last executing test programs: 9.088507836s ago: executing program 1 (id=2293): socket$kcm(0x11, 0x200000000000002, 0x300) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0xcdd, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x4474, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000001c0)={0x5, 0x80, 0xff, 0x0, 0x40, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x85a, 0x4}, 0x0, 0x7b, 0x8, 0x8, 0x1, 0x0, 0x82, 0x0, 0x7, 0x0, 0xa}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x1e, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r2 = perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x1004, 0x6dd700000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87}, 0x0, 0x3, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xd, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @sock_ops}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000100)={r3}, 0xc) perf_event_open$cgroup(&(0x7f00000002c0)={0x3, 0x80, 0x0, 0xb6, 0xd, 0xf2, 0x0, 0x3, 0x80, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x102000, 0x7fffffffffffffff, 0x1, 0x2, 0xf, 0x5, 0x7, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0x4, r2, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x35, &(0x7f00000005c0), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)=ANY=[], 0x50) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x0, 0x37, 0x0, 0x0, 0x1}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000080)) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000180)="1400000017000b63d25a80648c2594f917a3c92b", 0x14}], 0x1}, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@map, 0x2b, 0x1, 0x8, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xc, 0x0, 0x0, &(0x7f0000000380), &(0x7f0000000180)=[0x0, 0x0]}, 0x40) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a2, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) 8.257460169s ago: executing program 1 (id=2301): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x216, 0xc, 0x7f}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @flow_dissector}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="d80000001e0081054e81f782db4cb9040a1d080006007c095dd2086518000a800d00000003600e1208000f0000000406a80016c0080009", 0x37}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x0, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000720000001801"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="33fe0000180091c8b14a0778a8123d181d"], 0xfe33) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x14, &(0x7f00000001c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @generic={0x66}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff8}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {0x3, 0x3, 0x6}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0xa, 0xde, &(0x7f0000000340)=""/222}, 0x94) 7.918310558s ago: executing program 1 (id=2303): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x28, 0x3, 0x0, 0x0, 0x0, 0x9, 0x54199, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b84, 0x2, @perf_config_ext={0x3, 0x9c}, 0x0, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x4, &(0x7f0000000200)=r1, 0x21) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x5452, &(0x7f0000000100)) r4 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r4, &(0x7f00000031c0)={&(0x7f00000006c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="100000001d00000029000000040000009d78ec82f9ef643ecb89f66d916c2636afd083118ec40967f2e8fd92ebb8b7dd2cc5e7853ddef5251f3d349ed7f67b89c8a8347a5a2bdf1b636b6d6c4358c11976b924603ec63c2e667ba42dd03fa06863a8df3454b446e06d49dfede567afaa413f9960bda61ab882ff9bbd2780a792f78d8aa77abd50bfc967ebbb"], 0x10}, 0x8080) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x8, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x46fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, 0x0) r5 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r5, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="f4001100032b2c25fe8007000000007a2c0800000009000000000000000000000000fffffff50000", 0x5dc}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0xe5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x4, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000002240)=@generic={&(0x7f0000001240)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}, 0x18) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="ac1414aa00000000000000001400000000000018000000000200000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="7f0000017f00000a0000000800786a00"/28, @ANYRES32=0x0, @ANYBLOB="7f000001ac141400000000011c0e0000000000000000000007006fc946f1f569c01801"], 0x230}, 0x0) r8 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x92c0199, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003e000b05d25a806c8c6f94f90224fc60100005000a000200053582c137153e37000c0980fc0b10000300", 0x33fe0}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) sendmsg$inet(r3, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0x10, 0x0}, 0x3000c0c0) 6.683968371s ago: executing program 1 (id=2307): socketpair(0x1, 0x1, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f90324fc60", 0x14}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0xfe33) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup_devices(r2, &(0x7f0000000300)='devices.allow\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2e0, 0x2d1, 0xfffffffffffffd85, &(0x7f00000000c0)="b9ff0303000d698cb89e40f008004000000e00001100630277", 0x0, 0x100, 0x2000000, 0x0, 0x0, &(0x7f0000000440)}, 0x28) write$cgroup_devices(r3, &(0x7f0000000200)=ANY=[@ANYBLOB='c 1'], 0xa) r4 = socket$kcm(0x2, 0x3, 0x106) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20040040}, 0x20040014) sendmsg$inet(r4, &(0x7f0000000040)={&(0x7f0000000380)={0x2, 0xfffd, @remote}, 0x10, &(0x7f0000000c00)=[{&(0x7f0000000700)="fbd2b9ed29d8974a6ce75f08916a", 0xfe48}, {&(0x7f00000007c0)="d25bf710e1be938583f8fd9d41e17de159c996072e04e91d87cc599f2c175f6b5862de3d18e2401af6e96065d3eadf", 0x2f}], 0x2}, 0x0) 6.574407374s ago: executing program 1 (id=2310): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000"], 0x48) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0xcdd, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x1e, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x1004, 0x6dd700000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xd, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @sock_ops}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000340)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x93, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000580), &(0x7f0000000600), 0x8, 0x9f, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e00000002000000010000000100000020310000", @ANYRES32=r0, @ANYBLOB="4701000000000000000000400000000000000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="03000000050000000200"/28], 0x50) socketpair(0x1, 0x6, 0x7, &(0x7f00000009c0)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x2, 0xb6, 0xd, 0xf2, 0x0, 0x7fffffff, 0x2000, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0, 0x7}, 0x102000, 0x7fffffffffffffff, 0x1, 0x2, 0xf, 0x5, 0x7, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0x4, r1, 0x2) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0xfff}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000050000000000000000000000850000000e000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b70300000000ff808500000004"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r5}, 0xc) socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x35, &(0x7f00000005c0), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)=ANY=[], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x0, 0x37, 0x0, 0x0, 0x1}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x14, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000980)=@generic={&(0x7f0000000940)='./file0\x00'}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x63, 0x2, 0x8, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x6}, 0x101075, 0x0, 0x0, 0x4, 0x100000000, 0x0, 0x1, 0x0, 0xfffffffe, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) 6.275864812s ago: executing program 1 (id=2314): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x441, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x80, 0x1, 0x1, 0x0, 0x5, 0x0, 0x7, 0x80002, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x9}, 0xc, 0x2, 0xfffffffc, 0x819675cce5ec96f0, 0x9, 0x6, 0x25, 0x0, 0x3}, 0xffffffffffffffff, 0x0, r1, 0x2444c35306e28584) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1000000000000000, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x3}, 0x80000, 0xca, 0x9, 0x0, 0x0, 0x400000, 0x0, 0x0, 0xe, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r4, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x1c0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000800"], 0x17) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYRES8=r5, @ANYRES8=r4], 0x9a) ioctl$TUNSETLINK(r2, 0x400454cd, 0x306) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r7) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000200000000000000000000090400000000000000000000010500001208000000000000000000000300000000040000000200000012000000000000000000000b"], 0x0, 0x5a}, 0x28) socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x5, 0x1, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001680)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x2}, 0xff2c}, 0x48) 5.023702715s ago: executing program 0 (id=2322): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000"], 0x48) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0xcdd, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x1e, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x1004, 0x6dd700000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xd, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @sock_ops}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000340)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x93, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000580), &(0x7f0000000600), 0x8, 0x9f, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e00000002000000010000000100000020310000", @ANYRES32=r0, @ANYBLOB="4701000000000000000000400000000000000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="03000000050000000200"/28], 0x50) socketpair(0x1, 0x6, 0x7, &(0x7f00000009c0)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x2, 0xb6, 0xd, 0xf2, 0x0, 0x7fffffff, 0x2000, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0, 0x7}, 0x102000, 0x7fffffffffffffff, 0x1, 0x2, 0xf, 0x5, 0x7, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0x4, r1, 0x2) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0xfff}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000050000000000000000000000850000000e000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b70300000000ff808500000004"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r5}, 0xc) socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x35, &(0x7f00000005c0), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)=ANY=[], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x0, 0x37, 0x0, 0x0, 0x1}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x14, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000980)=@generic={&(0x7f0000000940)='./file0\x00'}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x63, 0x2, 0x8, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x6}, 0x101075, 0x0, 0x0, 0x4, 0x100000000, 0x0, 0x1, 0x0, 0xfffffffe, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) 4.877325529s ago: executing program 3 (id=2323): bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x38) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1c, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r1 = socket$kcm(0x21, 0x2, 0x2) r2 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0xe, 0x0, &(0x7f0000000140)='syzkaller\x00'}, 0x94) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x19, &(0x7f0000000000)=r5, 0x8) sendmsg$kcm(r1, &(0x7f0000000740)={&(0x7f0000000200)=@x25, 0x80, 0x0, 0x0, &(0x7f0000000640)}, 0x80) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000000c0)=r6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x26e1, 0x0) close(r7) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000940)="2e00000010008188e6b62aa73772cc9f1ba1f8482e0000005e140602000000000e000a001000000002800000128c", 0x2e}], 0x1}, 0x0) write$cgroup_type(r7, &(0x7f0000000080), 0x11ffffce1) 4.83272499s ago: executing program 0 (id=2324): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x441, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x80, 0x1, 0x1, 0x0, 0x5, 0x0, 0x7, 0x80002, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x9}, 0xc, 0x2, 0xfffffffc, 0x819675cce5ec96f0, 0x9, 0x6, 0x25, 0x0, 0x3}, 0xffffffffffffffff, 0x0, r1, 0x2444c35306e28584) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1000000000000000, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x3}, 0x80000, 0xca, 0x9, 0x0, 0x0, 0x400000, 0x0, 0x0, 0xe, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r4, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x1c0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="020000000400000008"], 0x17) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYRES8=r5, @ANYRES8=r4], 0x9a) ioctl$TUNSETLINK(r2, 0x400454cd, 0x306) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r7) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000200000000000000000000090400000000000000000000010500001208000000000000000000000300000000040000000200000012000000000000000000000b"], 0x0, 0x5a}, 0x28) socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x5, 0x1, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001680)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x2}, 0xff2c}, 0x48) 4.064156221s ago: executing program 0 (id=2325): socket$kcm(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x122}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r7, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) socket$kcm(0x10, 0x2, 0x0) 3.934662754s ago: executing program 3 (id=2327): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000001240)="b9ff03076804268c189e14f088a8", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x1, 0x2, &(0x7f00000009c0)=ANY=[@ANYBLOB="611079000000000095"], &(0x7f0000000200)='GPL\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0xbd, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0xa}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$kcm(0x2, 0x2, 0x73) sendmsg$inet(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000340)='+', 0x34000}], 0x1}, 0x900000000000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/32], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b0000000000"], 0xfdef) r3 = socket$kcm(0x2, 0x200000000000001, 0x106) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000000c0)={0x8}, 0x8) sendmsg$inet(r3, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0xfc, 0x0}, 0x30004001) setsockopt$sock_attach_bpf(r3, 0x6, 0xd, &(0x7f0000000000), 0x4) r4 = socket$kcm(0x10, 0x2, 0x4) syz_clone(0x4042000, &(0x7f00000002c0)="6114467705ca3fafaef52df574f8e648f9e06c582f4efecc2511e3d4e5940cd309b5ad5c781940ce920ca87643584ed6350df4ee84bde2c9a984aca706414c1759edc6f1d2627109aa9de599bce947b77666938f815d1eebcf1402572c365d9a9b704059d63f04932f43f8afcb2377de2fdab17e31c409539f62ceff6acbc4f35948a44f56743d2e7f6c5058cbdee0344c409170e6b7b879a6bf3c67adad71a744997aff72ff6ed4424ecde2d5775b9af177a43b1bee7501fdb96f07a7777d8ebf3a58fbd88b6c20075c536a0a21e00a942940cc88446f0ee3a7f8ea238ac4da0ca7", 0xe2, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="bc1adba45b8f158dc29dff64ff737e227fc4b234fed71c8cb2c45ee1eac2cb0851fe5a32766f9258ab887873cda11a21157d62f74a508f06fc29ea6ae1") sendmsg$inet(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="5c00000012006bab9e3fe3d8fd8978f45225d9ee000000007ea60860160af36504000100080ec000000002009ee517c356a7b0251e61e659ad3af435cf01c937e786a6d0bdd7fcf50e4509c5cc68b7ed9c232d786c35fe0000000000", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 3.846956627s ago: executing program 0 (id=2328): r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r1 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000000000000, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000100000000}) sendmsg$inet(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000540)="9191", 0x2}], 0x1}, 0xf080) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="180000003a000517d25a80648c63940d0324fc600b000000", 0x18}], 0x1, 0x0, 0x0, 0x6c000000}, 0x0) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0x12, &(0x7f00000008c0)=r6, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a394830f2539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323478a9968100000005"], 0x0, 0x5, 0x0, 0x0, 0x41000, 0x73, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x94) r7 = socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000008e8900000000000007000000852000f288c518f5f8ffc30000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0xd0, &(0x7f00000005c0)=""/208, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100}, 0x94) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r7, 0x107, 0x12, &(0x7f00000008c0)=r10, 0x4) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r10, 0x2405, r10) 3.660109992s ago: executing program 2 (id=2329): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000072"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000001) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x7, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x3, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x28, 0x0, &(0x7f0000000180)="b9ff0304000000ffff9e08f086dd020000003a0be77d54341588cfc6fedda86dfab99d1a7b985c49", 0x0, 0x100, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x50) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33a2d912}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) bpf$LINK_DETACH(0x22, &(0x7f00000002c0)=r5, 0x4) r6 = socket$kcm(0x2, 0x200000000000001, 0x106) recvmsg(r6, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x80, 0xb3, 0x3, 0x6, 0x49, 0x0, 0x2, 0x2001, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x8, 0x1}, 0x1410, 0x401, 0x0, 0x5, 0x1b, 0xffff0001, 0x2, 0x0, 0x4, 0x0, 0x727}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000001c0)=ANY=[@ANYBLOB="1806000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000e70000000000b703000000000000850000000c000000b7008d75042b25752eeb208d5c00853db3e5d03be9000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r7, 0x8916, &(0x7f0000000000)={'wlan1\x00', @random="0200ff7fffff"}) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0500000000f01f00810000007f00000001"], 0x48) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x9, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x20800, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) socket$kcm(0x2, 0xa, 0x2) 2.899837472s ago: executing program 3 (id=2330): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0xc05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="240000001e006bcd9e3fe3dc6e08000007000000000000007ea60864160af36504005425", 0x24}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000240), &(0x7f0000000280)='%pS \x00'}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r3, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x3000c041) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r4, 0x20, &(0x7f00000002c0)={0x0, 0x3c, 0x0, &(0x7f00000000c0)=""/171, 0xab}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x2, 0x1, 0x84) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x102) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x1, 0x9, 0x6, 0x63, 0x0, 0x10000, 0x1110, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xbf7, 0x4, @perf_config_ext={0xd, 0x7f}, 0x4140, 0x8, 0x80000000, 0x8, 0x3, 0xffff, 0xb44b, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x3, 0x3a) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000140)="2e00000010008188040f80ec59acbc0413a1f8480d0000005e140602000000000e000a00100000000580607ee622", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) 2.899412692s ago: executing program 0 (id=2331): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000"], 0x48) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0xcdd, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x1e, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x1004, 0x6dd700000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xd, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @sock_ops}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000340)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x93, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000580), &(0x7f0000000600), 0x8, 0x9f, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e00000002000000010000000100000020310000", @ANYRES32=r0, @ANYBLOB="4701000000000000000000400000000000000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="03000000050000000200"/28], 0x50) socketpair(0x1, 0x6, 0x7, &(0x7f00000009c0)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x2, 0xb6, 0xd, 0xf2, 0x0, 0x7fffffff, 0x2000, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0, 0x7}, 0x102000, 0x7fffffffffffffff, 0x1, 0x2, 0xf, 0x5, 0x7, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0x4, r1, 0x2) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0xfff}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000050000000000000000000000850000000e000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b70300000000ff808500000004"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r5}, 0xc) socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x35, &(0x7f00000005c0), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)=ANY=[], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x0, 0x37, 0x0, 0x0, 0x1}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000980)=@generic={&(0x7f0000000940)='./file0\x00'}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x63, 0x2, 0x8, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x6}, 0x101075, 0x0, 0x0, 0x4, 0x100000000, 0x0, 0x1, 0x0, 0xfffffffe, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) 2.6299953s ago: executing program 0 (id=2332): r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0xed, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x6600, 0x0, 0x0, 0x0, 0x3, 0x20000, 0x0, 0x0, 0x40, 0x0, 0xda}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) syz_clone(0xc920000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x9}, 0x11efa, 0x4, 0x4, 0x0, 0x2, 0xfffff274, 0xfffc, 0x0, 0xfffffffc, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x746f2f51, &(0x7f0000000080)=[{&(0x7f0000000040)="3f0400001c00810ce00f80ecdb4cb9f207c804a01f000000020006fb0a0002000a0ada1b40d80300000000000000", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) syz_clone(0x7940080, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b11d25a806c8c6f94f90424fc601000407a0a000600053582c137153e37000c11802f2ff4072f00", 0x33fe0}], 0x1, 0x0, 0x0, 0x35}, 0x0) socket$kcm(0x10, 0x3, 0x10) r4 = syz_clone(0x40188100, &(0x7f00000001c0), 0x0, &(0x7f0000000240), &(0x7f0000000140), &(0x7f0000001340)="03a882b1fe815d0082d2307b0667d802680063646302be0f0c382350e5ca13cf2d2e075ed680b163274b501a3aaf3478b8241b08c2ffa8d890cbea3fceecf76fae8ee0f0cd218f32674f4c852961c164a97d87603dec1f2b752e407615a3d59751da4c498c3915d973a1589f61deac72e98337053b44c5f69833dde8cbac09f2902b236b49c207fcf261586b983938a631f42090f8668f90ee8aca57684a2b42c29f98e3ce0aa666dbe7f7cd28e0c019d6e448") perf_event_open(0x0, r4, 0x3, 0xffffffffffffffff, 0x1) r5 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r5, &(0x7f0000001b00)={&(0x7f0000000180)={0x2, 0x4e26, @loopback}, 0x10, &(0x7f00000019c0), 0x1000000000000271}, 0x20044005) setsockopt$sock_attach_bpf(r5, 0x84, 0x65, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x8000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x3, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f00000001c0)=ANY=[@ANYRES64=r2], 0x0, 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x43, &(0x7f0000000100)=r6, 0x120) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000000080), 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xb}, 0x100000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x10) 2.513467152s ago: executing program 2 (id=2333): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x3}, 0x28) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001000), 0x8, 0x0, 0x8, 0xfe, 0x0}}, 0x10) (fail_nth: 2) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x7}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x3, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000780)="540000002d000b63717a3c4a7ad8985b0808aa782223fbe40f80e0932eab389d2db26277c4abda16ad715fb33005cbd9ec3dd4f1cd7d38005797c978516b8909cc0bc70f6a034cbb95c40c4c46699d726a6172e6", 0x54}], 0x1}, 0x0) 1.89543946s ago: executing program 3 (id=2334): bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x38) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1c, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7902009875f37538"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r1 = socket$kcm(0x21, 0x2, 0x2) r2 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0xe, 0x0, &(0x7f0000000140)='syzkaller\x00'}, 0x94) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x19, &(0x7f0000000000)=r5, 0x8) sendmsg$kcm(r1, &(0x7f0000000740)={&(0x7f0000000200)=@x25, 0x80, 0x0, 0x0, &(0x7f0000000640)}, 0x80) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000000c0)=r6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x26e1, 0x0) close(r7) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000940)="2e00000010008188e6b62aa73772cc9f1ba1f8482e0000005e140602000000000e000a001000000002800000128c", 0x2e}], 0x1}, 0x0) write$cgroup_type(r7, &(0x7f0000000080), 0x11ffffce1) 1.894794309s ago: executing program 2 (id=2335): socket$kcm(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x122}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r7, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) socket$kcm(0x10, 0x2, 0x0) 1.599462968s ago: executing program 2 (id=2336): socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x7fff, @local, 0x8}, 0x80, &(0x7f0000000340)=[{0x0}], 0x1}, 0x41) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x3, 0x7, &(0x7f0000000140)=ANY=[], &(0x7f0000000b40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1b00000000d50000000000000500b80001000000", @ANYRES32=0x1, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000030000000200"/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffbbfe, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x648b1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x0, @perf_config_ext={0x9, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x8, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000004000000020000000000a5e49368612fcb85ae99bde05995000800000000000061"], 0x0, 0x28}, 0x28) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f0, 0x0) socket$kcm(0x10, 0x2, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x26, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x48}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000001800)=ANY=[@ANYBLOB="0a00000016000000b30000007f"], 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x3, 0x0, 0x0, 0xfffffffe}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @initr0, @exit, @alu={0x7, 0x0, 0x5, 0x3}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000000}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x0, 0x3a, &(0x7f0000000280)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000002c0), &(0x7f0000000580), 0x8, 0x2f, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="03000000000000c1b62b91cd2800400000000000000000000000eb9a87e9a48c9e61f556cbcefdd551953e95a608b802992dd75c8b1cc8e8a9cf492205d33db79371e00e6a4b4df2d1eb52ea431d357b8cf4ed75a3a694cd0d5da3c771c0e323e24e23f307bfd2bf85040930c16bea4b3e7d9979c1b9a0b5463bcb9fb79cb73ec59716df824e8ab63e3f8fca899ab47463f94a98b2321c8c95f2f2dadc53178930", @ANYRES32=r3, @ANYRES32, @ANYBLOB="feffffff0500"/28], 0x50) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000840)={0x0, 0x4}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000880)={0x1, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001cc0)=@bpf_tracing={0x1a, 0x1, &(0x7f00000002c0)=@raw=[@ldst={0x2, 0x3, 0x1, 0x6, 0x5, 0xfffffffffffffff4, 0xffffffffffffffff}], &(0x7f0000000700)='syzkaller\x00', 0x0, 0x60, &(0x7f0000000740)=""/96, 0x41000, 0x48, '\x00', r3, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000800)={0x1, 0x9, 0x100, 0x5}, 0x10, 0x1e650, r0, 0x3, &(0x7f0000000bc0)=[r4, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000c00)=[{0x4, 0x1, 0x6}, {0x2, 0x1, 0x1}, {0x0, 0x3, 0xc, 0xb}], 0x10, 0x6}, 0x94) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r6, &(0x7f00000006c0)={&(0x7f0000000040)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)="e0", 0x1}], 0x1}, 0xc000) 616.476884ms ago: executing program 3 (id=2337): r0 = socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x10, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000001340)=@hci={0x1f, 0x0, 0x2c}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000000)='Gb', 0x5dc}], 0x1}, 0x480c0) 547.768076ms ago: executing program 2 (id=2338): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f, 0x3, 0x0, 0x3, 0x6, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4e23, 0x0, @dev, 0x2}, 0x80, 0x0}, 0xe07e872420dfefca) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="89000000120081ae08060cdc030000007f03e3f7000000006ee2ffca1b1f0000001004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c00014002080c00bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x9, 0x2}, 0x1000, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)={r0}) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="d80000001e0081054e81f782db4cb9040a1d080006007c095dd2086518000a800000000003600e1208000f0000000406a80016c0080009", 0x37}], 0x1}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x0, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000720000001801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="33fe0000190091c8b14a0778a8123d181d"], 0xfe33) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f, 0x3, 0x0, 0x3, 0x6, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socket$kcm(0xa, 0x1, 0x106) (async) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4e23, 0x0, @dev, 0x2}, 0x80, 0x0}, 0xe07e872420dfefca) (async) socket$kcm(0x10, 0x2, 0x4) (async) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="89000000120081ae08060cdc030000007f03e3f7000000006ee2ffca1b1f0000001004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c00014002080c00bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x9, 0x2}, 0x1000, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)={r0}) (async) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="d80000001e0081054e81f782db4cb9040a1d080006007c095dd2086518000a800000000003600e1208000f0000000406a80016c0080009", 0x37}], 0x1}, 0x100) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x0, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000720000001801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socket$kcm(0x10, 0x2, 0x0) (async) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="33fe0000190091c8b14a0778a8123d181d"], 0xfe33) (async) 412.5696ms ago: executing program 3 (id=2339): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000"], 0x48) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0xcdd, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x1e, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x1004, 0x6dd700000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xd, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @sock_ops}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000340)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0x93, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000580), &(0x7f0000000600), 0x8, 0x9f, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e00000002000000010000000100000020310000", @ANYRES32=r0, @ANYBLOB="4701000000000000000000400000000000000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="03000000050000000200"/28], 0x50) socketpair(0x1, 0x6, 0x7, &(0x7f00000009c0)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x2, 0xb6, 0xd, 0xf2, 0x0, 0x7fffffff, 0x2000, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0, 0x7}, 0x102000, 0x7fffffffffffffff, 0x1, 0x2, 0xf, 0x5, 0x7, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0x4, r1, 0x2) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0xfff}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000050000000000000000000000850000000e000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b70300000000ff808500000004"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r5}, 0xc) socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x35, &(0x7f00000005c0), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)=ANY=[], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x0, 0x37, 0x0, 0x0, 0x1}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000980)=@generic={&(0x7f0000000940)='./file0\x00'}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x63, 0x2, 0x8, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x6}, 0x101075, 0x0, 0x0, 0x4, 0x100000000, 0x0, 0x1, 0x0, 0xfffffffe, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) 0s ago: executing program 2 (id=2340): r0 = socket$kcm(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x400, 0x20565, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x4}, 0x100904, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x1f, 0x10, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000005000000000000008000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000018010000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000a600000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001001f000404000001007d60b7030000000000006a0a00fe00000100850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465cbf188ef10871b81ac7553358380b3a1f59916ffc9bf0bdf81524f07fb2819bf5774fedda52e39c90af27db5b56024df96b4673b4e8d5467e114604ea09b290a248a120c9c6cd87cef9000000a39c15a7ef365cc27dfeac7b9b0e9048517354b0ca4f9cf8b59ee6fa003fe1f2c4c15f20a07db4583a462d8be6602186fd68ee14a19ea2eb42122b8635a66ce6b5b92356081bc0f18a0ca83dbc089a9813c1efa26001b3f486ebfaae85c4d0b96778478ae5355e6f923b11056969f486f80a35f7f2339704fa93fa915ab8e1e0d7f31ebd19455e6827cd493907bf9d0000000000000000000000004e1fa60acabcf0553910ca2e5ea499fd5889dde9261f0848a5b8af657bfc96049308e8953431b269053627a1523551c160c813969925a892d266792352ec0204596a37ce8d6d260b32239bddbce2e79f93cb5a0ad897adb53b397d07c50f84b74f2605a565ee149016aa75ea31c0087dcd821b47c8b36efc6da4fb2ea7f1f36c85856b73ac9872babc62149699b6b8c796a79d833eb4b5ca668d430db5653a2b3c5b87e17ca1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0x46, 0x0, &(0x7f00000002c0)="b90103616908068c3c270040e700009e0dc5cf1d66fff2fcffff8100632f0806", 0x0, 0x8104, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$tipc(r3, &(0x7f00000002c0)={&(0x7f0000000100)=@id={0x1e, 0x3, 0x2, {0x4e22, 0x3}}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000140)="c695feb9d672d32426640a813c7b1bdd45b1d1dde6fe233484e1ba0c2d8e5d817898596122e5f42a9cc8233bff8730cb7444dfda40614649f7b65903c39a646a39cb2768d73c9f8d24ba2103cb42e229aef31cc0c4ee2260b84e22df3d1aa6861bf27e40abe96682fe0d53c412028026b138686232b4b7c6e3315cbaca075f08ead02620153cdd2b75a625a3837ffc48", 0x90}], 0x1, &(0x7f0000000280)="e811fc8068458023448095cac4996a864cfadd43a9314b1f21975ce16ebfc44db42ddc9853", 0x25, 0x4000080}, 0x80) sendmsg(r0, &(0x7f00000026c0)={&(0x7f0000000300)=@l2tp={0x2, 0x0, @loopback, 0x4}, 0x80, &(0x7f00000023c0)=[{&(0x7f00000013c0)="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", 0x1000}], 0x1, &(0x7f0000002400)=[{0x98, 0x119, 0x6262, "c2a15c730a09bcb3587e29b432c22e3be00d98deb0ab30d71c4776ecda1384cd74c1bf9788b6510167df35fb2003ae7f4f4fc628a8cae81f1a6ed7106248c1c2caee71ce7dff1cb8122cad3f3b786446399c7d5ca2660192193e5f8e4e810bda2fd2bf1fab7c7344784cd1ba93b219f8bd162763ef4005a55d3fb5453e37c0c7db77"}, {0x88, 0x114, 0xb99, "89a6853743186d750cc40e635f8f9dbdb4759a7243d3f7100f85d064cf50bc817cafc4c8b04520b2df2bc751a4122680d6e454d6f3b770045cac7165233aa370dddad3c8eea1abb5002a06c28b0dbd27eecb0d66c6f199ff4c8aa1707f10d6eb0732e58fe721d35a006812c110afef8b045d0ba78b05"}, {0x108, 0x3a, 0xab3, "e463f958e5820cdd2b3ca884243a79864111b1cf8ed1575dee0ca2a2985a7768cb0b954d3bbd4afad2f1a17f68e749c33247d7c0a0181b4581c149b1dc1020225f1396a0dc566f84bf0ca2b4a47c424f1aa8c9af9f4695f6178c3f8867a888c9dbc0bc31c8b0326434c8a2067e74782220f9084e47a7769ad120b468cca5bb0a2e5d77485f1b44516d5228c0d86cf5dd938fe5d552b4cc0305ab759b4385452e4b589d70f2830826262df32caf6ee9d2ed0706c9ab238a22523bc2574b9745c2a37d1f6d54001b6307d775b0dcdf99cd9cffeed113761a51e456e9464d56cbbbcecaf7155c6d092a1f1a940ed8494501101aafef281b9c"}, {0x88, 0x88, 0x0, "102b9ae0a017e9a41b55866ecadeef20d232d259fe429e1abc154d89253a4d91486ad20d8d2086fab1e04036926f0f1c9cb654377e3eae4ae4b7adfec1d182e9329c752f6a6ffd6623af349eb17d966a1c525435d59838f1cfd0ef8489db2eca53fa86bb8e0ce2f1a0c355dc69486163760d3230"}], 0x2b0}, 0x4000002) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r5 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000760091"], 0xfe33) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x10, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x2, 0xffffffffffffffff, 0x10000}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000580), 0x4000, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000540)={{r6}, &(0x7f00000004c0), &(0x7f0000000500)='%pK \x00'}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x4, &(0x7f0000000740)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x61}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000880)={r8, 0x0, 0x36, 0x0, &(0x7f0000001880)="cedfb080cd21d308098e000081007e2286dd2db6cc65938e6cf878a76202992d66a9b3c35fdae0c92d67c45a11b3b285ef0400000000", 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r7, r6}, 0xc) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000001340)=@hci={0x1f, 0x0, 0x2c}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000000)='Gb', 0x5dc}], 0x1}, 0x480c0) kernel console output (not intermixed with test programs): 600': attribute type 3 has an invalid length. [ 633.488483][T10786] netlink: 'syz.1.1600': attribute type 6 has an invalid length. [ 633.516272][T10786] netlink: 144448 bytes leftover after parsing attributes in process `syz.1.1600'. [ 633.650436][T10789] netlink: 'syz.0.1601': attribute type 10 has an invalid length. [ 633.696936][T10789] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 633.778617][T10792] netlink: 'syz.2.1604': attribute type 39 has an invalid length. [ 633.944172][T10799] netlink: 'syz.3.1605': attribute type 10 has an invalid length. [ 633.986056][T10804] netlink: 4595 bytes leftover after parsing attributes in process `syz.2.1607'. [ 634.494643][T10813] netlink: 'syz.1.1610': attribute type 27 has an invalid length. [ 634.677159][T10815] netlink: 'syz.2.1611': attribute type 3 has an invalid length. [ 634.686021][T10815] netlink: 'syz.2.1611': attribute type 6 has an invalid length. [ 634.694642][T10815] netlink: 144448 bytes leftover after parsing attributes in process `syz.2.1611'. [ 634.879060][T10823] netlink: 'syz.1.1614': attribute type 3 has an invalid length. [ 634.899929][T10821] netlink: 'syz.0.1615': attribute type 39 has an invalid length. [ 634.919241][T10823] netlink: 130984 bytes leftover after parsing attributes in process `syz.1.1614'. [ 635.174027][T10833] netlink: 'syz.1.1619': attribute type 10 has an invalid length. [ 635.182345][T10833] netlink: 55 bytes leftover after parsing attributes in process `syz.1.1619'. [ 635.192047][T10833] batman_adv: batadv0: Interface deactivated: veth1_virt_wifi [ 635.345741][ T52] Bluetooth: hci2: unexpected event 0x12 length: 151 > 8 [ 635.660256][T10833] batman_adv: batadv0: Removing interface: veth1_virt_wifi [ 636.168893][T10848] FAULT_INJECTION: forcing a failure. [ 636.168893][T10848] name failslab, interval 1, probability 0, space 0, times 0 [ 636.216772][T10848] CPU: 1 PID: 10848 Comm: syz.2.1624 Not tainted syzkaller #0 [ 636.224345][T10848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 636.234532][T10848] Call Trace: [ 636.237854][T10848] [ 636.240829][T10848] dump_stack_lvl+0x18c/0x250 [ 636.245562][T10848] ? show_regs_print_info+0x20/0x20 [ 636.250808][T10848] ? load_image+0x420/0x420 [ 636.255358][T10848] ? __might_sleep+0xe0/0xe0 [ 636.259996][T10848] ? __lock_acquire+0x7d40/0x7d40 [ 636.265071][T10848] should_fail_ex+0x39d/0x4d0 [ 636.269800][T10848] should_failslab+0x9/0x20 [ 636.274364][T10848] slab_pre_alloc_hook+0x59/0x310 [ 636.279460][T10848] kmem_cache_alloc_lru+0x4d/0x2d0 [ 636.284632][T10848] ? __d_alloc+0x31/0x730 [ 636.289043][T10848] __d_alloc+0x31/0x730 [ 636.293264][T10848] ? __ns_get_path+0x321/0x640 [ 636.298090][T10848] __ns_get_path+0x3ea/0x640 [ 636.302742][T10848] ns_get_path+0x54/0x90 [ 636.307049][T10848] proc_ns_get_link+0xf8/0x240 [ 636.311859][T10848] ? proc_ns_instantiate+0xf0/0xf0 [ 636.317007][T10848] ? bpf_lsm_inode_follow_link+0x9/0x10 [ 636.322603][T10848] ? security_inode_follow_link+0xb7/0x100 [ 636.328489][T10848] ? proc_ns_instantiate+0xf0/0xf0 [ 636.333646][T10848] pick_link+0x666/0xdd0 [ 636.337963][T10848] step_into+0xc4d/0xf20 [ 636.342246][T10848] ? rcu_read_lock_any_held+0xb4/0x140 [ 636.347746][T10848] ? rcu_read_lock_bh_held+0x100/0x100 [ 636.353237][T10848] ? set_root+0x3a0/0x3a0 [ 636.357600][T10848] ? d_splice_alias+0x114/0x330 [ 636.362492][T10848] path_openat+0x1714/0x3230 [ 636.367136][T10848] ? do_filp_open+0x430/0x430 [ 636.371855][T10848] ? __virt_addr_valid+0x18c/0x540 [ 636.377005][T10848] do_filp_open+0x1f5/0x430 [ 636.381559][T10848] ? vfs_tmpfile+0x490/0x490 [ 636.386207][T10848] ? _raw_spin_unlock+0x28/0x40 [ 636.391098][T10848] ? alloc_fd+0x58f/0x630 [ 636.395471][T10848] do_sys_openat2+0x134/0x1d0 [ 636.400216][T10848] ? do_sys_open+0xe0/0xe0 [ 636.404705][T10848] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 636.410765][T10848] ? lock_chain_count+0x20/0x20 [ 636.415667][T10848] __x64_sys_openat+0x139/0x160 [ 636.420589][T10848] do_syscall_64+0x55/0xa0 [ 636.425064][T10848] ? clear_bhb_loop+0x40/0x90 [ 636.429780][T10848] ? clear_bhb_loop+0x40/0x90 [ 636.434497][T10848] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 636.440428][T10848] RIP: 0033:0x7ff5dd75d60e [ 636.444878][T10848] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 636.464514][T10848] RSP: 002b:00007ff5de6a0ec8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 636.473058][T10848] RAX: ffffffffffffffda RBX: 00007ff5de6a16c0 RCX: 00007ff5dd75d60e [ 636.481115][T10848] RDX: 0000000000000002 RSI: 00007ff5de6a0f90 RDI: ffffffffffffff9c [ 636.489131][T10848] RBP: 00007ff5de6a1090 R08: 0000000000000000 R09: 0000000000000000 [ 636.497142][T10848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 636.505140][T10848] R13: 00007ff5dda16038 R14: 00007ff5dda15fa0 R15: 00007ffcef21cc58 [ 636.513162][T10848] [ 636.550658][T10850] FAULT_INJECTION: forcing a failure. [ 636.550658][T10850] name failslab, interval 1, probability 0, space 0, times 0 [ 636.595315][T10850] CPU: 1 PID: 10850 Comm: syz.0.1625 Not tainted syzkaller #0 [ 636.602951][T10850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 636.613507][T10850] Call Trace: [ 636.616837][T10850] [ 636.619809][T10850] dump_stack_lvl+0x18c/0x250 [ 636.624641][T10850] ? show_regs_print_info+0x20/0x20 [ 636.629904][T10850] ? load_image+0x420/0x420 [ 636.634466][T10850] ? __might_sleep+0xe0/0xe0 [ 636.639136][T10850] ? __lock_acquire+0x7d40/0x7d40 [ 636.644213][T10850] ? perf_trace_run_bpf_submit+0xf4/0x1c0 [ 636.649985][T10850] should_fail_ex+0x39d/0x4d0 [ 636.654723][T10850] should_failslab+0x9/0x20 [ 636.659280][T10850] slab_pre_alloc_hook+0x59/0x310 [ 636.664367][T10850] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 636.670398][T10850] ? rtnl_newlink+0x10d/0x20a0 [ 636.675204][T10850] __kmem_cache_alloc_node+0x53/0x250 [ 636.680619][T10850] ? rtnl_newlink+0x10d/0x20a0 [ 636.685414][T10850] kmalloc_trace+0x2a/0xe0 [ 636.689866][T10850] ? rtnl_setlink+0x4e0/0x4e0 [ 636.694591][T10850] rtnl_newlink+0x10d/0x20a0 [ 636.699249][T10850] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 636.705725][T10850] ? lock_acquire+0x208/0x420 [ 636.710473][T10850] ? __mutex_trylock_common+0x159/0x260 [ 636.716064][T10850] ? rtnl_setlink+0x4e0/0x4e0 [ 636.720810][T10850] ? trace_raw_output_contention_end+0xd0/0xd0 [ 636.727017][T10850] ? rcu_is_watching+0x15/0xb0 [ 636.731847][T10850] ? trace_contention_end+0x39/0xe0 [ 636.737075][T10850] ? __mutex_lock+0x315/0xcc0 [ 636.741792][T10850] ? rtnetlink_rcv_msg+0x811/0xfa0 [ 636.746936][T10850] ? mutex_lock_nested+0x20/0x20 [ 636.751918][T10850] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 636.757065][T10850] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 636.762554][T10850] ? rtnl_setlink+0x4e0/0x4e0 [ 636.767257][T10850] rtnetlink_rcv_msg+0x869/0xfa0 [ 636.772248][T10850] ? rtnetlink_bind+0x80/0x80 [ 636.776964][T10850] ? perf_trace_preemptirq_template+0x269/0x330 [ 636.783241][T10850] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 636.789337][T10850] ? lock_chain_count+0x20/0x20 [ 636.794222][T10850] ? __local_bh_enable_ip+0x13a/0x1c0 [ 636.799615][T10850] ? lockdep_hardirqs_on+0x98/0x150 [ 636.804844][T10850] ? __local_bh_enable_ip+0x13a/0x1c0 [ 636.810243][T10850] ? _local_bh_enable+0xa0/0xa0 [ 636.815148][T10850] ? __dev_queue_xmit+0x265/0x3660 [ 636.820299][T10850] ? __dev_queue_xmit+0x265/0x3660 [ 636.825450][T10850] ? __dev_queue_xmit+0x1b2c/0x3660 [ 636.830686][T10850] ? __dev_queue_xmit+0x265/0x3660 [ 636.835827][T10850] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 636.842017][T10850] ? ref_tracker_free+0x690/0x840 [ 636.847078][T10850] netlink_rcv_skb+0x241/0x4d0 [ 636.851881][T10850] ? rtnetlink_bind+0x80/0x80 [ 636.856595][T10850] ? netlink_ack+0x1180/0x1180 [ 636.861418][T10850] ? __lock_acquire+0x7d40/0x7d40 [ 636.866484][T10850] ? netlink_deliver_tap+0x2e/0x1b0 [ 636.871739][T10850] netlink_unicast+0x751/0x8d0 [ 636.876576][T10850] netlink_sendmsg+0x8d0/0xbf0 [ 636.881394][T10850] ? netlink_getsockopt+0x590/0x590 [ 636.886634][T10850] ? aa_sock_msg_perm+0x94/0x150 [ 636.891615][T10850] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 636.896949][T10850] ? security_socket_sendmsg+0x80/0xa0 [ 636.902443][T10850] ? netlink_getsockopt+0x590/0x590 [ 636.907688][T10850] ____sys_sendmsg+0x5ba/0x960 [ 636.912488][T10850] ? __asan_memset+0x22/0x40 [ 636.917117][T10850] ? __sys_sendmsg_sock+0x30/0x30 [ 636.922179][T10850] ? __import_iovec+0x5f2/0x850 [ 636.927072][T10850] ? import_iovec+0x73/0xa0 [ 636.931607][T10850] ___sys_sendmsg+0x2a6/0x360 [ 636.936324][T10850] ? get_pid_task+0x20/0x1e0 [ 636.940959][T10850] ? __sys_sendmsg+0x2a0/0x2a0 [ 636.945784][T10850] ? __lock_acquire+0x7d40/0x7d40 [ 636.950868][T10850] __se_sys_sendmsg+0x1c2/0x2b0 [ 636.955764][T10850] ? __x64_sys_sendmsg+0x80/0x80 [ 636.960754][T10850] ? lockdep_hardirqs_on+0x98/0x150 [ 636.965989][T10850] do_syscall_64+0x55/0xa0 [ 636.970438][T10850] ? clear_bhb_loop+0x40/0x90 [ 636.975150][T10850] ? clear_bhb_loop+0x40/0x90 [ 636.979877][T10850] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 636.985810][T10850] RIP: 0033:0x7f3be8d9cdd9 [ 636.990260][T10850] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 637.009903][T10850] RSP: 002b:00007f3be9c3e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 637.018348][T10850] RAX: ffffffffffffffda RBX: 00007f3be9015fa0 RCX: 00007f3be8d9cdd9 [ 637.026353][T10850] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000006 [ 637.034360][T10850] RBP: 00007f3be9c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 637.042365][T10850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 637.050396][T10850] R13: 00007f3be9016038 R14: 00007f3be9015fa0 R15: 00007ffe9eae8048 [ 637.058502][T10850] [ 637.108429][T10852] netlink: 'syz.1.1626': attribute type 39 has an invalid length. [ 637.126718][T10855] netlink: 'syz.3.1627': attribute type 3 has an invalid length. [ 637.146840][T10855] netlink: 144448 bytes leftover after parsing attributes in process `syz.3.1627'. [ 637.796805][T10882] team0: Device hsr_slave_0 failed to register rx_handler [ 638.017181][T10888] team0: Device hsr_slave_0 failed to register rx_handler [ 638.295124][T10894] netlink: 144448 bytes leftover after parsing attributes in process `syz.0.1639'. [ 638.366487][T10898] netlink: 56537 bytes leftover after parsing attributes in process `syz.2.1641'. [ 638.389373][T10898] netlink: 63503 bytes leftover after parsing attributes in process `syz.2.1641'. [ 638.933639][T10913] validate_nla: 7 callbacks suppressed [ 638.933674][T10913] netlink: 'syz.3.1647': attribute type 10 has an invalid length. [ 638.969031][T10913] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 639.010168][T10913] team0: Port device hsr0 added [ 639.030702][T10919] netlink: 'syz.1.1649': attribute type 10 has an invalid length. [ 639.051528][T10919] team0: Device hsr_slave_0 failed to register rx_handler [ 639.239075][T10923] netlink: 'syz.1.1650': attribute type 39 has an invalid length. [ 639.427856][T10928] netlink: 'syz.3.1653': attribute type 10 has an invalid length. [ 639.811747][T10940] mac80211_hwsim hwsim8 wlan1: entered allmulticast mode [ 640.062628][T10950] netlink: 'syz.1.1660': attribute type 10 has an invalid length. [ 640.098108][T10950] team0: Device hsr_slave_0 failed to register rx_handler [ 640.280341][T10956] netlink: 'syz.0.1663': attribute type 39 has an invalid length. [ 640.345873][T10954] netlink: 'syz.2.1662': attribute type 10 has an invalid length. [ 640.413567][T10954] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 640.520343][T10954] team0: Port device hsr0 added [ 640.603749][T10966] netlink: 207496 bytes leftover after parsing attributes in process `syz.1.1666'. [ 640.840150][T10973] netlink: 'syz.2.1668': attribute type 3 has an invalid length. [ 640.866556][T10973] netlink: 'syz.2.1668': attribute type 6 has an invalid length. [ 640.874364][T10973] netlink: 144448 bytes leftover after parsing attributes in process `syz.2.1668'. [ 641.777360][T10985] netlink: 'syz.0.1673': attribute type 3 has an invalid length. [ 641.806756][T10985] netlink: 144448 bytes leftover after parsing attributes in process `syz.0.1673'. [ 641.907249][T10992] vcan0: entered allmulticast mode [ 642.145953][T10996] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 642.198235][T10996] team0: Port device hsr0 added [ 642.665665][T11009] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1681'. [ 643.432934][T11010] netlink: 40 bytes leftover after parsing attributes in process `syz.3.1679'. [ 643.932030][T11027] FAULT_INJECTION: forcing a failure. [ 643.932030][T11027] name failslab, interval 1, probability 0, space 0, times 0 [ 643.945246][T11027] CPU: 0 PID: 11027 Comm: syz.0.1686 Not tainted syzkaller #0 [ 643.952766][T11027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 643.962869][T11027] Call Trace: [ 643.966186][T11027] [ 643.969163][T11027] dump_stack_lvl+0x18c/0x250 [ 643.973907][T11027] ? show_regs_print_info+0x20/0x20 [ 643.979162][T11027] ? load_image+0x420/0x420 [ 643.983737][T11027] ? _printk+0xc/0x130 [ 643.987866][T11027] should_fail_ex+0x39d/0x4d0 [ 643.992607][T11027] should_failslab+0x9/0x20 [ 643.997168][T11027] slab_pre_alloc_hook+0x59/0x310 [ 644.002253][T11027] kmem_cache_alloc+0x5a/0x2d0 [ 644.007067][T11027] ? skb_clone+0x1eb/0x370 [ 644.011535][T11027] skb_clone+0x1eb/0x370 [ 644.015814][T11027] ? dev_queue_xmit_nit+0x212/0xbb0 [ 644.021071][T11027] dev_queue_xmit_nit+0x24d/0xbb0 [ 644.026238][T11027] ? dev_queue_xmit_nit+0x2d/0xbb0 [ 644.031488][T11027] ? validate_xmit_skb+0x949/0xf60 [ 644.036656][T11027] dev_hard_start_xmit+0x148/0x740 [ 644.041850][T11027] __dev_queue_xmit+0x19a3/0x3660 [ 644.046937][T11027] ? __dev_queue_xmit+0x265/0x3660 [ 644.052131][T11027] ? netdev_core_pick_tx+0x340/0x340 [ 644.057451][T11027] ? __copy_skb_header+0xa3/0x4a0 [ 644.062505][T11027] ? __asan_memcpy+0x40/0x70 [ 644.067213][T11027] ? __skb_clone+0x63/0x790 [ 644.071744][T11027] ? __skb_clone+0x480/0x790 [ 644.076366][T11027] ? skb_clone+0x21f/0x370 [ 644.080816][T11027] __netlink_deliver_tap+0x5ab/0x830 [ 644.086147][T11027] ? netlink_deliver_tap+0x2e/0x1b0 [ 644.091389][T11027] netlink_deliver_tap+0x19c/0x1b0 [ 644.096580][T11027] netlink_unicast+0x72c/0x8d0 [ 644.101392][T11027] netlink_sendmsg+0x8d0/0xbf0 [ 644.106196][T11027] ? netlink_getsockopt+0x590/0x590 [ 644.111430][T11027] ? netlink_getsockopt+0x590/0x590 [ 644.116678][T11027] ____sys_sendmsg+0x5ba/0x960 [ 644.121479][T11027] ? __asan_memset+0x22/0x40 [ 644.126102][T11027] ? __sys_sendmsg_sock+0x30/0x30 [ 644.131180][T11027] ? __import_iovec+0x5f2/0x850 [ 644.136074][T11027] ? import_iovec+0x73/0xa0 [ 644.140616][T11027] ___sys_sendmsg+0x2a6/0x360 [ 644.145320][T11027] ? get_pid_task+0x20/0x1e0 [ 644.149960][T11027] ? __sys_sendmsg+0x2a0/0x2a0 [ 644.154764][T11027] ? __lock_acquire+0x7d40/0x7d40 [ 644.159836][T11027] __se_sys_sendmsg+0x1c2/0x2b0 [ 644.164724][T11027] ? __x64_sys_sendmsg+0x80/0x80 [ 644.169703][T11027] ? trace_sys_enter+0x1f/0x80 [ 644.174499][T11027] do_syscall_64+0x55/0xa0 [ 644.178951][T11027] ? clear_bhb_loop+0x40/0x90 [ 644.183738][T11027] ? clear_bhb_loop+0x40/0x90 [ 644.188441][T11027] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 644.194360][T11027] RIP: 0033:0x7f3be8d9cdd9 [ 644.198805][T11027] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 644.218523][T11027] RSP: 002b:00007f3be9c3e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 644.226966][T11027] RAX: ffffffffffffffda RBX: 00007f3be9015fa0 RCX: 00007f3be8d9cdd9 [ 644.235051][T11027] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000005 [ 644.243045][T11027] RBP: 00007f3be9c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 644.251038][T11027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 644.259040][T11027] R13: 00007f3be9016038 R14: 00007f3be9015fa0 R15: 00007ffe9eae8048 [ 644.267067][T11027] [ 644.309276][T11027] validate_nla: 6 callbacks suppressed [ 644.309310][T11027] netlink: 'syz.0.1686': attribute type 27 has an invalid length. [ 644.344242][T11025] netlink: 'syz.3.1687': attribute type 39 has an invalid length. [ 644.552776][T11030] vcan0: entered allmulticast mode [ 644.647002][T11030] netlink: 'syz.2.1690': attribute type 10 has an invalid length. [ 644.701200][T11037] netlink: 'syz.1.1692': attribute type 10 has an invalid length. [ 644.738160][T11037] team0: Device hsr_slave_0 failed to register rx_handler [ 644.936978][T11041] netlink: 'syz.3.1694': attribute type 10 has an invalid length. [ 645.019391][T11047] netlink: 'syz.2.1696': attribute type 10 has an invalid length. [ 645.127640][T11050] FAULT_INJECTION: forcing a failure. [ 645.127640][T11050] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 645.156457][T11050] CPU: 1 PID: 11050 Comm: syz.1.1697 Not tainted syzkaller #0 [ 645.163996][T11050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 645.174094][T11050] Call Trace: [ 645.177443][T11050] [ 645.180422][T11050] dump_stack_lvl+0x18c/0x250 [ 645.185158][T11050] ? show_regs_print_info+0x20/0x20 [ 645.190422][T11050] ? load_image+0x420/0x420 [ 645.194988][T11050] ? __lock_acquire+0x7d40/0x7d40 [ 645.200071][T11050] ? snprintf+0xe9/0x140 [ 645.204365][T11050] should_fail_ex+0x39d/0x4d0 [ 645.209092][T11050] _copy_to_user+0x2f/0xa0 [ 645.213565][T11050] simple_read_from_buffer+0xe7/0x150 [ 645.218984][T11050] proc_fail_nth_read+0x1e8/0x260 [ 645.224059][T11050] ? proc_fault_inject_write+0x360/0x360 [ 645.229743][T11050] ? fsnotify_perm+0x271/0x5e0 [ 645.234578][T11050] ? proc_fault_inject_write+0x360/0x360 [ 645.240261][T11050] vfs_read+0x28b/0x970 [ 645.244470][T11050] ? kernel_read+0x1e0/0x1e0 [ 645.249116][T11050] ? __fget_files+0x28/0x4b0 [ 645.253759][T11050] ? __fget_files+0x28/0x4b0 [ 645.258403][T11050] ? __fget_files+0x43d/0x4b0 [ 645.263141][T11050] ? __fdget_pos+0x2a3/0x330 [ 645.267779][T11050] ? ksys_read+0x75/0x260 [ 645.272159][T11050] ksys_read+0x150/0x260 [ 645.276456][T11050] ? vfs_write+0x990/0x990 [ 645.280919][T11050] ? lockdep_hardirqs_on+0x98/0x150 [ 645.286157][T11050] do_syscall_64+0x55/0xa0 [ 645.290629][T11050] ? clear_bhb_loop+0x40/0x90 [ 645.295361][T11050] ? clear_bhb_loop+0x40/0x90 [ 645.300093][T11050] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 645.306027][T11050] RIP: 0033:0x7f1f8895d60e [ 645.310493][T11050] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 645.330149][T11050] RSP: 002b:00007f1f8993bfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 645.338621][T11050] RAX: ffffffffffffffda RBX: 00007f1f8993c6c0 RCX: 00007f1f8895d60e [ 645.346628][T11050] RDX: 000000000000000f RSI: 00007f1f8993c0a0 RDI: 000000000000000b [ 645.354641][T11050] RBP: 00007f1f8993c090 R08: 0000000000000000 R09: 0000000000000000 [ 645.362648][T11050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 645.370652][T11050] R13: 00007f1f88c16038 R14: 00007f1f88c15fa0 R15: 00007ffc59c7b0f8 [ 645.378677][T11050] [ 645.469545][T11058] FAULT_INJECTION: forcing a failure. [ 645.469545][T11058] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 645.485122][T11058] CPU: 1 PID: 11058 Comm: syz.0.1699 Not tainted syzkaller #0 [ 645.492646][T11058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 645.502749][T11058] Call Trace: [ 645.506069][T11058] [ 645.509047][T11058] dump_stack_lvl+0x18c/0x250 [ 645.513794][T11058] ? show_regs_print_info+0x20/0x20 [ 645.519047][T11058] ? load_image+0x420/0x420 [ 645.523603][T11058] ? __might_fault+0xaa/0x120 [ 645.528320][T11058] ? __lock_acquire+0x7d40/0x7d40 [ 645.533418][T11058] should_fail_ex+0x39d/0x4d0 [ 645.538155][T11058] _copy_from_user+0x2f/0xe0 [ 645.542821][T11058] ___sys_sendmsg+0x1c7/0x360 [ 645.547552][T11058] ? get_pid_task+0x20/0x1e0 [ 645.552196][T11058] ? __sys_sendmsg+0x2a0/0x2a0 [ 645.557042][T11058] ? __lock_acquire+0x7d40/0x7d40 [ 645.562164][T11058] __se_sys_sendmsg+0x1c2/0x2b0 [ 645.567085][T11058] ? __x64_sys_sendmsg+0x80/0x80 [ 645.572106][T11058] ? lockdep_hardirqs_on+0x98/0x150 [ 645.577374][T11058] do_syscall_64+0x55/0xa0 [ 645.581843][T11058] ? clear_bhb_loop+0x40/0x90 [ 645.586574][T11058] ? clear_bhb_loop+0x40/0x90 [ 645.591306][T11058] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 645.597271][T11058] RIP: 0033:0x7f3be8d9cdd9 [ 645.601817][T11058] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 645.621656][T11058] RSP: 002b:00007f3be9c3e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 645.630151][T11058] RAX: ffffffffffffffda RBX: 00007f3be9015fa0 RCX: 00007f3be8d9cdd9 [ 645.638173][T11058] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 645.646204][T11058] RBP: 00007f3be9c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 645.654240][T11058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 645.662257][T11058] R13: 00007f3be9016038 R14: 00007f3be9015fa0 R15: 00007ffe9eae8048 [ 645.670317][T11058] [ 645.710787][T11060] netlink: 'syz.1.1701': attribute type 39 has an invalid length. [ 645.957329][T11068] vcan0: entered allmulticast mode [ 645.974640][T11066] netlink: 'syz.2.1704': attribute type 10 has an invalid length. [ 646.033070][T11068] netlink: 'syz.3.1705': attribute type 10 has an invalid length. [ 646.301122][T11077] netlink: 'syz.0.1706': attribute type 10 has an invalid length. [ 646.309365][T11077] team0: Device hsr_slave_0 is already a lower device of the team interface [ 646.481275][T11082] netlink: 121460 bytes leftover after parsing attributes in process `syz.1.1708'. [ 646.528232][T11082] netlink: 21068 bytes leftover after parsing attributes in process `syz.1.1708'. [ 646.555785][T11084] tun0: tun_chr_ioctl cmd 1074025675 [ 646.567486][T11084] tun0: persist enabled [ 646.572212][T11084] tun0: tun_chr_ioctl cmd 1074025675 [ 646.581864][T11084] tun0: persist disabled [ 646.594586][T11084] netlink: 9286 bytes leftover after parsing attributes in process `syz.0.1709'. [ 646.950292][T11099] FAULT_INJECTION: forcing a failure. [ 646.950292][T11099] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 646.982963][T11099] CPU: 1 PID: 11099 Comm: syz.0.1717 Not tainted syzkaller #0 [ 646.990506][T11099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 647.000617][T11099] Call Trace: [ 647.003944][T11099] [ 647.006925][T11099] dump_stack_lvl+0x18c/0x250 [ 647.011668][T11099] ? show_regs_print_info+0x20/0x20 [ 647.016942][T11099] ? load_image+0x420/0x420 [ 647.021616][T11099] ? __might_fault+0xaa/0x120 [ 647.026357][T11099] ? __lock_acquire+0x7d40/0x7d40 [ 647.031433][T11099] should_fail_ex+0x39d/0x4d0 [ 647.036199][T11099] _copy_from_user+0x2f/0xe0 [ 647.040846][T11099] ___sys_recvmsg+0x176/0x590 [ 647.045576][T11099] ? __sys_recvmsg+0x2a0/0x2a0 [ 647.050382][T11099] ? trace_call_bpf+0xc3/0x6c0 [ 647.055206][T11099] ? trace_call_bpf+0x5e9/0x6c0 [ 647.060117][T11099] ? __fget_files+0x43d/0x4b0 [ 647.064960][T11099] __x64_sys_recvmsg+0x20c/0x2e0 [ 647.069942][T11099] ? perf_trace_preemptirq_template+0x269/0x330 [ 647.076246][T11099] ? ___sys_recvmsg+0x590/0x590 [ 647.081162][T11099] ? lockdep_hardirqs_on+0x98/0x150 [ 647.086419][T11099] do_syscall_64+0x55/0xa0 [ 647.090896][T11099] ? clear_bhb_loop+0x40/0x90 [ 647.095607][T11099] ? clear_bhb_loop+0x40/0x90 [ 647.100322][T11099] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 647.106252][T11099] RIP: 0033:0x7f3be8d9cdd9 [ 647.110702][T11099] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 647.130344][T11099] RSP: 002b:00007f3be9c3e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 647.138796][T11099] RAX: ffffffffffffffda RBX: 00007f3be9015fa0 RCX: 00007f3be8d9cdd9 [ 647.146799][T11099] RDX: 0000000000000000 RSI: 0000200000002500 RDI: 0000000000000008 [ 647.154799][T11099] RBP: 00007f3be9c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 647.162889][T11099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 647.170905][T11099] R13: 00007f3be9016038 R14: 00007f3be9015fa0 R15: 00007ffe9eae8048 [ 647.178914][T11099] [ 647.245698][T11103] team0: Device hsr_slave_0 is already a lower device of the team interface [ 647.491806][T11109] team0: Device hsr_slave_0 is already a lower device of the team interface [ 648.122446][T11115] netlink: 121460 bytes leftover after parsing attributes in process `syz.1.1721'. [ 648.139786][T11115] netlink: 21068 bytes leftover after parsing attributes in process `syz.1.1721'. [ 648.584236][T11146] team0: Device hsr_slave_0 failed to register rx_handler [ 649.062327][T11153] team0: Device hsr_slave_0 is already a lower device of the team interface [ 649.332210][T11161] validate_nla: 16 callbacks suppressed [ 649.332245][T11161] netlink: 'syz.2.1736': attribute type 21 has an invalid length. [ 649.421052][T11165] netlink: 'syz.0.1739': attribute type 1 has an invalid length. [ 649.429138][T11165] netlink: 181400 bytes leftover after parsing attributes in process `syz.0.1739'. [ 649.691499][T11161] netlink: 121460 bytes leftover after parsing attributes in process `syz.2.1736'. [ 649.712006][T11161] netlink: 21068 bytes leftover after parsing attributes in process `syz.2.1736'. [ 650.027708][T11175] netlink: 'syz.1.1743': attribute type 39 has an invalid length. [ 650.238438][T11180] netlink: 'syz.2.1744': attribute type 10 has an invalid length. [ 650.300849][T11180] team0: Device hsr_slave_0 is already a lower device of the team interface [ 650.600821][T11185] netlink: 'syz.1.1745': attribute type 10 has an invalid length. [ 650.617544][T11185] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 651.307614][ T52] Bluetooth: hci1: unexpected event for opcode 0x0080 [ 651.524600][T11207] netlink: 'syz.0.1753': attribute type 39 has an invalid length. [ 651.614274][T11205] netlink: 209836 bytes leftover after parsing attributes in process `syz.1.1752'. [ 651.730766][T11205] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1752'. [ 651.952114][T11222] netlink: 'syz.2.1758': attribute type 10 has an invalid length. [ 652.194150][T11234] vlan0: entered promiscuous mode [ 652.200349][T11234] vlan0: entered allmulticast mode [ 652.338099][T11239] netlink: 'syz.0.1764': attribute type 10 has an invalid length. [ 652.361694][T11239] FAULT_INJECTION: forcing a failure. [ 652.361694][T11239] name failslab, interval 1, probability 0, space 0, times 0 [ 652.399663][T11239] CPU: 1 PID: 11239 Comm: syz.0.1764 Not tainted syzkaller #0 [ 652.407307][T11239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 652.417396][T11239] Call Trace: [ 652.420723][T11239] [ 652.423698][T11239] dump_stack_lvl+0x18c/0x250 [ 652.428460][T11239] ? show_regs_print_info+0x20/0x20 [ 652.433731][T11239] ? load_image+0x420/0x420 [ 652.438303][T11239] should_fail_ex+0x39d/0x4d0 [ 652.443044][T11239] should_failslab+0x9/0x20 [ 652.447622][T11239] slab_pre_alloc_hook+0x59/0x310 [ 652.452715][T11239] kmem_cache_alloc_node+0x60/0x320 [ 652.457982][T11239] ? __alloc_skb+0x103/0x2c0 [ 652.462621][T11239] __alloc_skb+0x103/0x2c0 [ 652.467091][T11239] rtmsg_ifinfo_build_skb+0x8c/0x260 [ 652.472527][T11239] rtmsg_ifinfo+0x8c/0x1a0 [ 652.477103][T11239] __dev_notify_flags+0xf3/0x310 [ 652.482131][T11239] ? __dev_change_flags+0x6a0/0x6a0 [ 652.487384][T11239] ? __dev_change_flags+0x4d4/0x6a0 [ 652.492644][T11239] ? vprintk_emit+0x53d/0x610 [ 652.497477][T11239] ? dev_get_flags+0x1c0/0x1c0 [ 652.502314][T11239] ? printk_sprint+0x460/0x460 [ 652.507131][T11239] ? _raw_spin_unlock_irqrestore+0xc5/0x120 [ 652.513076][T11239] ? _raw_spin_unlock+0x40/0x40 [ 652.517976][T11239] dev_change_flags+0xe8/0x1a0 [ 652.522809][T11239] do_setlink+0xc58/0x4130 [ 652.527333][T11239] ? load_image+0x420/0x420 [ 652.531897][T11239] ? nlmsg_parse_deprecated_strict+0x110/0x110 [ 652.538101][T11239] ? rtnl_newlink+0x10d/0x20a0 [ 652.542924][T11239] ? __nla_validate_parse+0x2522/0x2ea0 [ 652.548551][T11239] ? __nla_validate+0x50/0x50 [ 652.553285][T11239] ? __kasan_slab_alloc+0x22/0x80 [ 652.558372][T11239] ? slab_post_alloc_hook+0x6e/0x4b0 [ 652.563723][T11239] ? __kmem_cache_alloc_node+0x13a/0x250 [ 652.569455][T11239] ? validate_linkmsg+0x719/0x910 [ 652.574530][T11239] rtnl_newlink+0x17da/0x20a0 [ 652.579273][T11239] ? rtnl_newlink+0x4b1/0x20a0 [ 652.584100][T11239] ? rtnl_setlink+0x4e0/0x4e0 [ 652.588828][T11239] ? __rwlock_init+0x150/0x150 [ 652.593653][T11239] ? do_raw_spin_unlock+0x121/0x230 [ 652.598922][T11239] ? __mutex_lock+0x956/0xcc0 [ 652.603648][T11239] ? __mutex_lock+0x4f9/0xcc0 [ 652.608405][T11239] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 652.613564][T11239] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 652.618723][T11239] ? rtnl_setlink+0x4e0/0x4e0 [ 652.623446][T11239] rtnetlink_rcv_msg+0x869/0xfa0 [ 652.628460][T11239] ? lockdep_hardirqs_on+0x98/0x150 [ 652.633744][T11239] ? rtnetlink_bind+0x80/0x80 [ 652.638583][T11239] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 652.644617][T11239] ? lock_chain_count+0x20/0x20 [ 652.649534][T11239] ? __local_bh_enable_ip+0x13a/0x1c0 [ 652.654959][T11239] ? lockdep_hardirqs_on+0x98/0x150 [ 652.660209][T11239] ? __local_bh_enable_ip+0x13a/0x1c0 [ 652.665634][T11239] ? _local_bh_enable+0xa0/0xa0 [ 652.670547][T11239] ? __dev_queue_xmit+0x265/0x3660 [ 652.675743][T11239] ? __dev_queue_xmit+0x265/0x3660 [ 652.681126][T11239] ? __dev_queue_xmit+0x1b2c/0x3660 [ 652.686399][T11239] ? __dev_queue_xmit+0x265/0x3660 [ 652.691585][T11239] ? ref_tracker_free+0x690/0x840 [ 652.696691][T11239] netlink_rcv_skb+0x241/0x4d0 [ 652.701511][T11239] ? rtnetlink_bind+0x80/0x80 [ 652.706247][T11239] ? netlink_ack+0x1180/0x1180 [ 652.711075][T11239] ? __lock_acquire+0x7d40/0x7d40 [ 652.716154][T11239] ? netlink_deliver_tap+0x2e/0x1b0 [ 652.721419][T11239] netlink_unicast+0x751/0x8d0 [ 652.726250][T11239] netlink_sendmsg+0x8d0/0xbf0 [ 652.731085][T11239] ? netlink_getsockopt+0x590/0x590 [ 652.736357][T11239] ? aa_sock_msg_perm+0x94/0x150 [ 652.741361][T11239] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 652.746724][T11239] ? security_socket_sendmsg+0x80/0xa0 [ 652.752231][T11239] ? netlink_getsockopt+0x590/0x590 [ 652.757682][T11239] ____sys_sendmsg+0x5ba/0x960 [ 652.762500][T11239] ? __asan_memset+0x22/0x40 [ 652.767143][T11239] ? __sys_sendmsg_sock+0x30/0x30 [ 652.772252][T11239] ? __import_iovec+0x5f2/0x850 [ 652.777155][T11239] ? import_iovec+0x73/0xa0 [ 652.781710][T11239] ___sys_sendmsg+0x2a6/0x360 [ 652.786435][T11239] ? get_pid_task+0x20/0x1e0 [ 652.791102][T11239] ? __sys_sendmsg+0x2a0/0x2a0 [ 652.795931][T11239] ? __lock_acquire+0x7d40/0x7d40 [ 652.801024][T11239] __se_sys_sendmsg+0x1c2/0x2b0 [ 652.805938][T11239] ? __x64_sys_sendmsg+0x80/0x80 [ 652.810947][T11239] ? lockdep_hardirqs_on+0x98/0x150 [ 652.816208][T11239] do_syscall_64+0x55/0xa0 [ 652.820705][T11239] ? clear_bhb_loop+0x40/0x90 [ 652.825461][T11239] ? clear_bhb_loop+0x40/0x90 [ 652.830201][T11239] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 652.836178][T11239] RIP: 0033:0x7f3be8d9cdd9 [ 652.840635][T11239] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 652.860294][T11239] RSP: 002b:00007f3be9c3e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 652.868786][T11239] RAX: ffffffffffffffda RBX: 00007f3be9015fa0 RCX: 00007f3be8d9cdd9 [ 652.876807][T11239] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 652.884819][T11239] RBP: 00007f3be9c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 652.892839][T11239] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 652.900875][T11239] R13: 00007f3be9016038 R14: 00007f3be9015fa0 R15: 00007ffe9eae8048 [ 652.908918][T11239] [ 652.982068][T11239] team0: Device veth1_macvtap failed to register rx_handler [ 653.180703][T11249] netlink: 'syz.0.1767': attribute type 39 has an invalid length. [ 653.283849][T11254] netlink: 'syz.2.1769': attribute type 1 has an invalid length. [ 653.296566][T11254] netlink: 193500 bytes leftover after parsing attributes in process `syz.2.1769'. [ 653.545678][T11262] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 653.603964][T11264] netlink: 121460 bytes leftover after parsing attributes in process `syz.0.1772'. [ 653.614115][T11264] netlink: 21068 bytes leftover after parsing attributes in process `syz.0.1772'. [ 653.740572][T11266] netlink: 209836 bytes leftover after parsing attributes in process `syz.2.1770'. [ 653.772504][T11266] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1770'. [ 654.373369][T11285] validate_nla: 2 callbacks suppressed [ 654.373446][T11285] netlink: 'syz.3.1778': attribute type 10 has an invalid length. [ 654.576881][T11290] netlink: 'syz.1.1781': attribute type 10 has an invalid length. [ 654.609127][T11290] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 655.338002][ T52] Bluetooth: hci1: Controller not accepting commands anymore: ncmd = 0 [ 655.347275][ T52] Bluetooth: hci1: Injecting HCI hardware error event [ 655.356092][ T5824] Bluetooth: hci1: hardware error 0x00 [ 655.791405][T11315] bridge0: port 1(bridge_slave_0) entered disabled state [ 656.158338][T11325] netlink: 'syz.2.1791': attribute type 10 has an invalid length. [ 656.301648][T11330] netlink: 'syz.3.1793': attribute type 4 has an invalid length. [ 656.323385][T11330] netlink: 152 bytes leftover after parsing attributes in process `syz.3.1793'. [ 656.375649][T11326] netlink: 209836 bytes leftover after parsing attributes in process `syz.0.1790'. [ 656.641984][T11330] .`: renamed from bond0 (while UP) [ 656.730991][T11330] bridge0: port 3(.`) entered disabled state [ 656.800052][T11326] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1790'. [ 657.153720][T11344] netlink: 'syz.3.1799': attribute type 39 has an invalid length. [ 657.295295][T11347] netlink: 'syz.1.1800': attribute type 10 has an invalid length. [ 657.310821][T11347] netlink: 2 bytes leftover after parsing attributes in process `syz.1.1800'. [ 657.326658][T11347] bond0: entered promiscuous mode [ 657.340024][T11347] bond_slave_0: entered promiscuous mode [ 657.346154][T11347] bond_slave_1: entered promiscuous mode [ 657.417157][ T5824] Bluetooth: hci1: Opcode 0x0c03 failed: -110 [ 657.474832][T11353] netlink: 'syz.2.1803': attribute type 3 has an invalid length. [ 657.497671][T11353] netlink: 'syz.2.1803': attribute type 6 has an invalid length. [ 657.505703][T11353] netlink: 144448 bytes leftover after parsing attributes in process `syz.2.1803'. [ 657.639336][T11347] team0: Port device bond0 removed [ 657.645347][T11350] netlink: 'syz.0.1801': attribute type 21 has an invalid length. [ 657.674176][T11355] netlink: 'syz.3.1802': attribute type 10 has an invalid length. [ 657.688677][T11355] team0: Device hsr_slave_0 is already a lower device of the team interface [ 657.944765][T11364] veth1_macvtap: entered allmulticast mode [ 658.013583][T11365] netlink: 'syz.0.1807': attribute type 11 has an invalid length. [ 658.911720][T11381] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 658.947383][T11381] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 658.985713][T11381] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 658.996341][T11383] __nla_validate_parse: 2 callbacks suppressed [ 658.996357][T11383] netlink: 144448 bytes leftover after parsing attributes in process `syz.0.1813'. [ 659.030765][T11381] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 659.059779][T11381] batman_adv: batadv0: Interface deactivated: veth1_virt_wifi [ 659.082953][T11381] batman_adv: batadv0: Removing interface: veth1_virt_wifi [ 659.219540][T11393] FAULT_INJECTION: forcing a failure. [ 659.219540][T11393] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 659.245572][T11393] CPU: 1 PID: 11393 Comm: syz.0.1816 Not tainted syzkaller #0 [ 659.253110][T11393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 659.263213][T11393] Call Trace: [ 659.266545][T11393] [ 659.269525][T11393] dump_stack_lvl+0x18c/0x250 [ 659.274364][T11393] ? show_regs_print_info+0x20/0x20 [ 659.279629][T11393] ? load_image+0x420/0x420 [ 659.284188][T11393] ? __might_fault+0xaa/0x120 [ 659.288915][T11393] ? __lock_acquire+0x7d40/0x7d40 [ 659.294002][T11393] should_fail_ex+0x39d/0x4d0 [ 659.298748][T11393] _copy_from_user+0x2f/0xe0 [ 659.303399][T11393] ___sys_recvmsg+0x176/0x590 [ 659.308129][T11393] ? __sys_recvmsg+0x2a0/0x2a0 [ 659.312939][T11393] ? ksys_write+0x1c4/0x260 [ 659.317509][T11393] ? __fget_files+0x43d/0x4b0 [ 659.322256][T11393] __x64_sys_recvmsg+0x20c/0x2e0 [ 659.327245][T11393] ? ___sys_recvmsg+0x590/0x590 [ 659.332153][T11393] ? lockdep_hardirqs_on+0x98/0x150 [ 659.337414][T11393] do_syscall_64+0x55/0xa0 [ 659.341877][T11393] ? clear_bhb_loop+0x40/0x90 [ 659.346606][T11393] ? clear_bhb_loop+0x40/0x90 [ 659.351340][T11393] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 659.357281][T11393] RIP: 0033:0x7f3be8d9cdd9 [ 659.361741][T11393] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 659.381419][T11393] RSP: 002b:00007f3be9c3e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 659.389902][T11393] RAX: ffffffffffffffda RBX: 00007f3be9015fa0 RCX: 00007f3be8d9cdd9 [ 659.397915][T11393] RDX: 0000000000000020 RSI: 00002000000005c0 RDI: 0000000000000003 [ 659.405925][T11393] RBP: 00007f3be9c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 659.413960][T11393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 659.421999][T11393] R13: 00007f3be9016038 R14: 00007f3be9015fa0 R15: 00007ffe9eae8048 [ 659.430034][T11393] [ 659.455378][T11386] validate_nla: 7 callbacks suppressed [ 659.455396][T11386] netlink: 'syz.3.1814': attribute type 10 has an invalid length. [ 659.486524][T11386] team0: Device hsr_slave_0 is already a lower device of the team interface [ 659.555845][T11384] netlink: 'syz.2.1812': attribute type 2 has an invalid length. [ 659.583215][T11384] netlink: 'syz.2.1812': attribute type 8 has an invalid length. [ 659.597478][T11384] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1812'. [ 660.010878][T11405] netlink: 'syz.3.1821': attribute type 1 has an invalid length. [ 660.048111][T11407] netlink: 'syz.1.1822': attribute type 39 has an invalid length. [ 660.274065][T11414] netlink: 'syz.0.1824': attribute type 3 has an invalid length. [ 660.294832][T11414] netlink: 'syz.0.1824': attribute type 6 has an invalid length. [ 660.317055][T11414] netlink: 144448 bytes leftover after parsing attributes in process `syz.0.1824'. [ 660.497925][T11421] netlink: 'syz.0.1826': attribute type 10 has an invalid length. [ 660.516488][T11421] team0: Device hsr_slave_0 is already a lower device of the team interface [ 661.023328][T11429] FAULT_INJECTION: forcing a failure. [ 661.023328][T11429] name failslab, interval 1, probability 0, space 0, times 0 [ 661.046804][T11429] CPU: 1 PID: 11429 Comm: syz.3.1829 Not tainted syzkaller #0 [ 661.054342][T11429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 661.064437][T11429] Call Trace: [ 661.067756][T11429] [ 661.070730][T11429] dump_stack_lvl+0x18c/0x250 [ 661.075466][T11429] ? show_regs_print_info+0x20/0x20 [ 661.080723][T11429] ? load_image+0x420/0x420 [ 661.085285][T11429] ? __might_sleep+0xe0/0xe0 [ 661.089939][T11429] ? __lock_acquire+0x7d40/0x7d40 [ 661.095041][T11429] ? skb_gro_incr_csum_unnecessary+0x300/0x300 [ 661.101254][T11429] should_fail_ex+0x39d/0x4d0 [ 661.106002][T11429] should_failslab+0x9/0x20 [ 661.110562][T11429] slab_pre_alloc_hook+0x59/0x310 [ 661.115652][T11429] ? inet6_rtm_newroute+0xa0d/0x1c90 [ 661.120990][T11429] __kmem_cache_alloc_node+0x53/0x250 [ 661.126430][T11429] ? inet6_rtm_newroute+0xa0d/0x1c90 [ 661.131867][T11429] kmalloc_trace+0x2a/0xe0 [ 661.136321][T11429] inet6_rtm_newroute+0xa0d/0x1c90 [ 661.141483][T11429] ? ipv6_route_sysctl_table_size+0x50/0x50 [ 661.147520][T11429] ? rcu_is_watching+0x15/0xb0 [ 661.152317][T11429] ? trace_contention_end+0x39/0xe0 [ 661.157835][T11429] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 661.163003][T11429] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 661.168148][T11429] ? ipv6_route_sysctl_table_size+0x50/0x50 [ 661.174197][T11429] rtnetlink_rcv_msg+0x869/0xfa0 [ 661.179180][T11429] ? rtnetlink_bind+0x80/0x80 [ 661.183895][T11429] ? perf_trace_preemptirq_template+0x269/0x330 [ 661.190175][T11429] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 661.196184][T11429] ? lock_chain_count+0x20/0x20 [ 661.201063][T11429] ? __local_bh_enable_ip+0x13a/0x1c0 [ 661.206483][T11429] ? lockdep_hardirqs_on+0x98/0x150 [ 661.211716][T11429] ? __local_bh_enable_ip+0x13a/0x1c0 [ 661.217131][T11429] ? _local_bh_enable+0xa0/0xa0 [ 661.222011][T11429] ? __dev_queue_xmit+0x265/0x3660 [ 661.227149][T11429] ? __dev_queue_xmit+0x265/0x3660 [ 661.232292][T11429] ? __dev_queue_xmit+0x1b2c/0x3660 [ 661.237536][T11429] ? __dev_queue_xmit+0x265/0x3660 [ 661.242692][T11429] ? ref_tracker_free+0x690/0x840 [ 661.247751][T11429] netlink_rcv_skb+0x241/0x4d0 [ 661.252582][T11429] ? rtnetlink_bind+0x80/0x80 [ 661.257297][T11429] ? netlink_ack+0x1180/0x1180 [ 661.262202][T11429] ? __lock_acquire+0x7d40/0x7d40 [ 661.267268][T11429] ? netlink_deliver_tap+0x2e/0x1b0 [ 661.272534][T11429] netlink_unicast+0x751/0x8d0 [ 661.277347][T11429] netlink_sendmsg+0x8d0/0xbf0 [ 661.282154][T11429] ? netlink_getsockopt+0x590/0x590 [ 661.287391][T11429] ? aa_sock_msg_perm+0x94/0x150 [ 661.292352][T11429] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 661.297662][T11429] ? security_socket_sendmsg+0x80/0xa0 [ 661.303147][T11429] ? netlink_getsockopt+0x590/0x590 [ 661.308392][T11429] ____sys_sendmsg+0x5ba/0x960 [ 661.313187][T11429] ? __asan_memset+0x22/0x40 [ 661.317812][T11429] ? __sys_sendmsg_sock+0x30/0x30 [ 661.322864][T11429] ? __import_iovec+0x3fa/0x850 [ 661.327834][T11429] ? import_iovec+0x73/0xa0 [ 661.332365][T11429] ___sys_sendmsg+0x2a6/0x360 [ 661.337066][T11429] ? get_pid_task+0x20/0x1e0 [ 661.341692][T11429] ? __sys_sendmsg+0x2a0/0x2a0 [ 661.346504][T11429] ? __lock_acquire+0x7d40/0x7d40 [ 661.351572][T11429] __se_sys_sendmsg+0x1c2/0x2b0 [ 661.356453][T11429] ? __x64_sys_sendmsg+0x80/0x80 [ 661.361436][T11429] ? lockdep_hardirqs_on+0x98/0x150 [ 661.366691][T11429] do_syscall_64+0x55/0xa0 [ 661.371131][T11429] ? clear_bhb_loop+0x40/0x90 [ 661.375844][T11429] ? clear_bhb_loop+0x40/0x90 [ 661.380558][T11429] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 661.386486][T11429] RIP: 0033:0x7fc9a819cdd9 [ 661.390929][T11429] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 661.410572][T11429] RSP: 002b:00007fc9a9021028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 661.419022][T11429] RAX: ffffffffffffffda RBX: 00007fc9a8415fa0 RCX: 00007fc9a819cdd9 [ 661.427056][T11429] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000006 [ 661.435055][T11429] RBP: 00007fc9a9021090 R08: 0000000000000000 R09: 0000000000000000 [ 661.443419][T11429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 661.451525][T11429] R13: 00007fc9a8416038 R14: 00007fc9a8415fa0 R15: 00007ffd59e6a9c8 [ 661.459539][T11429] [ 661.616314][T11433] netlink: 17279 bytes leftover after parsing attributes in process `syz.0.1832'. [ 661.761165][T11441] netlink: 'syz.0.1835': attribute type 39 has an invalid length. [ 661.771644][T11442] netlink: 'syz.3.1834': attribute type 3 has an invalid length. [ 661.789791][T11442] netlink: 144448 bytes leftover after parsing attributes in process `syz.3.1834'. [ 662.428880][T11465] FAULT_INJECTION: forcing a failure. [ 662.428880][T11465] name failslab, interval 1, probability 0, space 0, times 0 [ 662.467842][T11465] CPU: 0 PID: 11465 Comm: syz.0.1842 Not tainted syzkaller #0 [ 662.475394][T11465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 662.485526][T11465] Call Trace: [ 662.488878][T11465] [ 662.491849][T11465] dump_stack_lvl+0x18c/0x250 [ 662.496592][T11465] ? show_regs_print_info+0x20/0x20 [ 662.501905][T11465] ? load_image+0x420/0x420 [ 662.506456][T11465] ? __might_sleep+0xe0/0xe0 [ 662.511075][T11465] ? __lock_acquire+0x7d40/0x7d40 [ 662.516135][T11465] should_fail_ex+0x39d/0x4d0 [ 662.520863][T11465] should_failslab+0x9/0x20 [ 662.525399][T11465] slab_pre_alloc_hook+0x59/0x310 [ 662.530482][T11465] ? apparmor_sk_alloc_security+0x77/0x100 [ 662.536328][T11465] __kmem_cache_alloc_node+0x53/0x250 [ 662.541754][T11465] ? apparmor_sk_alloc_security+0x77/0x100 [ 662.547598][T11465] kmalloc_trace+0x2a/0xe0 [ 662.552052][T11465] apparmor_sk_alloc_security+0x77/0x100 [ 662.557725][T11465] security_sk_alloc+0x6e/0xa0 [ 662.562525][T11465] sk_prot_alloc+0x101/0x210 [ 662.567166][T11465] ? sk_alloc+0x24/0x360 [ 662.571445][T11465] sk_alloc+0x3a/0x360 [ 662.575550][T11465] ? bpf_ctx_init+0x163/0x1a0 [ 662.580255][T11465] ? bpf_prog_test_run_skb+0x273/0x12b0 [ 662.585870][T11465] bpf_prog_test_run_skb+0x3a5/0x12b0 [ 662.591285][T11465] ? __fget_files+0x28/0x4b0 [ 662.595910][T11465] ? __fget_files+0x28/0x4b0 [ 662.600530][T11465] ? __fget_files+0x43d/0x4b0 [ 662.605245][T11465] ? cpu_online+0x60/0x60 [ 662.609600][T11465] bpf_prog_test_run+0x321/0x390 [ 662.614571][T11465] __sys_bpf+0x49d/0x890 [ 662.618840][T11465] ? bpf_link_show_fdinfo+0x390/0x390 [ 662.624254][T11465] ? lock_chain_count+0x20/0x20 [ 662.629138][T11465] __x64_sys_bpf+0x7c/0x90 [ 662.633602][T11465] do_syscall_64+0x55/0xa0 [ 662.638053][T11465] ? clear_bhb_loop+0x40/0x90 [ 662.642788][T11465] ? clear_bhb_loop+0x40/0x90 [ 662.647521][T11465] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 662.653458][T11465] RIP: 0033:0x7f3be8d9cdd9 [ 662.657907][T11465] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 662.677553][T11465] RSP: 002b:00007f3be9c3e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 662.686002][T11465] RAX: ffffffffffffffda RBX: 00007f3be9015fa0 RCX: 00007f3be8d9cdd9 [ 662.693999][T11465] RDX: 0000000000000050 RSI: 0000200000000240 RDI: 000000000000000a [ 662.702013][T11465] RBP: 00007f3be9c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 662.710020][T11465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 662.718020][T11465] R13: 00007f3be9016038 R14: 00007f3be9015fa0 R15: 00007ffe9eae8048 [ 662.726050][T11465] [ 662.740234][T11467] netlink: 17279 bytes leftover after parsing attributes in process `syz.2.1843'. [ 663.020584][T11475] netlink: 144448 bytes leftover after parsing attributes in process `syz.0.1846'. [ 663.464507][T11485] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 663.539553][T11489] netlink: 48 bytes leftover after parsing attributes in process `syz.0.1852'. [ 663.560388][T11489] veth1_macvtap: entered allmulticast mode [ 663.691217][T11497] netlink: 17279 bytes leftover after parsing attributes in process `syz.1.1856'. [ 663.802905][T11498] delete_channel: no stack [ 664.013603][T11503] netlink: 144448 bytes leftover after parsing attributes in process `syz.3.1858'. [ 664.229469][T11511] FAULT_INJECTION: forcing a failure. [ 664.229469][T11511] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 664.256364][T11511] CPU: 1 PID: 11511 Comm: syz.1.1864 Not tainted syzkaller #0 [ 664.263916][T11511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 664.274031][T11511] Call Trace: [ 664.277359][T11511] [ 664.280333][T11511] dump_stack_lvl+0x18c/0x250 [ 664.285078][T11511] ? show_regs_print_info+0x20/0x20 [ 664.290332][T11511] ? load_image+0x420/0x420 [ 664.294884][T11511] ? __might_fault+0xaa/0x120 [ 664.299592][T11511] ? __lock_acquire+0x7d40/0x7d40 [ 664.304669][T11511] should_fail_ex+0x39d/0x4d0 [ 664.309420][T11511] _copy_to_user+0x2f/0xa0 [ 664.313906][T11511] bpf_test_finish+0x25a/0x650 [ 664.318707][T11511] ? convert___skb_to_skb+0x590/0x590 [ 664.324119][T11511] ? convert_skb_to___skb+0x420/0x420 [ 664.329530][T11511] ? bpf_test_init+0x119/0x140 [ 664.334331][T11511] bpf_prog_test_run_xdp+0x8a9/0x10e0 [ 664.339742][T11511] ? dev_put+0x80/0x80 [ 664.343854][T11511] ? dev_put+0x80/0x80 [ 664.348048][T11511] bpf_prog_test_run+0x321/0x390 [ 664.353013][T11511] __sys_bpf+0x49d/0x890 [ 664.357286][T11511] ? bpf_link_show_fdinfo+0x390/0x390 [ 664.362695][T11511] ? lock_chain_count+0x20/0x20 [ 664.367600][T11511] __x64_sys_bpf+0x7c/0x90 [ 664.372046][T11511] do_syscall_64+0x55/0xa0 [ 664.376486][T11511] ? clear_bhb_loop+0x40/0x90 [ 664.381210][T11511] ? clear_bhb_loop+0x40/0x90 [ 664.385915][T11511] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 664.391837][T11511] RIP: 0033:0x7f1f8899cdd9 [ 664.396285][T11511] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 664.415926][T11511] RSP: 002b:00007f1f8993c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 664.424357][T11511] RAX: ffffffffffffffda RBX: 00007f1f88c15fa0 RCX: 00007f1f8899cdd9 [ 664.432346][T11511] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 664.440339][T11511] RBP: 00007f1f8993c090 R08: 0000000000000000 R09: 0000000000000000 [ 664.448365][T11511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 664.456374][T11511] R13: 00007f1f88c16038 R14: 00007f1f88c15fa0 R15: 00007ffc59c7b0f8 [ 664.464386][T11511] [ 664.496770][T11516] netlink: 17279 bytes leftover after parsing attributes in process `syz.2.1865'. [ 664.822833][T11521] mac80211_hwsim hwsim5 wlan1: entered allmulticast mode [ 664.906992][T11523] FAULT_INJECTION: forcing a failure. [ 664.906992][T11523] name failslab, interval 1, probability 0, space 0, times 0 [ 664.966810][T11523] CPU: 0 PID: 11523 Comm: syz.3.1869 Not tainted syzkaller #0 [ 664.974386][T11523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 664.984480][T11523] Call Trace: [ 664.987788][T11523] [ 664.990742][T11523] dump_stack_lvl+0x18c/0x250 [ 664.995458][T11523] ? show_regs_print_info+0x20/0x20 [ 665.000690][T11523] ? load_image+0x420/0x420 [ 665.005234][T11523] ? __might_sleep+0xe0/0xe0 [ 665.009851][T11523] ? __lock_acquire+0x7d40/0x7d40 [ 665.014939][T11523] should_fail_ex+0x39d/0x4d0 [ 665.019659][T11523] should_failslab+0x9/0x20 [ 665.024190][T11523] slab_pre_alloc_hook+0x59/0x310 [ 665.029421][T11523] ? kvmalloc_node+0x70/0x180 [ 665.034137][T11523] ? kvmalloc_node+0x70/0x180 [ 665.038847][T11523] __kmem_cache_alloc_node+0x53/0x250 [ 665.044263][T11523] ? kvmalloc_node+0x70/0x180 [ 665.048972][T11523] __kmalloc_node+0xa4/0x230 [ 665.053597][T11523] kvmalloc_node+0x70/0x180 [ 665.058136][T11523] bpf_test_run_xdp_live+0x1e9/0x1b20 [ 665.063542][T11523] ? bpf_dispatcher_xdp+0x800/0x1000 [ 665.068847][T11523] ? bpf_dispatcher_xdp+0x800/0x1000 [ 665.074172][T11523] ? bpf_dispatcher_change_prog+0xcbf/0xf10 [ 665.080129][T11523] ? bpf_dispatcher_xdp+0x800/0x1000 [ 665.085449][T11523] ? xdp_convert_md_to_buff+0x330/0x330 [ 665.091048][T11523] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 665.097315][T11523] ? _copy_from_user+0xa5/0xe0 [ 665.102108][T11523] ? bpf_test_init+0x119/0x140 [ 665.106895][T11523] ? xdp_convert_md_to_buff+0x5b/0x330 [ 665.112395][T11523] bpf_prog_test_run_xdp+0x7ca/0x10e0 [ 665.117811][T11523] ? dev_put+0x80/0x80 [ 665.121917][T11523] ? dev_put+0x80/0x80 [ 665.126007][T11523] bpf_prog_test_run+0x321/0x390 [ 665.130967][T11523] __sys_bpf+0x49d/0x890 [ 665.135233][T11523] ? bpf_link_show_fdinfo+0x390/0x390 [ 665.140631][T11523] ? lock_chain_count+0x20/0x20 [ 665.145511][T11523] __x64_sys_bpf+0x7c/0x90 [ 665.149951][T11523] do_syscall_64+0x55/0xa0 [ 665.154395][T11523] ? clear_bhb_loop+0x40/0x90 [ 665.159101][T11523] ? clear_bhb_loop+0x40/0x90 [ 665.163809][T11523] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 665.169736][T11523] RIP: 0033:0x7fc9a819cdd9 [ 665.174198][T11523] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 665.193828][T11523] RSP: 002b:00007fc9a9021028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 665.202270][T11523] RAX: ffffffffffffffda RBX: 00007fc9a8415fa0 RCX: 00007fc9a819cdd9 [ 665.210266][T11523] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 665.218266][T11523] RBP: 00007fc9a9021090 R08: 0000000000000000 R09: 0000000000000000 [ 665.226261][T11523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 665.234253][T11523] R13: 00007fc9a8416038 R14: 00007fc9a8415fa0 R15: 00007ffd59e6a9c8 [ 665.242267][T11523] [ 665.286755][T11525] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1866'. [ 665.411299][T11534] validate_nla: 13 callbacks suppressed [ 665.411316][T11534] netlink: 'syz.2.1871': attribute type 3 has an invalid length. [ 665.442858][T11534] netlink: 'syz.2.1871': attribute type 6 has an invalid length. [ 665.459407][T11534] netlink: 144448 bytes leftover after parsing attributes in process `syz.2.1871'. [ 665.519383][T11537] netlink: 'syz.0.1870': attribute type 39 has an invalid length. [ 665.742699][T11545] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 665.756093][T11545] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 665.765296][T11545] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 665.773297][T11545] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 665.786311][T11542] netlink: 'syz.2.1882': attribute type 3 has an invalid length. [ 665.794257][T11542] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.1882'. [ 665.933549][T11546] netlink: 17279 bytes leftover after parsing attributes in process `syz.0.1875'. [ 665.958618][T11548] netlink: 'syz.1.1876': attribute type 39 has an invalid length. [ 665.996247][T11549] netlink: 'syz.3.1874': attribute type 2 has an invalid length. [ 666.025899][T11549] netlink: 'syz.3.1874': attribute type 8 has an invalid length. [ 666.072135][T11549] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1874'. [ 666.113103][T11556] netlink: 'syz.2.1877': attribute type 10 has an invalid length. [ 666.141583][T11556] team0: Device hsr_slave_0 is already a lower device of the team interface [ 666.555319][T11565] FAULT_INJECTION: forcing a failure. [ 666.555319][T11565] name failslab, interval 1, probability 0, space 0, times 0 [ 666.576537][T11565] CPU: 0 PID: 11565 Comm: syz.2.1881 Not tainted syzkaller #0 [ 666.584161][T11565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 666.594303][T11565] Call Trace: [ 666.597632][T11565] [ 666.600710][T11565] dump_stack_lvl+0x18c/0x250 [ 666.605549][T11565] ? perf_trace_run_bpf_submit+0xf4/0x1c0 [ 666.611328][T11565] ? show_regs_print_info+0x20/0x20 [ 666.616596][T11565] ? load_image+0x420/0x420 [ 666.621165][T11565] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 666.627199][T11565] should_fail_ex+0x39d/0x4d0 [ 666.631951][T11565] should_failslab+0x9/0x20 [ 666.636521][T11565] slab_pre_alloc_hook+0x59/0x310 [ 666.641608][T11565] ? lockdep_hardirqs_on+0x98/0x150 [ 666.646901][T11565] kmem_cache_alloc+0x5a/0x2d0 [ 666.651726][T11565] ? skb_clone+0x1eb/0x370 [ 666.656211][T11565] skb_clone+0x1eb/0x370 [ 666.660536][T11565] __netlink_deliver_tap+0x41c/0x830 [ 666.665903][T11565] ? netlink_deliver_tap+0x2e/0x1b0 [ 666.671163][T11565] netlink_deliver_tap+0x19c/0x1b0 [ 666.676351][T11565] netlink_unicast+0x72c/0x8d0 [ 666.681187][T11565] netlink_sendmsg+0x8d0/0xbf0 [ 666.686021][T11565] ? netlink_getsockopt+0x590/0x590 [ 666.691291][T11565] ? aa_sock_msg_perm+0x94/0x150 [ 666.696289][T11565] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 666.701629][T11565] ? security_socket_sendmsg+0x80/0xa0 [ 666.707142][T11565] ? netlink_getsockopt+0x590/0x590 [ 666.712405][T11565] ____sys_sendmsg+0x5ba/0x960 [ 666.717230][T11565] ? __asan_memset+0x22/0x40 [ 666.721909][T11565] ? __sys_sendmsg_sock+0x30/0x30 [ 666.726977][T11565] ? __import_iovec+0x5f2/0x850 [ 666.731892][T11565] ? import_iovec+0x73/0xa0 [ 666.736440][T11565] ___sys_sendmsg+0x2a6/0x360 [ 666.741184][T11565] ? __sys_sendmsg+0x2a0/0x2a0 [ 666.746057][T11565] __se_sys_sendmsg+0x1c2/0x2b0 [ 666.750959][T11565] ? __x64_sys_sendmsg+0x80/0x80 [ 666.755965][T11565] ? syscall_enter_from_user_mode+0x2e/0x80 [ 666.761945][T11565] do_syscall_64+0x55/0xa0 [ 666.766418][T11565] ? clear_bhb_loop+0x40/0x90 [ 666.771152][T11565] ? clear_bhb_loop+0x40/0x90 [ 666.775899][T11565] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 666.781851][T11565] RIP: 0033:0x7ff5dd79cdd9 [ 666.786317][T11565] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 666.805980][T11565] RSP: 002b:00007ff5de6a1028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 666.814446][T11565] RAX: ffffffffffffffda RBX: 00007ff5dda15fa0 RCX: 00007ff5dd79cdd9 [ 666.822473][T11565] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000009 [ 666.830497][T11565] RBP: 00007ff5de6a1090 R08: 0000000000000000 R09: 0000000000000000 [ 666.838517][T11565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 666.846632][T11565] R13: 00007ff5dda16038 R14: 00007ff5dda15fa0 R15: 00007ffcef21cc58 [ 666.854692][T11565] [ 666.894315][T11565] netlink: 'syz.2.1881': attribute type 10 has an invalid length. [ 666.936031][T11565] mac80211_hwsim hwsim5 wlan1: left allmulticast mode [ 667.022898][T11565] team0: Port device wlan1 added [ 667.043415][T11569] FAULT_INJECTION: forcing a failure. [ 667.043415][T11569] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 667.058458][T11569] CPU: 1 PID: 11569 Comm: syz.3.1883 Not tainted syzkaller #0 [ 667.065993][T11569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 667.076182][T11569] Call Trace: [ 667.079520][T11569] [ 667.082492][T11569] dump_stack_lvl+0x18c/0x250 [ 667.087234][T11569] ? show_regs_print_info+0x20/0x20 [ 667.092486][T11569] ? load_image+0x420/0x420 [ 667.097051][T11569] ? __lock_acquire+0x7d40/0x7d40 [ 667.102128][T11569] ? snprintf+0xe9/0x140 [ 667.106422][T11569] should_fail_ex+0x39d/0x4d0 [ 667.111249][T11569] _copy_to_user+0x2f/0xa0 [ 667.115732][T11569] simple_read_from_buffer+0xe7/0x150 [ 667.121176][T11569] proc_fail_nth_read+0x1e8/0x260 [ 667.126261][T11569] ? proc_fault_inject_write+0x360/0x360 [ 667.131955][T11569] ? fsnotify_perm+0x271/0x5e0 [ 667.136784][T11569] ? proc_fault_inject_write+0x360/0x360 [ 667.142472][T11569] vfs_read+0x28b/0x970 [ 667.146707][T11569] ? kernel_read+0x1e0/0x1e0 [ 667.151383][T11569] ? __fget_files+0x28/0x4b0 [ 667.156113][T11569] ? __fget_files+0x28/0x4b0 [ 667.160774][T11569] ? __fget_files+0x43d/0x4b0 [ 667.165512][T11569] ? __fdget_pos+0x2a3/0x330 [ 667.170155][T11569] ? ksys_read+0x75/0x260 [ 667.174586][T11569] ksys_read+0x150/0x260 [ 667.178887][T11569] ? vfs_write+0x990/0x990 [ 667.183350][T11569] ? lockdep_hardirqs_on+0x98/0x150 [ 667.188605][T11569] do_syscall_64+0x55/0xa0 [ 667.193066][T11569] ? clear_bhb_loop+0x40/0x90 [ 667.197769][T11569] ? clear_bhb_loop+0x40/0x90 [ 667.202476][T11569] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 667.208431][T11569] RIP: 0033:0x7fc9a815d60e [ 667.212874][T11569] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 667.232603][T11569] RSP: 002b:00007fc9a9020fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 667.241042][T11569] RAX: ffffffffffffffda RBX: 00007fc9a90216c0 RCX: 00007fc9a815d60e [ 667.249037][T11569] RDX: 000000000000000f RSI: 00007fc9a90210a0 RDI: 0000000000000012 [ 667.257035][T11569] RBP: 00007fc9a9021090 R08: 0000000000000000 R09: 0000000000000000 [ 667.265051][T11569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 667.273065][T11569] R13: 00007fc9a8416038 R14: 00007fc9a8415fa0 R15: 00007ffd59e6a9c8 [ 667.281180][T11569] [ 667.337607][T11572] netlink: 'syz.0.1884': attribute type 10 has an invalid length. [ 667.371183][T11572] syz_tun: left promiscuous mode [ 667.420331][T11572] bond0: (slave syz_tun): Releasing backup interface [ 667.466565][T11572] team0: Port device syz_tun added [ 667.544688][T11577] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.1886'. [ 667.581153][T11579] netlink: 17279 bytes leftover after parsing attributes in process `syz.3.1887'. [ 667.995082][T11592] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 668.005123][T11592] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 668.025274][T11592] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 668.033222][T11592] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 668.251233][T11599] netlink: 121460 bytes leftover after parsing attributes in process `syz.3.1893'. [ 669.603105][T11620] __nla_validate_parse: 4 callbacks suppressed [ 669.603125][T11620] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1902'. [ 669.879546][T11625] netlink: 121460 bytes leftover after parsing attributes in process `syz.0.1904'. [ 669.913519][T11625] netlink: 22828 bytes leftover after parsing attributes in process `syz.0.1904'. [ 670.270226][T11638] netlink: 189132 bytes leftover after parsing attributes in process `syz.1.1907'. [ 670.597599][T11640] netlink: 65055 bytes leftover after parsing attributes in process `syz.2.1909'. [ 670.675757][T11644] validate_nla: 16 callbacks suppressed [ 670.675782][T11644] netlink: 'syz.0.1912': attribute type 39 has an invalid length. [ 671.410413][T11663] netlink: 'syz.0.1917': attribute type 10 has an invalid length. [ 671.445062][T11659] netlink: 'syz.1.1915': attribute type 3 has an invalid length. [ 671.468242][T11659] netlink: 130984 bytes leftover after parsing attributes in process `syz.1.1915'. [ 671.526787][T11664] netlink: 14 bytes leftover after parsing attributes in process `syz.2.1916'. [ 671.802297][T11655] netlink: 'syz.3.1914': attribute type 10 has an invalid length. [ 671.999038][T11669] netlink: 'syz.1.1919': attribute type 3 has an invalid length. [ 672.011544][T11655] team0: Port device wlan1 added [ 672.036617][T11669] netlink: 189132 bytes leftover after parsing attributes in process `syz.1.1919'. [ 672.127510][T11671] netlink: 'syz.2.1920': attribute type 39 has an invalid length. [ 672.197006][T11673] netlink: 65055 bytes leftover after parsing attributes in process `syz.0.1921'. [ 672.551659][T11685] netlink: 'syz.3.1925': attribute type 39 has an invalid length. [ 672.790029][T11687] netlink: 'syz.0.1926': attribute type 10 has an invalid length. [ 673.313142][T11700] netlink: 'syz.3.1930': attribute type 3 has an invalid length. [ 673.373878][T11702] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1929'. [ 673.920041][T11704] netlink: 'syz.1.1931': attribute type 39 has an invalid length. [ 674.488048][T11711] team0: Port device wlan1 added [ 675.167807][T11742] FAULT_INJECTION: forcing a failure. [ 675.167807][T11742] name failslab, interval 1, probability 0, space 0, times 0 [ 675.208306][T11739] __nla_validate_parse: 3 callbacks suppressed [ 675.208343][T11739] netlink: 130984 bytes leftover after parsing attributes in process `syz.3.1941'. [ 675.225405][T11742] CPU: 1 PID: 11742 Comm: syz.1.1942 Not tainted syzkaller #0 [ 675.232943][T11742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 675.243050][T11742] Call Trace: [ 675.246368][T11742] [ 675.249344][T11742] dump_stack_lvl+0x18c/0x250 [ 675.254098][T11742] ? show_regs_print_info+0x20/0x20 [ 675.259357][T11742] ? load_image+0x420/0x420 [ 675.263925][T11742] ? verify_lock_unused+0x140/0x140 [ 675.269189][T11742] should_fail_ex+0x39d/0x4d0 [ 675.274024][T11742] should_failslab+0x9/0x20 [ 675.278589][T11742] slab_pre_alloc_hook+0x59/0x310 [ 675.283678][T11742] kmem_cache_alloc+0x5a/0x2d0 [ 675.288498][T11742] ? skb_clone+0x1eb/0x370 [ 675.292972][T11742] skb_clone+0x1eb/0x370 [ 675.297264][T11742] __netlink_deliver_tap+0x41c/0x830 [ 675.302617][T11742] ? netlink_deliver_tap+0x2e/0x1b0 [ 675.307876][T11742] netlink_deliver_tap+0x19c/0x1b0 [ 675.313038][T11742] __netlink_sendskb+0x4b/0x90 [ 675.317875][T11742] netlink_dump+0xa75/0xe50 [ 675.322454][T11742] ? netlink_lookup+0x200/0x200 [ 675.327381][T11742] ? genl_start+0x574/0x6b0 [ 675.331939][T11742] __netlink_dump_start+0x5f1/0x810 [ 675.337206][T11742] genl_family_rcv_msg_dumpit+0x214/0x310 [ 675.342999][T11742] ? genl_rcv_msg+0x7a0/0x7a0 [ 675.347762][T11742] ? genl_get_cmd+0x692/0x920 [ 675.352500][T11742] ? genl_family_rcv_msg_doit+0x310/0x310 [ 675.358253][T11742] ? genl_start+0x6b0/0x6b0 [ 675.362787][T11742] ? genl_dumpit+0x1a0/0x1a0 [ 675.367417][T11742] genl_rcv_msg+0x5e5/0x7a0 [ 675.371961][T11742] ? genl_bind+0x360/0x360 [ 675.376408][T11742] ? ethnl_default_doit+0xb80/0xb80 [ 675.381654][T11742] ? ethnl_default_start+0x560/0x560 [ 675.386979][T11742] ? ethnl_default_dumpit+0x8a0/0x8a0 [ 675.392407][T11742] ? ref_tracker_free+0x690/0x840 [ 675.397471][T11742] netlink_rcv_skb+0x241/0x4d0 [ 675.402278][T11742] ? genl_bind+0x360/0x360 [ 675.406724][T11742] ? netlink_ack+0x1180/0x1180 [ 675.411532][T11742] ? __lock_acquire+0x7d40/0x7d40 [ 675.416607][T11742] ? down_read+0x1ac/0x2e0 [ 675.421060][T11742] genl_rcv+0x28/0x40 [ 675.425078][T11742] netlink_unicast+0x751/0x8d0 [ 675.429887][T11742] netlink_sendmsg+0x8d0/0xbf0 [ 675.434695][T11742] ? netlink_getsockopt+0x590/0x590 [ 675.439928][T11742] ? aa_sock_msg_perm+0x94/0x150 [ 675.444889][T11742] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 675.450196][T11742] ? security_socket_sendmsg+0x80/0xa0 [ 675.455783][T11742] ? netlink_getsockopt+0x590/0x590 [ 675.461043][T11742] ____sys_sendmsg+0x5ba/0x960 [ 675.465858][T11742] ? __asan_memset+0x22/0x40 [ 675.470492][T11742] ? __sys_sendmsg_sock+0x30/0x30 [ 675.475559][T11742] ? __import_iovec+0x5f2/0x850 [ 675.480458][T11742] ? import_iovec+0x73/0xa0 [ 675.485021][T11742] ___sys_sendmsg+0x2a6/0x360 [ 675.489827][T11742] ? get_pid_task+0x20/0x1e0 [ 675.494452][T11742] ? __sys_sendmsg+0x2a0/0x2a0 [ 675.499256][T11742] ? __lock_acquire+0x7d40/0x7d40 [ 675.504442][T11742] __se_sys_sendmsg+0x1c2/0x2b0 [ 675.509330][T11742] ? __x64_sys_sendmsg+0x80/0x80 [ 675.514304][T11742] ? lockdep_hardirqs_on+0x98/0x150 [ 675.519545][T11742] do_syscall_64+0x55/0xa0 [ 675.524009][T11742] ? clear_bhb_loop+0x40/0x90 [ 675.528733][T11742] ? clear_bhb_loop+0x40/0x90 [ 675.533458][T11742] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 675.539387][T11742] RIP: 0033:0x7f1f8899cdd9 [ 675.543841][T11742] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 675.563670][T11742] RSP: 002b:00007f1f8993c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 675.572142][T11742] RAX: ffffffffffffffda RBX: 00007f1f88c15fa0 RCX: 00007f1f8899cdd9 [ 675.580152][T11742] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 675.588160][T11742] RBP: 00007f1f8993c090 R08: 0000000000000000 R09: 0000000000000000 [ 675.596174][T11742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 675.604179][T11742] R13: 00007f1f88c16038 R14: 00007f1f88c15fa0 R15: 00007ffc59c7b0f8 [ 675.612254][T11742] [ 675.909670][T11751] validate_nla: 6 callbacks suppressed [ 675.909784][T11751] netlink: 'syz.0.1948': attribute type 10 has an invalid length. [ 676.597485][T11772] netlink: 'syz.0.1952': attribute type 39 has an invalid length. [ 676.645329][T11766] netlink: 'syz.1.1950': attribute type 10 has an invalid length. [ 676.663863][T11766] mac80211_hwsim hwsim8 wlan1: left allmulticast mode [ 676.751496][T11766] team0: Port device wlan1 added [ 677.045527][T11786] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1957'. [ 677.097242][T11783] netlink: 'syz.2.1954': attribute type 39 has an invalid length. [ 677.481645][T11789] netlink: 'syz.3.1959': attribute type 10 has an invalid length. [ 677.494849][T11791] macsec0: left allmulticast mode [ 677.710043][T11800] netlink: 'syz.0.1962': attribute type 21 has an invalid length. [ 677.750218][T11802] netlink: 'syz.3.1963': attribute type 10 has an invalid length. [ 677.789786][T11802] team0: Device hsr_slave_0 is already a lower device of the team interface [ 677.838454][T11807] netlink: 'syz.2.1965': attribute type 39 has an invalid length. [ 678.111738][T11813] veth1_macvtap: left promiscuous mode [ 678.223601][T11817] netlink: 'syz.0.1969': attribute type 39 has an invalid length. [ 678.277877][T11820] FAULT_INJECTION: forcing a failure. [ 678.277877][T11820] name failslab, interval 1, probability 0, space 0, times 0 [ 678.297236][T11820] CPU: 1 PID: 11820 Comm: syz.2.1970 Not tainted syzkaller #0 [ 678.304776][T11820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 678.314881][T11820] Call Trace: [ 678.318307][T11820] [ 678.321286][T11820] dump_stack_lvl+0x18c/0x250 [ 678.326026][T11820] ? show_regs_print_info+0x20/0x20 [ 678.331329][T11820] ? load_image+0x420/0x420 [ 678.335891][T11820] ? __might_sleep+0xe0/0xe0 [ 678.340565][T11820] ? __lock_acquire+0x7d40/0x7d40 [ 678.345648][T11820] should_fail_ex+0x39d/0x4d0 [ 678.350383][T11820] should_failslab+0x9/0x20 [ 678.354947][T11820] slab_pre_alloc_hook+0x59/0x310 [ 678.360031][T11820] ? tomoyo_encode+0x28b/0x540 [ 678.364841][T11820] ? tomoyo_encode+0x28b/0x540 [ 678.369655][T11820] __kmem_cache_alloc_node+0x53/0x250 [ 678.375084][T11820] ? tomoyo_encode+0x28b/0x540 [ 678.379926][T11820] __kmalloc+0xa4/0x230 [ 678.384123][T11820] tomoyo_encode+0x28b/0x540 [ 678.388753][T11820] tomoyo_realpath_from_path+0x592/0x5d0 [ 678.394444][T11820] tomoyo_path_number_perm+0x248/0x620 [ 678.399988][T11820] ? tomoyo_path_number_perm+0x217/0x620 [ 678.405675][T11820] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 678.411184][T11820] ? ktime_get+0x7f/0x280 [ 678.415602][T11820] ? __fget_files+0x28/0x4b0 [ 678.420234][T11820] ? __fget_files+0x28/0x4b0 [ 678.424874][T11820] security_file_ioctl+0x70/0xa0 [ 678.429855][T11820] __se_sys_ioctl+0x48/0x170 [ 678.434497][T11820] do_syscall_64+0x55/0xa0 [ 678.438944][T11820] ? clear_bhb_loop+0x40/0x90 [ 678.443673][T11820] ? clear_bhb_loop+0x40/0x90 [ 678.448394][T11820] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 678.454313][T11820] RIP: 0033:0x7ff5dd79cdd9 [ 678.458909][T11820] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 678.478561][T11820] RSP: 002b:00007ff5de6a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 678.487010][T11820] RAX: ffffffffffffffda RBX: 00007ff5dda15fa0 RCX: 00007ff5dd79cdd9 [ 678.495022][T11820] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 000000000000000a [ 678.503056][T11820] RBP: 00007ff5de6a1090 R08: 0000000000000000 R09: 0000000000000000 [ 678.511070][T11820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 678.519070][T11820] R13: 00007ff5dda16038 R14: 00007ff5dda15fa0 R15: 00007ffcef21cc58 [ 678.527088][T11820] [ 678.552832][T11820] ERROR: Out of memory at tomoyo_realpath_from_path. [ 678.739398][T11824] netlink: 'syz.3.1972': attribute type 10 has an invalid length. [ 678.871874][T11836] team0: Device hsr_slave_0 is already a lower device of the team interface [ 678.929132][T11839] netlink: 144448 bytes leftover after parsing attributes in process `syz.1.1976'. [ 679.182440][T11849] FAULT_INJECTION: forcing a failure. [ 679.182440][T11849] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 679.246406][T11849] CPU: 1 PID: 11849 Comm: syz.0.1981 Not tainted syzkaller #0 [ 679.253968][T11849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 679.264066][T11849] Call Trace: [ 679.267386][T11849] [ 679.270356][T11849] dump_stack_lvl+0x18c/0x250 [ 679.275101][T11849] ? show_regs_print_info+0x20/0x20 [ 679.280369][T11849] ? load_image+0x420/0x420 [ 679.284933][T11849] ? __might_fault+0xaa/0x120 [ 679.289662][T11849] ? __lock_acquire+0x7d40/0x7d40 [ 679.294743][T11849] should_fail_ex+0x39d/0x4d0 [ 679.299498][T11849] _copy_from_iter+0x1d9/0x12e0 [ 679.304404][T11849] ? slab_post_alloc_hook+0x8a/0x4b0 [ 679.309757][T11849] ? __virt_addr_valid+0x18c/0x540 [ 679.315108][T11849] ? __lock_acquire+0x7d40/0x7d40 [ 679.320179][T11849] ? rcu_is_watching+0x15/0xb0 [ 679.324997][T11849] ? copyout_mc+0x70/0x70 [ 679.329391][T11849] ? __virt_addr_valid+0x18c/0x540 [ 679.334555][T11849] ? __virt_addr_valid+0x18c/0x540 [ 679.339710][T11849] ? __virt_addr_valid+0x469/0x540 [ 679.344856][T11849] ? __check_object_size+0x506/0xa20 [ 679.350173][T11849] netlink_sendmsg+0x76b/0xbf0 [ 679.354986][T11849] ? netlink_getsockopt+0x590/0x590 [ 679.360244][T11849] ? aa_sock_msg_perm+0x94/0x150 [ 679.365214][T11849] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 679.370525][T11849] ? security_socket_sendmsg+0x80/0xa0 [ 679.376045][T11849] ? netlink_getsockopt+0x590/0x590 [ 679.381310][T11849] ____sys_sendmsg+0x5ba/0x960 [ 679.386117][T11849] ? __asan_memset+0x22/0x40 [ 679.390738][T11849] ? __sys_sendmsg_sock+0x30/0x30 [ 679.395788][T11849] ? __import_iovec+0x5f2/0x850 [ 679.400672][T11849] ? import_iovec+0x73/0xa0 [ 679.405199][T11849] ___sys_sendmsg+0x2a6/0x360 [ 679.409897][T11849] ? get_pid_task+0x20/0x1e0 [ 679.414517][T11849] ? __sys_sendmsg+0x2a0/0x2a0 [ 679.419322][T11849] ? __lock_acquire+0x7d40/0x7d40 [ 679.424390][T11849] __se_sys_sendmsg+0x1c2/0x2b0 [ 679.429273][T11849] ? __x64_sys_sendmsg+0x80/0x80 [ 679.434242][T11849] ? lockdep_hardirqs_on+0x98/0x150 [ 679.439485][T11849] do_syscall_64+0x55/0xa0 [ 679.443926][T11849] ? clear_bhb_loop+0x40/0x90 [ 679.448713][T11849] ? clear_bhb_loop+0x40/0x90 [ 679.453433][T11849] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 679.459364][T11849] RIP: 0033:0x7f3be8d9cdd9 [ 679.463809][T11849] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 679.483458][T11849] RSP: 002b:00007f3be9c3e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 679.492001][T11849] RAX: ffffffffffffffda RBX: 00007f3be9015fa0 RCX: 00007f3be8d9cdd9 [ 679.500011][T11849] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 679.508013][T11849] RBP: 00007f3be9c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 679.516103][T11849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 679.524097][T11849] R13: 00007f3be9016038 R14: 00007f3be9015fa0 R15: 00007ffe9eae8048 [ 679.532116][T11849] [ 680.100041][T11874] netlink: 130984 bytes leftover after parsing attributes in process `syz.2.1989'. [ 680.100062][T11871] netlink: 144448 bytes leftover after parsing attributes in process `syz.3.1988'. [ 681.006127][T11901] validate_nla: 14 callbacks suppressed [ 681.026939][T11901] netlink: 'syz.1.1997': attribute type 10 has an invalid length. [ 681.044808][T11901] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 681.363924][T11914] netlink: 'syz.3.2001': attribute type 3 has an invalid length. [ 681.378866][T11914] netlink: 'syz.3.2001': attribute type 6 has an invalid length. [ 681.396710][T11914] netlink: 144448 bytes leftover after parsing attributes in process `syz.3.2001'. [ 681.637701][T11923] netlink: 'syz.3.2005': attribute type 39 has an invalid length. [ 681.697870][T11925] netlink: 'syz.1.2006': attribute type 21 has an invalid length. [ 681.796114][T11928] netlink: 'syz.0.2008': attribute type 10 has an invalid length. [ 682.004181][T11932] netlink: 'syz.2.2007': attribute type 39 has an invalid length. [ 682.490995][T11946] netlink: 'syz.2.2013': attribute type 3 has an invalid length. [ 682.572116][T11946] netlink: 'syz.2.2013': attribute type 6 has an invalid length. [ 682.591879][T11944] netlink: 'syz.3.2012': attribute type 10 has an invalid length. [ 682.606640][T11944] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2012'. [ 682.629236][T11946] netlink: 144448 bytes leftover after parsing attributes in process `syz.2.2013'. [ 682.653587][T11944] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2012'. [ 683.433642][T11970] FAULT_INJECTION: forcing a failure. [ 683.433642][T11970] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 683.456579][T11970] CPU: 0 PID: 11970 Comm: syz.0.2023 Not tainted syzkaller #0 [ 683.464156][T11970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 683.474270][T11970] Call Trace: [ 683.477603][T11970] [ 683.480592][T11970] dump_stack_lvl+0x18c/0x250 [ 683.485348][T11970] ? show_regs_print_info+0x20/0x20 [ 683.490626][T11970] ? load_image+0x420/0x420 [ 683.495199][T11970] ? __might_fault+0xaa/0x120 [ 683.499945][T11970] ? __lock_acquire+0x7d40/0x7d40 [ 683.505039][T11970] should_fail_ex+0x39d/0x4d0 [ 683.509799][T11970] _copy_from_user+0x2f/0xe0 [ 683.514453][T11970] ___sys_sendmsg+0x1c7/0x360 [ 683.519196][T11970] ? get_pid_task+0x20/0x1e0 [ 683.523857][T11970] ? __sys_sendmsg+0x2a0/0x2a0 [ 683.528733][T11970] ? __lock_acquire+0x7d40/0x7d40 [ 683.533905][T11970] __se_sys_sendmsg+0x1c2/0x2b0 [ 683.538835][T11970] ? __x64_sys_sendmsg+0x80/0x80 [ 683.543873][T11970] ? lockdep_hardirqs_on+0x98/0x150 [ 683.549160][T11970] do_syscall_64+0x55/0xa0 [ 683.553632][T11970] ? clear_bhb_loop+0x40/0x90 [ 683.558397][T11970] ? clear_bhb_loop+0x40/0x90 [ 683.563134][T11970] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 683.569084][T11970] RIP: 0033:0x7f3be8d9cdd9 [ 683.573547][T11970] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 683.593325][T11970] RSP: 002b:00007f3be9c3e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 683.601844][T11970] RAX: ffffffffffffffda RBX: 00007f3be9015fa0 RCX: 00007f3be8d9cdd9 [ 683.609879][T11970] RDX: 0000000000000000 RSI: 0000200000001180 RDI: 000000000000000c [ 683.618003][T11970] RBP: 00007f3be9c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 683.626033][T11970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 683.634070][T11970] R13: 00007f3be9016038 R14: 00007f3be9015fa0 R15: 00007ffe9eae8048 [ 683.642131][T11970] [ 683.753815][T11970] team0: Port device syz_tun removed [ 684.372678][T11982] netlink: 144448 bytes leftover after parsing attributes in process `syz.1.2027'. [ 684.888694][T11995] netlink: 201392 bytes leftover after parsing attributes in process `syz.3.2033'. [ 685.383672][T12005] syzkaller0: entered promiscuous mode [ 685.407622][T12005] syzkaller0: entered allmulticast mode [ 685.801312][T12017] team0: Device hsr_slave_0 is already a lower device of the team interface [ 686.013000][T12025] netlink: 135856 bytes leftover after parsing attributes in process `syz.0.2044'. [ 686.054005][T12025] netlink: 8442 bytes leftover after parsing attributes in process `syz.0.2044'. [ 686.073255][ T1279] ieee802154 phy0 wpan0: encryption failed: -22 [ 686.080507][ T1279] ieee802154 phy1 wpan1: encryption failed: -22 [ 686.126963][T12028] netlink: 16186 bytes leftover after parsing attributes in process `syz.0.2044'. [ 686.321899][T12033] netlink: 201392 bytes leftover after parsing attributes in process `syz.1.2046'. [ 686.715808][T12043] validate_nla: 12 callbacks suppressed [ 686.715825][T12043] netlink: 'syz.3.2050': attribute type 10 has an invalid length. [ 686.815016][T12043] team0: Device wg1 is of different type [ 686.839895][T12046] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2051'. [ 686.975210][T12051] netlink: 'syz.1.2052': attribute type 29 has an invalid length. [ 686.995868][T12051] netlink: 'syz.1.2052': attribute type 29 has an invalid length. [ 687.010309][T12051] netlink: 'syz.1.2052': attribute type 29 has an invalid length. [ 687.040859][T12051] netlink: 'syz.1.2052': attribute type 29 has an invalid length. [ 687.049761][T12051] netlink: 'syz.1.2052': attribute type 29 has an invalid length. [ 687.220640][ T5824] Bluetooth: hci3: unexpected subevent 0x12 length: 150 > 5 [ 687.651357][T12073] netlink: 135856 bytes leftover after parsing attributes in process `syz.1.2061'. [ 687.670657][T12071] netlink: 201392 bytes leftover after parsing attributes in process `syz.0.2060'. [ 687.689461][T12073] netlink: 8442 bytes leftover after parsing attributes in process `syz.1.2061'. [ 687.737490][T12073] netlink: 16186 bytes leftover after parsing attributes in process `syz.1.2061'. [ 687.788310][T12079] netlink: 4595 bytes leftover after parsing attributes in process `syz.3.2062'. [ 687.816393][T12079] netlink: 4595 bytes leftover after parsing attributes in process `syz.3.2062'. [ 687.838919][T12072] netlink: 4595 bytes leftover after parsing attributes in process `syz.3.2062'. [ 688.187626][T12088] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2065'. [ 688.309279][T12090] netlink: 'syz.2.2066': attribute type 21 has an invalid length. [ 688.518595][T12096] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2069'. [ 688.594566][T12096] FAULT_INJECTION: forcing a failure. [ 688.594566][T12096] name failslab, interval 1, probability 0, space 0, times 0 [ 688.626239][T12096] CPU: 1 PID: 12096 Comm: syz.0.2069 Not tainted syzkaller #0 [ 688.633811][T12096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 688.643904][T12096] Call Trace: [ 688.647207][T12096] [ 688.650172][T12096] dump_stack_lvl+0x18c/0x250 [ 688.654883][T12096] ? verify_lock_unused+0x140/0x140 [ 688.660107][T12096] ? show_regs_print_info+0x20/0x20 [ 688.665339][T12096] ? load_image+0x420/0x420 [ 688.669880][T12096] ? __nla_validate_parse+0x262c/0x2ea0 [ 688.675494][T12096] should_fail_ex+0x39d/0x4d0 [ 688.680216][T12096] should_failslab+0x9/0x20 [ 688.684751][T12096] slab_pre_alloc_hook+0x59/0x310 [ 688.689820][T12096] ? ___neigh_create+0x6d2/0x2440 [ 688.694875][T12096] ? ___neigh_create+0x6d2/0x2440 [ 688.699930][T12096] __kmem_cache_alloc_node+0x53/0x250 [ 688.705359][T12096] ? ___neigh_create+0x6d2/0x2440 [ 688.710417][T12096] __kmalloc+0xa4/0x230 [ 688.714607][T12096] ___neigh_create+0x6d2/0x2440 [ 688.719492][T12096] ? neigh_lookup+0xb1/0x400 [ 688.724113][T12096] ? neigh_ifdown+0x30/0x30 [ 688.728651][T12096] neigh_add+0xb6e/0xe50 [ 688.732931][T12096] ? neigh_proc_dointvec_unres_qlen+0x2a0/0x2a0 [ 688.739240][T12096] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 688.744417][T12096] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 688.749546][T12096] ? neigh_proc_dointvec_unres_qlen+0x2a0/0x2a0 [ 688.755823][T12096] rtnetlink_rcv_msg+0x869/0xfa0 [ 688.760794][T12096] ? lockdep_hardirqs_on+0x98/0x150 [ 688.766018][T12096] ? rtnetlink_bind+0x80/0x80 [ 688.770727][T12096] ? perf_trace_preemptirq_template+0xac/0x330 [ 688.776929][T12096] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 688.782947][T12096] ? lock_chain_count+0x20/0x20 [ 688.787845][T12096] ? __local_bh_enable_ip+0x13a/0x1c0 [ 688.793276][T12096] ? lockdep_hardirqs_on+0x98/0x150 [ 688.798512][T12096] ? __local_bh_enable_ip+0x13a/0x1c0 [ 688.803929][T12096] ? _local_bh_enable+0xa0/0xa0 [ 688.808827][T12096] ? __dev_queue_xmit+0x265/0x3660 [ 688.813968][T12096] ? __dev_queue_xmit+0x265/0x3660 [ 688.819110][T12096] ? __dev_queue_xmit+0x1b2c/0x3660 [ 688.824373][T12096] ? __dev_queue_xmit+0x265/0x3660 [ 688.829558][T12096] ? ref_tracker_free+0x690/0x840 [ 688.834659][T12096] netlink_rcv_skb+0x241/0x4d0 [ 688.839460][T12096] ? rtnetlink_bind+0x80/0x80 [ 688.844169][T12096] ? netlink_ack+0x1180/0x1180 [ 688.848975][T12096] ? __lock_acquire+0x7d40/0x7d40 [ 688.854031][T12096] ? netlink_deliver_tap+0x2e/0x1b0 [ 688.859288][T12096] netlink_unicast+0x751/0x8d0 [ 688.864101][T12096] netlink_sendmsg+0x8d0/0xbf0 [ 688.868902][T12096] ? netlink_getsockopt+0x590/0x590 [ 688.874141][T12096] ? aa_sock_msg_perm+0x94/0x150 [ 688.879128][T12096] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 688.884468][T12096] ? security_socket_sendmsg+0x80/0xa0 [ 688.889950][T12096] ? netlink_getsockopt+0x590/0x590 [ 688.895194][T12096] ____sys_sendmsg+0x5ba/0x960 [ 688.899992][T12096] ? __asan_memset+0x22/0x40 [ 688.904873][T12096] ? __sys_sendmsg_sock+0x30/0x30 [ 688.909920][T12096] ? __import_iovec+0x5f2/0x850 [ 688.914800][T12096] ? import_iovec+0x73/0xa0 [ 688.919337][T12096] ___sys_sendmsg+0x2a6/0x360 [ 688.924038][T12096] ? get_pid_task+0x20/0x1e0 [ 688.928666][T12096] ? __sys_sendmsg+0x2a0/0x2a0 [ 688.933467][T12096] ? __lock_acquire+0x7d40/0x7d40 [ 688.938535][T12096] __se_sys_sendmsg+0x1c2/0x2b0 [ 688.943414][T12096] ? __x64_sys_sendmsg+0x80/0x80 [ 688.948390][T12096] ? lockdep_hardirqs_on+0x98/0x150 [ 688.953622][T12096] do_syscall_64+0x55/0xa0 [ 688.958090][T12096] ? clear_bhb_loop+0x40/0x90 [ 688.962799][T12096] ? clear_bhb_loop+0x40/0x90 [ 688.967511][T12096] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 688.973430][T12096] RIP: 0033:0x7f3be8d9cdd9 [ 688.977869][T12096] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 688.997593][T12096] RSP: 002b:00007f3be9c3e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 689.006046][T12096] RAX: ffffffffffffffda RBX: 00007f3be9015fa0 RCX: 00007f3be8d9cdd9 [ 689.014067][T12096] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 689.022060][T12096] RBP: 00007f3be9c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 689.030054][T12096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 689.038047][T12096] R13: 00007f3be9016038 R14: 00007f3be9015fa0 R15: 00007ffe9eae8048 [ 689.046059][T12096] [ 689.350999][T12109] netlink: 'syz.1.2074': attribute type 21 has an invalid length. [ 689.522780][T12116] netlink: 'syz.1.2077': attribute type 21 has an invalid length. [ 689.825733][T12125] netlink: 'syz.2.2078': attribute type 29 has an invalid length. [ 690.422151][T12143] team0: Device wg1 is of different type [ 690.659569][T12150] FAULT_INJECTION: forcing a failure. [ 690.659569][T12150] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 690.679915][T12150] CPU: 1 PID: 12150 Comm: syz.0.2090 Not tainted syzkaller #0 [ 690.687461][T12150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 690.697554][T12150] Call Trace: [ 690.700860][T12150] [ 690.703813][T12150] dump_stack_lvl+0x18c/0x250 [ 690.708574][T12150] ? show_regs_print_info+0x20/0x20 [ 690.713807][T12150] ? load_image+0x420/0x420 [ 690.718344][T12150] ? __might_fault+0xaa/0x120 [ 690.723072][T12150] ? __lock_acquire+0x7d40/0x7d40 [ 690.728127][T12150] should_fail_ex+0x39d/0x4d0 [ 690.732847][T12150] _copy_from_user+0x2f/0xe0 [ 690.737562][T12150] generic_map_update_batch+0x54b/0x810 [ 690.743153][T12150] ? rcu_read_unlock+0xa0/0xa0 [ 690.747948][T12150] ? __fdget+0x180/0x210 [ 690.752224][T12150] ? rcu_read_unlock+0xa0/0xa0 [ 690.757020][T12150] bpf_map_do_batch+0x3d7/0x610 [ 690.761911][T12150] __sys_bpf+0x381/0x890 [ 690.766229][T12150] ? bpf_link_show_fdinfo+0x390/0x390 [ 690.771658][T12150] ? lock_chain_count+0x20/0x20 [ 690.776542][T12150] __x64_sys_bpf+0x7c/0x90 [ 690.780997][T12150] do_syscall_64+0x55/0xa0 [ 690.785438][T12150] ? clear_bhb_loop+0x40/0x90 [ 690.790159][T12150] ? clear_bhb_loop+0x40/0x90 [ 690.794880][T12150] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 690.800806][T12150] RIP: 0033:0x7f3be8d9cdd9 [ 690.805252][T12150] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 690.825060][T12150] RSP: 002b:00007f3be9c3e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 690.833593][T12150] RAX: ffffffffffffffda RBX: 00007f3be9015fa0 RCX: 00007f3be8d9cdd9 [ 690.841597][T12150] RDX: 0000000000000038 RSI: 0000200000000300 RDI: 000000000000001a [ 690.849601][T12150] RBP: 00007f3be9c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 690.857593][T12150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 690.865592][T12150] R13: 00007f3be9016038 R14: 00007f3be9015fa0 R15: 00007ffe9eae8048 [ 690.873609][T12150] [ 690.920475][T12152] FAULT_INJECTION: forcing a failure. [ 690.920475][T12152] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 690.966914][T12152] CPU: 1 PID: 12152 Comm: syz.1.2092 Not tainted syzkaller #0 [ 690.974477][T12152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 690.984581][T12152] Call Trace: [ 690.987926][T12152] [ 690.990910][T12152] dump_stack_lvl+0x18c/0x250 [ 690.995665][T12152] ? show_regs_print_info+0x20/0x20 [ 691.000931][T12152] ? load_image+0x420/0x420 [ 691.005502][T12152] ? __lock_acquire+0x7d40/0x7d40 [ 691.010586][T12152] should_fail_ex+0x39d/0x4d0 [ 691.015329][T12152] _copy_from_user+0x2f/0xe0 [ 691.019980][T12152] __copy_msghdr+0x3bb/0x580 [ 691.024632][T12152] ___sys_sendmsg+0x214/0x360 [ 691.029359][T12152] ? get_pid_task+0x20/0x1e0 [ 691.034026][T12152] ? __sys_sendmsg+0x2a0/0x2a0 [ 691.038856][T12152] ? __lock_acquire+0x7d40/0x7d40 [ 691.043960][T12152] __se_sys_sendmsg+0x1c2/0x2b0 [ 691.048870][T12152] ? __x64_sys_sendmsg+0x80/0x80 [ 691.053876][T12152] ? lockdep_hardirqs_on+0x98/0x150 [ 691.059132][T12152] do_syscall_64+0x55/0xa0 [ 691.063589][T12152] ? clear_bhb_loop+0x40/0x90 [ 691.068330][T12152] ? clear_bhb_loop+0x40/0x90 [ 691.073063][T12152] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 691.079013][T12152] RIP: 0033:0x7f1f8899cdd9 [ 691.083475][T12152] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 691.103181][T12152] RSP: 002b:00007f1f8993c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 691.111644][T12152] RAX: ffffffffffffffda RBX: 00007f1f88c15fa0 RCX: 00007f1f8899cdd9 [ 691.119703][T12152] RDX: 000000000000fff5 RSI: 0000200000000380 RDI: 0000000000000008 [ 691.127709][T12152] RBP: 00007f1f8993c090 R08: 0000000000000000 R09: 0000000000000000 [ 691.135712][T12152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 691.143721][T12152] R13: 00007f1f88c16038 R14: 00007f1f88c15fa0 R15: 00007ffc59c7b0f8 [ 691.151739][T12152] [ 694.036016][T12170] validate_nla: 9 callbacks suppressed [ 694.036035][T12170] netlink: 'syz.0.2095': attribute type 29 has an invalid length. [ 694.063976][T12169] netlink: 'syz.1.2096': attribute type 21 has an invalid length. [ 694.091395][T12170] netlink: 'syz.0.2095': attribute type 29 has an invalid length. [ 694.152182][T12170] netlink: 'syz.0.2095': attribute type 29 has an invalid length. [ 694.346487][T12171] netlink: 'syz.0.2095': attribute type 29 has an invalid length. [ 694.358643][T12172] netlink: 'syz.0.2095': attribute type 29 has an invalid length. [ 694.851052][T12186] netlink: 'syz.1.2104': attribute type 39 has an invalid length. [ 695.174542][T12200] netlink: 'syz.2.2109': attribute type 39 has an invalid length. [ 696.012195][T12215] __nla_validate_parse: 4 callbacks suppressed [ 696.012207][T12215] netlink: 16046 bytes leftover after parsing attributes in process `syz.3.2112'. [ 696.106551][T12216] netlink: 'syz.2.2113': attribute type 4 has an invalid length. [ 696.114614][T12216] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2113'. [ 696.750368][T12227] netlink: 'syz.3.2116': attribute type 39 has an invalid length. [ 697.204364][T12233] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 697.222927][T12233] bond_slave_0: left promiscuous mode [ 697.264310][T12233] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 697.286123][T12233] bond_slave_1: left promiscuous mode [ 697.326450][T12233] bond0 (unregistering): Released all slaves [ 697.360553][T12244] netlink: 152 bytes leftover after parsing attributes in process `syz.3.2123'. [ 698.354310][T12262] FAULT_INJECTION: forcing a failure. [ 698.354310][T12262] name failslab, interval 1, probability 0, space 0, times 0 [ 698.368917][T12262] CPU: 1 PID: 12262 Comm: syz.2.2131 Not tainted syzkaller #0 [ 698.376463][T12262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 698.386616][T12262] Call Trace: [ 698.389960][T12262] [ 698.392961][T12262] dump_stack_lvl+0x18c/0x250 [ 698.397739][T12262] ? show_regs_print_info+0x20/0x20 [ 698.403033][T12262] ? load_image+0x420/0x420 [ 698.407637][T12262] ? __might_sleep+0xe0/0xe0 [ 698.412314][T12262] ? __lock_acquire+0x7d40/0x7d40 [ 698.417411][T12262] ? __mutex_unlock_slowpath+0x1b4/0x6c0 [ 698.423141][T12262] should_fail_ex+0x39d/0x4d0 [ 698.427924][T12262] should_failslab+0x9/0x20 [ 698.432488][T12262] slab_pre_alloc_hook+0x59/0x310 [ 698.437591][T12262] kmem_cache_alloc+0x5a/0x2d0 [ 698.442413][T12262] ? getname_flags+0xbb/0x500 [ 698.447162][T12262] getname_flags+0xbb/0x500 [ 698.451758][T12262] __x64_sys_mkdir+0x5f/0x80 [ 698.456415][T12262] do_syscall_64+0x55/0xa0 [ 698.460891][T12262] ? clear_bhb_loop+0x40/0x90 [ 698.465620][T12262] ? clear_bhb_loop+0x40/0x90 [ 698.470362][T12262] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 698.476314][T12262] RIP: 0033:0x7ff5dd79cdd9 [ 698.480794][T12262] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 698.500458][T12262] RSP: 002b:00007ff5de6a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 698.508928][T12262] RAX: ffffffffffffffda RBX: 00007ff5dda15fa0 RCX: 00007ff5dd79cdd9 [ 698.516941][T12262] RDX: 0000000000000000 RSI: 00000000000001c1 RDI: 0000200000000000 [ 698.524953][T12262] RBP: 00007ff5de6a1090 R08: 0000000000000000 R09: 0000000000000000 [ 698.532973][T12262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 698.540992][T12262] R13: 00007ff5dda16038 R14: 00007ff5dda15fa0 R15: 00007ffcef21cc58 [ 698.549053][T12262] [ 698.583768][T12262] netlink: 14 bytes leftover after parsing attributes in process `syz.2.2131'. [ 699.328562][T12287] validate_nla: 3 callbacks suppressed [ 699.328579][T12287] netlink: 'syz.0.2140': attribute type 10 has an invalid length. [ 699.345491][T12287] team0: Device hsr_slave_0 is already a lower device of the team interface [ 699.571012][T12296] netlink: 'syz.0.2144': attribute type 10 has an invalid length. [ 700.218691][T12317] FAULT_INJECTION: forcing a failure. [ 700.218691][T12317] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 700.256519][T12317] CPU: 0 PID: 12317 Comm: syz.1.2153 Not tainted syzkaller #0 [ 700.264075][T12317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 700.274173][T12317] Call Trace: [ 700.277521][T12317] [ 700.280520][T12317] dump_stack_lvl+0x18c/0x250 [ 700.285269][T12317] ? show_regs_print_info+0x20/0x20 [ 700.290531][T12317] ? load_image+0x420/0x420 [ 700.295086][T12317] ? __lock_acquire+0x7d40/0x7d40 [ 700.300156][T12317] ? snprintf+0xe9/0x140 [ 700.304480][T12317] should_fail_ex+0x39d/0x4d0 [ 700.309221][T12317] _copy_to_user+0x2f/0xa0 [ 700.313693][T12317] simple_read_from_buffer+0xe7/0x150 [ 700.319139][T12317] proc_fail_nth_read+0x1e8/0x260 [ 700.324228][T12317] ? proc_fault_inject_write+0x360/0x360 [ 700.329931][T12317] ? fsnotify_perm+0x271/0x5e0 [ 700.334754][T12317] ? proc_fault_inject_write+0x360/0x360 [ 700.340448][T12317] vfs_read+0x28b/0x970 [ 700.344279][T12319] netlink: 'syz.3.2152': attribute type 10 has an invalid length. [ 700.344659][T12317] ? kernel_read+0x1e0/0x1e0 [ 700.357106][T12319] team0: Device hsr_slave_0 is already a lower device of the team interface [ 700.365803][T12317] ? __fget_files+0x28/0x4b0 [ 700.370445][T12317] ? __fget_files+0x28/0x4b0 [ 700.375093][T12317] ? __fget_files+0x43d/0x4b0 [ 700.379836][T12317] ? __fdget_pos+0x2a3/0x330 [ 700.384475][T12317] ? ksys_read+0x75/0x260 [ 700.388854][T12317] ksys_read+0x150/0x260 [ 700.393162][T12317] ? vfs_write+0x990/0x990 [ 700.397616][T12317] ? lockdep_hardirqs_on+0x98/0x150 [ 700.402844][T12317] do_syscall_64+0x55/0xa0 [ 700.407333][T12317] ? clear_bhb_loop+0x40/0x90 [ 700.412040][T12317] ? clear_bhb_loop+0x40/0x90 [ 700.416753][T12317] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 700.422671][T12317] RIP: 0033:0x7f1f8895d60e [ 700.427116][T12317] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 700.446837][T12317] RSP: 002b:00007f1f8993bfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 700.455289][T12317] RAX: ffffffffffffffda RBX: 00007f1f8993c6c0 RCX: 00007f1f8895d60e [ 700.463284][T12317] RDX: 000000000000000f RSI: 00007f1f8993c0a0 RDI: 0000000000000009 [ 700.471284][T12317] RBP: 00007f1f8993c090 R08: 0000000000000000 R09: 0000000000000000 [ 700.479316][T12317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 700.487340][T12317] R13: 00007f1f88c16038 R14: 00007f1f88c15fa0 R15: 00007ffc59c7b0f8 [ 700.495369][T12317] [ 701.031401][T12337] FAULT_INJECTION: forcing a failure. [ 701.031401][T12337] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 701.045508][T12337] CPU: 0 PID: 12337 Comm: syz.1.2160 Not tainted syzkaller #0 [ 701.053114][T12337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 701.063202][T12337] Call Trace: [ 701.066513][T12337] [ 701.069478][T12337] dump_stack_lvl+0x18c/0x250 [ 701.074195][T12337] ? show_regs_print_info+0x20/0x20 [ 701.079436][T12337] ? load_image+0x420/0x420 [ 701.083976][T12337] ? __might_fault+0xaa/0x120 [ 701.088680][T12337] ? __lock_acquire+0x7d40/0x7d40 [ 701.093731][T12337] ? unix_ioctl+0x261/0x670 [ 701.098300][T12337] should_fail_ex+0x39d/0x4d0 [ 701.103034][T12337] _copy_from_user+0x2f/0xe0 [ 701.107661][T12337] sock_do_ioctl+0x190/0x310 [ 701.112288][T12337] ? sock_show_fdinfo+0xb0/0xb0 [ 701.117179][T12337] sock_ioctl+0x5ba/0x7e0 [ 701.121551][T12337] ? sock_poll+0x3e0/0x3e0 [ 701.126037][T12337] ? bpf_lsm_file_ioctl+0x9/0x10 [ 701.131000][T12337] ? security_file_ioctl+0x80/0xa0 [ 701.136238][T12337] ? sock_poll+0x3e0/0x3e0 [ 701.140688][T12337] __se_sys_ioctl+0xfd/0x170 [ 701.145313][T12337] do_syscall_64+0x55/0xa0 [ 701.149752][T12337] ? clear_bhb_loop+0x40/0x90 [ 701.154460][T12337] ? clear_bhb_loop+0x40/0x90 [ 701.159171][T12337] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 701.165098][T12337] RIP: 0033:0x7f1f8899cdd9 [ 701.169629][T12337] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 701.189267][T12337] RSP: 002b:00007f1f8993c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 701.197708][T12337] RAX: ffffffffffffffda RBX: 00007f1f88c15fa0 RCX: 00007f1f8899cdd9 [ 701.205708][T12337] RDX: 0000200000000080 RSI: 0000000000008922 RDI: 000000000000000f [ 701.213706][T12337] RBP: 00007f1f8993c090 R08: 0000000000000000 R09: 0000000000000000 [ 701.221702][T12337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 701.229696][T12337] R13: 00007f1f88c16038 R14: 00007f1f88c15fa0 R15: 00007ffc59c7b0f8 [ 701.237799][T12337] [ 701.775578][T12347] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 701.803915][T12347] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 701.828390][T12347] bond0 (unregistering): Released all slaves [ 702.387951][T12362] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2170'. [ 702.956097][T12382] netlink: 'syz.2.2178': attribute type 29 has an invalid length. [ 702.987024][T12382] netlink: 'syz.2.2178': attribute type 29 has an invalid length. [ 703.014345][T12384] FAULT_INJECTION: forcing a failure. [ 703.014345][T12384] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 703.040793][T12384] CPU: 0 PID: 12384 Comm: syz.3.2179 Not tainted syzkaller #0 [ 703.048333][T12384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 703.058424][T12384] Call Trace: [ 703.061739][T12384] [ 703.064705][T12384] dump_stack_lvl+0x18c/0x250 [ 703.069439][T12384] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 703.075675][T12384] ? show_regs_print_info+0x20/0x20 [ 703.080933][T12384] ? load_image+0x420/0x420 [ 703.085530][T12384] should_fail_ex+0x39d/0x4d0 [ 703.090274][T12384] _copy_from_user+0x2f/0xe0 [ 703.094911][T12384] bpf_prog_test_run_skb+0x266/0x12b0 [ 703.100331][T12384] ? __fget_files+0x28/0x4b0 [ 703.104963][T12384] ? __fget_files+0x28/0x4b0 [ 703.109600][T12384] ? __fget_files+0x43d/0x4b0 [ 703.114341][T12384] ? cpu_online+0x60/0x60 [ 703.118808][T12384] bpf_prog_test_run+0x321/0x390 [ 703.123815][T12384] __sys_bpf+0x49d/0x890 [ 703.128109][T12384] ? bpf_link_show_fdinfo+0x390/0x390 [ 703.133540][T12384] ? lock_chain_count+0x20/0x20 [ 703.138443][T12384] __x64_sys_bpf+0x7c/0x90 [ 703.142900][T12384] do_syscall_64+0x55/0xa0 [ 703.147356][T12384] ? clear_bhb_loop+0x40/0x90 [ 703.152088][T12384] ? clear_bhb_loop+0x40/0x90 [ 703.156847][T12384] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 703.162787][T12384] RIP: 0033:0x7fc9a819cdd9 [ 703.167261][T12384] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 703.186913][T12384] RSP: 002b:00007fc9a9021028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 703.195376][T12384] RAX: ffffffffffffffda RBX: 00007fc9a8415fa0 RCX: 00007fc9a819cdd9 [ 703.203379][T12384] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 703.211388][T12384] RBP: 00007fc9a9021090 R08: 0000000000000000 R09: 0000000000000000 [ 703.219394][T12384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 703.227419][T12384] R13: 00007fc9a8416038 R14: 00007fc9a8415fa0 R15: 00007ffd59e6a9c8 [ 703.235447][T12384] [ 703.297114][T12385] netlink: 'syz.2.2178': attribute type 29 has an invalid length. [ 703.307849][T12385] netlink: 'syz.2.2178': attribute type 29 has an invalid length. [ 703.320160][T12385] netlink: 'syz.2.2178': attribute type 29 has an invalid length. [ 703.328664][T12385] netlink: 'syz.2.2178': attribute type 29 has an invalid length. [ 703.341670][T12385] netlink: 'syz.2.2178': attribute type 29 has an invalid length. [ 704.275070][T12398] netlink: 189132 bytes leftover after parsing attributes in process `syz.2.2184'. [ 704.325660][T12401] ref_ctr_offset mismatch. inode: 0x7a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0xfe [ 705.191597][T12425] validate_nla: 2 callbacks suppressed [ 705.191633][T12425] netlink: 'syz.2.2189': attribute type 21 has an invalid length. [ 705.640544][T12450] netlink: 'syz.2.2193': attribute type 39 has an invalid length. [ 706.000085][T12458] netlink: 'syz.1.2196': attribute type 3 has an invalid length. [ 706.012324][T12458] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2196'. [ 706.645024][T12483] netlink: 'syz.2.2205': attribute type 3 has an invalid length. [ 706.659943][T12483] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2205'. [ 706.875787][T12488] netlink: 'syz.0.2206': attribute type 39 has an invalid length. [ 707.401140][T12502] netlink: 'syz.3.2214': attribute type 39 has an invalid length. [ 707.434744][T12505] netlink: 'syz.1.2213': attribute type 6 has an invalid length. [ 707.449865][T12505] netlink: 164 bytes leftover after parsing attributes in process `syz.1.2213'. [ 708.033636][T12520] netlink: 'syz.3.2220': attribute type 39 has an invalid length. [ 708.346358][T12526] netlink: 176 bytes leftover after parsing attributes in process `syz.1.2222'. [ 708.702903][T12534] netlink: 'syz.3.2225': attribute type 39 has an invalid length. [ 708.797915][T12538] netlink: 'syz.1.2228': attribute type 29 has an invalid length. [ 709.687400][T12563] netlink: 830 bytes leftover after parsing attributes in process `syz.1.2238'. [ 710.383619][T12581] validate_nla: 4 callbacks suppressed [ 710.383635][T12581] netlink: 'syz.0.2244': attribute type 39 has an invalid length. [ 710.942599][T12597] netlink: 'syz.2.2249': attribute type 29 has an invalid length. [ 710.988761][T12597] netlink: 'syz.2.2249': attribute type 29 has an invalid length. [ 711.023209][T12597] netlink: 'syz.2.2249': attribute type 29 has an invalid length. [ 711.064350][T12597] netlink: 'syz.2.2249': attribute type 29 has an invalid length. [ 711.106812][T12597] netlink: 'syz.2.2249': attribute type 29 has an invalid length. [ 711.417939][T12595] netlink: 'syz.3.2248': attribute type 21 has an invalid length. [ 712.138066][T12613] FAULT_INJECTION: forcing a failure. [ 712.138066][T12613] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 712.154484][T12613] CPU: 1 PID: 12613 Comm: syz.2.2255 Not tainted syzkaller #0 [ 712.162018][T12613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 712.172117][T12613] Call Trace: [ 712.175424][T12613] [ 712.178377][T12613] dump_stack_lvl+0x18c/0x250 [ 712.183093][T12613] ? show_regs_print_info+0x20/0x20 [ 712.188330][T12613] ? load_image+0x420/0x420 [ 712.192859][T12613] ? __might_fault+0xaa/0x120 [ 712.197559][T12613] ? __lock_acquire+0x7d40/0x7d40 [ 712.202608][T12613] should_fail_ex+0x39d/0x4d0 [ 712.207346][T12613] _copy_from_user+0x2f/0xe0 [ 712.211964][T12613] __sys_bpf+0x23e/0x890 [ 712.216252][T12613] ? bpf_link_show_fdinfo+0x390/0x390 [ 712.221658][T12613] ? lock_chain_count+0x20/0x20 [ 712.226542][T12613] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 712.232555][T12613] __x64_sys_bpf+0x7c/0x90 [ 712.236992][T12613] do_syscall_64+0x55/0xa0 [ 712.241427][T12613] ? clear_bhb_loop+0x40/0x90 [ 712.246130][T12613] ? clear_bhb_loop+0x40/0x90 [ 712.250863][T12613] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 712.256798][T12613] RIP: 0033:0x7ff5dd79cdd9 [ 712.261263][T12613] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 712.280899][T12613] RSP: 002b:00007ff5de6a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 712.289351][T12613] RAX: ffffffffffffffda RBX: 00007ff5dda15fa0 RCX: 00007ff5dd79cdd9 [ 712.297347][T12613] RDX: 0000000000000048 RSI: 00002000000054c0 RDI: 0000000000000005 [ 712.305348][T12613] RBP: 00007ff5de6a1090 R08: 0000000000000000 R09: 0000000000000000 [ 712.313347][T12613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 712.321382][T12613] R13: 00007ff5dda16038 R14: 00007ff5dda15fa0 R15: 00007ffcef21cc58 [ 712.329416][T12613] [ 712.738928][T12624] netlink: 'syz.2.2259': attribute type 39 has an invalid length. [ 712.813562][T12629] netlink: 10 bytes leftover after parsing attributes in process `syz.1.2261'. [ 713.052714][T12637] netlink: 'syz.3.2262': attribute type 10 has an invalid length. [ 713.070965][T12637] team0: Device hsr_slave_0 is already a lower device of the team interface [ 713.868019][T12656] netlink: 'syz.3.2270': attribute type 6 has an invalid length. [ 713.883029][T12656] netlink: 164 bytes leftover after parsing attributes in process `syz.3.2270'. [ 714.291209][T12664] FAULT_INJECTION: forcing a failure. [ 714.291209][T12664] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 714.321978][T12664] CPU: 0 PID: 12664 Comm: syz.2.2273 Not tainted syzkaller #0 [ 714.329617][T12664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 714.339812][T12664] Call Trace: [ 714.343223][T12664] [ 714.346302][T12664] dump_stack_lvl+0x18c/0x250 [ 714.351176][T12664] ? show_regs_print_info+0x20/0x20 [ 714.356551][T12664] ? load_image+0x420/0x420 [ 714.361236][T12664] ? __lock_acquire+0x7d40/0x7d40 [ 714.366388][T12664] ? snprintf+0xe9/0x140 [ 714.370758][T12664] should_fail_ex+0x39d/0x4d0 [ 714.375586][T12664] _copy_to_user+0x2f/0xa0 [ 714.380172][T12664] simple_read_from_buffer+0xe7/0x150 [ 714.385694][T12664] proc_fail_nth_read+0x1e8/0x260 [ 714.390849][T12664] ? proc_fault_inject_write+0x360/0x360 [ 714.396623][T12664] ? fsnotify_perm+0x271/0x5e0 [ 714.401498][T12664] ? proc_fault_inject_write+0x360/0x360 [ 714.407244][T12664] vfs_read+0x28b/0x970 [ 714.411543][T12664] ? kernel_read+0x1e0/0x1e0 [ 714.416603][T12664] ? __fget_files+0x28/0x4b0 [ 714.421285][T12664] ? __fget_files+0x28/0x4b0 [ 714.426120][T12664] ? __fget_files+0x43d/0x4b0 [ 714.430989][T12664] ? __fdget_pos+0x2a3/0x330 [ 714.435670][T12664] ? ksys_read+0x75/0x260 [ 714.440133][T12664] ksys_read+0x150/0x260 [ 714.445163][T12664] ? vfs_write+0x990/0x990 [ 714.449734][T12664] ? lockdep_hardirqs_on+0x98/0x150 [ 714.455065][T12664] do_syscall_64+0x55/0xa0 [ 714.459577][T12664] ? clear_bhb_loop+0x40/0x90 [ 714.464349][T12664] ? clear_bhb_loop+0x40/0x90 [ 714.469156][T12664] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 714.475157][T12664] RIP: 0033:0x7ff5dd75d60e [ 714.479688][T12664] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 714.499394][T12664] RSP: 002b:00007ff5de6a0fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 714.508443][T12664] RAX: ffffffffffffffda RBX: 00007ff5de6a16c0 RCX: 00007ff5dd75d60e [ 714.516503][T12664] RDX: 000000000000000f RSI: 00007ff5de6a10a0 RDI: 0000000000000005 [ 714.524562][T12664] RBP: 00007ff5de6a1090 R08: 0000000000000000 R09: 0000000000000000 [ 714.532624][T12664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 714.540795][T12664] R13: 00007ff5dda16038 R14: 00007ff5dda15fa0 R15: 00007ffcef21cc58 [ 714.549063][T12664] [ 714.823030][T12679] team0: Device hsr_slave_0 is already a lower device of the team interface [ 715.815176][T12692] FAULT_INJECTION: forcing a failure. [ 715.815176][T12692] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 715.846944][T12692] CPU: 0 PID: 12692 Comm: syz.3.2281 Not tainted syzkaller #0 [ 715.854511][T12692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 715.864636][T12692] Call Trace: [ 715.867989][T12692] [ 715.871000][T12692] dump_stack_lvl+0x18c/0x250 [ 715.875811][T12692] ? show_regs_print_info+0x20/0x20 [ 715.881137][T12692] ? load_image+0x420/0x420 [ 715.885735][T12692] ? __might_fault+0xaa/0x120 [ 715.890498][T12692] ? __lock_acquire+0x7d40/0x7d40 [ 715.895626][T12692] should_fail_ex+0x39d/0x4d0 [ 715.900404][T12692] _copy_from_user+0x2f/0xe0 [ 715.905078][T12692] ___sys_sendmsg+0x1c7/0x360 [ 715.909871][T12692] ? __sys_sendmsg+0x2a0/0x2a0 [ 715.914784][T12692] ? trace_call_bpf+0xc3/0x6c0 [ 715.919777][T12692] __se_sys_sendmsg+0x1c2/0x2b0 [ 715.924720][T12692] ? __x64_sys_sendmsg+0x80/0x80 [ 715.929789][T12692] ? lockdep_hardirqs_on+0x98/0x150 [ 715.935089][T12692] do_syscall_64+0x55/0xa0 [ 715.939575][T12692] ? clear_bhb_loop+0x40/0x90 [ 715.944347][T12692] ? clear_bhb_loop+0x40/0x90 [ 715.949096][T12692] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 715.955053][T12692] RIP: 0033:0x7fc9a819cdd9 [ 715.959537][T12692] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 715.979225][T12692] RSP: 002b:00007fc9a9021028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 715.987725][T12692] RAX: ffffffffffffffda RBX: 00007fc9a8415fa0 RCX: 00007fc9a819cdd9 [ 715.995771][T12692] RDX: 0000000000000600 RSI: 0000200000000540 RDI: 000000000000000d [ 716.003814][T12692] RBP: 00007fc9a9021090 R08: 0000000000000000 R09: 0000000000000000 [ 716.011892][T12692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 716.019940][T12692] R13: 00007fc9a8416038 R14: 00007fc9a8415fa0 R15: 00007ffd59e6a9c8 [ 716.028042][T12692] [ 716.308934][T12698] pim6reg1: entered promiscuous mode [ 716.321090][T12698] pim6reg1: entered allmulticast mode [ 716.357527][T12698] validate_nla: 1 callbacks suppressed [ 716.357545][T12698] netlink: 'syz.2.2284': attribute type 10 has an invalid length. [ 716.392821][T12698] netlink: 9279 bytes leftover after parsing attributes in process `syz.2.2284'. [ 716.483983][T12709] netlink: 'syz.1.2287': attribute type 10 has an invalid length. [ 716.492999][T12709] team0: Device hsr_slave_0 failed to register rx_handler [ 717.615353][T12728] À: port 1(vlan0) entered blocking state [ 717.645202][T12728] À: port 1(vlan0) entered disabled state [ 717.677936][T12728] vlan0: entered allmulticast mode [ 717.683136][T12728] veth0_vlan: entered allmulticast mode [ 717.743690][T12728] vlan0: entered promiscuous mode [ 717.793298][T12734] FAULT_INJECTION: forcing a failure. [ 717.793298][T12734] name failslab, interval 1, probability 0, space 0, times 0 [ 717.809866][T12723] À: port 1(vlan0) entered blocking state [ 717.817074][T12723] À: port 1(vlan0) entered forwarding state [ 717.818154][T12734] CPU: 0 PID: 12734 Comm: syz.2.2297 Not tainted syzkaller #0 [ 717.830688][T12734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 717.840798][T12734] Call Trace: [ 717.844111][T12734] [ 717.847082][T12734] dump_stack_lvl+0x18c/0x250 [ 717.851831][T12734] ? show_regs_print_info+0x20/0x20 [ 717.857092][T12734] ? load_image+0x420/0x420 [ 717.861643][T12734] ? lockdep_hardirqs_on+0x98/0x150 [ 717.866902][T12734] should_fail_ex+0x39d/0x4d0 [ 717.871651][T12734] should_failslab+0x9/0x20 [ 717.876199][T12734] slab_pre_alloc_hook+0x59/0x310 [ 717.881271][T12734] kmem_cache_alloc_lru+0x4d/0x2d0 [ 717.886419][T12734] ? sock_alloc_inode+0x28/0xc0 [ 717.891298][T12734] sock_alloc_inode+0x28/0xc0 [ 717.895995][T12734] ? sockfs_init_fs_context+0xb0/0xb0 [ 717.901386][T12734] new_inode_pseudo+0x63/0x1d0 [ 717.906181][T12734] __sock_create+0x12d/0x940 [ 717.910825][T12734] ? __might_fault+0xaa/0x120 [ 717.915525][T12734] ? __might_fault+0xc6/0x120 [ 717.920253][T12734] __sys_socketpair+0x1c1/0x550 [ 717.925241][T12734] __x64_sys_socketpair+0x9b/0xb0 [ 717.930307][T12734] do_syscall_64+0x55/0xa0 [ 717.934749][T12734] ? clear_bhb_loop+0x40/0x90 [ 717.939455][T12734] ? clear_bhb_loop+0x40/0x90 [ 717.944166][T12734] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 717.950089][T12734] RIP: 0033:0x7ff5dd79cdd9 [ 717.954550][T12734] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 717.974184][T12734] RSP: 002b:00007ff5de6a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 717.982624][T12734] RAX: ffffffffffffffda RBX: 00007ff5dda15fa0 RCX: 00007ff5dd79cdd9 [ 717.990634][T12734] RDX: 0000000000000006 RSI: 0000000000000002 RDI: 000000000000001d [ 717.998630][T12734] RBP: 00007ff5de6a1090 R08: 0000000000000000 R09: 0000000000000000 [ 718.006618][T12734] R10: 0000200000000300 R11: 0000000000000246 R12: 0000000000000001 [ 718.014618][T12734] R13: 00007ff5dda16038 R14: 00007ff5dda15fa0 R15: 00007ffcef21cc58 [ 718.022625][T12734] [ 718.036450][T12734] socket: no more sockets [ 718.174275][T12739] netlink: 'syz.2.2299': attribute type 10 has an invalid length. [ 718.192328][T12739] netlink: 40 bytes leftover after parsing attributes in process `syz.2.2299'. [ 718.216991][T12739] netlink: 14 bytes leftover after parsing attributes in process `syz.2.2299'. [ 718.260847][T12743] pim6reg1: entered promiscuous mode [ 718.266451][T12743] pim6reg1: entered allmulticast mode [ 718.283933][T12743] netlink: 'syz.1.2301': attribute type 10 has an invalid length. [ 718.292004][T12743] netlink: 9279 bytes leftover after parsing attributes in process `syz.1.2301'. [ 718.424857][T12746] netlink: 'syz.3.2300': attribute type 15 has an invalid length. [ 718.435588][T12746] netlink: 'syz.3.2300': attribute type 7 has an invalid length. [ 719.252373][T12749] netlink: 203516 bytes leftover after parsing attributes in process `syz.1.2303'. [ 719.436792][T12749] netlink: zone id is out of range [ 719.442059][T12749] netlink: zone id is out of range [ 719.447436][T12749] netlink: zone id is out of range [ 719.452646][T12749] netlink: zone id is out of range [ 719.459557][T12749] netlink: zone id is out of range [ 719.464769][T12749] netlink: zone id is out of range [ 719.470089][T12749] netlink: zone id is out of range [ 719.475289][T12749] netlink: zone id is out of range [ 719.527003][T12749] netlink: zone id is out of range [ 719.617663][T12754] netlink: 4083 bytes leftover after parsing attributes in process `syz.0.2305'. [ 719.661889][T12754] netlink: 4083 bytes leftover after parsing attributes in process `syz.0.2305'. [ 719.766856][T12754] netlink: 4083 bytes leftover after parsing attributes in process `syz.0.2305'. [ 719.921970][T12760] netlink: 'syz.3.2308': attribute type 29 has an invalid length. [ 719.945595][T12760] netlink: 'syz.3.2308': attribute type 29 has an invalid length. [ 719.964905][T12767] netlink: 'syz.3.2308': attribute type 29 has an invalid length. [ 720.031082][T12769] netlink: 'syz.0.2311': attribute type 29 has an invalid length. [ 720.169351][T12771] pim6reg1: entered promiscuous mode [ 720.174750][T12771] pim6reg1: entered allmulticast mode [ 720.194766][T12771] netlink: 9279 bytes leftover after parsing attributes in process `syz.3.2312'. [ 720.663183][T12783] netlink: 60243 bytes leftover after parsing attributes in process `syz.3.2318'. [ 720.688468][T12783] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2318'. [ 721.124116][ T52] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 721.133978][ T52] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 721.142499][ T52] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 721.153428][ T52] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 721.163358][ T52] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 721.171145][ T52] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 721.208044][T12795] tc_dump_action: action bad kind [ 721.569251][T12793] chnl_net:caif_netlink_parms(): no params data found [ 721.749758][T12793] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.760047][T12793] bridge0: port 1(bridge_slave_0) entered disabled state [ 721.767952][T12793] bridge_slave_0: entered allmulticast mode [ 721.775506][T12793] bridge_slave_0: entered promiscuous mode [ 721.790837][T12793] bridge0: port 2(bridge_slave_1) entered blocking state [ 721.799973][T12793] bridge0: port 2(bridge_slave_1) entered disabled state [ 721.809451][T12793] bridge_slave_1: entered allmulticast mode [ 721.817506][T12793] bridge_slave_1: entered promiscuous mode [ 721.831681][T12815] validate_nla: 8 callbacks suppressed [ 721.831696][T12815] netlink: 'syz.3.2323': attribute type 10 has an invalid length. [ 721.851134][T12815] team0: Device hsr_slave_0 is already a lower device of the team interface [ 721.894627][T12793] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 721.914757][T12793] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 721.966417][T12793] team0: Port device team_slave_0 added [ 721.975810][T12793] team0: Port device team_slave_1 added [ 722.015021][T12793] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 722.026929][T12793] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 722.057143][T12793] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 722.074350][T12793] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 722.083043][T12793] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 722.112156][T12793] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 722.343499][T12793] hsr_slave_0: entered promiscuous mode [ 722.355584][T12793] hsr_slave_1: entered promiscuous mode [ 722.400019][T12793] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 722.417679][T12793] Cannot create hsr debugfs directory [ 722.895031][T12793] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 723.012547][T12793] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 723.132560][T12793] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 723.256649][ T52] Bluetooth: hci4: command tx timeout [ 723.341929][ T5862] tipc: Left network mode [ 723.736255][T12793] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 723.779635][T12836] netlink: 'syz.3.2330': attribute type 10 has an invalid length. [ 723.868220][T12836] bridge0: port 2(bridge_slave_1) entered disabled state [ 723.928760][T12836] bridge0: port 2(bridge_slave_1) entered blocking state [ 723.937617][T12836] bridge0: port 2(bridge_slave_1) entered forwarding state [ 724.014583][T12836] team0: Port device bridge0 added [ 724.028572][T12793] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 724.068220][T12843] FAULT_INJECTION: forcing a failure. [ 724.068220][T12843] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 724.126282][T12843] CPU: 0 PID: 12843 Comm: syz.2.2333 Not tainted syzkaller #0 [ 724.133929][T12843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 724.144148][T12843] Call Trace: [ 724.147476][T12843] [ 724.150453][T12843] dump_stack_lvl+0x18c/0x250 [ 724.155197][T12843] ? show_regs_print_info+0x20/0x20 [ 724.160457][T12843] ? load_image+0x420/0x420 [ 724.165023][T12843] ? __might_fault+0xaa/0x120 [ 724.169752][T12843] ? __lock_acquire+0x7d40/0x7d40 [ 724.174839][T12843] should_fail_ex+0x39d/0x4d0 [ 724.179584][T12843] _copy_from_user+0x2f/0xe0 [ 724.184225][T12843] bpf_obj_get_info_by_fd+0x477/0x3080 [ 724.189747][T12843] ? verify_lock_unused+0x140/0x140 [ 724.194995][T12843] ? perf_trace_lock+0xfc/0x3b0 [ 724.199891][T12843] ? bpf_map_get_fd_by_id+0x310/0x310 [ 724.205314][T12843] ? perf_trace_lock+0xfc/0x3b0 [ 724.210223][T12843] ? trace_event_raw_event_lock+0x250/0x250 [ 724.216221][T12843] ? file_end_write+0x159/0x250 [ 724.221132][T12843] ? __might_fault+0xaa/0x120 [ 724.225860][T12843] ? __might_fault+0xc6/0x120 [ 724.230592][T12843] ? __might_fault+0xaa/0x120 [ 724.235319][T12843] ? bpf_lsm_bpf+0x9/0x10 [ 724.239716][T12843] ? security_bpf+0x7e/0xa0 [ 724.244288][T12843] __sys_bpf+0x7eb/0x890 [ 724.248584][T12843] ? bpf_link_show_fdinfo+0x390/0x390 [ 724.254024][T12843] ? lock_chain_count+0x20/0x20 [ 724.258952][T12843] __x64_sys_bpf+0x7c/0x90 [ 724.263426][T12843] do_syscall_64+0x55/0xa0 [ 724.267892][T12843] ? clear_bhb_loop+0x40/0x90 [ 724.272624][T12843] ? clear_bhb_loop+0x40/0x90 [ 724.277358][T12843] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 724.283316][T12843] RIP: 0033:0x7ff5dd79cdd9 [ 724.287782][T12843] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 724.307439][T12843] RSP: 002b:00007ff5de6a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 724.315909][T12843] RAX: ffffffffffffffda RBX: 00007ff5dda15fa0 RCX: 00007ff5dd79cdd9 [ 724.323927][T12843] RDX: 0000000000000010 RSI: 0000200000000a00 RDI: 000000000000000f [ 724.332032][T12843] RBP: 00007ff5de6a1090 R08: 0000000000000000 R09: 0000000000000000 [ 724.340053][T12843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 724.348072][T12843] R13: 00007ff5dda16038 R14: 00007ff5dda15fa0 R15: 00007ffcef21cc58 [ 724.356107][T12843] [ 724.396650][T12793] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 724.447494][T12793] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 724.635007][T12846] __nla_validate_parse: 4 callbacks suppressed [ 724.635031][T12846] netlink: 1047 bytes leftover after parsing attributes in process `syz.0.2332'. [ 724.687811][T12846] bridge_slave_1: default FDB implementation only supports local addresses [ 725.174511][T12841] netlink: 209852 bytes leftover after parsing attributes in process `syz.0.2332'. [ 725.336962][ T52] Bluetooth: hci4: command tx timeout [ 725.607801][T12852] netlink: 'syz.3.2334': attribute type 10 has an invalid length. [ 725.615721][T12852] team0: Device hsr_slave_0 is already a lower device of the team interface [ 726.276058][T12859] netlink: 65055 bytes leftover after parsing attributes in process `syz.2.2338'. [ 726.718784][ T5862] [ 726.721184][ T5862] ====================================================== [ 726.728233][ T5862] WARNING: possible circular locking dependency detected [ 726.735323][ T5862] syzkaller #0 Not tainted [ 726.739788][ T5862] ------------------------------------------------------ [ 726.746837][ T5862] kworker/u4:5/5862 is trying to acquire lock: [ 726.753112][ T5862] ffff88805f030d00 (team->team_lock_key#3){+.+.}-{3:3}, at: team_del_slave+0x32/0x1c0 [ 726.762777][ T5862] [ 726.762777][ T5862] but task is already holding lock: [ 726.770165][ T5862] ffff88805c9e0768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: ieee80211_remove_interfaces+0x29a/0x690 [ 726.780582][ T5862] [ 726.780582][ T5862] which lock already depends on the new lock. [ 726.780582][ T5862] [ 726.790998][ T5862] [ 726.790998][ T5862] the existing dependency chain (in reverse order) is: [ 726.800033][ T5862] [ 726.800033][ T5862] -> #1 (&rdev->wiphy.mtx){+.+.}-{3:3}: [ 726.807797][ T5862] __mutex_lock+0x136/0xcc0 [ 726.812862][ T5862] ieee80211_open+0x144/0x200 [ 726.818075][ T5862] __dev_open+0x2cb/0x430 [ 726.822960][ T5862] dev_open+0xab/0x190 [ 726.827593][ T5862] team_add_slave+0x75f/0x29a0 [ 726.832905][ T5862] do_setlink+0xdfe/0x4130 [ 726.837862][ T5862] rtnl_newlink+0x17da/0x20a0 [ 726.843073][ T5862] rtnetlink_rcv_msg+0x869/0xfa0 [ 726.848553][ T5862] netlink_rcv_skb+0x241/0x4d0 [ 726.853859][ T5862] netlink_unicast+0x751/0x8d0 [ 726.859172][ T5862] netlink_sendmsg+0x8d0/0xbf0 [ 726.864481][ T5862] ____sys_sendmsg+0x5ba/0x960 [ 726.869811][ T5862] ___sys_sendmsg+0x2a6/0x360 [ 726.875035][ T5862] __se_sys_sendmsg+0x1c2/0x2b0 [ 726.880437][ T5862] do_syscall_64+0x55/0xa0 [ 726.885393][ T5862] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 726.891826][ T5862] [ 726.891826][ T5862] -> #0 (team->team_lock_key#3){+.+.}-{3:3}: [ 726.900020][ T5862] __lock_acquire+0x2df1/0x7d40 [ 726.905411][ T5862] lock_acquire+0x19e/0x420 [ 726.910461][ T5862] __mutex_lock+0x136/0xcc0 [ 726.915510][ T5862] team_del_slave+0x32/0x1c0 [ 726.920646][ T5862] team_device_event+0x28d/0xa20 [ 726.926130][ T5862] notifier_call_chain+0x197/0x380 [ 726.931788][ T5862] unregister_netdevice_many_notify+0x100d/0x1900 [ 726.938748][ T5862] unregister_netdevice_queue+0x32c/0x370 [ 726.945006][ T5862] _cfg80211_unregister_wdev+0x16b/0x580 [ 726.951176][ T5862] ieee80211_remove_interfaces+0x49e/0x690 [ 726.957521][ T5862] ieee80211_unregister_hw+0x5d/0x2a0 [ 726.963520][ T5862] mac80211_hwsim_del_radio+0x289/0x480 [ 726.969609][ T5862] hwsim_exit_net+0x58d/0x650 [ 726.974848][ T5862] cleanup_net+0x70a/0xbb0 [ 726.979824][ T5862] process_scheduled_works+0xa5d/0x15d0 [ 726.985921][ T5862] worker_thread+0xa55/0xfc0 [ 726.991059][ T5862] kthread+0x2fa/0x390 [ 726.995669][ T5862] ret_from_fork+0x48/0x80 [ 727.000626][ T5862] ret_from_fork_asm+0x11/0x20 [ 727.005935][ T5862] [ 727.005935][ T5862] other info that might help us debug this: [ 727.005935][ T5862] [ 727.016174][ T5862] Possible unsafe locking scenario: [ 727.016174][ T5862] [ 727.023638][ T5862] CPU0 CPU1 [ 727.029016][ T5862] ---- ---- [ 727.034430][ T5862] lock(&rdev->wiphy.mtx); [ 727.038960][ T5862] lock(team->team_lock_key#3); [ 727.046442][ T5862] lock(&rdev->wiphy.mtx); [ 727.053485][ T5862] lock(team->team_lock_key#3); [ 727.058454][ T5862] [ 727.058454][ T5862] *** DEADLOCK *** [ 727.058454][ T5862] [ 727.066611][ T5862] 5 locks held by kworker/u4:5/5862: [ 727.071907][ T5862] #0: ffff88801a254938 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x96f/0x15d0 [ 727.082816][ T5862] #1: ffffc90004a8fd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x96f/0x15d0 [ 727.093371][ T5862] #2: ffffffff8e3b5ad0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x14c/0xbb0 [ 727.102875][ T5862] #3: ffffffff8e3c2b08 (rtnl_mutex){+.+.}-{3:3}, at: ieee80211_unregister_hw+0x55/0x2a0 [ 727.112742][ T5862] #4: ffff88805c9e0768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: ieee80211_remove_interfaces+0x29a/0x690 [ 727.123555][ T5862] [ 727.123555][ T5862] stack backtrace: [ 727.129462][ T5862] CPU: 1 PID: 5862 Comm: kworker/u4:5 Not tainted syzkaller #0 [ 727.137019][ T5862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 727.147104][ T5862] Workqueue: netns cleanup_net [ 727.151920][ T5862] Call Trace: [ 727.155231][ T5862] [ 727.158190][ T5862] dump_stack_lvl+0x18c/0x250 [ 727.162914][ T5862] ? load_image+0x420/0x420 [ 727.167454][ T5862] ? show_regs_print_info+0x20/0x20 [ 727.172686][ T5862] ? print_circular_bug+0x12b/0x1a0 [ 727.177910][ T5862] check_noncircular+0x2fc/0x400 [ 727.182872][ T5862] ? print_deadlock_bug+0x5d0/0x5d0 [ 727.188099][ T5862] ? lockdep_lock+0xf5/0x230 [ 727.192714][ T5862] ? _find_first_zero_bit+0xd3/0x100 [ 727.198028][ T5862] __lock_acquire+0x2df1/0x7d40 [ 727.202929][ T5862] ? verify_lock_unused+0x140/0x140 [ 727.208164][ T5862] ? verify_lock_unused+0x140/0x140 [ 727.213391][ T5862] lock_acquire+0x19e/0x420 [ 727.217915][ T5862] ? team_del_slave+0x32/0x1c0 [ 727.222717][ T5862] ? __might_sleep+0xe0/0xe0 [ 727.227330][ T5862] ? read_lock_is_recursive+0x20/0x20 [ 727.232754][ T5862] __mutex_lock+0x136/0xcc0 [ 727.237280][ T5862] ? team_del_slave+0x32/0x1c0 [ 727.242068][ T5862] ? __lock_acquire+0x7d40/0x7d40 [ 727.247110][ T5862] ? rcu_is_watching+0x15/0xb0 [ 727.251933][ T5862] ? trace_contention_end+0x39/0xe0 [ 727.257151][ T5862] ? __mutex_lock+0x315/0xcc0 [ 727.261841][ T5862] ? team_del_slave+0x32/0x1c0 [ 727.266633][ T5862] ? mutex_lock_nested+0x20/0x20 [ 727.271586][ T5862] ? bond_netdev_event+0xeb/0xf20 [ 727.276638][ T5862] ? __mutex_unlock_slowpath+0x1b4/0x6c0 [ 727.282297][ T5862] team_del_slave+0x32/0x1c0 [ 727.286919][ T5862] team_device_event+0x28d/0xa20 [ 727.291889][ T5862] notifier_call_chain+0x197/0x380 [ 727.297035][ T5862] unregister_netdevice_many_notify+0x100d/0x1900 [ 727.303484][ T5862] ? trace_event_raw_event_lock+0x250/0x250 [ 727.309674][ T5862] ? unregister_netdevice_many+0x20/0x20 [ 727.315327][ T5862] ? kernfs_remove_by_name_ns+0x117/0x150 [ 727.321076][ T5862] ? __lock_acquire+0x7d40/0x7d40 [ 727.326131][ T5862] unregister_netdevice_queue+0x32c/0x370 [ 727.331890][ T5862] ? list_netdevice+0x730/0x730 [ 727.336765][ T5862] ? kernfs_remove_by_name_ns+0x117/0x150 [ 727.342515][ T5862] _cfg80211_unregister_wdev+0x16b/0x580 [ 727.348178][ T5862] ieee80211_remove_interfaces+0x49e/0x690 [ 727.354008][ T5862] ? ieee80211_do_stop+0x1e20/0x1e20 [ 727.359320][ T5862] ? rcu_is_watching+0x15/0xb0 [ 727.364128][ T5862] ieee80211_unregister_hw+0x5d/0x2a0 [ 727.369550][ T5862] mac80211_hwsim_del_radio+0x289/0x480 [ 727.375120][ T5862] ? rhashtable_remove_fast+0xc00/0xc00 [ 727.380695][ T5862] hwsim_exit_net+0x58d/0x650 [ 727.385389][ T5862] ? hwsim_init_net+0x90/0x90 [ 727.390092][ T5862] ? __ip_vs_dev_cleanup_batch+0x238/0x250 [ 727.395912][ T5862] cleanup_net+0x70a/0xbb0 [ 727.400352][ T5862] ? ops_free_list+0x3b0/0x3b0 [ 727.405141][ T5862] ? _raw_spin_unlock_irq+0x23/0x50 [ 727.410367][ T5862] ? process_scheduled_works+0x96f/0x15d0 [ 727.416135][ T5862] ? process_scheduled_works+0x96f/0x15d0 [ 727.421896][ T5862] process_scheduled_works+0xa5d/0x15d0 [ 727.427492][ T5862] ? worker_attach_to_pool+0x380/0x380 [ 727.432999][ T5862] ? assign_work+0x3d2/0x5d0 [ 727.437624][ T5862] worker_thread+0xa55/0xfc0 [ 727.442269][ T5862] kthread+0x2fa/0x390 [ 727.446364][ T5862] ? pr_cont_work+0x560/0x560 [ 727.451070][ T5862] ? kthread_blkcg+0xd0/0xd0 [ 727.455680][ T5862] ret_from_fork+0x48/0x80 [ 727.460121][ T5862] ? kthread_blkcg+0xd0/0xd0 [ 727.464740][ T5862] ret_from_fork_asm+0x11/0x20 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 727.469539][ T5862] [ 727.506511][ T52] Bluetooth: hci4: command tx timeout [ 727.537516][ T5862] team0: Port device wlan1 removed [ 727.842568][ T5862] vlan0: left allmulticast mode [ 727.849351][ T5862] veth0_vlan: left allmulticast mode [ 727.854721][ T5862] vlan0: left promiscuous mode [ 727.886605][ T5862] À: port 1(vlan0) entered disabled state [ 727.959363][ T5862] hsr_slave_0: left promiscuous mode [ 728.018667][ T5862] veth1_vlan: left promiscuous mode [ 728.024106][ T5862] veth0_vlan: left promiscuous mode [ 728.428150][ T5862] team0 (unregistering): Port device geneve1 removed [ 728.700735][ T5862] team0 (unregistering): Port device team_slave_1 removed [ 728.739243][ T5862] team0 (unregistering): Port device team_slave_0 removed [ 729.425402][ T5862] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 729.510179][ T5862] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 729.590005][ T5862] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 729.647439][ T5862] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 730.111655][ T5862] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 730.197337][ T5862] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 730.253192][ T5862] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 730.331049][ T5862] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 730.465925][ T5862] tipc: Left network mode [ 730.488850][ T5862] tipc: Left network mode [ 731.166761][ T5862] team0: Port device wlan1 removed [ 732.840871][ T5862] team0: Port device wlan1 removed [ 734.424711][ T5862] hsr_slave_0: left promiscuous mode [ 734.435022][ T5862] hsr_slave_0: left promiscuous mode [ 734.441419][ T5862] hsr_slave_1: left promiscuous mode [ 734.453591][ T5862] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 734.461977][ T5862] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 734.470966][ T5862] bridge_slave_1: left allmulticast mode [ 734.476882][ T5862] bridge_slave_1: left promiscuous mode [ 734.482643][ T5862] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.492460][ T5862] bridge_slave_0: left allmulticast mode [ 734.498202][ T5862] bridge_slave_0: left promiscuous mode [ 734.503957][ T5862] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.520724][ T5862] hsr_slave_0: left promiscuous mode [ 734.528873][ T5862] .`: left allmulticast mode [ 734.533526][ T5862] bond_slave_0: left allmulticast mode [ 734.540615][ T5862] bond_slave_1: left allmulticast mode [ 734.548065][ T5862] bridge0: port 3(.`) entered disabled state [ 734.555813][ T5862] bridge_slave_1: left allmulticast mode [ 734.562685][ T5862] bridge_slave_1: left promiscuous mode [ 734.569440][ T5862] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.578471][ T5862] bridge_slave_0: left allmulticast mode [ 734.584171][ T5862] bridge_slave_0: left promiscuous mode [ 734.591011][ T5862] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.607789][ T5862] veth1_vlan: left promiscuous mode [ 734.802990][ T5862] team0 (unregistering): Port device geneve1 removed [ 734.839251][ T5862] team0 (unregistering): Port device hsr0 removed [ 734.906322][ T5862] team0 (unregistering): Port device team_slave_1 removed [ 734.933623][ T5862] team0 (unregistering): Port device team_slave_0 removed [ 734.965406][ T5862] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 734.992088][ T5862] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 735.088979][ T5862] bond0 (unregistering): Released all slaves [ 735.223205][ T5862] team0 (unregistering): Port device team_slave_1 removed [ 735.253726][ T5862] team0 (unregistering): Port device team_slave_0 removed [ 735.279939][ T5862] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 735.308520][ T5862] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 735.395400][ T5862] bond0 (unregistering): Released all slaves [ 735.489423][ T5862] team0 (unregistering): Port device geneve1 removed [ 735.574368][ T5862] team0 (unregistering): Port device hsr0 removed [ 735.650031][ T5862] team0 (unregistering): Port device team_slave_1 removed [ 735.679465][ T5862] team0 (unregistering): Port device team_slave_0 removed [ 735.705129][ T5862] .` (unregistering): (slave bond_slave_1): Releasing backup interface [ 735.715149][ T5862] bond_slave_1 (unregistering): left promiscuous mode [ 735.740891][ T5862] .` (unregistering): (slave bond_slave_0): Releasing backup interface [ 735.751674][ T5862] bond_slave_0 (unregistering): left promiscuous mode [ 735.867952][ T5862] team0 (unregistering): Port device bridge0 removed [ 735.894678][ T5862] .` (unregistering): Released all slaves