 319.697061][T10396] __sys_bpf+0x535/0x670 [ 319.701343][T10396] ? bpf_link_show_fdinfo+0x310/0x310 [ 319.706837][T10396] ? vtime_user_exit+0x2dc/0x400 [ 319.711814][T10396] __x64_sys_bpf+0x78/0x90 [ 319.716260][T10396] do_syscall_64+0x4c/0xa0 [ 319.720708][T10396] ? clear_bhb_loop+0x30/0x80 [ 319.725428][T10396] ? clear_bhb_loop+0x30/0x80 [ 319.730141][T10396] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 319.736066][T10396] RIP: 0033:0x7f7721f25929 [ 319.740513][T10396] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 319.760157][T10396] RSP: 002b:00007f771fd8d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 319.768608][T10396] RAX: ffffffffffffffda RBX: 00007f772214cfa0 RCX: 00007f7721f25929 [ 319.776616][T10396] RDX: 0000000000000023 RSI: 0000200000000240 RDI: 000000000000000a [ 319.784965][T10396] RBP: 00007f771fd8d090 R08: 0000000000000000 R09: 0000000000000000 [ 319.792971][T10396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 319.800976][T10396] R13: 0000000000000000 R14: 00007f772214cfa0 R15: 00007fff4a0f6708 [ 319.808674][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 319.808996][T10396] [ 319.832915][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 319.903522][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 319.923225][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 319.960190][T10090] device veth0_vlan entered promiscuous mode [ 319.978852][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 320.000828][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 320.046688][T10090] device veth1_vlan entered promiscuous mode [ 320.129482][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 320.145197][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 320.167444][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 320.181779][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 320.194397][T10090] device veth0_macvtap entered promiscuous mode [ 320.230095][T10090] device veth1_macvtap entered promiscuous mode [ 320.348075][T10090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 320.374377][T10090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 320.387750][T10090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 320.398435][T10090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 320.408604][T10090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 320.422797][T10090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 320.436777][T10090] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 320.596862][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 320.622021][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 320.641820][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 320.665233][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 320.676006][T10438] FAULT_INJECTION: forcing a failure. [ 320.676006][T10438] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 320.705464][T10438] CPU: 0 PID: 10438 Comm: syz.1.1638 Not tainted 5.15.186-syzkaller #0 [ 320.706167][T10090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 320.713769][T10438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 320.734260][T10438] Call Trace: [ 320.737570][T10438] [ 320.740541][T10438] dump_stack_lvl+0x168/0x230 [ 320.745285][T10438] ? show_regs_print_info+0x20/0x20 [ 320.750527][T10438] ? load_image+0x3b0/0x3b0 [ 320.755162][T10438] ? __lock_acquire+0x7c60/0x7c60 [ 320.760231][T10438] should_fail+0x38c/0x4c0 [ 320.764772][T10438] _copy_from_user+0x2e/0x170 [ 320.769482][T10438] kstrtouint_from_user+0xbe/0x200 [ 320.774002][T10090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 320.774715][T10438] ? kstrtol_from_user+0x260/0x260 [ 320.789688][T10438] proc_fail_nth_write+0x85/0x1f0 [ 320.794910][T10438] ? proc_fail_nth_read+0x210/0x210 [ 320.800262][T10438] ? common_file_perm+0x171/0x1c0 [ 320.805330][T10438] ? proc_fail_nth_read+0x210/0x210 [ 320.810566][T10438] vfs_write+0x300/0xd00 [ 320.814688][T10090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 320.814846][T10438] ? file_end_write+0x250/0x250 [ 320.830731][T10438] ? __fget_files+0x40f/0x480 [ 320.835456][T10438] ? mutex_lock_nested+0x17/0x20 [ 320.840427][T10438] ? __fdget_pos+0x2bf/0x370 [ 320.845053][T10438] ? ksys_write+0x71/0x250 [ 320.849506][T10438] ksys_write+0x14d/0x250 [ 320.853872][T10438] ? __ia32_sys_read+0x80/0x80 [ 320.855886][T10090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 320.858660][T10438] ? lockdep_hardirqs_on+0x94/0x140 [ 320.858691][T10438] do_syscall_64+0x4c/0xa0 [ 320.858712][T10438] ? clear_bhb_loop+0x30/0x80 [ 320.882895][T10438] ? clear_bhb_loop+0x30/0x80 [ 320.887613][T10438] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 320.890479][T10090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 320.893537][T10438] RIP: 0033:0x7f373932d3df [ 320.893561][T10438] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 320.926298][T10090] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 320.928083][T10438] RSP: 002b:00007f3737154030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 320.928114][T10438] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f373932d3df [ 320.954579][T10438] RDX: 0000000000000001 RSI: 00007f37371540a0 RDI: 0000000000000006 [ 320.956520][T10090] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 320.962580][T10438] RBP: 00007f3737154090 R08: 0000000000000000 R09: 0000000000000000 [ 320.962599][T10438] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 320.962613][T10438] R13: 0000000000000000 R14: 00007f3739556160 R15: 00007ffc26947588 [ 320.962647][T10438] [ 321.023091][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 321.038047][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 321.065196][T10090] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.083618][T10090] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.105459][T10090] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.123930][T10090] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.435359][ T6016] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 321.449285][T10460] FAULT_INJECTION: forcing a failure. [ 321.449285][T10460] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 321.465027][ T6016] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 321.496616][ T9518] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 321.505426][ T9518] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 321.526455][T10460] CPU: 0 PID: 10460 Comm: syz.6.1647 Not tainted 5.15.186-syzkaller #0 [ 321.534762][T10460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 321.544848][T10460] Call Trace: [ 321.548152][T10460] [ 321.551109][T10460] dump_stack_lvl+0x168/0x230 [ 321.555881][T10460] ? show_regs_print_info+0x20/0x20 [ 321.561215][T10460] ? load_image+0x3b0/0x3b0 [ 321.565737][T10460] ? __lock_acquire+0x7c60/0x7c60 [ 321.570778][T10460] should_fail+0x38c/0x4c0 [ 321.575216][T10460] _copy_to_user+0x2e/0x130 [ 321.579735][T10460] simple_read_from_buffer+0xe3/0x150 [ 321.585218][T10460] proc_fail_nth_read+0x19a/0x210 [ 321.590262][T10460] ? proc_fault_inject_write+0x2f0/0x2f0 [ 321.596005][T10460] ? fsnotify_perm+0x254/0x560 [ 321.600905][T10460] ? proc_fault_inject_write+0x2f0/0x2f0 [ 321.606553][T10460] vfs_read+0x2f6/0xcf0 [ 321.610726][T10460] ? kernel_read+0x1e0/0x1e0 [ 321.615331][T10460] ? __fget_files+0x40f/0x480 [ 321.620025][T10460] ? mutex_lock_nested+0x17/0x20 [ 321.624973][T10460] ? __fdget_pos+0x2bf/0x370 [ 321.629568][T10460] ? ksys_read+0x71/0x250 [ 321.633908][T10460] ksys_read+0x14d/0x250 [ 321.638190][T10460] ? vfs_write+0xd00/0xd00 [ 321.642617][T10460] ? trace_sys_enter+0x1f/0x80 [ 321.647390][T10460] do_syscall_64+0x4c/0xa0 [ 321.651815][T10460] ? clear_bhb_loop+0x30/0x80 [ 321.656500][T10460] ? clear_bhb_loop+0x30/0x80 [ 321.661210][T10460] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 321.667111][T10460] RIP: 0033:0x7f7721f2433c [ 321.671536][T10460] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 321.691156][T10460] RSP: 002b:00007f771fd8d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 321.699604][T10460] RAX: ffffffffffffffda RBX: 00007f772214cfa0 RCX: 00007f7721f2433c [ 321.707670][T10460] RDX: 000000000000000f RSI: 00007f771fd8d0a0 RDI: 0000000000000004 [ 321.715645][T10460] RBP: 00007f771fd8d090 R08: 0000000000000000 R09: 0000000000000000 [ 321.723626][T10460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 321.731611][T10460] R13: 0000000000000000 R14: 00007f772214cfa0 R15: 00007fff4a0f6708 [ 321.739611][T10460] [ 321.767220][ T9524] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 321.793163][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 321.932381][T10475] netlink: 'syz.1.1652': attribute type 10 has an invalid length. [ 321.954500][T10476] netlink: 144316 bytes leftover after parsing attributes in process `syz.1.1652'. [ 321.956462][T10475] netlink: 209852 bytes leftover after parsing attributes in process `syz.1.1652'. [ 321.990716][T10475] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 322.264316][T10487] netlink: 64023 bytes leftover after parsing attributes in process `syz.7.1655'. [ 322.892574][ T4280] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 323.242265][ T4280] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 323.291376][ T4280] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 323.389845][T10516] FAULT_INJECTION: forcing a failure. [ 323.389845][T10516] name failslab, interval 1, probability 0, space 0, times 0 [ 323.421583][ T4280] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 323.463409][T10516] CPU: 1 PID: 10516 Comm: syz.1.1666 Not tainted 5.15.186-syzkaller #0 [ 323.471718][T10516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 323.481810][T10516] Call Trace: [ 323.485117][T10516] [ 323.488072][T10516] dump_stack_lvl+0x168/0x230 [ 323.492779][T10516] ? show_regs_print_info+0x20/0x20 [ 323.498002][T10516] ? load_image+0x3b0/0x3b0 [ 323.502545][T10516] ? __might_sleep+0xf0/0xf0 [ 323.507152][T10516] ? __lock_acquire+0x7c60/0x7c60 [ 323.512193][T10516] ? __local_bh_enable_ip+0x12a/0x1b0 [ 323.517579][T10516] should_fail+0x38c/0x4c0 [ 323.522022][T10516] should_failslab+0x5/0x20 [ 323.526555][T10516] slab_pre_alloc_hook+0x51/0xc0 [ 323.531519][T10516] kmem_cache_alloc_node_trace+0x4a/0x300 [ 323.537250][T10516] ? __get_vm_area_node+0x119/0x2d0 [ 323.542465][T10516] __get_vm_area_node+0x119/0x2d0 [ 323.547504][T10516] __vmalloc_node_range+0xef/0x8b0 [ 323.552626][T10516] ? netlink_sendmsg+0x5dd/0xbc0 [ 323.557572][T10516] ? netlink_data_ready+0x10/0x10 [ 323.562638][T10516] ? netlink_sendmsg+0x5dd/0xbc0 [ 323.567577][T10516] vmalloc+0x75/0x80 [ 323.571482][T10516] ? netlink_sendmsg+0x5dd/0xbc0 [ 323.576527][T10516] netlink_sendmsg+0x5dd/0xbc0 [ 323.581309][T10516] ? netlink_getsockopt+0x560/0x560 [ 323.586541][T10516] ? aa_sock_msg_perm+0x94/0x150 [ 323.591491][T10516] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 323.596791][T10516] ? security_socket_sendmsg+0x7c/0xa0 [ 323.602273][T10516] ? netlink_getsockopt+0x560/0x560 [ 323.607514][T10516] ____sys_sendmsg+0x5a2/0x8c0 [ 323.612319][T10516] ? memset+0x1e/0x40 [ 323.616319][T10516] ? __sys_sendmsg_sock+0x30/0x30 [ 323.621359][T10516] ? import_iovec+0x6f/0xa0 [ 323.625871][T10516] ___sys_sendmsg+0x1f0/0x260 [ 323.630569][T10516] ? __sys_sendmsg+0x250/0x250 [ 323.635382][T10516] ? vfs_write+0x84d/0xd00 [ 323.639832][T10516] ? __fdget+0x18b/0x210 [ 323.644111][T10516] __se_sys_sendmsg+0x190/0x250 [ 323.648977][T10516] ? __x64_sys_sendmsg+0x80/0x80 [ 323.653927][T10516] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 323.659930][T10516] ? trace_sys_enter+0x1f/0x80 [ 323.664709][T10516] do_syscall_64+0x4c/0xa0 [ 323.669134][T10516] ? clear_bhb_loop+0x30/0x80 [ 323.673819][T10516] ? clear_bhb_loop+0x30/0x80 [ 323.678512][T10516] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 323.684417][T10516] RIP: 0033:0x7f373932e929 [ 323.688854][T10516] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 323.708482][T10516] RSP: 002b:00007f3737196038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 323.716907][T10516] RAX: ffffffffffffffda RBX: 00007f3739555fa0 RCX: 00007f373932e929 [ 323.724884][T10516] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000004 [ 323.732906][T10516] RBP: 00007f3737196090 R08: 0000000000000000 R09: 0000000000000000 [ 323.740892][T10516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 323.748872][T10516] R13: 0000000000000000 R14: 00007f3739555fa0 R15: 00007ffc26947588 [ 323.756869][T10516] [ 323.788777][T10516] syz.1.1666: vmalloc error: size 213312, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz1,mems_allowed=0-1 [ 323.835603][T10516] CPU: 0 PID: 10516 Comm: syz.1.1666 Not tainted 5.15.186-syzkaller #0 [ 323.843916][T10516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 323.853999][T10516] Call Trace: [ 323.857300][T10516] [ 323.860252][T10516] dump_stack_lvl+0x168/0x230 [ 323.864959][T10516] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 323.871323][T10516] ? show_regs_print_info+0x20/0x20 [ 323.876554][T10516] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 323.882769][T10516] warn_alloc+0x20e/0x2f0 [ 323.887154][T10516] ? zone_watermark_ok_safe+0x240/0x240 [ 323.892752][T10516] ? lockdep_hardirqs_on+0x94/0x140 [ 323.897989][T10516] ? __vmalloc_node_range+0x29a/0x8b0 [ 323.903402][T10516] __vmalloc_node_range+0x2b1/0x8b0 [ 323.908631][T10516] ? netlink_data_ready+0x10/0x10 [ 323.913739][T10516] ? netlink_sendmsg+0x5dd/0xbc0 [ 323.918711][T10516] vmalloc+0x75/0x80 [ 323.922734][T10516] ? netlink_sendmsg+0x5dd/0xbc0 [ 323.927697][T10516] netlink_sendmsg+0x5dd/0xbc0 [ 323.932493][T10516] ? netlink_getsockopt+0x560/0x560 [ 323.937717][T10516] ? aa_sock_msg_perm+0x94/0x150 [ 323.942734][T10516] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 323.948056][T10516] ? security_socket_sendmsg+0x7c/0xa0 [ 323.953554][T10516] ? netlink_getsockopt+0x560/0x560 [ 323.958785][T10516] ____sys_sendmsg+0x5a2/0x8c0 [ 323.963722][T10516] ? memset+0x1e/0x40 [ 323.967729][T10516] ? __sys_sendmsg_sock+0x30/0x30 [ 323.972801][T10516] ? import_iovec+0x6f/0xa0 [ 323.977340][T10516] ___sys_sendmsg+0x1f0/0x260 [ 323.982052][T10516] ? __sys_sendmsg+0x250/0x250 [ 323.986868][T10516] ? vfs_write+0x84d/0xd00 [ 323.991329][T10516] ? __fdget+0x18b/0x210 [ 323.995601][T10516] __se_sys_sendmsg+0x190/0x250 [ 324.000501][T10516] ? __x64_sys_sendmsg+0x80/0x80 [ 324.005465][T10516] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 324.011514][T10516] ? trace_sys_enter+0x1f/0x80 [ 324.016313][T10516] do_syscall_64+0x4c/0xa0 [ 324.020752][T10516] ? clear_bhb_loop+0x30/0x80 [ 324.025453][T10516] ? clear_bhb_loop+0x30/0x80 [ 324.030159][T10516] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 324.036082][T10516] RIP: 0033:0x7f373932e929 [ 324.040524][T10516] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 324.060160][T10516] RSP: 002b:00007f3737196038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 324.068600][T10516] RAX: ffffffffffffffda RBX: 00007f3739555fa0 RCX: 00007f373932e929 [ 324.076590][T10516] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000004 [ 324.084586][T10516] RBP: 00007f3737196090 R08: 0000000000000000 R09: 0000000000000000 [ 324.092573][T10516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 324.100572][T10516] R13: 0000000000000000 R14: 00007f3739555fa0 R15: 00007ffc26947588 [ 324.108590][T10516] [ 324.189799][T10516] Mem-Info: [ 324.193600][T10516] active_anon:298 inactive_anon:5407 isolated_anon:0 [ 324.193600][T10516] active_file:13205 inactive_file:44193 isolated_file:0 [ 324.193600][T10516] unevictable:768 dirty:156 writeback:0 [ 324.193600][T10516] slab_reclaimable:21642 slab_unreclaimable:101171 [ 324.193600][T10516] mapped:29623 shmem:1653 pagetables:632 bounce:0 [ 324.193600][T10516] kernel_misc_reclaimable:0 [ 324.193600][T10516] free:1357087 free_pcp:6988 free_cma:0 [ 324.252589][T10516] Node 0 active_anon:1160kB inactive_anon:21120kB active_file:52620kB inactive_file:176772kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:118492kB dirty:624kB writeback:0kB shmem:4536kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:12804kB pagetables:2528kB all_unreclaimable? no [ 324.298978][T10516] Node 1 active_anon:32kB inactive_anon:508kB active_file:200kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:2076kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB all_unreclaimable? no [ 324.329882][T10516] Node 0 DMA free:15360kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 324.358087][T10516] lowmem_reserve[]: 0 2541 2542 2542 2542 [ 324.363892][T10516] Node 0 DMA32 free:1497228kB min:34800kB low:43500kB high:52200kB reserved_highatomic:0KB active_anon:1160kB inactive_anon:21220kB active_file:52620kB inactive_file:176772kB unevictable:1536kB writepending:624kB present:3129332kB managed:2608992kB mlocked:0kB bounce:0kB free_pcp:22772kB local_pcp:13344kB free_cma:0kB [ 324.394395][T10516] lowmem_reserve[]: 0 0 0 0 0 [ 324.411761][T10516] Node 0 Normal free:12kB min:12kB low:12kB high:12kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:916kB mlocked:0kB bounce:0kB free_pcp:20kB local_pcp:12kB free_cma:0kB [ 324.444947][T10516] lowmem_reserve[]: 0 0 0 0 0 [ 324.476396][T10516] Node 1 Normal free:3915748kB min:55088kB low:68860kB high:82632kB reserved_highatomic:0KB active_anon:32kB inactive_anon:508kB active_file:200kB inactive_file:0kB unevictable:1536kB writepending:0kB present:4194304kB managed:4119672kB mlocked:0kB bounce:0kB free_pcp:4964kB local_pcp:4008kB free_cma:0kB [ 324.577545][T10516] lowmem_reserve[]: 0 0 0 0 0 [ 324.582320][T10516] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 324.602951][T10535] FAULT_INJECTION: forcing a failure. [ 324.602951][T10535] name failslab, interval 1, probability 0, space 0, times 0 [ 324.634779][T10535] CPU: 0 PID: 10535 Comm: syz.7.1673 Not tainted 5.15.186-syzkaller #0 [ 324.643090][T10535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 324.653185][T10535] Call Trace: [ 324.656527][T10535] [ 324.659498][T10535] dump_stack_lvl+0x168/0x230 [ 324.664227][T10535] ? show_regs_print_info+0x20/0x20 [ 324.669480][T10535] ? load_image+0x3b0/0x3b0 [ 324.674033][T10535] ? __might_sleep+0xf0/0xf0 [ 324.678673][T10535] ? __lock_acquire+0x7c60/0x7c60 [ 324.683749][T10535] should_fail+0x38c/0x4c0 [ 324.688217][T10535] should_failslab+0x5/0x20 [ 324.691632][T10516] Node 0 [ 324.692749][T10535] slab_pre_alloc_hook+0x51/0xc0 [ 324.695739][T10516] DMA32: [ 324.700672][T10535] __kmalloc+0x6b/0x330 [ 324.700695][T10535] ? tomoyo_realpath_from_path+0x118/0x610 [ 324.700726][T10535] tomoyo_realpath_from_path+0x118/0x610 [ 324.703866][T10516] 2434*4kB [ 324.707948][T10535] tomoyo_path_number_perm+0x1d5/0x5d0 [ 324.707988][T10535] ? try_to_wake_up+0x6cf/0x1050 [ 324.713805][T10516] (UM) [ 324.719453][T10535] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 324.719512][T10535] ? __lock_acquire+0x7c60/0x7c60 [ 324.722613][T10516] 1101*8kB [ 324.728110][T10535] ? lookup_one_qstr_excl+0x11c/0x240 [ 324.728145][T10535] tomoyo_path_mkdir+0xa5/0xe0 [ 324.728172][T10535] ? tomoyo_path_unlink+0xe0/0xe0 [ 324.728200][T10535] ? kern_path_create+0x190/0x190 [ 324.728232][T10535] security_path_mkdir+0xe0/0x130 [ 324.728287][T10535] do_mkdirat+0x158/0x5a0 [ 324.728317][T10535] ? vfs_mkdir+0x570/0x570 [ 324.728348][T10535] ? getname_flags+0x1fe/0x500 [ 324.728379][T10535] __x64_sys_mkdir+0x6a/0x80 [ 324.728406][T10535] do_syscall_64+0x4c/0xa0 [ 324.728435][T10535] ? clear_bhb_loop+0x30/0x80 [ 324.728459][T10535] ? clear_bhb_loop+0x30/0x80 [ 324.728486][T10535] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 324.728509][T10535] RIP: 0033:0x7f7bb52b3929 [ 324.728534][T10535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 324.745330][T10516] (UME) [ 324.746734][T10535] RSP: 002b:00007f7bb311b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 324.746765][T10535] RAX: ffffffffffffffda RBX: 00007f7bb54dafa0 RCX: 00007f7bb52b3929 [ 324.749899][T10516] 870*16kB [ 324.755275][T10535] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000 [ 324.760337][T10516] (UME) [ 324.765063][T10535] RBP: 00007f7bb311b090 R08: 0000000000000000 R09: 0000000000000000 [ 324.765083][T10535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 324.765098][T10535] R13: 0000000000000001 R14: 00007f7bb54dafa0 R15: 00007ffcd2876fe8 [ 324.765137][T10535] [ 324.937030][T10535] ERROR: Out of memory at tomoyo_realpath_from_path. [ 324.939163][T10516] 1598*32kB (UME) 420*64kB (UME) 293*128kB (UM) 91*256kB (UME) 25*512kB (UM) 9*1024kB (UM) 4*2048kB (UM) 316*4096kB (M) = 1495824kB [ 324.989235][T10516] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 325.030000][T10516] Node 1 Normal: 205*4kB (UME) 40*8kB (UME) 23*16kB (UME) 160*32kB (UME) 76*64kB (UME) 24*128kB (UE) 9*256kB (UM) 5*512kB (U) 1*1024kB (E) 2*2048kB (UM) 950*4096kB (M) = 3915748kB [ 325.054156][T10516] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 325.064694][T10516] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 325.103272][T10516] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 325.125429][T10516] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 325.168854][T10516] 59053 total pagecache pages [ 325.199915][T10516] 0 pages in swap cache [ 325.207995][T10525] chnl_net:caif_netlink_parms(): no params data found [ 325.223923][T10516] Swap cache stats: add 0, delete 0, find 0/0 [ 325.241155][T10516] Free swap = 124996kB [ 325.266430][T10516] Total swap = 124996kB [ 325.270673][T10516] 2097051 pages RAM [ 325.274900][T10516] 0 pages HighMem/MovableOnly [ 325.279846][T10516] 410816 pages reserved [ 325.284058][T10516] 0 pages cma reserved [ 325.487644][T10565] FAULT_INJECTION: forcing a failure. [ 325.487644][T10565] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 325.501857][T10565] CPU: 1 PID: 10565 Comm: syz.1.1683 Not tainted 5.15.186-syzkaller #0 [ 325.510239][T10565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 325.520342][T10565] Call Trace: [ 325.523651][T10565] [ 325.526622][T10565] dump_stack_lvl+0x168/0x230 [ 325.531389][T10565] ? show_regs_print_info+0x20/0x20 [ 325.536641][T10565] ? load_image+0x3b0/0x3b0 [ 325.541227][T10565] ? __lock_acquire+0x7c60/0x7c60 [ 325.546314][T10565] should_fail+0x38c/0x4c0 [ 325.550797][T10565] _copy_from_user+0x2e/0x170 [ 325.555534][T10565] __copy_msghdr_from_user+0x448/0x5e0 [ 325.561049][T10565] ? verify_lock_unused+0x140/0x140 [ 325.566311][T10565] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 325.571704][T10565] ___sys_sendmsg+0x156/0x260 [ 325.576464][T10565] ? __sys_sendmsg+0x250/0x250 [ 325.581315][T10565] ? vfs_write+0x84d/0xd00 [ 325.585829][T10565] ? __fdget+0x18b/0x210 [ 325.590128][T10565] __se_sys_sendmsg+0x190/0x250 [ 325.595042][T10565] ? __x64_sys_sendmsg+0x80/0x80 [ 325.600037][T10565] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 325.606185][T10565] ? lockdep_hardirqs_on+0x94/0x140 [ 325.611451][T10565] do_syscall_64+0x4c/0xa0 [ 325.615925][T10565] ? clear_bhb_loop+0x30/0x80 [ 325.620665][T10565] ? clear_bhb_loop+0x30/0x80 [ 325.625404][T10565] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 325.631351][T10565] RIP: 0033:0x7f373932e929 [ 325.635806][T10565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 325.655526][T10565] RSP: 002b:00007f3737196038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 325.663998][T10565] RAX: ffffffffffffffda RBX: 00007f3739555fa0 RCX: 00007f373932e929 [ 325.672025][T10565] RDX: 0000000000000000 RSI: 0000200000000380 RDI: 0000000000000006 [ 325.680127][T10565] RBP: 00007f3737196090 R08: 0000000000000000 R09: 0000000000000000 [ 325.688129][T10565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 325.696185][T10565] R13: 0000000000000000 R14: 00007f3739555fa0 R15: 00007ffc26947588 [ 325.704412][T10565] [ 325.717784][T10525] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.731722][T10525] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.743095][T10525] device bridge_slave_0 entered promiscuous mode [ 325.752628][T10525] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.760111][T10525] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.768545][T10525] device bridge_slave_1 entered promiscuous mode [ 325.863908][T10525] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 325.912887][T10525] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 325.954727][T10525] team0: Port device team_slave_0 added [ 325.963603][T10525] team0: Port device team_slave_1 added [ 326.086929][T10525] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 326.100158][T10525] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 326.126700][T10525] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 326.144708][T10525] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 326.162746][T10525] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 326.197960][T10525] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 326.306477][ T1108] Bluetooth: hci4: command 0x0409 tx timeout [ 326.393695][T10525] device hsr_slave_0 entered promiscuous mode [ 326.419816][T10525] device hsr_slave_1 entered promiscuous mode [ 326.444648][T10525] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 326.460733][T10610] FAULT_INJECTION: forcing a failure. [ 326.460733][T10610] name failslab, interval 1, probability 0, space 0, times 0 [ 326.480836][T10525] Cannot create hsr debugfs directory [ 326.513504][T10612] netlink: 188 bytes leftover after parsing attributes in process `syz.1.1699'. [ 326.527694][T10610] CPU: 0 PID: 10610 Comm: syz.6.1698 Not tainted 5.15.186-syzkaller #0 [ 326.528973][T10612] FAULT_INJECTION: forcing a failure. [ 326.528973][T10612] name failslab, interval 1, probability 0, space 0, times 0 [ 326.535986][T10610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 326.536002][T10610] Call Trace: [ 326.536011][T10610] [ 326.536021][T10610] dump_stack_lvl+0x168/0x230 [ 326.569576][T10610] ? show_regs_print_info+0x20/0x20 [ 326.574805][T10610] ? load_image+0x3b0/0x3b0 [ 326.579339][T10610] ? __lock_acquire+0x7c60/0x7c60 [ 326.584561][T10610] should_fail+0x38c/0x4c0 [ 326.589000][T10610] should_failslab+0x5/0x20 [ 326.593513][T10610] slab_pre_alloc_hook+0x51/0xc0 [ 326.598475][T10610] kmem_cache_alloc_trace+0x47/0x2a0 [ 326.603788][T10610] ? bpf_prog_alloc_no_stats+0xac/0x2c0 [ 326.609429][T10610] bpf_prog_alloc_no_stats+0xac/0x2c0 [ 326.614834][T10610] bpf_prog_alloc+0x1a/0x1e0 [ 326.619442][T10610] bpf_prog_load+0x7b3/0x1550 [ 326.624153][T10610] ? map_freeze+0x350/0x350 [ 326.628673][T10610] ? __might_fault+0xb7/0x110 [ 326.633376][T10610] ? __might_fault+0xb3/0x110 [ 326.638071][T10610] ? bpf_lsm_bpf+0x5/0x10 [ 326.642409][T10610] ? security_bpf+0x7a/0xa0 [ 326.646926][T10610] __sys_bpf+0x4c2/0x670 [ 326.651197][T10610] ? bpf_link_show_fdinfo+0x310/0x310 [ 326.656617][T10610] ? vtime_user_exit+0x2dc/0x400 [ 326.661589][T10610] __x64_sys_bpf+0x78/0x90 [ 326.666030][T10610] do_syscall_64+0x4c/0xa0 [ 326.670621][T10610] ? clear_bhb_loop+0x30/0x80 [ 326.675309][T10610] ? clear_bhb_loop+0x30/0x80 [ 326.680008][T10610] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 326.686347][T10610] RIP: 0033:0x7f7721f25929 [ 326.690776][T10610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 326.710390][T10610] RSP: 002b:00007f771fd8d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 326.718843][T10610] RAX: ffffffffffffffda RBX: 00007f772214cfa0 RCX: 00007f7721f25929 [ 326.726841][T10610] RDX: 0000000000000048 RSI: 000020000000d000 RDI: 0000000000000005 [ 326.734992][T10610] RBP: 00007f771fd8d090 R08: 0000000000000000 R09: 0000000000000000 [ 326.742991][T10610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 326.750971][T10610] R13: 0000000000000001 R14: 00007f772214cfa0 R15: 00007fff4a0f6708 [ 326.758968][T10610] [ 326.779482][T10612] CPU: 0 PID: 10612 Comm: syz.1.1699 Not tainted 5.15.186-syzkaller #0 [ 326.787785][T10612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 326.797858][T10612] Call Trace: [ 326.801172][T10612] [ 326.804113][T10612] dump_stack_lvl+0x168/0x230 [ 326.808807][T10612] ? show_regs_print_info+0x20/0x20 [ 326.814021][T10612] ? load_image+0x3b0/0x3b0 [ 326.818544][T10612] ? __might_sleep+0xf0/0xf0 [ 326.823147][T10612] ? __lock_acquire+0x7c60/0x7c60 [ 326.828228][T10612] should_fail+0x38c/0x4c0 [ 326.832667][T10612] should_failslab+0x5/0x20 [ 326.837177][T10612] slab_pre_alloc_hook+0x51/0xc0 [ 326.842127][T10612] kmem_cache_alloc_node+0x47/0x2d0 [ 326.847391][T10612] ? __alloc_skb+0xf4/0x750 [ 326.851996][T10612] __alloc_skb+0xf4/0x750 [ 326.856363][T10612] netlink_ack+0x3a6/0xb60 [ 326.860796][T10612] ? __copy_skb_header+0x417/0x5a0 [ 326.865917][T10612] ? netlink_dump+0xcb0/0xcb0 [ 326.870617][T10612] ? __skb_clone+0x480/0x790 [ 326.875228][T10612] netlink_rcv_skb+0x265/0x430 [ 326.880005][T10612] ? rtnetlink_bind+0x80/0x80 [ 326.884787][T10612] ? netlink_ack+0xb60/0xb60 [ 326.889404][T10612] netlink_unicast+0x77c/0x920 [ 326.894187][T10612] netlink_sendmsg+0x8ab/0xbc0 [ 326.898977][T10612] ? netlink_getsockopt+0x560/0x560 [ 326.904187][T10612] ? aa_sock_msg_perm+0x94/0x150 [ 326.909238][T10612] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 326.914541][T10612] ? security_socket_sendmsg+0x7c/0xa0 [ 326.920105][T10612] ? netlink_getsockopt+0x560/0x560 [ 326.925332][T10612] ____sys_sendmsg+0x5a2/0x8c0 [ 326.930122][T10612] ? memset+0x1e/0x40 [ 326.934117][T10612] ? __sys_sendmsg_sock+0x30/0x30 [ 326.939190][T10612] ? import_iovec+0x6f/0xa0 [ 326.943719][T10612] ___sys_sendmsg+0x1f0/0x260 [ 326.948442][T10612] ? __sys_sendmsg+0x250/0x250 [ 326.953247][T10612] ? vfs_write+0x84d/0xd00 [ 326.957802][T10612] ? __fdget+0x18b/0x210 [ 326.962060][T10612] __se_sys_sendmsg+0x190/0x250 [ 326.966926][T10612] ? __x64_sys_sendmsg+0x80/0x80 [ 326.971882][T10612] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 326.977890][T10612] ? lockdep_hardirqs_on+0x94/0x140 [ 326.983110][T10612] do_syscall_64+0x4c/0xa0 [ 326.987538][T10612] ? clear_bhb_loop+0x30/0x80 [ 326.992257][T10612] ? clear_bhb_loop+0x30/0x80 [ 326.996959][T10612] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 327.002947][T10612] RIP: 0033:0x7f373932e929 [ 327.007498][T10612] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 327.027117][T10612] RSP: 002b:00007f3737196038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 327.035546][T10612] RAX: ffffffffffffffda RBX: 00007f3739555fa0 RCX: 00007f373932e929 [ 327.043544][T10612] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 327.051521][T10612] RBP: 00007f3737196090 R08: 0000000000000000 R09: 0000000000000000 [ 327.059502][T10612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 327.067479][T10612] R13: 0000000000000000 R14: 00007f3739555fa0 R15: 00007ffc26947588 [ 327.075480][T10612] [ 327.161092][ T4280] device hsr_slave_0 left promiscuous mode [ 327.177094][ T4280] device hsr_slave_1 left promiscuous mode [ 327.183801][ T4280] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 327.195620][ T4280] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 327.269060][ T4280] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 327.284335][ T4280] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 327.305662][ T4280] device bridge_slave_1 left promiscuous mode [ 327.324331][ T4280] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.343507][ T4280] device bridge_slave_0 left promiscuous mode [ 327.353977][ T4280] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.397328][ T4280] device veth1_macvtap left promiscuous mode [ 327.403436][ T4280] device veth0_macvtap left promiscuous mode [ 327.410133][ T4280] device veth1_vlan left promiscuous mode [ 327.416003][ T4280] device veth0_vlan left promiscuous mode [ 328.133139][ T4280] team0 (unregistering): Port device team_slave_1 removed [ 328.168366][ T4280] team0 (unregistering): Port device team_slave_0 removed [ 328.194296][ T4280] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 328.245070][ T4280] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 328.341994][ T4280] bond0 (unregistering): Released all slaves [ 328.386467][ T1108] Bluetooth: hci4: command 0x041b tx timeout [ 328.400799][T10624] netlink: 188 bytes leftover after parsing attributes in process `syz.7.1702'. [ 329.048007][T10666] FAULT_INJECTION: forcing a failure. [ 329.048007][T10666] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 329.066695][T10666] CPU: 0 PID: 10666 Comm: syz.5.1714 Not tainted 5.15.186-syzkaller #0 [ 329.075002][T10666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 329.085191][T10666] Call Trace: [ 329.088502][T10666] [ 329.091468][T10666] dump_stack_lvl+0x168/0x230 [ 329.096192][T10666] ? show_regs_print_info+0x20/0x20 [ 329.101430][T10666] ? load_image+0x3b0/0x3b0 [ 329.105973][T10666] ? __lock_acquire+0x7c60/0x7c60 [ 329.111039][T10666] ? bpf_test_run+0x81d/0x870 [ 329.115847][T10666] should_fail+0x38c/0x4c0 [ 329.120295][T10666] _copy_to_user+0x2e/0x130 [ 329.124845][T10666] bpf_test_finish+0x1ac/0x2d0 [ 329.129657][T10666] ? convert_skb_to___skb+0x360/0x360 [ 329.135060][T10666] ? __build_skb+0x1e2/0x2e0 [ 329.139681][T10666] ? convert_skb_to___skb+0x1ff/0x360 [ 329.145225][T10666] bpf_prog_test_run_skb+0xb8f/0x1180 [ 329.150664][T10666] ? cpu_online+0x60/0x60 [ 329.155112][T10666] bpf_prog_test_run+0x31e/0x390 [ 329.160081][T10666] __sys_bpf+0x535/0x670 [ 329.164356][T10666] ? bpf_link_show_fdinfo+0x310/0x310 [ 329.169764][T10666] ? vtime_user_exit+0x2dc/0x400 [ 329.174746][T10666] __x64_sys_bpf+0x78/0x90 [ 329.179187][T10666] do_syscall_64+0x4c/0xa0 [ 329.183617][T10666] ? clear_bhb_loop+0x30/0x80 [ 329.188305][T10666] ? clear_bhb_loop+0x30/0x80 [ 329.193002][T10666] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 329.198910][T10666] RIP: 0033:0x7fc67f306929 [ 329.203352][T10666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 329.222969][T10666] RSP: 002b:00007fc67d16e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 329.231399][T10666] RAX: ffffffffffffffda RBX: 00007fc67f52dfa0 RCX: 00007fc67f306929 [ 329.239383][T10666] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 329.247365][T10666] RBP: 00007fc67d16e090 R08: 0000000000000000 R09: 0000000000000000 [ 329.255356][T10666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 329.263339][T10666] R13: 0000000000000000 R14: 00007fc67f52dfa0 R15: 00007ffef8cf0108 [ 329.271355][T10666] [ 329.334158][T10525] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 329.404183][T10672] netlink: 9286 bytes leftover after parsing attributes in process `syz.5.1718'. [ 329.444259][T10525] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 329.479797][T10525] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 329.520384][T10525] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 329.576260][T10676] netlink: 'syz.1.1719': attribute type 2 has an invalid length. [ 329.646149][T10676] netlink: 'syz.1.1719': attribute type 8 has an invalid length. [ 329.712479][T10676] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1719'. [ 330.039928][T10697] netlink: 16410 bytes leftover after parsing attributes in process `syz.7.1723'. [ 330.094593][T10707] FAULT_INJECTION: forcing a failure. [ 330.094593][T10707] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 330.126410][T10707] CPU: 0 PID: 10707 Comm: syz.1.1727 Not tainted 5.15.186-syzkaller #0 [ 330.134721][T10707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 330.144812][T10707] Call Trace: [ 330.148228][T10707] [ 330.151633][T10707] dump_stack_lvl+0x168/0x230 [ 330.156409][T10707] ? show_regs_print_info+0x20/0x20 [ 330.161776][T10707] ? load_image+0x3b0/0x3b0 [ 330.166347][T10707] ? __lock_acquire+0x7c60/0x7c60 [ 330.171527][T10707] should_fail+0x38c/0x4c0 [ 330.175992][T10707] _copy_to_user+0x2e/0x130 [ 330.180531][T10707] simple_read_from_buffer+0xe3/0x150 [ 330.185944][T10707] proc_fail_nth_read+0x19a/0x210 [ 330.191008][T10707] ? proc_fault_inject_write+0x2f0/0x2f0 [ 330.196712][T10707] ? fsnotify_perm+0x254/0x560 [ 330.201529][T10707] ? proc_fault_inject_write+0x2f0/0x2f0 [ 330.207213][T10707] vfs_read+0x2f6/0xcf0 [ 330.211420][T10707] ? kernel_read+0x1e0/0x1e0 [ 330.216065][T10707] ? __fget_files+0x40f/0x480 [ 330.220812][T10707] ? mutex_lock_nested+0x17/0x20 [ 330.225784][T10707] ? __fdget_pos+0x2bf/0x370 [ 330.230414][T10707] ? ksys_read+0x71/0x250 [ 330.234901][T10707] ksys_read+0x14d/0x250 [ 330.239180][T10707] ? vfs_write+0xd00/0xd00 [ 330.243635][T10707] ? lockdep_hardirqs_on+0x94/0x140 [ 330.248886][T10707] do_syscall_64+0x4c/0xa0 [ 330.253344][T10707] ? clear_bhb_loop+0x30/0x80 [ 330.258049][T10707] ? clear_bhb_loop+0x30/0x80 [ 330.262865][T10707] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 330.268860][T10707] RIP: 0033:0x7f373932d33c [ 330.273321][T10707] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 330.292976][T10707] RSP: 002b:00007f3737196030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 330.301431][T10707] RAX: ffffffffffffffda RBX: 00007f3739555fa0 RCX: 00007f373932d33c [ 330.309465][T10707] RDX: 000000000000000f RSI: 00007f37371960a0 RDI: 0000000000000004 [ 330.317470][T10707] RBP: 00007f3737196090 R08: 0000000000000000 R09: 0000000000000000 [ 330.325467][T10707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 330.333560][T10707] R13: 0000000000000000 R14: 00007f3739555fa0 R15: 00007ffc26947588 [ 330.341585][T10707] [ 330.365255][T10525] 8021q: adding VLAN 0 to HW filter on device bond0 [ 330.422753][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 330.448589][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 330.459647][T10717] FAULT_INJECTION: forcing a failure. [ 330.459647][T10717] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 330.481803][ T1108] Bluetooth: hci4: command 0x040f tx timeout [ 330.495685][T10525] 8021q: adding VLAN 0 to HW filter on device team0 [ 330.515343][T10717] CPU: 0 PID: 10717 Comm: syz.1.1730 Not tainted 5.15.186-syzkaller #0 [ 330.523646][T10717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 330.533822][T10717] Call Trace: [ 330.537131][T10717] [ 330.540084][T10717] dump_stack_lvl+0x168/0x230 [ 330.544792][T10717] ? show_regs_print_info+0x20/0x20 [ 330.550025][T10717] ? load_image+0x3b0/0x3b0 [ 330.554565][T10717] ? __lock_acquire+0x7c60/0x7c60 [ 330.559619][T10717] ? bpf_test_run+0x81d/0x870 [ 330.564320][T10717] should_fail+0x38c/0x4c0 [ 330.568783][T10717] _copy_to_user+0x2e/0x130 [ 330.573394][T10717] bpf_test_finish+0x1ac/0x2d0 [ 330.578177][T10717] ? convert_skb_to___skb+0x360/0x360 [ 330.583571][T10717] ? __build_skb+0x1e2/0x2e0 [ 330.588177][T10717] ? convert_skb_to___skb+0x1ff/0x360 [ 330.593574][T10717] bpf_prog_test_run_skb+0xb8f/0x1180 [ 330.598982][T10717] ? cpu_online+0x60/0x60 [ 330.603331][T10717] bpf_prog_test_run+0x31e/0x390 [ 330.608320][T10717] __sys_bpf+0x535/0x670 [ 330.612580][T10717] ? bpf_link_show_fdinfo+0x310/0x310 [ 330.617975][T10717] ? vtime_user_exit+0x2dc/0x400 [ 330.622937][T10717] __x64_sys_bpf+0x78/0x90 [ 330.627368][T10717] do_syscall_64+0x4c/0xa0 [ 330.631796][T10717] ? clear_bhb_loop+0x30/0x80 [ 330.636492][T10717] ? clear_bhb_loop+0x30/0x80 [ 330.641200][T10717] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 330.647109][T10717] RIP: 0033:0x7f373932e929 [ 330.651540][T10717] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 330.671188][T10717] RSP: 002b:00007f3737196038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 330.679616][T10717] RAX: ffffffffffffffda RBX: 00007f3739555fa0 RCX: 00007f373932e929 [ 330.687689][T10717] RDX: 0000000000000022 RSI: 00002000000000c0 RDI: 000000000000000a [ 330.695667][T10717] RBP: 00007f3737196090 R08: 0000000000000000 R09: 0000000000000000 [ 330.703645][T10717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 330.711622][T10717] R13: 0000000000000000 R14: 00007f3739555fa0 R15: 00007ffc26947588 [ 330.719620][T10717] [ 330.730992][T10722] netlink: 'syz.6.1731': attribute type 16 has an invalid length. [ 330.763626][T10722] netlink: 'syz.6.1731': attribute type 3 has an invalid length. [ 330.790286][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 330.798280][T10722] netlink: 132 bytes leftover after parsing attributes in process `syz.6.1731'. [ 330.850087][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 330.889969][ T144] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.897178][ T144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.952083][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 330.978225][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 331.000966][ T144] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.008177][ T144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.040467][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 331.063333][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 331.081254][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 331.118958][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 331.129884][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 331.144027][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 331.153894][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 331.209352][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 331.227196][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 331.235968][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 331.257511][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 331.268045][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 331.280402][T10525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 331.742658][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 331.753602][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 331.783183][T10525] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 331.864877][T10775] FAULT_INJECTION: forcing a failure. [ 331.864877][T10775] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 331.910707][T10775] CPU: 0 PID: 10775 Comm: syz.6.1749 Not tainted 5.15.186-syzkaller #0 [ 331.919020][T10775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 331.929105][T10775] Call Trace: [ 331.932405][T10775] [ 331.935350][T10775] dump_stack_lvl+0x168/0x230 [ 331.940048][T10775] ? show_regs_print_info+0x20/0x20 [ 331.945263][T10775] ? load_image+0x3b0/0x3b0 [ 331.949791][T10775] ? __lock_acquire+0x7c60/0x7c60 [ 331.954833][T10775] ? __lock_acquire+0x13ad/0x7c60 [ 331.959881][T10775] should_fail+0x38c/0x4c0 [ 331.964407][T10775] strncpy_from_user+0x32/0x360 [ 331.969278][T10775] bpf_prog_load+0x1a8/0x1550 [ 331.973978][T10775] ? map_freeze+0x350/0x350 [ 331.978494][T10775] ? __might_fault+0xb7/0x110 [ 331.983219][T10775] ? __might_fault+0xb3/0x110 [ 331.987906][T10775] ? bpf_lsm_bpf+0x5/0x10 [ 331.992361][T10775] ? security_bpf+0x7a/0xa0 [ 331.996872][T10775] __sys_bpf+0x4c2/0x670 [ 332.001127][T10775] ? bpf_link_show_fdinfo+0x310/0x310 [ 332.006518][T10775] ? vtime_user_exit+0x2dc/0x400 [ 332.011473][T10775] __x64_sys_bpf+0x78/0x90 [ 332.015900][T10775] do_syscall_64+0x4c/0xa0 [ 332.020324][T10775] ? clear_bhb_loop+0x30/0x80 [ 332.025026][T10775] ? clear_bhb_loop+0x30/0x80 [ 332.029718][T10775] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 332.035621][T10775] RIP: 0033:0x7f7721f25929 [ 332.040048][T10775] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 332.059752][T10775] RSP: 002b:00007f771fd8d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 332.068180][T10775] RAX: ffffffffffffffda RBX: 00007f772214cfa0 RCX: 00007f7721f25929 [ 332.076162][T10775] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 332.084143][T10775] RBP: 00007f771fd8d090 R08: 0000000000000000 R09: 0000000000000000 [ 332.092125][T10775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 332.100109][T10775] R13: 0000000000000000 R14: 00007f772214cfa0 R15: 00007fff4a0f6708 [ 332.108108][T10775] [ 332.279798][T10779] device ipvlan1 entered promiscuous mode [ 332.453413][T10792] FAULT_INJECTION: forcing a failure. [ 332.453413][T10792] name failslab, interval 1, probability 0, space 0, times 0 [ 332.495178][T10792] CPU: 0 PID: 10792 Comm: syz.6.1754 Not tainted 5.15.186-syzkaller #0 [ 332.503485][T10792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 332.513575][T10792] Call Trace: [ 332.516885][T10792] [ 332.519841][T10792] dump_stack_lvl+0x168/0x230 [ 332.524559][T10792] ? show_regs_print_info+0x20/0x20 [ 332.529792][T10792] ? load_image+0x3b0/0x3b0 [ 332.534344][T10792] ? __might_sleep+0xf0/0xf0 [ 332.538987][T10792] ? __lock_acquire+0x7c60/0x7c60 [ 332.544067][T10792] should_fail+0x38c/0x4c0 [ 332.548559][T10792] should_failslab+0x5/0x20 [ 332.553108][T10792] slab_pre_alloc_hook+0x51/0xc0 [ 332.558086][T10792] __kmalloc+0x6b/0x330 [ 332.562275][T10792] ? bpf_test_init+0xf8/0x1b0 [ 332.566996][T10792] ? __lock_acquire+0x7c60/0x7c60 [ 332.572071][T10792] bpf_test_init+0xf8/0x1b0 [ 332.576625][T10792] bpf_prog_test_run_skb+0x181/0x1180 [ 332.582037][T10792] ? __fget_files+0x40f/0x480 [ 332.586777][T10792] ? cpu_online+0x60/0x60 [ 332.591233][T10792] bpf_prog_test_run+0x31e/0x390 [ 332.596359][T10792] __sys_bpf+0x535/0x670 [ 332.600679][T10792] ? bpf_link_show_fdinfo+0x310/0x310 [ 332.606079][T10792] ? rcu_nmi_exit+0x6f/0xf0 [ 332.610654][T10792] ? vtime_user_exit+0x2dc/0x400 [ 332.615652][T10792] __x64_sys_bpf+0x78/0x90 [ 332.620108][T10792] do_syscall_64+0x4c/0xa0 [ 332.624556][T10792] ? clear_bhb_loop+0x30/0x80 [ 332.629269][T10792] ? clear_bhb_loop+0x30/0x80 [ 332.633989][T10792] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 332.639932][T10792] RIP: 0033:0x7f7721f25929 [ 332.644389][T10792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 332.664032][T10792] RSP: 002b:00007f771fd6c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 332.672467][T10792] RAX: ffffffffffffffda RBX: 00007f772214d080 RCX: 00007f7721f25929 [ 332.680453][T10792] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 000000000000000a [ 332.688608][T10792] RBP: 00007f771fd6c090 R08: 0000000000000000 R09: 0000000000000000 [ 332.696590][T10792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 332.704589][T10792] R13: 0000000000000000 R14: 00007f772214d080 R15: 00007fff4a0f6708 [ 332.712725][T10792] [ 332.721124][ T4195] Bluetooth: hci4: command 0x0419 tx timeout [ 332.876683][ T9524] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 332.902820][ T9524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 332.943476][ T9524] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 332.954940][ T9524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 332.972722][T10525] device veth0_vlan entered promiscuous mode [ 332.981345][ T9524] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 332.999796][ T9524] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 333.033175][T10525] device veth1_vlan entered promiscuous mode [ 333.171037][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 333.203450][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 333.212627][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 333.221930][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 333.235351][T10525] device veth0_macvtap entered promiscuous mode [ 333.280792][T10525] device veth1_macvtap entered promiscuous mode [ 333.477419][T10525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 333.479972][T10815] FAULT_INJECTION: forcing a failure. [ 333.479972][T10815] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 333.528882][T10815] CPU: 1 PID: 10815 Comm: syz.5.1761 Not tainted 5.15.186-syzkaller #0 [ 333.529570][T10525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.537181][T10815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 333.537197][T10815] Call Trace: [ 333.537206][T10815] [ 333.537215][T10815] dump_stack_lvl+0x168/0x230 [ 333.537249][T10815] ? show_regs_print_info+0x20/0x20 [ 333.537274][T10815] ? load_image+0x3b0/0x3b0 [ 333.537300][T10815] ? __lock_acquire+0x7c60/0x7c60 [ 333.537333][T10815] should_fail+0x38c/0x4c0 [ 333.587261][T10815] _copy_from_user+0x2e/0x170 [ 333.591231][T10525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 333.591970][T10815] iovec_from_user+0x142/0x370 [ 333.607156][T10815] __import_iovec+0x70/0x490 [ 333.611796][T10815] import_iovec+0x6f/0xa0 [ 333.616158][T10815] ___sys_sendmsg+0x1b9/0x260 [ 333.620873][T10815] ? __sys_sendmsg+0x250/0x250 [ 333.625674][T10815] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 333.631870][T10815] ? __fdget+0x18b/0x210 [ 333.636138][T10815] __se_sys_sendmsg+0x190/0x250 [ 333.641017][T10815] ? __x64_sys_sendmsg+0x80/0x80 [ 333.645966][T10815] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 333.651976][T10815] ? lockdep_hardirqs_on+0x94/0x140 [ 333.657285][T10815] do_syscall_64+0x4c/0xa0 [ 333.661715][T10815] ? clear_bhb_loop+0x30/0x80 [ 333.666401][T10815] ? clear_bhb_loop+0x30/0x80 [ 333.671093][T10815] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 333.677004][T10815] RIP: 0033:0x7fc67f306929 [ 333.681432][T10815] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 333.701046][T10815] RSP: 002b:00007fc67d16e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 333.709472][T10815] RAX: ffffffffffffffda RBX: 00007fc67f52dfa0 RCX: 00007fc67f306929 [ 333.717457][T10815] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000009 [ 333.725440][T10815] RBP: 00007fc67d16e090 R08: 0000000000000000 R09: 0000000000000000 [ 333.733417][T10815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 333.741483][T10815] R13: 0000000000000000 R14: 00007fc67f52dfa0 R15: 00007ffef8cf0108 [ 333.749481][T10815] [ 333.773330][T10525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.794028][T10525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 333.805173][T10525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.874304][T10525] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 333.899568][T10525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 333.931064][T10525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.946895][T10525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 333.958783][T10525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.970582][T10525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 333.981829][T10525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 333.995688][T10525] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 334.007668][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 334.027881][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 334.041727][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 334.051995][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 334.070913][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 334.083439][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 334.107903][T10525] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 334.146258][T10525] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 334.155638][T10525] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 334.181924][T10525] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 334.251561][ T9524] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 334.367218][ T9524] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 334.559660][ T6004] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 334.586322][ T6004] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 334.609325][ T9524] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 334.895519][ T6020] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 334.905096][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 335.014781][ T6020] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 335.133309][ T9524] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 335.181301][T10853] FAULT_INJECTION: forcing a failure. [ 335.181301][T10853] name failslab, interval 1, probability 0, space 0, times 0 [ 335.232796][ T4280] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 335.246365][T10853] CPU: 0 PID: 10853 Comm: syz.7.1772 Not tainted 5.15.186-syzkaller #0 [ 335.254681][T10853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 335.264773][T10853] Call Trace: [ 335.268077][T10853] [ 335.271116][T10853] dump_stack_lvl+0x168/0x230 [ 335.275825][T10853] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 335.282018][T10853] ? show_regs_print_info+0x20/0x20 [ 335.287252][T10853] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 335.293446][T10853] ? dump_stack+0x5/0x20 [ 335.297731][T10853] should_fail+0x38c/0x4c0 [ 335.302186][T10853] should_failslab+0x5/0x20 [ 335.306723][T10853] slab_pre_alloc_hook+0x51/0xc0 [ 335.311702][T10853] __kmalloc+0x6b/0x330 [ 335.315890][T10853] ? tomoyo_encode+0x27e/0x540 [ 335.320918][T10853] tomoyo_encode+0x27e/0x540 [ 335.325559][T10853] tomoyo_realpath_from_path+0x5cd/0x610 [ 335.331248][T10853] tomoyo_path_number_perm+0x1d5/0x5d0 [ 335.336939][T10853] ? verify_lock_unused+0x140/0x140 [ 335.342271][T10853] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 335.347774][T10853] ? hrtimer_interrupt+0x4d4/0x8d0 [ 335.352946][T10853] ? ktime_get+0x7b/0x270 [ 335.357374][T10853] security_file_ioctl+0x6c/0xa0 [ 335.362342][T10853] __se_sys_ioctl+0x48/0x170 [ 335.366961][T10853] do_syscall_64+0x4c/0xa0 [ 335.371393][T10853] ? clear_bhb_loop+0x30/0x80 [ 335.376094][T10853] ? clear_bhb_loop+0x30/0x80 [ 335.380794][T10853] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 335.386704][T10853] RIP: 0033:0x7f7bb52b3929 [ 335.391144][T10853] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 335.410761][T10853] RSP: 002b:00007f7bb311b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 335.419207][T10853] RAX: ffffffffffffffda RBX: 00007f7bb54dafa0 RCX: 00007f7bb52b3929 [ 335.427191][T10853] RDX: 0000200000000300 RSI: 0000000000008918 RDI: 0000000000000007 [ 335.435168][T10853] RBP: 00007f7bb311b090 R08: 0000000000000000 R09: 0000000000000000 [ 335.443158][T10853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 335.451136][T10853] R13: 0000000000000000 R14: 00007f7bb54dafa0 R15: 00007ffcd2876fe8 [ 335.459139][T10853] [ 335.496573][T10856] netlink: 'syz.7.1772': attribute type 10 has an invalid length. [ 335.518845][T10856] team0: Device ipvlan1 is up. Set it down before adding it as a team port [ 335.527578][T10853] ERROR: Out of memory at tomoyo_realpath_from_path. [ 335.542705][T10859] netlink: 'syz.5.1774': attribute type 22 has an invalid length. [ 335.572978][T10859] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1774'. [ 335.780373][T10874] FAULT_INJECTION: forcing a failure. [ 335.780373][T10874] name failslab, interval 1, probability 0, space 0, times 0 [ 335.794239][T10874] CPU: 0 PID: 10874 Comm: syz.5.1779 Not tainted 5.15.186-syzkaller #0 [ 335.802672][T10874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 335.812784][T10874] Call Trace: [ 335.816174][T10874] [ 335.819150][T10874] dump_stack_lvl+0x168/0x230 [ 335.823872][T10874] ? show_regs_print_info+0x20/0x20 [ 335.829106][T10874] ? load_image+0x3b0/0x3b0 [ 335.833637][T10874] ? __might_sleep+0xf0/0xf0 [ 335.838243][T10874] ? __lock_acquire+0x7c60/0x7c60 [ 335.843295][T10874] should_fail+0x38c/0x4c0 [ 335.847761][T10874] should_failslab+0x5/0x20 [ 335.852325][T10874] slab_pre_alloc_hook+0x51/0xc0 [ 335.857422][T10874] __kmalloc+0x6b/0x330 [ 335.861622][T10874] ? tomoyo_encode+0x27e/0x540 [ 335.866433][T10874] tomoyo_encode+0x27e/0x540 [ 335.871099][T10874] tomoyo_realpath_from_path+0x5cd/0x610 [ 335.876817][T10874] tomoyo_path_number_perm+0x1d5/0x5d0 [ 335.882369][T10874] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 335.887875][T10874] ? perf_trace_lock+0x2ec/0x370 [ 335.892933][T10874] security_file_ioctl+0x6c/0xa0 [ 335.897924][T10874] __se_sys_ioctl+0x48/0x170 [ 335.902573][T10874] do_syscall_64+0x4c/0xa0 [ 335.907026][T10874] ? clear_bhb_loop+0x30/0x80 [ 335.911726][T10874] ? clear_bhb_loop+0x30/0x80 [ 335.916431][T10874] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 335.922436][T10874] RIP: 0033:0x7fc67f306929 [ 335.926913][T10874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 335.946741][T10874] RSP: 002b:00007fc67d16e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 335.955315][T10874] RAX: ffffffffffffffda RBX: 00007fc67f52dfa0 RCX: 00007fc67f306929 [ 335.963355][T10874] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 0000000000000007 [ 335.971370][T10874] RBP: 00007fc67d16e090 R08: 0000000000000000 R09: 0000000000000000 [ 335.979396][T10874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 335.987498][T10874] R13: 0000000000000000 R14: 00007fc67f52dfa0 R15: 00007ffef8cf0108 [ 335.995532][T10874] [ 336.009281][T10874] ERROR: Out of memory at tomoyo_realpath_from_path. [ 336.254486][T10898] FAULT_INJECTION: forcing a failure. [ 336.254486][T10898] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 336.302480][T10902] netlink: 'syz.6.1787': attribute type 2 has an invalid length. [ 336.311195][T10898] CPU: 1 PID: 10898 Comm: syz.1.1786 Not tainted 5.15.186-syzkaller #0 [ 336.319483][T10898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 336.329661][T10898] Call Trace: [ 336.332973][T10898] [ 336.335927][T10898] dump_stack_lvl+0x168/0x230 [ 336.338715][T10902] netlink: 'syz.6.1787': attribute type 8 has an invalid length. [ 336.340637][T10898] ? show_regs_print_info+0x20/0x20 [ 336.353654][T10898] ? load_image+0x3b0/0x3b0 [ 336.355820][T10902] netlink: 132 bytes leftover after parsing attributes in process `syz.6.1787'. [ 336.358206][T10898] ? __lock_acquire+0x7c60/0x7c60 [ 336.358249][T10898] should_fail+0x38c/0x4c0 [ 336.358290][T10898] _copy_from_user+0x2e/0x170 [ 336.358316][T10898] iovec_from_user+0x142/0x370 [ 336.358344][T10898] __import_iovec+0x70/0x490 [ 336.358377][T10898] import_iovec+0x6f/0xa0 [ 336.395423][T10898] ___sys_sendmsg+0x1b9/0x260 [ 336.400154][T10898] ? __sys_sendmsg+0x250/0x250 [ 336.404978][T10898] ? vfs_write+0x84d/0xd00 [ 336.409451][T10898] ? __fdget+0x18b/0x210 [ 336.413734][T10898] __se_sys_sendmsg+0x190/0x250 [ 336.418624][T10898] ? __x64_sys_sendmsg+0x80/0x80 [ 336.423678][T10898] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 336.429690][T10898] ? lockdep_hardirqs_on+0x94/0x140 [ 336.434917][T10898] do_syscall_64+0x4c/0xa0 [ 336.439357][T10898] ? clear_bhb_loop+0x30/0x80 [ 336.444059][T10898] ? clear_bhb_loop+0x30/0x80 [ 336.448761][T10898] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 336.454679][T10898] RIP: 0033:0x7f373932e929 [ 336.459111][T10898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 336.478760][T10898] RSP: 002b:00007f3737196038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 336.487191][T10898] RAX: ffffffffffffffda RBX: 00007f3739555fa0 RCX: 00007f373932e929 [ 336.495173][T10898] RDX: 0000000020000000 RSI: 0000200000000100 RDI: 0000000000000005 [ 336.503169][T10898] RBP: 00007f3737196090 R08: 0000000000000000 R09: 0000000000000000 [ 336.511158][T10898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 336.519139][T10898] R13: 0000000000000000 R14: 00007f3739555fa0 R15: 00007ffc26947588 [ 336.527221][T10898] [ 336.540980][T10907] FAULT_INJECTION: forcing a failure. [ 336.540980][T10907] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 336.573329][T10907] CPU: 1 PID: 10907 Comm: syz.5.1788 Not tainted 5.15.186-syzkaller #0 [ 336.581631][T10907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 336.591791][T10907] Call Trace: [ 336.595099][T10907] [ 336.598044][T10907] dump_stack_lvl+0x168/0x230 [ 336.602744][T10907] ? show_regs_print_info+0x20/0x20 [ 336.607955][T10907] ? load_image+0x3b0/0x3b0 [ 336.612493][T10907] ? __lock_acquire+0x7c60/0x7c60 [ 336.617532][T10907] ? __vmalloc_node_range+0x2dd/0x8b0 [ 336.622944][T10907] ? bpf_prog_alloc_no_stats+0x36/0x2c0 [ 336.628504][T10907] ? bpf_prog_alloc+0x1a/0x1e0 [ 336.633286][T10907] ? bpf_prog_load+0x7b3/0x1550 [ 336.638157][T10907] should_fail+0x38c/0x4c0 [ 336.642596][T10907] prepare_alloc_pages+0x1e4/0x5f0 [ 336.647728][T10907] __alloc_pages+0x10e/0x470 [ 336.652329][T10907] ? zone_statistics+0x170/0x170 [ 336.657281][T10907] ? alloc_pages+0x438/0x550 [ 336.661893][T10907] __vmalloc_node_range+0x4b2/0x8b0 [ 336.667151][T10907] ? bpf_prog_alloc_no_stats+0x36/0x2c0 [ 336.672717][T10907] __vmalloc+0x76/0x80 [ 336.676802][T10907] ? bpf_prog_alloc_no_stats+0x36/0x2c0 [ 336.682377][T10907] bpf_prog_alloc_no_stats+0x36/0x2c0 [ 336.687767][T10907] bpf_prog_alloc+0x1a/0x1e0 [ 336.692374][T10907] bpf_prog_load+0x7b3/0x1550 [ 336.697086][T10907] ? map_freeze+0x350/0x350 [ 336.701605][T10907] ? __might_fault+0xb7/0x110 [ 336.706310][T10907] ? __might_fault+0xb3/0x110 [ 336.711005][T10907] ? bpf_lsm_bpf+0x5/0x10 [ 336.715353][T10907] ? security_bpf+0x7a/0xa0 [ 336.719867][T10907] __sys_bpf+0x4c2/0x670 [ 336.724125][T10907] ? bpf_link_show_fdinfo+0x310/0x310 [ 336.729519][T10907] ? vtime_user_exit+0x2dc/0x400 [ 336.734479][T10907] __x64_sys_bpf+0x78/0x90 [ 336.738910][T10907] do_syscall_64+0x4c/0xa0 [ 336.743336][T10907] ? clear_bhb_loop+0x30/0x80 [ 336.748024][T10907] ? clear_bhb_loop+0x30/0x80 [ 336.752722][T10907] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 336.758624][T10907] RIP: 0033:0x7fc67f306929 [ 336.763139][T10907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 336.782754][T10907] RSP: 002b:00007fc67d16e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 336.791180][T10907] RAX: ffffffffffffffda RBX: 00007fc67f52dfa0 RCX: 00007fc67f306929 [ 336.799173][T10907] RDX: 0000000000000080 RSI: 0000200000000180 RDI: 0000000000000005 [ 336.807195][T10907] RBP: 00007fc67d16e090 R08: 0000000000000000 R09: 0000000000000000 [ 336.815184][T10907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 336.823167][T10907] R13: 0000000000000001 R14: 00007fc67f52dfa0 R15: 00007ffef8cf0108 [ 336.831429][T10907] [ 337.040227][T10920] FAULT_INJECTION: forcing a failure. [ 337.040227][T10920] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 337.057405][T10920] CPU: 1 PID: 10920 Comm: syz.7.1793 Not tainted 5.15.186-syzkaller #0 [ 337.065709][T10920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 337.075864][T10920] Call Trace: [ 337.079154][T10920] [ 337.082093][T10920] dump_stack_lvl+0x168/0x230 [ 337.086788][T10920] ? lockdep_hardirqs_on+0x94/0x140 [ 337.092005][T10920] ? show_regs_print_info+0x20/0x20 [ 337.097224][T10920] ? dump_stack+0x5/0x20 [ 337.101479][T10920] ? __sanitizer_cov_trace_pc+0x4/0x60 [ 337.106946][T10920] should_fail+0x38c/0x4c0 [ 337.111383][T10920] _copy_from_user+0x2e/0x170 [ 337.116076][T10920] __copy_msghdr_from_user+0x448/0x5e0 [ 337.121553][T10920] ? verify_lock_unused+0x140/0x140 [ 337.126898][T10920] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 337.132260][T10920] ___sys_sendmsg+0x156/0x260 [ 337.136970][T10920] ? __sys_sendmsg+0x250/0x250 [ 337.141758][T10920] ? ktime_get_real_ts64+0x420/0x420 [ 337.147076][T10920] ? __fdget+0x18b/0x210 [ 337.151357][T10920] __se_sys_sendmsg+0x190/0x250 [ 337.156226][T10920] ? __x64_sys_sendmsg+0x80/0x80 [ 337.161178][T10920] ? lockdep_hardirqs_on+0x94/0x140 [ 337.166409][T10920] do_syscall_64+0x4c/0xa0 [ 337.170842][T10920] ? clear_bhb_loop+0x30/0x80 [ 337.175550][T10920] ? clear_bhb_loop+0x30/0x80 [ 337.180247][T10920] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 337.186157][T10920] RIP: 0033:0x7f7bb52b3929 [ 337.190584][T10920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 337.210214][T10920] RSP: 002b:00007f7bb311b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 337.218650][T10920] RAX: ffffffffffffffda RBX: 00007f7bb54dafa0 RCX: 00007f7bb52b3929 [ 337.226630][T10920] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000006 [ 337.234614][T10920] RBP: 00007f7bb311b090 R08: 0000000000000000 R09: 0000000000000000 [ 337.242730][T10920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 337.250748][T10920] R13: 0000000000000000 R14: 00007f7bb54dafa0 R15: 00007ffcd2876fe8 [ 337.258761][T10920] [ 337.794782][T10944] FAULT_INJECTION: forcing a failure. [ 337.794782][T10944] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 337.837848][T10944] CPU: 0 PID: 10944 Comm: syz.7.1802 Not tainted 5.15.186-syzkaller #0 [ 337.846162][T10944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 337.856249][T10944] Call Trace: [ 337.859642][T10944] [ 337.862608][T10944] dump_stack_lvl+0x168/0x230 [ 337.867311][T10944] ? show_regs_print_info+0x20/0x20 [ 337.872527][T10944] ? load_image+0x3b0/0x3b0 [ 337.877086][T10944] ? __lock_acquire+0x7c60/0x7c60 [ 337.882137][T10944] ? __lock_acquire+0x13ad/0x7c60 [ 337.887184][T10944] should_fail+0x38c/0x4c0 [ 337.891634][T10944] strncpy_from_user+0x32/0x360 [ 337.896507][T10944] bpf_prog_load+0x1a8/0x1550 [ 337.901213][T10944] ? map_freeze+0x350/0x350 [ 337.905726][T10944] ? __might_fault+0xb7/0x110 [ 337.910428][T10944] ? __might_fault+0xb3/0x110 [ 337.915124][T10944] ? bpf_lsm_bpf+0x5/0x10 [ 337.919462][T10944] ? security_bpf+0x7a/0xa0 [ 337.923977][T10944] __sys_bpf+0x4c2/0x670 [ 337.928237][T10944] ? bpf_link_show_fdinfo+0x310/0x310 [ 337.933632][T10944] ? vtime_user_exit+0x2dc/0x400 [ 337.938584][T10944] __x64_sys_bpf+0x78/0x90 [ 337.943014][T10944] do_syscall_64+0x4c/0xa0 [ 337.947559][T10944] ? clear_bhb_loop+0x30/0x80 [ 337.952252][T10944] ? clear_bhb_loop+0x30/0x80 [ 337.956942][T10944] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 337.962891][T10944] RIP: 0033:0x7f7bb52b3929 [ 337.967320][T10944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 337.986935][T10944] RSP: 002b:00007f7bb311b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 337.995359][T10944] RAX: ffffffffffffffda RBX: 00007f7bb54dafa0 RCX: 00007f7bb52b3929 [ 338.003338][T10944] RDX: 0000000000000048 RSI: 00002000000054c0 RDI: 0000000000000005 [ 338.011360][T10944] RBP: 00007f7bb311b090 R08: 0000000000000000 R09: 0000000000000000 [ 338.019343][T10944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 338.027320][T10944] R13: 0000000000000000 R14: 00007f7bb54dafa0 R15: 00007ffcd2876fe8 [ 338.035320][T10944] [ 338.494651][ T9524] device hsr_slave_0 left promiscuous mode [ 338.501879][ T9524] device hsr_slave_1 left promiscuous mode [ 338.510913][ T9524] device bridge_slave_1 left promiscuous mode [ 338.517533][ T9524] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.525907][ T9524] device bridge_slave_0 left promiscuous mode [ 338.533740][ T9524] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.546005][ T9524] device veth1_macvtap left promiscuous mode [ 338.552251][ T9524] device veth0_macvtap left promiscuous mode [ 338.558446][ T9524] device veth1_vlan left promiscuous mode [ 338.738901][ T9524] team0 (unregistering): Port device team_slave_1 removed [ 338.753142][ T9524] team0 (unregistering): Port device team_slave_0 removed [ 338.766120][ T9524] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 338.783184][ T9524] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 338.850357][ T9524] bond0 (unregistering): Released all slaves [ 338.979016][T10958] FAULT_INJECTION: forcing a failure. [ 338.979016][T10958] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 339.021743][T10958] CPU: 1 PID: 10958 Comm: syz.5.1806 Not tainted 5.15.186-syzkaller #0 [ 339.030070][T10958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 339.040182][T10958] Call Trace: [ 339.043520][T10958] [ 339.046500][T10958] dump_stack_lvl+0x168/0x230 [ 339.051250][T10958] ? show_regs_print_info+0x20/0x20 [ 339.056500][T10958] ? load_image+0x3b0/0x3b0 [ 339.061078][T10958] ? __lock_acquire+0x7c60/0x7c60 [ 339.066150][T10958] ? __bpf_prog_test_run_raw_tp+0x27b/0x3e0 [ 339.072127][T10958] should_fail+0x38c/0x4c0 [ 339.076642][T10958] _copy_to_user+0x2e/0x130 [ 339.081211][T10958] bpf_prog_test_run_raw_tp+0x4c3/0x630 [ 339.086843][T10958] ? trace_bpf_test_finish+0x1a0/0x1a0 [ 339.092391][T10958] ? trace_bpf_test_finish+0x1a0/0x1a0 [ 339.097913][T10958] bpf_prog_test_run+0x31e/0x390 [ 339.102922][T10958] __sys_bpf+0x535/0x670 [ 339.107233][T10958] ? bpf_link_show_fdinfo+0x310/0x310 [ 339.112868][T10958] __x64_sys_bpf+0x78/0x90 [ 339.117362][T10958] do_syscall_64+0x4c/0xa0 [ 339.121853][T10958] ? clear_bhb_loop+0x30/0x80 [ 339.126588][T10958] ? clear_bhb_loop+0x30/0x80 [ 339.131331][T10958] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 339.137324][T10958] RIP: 0033:0x7fc67f306929 [ 339.141804][T10958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 339.161611][T10958] RSP: 002b:00007fc67d16e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 339.170103][T10958] RAX: ffffffffffffffda RBX: 00007fc67f52dfa0 RCX: 00007fc67f306929 [ 339.178126][T10958] RDX: 000000000000000c RSI: 0000200000000400 RDI: 000000000000000a [ 339.186149][T10958] RBP: 00007fc67d16e090 R08: 0000000000000000 R09: 0000000000000000 [ 339.194173][T10958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 339.202201][T10958] R13: 0000000000000000 R14: 00007fc67f52dfa0 R15: 00007ffef8cf0108 [ 339.210298][T10958] [ 339.707934][T10961] chnl_net:caif_netlink_parms(): no params data found [ 339.958493][T10961] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.986185][T10961] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.026643][T10961] device bridge_slave_0 entered promiscuous mode [ 340.069378][T10983] netlink: 'syz.5.1813': attribute type 1 has an invalid length. [ 340.099137][T10983] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1813'. [ 340.221155][T10961] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.237904][T10961] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.303437][T10961] device bridge_slave_1 entered promiscuous mode [ 340.823710][T10961] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 340.901569][T10961] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 341.059806][T10961] team0: Port device team_slave_0 added [ 341.079793][T10961] team0: Port device team_slave_1 added [ 341.109886][T11003] netlink: 9286 bytes leftover after parsing attributes in process `syz.5.1819'. [ 341.183860][T10961] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 341.199091][T10961] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 341.282331][T10961] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 341.334063][T10961] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 341.346171][ T4298] Bluetooth: hci4: command 0x0409 tx timeout [ 341.356333][T10961] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 341.430328][T10961] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 341.619048][T10961] device hsr_slave_0 entered promiscuous mode [ 341.634251][T11024] netlink: 1034 bytes leftover after parsing attributes in process `syz.1.1826'. [ 341.635079][T10961] device hsr_slave_1 entered promiscuous mode [ 341.687858][T11027] netlink: 'syz.1.1826': attribute type 29 has an invalid length. [ 341.729012][T11026] netlink: 'syz.7.1827': attribute type 10 has an invalid length. [ 341.746675][T11026] netlink: 65015 bytes leftover after parsing attributes in process `syz.7.1827'. [ 341.769204][T11027] netlink: 'syz.1.1826': attribute type 29 has an invalid length. [ 341.795481][T11024] netlink: 'syz.1.1826': attribute type 29 has an invalid length. [ 341.859428][T11029] netlink: 'syz.1.1826': attribute type 29 has an invalid length. [ 341.888559][T11024] netlink: 'syz.1.1826': attribute type 29 has an invalid length. [ 341.908550][T11027] TCP: TCP_TX_DELAY enabled [ 342.161757][T10961] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 342.202868][T11042] FAULT_INJECTION: forcing a failure. [ 342.202868][T11042] name failslab, interval 1, probability 0, space 0, times 0 [ 342.236004][T11042] CPU: 0 PID: 11042 Comm: syz.1.1830 Not tainted 5.15.186-syzkaller #0 [ 342.244315][T11042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 342.254398][T11042] Call Trace: [ 342.257704][T11042] [ 342.260660][T11042] dump_stack_lvl+0x168/0x230 [ 342.265456][T11042] ? show_regs_print_info+0x20/0x20 [ 342.270697][T11042] ? load_image+0x3b0/0x3b0 [ 342.275239][T11042] ? __lock_acquire+0x12d9/0x7c60 [ 342.280301][T11042] should_fail+0x38c/0x4c0 [ 342.284758][T11042] should_failslab+0x5/0x20 [ 342.289282][T11042] slab_pre_alloc_hook+0x51/0xc0 [ 342.294252][T11042] ? skb_clone+0x1bd/0x350 [ 342.298698][T11042] kmem_cache_alloc+0x3d/0x290 [ 342.303498][T11042] skb_clone+0x1bd/0x350 [ 342.307896][T11042] bpf_clone_redirect+0xa9/0x390 [ 342.312891][T11042] bpf_prog_4a8c2353fb668905+0x5c/0x6f4 [ 342.318466][T11042] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 342.324480][T11042] ? lock_chain_count+0x20/0x20 [ 342.329367][T11042] ? seqcount_lockdep_reader_access+0x120/0x1c0 [ 342.335634][T11042] ? lockdep_hardirqs_on+0x94/0x140 [ 342.340875][T11042] ? ktime_get+0x7b/0x270 [ 342.345245][T11042] ? seqcount_lockdep_reader_access+0x172/0x1c0 [ 342.351523][T11042] ? ktime_get_real_ts64+0x420/0x420 [ 342.356839][T11042] ? read_lock_is_recursive+0x10/0x10 [ 342.362250][T11042] bpf_test_run+0x522/0x870 [ 342.366783][T11042] ? convert___skb_to_skb+0x4c0/0x4c0 [ 342.372172][T11042] ? eth_get_headlen+0x1f0/0x1f0 [ 342.377125][T11042] ? __build_skb+0x1e2/0x2e0 [ 342.381736][T11042] ? convert___skb_to_skb+0x3d/0x4c0 [ 342.387038][T11042] bpf_prog_test_run_skb+0x9cc/0x1180 [ 342.392436][T11042] ? cpu_online+0x60/0x60 [ 342.396774][T11042] bpf_prog_test_run+0x31e/0x390 [ 342.401725][T11042] __sys_bpf+0x535/0x670 [ 342.405981][T11042] ? bpf_link_show_fdinfo+0x310/0x310 [ 342.411378][T11042] ? vtime_user_exit+0x2dc/0x400 [ 342.416334][T11042] __x64_sys_bpf+0x78/0x90 [ 342.420763][T11042] do_syscall_64+0x4c/0xa0 [ 342.425189][T11042] ? clear_bhb_loop+0x30/0x80 [ 342.429872][T11042] ? clear_bhb_loop+0x30/0x80 [ 342.434577][T11042] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 342.440587][T11042] RIP: 0033:0x7f373932e929 [ 342.445025][T11042] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 342.464643][T11042] RSP: 002b:00007f3737196038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 342.473071][T11042] RAX: ffffffffffffffda RBX: 00007f3739555fa0 RCX: 00007f373932e929 [ 342.481051][T11042] RDX: 0000000000000023 RSI: 0000200000000240 RDI: 000000000000000a [ 342.489028][T11042] RBP: 00007f3737196090 R08: 0000000000000000 R09: 0000000000000000 [ 342.497006][T11042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 342.504988][T11042] R13: 0000000000000000 R14: 00007f3739555fa0 R15: 00007ffc26947588 [ 342.513425][T11042] [ 342.953883][T10961] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 343.057125][T11051] netlink: 144 bytes leftover after parsing attributes in process `syz.1.1834'. [ 343.105472][T10961] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 343.210756][T10961] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 343.426379][ T13] Bluetooth: hci4: command 0x041b tx timeout [ 343.692525][T10961] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 343.741598][T10961] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 343.785893][T10961] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 343.801864][T10961] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 344.032554][T11084] FAULT_INJECTION: forcing a failure. [ 344.032554][T11084] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 344.054933][T11084] CPU: 1 PID: 11084 Comm: syz.6.1845 Not tainted 5.15.186-syzkaller #0 [ 344.063239][T11084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 344.073422][T11084] Call Trace: [ 344.076734][T11084] [ 344.079698][T11084] dump_stack_lvl+0x168/0x230 [ 344.084422][T11084] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 344.090626][T11084] ? show_regs_print_info+0x20/0x20 [ 344.095876][T11084] ? load_image+0x3b0/0x3b0 [ 344.100441][T11084] should_fail+0x38c/0x4c0 [ 344.105095][T11084] strncpy_from_user+0x32/0x360 [ 344.110008][T11084] bpf_prog_load+0x1a8/0x1550 [ 344.114730][T11084] ? lock_chain_count+0x20/0x20 [ 344.119615][T11084] ? map_freeze+0x350/0x350 [ 344.124256][T11084] ? __sys_bpf+0x284/0x670 [ 344.128708][T11084] ? __sanitizer_cov_trace_switch+0x66/0xe0 [ 344.134782][T11084] __sys_bpf+0x4c2/0x670 [ 344.139056][T11084] ? bpf_link_show_fdinfo+0x310/0x310 [ 344.144478][T11084] __x64_sys_bpf+0x78/0x90 [ 344.148928][T11084] do_syscall_64+0x4c/0xa0 [ 344.153404][T11084] ? clear_bhb_loop+0x30/0x80 [ 344.158115][T11084] ? clear_bhb_loop+0x30/0x80 [ 344.162831][T11084] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 344.168870][T11084] RIP: 0033:0x7f7721f25929 [ 344.173323][T11084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 344.192953][T11084] RSP: 002b:00007f771fd8d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 344.201410][T11084] RAX: ffffffffffffffda RBX: 00007f772214cfa0 RCX: 00007f7721f25929 [ 344.209412][T11084] RDX: 0000000000000090 RSI: 0000200000000840 RDI: 0000000000000005 [ 344.217582][T11084] RBP: 00007f771fd8d090 R08: 0000000000000000 R09: 0000000000000000 [ 344.225590][T11084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 344.233584][T11084] R13: 0000000000000000 R14: 00007f772214cfa0 R15: 00007fff4a0f6708 [ 344.241601][T11084] [ 344.264376][T10961] 8021q: adding VLAN 0 to HW filter on device bond0 [ 344.306929][ T6020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 344.345655][ T6020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 344.388340][T10961] 8021q: adding VLAN 0 to HW filter on device team0 [ 344.435366][ T6020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 344.450877][ T6020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 344.468985][ T6020] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.476161][ T6020] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.497518][ T6020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 344.528391][ T6020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 344.542845][ T6020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 344.553401][T11101] FAULT_INJECTION: forcing a failure. [ 344.553401][T11101] name failslab, interval 1, probability 0, space 0, times 0 [ 344.574309][ T6020] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.581526][ T6020] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.615386][T11101] CPU: 0 PID: 11101 Comm: syz.6.1849 Not tainted 5.15.186-syzkaller #0 [ 344.623702][T11101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 344.633791][T11101] Call Trace: [ 344.637097][T11101] [ 344.640101][T11101] dump_stack_lvl+0x168/0x230 [ 344.644827][T11101] ? show_regs_print_info+0x20/0x20 [ 344.650072][T11101] ? load_image+0x3b0/0x3b0 [ 344.654765][T11101] ? __might_sleep+0xf0/0xf0 [ 344.659416][T11101] ? __lock_acquire+0x7c60/0x7c60 [ 344.664489][T11101] should_fail+0x38c/0x4c0 [ 344.668955][T11101] should_failslab+0x5/0x20 [ 344.673483][T11101] slab_pre_alloc_hook+0x51/0xc0 [ 344.678453][T11101] kmem_cache_alloc_trace+0x47/0x2a0 [ 344.683766][T11101] ? tcp_sendmsg_fastopen+0x1d5/0x600 [ 344.689174][T11101] tcp_sendmsg_fastopen+0x1d5/0x600 [ 344.694415][T11101] tcp_sendmsg_locked+0x3097/0x3590 [ 344.699655][T11101] ? aa_sk_perm+0x8f0/0x8f0 [ 344.704199][T11101] ? __lock_acquire+0x12d9/0x7c60 [ 344.709256][T11101] ? verify_lock_unused+0x140/0x140 [ 344.714491][T11101] ? mark_lock+0x94/0x320 [ 344.718854][T11101] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 344.724877][T11101] ? lock_chain_count+0x20/0x20 [ 344.729952][T11101] ? lockdep_hardirqs_on_prepare+0x760/0x760 [ 344.735977][T11101] ? tcp_free_fastopen_req+0x70/0x70 [ 344.741309][T11101] ? lock_sock_nested+0x68/0x100 [ 344.746290][T11101] ? inet_send_prepare+0x260/0x260 [ 344.751441][T11101] ? inet_send_prepare+0x260/0x260 [ 344.756591][T11101] tcp_sendmsg+0x2b/0x40 [ 344.760876][T11101] ____sys_sendmsg+0x5a2/0x8c0 [ 344.765678][T11101] ? memset+0x1e/0x40 [ 344.769685][T11101] ? __sys_sendmsg_sock+0x30/0x30 [ 344.774756][T11101] ? import_iovec+0x6f/0xa0 [ 344.779286][T11101] ___sys_sendmsg+0x1f0/0x260 [ 344.784003][T11101] ? __sys_sendmsg+0x250/0x250 [ 344.788813][T11101] ? vfs_write+0x84d/0xd00 [ 344.793281][T11101] ? __fdget+0x18b/0x210 [ 344.797555][T11101] __se_sys_sendmsg+0x190/0x250 [ 344.802446][T11101] ? __x64_sys_sendmsg+0x80/0x80 [ 344.807421][T11101] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 344.813449][T11101] ? lockdep_hardirqs_on+0x94/0x140 [ 344.818686][T11101] do_syscall_64+0x4c/0xa0 [ 344.823136][T11101] ? clear_bhb_loop+0x30/0x80 [ 344.827847][T11101] ? clear_bhb_loop+0x30/0x80 [ 344.832566][T11101] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 344.838502][T11101] RIP: 0033:0x7f7721f25929 [ 344.842958][T11101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 344.862592][T11101] RSP: 002b:00007f771fd6c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 344.871031][T11101] RAX: ffffffffffffffda RBX: 00007f772214d080 RCX: 00007f7721f25929 [ 344.879021][T11101] RDX: 000000003000c085 RSI: 0000200000000080 RDI: 0000000000000008 [ 344.886997][T11101] RBP: 00007f771fd6c090 R08: 0000000000000000 R09: 0000000000000000 [ 344.894974][T11101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 344.902968][T11101] R13: 0000000000000000 R14: 00007f772214d080 R15: 00007fff4a0f6708 [ 344.910967][T11101] [ 344.948133][ T6020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 344.969600][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 345.021551][ T6020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 345.045977][ T6020] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 345.109536][ T6020] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 345.138276][ T6020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 345.179112][ T6020] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 345.214582][ T6020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 345.241823][ T6020] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 345.328908][T10961] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 345.341696][T10961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 345.352676][ T6020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 345.362170][ T6020] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 345.408737][T11095] syz.1.1848 (11095) used greatest stack depth: 15424 bytes left [ 345.510065][ T7] Bluetooth: hci4: command 0x040f tx timeout [ 346.162997][T11126] netlink: 'syz.6.1856': attribute type 6 has an invalid length. [ 346.256430][ T4280] device hsr_slave_0 left promiscuous mode [ 346.263117][ T4280] device hsr_slave_1 left promiscuous mode [ 346.276775][ T4280] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 346.284433][ T4280] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 346.293476][ T4280] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 346.301920][ T4280] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 346.314247][ T4280] device bridge_slave_1 left promiscuous mode [ 346.320821][ T4280] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.333980][ T4280] device bridge_slave_0 left promiscuous mode [ 346.341027][ T4280] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.357290][ T4280] device veth1_macvtap left promiscuous mode [ 346.363546][ T4280] device veth0_macvtap left promiscuous mode [ 346.370101][ T4280] device veth1_vlan left promiscuous mode [ 346.379682][ T4280] device veth0_vlan left promiscuous mode [ 346.640503][ T4280] team0 (unregistering): Port device team_slave_1 removed [ 346.656745][ T4280] team0 (unregistering): Port device team_slave_0 removed [ 346.673718][ T4280] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 346.692681][ T4280] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 346.771906][ T4280] bond0 (unregistering): Released all slaves [ 346.824734][ T9524] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 346.832648][ T9524] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 346.847730][T11145] tun0: tun_chr_ioctl cmd 1074022621 [ 346.881337][T10961] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 347.450406][T11170] netlink: 61211 bytes leftover after parsing attributes in process `syz.1.1868'. [ 347.586662][ T13] Bluetooth: hci4: command 0x0419 tx timeout [ 347.730392][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 347.756829][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 347.822766][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 347.886882][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.914680][T11186] netlink: 'syz.6.1873': attribute type 12 has an invalid length. [ 347.931718][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 347.949255][T11186] netlink: 'syz.6.1873': attribute type 11 has an invalid length. [ 347.950207][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 347.976681][T11186] netlink: 178840 bytes leftover after parsing attributes in process `syz.6.1873'. [ 348.010647][T10961] device veth0_vlan entered promiscuous mode [ 348.053688][T11187] netlink: 'syz.5.1872': attribute type 21 has an invalid length. [ 348.067709][T11187] netlink: 'syz.5.1872': attribute type 1 has an invalid length. [ 348.179210][T10961] device veth1_vlan entered promiscuous mode [ 351.631562][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 351.670424][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 351.740889][T10961] device veth0_macvtap entered promiscuous mode [ 351.884952][T10961] device veth1_macvtap entered promiscuous mode [ 352.093019][T10961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 352.105096][T10961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 352.119362][T10961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 352.136135][T10961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 352.145998][T10961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 352.174824][T10961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 352.213714][T10961] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 352.269562][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 352.286683][T11218] FAULT_INJECTION: forcing a failure. [ 352.286683][T11218] name failslab, interval 1, probability 0, space 0, times 0 [ 352.287546][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 352.342642][T11218] CPU: 0 PID: 11218 Comm: syz.6.1879 Not tainted 5.15.186-syzkaller #0 [ 352.344058][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 352.350944][T11218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 352.350985][T11218] Call Trace: [ 352.350994][T11218] [ 352.351004][T11218] dump_stack_lvl+0x168/0x230 [ 352.377431][ T6004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 352.379951][T11218] ? show_regs_print_info+0x20/0x20 [ 352.393219][T11218] ? load_image+0x3b0/0x3b0 [ 352.397763][T11218] ? __might_sleep+0xf0/0xf0 [ 352.402381][T11218] ? __lock_acquire+0x7c60/0x7c60 [ 352.407430][T11218] ? copy_from_kernel_nofault_allowed+0xb9/0x130 [ 352.413792][T11218] should_fail+0x38c/0x4c0 [ 352.418253][T11218] should_failslab+0x5/0x20 [ 352.422793][T11218] slab_pre_alloc_hook+0x51/0xc0 [ 352.427774][T11218] __kmalloc+0x6b/0x330 [ 352.431961][T11218] ? tomoyo_encode+0x27e/0x540 [ 352.436752][T11218] tomoyo_encode+0x27e/0x540 [ 352.441373][T11218] tomoyo_realpath_from_path+0x5cd/0x610 [ 352.447046][T11218] tomoyo_path_number_perm+0x1d5/0x5d0 [ 352.452540][T11218] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 352.458019][T11218] ? perf_trace_preemptirq_template+0x2be/0x380 [ 352.464282][T11218] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 352.470292][T11218] ? __d_lookup_rcu+0x691/0x760 [ 352.475157][T11218] ? __lock_acquire+0x7c60/0x7c60 [ 352.480383][T11218] ? __rwlock_init+0x140/0x140 [ 352.485161][T11218] tomoyo_path_mknod+0x13f/0x180 [ 352.490112][T11218] ? d_alloc_parallel+0x1203/0x12d0 [ 352.495326][T11218] ? tomoyo_path_symlink+0xe0/0xe0 [ 352.500454][T11218] security_path_mknod+0xec/0x140 [ 352.505497][T11218] path_openat+0xb6c/0x2f30 [ 352.510036][T11218] ? verify_lock_unused+0x140/0x140 [ 352.515254][T11218] ? do_filp_open+0x3e0/0x3e0 [ 352.519962][T11218] do_filp_open+0x1b3/0x3e0 [ 352.524481][T11218] ? vfs_tmpfile+0x300/0x300 [ 352.529104][T11218] ? _raw_spin_unlock+0x24/0x40 [ 352.533962][T11218] ? alloc_fd+0x598/0x630 [ 352.538304][T11218] do_sys_openat2+0x142/0x4a0 [ 352.542997][T11218] ? do_sys_open+0xe0/0xe0 [ 352.547418][T11218] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 352.553417][T11218] ? lock_chain_count+0x20/0x20 [ 352.558278][T11218] ? vtime_user_exit+0x2dc/0x400 [ 352.563231][T11218] __x64_sys_openat+0x135/0x160 [ 352.568094][T11218] do_syscall_64+0x4c/0xa0 [ 352.572520][T11218] ? clear_bhb_loop+0x30/0x80 [ 352.577202][T11218] ? clear_bhb_loop+0x30/0x80 [ 352.581888][T11218] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 352.587787][T11218] RIP: 0033:0x7f7721f25929 [ 352.592210][T11218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 352.611824][T11218] RSP: 002b:00007f771fd8d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 352.620253][T11218] RAX: ffffffffffffffda RBX: 00007f772214cfa0 RCX: 00007f7721f25929 [ 352.628234][T11218] RDX: 00000000000026e1 RSI: 0000200000000180 RDI: ffffffffffffff9c [ 352.636233][T11218] RBP: 00007f771fd8d090 R08: 0000000000000000 R09: 0000000000000000 [ 352.644209][T11218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 352.652208][T11218] R13: 0000000000000000 R14: 00007f772214cfa0 R15: 00007fff4a0f6708 [ 352.660214][T11218] [ 352.700352][T10961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 352.728440][T10961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 352.751061][T10961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 352.762533][T11218] ERROR: Out of memory at tomoyo_realpath_from_path. [ 352.773128][T10961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 352.784793][T10961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 352.795929][T10961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 352.808286][T10961] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 352.836512][T10961] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 352.845592][T10961] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 352.856298][T10961] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 352.865144][T10961] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 352.883832][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 352.895459][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 353.091487][T11230] netlink: 'syz.6.1882': attribute type 5 has an invalid length. [ 353.172208][ T9518] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 353.225014][ T9518] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 353.296905][ T9518] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 353.333879][ T9518] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 353.353626][ T9518] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 353.391964][ T9524] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 353.421099][T11244] netlink: 'syz.7.1889': attribute type 21 has an invalid length. [ 353.436173][T11244] netlink: 'syz.7.1889': attribute type 20 has an invalid length. [ 353.458146][T11247] FAULT_INJECTION: forcing a failure. [ 353.458146][T11247] name failslab, interval 1, probability 0, space 0, times 0 [ 353.505142][T11247] CPU: 1 PID: 11247 Comm: syz.5.1891 Not tainted 5.15.186-syzkaller #0 [ 353.513442][T11247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 353.523540][T11247] Call Trace: [ 353.526851][T11247] [ 353.529806][T11247] dump_stack_lvl+0x168/0x230 [ 353.534521][T11247] ? show_regs_print_info+0x20/0x20 [ 353.539759][T11247] ? load_image+0x3b0/0x3b0 [ 353.544304][T11247] ? __might_sleep+0xf0/0xf0 [ 353.548927][T11247] ? __lock_acquire+0x7c60/0x7c60 [ 353.553975][T11247] ? lockdep_unlock+0x134/0x2d0 [ 353.558852][T11247] ? lockdep_lock+0x1e0/0x1e0 [ 353.563556][T11247] should_fail+0x38c/0x4c0 [ 353.567999][T11247] should_failslab+0x5/0x20 [ 353.572526][T11247] slab_pre_alloc_hook+0x51/0xc0 [ 353.577492][T11247] __kmalloc_node+0x6e/0x3b0 [ 353.582101][T11247] ? bpf_map_area_alloc+0x47/0xe0 [ 353.587151][T11247] bpf_map_area_alloc+0x47/0xe0 [ 353.592021][T11247] htab_map_alloc+0x3c3/0x15a0 [ 353.596816][T11247] ? capable+0x84/0xe0 [ 353.600911][T11247] ? htab_map_alloc_check+0x3e0/0x4d0 [ 353.606315][T11247] map_create+0x46e/0x2140 [ 353.610944][T11247] __sys_bpf+0x2a4/0x670 [ 353.615206][T11247] ? bpf_link_show_fdinfo+0x310/0x310 [ 353.620611][T11247] ? vtime_user_exit+0x2dc/0x400 [ 353.625578][T11247] __x64_sys_bpf+0x78/0x90 [ 353.630015][T11247] do_syscall_64+0x4c/0xa0 [ 353.634450][T11247] ? clear_bhb_loop+0x30/0x80 [ 353.639152][T11247] ? clear_bhb_loop+0x30/0x80 [ 353.643857][T11247] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 353.649786][T11247] RIP: 0033:0x7fc67f306929 [ 353.654225][T11247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 353.673856][T11247] RSP: 002b:00007fc67d16e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 353.682433][T11247] RAX: ffffffffffffffda RBX: 00007fc67f52dfa0 RCX: 00007fc67f306929 [ 353.690430][T11247] RDX: 0000000000000050 RSI: 00002000000009c0 RDI: 0000000000000000 [ 353.698428][T11247] RBP: 00007fc67d16e090 R08: 0000000000000000 R09: 0000000000000000 [ 353.706424][T11247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 353.714415][T11247] R13: 0000000000000001 R14: 00007fc67f52dfa0 R15: 00007ffef8cf0108 [ 353.722432][T11247] [ 354.096269][T11267] netlink: 65051 bytes leftover after parsing attributes in process `syz.1.1897'. [ 354.283213][ T4280] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 354.325002][ T4280] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 354.383253][ T4280] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 354.443806][ T4280] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 354.980786][T11275] FAULT_INJECTION: forcing a failure. [ 354.980786][T11275] name failslab, interval 1, probability 0, space 0, times 0 [ 355.008790][T11275] CPU: 1 PID: 11275 Comm: syz.6.1898 Not tainted 5.15.186-syzkaller #0 [ 355.017092][T11275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 355.027180][T11275] Call Trace: [ 355.030479][T11275] [ 355.033425][T11275] dump_stack_lvl+0x168/0x230 [ 355.038125][T11275] ? show_regs_print_info+0x20/0x20 [ 355.043343][T11275] ? load_image+0x3b0/0x3b0 [ 355.047869][T11275] ? __lock_acquire+0x7c60/0x7c60 [ 355.052912][T11275] ? lock_chain_count+0x20/0x20 [ 355.057778][T11275] should_fail+0x38c/0x4c0 [ 355.062219][T11275] should_failslab+0x5/0x20 [ 355.066736][T11275] slab_pre_alloc_hook+0x51/0xc0 [ 355.071682][T11275] ? sockfs_init_fs_context+0xa0/0xa0 [ 355.077062][T11275] ? sock_alloc_inode+0x17/0xb0 [ 355.081918][T11275] kmem_cache_alloc+0x3d/0x290 [ 355.086688][T11275] ? sockfs_init_fs_context+0xa0/0xa0 [ 355.092068][T11275] sock_alloc_inode+0x17/0xb0 [ 355.096748][T11275] ? sockfs_init_fs_context+0xa0/0xa0 [ 355.102124][T11275] new_inode_pseudo+0x5f/0x210 [ 355.106942][T11275] __sock_create+0x129/0x900 [ 355.111563][T11275] __sys_socketpair+0x232/0x540 [ 355.116445][T11275] __x64_sys_socketpair+0x97/0xb0 [ 355.121491][T11275] do_syscall_64+0x4c/0xa0 [ 355.126027][T11275] ? clear_bhb_loop+0x30/0x80 [ 355.130733][T11275] ? clear_bhb_loop+0x30/0x80 [ 355.135421][T11275] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 355.141328][T11275] RIP: 0033:0x7f7721f25929 [ 355.145761][T11275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 355.165498][T11275] RSP: 002b:00007f771fd8d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 355.173946][T11275] RAX: ffffffffffffffda RBX: 00007f772214cfa0 RCX: 00007f7721f25929 [ 355.181928][T11275] RDX: 0000000000000000 RSI: 0000000000080805 RDI: 0000000000000023 [ 355.189908][T11275] RBP: 00007f771fd8d090 R08: 0000000000000000 R09: 0000000000000000 [ 355.197883][T11275] R10: 0000200000000340 R11: 0000000000000246 R12: 0000000000000001 [ 355.205859][T11275] R13: 0000000000000000 R14: 00007f772214cfa0 R15: 00007fff4a0f6708 [ 355.213856][T11275] [ 355.219821][ T4244] Bluetooth: hci1: command 0x0406 tx timeout [ 355.226194][ T4244] Bluetooth: hci2: command 0x0406 tx timeout [ 355.232725][ T1111] Bluetooth: hci0: command 0x0406 tx timeout [ 355.276426][T11275] socket: no more sockets [ 355.783584][T11300] netlink: 'syz.7.1908': attribute type 10 has an invalid length. [ 355.831182][T11300] team0: Port device dummy0 added [ 355.850009][ T4280] device hsr_slave_0 left promiscuous mode [ 355.856987][ T4280] device hsr_slave_1 left promiscuous mode [ 355.863543][ T4280] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 355.871272][ T4280] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 355.879621][ T4280] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 355.887416][ T4280] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 355.898799][ T4280] device bridge_slave_1 left promiscuous mode [ 355.905176][ T4280] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.915044][ T4280] device bridge_slave_0 left promiscuous mode [ 355.925450][ T4280] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.949741][ T4280] device veth1_macvtap left promiscuous mode [ 355.959214][ T4280] device veth0_macvtap left promiscuous mode [ 355.965467][ T4280] device veth1_vlan left promiscuous mode [ 355.971702][ T4280] device veth0_vlan left promiscuous mode [ 356.200958][ T4280] team0 (unregistering): Port device team_slave_1 removed [ 356.215795][ T4280] team0 (unregistering): Port device team_slave_0 removed [ 356.231582][ T4280] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 356.248005][ T4280] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 356.339729][ T4280] bond0 (unregistering): Released all slaves [ 356.431038][T11300] netlink: 'syz.7.1908': attribute type 10 has an invalid length. [ 356.458213][T11300] team0: Port device dummy0 removed [ 356.475874][T11300] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 356.529674][T11303] device syzkaller0 entered promiscuous mode [ 357.061854][T11285] chnl_net:caif_netlink_parms(): no params data found [ 357.339681][T11285] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.352043][T11285] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.361915][T11285] device bridge_slave_0 entered promiscuous mode [ 357.371082][T11285] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.378594][T11285] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.381094][T11347] FAULT_INJECTION: forcing a failure. [ 357.381094][T11347] name failslab, interval 1, probability 0, space 0, times 0 [ 357.429281][T11347] CPU: 0 PID: 11347 Comm: syz.5.1922 Not tainted 5.15.186-syzkaller #0 [ 357.437692][T11347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 357.447866][T11347] Call Trace: [ 357.451172][T11347] [ 357.454138][T11347] dump_stack_lvl+0x168/0x230 [ 357.458853][T11347] ? tipc_sk_leave+0x135/0x4e0 [ 357.462839][T11285] device bridge_slave_1 entered promiscuous mode [ 357.463653][T11347] ? sock_close+0xd5/0x240 [ 357.474405][T11347] ? show_regs_print_info+0x20/0x20 [ 357.479640][T11347] ? load_image+0x3b0/0x3b0 [ 357.484196][T11347] should_fail+0x38c/0x4c0 [ 357.488691][T11347] should_failslab+0x5/0x20 [ 357.493225][T11347] slab_pre_alloc_hook+0x51/0xc0 [ 357.498198][T11347] kmem_cache_alloc_node+0x47/0x2d0 [ 357.503439][T11347] ? __alloc_skb+0xf4/0x750 [ 357.507996][T11347] __alloc_skb+0xf4/0x750 [ 357.512352][T11347] ? lockdep_hardirqs_on+0x94/0x140 [ 357.517571][T11347] tipc_msg_create+0x4b/0x4d0 [ 357.522264][T11347] tipc_group_proto_xmit+0xcd/0x870 [ 357.527487][T11347] tipc_group_delete+0x143/0x470 [ 357.532444][T11347] ? tipc_group_update_member+0x3c0/0x3c0 [ 357.538187][T11347] ? tipc_group_self+0x22/0x1c0 [ 357.543061][T11347] tipc_sk_leave+0x135/0x4e0 [ 357.547672][T11347] ? __tipc_shutdown+0x1510/0x1510 [ 357.552793][T11347] ? _local_bh_enable+0xa0/0xa0 [ 357.557650][T11347] ? lock_sock_nested+0x68/0x100 [ 357.562610][T11347] tipc_release+0x317/0x1fc0 [ 357.567215][T11347] ? preempt_count_add+0x8d/0x190 [ 357.572251][T11347] ? tipc_sock_destruct+0x170/0x170 [ 357.577471][T11347] sock_close+0xd5/0x240 [ 357.581724][T11347] ? sock_mmap+0x90/0x90 [ 357.585979][T11347] __fput+0x234/0x930 [ 357.589983][T11347] task_work_run+0x125/0x1a0 [ 357.594589][T11347] exit_to_user_mode_loop+0x10f/0x130 [ 357.599971][T11347] exit_to_user_mode_prepare+0xb1/0x140 [ 357.605550][T11347] syscall_exit_to_user_mode+0x16/0x40 [ 357.611017][T11347] do_syscall_64+0x58/0xa0 [ 357.615445][T11347] ? clear_bhb_loop+0x30/0x80 [ 357.620130][T11347] ? clear_bhb_loop+0x30/0x80 [ 357.624819][T11347] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 357.630725][T11347] RIP: 0033:0x7fc67f306929 [ 357.635181][T11347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 357.654801][T11347] RSP: 002b:00007fc67d16e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 357.663255][T11347] RAX: 0000000000000000 RBX: 00007fc67f52dfa0 RCX: 00007fc67f306929 [ 357.671239][T11347] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 357.679220][T11347] RBP: 00007fc67d16e090 R08: 0000000000000000 R09: 0000000000000000 [ 357.687201][T11347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 357.695185][T11347] R13: 0000000000000000 R14: 00007fc67f52dfa0 R15: 00007ffef8cf0108 [ 357.703178][T11347] [ 357.716107][ T4244] Bluetooth: hci4: command 0x0409 tx timeout [ 357.763937][T11354] netlink: 61211 bytes leftover after parsing attributes in process `syz.7.1923'. [ 357.815430][T11285] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 357.863592][T11285] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 357.947654][T11285] team0: Port device team_slave_0 added [ 357.957994][T11285] team0: Port device team_slave_1 added [ 358.002468][T11285] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 358.024386][T11285] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 358.130455][T11285] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 358.149862][T11285] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 358.157251][T11285] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 358.184051][T11285] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 358.327126][T11285] device hsr_slave_0 entered promiscuous mode [ 358.369095][T11285] device hsr_slave_1 entered promiscuous mode [ 358.708048][T11377] FAULT_INJECTION: forcing a failure. [ 358.708048][T11377] name failslab, interval 1, probability 0, space 0, times 0 [ 358.816381][T11377] CPU: 0 PID: 11377 Comm: syz.6.1933 Not tainted 5.15.186-syzkaller #0 [ 358.824693][T11377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 358.834787][T11377] Call Trace: [ 358.838102][T11377] [ 358.841054][T11377] dump_stack_lvl+0x168/0x230 [ 358.845771][T11377] ? show_regs_print_info+0x20/0x20 [ 358.851111][T11377] ? load_image+0x3b0/0x3b0 [ 358.855654][T11377] ? __might_sleep+0xf0/0xf0 [ 358.860270][T11377] ? __lock_acquire+0x7c60/0x7c60 [ 358.865342][T11377] should_fail+0x38c/0x4c0 [ 358.869806][T11377] should_failslab+0x5/0x20 [ 358.874341][T11377] slab_pre_alloc_hook+0x51/0xc0 [ 358.879309][T11377] ? shmem_match+0x160/0x160 [ 358.883928][T11377] ? shmem_alloc_inode+0x16/0x30 [ 358.888897][T11377] kmem_cache_alloc+0x3d/0x290 [ 358.893736][T11377] ? shmem_match+0x160/0x160 [ 358.898358][T11377] shmem_alloc_inode+0x16/0x30 [ 358.903147][T11377] new_inode_pseudo+0x5f/0x210 [ 358.907943][T11377] new_inode+0x25/0x1c0 [ 358.912129][T11377] ? do_raw_spin_unlock+0x11d/0x230 [ 358.917361][T11377] shmem_get_inode+0x334/0xa90 [ 358.922245][T11377] shmem_mknod+0x55/0x1b0 [ 358.926595][T11377] ? shmem_mkdir+0x11/0x60 [ 358.931042][T11377] shmem_mkdir+0x27/0x60 [ 358.935312][T11377] vfs_mkdir+0x387/0x570 [ 358.939602][T11377] do_mkdirat+0x1d7/0x5a0 [ 358.943961][T11377] ? vfs_mkdir+0x570/0x570 [ 358.948410][T11377] ? getname_flags+0x1fe/0x500 [ 358.953206][T11377] __x64_sys_mkdir+0x6a/0x80 [ 358.957831][T11377] do_syscall_64+0x4c/0xa0 [ 358.962277][T11377] ? clear_bhb_loop+0x30/0x80 [ 358.966992][T11377] ? clear_bhb_loop+0x30/0x80 [ 358.971697][T11377] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 358.977615][T11377] RIP: 0033:0x7f7721f25929 [ 358.982061][T11377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 359.001693][T11377] RSP: 002b:00007f771fd8d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 359.010143][T11377] RAX: ffffffffffffffda RBX: 00007f772214cfa0 RCX: 00007f7721f25929 [ 359.018153][T11377] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000340 [ 359.026148][T11377] RBP: 00007f771fd8d090 R08: 0000000000000000 R09: 0000000000000000 [ 359.034146][T11377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 359.042136][T11377] R13: 0000000000000000 R14: 00007f772214cfa0 R15: 00007fff4a0f6708 [ 359.050156][T11377] [ 359.159331][T11381] FAULT_INJECTION: forcing a failure. [ 359.159331][T11381] name failslab, interval 1, probability 0, space 0, times 0 [ 359.183026][T11381] CPU: 1 PID: 11381 Comm: syz.1.1935 Not tainted 5.15.186-syzkaller #0 [ 359.191325][T11381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 359.201410][T11381] Call Trace: [ 359.204720][T11381] [ 359.207678][T11381] dump_stack_lvl+0x168/0x230 [ 359.212385][T11381] ? __ipv6_dev_mc_dec+0x2bf/0x320 [ 359.217527][T11381] ? show_regs_print_info+0x20/0x20 [ 359.222861][T11381] ? load_image+0x3b0/0x3b0 [ 359.227395][T11381] ? __ipv6_ifa_notify+0xb38/0xda0 [ 359.232535][T11381] should_fail+0x38c/0x4c0 [ 359.236976][T11381] should_failslab+0x5/0x20 [ 359.241492][T11381] slab_pre_alloc_hook+0x51/0xc0 [ 359.246449][T11381] kmem_cache_alloc_trace+0x47/0x2a0 [ 359.251753][T11381] ? addr_event+0xc3/0x460 [ 359.256192][T11381] addr_event+0xc3/0x460 [ 359.260456][T11381] inet6addr_event+0x9c/0xc0 [ 359.265062][T11381] atomic_notifier_call_chain+0x15d/0x280 [ 359.270798][T11381] ipv6_del_addr+0x64b/0x880 [ 359.275417][T11381] inet6_addr_del+0x3ee/0x5a0 [ 359.280118][T11381] addrconf_del_ifaddr+0x110/0x160 [ 359.285248][T11381] ? inet6_addr_add+0x9c0/0x9c0 [ 359.290115][T11381] ? __lock_acquire+0x7c60/0x7c60 [ 359.295158][T11381] inet6_ioctl+0x1d2/0x240 [ 359.299615][T11381] ? inet6_getname+0x740/0x740 [ 359.304394][T11381] ? rcu_nmi_exit+0x6f/0xf0 [ 359.308911][T11381] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 359.314910][T11381] ? lock_chain_count+0x20/0x20 [ 359.319780][T11381] sock_do_ioctl+0xd3/0x2f0 [ 359.324301][T11381] ? sock_show_fdinfo+0xb0/0xb0 [ 359.329254][T11381] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 359.335433][T11381] sock_ioctl+0x4ed/0x6e0 [ 359.339879][T11381] ? sock_poll+0x3f0/0x3f0 [ 359.344325][T11381] ? bpf_lsm_file_ioctl+0x5/0x10 [ 359.349271][T11381] ? security_file_ioctl+0x7c/0xa0 [ 359.354396][T11381] ? sock_poll+0x3f0/0x3f0 [ 359.358827][T11381] __se_sys_ioctl+0xfa/0x170 [ 359.363438][T11381] do_syscall_64+0x4c/0xa0 [ 359.367868][T11381] ? clear_bhb_loop+0x30/0x80 [ 359.372556][T11381] ? clear_bhb_loop+0x30/0x80 [ 359.377240][T11381] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 359.383142][T11381] RIP: 0033:0x7f373932e929 [ 359.387572][T11381] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 359.407393][T11381] RSP: 002b:00007f3737196038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 359.415836][T11381] RAX: ffffffffffffffda RBX: 00007f3739555fa0 RCX: 00007f373932e929 [ 359.423824][T11381] RDX: 0000200000000000 RSI: 0000000000008936 RDI: 000000000000000d [ 359.431809][T11381] RBP: 00007f3737196090 R08: 0000000000000000 R09: 0000000000000000 [ 359.439793][T11381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 359.447777][T11381] R13: 0000000000000000 R14: 00007f3739555fa0 R15: 00007ffc26947588 [ 359.455778][T11381] [ 359.616702][T11388] netlink: 'syz.6.1939': attribute type 39 has an invalid length. [ 359.746376][ T4244] Bluetooth: hci4: command 0x041b tx timeout [ 380.266717][ T1111] Bluetooth: hci5: command 0x0409 tx timeout [ 380.674439][ T1111] Bluetooth: hci6: command 0x0409 tx timeout [ 380.868198][ T1111] Bluetooth: hci7: command 0x0409 tx timeout [ 381.218164][ T1111] Bluetooth: hci8: command 0x0409 tx timeout [ 382.329129][ T1111] Bluetooth: hci5: command 0x041b tx timeout [ 382.718022][ T1111] Bluetooth: hci6: command 0x041b tx timeout [ 382.970195][ T1111] Bluetooth: hci7: command 0x041b tx timeout [ 383.269648][ T1111] Bluetooth: hci8: command 0x041b tx timeout [ 384.419819][ T1111] Bluetooth: hci5: command 0x040f tx timeout [ 384.817947][ T1111] Bluetooth: hci6: command 0x040f tx timeout [ 385.076328][ T1111] Bluetooth: hci7: command 0x040f tx timeout [ 385.371063][ T1111] Bluetooth: hci8: command 0x040f tx timeout [ 386.466586][ T1111] Bluetooth: hci5: command 0x0419 tx timeout [ 386.871008][ T1111] Bluetooth: hci6: command 0x0419 tx timeout [ 387.119582][ T1111] Bluetooth: hci7: command 0x0419 tx timeout [ 387.486201][ T1111] Bluetooth: hci8: command 0x0419 tx timeout [ 420.166474][ T4270] Bluetooth: hci9: command 0x0409 tx timeout [ 422.268662][ T4270] Bluetooth: hci9: command 0x041b tx timeout [ 424.320974][ T4270] Bluetooth: hci9: command 0x040f tx timeout [ 426.420871][ T4270] Bluetooth: hci9: command 0x0419 tx timeout [ 441.466582][ T1111] Bluetooth: hci10: command 0x0409 tx timeout [ 441.616624][ T1111] Bluetooth: hci11: command 0x0409 tx timeout [ 441.876190][ T1111] Bluetooth: hci13: command 0x0409 tx timeout [ 442.066638][ T1111] Bluetooth: hci12: command 0x0409 tx timeout [ 443.523714][ T1111] Bluetooth: hci10: command 0x041b tx timeout [ 443.673719][ T1111] Bluetooth: hci11: command 0x041b tx timeout [ 443.916559][ T1111] Bluetooth: hci13: command 0x041b tx timeout [ 444.166451][ T1111] Bluetooth: hci12: command 0x041b tx timeout [ 445.623911][ T1111] Bluetooth: hci10: command 0x040f tx timeout [ 445.773615][ T1111] Bluetooth: hci11: command 0x040f tx timeout [ 446.019002][ T1111] Bluetooth: hci13: command 0x040f tx timeout [ 446.266567][ T1111] Bluetooth: hci12: command 0x040f tx timeout [ 447.789055][ T1111] Bluetooth: hci10: command 0x0419 tx timeout [ 447.866426][ T1111] Bluetooth: hci11: command 0x0419 tx timeout [ 448.070880][ T1111] Bluetooth: hci13: command 0x0419 tx timeout [ 448.319510][ T1111] Bluetooth: hci12: command 0x0419 tx timeout [ 465.616042][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 465.623115][ C1] rcu: 0-....: (6 ticks this GP) idle=721/1/0x4000000000000002 softirq=34382/34382 fqs=2101 [ 465.634612][ C1] (detected by 1, t=10503 jiffies, g=46885, q=369) [ 465.641259][ C1] Sending NMI from CPU 1 to CPUs 0: [ 465.646628][ C0] NMI backtrace for cpu 0 [ 465.646641][ C0] CPU: 0 PID: 11388 Comm: syz.6.1939 Not tainted 5.15.186-syzkaller #0 [ 465.646660][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 465.646670][ C0] RIP: 0010:lockdep_hardirqs_on_prepare+0xe9/0x760 [ 465.646698][ C0] Code: e8 03 0f b6 04 10 84 c0 0f 85 0b 05 00 00 83 3d 2c 5d b0 14 00 75 6c 48 c7 44 24 40 00 00 00 00 9c 8f 44 24 40 f6 44 24 41 02 <0f> 85 87 03 00 00 48 c7 c0 60 0f 0c 96 48 c1 e8 03 0f b6 04 10 84 [ 465.646713][ C0] RSP: 0018:ffffc90000007980 EFLAGS: 00000046 [ 465.646729][ C0] RAX: 0000000000000004 RBX: 1ffff92000000f34 RCX: ffffffff960c0f03 [ 465.646742][ C0] RDX: dffffc0000000000 RSI: 0000000000000000 RDI: 0000000000000002 [ 465.646754][ C0] RBP: ffffc90000007a38 R08: dffffc0000000000 R09: ffffed101720765a [ 465.646767][ C0] R10: ffffed101720765a R11: 1ffff11017207659 R12: 0000000000000000 [ 465.646779][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 465.646790][ C0] FS: 00007f771fd8d6c0(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 [ 465.646805][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 465.646817][ C0] CR2: 0000001b2e418ff8 CR3: 0000000060910000 CR4: 00000000003506f0 [ 465.646833][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 465.646844][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 465.646854][ C0] Call Trace: [ 465.646862][ C0] [ 465.646876][ C0] ? __irq_exit_rcu+0x13b/0x220 [ 465.646897][ C0] ? lock_chain_count+0x20/0x20 [ 465.646928][ C0] ? asm_sysvec_irq_work+0x16/0x20 [ 465.646948][ C0] ? asm_sysvec_irq_work+0x16/0x20 [ 465.646975][ C0] trace_hardirqs_on+0x67/0x80 [ 465.646994][ C0] asm_sysvec_irq_work+0x16/0x20 [ 465.647012][ C0] RIP: 0010:rcu_read_unlock_special+0x84/0x480 [ 465.647031][ C0] Code: f1 f1 f1 00 f2 f2 f2 4a 89 04 2b 66 42 c7 44 2b 09 f3 f3 42 c6 44 2b 0b f3 65 44 8b 35 8d 26 9e 7e 41 f7 c6 00 00 f0 00 74 45 <48> c7 44 24 20 0e 36 e0 45 4a c7 04 2b 00 00 00 00 66 42 c7 44 2b [ 465.647045][ C0] RSP: 0018:ffffc90000007b00 EFLAGS: 00000206 [ 465.647058][ C0] RAX: 8173bffa427fc500 RBX: 1ffff92000000f64 RCX: 8173bffa427fc500 [ 465.647071][ C0] RDX: dffffc0000000000 RSI: ffffffff8a0b11c0 RDI: ffffffff8a59ab80 [ 465.647084][ C0] RBP: ffffc90000007be0 R08: dffffc0000000000 R09: fffffbfff1ff7437 [ 465.647097][ C0] R10: fffffbfff1ff7437 R11: 1ffffffff1ff7436 R12: ffffffff8c120400 [ 465.647110][ C0] R13: dffffc0000000000 R14: 0000000000000246 R15: 0000000000000001 [ 465.647166][ C0] ? __rcu_read_unlock+0xd0/0xd0 [ 465.647187][ C0] ? read_lock_is_recursive+0x10/0x10 [ 465.647235][ C0] __rcu_read_unlock+0x78/0xd0 [ 465.647259][ C0] ieee80211_rx_napi+0x1f4/0x360 [ 465.647278][ C0] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 465.647299][ C0] ? ieee80211_reconfig_filter+0x20/0x20 [ 465.647320][ C0] ? ieee80211_rx_list+0x2680/0x2680 [ 465.647345][ C0] ? ieee80211_handle_queued_frames+0x62/0x1b0 [ 465.647380][ C0] ieee80211_handle_queued_frames+0x105/0x1b0 [ 465.647406][ C0] ? ieee80211_reconfig_filter+0x20/0x20 [ 465.647428][ C0] tasklet_action_common+0x298/0x400 [ 465.647448][ C0] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 465.647478][ C0] ? trace_raw_output_softirq+0xd0/0xd0 [ 465.647527][ C0] handle_softirqs+0x328/0x820 [ 465.647555][ C0] ? __irq_exit_rcu+0x12f/0x220 [ 465.647593][ C0] ? do_softirq+0x200/0x200 [ 465.647623][ C0] ? irqtime_account_irq+0xb2/0x1b0 [ 465.647650][ C0] __irq_exit_rcu+0x12f/0x220 [ 465.647668][ C0] ? irq_exit_rcu+0x20/0x20 [ 465.647713][ C0] irq_exit_rcu+0x5/0x20 [ 465.647727][ C0] sysvec_apic_timer_interrupt+0xa0/0xc0 [ 465.647748][ C0] [ 465.647753][ C0] [ 465.647761][ C0] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 465.647779][ C0] RIP: 0010:preempt_schedule_irq+0xac/0x150 [ 465.647799][ C0] Code: 44 24 20 f6 44 24 21 02 74 0b 0f 0b 48 f7 03 08 00 00 00 74 70 bf 01 00 00 00 e8 7f 96 9f f7 e8 0a 19 cc f7 fb bf 01 00 00 00 cf b5 ff ff 48 c7 44 24 40 00 00 00 00 9c 8f 44 24 40 8b 44 24 [ 465.647813][ C0] RSP: 0018:ffffc900031ee9a0 EFLAGS: 00000286 [ 465.647826][ C0] RAX: 8173bffa427fc500 RBX: 0000000000000000 RCX: 8173bffa427fc500 [ 465.647839][ C0] RDX: dffffc0000000000 RSI: ffffffff8a0b11c0 RDI: 0000000000000001 [ 465.647851][ C0] RBP: ffffc900031eea40 R08: dffffc0000000000 R09: fffffbfff1ff7437 [ 465.647864][ C0] R10: fffffbfff1ff7437 R11: 1ffffffff1ff7436 R12: 0000000000000000 [ 465.647876][ C0] R13: 0000000000000000 R14: dffffc0000000000 R15: 1ffff9200063dd34 [ 465.647924][ C0] ? __cond_resched+0xb0/0xb0 [ 465.647949][ C0] ? rcu_is_watching+0x11/0xa0 [ 465.647976][ C0] ? rcu_irq_exit_check_preempt+0xdb/0x200 [ 465.647998][ C0] irqentry_exit+0x63/0x70 [ 465.648015][ C0] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 465.648033][ C0] RIP: 0010:lock_acquire+0x1f2/0x3f0 [ 465.648051][ C0] Code: 00 9c 8f 84 24 80 00 00 00 f6 84 24 81 00 00 00 02 0f 85 f6 00 00 00 41 f7 c6 00 02 00 00 74 01 fb 48 c7 44 24 60 0e 36 e0 45 <4b> c7 44 3d 00 00 00 00 00 66 43 c7 44 3d 09 00 00 43 c6 44 3d 0b [ 465.648065][ C0] RSP: 0018:ffffc900031eeb00 EFLAGS: 00000206 [ 465.648078][ C0] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 8173bffa427fc500 [ 465.648089][ C0] RDX: 0000000000000000 RSI: ffffffff8a0b2460 RDI: ffffffff8a59ab80 [ 465.648101][ C0] RBP: ffffc900031eec08 R08: dffffc0000000000 R09: fffffbfff1ff7437 [ 465.648114][ C0] R10: fffffbfff1ff7437 R11: 1ffffffff1ff7436 R12: ffff88807ae35748 [ 465.648127][ C0] R13: 1ffff9200063dd6c R14: 0000000000000246 R15: dffffc0000000000 [ 465.648175][ C0] ? __lock_acquire+0x7c60/0x7c60 [ 465.648205][ C0] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 465.648227][ C0] ? read_lock_is_recursive+0x10/0x10 [ 465.648255][ C0] ? preempt_count_add+0x8d/0x190 [ 465.648277][ C0] ? up_write+0x1bb/0x420 [ 465.648307][ C0] __kernfs_remove+0x5de/0xc50 [ 465.648322][ C0] ? kernfs_remove_by_name_ns+0x91/0x100 [ 465.648355][ C0] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 465.648379][ C0] ? kernfs_next_descendant_post+0x200/0x200 [ 465.648400][ C0] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 465.648434][ C0] ? kernfs_remove_self+0x571/0x580 [ 465.648449][ C0] ? kernfs_remove_by_name_ns+0x86/0x100 [ 465.648479][ C0] kernfs_remove_by_name_ns+0x91/0x100 [ 465.648501][ C0] sysfs_remove_group+0xf8/0x290 [ 465.648530][ C0] sysfs_remove_groups+0x50/0xa0 [ 465.648554][ C0] __kobject_del+0x84/0x2f0 [ 465.648572][ C0] ? kobject_put+0x229/0x460 [ 465.648603][ C0] kobject_put+0x235/0x460 [ 465.648636][ C0] net_rx_queue_update_kobjects+0x420/0x490 [ 465.648681][ C0] netdev_unregister_kobject+0x111/0x250 [ 465.648712][ C0] unregister_netdevice_many+0x141e/0x18f0 [ 465.648736][ C0] ? lock_chain_count+0x20/0x20 [ 465.648795][ C0] ? alloc_netdev_mqs+0xc40/0xc40 [ 465.648813][ C0] ? unregister_netdevice_queue+0x1aa/0x360 [ 465.648843][ C0] ? unregister_netdevice_queue+0x1aa/0x360 [ 465.648871][ C0] ? list_netdevice+0x450/0x450 [ 465.648898][ C0] ? vxcan_newlink+0x5a0/0x5a0 [ 465.648922][ C0] ? vxcan_newlink+0x5a0/0x5a0 [ 465.648941][ C0] rtnl_dellink+0x3db/0x700 [ 465.648969][ C0] ? rtnl_newlink+0x17d0/0x17d0 [ 465.648993][ C0] ? lock_release+0x584/0x870 [ 465.649020][ C0] ? rcu_lock_acquire+0x30/0x30 [ 465.649041][ C0] ? __mutex_lock_common+0x14ce/0x2390 [ 465.649072][ C0] ? __lock_acquire+0x7c60/0x7c60 [ 465.649090][ C0] ? do_raw_spin_lock+0x11d/0x280 [ 465.649222][ C0] ? rtnl_newlink+0x17d0/0x17d0 [ 465.649247][ C0] rtnetlink_rcv_msg+0x9b9/0xe60 [ 465.649289][ C0] ? rtnetlink_bind+0x80/0x80 [ 465.649319][ C0] ? __local_bh_enable_ip+0x12a/0x1b0 [ 465.649339][ C0] ? lockdep_hardirqs_on+0x94/0x140 [ 465.649363][ C0] ? __local_bh_enable_ip+0x12a/0x1b0 [ 465.649382][ C0] ? _local_bh_enable+0xa0/0xa0 [ 465.649423][ C0] ? __dev_queue_xmit+0x1bc5/0x2ed0 [ 465.649476][ C0] ? dev_queue_xmit+0x20/0x20 [ 465.649490][ C0] ? memcpy+0x3c/0x60 [ 465.649512][ C0] ? __copy_skb_header+0x417/0x5a0 [ 465.649544][ C0] ? __skb_clone+0x480/0x790 [ 465.649588][ C0] netlink_rcv_skb+0x1e0/0x430 [ 465.649610][ C0] ? rtnetlink_bind+0x80/0x80 [ 465.649637][ C0] ? netlink_ack+0xb60/0xb60 [ 465.649690][ C0] netlink_unicast+0x77c/0x920 [ 465.649731][ C0] netlink_sendmsg+0x8ab/0xbc0 [ 465.649748][ C0] ? lockdep_hardirqs_on+0x94/0x140 [ 465.649785][ C0] ? netlink_getsockopt+0x560/0x560 [ 465.649814][ C0] ? bpf_lsm_socket_accept+0x10/0x10 [ 465.649839][ C0] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 465.649858][ C0] ? security_socket_sendmsg+0x7c/0xa0 [ 465.649877][ C0] ? netlink_getsockopt+0x560/0x560 [ 465.649899][ C0] ____sys_sendmsg+0x5a2/0x8c0 [ 465.649935][ C0] ? memset+0x1e/0x40 [ 465.649954][ C0] ? __sys_sendmsg_sock+0x30/0x30 [ 465.649997][ C0] ? import_iovec+0x6f/0xa0 [ 465.650024][ C0] ___sys_sendmsg+0x1f0/0x260 [ 465.650066][ C0] ? __sys_sendmsg+0x250/0x250 [ 465.650164][ C0] ? __fdget+0x18b/0x210 [ 465.650199][ C0] __se_sys_sendmsg+0x190/0x250 [ 465.650221][ C0] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 465.650245][ C0] ? __x64_sys_sendmsg+0x80/0x80 [ 465.650296][ C0] ? syscall_enter_from_user_mode+0x2a/0x70 [ 465.650326][ C0] do_syscall_64+0x4c/0xa0 [ 465.650342][ C0] ? clear_bhb_loop+0x30/0x80 [ 465.650359][ C0] ? clear_bhb_loop+0x30/0x80 [ 465.650382][ C0] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 465.650401][ C0] RIP: 0033:0x7f7721f25929 [ 465.650421][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 465.650436][ C0] RSP: 002b:00007f771fd8d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 465.650453][ C0] RAX: ffffffffffffffda RBX: 00007f772214cfa0 RCX: 00007f7721f25929 [ 465.650465][ C0] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000004 [ 465.650476][ C0] RBP: 00007f7721fa7b39 R08: 0000000000000000 R09: 0000000000000000 [ 465.650486][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 465.650497][ C0] R13: 0000000000000000 R14: 00007f772214cfa0 R15: 00007fff4a0f6708 [ 465.650542][ C0] [ 465.786807][ T4189] rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 0-... } 10893 jiffies s: 28641 root: 0x1/. [ 469.659247][ T4189] rcu: blocking rcu_node structures (internal RCU debug): [ 469.696100][ T4189] Task dump for CPU 0: [ 469.700230][ T4189] task:syz.6.1939 state:R running task stack:20992 pid:11388 ppid: 7850 flags:0x0000400c [ 469.711178][ T4189] Call Trace: [ 469.714491][ T4189] [ 469.717529][ T4189] ? sysvec_apic_timer_interrupt+0x80/0xc0 [ 469.723422][ T4189] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 469.729975][ T4189] ? preempt_schedule_irq+0xac/0x150 [ 469.735328][ T4189] ? __cond_resched+0xb0/0xb0 [ 469.740134][ T4189] ? rcu_is_watching+0x11/0xa0 [ 469.744964][ T4189] ? rcu_irq_exit_check_preempt+0xdb/0x200 [ 469.750879][ T4189] ? irqentry_exit+0x63/0x70 [ 469.755508][ T4189] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 469.762135][ T4189] ? lock_acquire+0x1f2/0x3f0 [ 469.767105][ T4189] ? __lock_acquire+0x7c60/0x7c60 [ 469.772194][ T4189] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 469.778698][ T4189] ? read_lock_is_recursive+0x10/0x10 [ 469.784142][ T4189] ? preempt_count_add+0x8d/0x190 [ 469.789275][ T4189] ? up_write+0x1bb/0x420 [ 469.793688][ T4189] ? __kernfs_remove+0x5de/0xc50 [ 469.798754][ T4189] ? kernfs_remove_by_name_ns+0x91/0x100 [ 469.804461][ T4189] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 469.810726][ T4189] ? kernfs_next_descendant_post+0x200/0x200 [ 469.816811][ T4189] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 469.823043][ T4189] ? kernfs_remove_self+0x571/0x580 [ 469.828638][ T4189] ? kernfs_remove_by_name_ns+0x86/0x100 [ 469.834339][ T4189] ? kernfs_remove_by_name_ns+0x91/0x100 [ 469.840096][ T4189] ? sysfs_remove_group+0xf8/0x290 [ 469.845355][ T4189] ? sysfs_remove_groups+0x50/0xa0 [ 469.850579][ T4189] ? __kobject_del+0x84/0x2f0 [ 469.855296][ T4189] ? kobject_put+0x229/0x460 [ 469.860014][ T4189] ? kobject_put+0x235/0x460 [ 469.865013][ T4189] ? net_rx_queue_update_kobjects+0x420/0x490 [ 469.871407][ T4189] ? netdev_unregister_kobject+0x111/0x250 [ 469.877415][ T4189] ? unregister_netdevice_many+0x141e/0x18f0 [ 469.883447][ T4189] ? lock_chain_count+0x20/0x20 [ 469.888446][ T4189] ? alloc_netdev_mqs+0xc40/0xc40 [ 469.893512][ T4189] ? unregister_netdevice_queue+0x1aa/0x360 [ 469.899520][ T4189] ? unregister_netdevice_queue+0x1aa/0x360 [ 469.905472][ T4189] ? list_netdevice+0x450/0x450 [ 469.910435][ T4189] ? vxcan_newlink+0x5a0/0x5a0 [ 469.915258][ T4189] ? vxcan_newlink+0x5a0/0x5a0 [ 469.920140][ T4189] ? rtnl_dellink+0x3db/0x700 [ 469.924898][ T4189] ? rtnl_newlink+0x17d0/0x17d0 [ 469.930132][ T4189] ? lock_release+0x584/0x870 [ 469.934912][ T4189] ? rcu_lock_acquire+0x30/0x30 [ 469.939894][ T4189] ? __mutex_lock_common+0x14ce/0x2390 [ 469.945420][ T4189] ? __lock_acquire+0x7c60/0x7c60 [ 469.950556][ T4189] ? do_raw_spin_lock+0x11d/0x280 [ 469.955835][ T4189] ? rtnl_newlink+0x17d0/0x17d0 [ 469.960808][ T4189] ? rtnetlink_rcv_msg+0x9b9/0xe60 [ 469.966379][ T4189] ? rtnetlink_bind+0x80/0x80 [ 469.971121][ T4189] ? __local_bh_enable_ip+0x12a/0x1b0 [ 469.976864][ T4189] ? lockdep_hardirqs_on+0x94/0x140 [ 469.982122][ T4189] ? __local_bh_enable_ip+0x12a/0x1b0 [ 469.987600][ T4189] ? _local_bh_enable+0xa0/0xa0 [ 469.992540][ T4189] ? __dev_queue_xmit+0x1bc5/0x2ed0 [ 469.997930][ T4189] ? dev_queue_xmit+0x20/0x20 [ 470.002648][ T4189] ? memcpy+0x3c/0x60 [ 470.006735][ T4189] ? __copy_skb_header+0x417/0x5a0 [ 470.011915][ T4189] ? __skb_clone+0x480/0x790 [ 470.016645][ T4189] ? netlink_rcv_skb+0x1e0/0x430 [ 470.021635][ T4189] ? rtnetlink_bind+0x80/0x80 [ 470.026787][ T4189] ? netlink_ack+0xb60/0xb60 [ 470.031487][ T4189] ? netlink_unicast+0x77c/0x920 [ 470.036572][ T4189] ? netlink_sendmsg+0x8ab/0xbc0 [ 470.041552][ T4189] ? lockdep_hardirqs_on+0x94/0x140 [ 470.046889][ T4189] ? netlink_getsockopt+0x560/0x560 [ 470.052157][ T4189] ? bpf_lsm_socket_accept+0x10/0x10 [ 470.057549][ T4189] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 470.062886][ T4189] ? security_socket_sendmsg+0x7c/0xa0 [ 470.068755][ T4189] ? netlink_getsockopt+0x560/0x560 [ 470.074013][ T4189] ? ____sys_sendmsg+0x5a2/0x8c0 [ 470.079480][ T4189] ? memset+0x1e/0x40 [ 470.083515][ T4189] ? __sys_sendmsg_sock+0x30/0x30 [ 470.088687][ T4189] ? import_iovec+0x6f/0xa0 [ 470.093255][ T4189] ? ___sys_sendmsg+0x1f0/0x260 [ 470.098245][ T4189] ? __sys_sendmsg+0x250/0x250 [ 470.103223][ T4189] ? __fdget+0x18b/0x210 [ 470.107653][ T4189] ? __se_sys_sendmsg+0x190/0x250 [ 470.112744][ T4189] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 470.119044][ T4189] ? __x64_sys_sendmsg+0x80/0x80 [ 470.124094][ T4189] ? syscall_enter_from_user_mode+0x2a/0x70 [ 470.130284][ T4189] ? do_syscall_64+0x4c/0xa0 [ 470.134917][ T4189] ? clear_bhb_loop+0x30/0x80 [ 470.139696][ T4189] ? clear_bhb_loop+0x30/0x80 [ 470.144431][ T4189] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 470.150680][ T4189]