last executing test programs: 3m54.379877785s ago: executing program 2 (id=3): r0 = socket$kcm(0x10, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) socket$kcm(0x11, 0x200000000000002, 0x300) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x20) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x6b, 0xfd, 0x0, 0x0, 0x0, 0x1bee, 0xe021, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x2, 0x6593}, 0x4622, 0x1, 0x3, 0x4, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xd, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)=@rxrpc=@in4={0x21, 0x1, 0x2, 0xffffffffffffff7a, {0x2, 0x4e23, @multicast2}}, 0x80, 0x0}, 0x4004090) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)="d800000010008104685fa3aa7143a0f8c81ded0b25000000e8fe09a118001500060014ea000000120800030043000040a8002b000a0003", 0x37}], 0x1}, 0x20000880) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfe33) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1200000005000000040000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000080000000000000"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r6}, &(0x7f0000000040), &(0x7f0000000140)=r5}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r6, &(0x7f0000000040)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r1, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0xf4240, &(0x7f00000009c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10001}, {}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) recvmsg$kcm(r0, &(0x7f00000006c0)={&(0x7f0000000080)=@alg, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/252, 0xfc}, {&(0x7f0000000100)=""/147, 0x93}, {&(0x7f0000000300)=""/71, 0x47}, {&(0x7f0000000000)=""/51, 0x33}, {&(0x7f0000000380)=""/32, 0x20}, {0x0}, {&(0x7f0000000480)=""/133, 0x85}, {&(0x7f0000001380)=""/4096, 0x1000}], 0x8, &(0x7f00000005c0)=""/251, 0xfb}, 0x10000) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1800000066006bcd843fe3dc6e000000008c000000007280", 0x18}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 3m53.257103507s ago: executing program 2 (id=8): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a000000800000"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 3m53.038224489s ago: executing program 2 (id=9): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000280)}], 0x2}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000002"], 0x0}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3b) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x549800, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x10, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="b40000000000000079104800000000007100000c0000000095007400000000000389c0dc1b1e8fcc938d01cf519bb9961bd83651f709c94ff5ae1b8970b266a297034656858dc13d3dc6e7203903445d797181deb467614fe3"], &(0x7f0000003ff6)='GPL\x00', 0x8, 0xc3, &(0x7f0000000400)=""/198, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffff52}, 0x37) r0 = getpid() perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x2, 0x3cd, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, r0, 0x0, 0xffffffffffffffff, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ffffffff8500000004000000850000000e00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='afs_reload_dir\x00', r1}, 0x18) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f8480d0000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x8010743f, 0xf0ff1f00000000) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'team0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) 3m51.803107433s ago: executing program 1 (id=13): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) 3m51.549572318s ago: executing program 1 (id=14): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000090000002f4900000500000041000000", @ANYRES32=0x1, @ANYBLOB="fc15ffff000000000000000000000000000000de", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000140)="600000002e000d190a762d7f089e", 0xfca2}, {&(0x7f0000000280)="68cabf2dfb58fc0a1d6b689866f05d490d010088a8ffff0200258f2e4409b8f9e6aaeb88bea123dc2c6726e89b1ae2f6e8bcb5ee52dcd7298d39093c510293bca0b646a3ce904f6e6b788b3204c233e60ddc", 0x52}], 0x2}, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003d000b08d25a80648c7494f90224fc60580002400c000400030082c137153e3719ac018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'syzkaller0\x00', 0x20}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7c00000000000000000000000700000044140001ac1414aa00000000ac1414000000000000441c0003e0000001000000007f000001000000000000000000000000442c", @ANYRESHEX=r3, @ANYBLOB="f4a5b2feabfbcae2098d2058efa98d30a7d76e087dbf036b13f1d04d754e8b3bd86eb202570f63b1af455378632ce0f9c1e609e38734174ecbd47c096e69bdcaceb5a0b0579079df622f1b219bd44c1cba080d5ae226a80580206cfef78b54cbf4b96abcdbd6a99010aadc0e4d55a3015205a1a9fe23211764fead0d24f93917706d45ca29f2a82ec7f3e6e9ffacc284f50c6896b33d0a", @ANYRES8=r3], 0x230}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r7 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000080)="48000000140081fb7092012ba659ae08060c040002ff0f03900000000000000000006fabca3b4e7d06a6bd7c00000000030000068a562ad6e74703c48f93bc2a02000000461eb886", 0x48}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r6, &(0x7f0000000740)=ANY=[@ANYBLOB="1e0308004d8c71ef2885634a8270e7"], 0xffdd) ioctl$TUNSETOFFLOAD(r3, 0x400454cc, 0x1c) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000bc0), 0x4) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'pim6reg0\x00', 0x2}) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{}], 0x1}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x4, [@volatile={0xf, 0x0, 0x0, 0x9, 0x1}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x29, 0x0, 0x1f, 0x1}, @restrict={0x8, 0x0, 0x0, 0xb, 0x4}, @decl_tag={0x7, 0x0, 0x0, 0x11, 0x2}, @struct={0xe, 0x5, 0x0, 0x4, 0x0, 0x7ff, [{0x1, 0x0, 0x8}, {0xa, 0x5, 0x3}, {0x5, 0x3, 0x3}, {0xc, 0x4, 0x1}, {0x3, 0x5, 0x7}]}, @ptr={0x6, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000940)=""/224, 0xb4, 0xe0, 0x1, 0x8, 0x10000}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x2, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x12, 0x0, &(0x7f0000000a40), 0x0, 0xb, 0x0, &(0x7f0000000400), 0x41000, 0x10, '\x00', 0x0, @cgroup_sock_addr=0x32, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x9, 0x2, 0x1}, 0x10, r12, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000c40), 0x10, 0xc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xe, 0xd, &(0x7f0000000480)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], &(0x7f00000002c0)='syzkaller\x00', 0xa, 0xa8, &(0x7f0000000500)=""/168, 0x41100, 0x4c, '\x00', r10, @sk_skb=0x4, r11, 0x8, &(0x7f0000000700)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0xe, 0x2, 0x56}, 0x10, r12, r0, 0x5, 0x0, &(0x7f0000000a40)=[{0x1, 0x3, 0x4, 0x7}, {0x0, 0x5, 0x9, 0x1}, {0x4, 0x2, 0xd, 0x3}, {0x0, 0x3, 0x5, 0x7}, {0x0, 0x5, 0xf, 0x2}], 0x10, 0x80000000}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)=@generic={&(0x7f00000001c0)='./file0\x00', r0}, 0x18) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000140), 0xca, r1}, 0x38) 3m50.686586014s ago: executing program 0 (id=16): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="85000000070000006a0a00ff000000000c00000000000000950000000000000018100000", @ANYRES32=r0, @ANYRES8=r1], &(0x7f0000000140)='GPL\x00', 0x2, 0x95, &(0x7f0000000180)=""/149, 0x41100, 0x0, '\x00', 0x0, @flow_dissector}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)={@ifindex, r3, 0x11, 0x0, 0x0, @void, @value=r2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x9, 0x7, 0x7, 0x10010, r2, 0xa6b, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5, 0x2}, 0x50) r4 = socket$kcm(0x2, 0x3, 0x84) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18020000040000000000000000000000850000002c000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000380)="b9ff0300600d698cff9e14f086dd", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f00000001c0)="2e00000010008188040f46ecdb4cb9cca7480ef40f000000e3bd6efb010509000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000001000)={r6, r3}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x12, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@map_fd={0x18, 0x1, 0x1, 0x0, r8}, @call={0x85, 0x0, 0x0, 0x75}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xed41d0969ec4053c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000000000070100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r10}, 0x10) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 3m49.747870918s ago: executing program 0 (id=18): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x40000000001, 0xffffffffffffffff, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/32], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x100) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x86bf2056334f3ae6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000300)='syzkaller\x00'}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x1f, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0x75}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x34}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x1) socket$kcm(0x2, 0x1, 0x84) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'bond0\x00'}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f0000000500)=r4, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='qgroup_update_reserve\x00', r4, 0x0, 0x7}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000000980)=[0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x1e, &(0x7f0000000a00)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x9e, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x18, 0x2, &(0x7f0000000a00)=@raw=[@call={0x85, 0x0, 0x0, 0x31}, @jmp={0x5, 0x0, 0xc, 0x7, 0x9, 0x2, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x2, 0x47, &(0x7f0000000a80)=""/71, 0x0, 0x10, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x8, &(0x7f0000000b00)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, r7, r1, 0x3, &(0x7f0000000bc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000c00)=[{0x1, 0x2, 0x9, 0xc}, {0x4, 0x5, 0x8, 0xb}, {0x1, 0x4, 0x3, 0x9}], 0x10, 0x3}, 0x94) r8 = socket$kcm(0x21, 0x2, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaf, &(0x7f0000000600)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0xec, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) sendmsg$kcm(r8, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0xfffc, 0x2, 0x1c, {0xa, 0xfffc, 0x4, @dev, 0xf5}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0xfc00) 3m49.72956784s ago: executing program 1 (id=19): socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20200, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xf, 0x5}, 0x100e64, 0x3, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0xa, 0x3, 0x87) r0 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3504000041000511d25a80648c63940d0324fc60040035400c0002000200002037153e", 0x23}], 0x1}, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="934300006d"], 0xfe33) socket$kcm(0xa, 0x1, 0x106) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socket$kcm(0x10, 0x2, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socket$kcm(0x2, 0x200000000000001, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000030000000400010005"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000008000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000002d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r2}, 0x10) socket$kcm(0xa, 0x2, 0x73) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000380)='rxrpc_call\x00'}, 0x10) r3 = socket$kcm(0x21, 0x2, 0xa) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0xfffc, 0x2, 0x1c, {0xa, 0x4e24, 0x4, @loopback}}, 0x80, 0x0, 0x0, &(0x7f00000001c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0xfc00) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socket$kcm(0x10, 0x2, 0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netdevsim0\x00'}) 3m49.110458582s ago: executing program 0 (id=21): socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20200, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xf, 0x5}, 0x100e64, 0x3, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0xa, 0x3, 0x87) r0 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3504000041000511d25a80648c63940d0324fc60040035400c0002000200002037153e", 0x23}], 0x1}, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="934300006d"], 0xfe33) socket$kcm(0xa, 0x1, 0x106) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000030000000400010005"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000008000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000002d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r2}, 0x10) socket$kcm(0x10, 0x2, 0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 3m41.227132621s ago: executing program 1 (id=22): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) 3m41.153597608s ago: executing program 0 (id=23): r0 = socket$kcm(0x10, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x18}, 0x18) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) socket$kcm(0x11, 0x200000000000002, 0x300) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x20) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x6b, 0xfd, 0x0, 0x0, 0x0, 0x1bee, 0xe021, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x2, 0x6593}, 0x4622, 0x1, 0x3, 0x4, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xd, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)=@rxrpc=@in4={0x21, 0x1, 0x2, 0xffffffffffffff7a, {0x2, 0x4e23, @multicast2}}, 0x80, 0x0}, 0x4004090) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)="d800000010008104685fa3aa7143a0f8c81ded0b25000000e8fe09a118001500060014ea000000120800030043000040a8002b000a0003", 0x37}], 0x1}, 0x20000880) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfe33) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1200000005000000040000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000080000000000000"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r6}, &(0x7f0000000040), &(0x7f0000000140)=r5}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r6, &(0x7f0000000040)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r1, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0xf4240, &(0x7f00000009c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10001}, {}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) recvmsg$kcm(r0, &(0x7f00000006c0)={&(0x7f0000000080)=@alg, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/252, 0xfc}, {&(0x7f0000000100)=""/147, 0x93}, {&(0x7f0000000300)=""/71, 0x47}, {&(0x7f0000000000)=""/51, 0x33}, {&(0x7f0000000380)=""/32, 0x20}, {0x0}, {&(0x7f0000000480)=""/133, 0x85}, {&(0x7f0000001380)=""/4096, 0x1000}], 0x8, &(0x7f00000005c0)=""/251, 0xfb}, 0x10000) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1800000066006bcd843fe3dc6e000000008c000000007280", 0x18}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 3m41.121729181s ago: executing program 3 (id=24): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xd, 0x1, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x103e40, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x5, 0x4, &(0x7f0000000d80)=ANY=[@ANYBLOB="18080000000600000000000000000000850000000500000095"], &(0x7f0000000c80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 3m41.111052533s ago: executing program 1 (id=25): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[], 0x50) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r5, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'syzkaller0\x00', 0x20}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7c00000000000000000000000700000044140001ac1414aa00000000ac1414000000000000441c0003e0000001000000007f000001000000000000000000000000442c", @ANYRESHEX=r3, @ANYBLOB="f4a5b2feabfbcae2098d2058efa98d30a7d76e087dbf036b13f1d04d754e8b3bd86eb202570f63b1af455378632ce0f9c1e609e38734174ecbd47c096e69bdcaceb5a0b0579079df622f1b219bd44c1cba080d5ae226a80580206cfef78b54cbf4b96abcdbd6a99010aadc0e4d55a3015205a1a9fe23211764fead0d24f93917706d45ca29f2a82ec7f3e6e9ffacc284f50c6896b33d0a", @ANYRES8=r3], 0x230}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r7 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000080)="48000000140081fb7092012ba659ae08060c040002ff0f03900000000000000000006fabca3b4e7d06a6bd7c00000000030000068a562ad6e74703c48f93bc2a02000000461eb886", 0x48}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r6, &(0x7f0000000740)=ANY=[@ANYBLOB="1e0308004d8c71ef2885634a8270e7"], 0xffdd) ioctl$TUNSETOFFLOAD(r3, 0x400454cc, 0x1c) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000bc0), 0x4) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'pim6reg0\x00', 0x2}) sendmsg$kcm(r2, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x4, [@volatile={0xf, 0x0, 0x0, 0x9, 0x1}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x29, 0x0, 0x1f, 0x1}, @restrict={0x8, 0x0, 0x0, 0xb, 0x4}, @decl_tag={0x7, 0x0, 0x0, 0x11, 0x2}, @struct={0xe, 0x5, 0x0, 0x4, 0x0, 0x7ff, [{0x1, 0x0, 0x8}, {0xa, 0x5, 0x3}, {0x5, 0x3, 0x3}, {0xc, 0x4, 0x1}, {0x3, 0x5, 0x7}]}, @ptr={0x6, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000940)=""/224, 0xb4, 0xe0, 0x1, 0x8, 0x10000}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x2, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x12, 0x0, &(0x7f0000000a40), 0x0, 0xb, 0x0, &(0x7f0000000400), 0x41000, 0x10, '\x00', 0x0, @cgroup_sock_addr=0x32, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x9, 0x2, 0x1}, 0x10, r12, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000c40), 0x10, 0xc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xe, 0xd, &(0x7f0000000480)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], &(0x7f00000002c0)='syzkaller\x00', 0xa, 0xa8, &(0x7f0000000500)=""/168, 0x41100, 0x4c, '\x00', r10, @sk_skb=0x4, r11, 0x8, &(0x7f0000000700)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0xe, 0x2, 0x56}, 0x10, r12, r0, 0x5, 0x0, &(0x7f0000000a40)=[{0x1, 0x3, 0x4, 0x7}, {0x0, 0x5, 0x9, 0x1}, {0x4, 0x2, 0xd, 0x3}, {0x0, 0x3, 0x5, 0x7}, {0x0, 0x5, 0xf, 0x2}], 0x10, 0x80000000}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)=@generic={&(0x7f00000001c0)='./file0\x00', r0}, 0x18) 3m40.645702929s ago: executing program 3 (id=26): socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20200, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xf, 0x5}, 0x100e64, 0x3, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0xa, 0x3, 0x87) r0 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3504000041000511d25a80648c63940d0324fc60040035400c0002000200002037153e", 0x23}], 0x1}, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="934300006d"], 0xfe33) socket$kcm(0xa, 0x1, 0x106) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x21, 0x2, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socket$kcm(0x2, 0x200000000000001, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000030000000400010005"], 0x50) close(0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000008000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000002d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r2}, 0x10) socket$kcm(0xa, 0x2, 0x73) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000380)='rxrpc_call\x00'}, 0x10) r3 = socket$kcm(0x21, 0x2, 0xa) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0xfffc, 0x2, 0x1c, {0xa, 0x4e24, 0x4, @loopback}}, 0x80, 0x0, 0x0, &(0x7f00000001c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0xfc00) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socket$kcm(0x10, 0x2, 0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netdevsim0\x00'}) 3m40.107779083s ago: executing program 2 (id=27): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="85000000070000006a0a00ff000000000c00000000000000950000000000000018100000", @ANYRES32=r0, @ANYRES8=r1], &(0x7f0000000140)='GPL\x00', 0x2, 0x95, &(0x7f0000000180)=""/149, 0x41100, 0x0, '\x00', 0x0, @flow_dissector}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)={@ifindex, r3, 0x11, 0x0, 0x0, @void, @value=r2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x9, 0x7, 0x7, 0x10010, r2, 0xa6b, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5, 0x2}, 0x50) r4 = socket$kcm(0x2, 0x3, 0x84) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18020000040000000000000000000000850000002c000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000380)="b9ff0300600d698cff9e14f086dd", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f00000001c0)="2e00000010008188040f46ecdb4cb9cca7480ef40f000000e3bd6efb010509000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000001000)={r6, r3}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x12, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@map_fd={0x18, 0x1, 0x1, 0x0, r8}, @call={0x85, 0x0, 0x0, 0x75}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xed41d0969ec4053c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000000000070100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r10}, 0x10) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 3m40.020274771s ago: executing program 0 (id=28): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000090000002f4900000500000041000000", @ANYRES32=0x1, @ANYBLOB="fc15ffff000000000000000000000000000000de", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000140)="600000002e000d190a762d7f089e", 0xfca2}, {&(0x7f0000000280)="68cabf2dfb58fc0a1d6b689866f05d490d010088a8ffff0200258f2e4409b8f9e6aaeb88bea123dc2c6726e89b1ae2f6e8bcb5ee52dcd7298d39093c510293bca0b646a3ce904f6e6b788b3204c233e60ddc", 0x52}], 0x2}, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003d000b08d25a80648c7494f90224fc60580002400c000400030082c137153e3719ac018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'syzkaller0\x00', 0x20}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7c00000000000000000000000700000044140001ac1414aa00000000ac1414000000000000441c0003e0000001000000007f000001000000000000000000000000442c", @ANYRESHEX=r3, @ANYBLOB="f4a5b2feabfbcae2098d2058efa98d30a7d76e087dbf036b13f1d04d754e8b3bd86eb202570f63b1af455378632ce0f9c1e609e38734174ecbd47c096e69bdcaceb5a0b0579079df622f1b219bd44c1cba080d5ae226a80580206cfef78b54cbf4b96abcdbd6a99010aadc0e4d55a3015205a1a9fe23211764fead0d24f93917706d45ca29f2a82ec7f3e6e9ffacc284f50c6896b33d0a", @ANYRES8=r3], 0x230}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r7 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000080)="48000000140081fb7092012ba659ae08060c040002ff0f03900000000000000000006fabca3b4e7d06a6bd7c00000000030000068a562ad6e74703c48f93bc2a02000000461eb886", 0x48}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r6, &(0x7f0000000740)=ANY=[@ANYBLOB="1e0308004d8c71ef2885634a8270e7"], 0xffdd) ioctl$TUNSETOFFLOAD(r3, 0x400454cc, 0x1c) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000bc0), 0x4) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'pim6reg0\x00', 0x2}) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000064008188040f80ec59acbc0413a1f848290000", 0x17}], 0x1}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x4, [@volatile={0xf, 0x0, 0x0, 0x9, 0x1}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x29, 0x0, 0x1f, 0x1}, @restrict={0x8, 0x0, 0x0, 0xb, 0x4}, @decl_tag={0x7, 0x0, 0x0, 0x11, 0x2}, @struct={0xe, 0x5, 0x0, 0x4, 0x0, 0x7ff, [{0x1, 0x0, 0x8}, {0xa, 0x5, 0x3}, {0x5, 0x3, 0x3}, {0xc, 0x4, 0x1}, {0x3, 0x5, 0x7}]}, @ptr={0x6, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000940)=""/224, 0xb4, 0xe0, 0x1, 0x8, 0x10000}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x2, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x12, 0x0, &(0x7f0000000a40), 0x0, 0xb, 0x0, &(0x7f0000000400), 0x41000, 0x10, '\x00', 0x0, @cgroup_sock_addr=0x32, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x9, 0x2, 0x1}, 0x10, r12, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000c40), 0x10, 0xc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xe, 0xd, &(0x7f0000000480)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], &(0x7f00000002c0)='syzkaller\x00', 0xa, 0xa8, &(0x7f0000000500)=""/168, 0x41100, 0x4c, '\x00', r10, @sk_skb=0x4, r11, 0x8, &(0x7f0000000700)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0xe, 0x2, 0x56}, 0x10, r12, r0, 0x5, 0x0, &(0x7f0000000a40)=[{0x1, 0x3, 0x4, 0x7}, {0x0, 0x5, 0x9, 0x1}, {0x4, 0x2, 0xd, 0x3}, {0x0, 0x3, 0x5, 0x7}, {0x0, 0x5, 0xf, 0x2}], 0x10, 0x80000000}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)=@generic={&(0x7f00000001c0)='./file0\x00', r0}, 0x18) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000140), 0xca, r1}, 0x38) 3m39.978759176s ago: executing program 3 (id=29): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a000000800000"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 3m39.864196217s ago: executing program 3 (id=30): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x40000000001, 0xffffffffffffffff, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/32], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x100) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x86bf2056334f3ae6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x1f, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0x75}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x34}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x1) socket$kcm(0x2, 0x1, 0x84) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'bond0\x00'}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f0000000500)=r4, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='qgroup_update_reserve\x00', r4, 0x0, 0x7}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000000980)=[0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x1e, &(0x7f0000000a00)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x9e, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x18, 0x2, &(0x7f0000000a00)=@raw=[@call={0x85, 0x0, 0x0, 0x31}, @jmp={0x5, 0x0, 0xc, 0x7, 0x9, 0x2, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x2, 0x47, &(0x7f0000000a80)=""/71, 0x0, 0x10, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x8, &(0x7f0000000b00)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, r7, r1, 0x3, &(0x7f0000000bc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000c00)=[{0x1, 0x2, 0x9, 0xc}, {0x4, 0x5, 0x8, 0xb}, {0x1, 0x4, 0x3, 0x9}], 0x10, 0x3}, 0x94) r8 = socket$kcm(0x21, 0x2, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaf, &(0x7f0000000600)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0xec, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) sendmsg$kcm(r8, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0xfffc, 0x2, 0x1c, {0xa, 0xfffc, 0x4, @dev, 0xf5}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0xfc00) 3m38.400813253s ago: executing program 2 (id=31): socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20200, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xf, 0x5}, 0x100e64, 0x3, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0xa, 0x3, 0x87) r0 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3504000041000511d25a80648c63940d0324fc60040035400c0002000200002037153e", 0x23}], 0x1}, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="934300006d"], 0xfe33) socket$kcm(0xa, 0x1, 0x106) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socket$kcm(0x10, 0x2, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socket$kcm(0x2, 0x200000000000001, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000030000000400010005"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000008000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000002d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r2}, 0x10) socket$kcm(0xa, 0x2, 0x73) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000380)='rxrpc_call\x00'}, 0x10) r3 = socket$kcm(0x21, 0x2, 0xa) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0xfffc, 0x2, 0x1c, {0xa, 0x4e24, 0x4, @loopback}}, 0x80, 0x0, 0x0, &(0x7f00000001c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0xfc00) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socket$kcm(0x10, 0x2, 0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netdevsim0\x00'}) 3m38.317361522s ago: executing program 1 (id=32): socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20200, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xf, 0x5}, 0x100e64, 0x3, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0xa, 0x3, 0x87) r0 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3504000041000511d25a80648c63940d0324fc60040035400c0002000200002037153e", 0x23}], 0x1}, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="934300006d"], 0xfe33) socket$kcm(0xa, 0x1, 0x106) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000030000000400010005"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000008000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000002d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r2}, 0x10) socket$kcm(0x10, 0x2, 0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 3m38.243008639s ago: executing program 3 (id=33): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) 3m38.144838619s ago: executing program 0 (id=34): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xd, 0x1, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x103e40, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x5, 0x4, &(0x7f0000000d80)=ANY=[@ANYBLOB="18080000000600000000000000000000850000000500000095"], &(0x7f0000000c80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 3m37.989642935s ago: executing program 3 (id=35): socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={&(0x7f00000001c0), 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, r0, 0xa) socketpair(0x1, 0x1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.cpu_exclusive\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0x9, 0x12) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x10}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f0, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="0000000000000080000000000000000020000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x10, 0x1c, &(0x7f0000000300)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9, 0xfe00}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x6, 0x1, 0xb, 0x8, 0x9}, {0x4, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x8, 0x2, 0x0, r6}, {}, {0x46, 0x0, 0x0, 0x76}}], {{}, {0x6, 0x0, 0x7, 0x8}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000980)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @sk_msg, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[], 0x0, 0x46, 0x0, 0x6}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r9 = socket$kcm(0xa, 0x6, 0x0) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000000800000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) setsockopt$sock_attach_bpf(r9, 0x10d, 0xa, &(0x7f0000000000)=r10, 0x11) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x11, 0x20, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa271, 0x0, 0x0, 0x0, 0xe}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@ringbuf_query, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0xa, 0x2, 0x0, r7}, @tail_call, @ringbuf_query], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000006c0)='GPL\x00', 0x9, 0x89, &(0x7f0000000700)=""/137, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x15, r8, 0x8, &(0x7f00000008c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000900)={0x4, 0xb, 0x1, 0x8533}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000d00)=[0xffffffffffffffff], 0x0, 0x10, 0xa551b3a}, 0x94) 2m54.293011994s ago: executing program 32 (id=34): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xd, 0x1, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x103e40, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x5, 0x4, &(0x7f0000000d80)=ANY=[@ANYBLOB="18080000000600000000000000000000850000000500000095"], &(0x7f0000000c80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2m39.728538007s ago: executing program 33 (id=32): socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20200, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xf, 0x5}, 0x100e64, 0x3, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0xa, 0x3, 0x87) r0 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3504000041000511d25a80648c63940d0324fc60040035400c0002000200002037153e", 0x23}], 0x1}, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="934300006d"], 0xfe33) socket$kcm(0xa, 0x1, 0x106) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000030000000400010005"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000008000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000002d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r2}, 0x10) socket$kcm(0x10, 0x2, 0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 2m39.49192184s ago: executing program 34 (id=31): socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20200, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xf, 0x5}, 0x100e64, 0x3, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0xa, 0x3, 0x87) r0 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="3504000041000511d25a80648c63940d0324fc60040035400c0002000200002037153e", 0x23}], 0x1}, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="934300006d"], 0xfe33) socket$kcm(0xa, 0x1, 0x106) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socket$kcm(0x10, 0x2, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socket$kcm(0x2, 0x200000000000001, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000030000000400010005"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000008000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000002d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r2}, 0x10) socket$kcm(0xa, 0x2, 0x73) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000380)='rxrpc_call\x00'}, 0x10) r3 = socket$kcm(0x21, 0x2, 0xa) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0xfffc, 0x2, 0x1c, {0xa, 0x4e24, 0x4, @loopback}}, 0x80, 0x0, 0x0, &(0x7f00000001c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0xfc00) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socket$kcm(0x10, 0x2, 0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netdevsim0\x00'}) 2m39.402781429s ago: executing program 35 (id=35): socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={&(0x7f00000001c0), 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, r0, 0xa) socketpair(0x1, 0x1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.cpu_exclusive\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0x9, 0x12) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x10}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f0, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="0000000000000080000000000000000020000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x10, 0x1c, &(0x7f0000000300)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9, 0xfe00}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x6, 0x1, 0xb, 0x8, 0x9}, {0x4, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x8, 0x2, 0x0, r6}, {}, {0x46, 0x0, 0x0, 0x76}}], {{}, {0x6, 0x0, 0x7, 0x8}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000980)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @sk_msg, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[], 0x0, 0x46, 0x0, 0x6}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r9 = socket$kcm(0xa, 0x6, 0x0) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000000800000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) setsockopt$sock_attach_bpf(r9, 0x10d, 0xa, &(0x7f0000000000)=r10, 0x11) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x11, 0x20, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa271, 0x0, 0x0, 0x0, 0xe}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@ringbuf_query, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0xa, 0x2, 0x0, r7}, @tail_call, @ringbuf_query], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000006c0)='GPL\x00', 0x9, 0x89, &(0x7f0000000700)=""/137, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x15, r8, 0x8, &(0x7f00000008c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000900)={0x4, 0xb, 0x1, 0x8533}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000d00)=[0xffffffffffffffff], 0x0, 0x10, 0xa551b3a}, 0x94) 2m11.904446112s ago: executing program 6 (id=63): openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x3, 0x0, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x4240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd3c0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x200000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000280)="45b1e6fb889e2cb74ca0c95dbb9353a95d50f683af805d5e8113ee22b32b47ee2650793acb82717498e87ddb721288f7a3fbd01d0398869c9eaa4046ee97dcf236d87f2768015521954504d3f24626c614f69c5ba1186da1f4e816bdd675b7ae39dfa3eb60b59aa3b987823298d2805285f492d139baee42abc377198e0923e3aa30e1c4711645bed78f2e9f3d7757a10d619dbee8e1d4e0701d23d92a147584adb42b55360c50fc7fb3965f6549c6d75e2e41be075f33dfefbd26e30235b61a90dbf5f178df1a856df56ae104be10204e41a54acb41aacae203839778c1b72ac725935699e9ef502ead20fdc928bff78a5ead577808"}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="000095001000000000000000800000000000000000000000e6e80fc536ca6a2c582ed7b507ef28efe0fc7b639324c7843a2301eca00d3d804a1cf953a205c34ececc5803419b7e08052463e5164ca806c2e93c1bd83df1fe6ecf9b77e1c3217020ce8d7fce21fbd877d6eb3731a8baaef337a3b921a49f693dea1e66ed96095644b803fcb6c8d5b451c3597e881d636a09a4e34bcfdf14f433808d9f5c681de3bbc359cc9c466b8e759d3ab1c5caf1d3606cdee28479a148ae047b9f10d475b3cefdcf54"], &(0x7f0000000480)='GPL\x00'}, 0x80) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x20702, 0x0) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x40}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0x200}) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180000002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000004c0)={r3, 0x3, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x44) r4 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r4, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r4, &(0x7f0000000040)={&(0x7f0000000280)=@caif=@dgm={0x25, 0x9, 0xc}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000500)="62042700ffff002f1eafbcf706e12b30087f5c582d26116642c47a5f0400ee601e65abbc06d4b8bf4a81cb3e247345af21", 0x31}], 0x1}, 0x24008000) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000229efb9c0db78c8589fe2623000000009319469d8708c61e77d446f46b627fe22175b554381f2d886382e4f9056f5c320ad7636b5178bd80e04334605f9f9382a9c531522376cdbf654d679e7a9f3fff71fe7289e202efa845cf2ada92a1cb086b920cb3abf169fb9c"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r9}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x80000, 0xca, 0x0, 0x0, 0x400000000000, 0x400000, 0x0, 0x0, 0xe, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r6, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x1c0) write$cgroup_subtree(r10, &(0x7f0000000180)=ANY=[@ANYRES8=r7, @ANYRES64=r8], 0x9a) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) 2m11.160243726s ago: executing program 6 (id=65): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000280)}], 0x2}, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000002"], 0x0}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3b) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000000c0)=r0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x10, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="b40000000000000079104800000000007100000c0000000095007400000000000389c0dc1b1e8fcc938d01cf519bb9961bd83651f709c94ff5ae1b8970b266a297034656858dc13d3dc6e7203903445d797181deb467614fe3"], &(0x7f0000003ff6)='GPL\x00', 0x8, 0xc3, &(0x7f0000000400)=""/198, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffff52}, 0x37) r1 = getpid() perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x2, 0x3cd, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, r1, 0x0, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ffffffff8500000004000000850000000e00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='afs_reload_dir\x00', r2}, 0x18) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f8480d0000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x8010743f, 0xf0ff1f00000000) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'team0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) 2m6.380401673s ago: executing program 6 (id=81): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = syz_clone(0x0, 0x0, 0x1c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000002b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x0, 0x4, 0x98, 0x4, 0x4e53, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) r3 = socket$kcm(0x10, 0x2, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002400)={&(0x7f0000000340)=ANY=[], 0x0, 0x56}, 0x28) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x106) syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') r4 = socket$kcm(0xa, 0x2, 0x0) close(r4) r5 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r5, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x0, @local, 0x3}, 0x80, &(0x7f00000029c0)=[{&(0x7f00000016c0)="83", 0x1}], 0x1}, 0x41) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, @perf_bp={0x0}, 0x1000, 0x8, 0x0, 0x8, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) r7 = socket$kcm(0x25, 0x1, 0x0) recvmsg(r7, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0xc0) sendmsg$kcm(r5, &(0x7f00000001c0)={&(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x4, @local, 0x3, 0x4}, 0x80, &(0x7f0000000100)=[{0x0, 0x21}], 0x1}, 0x4804) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}, {}, {}, {0x7, 0x0, 0xb, 0x7}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(r3, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x10090) r9 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r9, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1}}}], 0x20}, 0x200040c4) 2m4.60567268s ago: executing program 6 (id=76): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x4c, &(0x7f0000000000), 0x4) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000), 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x8, &(0x7f0000000100)=@framed={{0x18, 0x3}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {0x5}}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x90) sendmsg$unix(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYRES32], 0x18, 0x4c800}, 0x0) r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0xf}, 0x90208, 0x0, 0x310c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000100081044e81f782db44b904021d080307000000e8", 0x19}], 0x1, 0x0, 0x0, 0x7400}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001ec0)=ANY=[@ANYBLOB="13120000120091ef04e9befbbd00005c0a"], 0xfe33) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x42) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) r5 = socket$kcm(0x29, 0x2, 0x0) close(r5) r6 = socket$kcm(0x2b, 0x1, 0x0) close(r6) r7 = socket$kcm(0x2, 0x0, 0x106) sendmsg$inet(r7, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0x10, 0x0}, 0x30004040) setsockopt$sock_attach_bpf(r5, 0x1, 0xd, &(0x7f0000000080), 0x2cb) close(r6) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) close(r8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$SIOCSIFHWADDR(r8, 0x8b19, &(0x7f0000000000)={'wlan0\x00', @random="7cf1e97c9e4f"}) r9 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r9, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="80", 0x1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000840000000000000001"], 0x18}, 0x41) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/112, 0x70}, 0x42) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={0xffffffffffffffff}, 0x4) 2m3.828894598s ago: executing program 6 (id=77): socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={&(0x7f00000001c0), 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, r0, 0xa) socketpair(0x1, 0x1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.cpu_exclusive\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0x9, 0x12) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x10}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f0, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="0000000000000080000000000000000020000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x10, 0x1c, &(0x7f0000000300)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9, 0xfe00}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x6, 0x1, 0xb, 0x8, 0x9}, {0x4, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x8, 0x2, 0x0, r6}, {}, {0x46, 0x0, 0x0, 0x76}}], {{}, {0x6, 0x0, 0x7, 0x8}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000980)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @sk_msg, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[], 0x0, 0x46, 0x0, 0x6}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) r10 = socket$kcm(0xa, 0x6, 0x0) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000000800000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) setsockopt$sock_attach_bpf(r10, 0x10d, 0xa, &(0x7f0000000000)=r11, 0x11) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c40)={r8, 0xe0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x6d, &(0x7f0000000a40)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a80), &(0x7f0000000ac0), 0x8, 0xa7, 0x8, 0x8, &(0x7f0000000b00)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x11, 0x20, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa271, 0x0, 0x0, 0x0, 0xe}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@ringbuf_query, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0xa, 0x2, 0x0, r7}, @tail_call, @ringbuf_query], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000006c0)='GPL\x00', 0x9, 0x89, &(0x7f0000000700)=""/137, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x15, r9, 0x8, &(0x7f00000008c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000900)={0x4, 0xb, 0x1, 0x8533}, 0x10, r12, 0xffffffffffffffff, 0x0, &(0x7f0000000d00)=[0xffffffffffffffff], 0x0, 0x10, 0xa551b3a}, 0x94) 2m1.219415138s ago: executing program 6 (id=87): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ceb71c0010ec90db133c22a690ae7080000000000040875b0089"], 0xfe1b) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="851000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000140)=[0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x31, &(0x7f00000001c0)=[{}], 0x8, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x5e, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{0x1, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)='%-010d \x00'}, 0x20) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x3917, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x3}, 0x50) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x1, 0x20}, 0xc) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x1f, 0x11, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000f50e000000000000000000008500000008000000b708000000000000dbaaf8fff1000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b705000008000000850000006a00000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000600)={0x1, 0xffffffffffffffff}, 0x4) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xfffffff8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000800)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0xb, 0x3, 0x0, 0x4}], &(0x7f00000000c0)='syzkaller\x00', 0x1f, 0x0, 0x0, 0x41000, 0x31, '\x00', r2, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440)={0x4, 0x7, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000006c0)=[r3, r4, r5, 0xffffffffffffffff, r6, r7, r8], &(0x7f0000000700)=[{0x0, 0x5, 0x0, 0xa}, {0x1, 0x2, 0xf, 0xa}, {0x3, 0x5, 0x4, 0x7}], 0x10, 0xfffffff8}, 0x94) 2m0.89735974s ago: executing program 36 (id=87): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ceb71c0010ec90db133c22a690ae7080000000000040875b0089"], 0xfe1b) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="851000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000140)=[0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x31, &(0x7f00000001c0)=[{}], 0x8, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x5e, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{0x1, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)='%-010d \x00'}, 0x20) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x3917, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x3}, 0x50) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffffffffffff, 0x1, 0x20}, 0xc) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x1f, 0x11, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000f50e000000000000000000008500000008000000b708000000000000dbaaf8fff1000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b705000008000000850000006a00000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000600)={0x1, 0xffffffffffffffff}, 0x4) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xfffffff8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000800)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0xb, 0x3, 0x0, 0x4}], &(0x7f00000000c0)='syzkaller\x00', 0x1f, 0x0, 0x0, 0x41000, 0x31, '\x00', r2, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440)={0x4, 0x7, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000006c0)=[r3, r4, r5, 0xffffffffffffffff, r6, r7, r8], &(0x7f0000000700)=[{0x0, 0x5, 0x0, 0xa}, {0x1, 0x2, 0xf, 0xa}, {0x3, 0x5, 0x4, 0x7}], 0x10, 0xfffffff8}, 0x94) 10.281706574s ago: executing program 4 (id=358): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000fcfffdff000000000000000095"], &(0x7f0000000300)='syzkaller\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) close(0x3) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r3, 0xffffffffffffffff}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x19, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000b7080000000000007b8af8ff00000000b7080000010000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000140)=0x18, &(0x7f00000003c0)='%pB \x00'}, 0x20) r6 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) close(r6) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8940, &(0x7f0000000080)) 10.168476716s ago: executing program 4 (id=361): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[], 0x50) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r5, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'syzkaller0\x00', 0x20}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7c00000000000000000000000700000044140001ac1414aa00000000ac1414000000000000441c0003e0000001000000007f000001000000000000000000000000442c", @ANYRESHEX=r3, @ANYBLOB="f4a5b2feabfbcae2098d2058efa98d30a7d76e087dbf036b13f1d04d754e8b3bd86eb202570f63b1af455378632ce0f9c1e609e38734174ecbd47c096e69bdcaceb5a0b0579079df622f1b219bd44c1cba080d5ae226a80580206cfef78b54cbf4b96abcdbd6a99010aadc0e4d55a3015205a1a9fe23211764fead0d24f93917706d45ca29f2a82ec7f3e6e9ffacc284f50c6896b33d0a", @ANYRES8=r3], 0x230}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r7 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000080)="48000000140081fb7092012ba659ae08060c040002ff0f03900000000000000000006fabca3b4e7d06a6bd7c00000000030000068a562ad6e74703c48f93bc2a02000000461eb886", 0x48}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r6, &(0x7f0000000740)=ANY=[@ANYBLOB="1e0308004d8c71ef2885634a8270e7"], 0xffdd) ioctl$TUNSETOFFLOAD(r3, 0x400454cc, 0x1c) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000bc0), 0x4) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'pim6reg0\x00', 0x2}) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000064008188040f80ec59acbc0413a1f848290000005e140602000000010e000a000f00000002800000", 0x2c}], 0x1}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x4, [@volatile={0xf, 0x0, 0x0, 0x9, 0x1}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x29, 0x0, 0x1f, 0x1}, @restrict={0x8, 0x0, 0x0, 0xb, 0x4}, @decl_tag={0x7, 0x0, 0x0, 0x11, 0x2}, @struct={0xe, 0x5, 0x0, 0x4, 0x0, 0x7ff, [{0x1, 0x0, 0x8}, {0xa, 0x5, 0x3}, {0x5, 0x3, 0x3}, {0xc, 0x4, 0x1}, {0x3, 0x5, 0x7}]}, @ptr={0x6, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000940)=""/224, 0xb4, 0xe0, 0x1, 0x8, 0x10000}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x2, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x12, 0x0, &(0x7f0000000a40), 0x0, 0xb, 0x0, &(0x7f0000000400), 0x41000, 0x10, '\x00', 0x0, @cgroup_sock_addr=0x32, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x9, 0x2, 0x1}, 0x10, r12, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000c40), 0x10, 0xc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xe, 0xd, &(0x7f0000000480)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], &(0x7f00000002c0)='syzkaller\x00', 0xa, 0xa8, &(0x7f0000000500)=""/168, 0x41100, 0x4c, '\x00', r10, @sk_skb=0x4, r11, 0x8, &(0x7f0000000700)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0xe, 0x2, 0x56}, 0x10, r12, r0, 0x5, 0x0, &(0x7f0000000a40)=[{0x1, 0x3, 0x4, 0x7}, {0x0, 0x5, 0x9, 0x1}, {0x4, 0x2, 0xd, 0x3}, {0x0, 0x3, 0x5, 0x7}, {0x0, 0x5, 0xf, 0x2}], 0x10, 0x80000000}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)=@generic={&(0x7f00000001c0)='./file0\x00', r0}, 0x18) 6.371103524s ago: executing program 4 (id=365): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000fcfffdff000000000000000095"], &(0x7f0000000300)='syzkaller\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r0}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8940, &(0x7f0000000080)) 6.171869504s ago: executing program 4 (id=368): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000071000000010"], 0x48) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, @perf_config_ext={0x0, 0x100000000000000}, 0x800, 0xc8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) r0 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r0, &(0x7f0000006480)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'pim6reg1\x00', 0x2}) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x114301, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$TUNSETLINK(r1, 0x400454cd, 0x336) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="14000000040000000400000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f0000000140), &(0x7f0000000200)=""/221}, 0x20) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @link_local}) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000580)="1c0000005e007fa69801d76ab0a272a2d27cfc05a4313bb97f499b2a", 0x1c}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) 5.877173084s ago: executing program 7 (id=372): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="85000000070000006a0a00ff000000000c00000000000000950000000000000018100000", @ANYRES32=r0, @ANYRES8=r1], &(0x7f0000000140)='GPL\x00', 0x2, 0x95, &(0x7f0000000180)=""/149, 0x41100, 0x0, '\x00', 0x0, @flow_dissector}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)={@ifindex, r3, 0x11, 0x0, 0x0, @void, @value=r2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x9, 0x7, 0x7, 0x10010, r2, 0xa6b, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5, 0x2}, 0x50) r4 = socket$kcm(0x2, 0x3, 0x84) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18020000040000000000000000000000850000002c000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000380)="b9ff0300600d698cff9e14f086dd", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f00000001c0)="2e00000010008188040f46ecdb4cb9cca7480ef40f000000e3bd6efb010509000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000001000)={r6, r3}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="7912b8000000000061138c0000000000bf2000000000000015000000080063033d030100000000009500003a000000006916000000000000bf6700000000000066060500fcff03006706000002000000760300000ee60060bf050000000000003c650000000000006507f9ff01000000070700004cdfffff1e75040000000000bf54000000000000070400000400f9ffad43010000000000d5000000000000000500000000000000950000000000000032410000000000000054bb12dc8c27df8ecfc7bdd2d17f2f1754558f22dd399703d6c4f6f3be0b369289aa6812b8e007e733a9a4f16d0a3e1282ee45a010fb94fe9de56c9d8a814261bdb94a05000000c6c60bf7a13ba1fcf1111ce4fc0d742a81762bab8395fa64810b5b40d893ea8fe0ffffff7f1b546cad3f1d5af65706fd4f68795cce6cf16ab689b555202da2e0ec2871a51445dc8da39e5b0ab71ca9b901627b562ed84b026002d4519af619e3cca4d69e0dee080006774a8f3e691700ec88158f02001b0000c81c8b297dff0445a13d0045fb3cda32a673a6bb55d8c80800dce431e56723888fb126a1403d2b63f16fb2ad9bc117aba7cbebe174aba210d739a018f9bbec63222d20cedbc4d03723f1c932b3a6aa57f1ad2e99e0e67a993716d20000009f0f53acbb40b401e3738270b3156268784f2af9e4bcf8b07a10d6735154be1602f9dd1d7d4301e00000000000460bcc5989ec85e3cbcb6bcfaf0000000000000000bc00f674629709e7e78f4ddc211bc3ebf0bd9d42ca019dd5d0861cd64722cf74686ebfbe2562671cd47840f81d2a8f8f9be3bcd19dc6840aa7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7eab049b1bd47287cd31cc43ea0ffb567b40407d000000000000000000000000005f37d83f84e98a523d80bd0d0d703f37ca363f601ae899a56715a0a62a26a0f6a5480a55c22fe394ae0000000000000000000000000000437d57defb79ea000500000000000000000000f014a4a318ba48d35ae9f438000000000000db894b62a614cb1fdd46619c5d2200000000000700000000000000000000006dcd2f421400f69947e4f26e099c9e8369080663c909b7e7c87e3b5e8e5a6df77c8f7338cd5a85f211a41b5d529d4243e47d7ab0d5991756b59d363ba30b18fc2ff189a4e8db38ab97c6a125e2785619e84c6a2b50f0e3ff83ef5149aff43dc899fdebdc2c496e6bdd4dd4d21f06fe133f4444272c5f0839ad663100452a6c6b6421f7e89a33b339401eee2cd466ab2a93a1ee7fb8a9e455ba1c6e17b02a1cd7bf35d36cf5b2a0f063469ae0d0b9fc042b48e98626eb0f9754d8cbbefa3079fe63063047baff09e9aaf7600000fba9a88db9ebef86f7cb522a784bb6d37e5f802757a15c6735138b493db9df53440a63fc565a0b190a710ae1e6807cbeb415ac841e94b706974160a60a14e571274f333d23186143b95514c79b50994cb39cda343bda8f01cf8ec7cdfdace0289e83ce50a57d68bfecfaf69fe7ff5b0375a47d3eb57b41d8a0589b82a1cf1149ba3f21ea2b65433321eb1a6f04ecc713c2b26d27baa49e54c2babec86335b9f418b5a5eb997bc9dd65197124b9aa80fc4aa8defb986bf05c41b919886bb81ecd3d24cf9ecc7004000000000000002c70d32f5d55ef2a2cf7560cb2884f46a92b3c25550f73e407fc5d514b2b7a6b690e290e676266addb7d96e723dec9c418eec8c48dffb6f432b4d5fef16e4f0051ba7efc690022c3f62b37cb5682d8bfdfc637ad3bf089ef0117bcd395322fcfb8e8e0a6e2babceb5f289b1d991770681192bcd0b584c3497e455f30ab918a690514a87a7d8e1d5f169a4e680e9c390071d26f2e0e26fc062f2785f14c0404fe01fb4000000000000000577dcb1698a9021a36d73ed03651c1937b2c84046023a1a0a87b208e33ad2d7c2892b176877264e1d699b7401eb917b289f6f67060fda0fa44b54bd87517a2bf09dba7209e41db4288b61bda5960952c45e5c55f2cd68bf9c6ff33e46109584bf42e8696ef1876564fef6f24cbbed0db8ab7fda1ffcc8c9fd4ab2cbe8f8df8e5535b12a942a948eacdaf308d48932064cfc3329da74f6f3e4409d6764a29680e312bf1a0143180e6493c9201ea916e6c9b2566c558ad88d9f7c0aebf82f5807eecefa97ada9bbd9e478e5d7748ee188bc719ca7a73dce5b6758a767c4c6b7572ab25eb2d73986379d5685cb438fe7091d097cc8f33fc0f83dee76603d6580f1c8fc4c37efd305ccc5a25678180425718bb9344e60dda8dae2677bb602d29aa0810616a2fdbca7020d72291b592b84223e2522ee01f5bdaa0fc4eb8d71d948a2baccf3ea2aa79d4d9069d8c0000000000000000000000321cd67859b4567badee56f158406f08683bdc5ffe2dedc916000c71f922fa2dfead7535999436a4aeb908781893479319b8b55e00d90ae6f09f06be2a0fc0bc17bef53331208112a0132350c0c5dd4607547079acc9471300dea6ae01742dccdae69f932cef80bca1bfcb57b9c852cf8358a580044772a80f20de36f707385380155be8907029d039a1d1447fc06b7020221e0d439f3f47edcf12f913dc8b6389a540340ae37804728ea65352e630c2e90424d58d72fdc1b28403e1dc7aad238b81df3b2d4166d656c6a9c73554bdf4f7312a4c0271e0eb45b4a596b7fa928ac3683f09fdaca46226c1df2c6c866cb4412d17d3d52c38cf0f7bd3b0eea2d4e06d061bb1b7c8c52f37f4036932d00028abd4527ffd639d7b16860033754ab13419429e5e39f290751ab6bd9392aef5519cd8c16e1f1cb1f225cc84a1a62497c1e436142fe28048a2b4d133905814a1808bc5b3e45eaa9eaebd946bee806968aeeb5a9eed87eba3d25d0b412a1b4cf2d419a58b09fc275c4395a0bd332eb538321465043e5967dd22459d0f52190a37f93ab823431a81fa6f54de61637fd473e19a6f567fead100e7d8cac149b66ebe9973af846146c62065a64854ed21e8b6f6fbe78474b753915a42efcb7da8ad18bacff8d69e0af1ca1f8174530a21820738412b100b54ee9b4a0dc22d5fe1cadecaea73fbfad087b19ce53177488d230539c5174f572a539d9d7c42698aa82bccf030ad393f25c10baa17e919f647d0e31877b7a6c1d8d86583f884a0c1da07b9b6dced06cdeb0094aa635a82f233b5993926b8970a0840ba116a7d20a40efb3bd03c4bdf380a2510a0a1ea69811ded68943c71218b42783b38959753978f222e1396b9b36dee2ce205122a000577cab29f48bff4f88c417e6bf5fb430d925596f29aca8677ca5a113aeaa5e0252ca17244d6c76e78ff1bbd81a71c4dfc72431d7f1126f8bdbf4056ee0f58a1bf83d53b1de07489541182dc4ee0f573c25b6c15dad930bc7a770b5a4f407d7a879db7185f15f80100000000000000739cc97db66ec6b925955d9a591808947fdd8d484ad27353230a449fdf87fc46c73b852fec931cfb6718acf3315bf5e577d00beb77c5514bc05d576a81345a03ad7aae74c5d2b77d45718348aed4fcbcd1441ff31b8f038824a989a9446a4a69367b228b3d174230b7320fc4d3c03368db573816dd0c04e65d6f8ce48283e76abdddbb965e0b2568e93c9cc5494a55421793f562c50c53f876cbde93c5cc7a3099c99d9775af010ba093f8a13b771782a3cfb24fbde6ef763e20c613164ab014d1906c4e098f1431b6b2886a155c4bac2911d7ee6a646f5913205ebd175e68975b93c330e4f9131788026b3b7cd5b6452c9e17452ac70000000000000000000000c71185f72436640fd4294fc3da230f9065095be47d7a848df12316c3c8b184fe110b061987fd79cf7d83443e69d08e2e839ae4fbe26ef7764f4870ef3bd0ec12eb45f60ca10dbfe329271f0bc93b28798e982e0dd32fc14bd4313c63b2dbb568f33fb45acad2dc7f438ea162c0709c0bbe1ea13e1e47399286e8143f400d7adf5f891f547c7e69e455706626814ee49274667f47769293451fd49885a152b8d2cf18febc7993f4a93893c6c7b7e46a230359ef2443e6bb9f50bb0faa5eaafd3ed6d551600c46b58a29fd7ccbbb0616f0be27302b683eccd742791d97f4a1daa0447f004426fd09b67d926f51525da63987bc73af35b28277879089b89fff6edab2fa1caf660a46a1a9f09e2d255b1c4be95c7c33dc81857f580e36c0a78d94dd879ee18de4a6475858d2ded2e3427ae007cc6f8e5e99aa146667f71ad83f3ddcf5db2dc396d7da499b65cd98125f20c284fc84d6a70be1de44b49c82022225292199c75cc26beab98dce4c331ed722f01d0d6314a72416814a565f4d90a5f8a255810f23541082f4b06f451e4724cd882f4d589600000000005854ca490d7df9cc293547c9a51aecc7a92f417f6a4d327737f1b198252358832dbe43507844a0cc112af4ce457c173fa64174ffd5ab9501eeb85508ebb60e169c0736c5960f2fe0879c77fff7b241439686cb4db435d6a7aa7c1f4a6433e77d3e547bbe6cf5b5d93a491ab4bba1ea7a1e6f37618b1d74cff3630d85a210092211be1ec12a30891eef590b19cdde055d626818c64e1c56b8918f33441a64b54946571b7bc70fb065d3bb1647f6f989ab8159e6d1cfa6c0ec7329d7d2263ca22144bf17d8692f03b592bd0f610096094da096233984e95b9a8216a6e60a104ae0bb5f77ac70b4390ea2cb6f6c40c928fae489f447240a25fd0a5bd9d5b6cd2a98f8804862922c11229c4e45c765e4d3348af3d3aadd5cc2"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x12, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@map_fd={0x18, 0x1, 0x1, 0x0, r8}, @call={0x85, 0x0, 0x0, 0x75}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xed41d0969ec4053c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000000000070100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r10}, 0x10) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 5.471322024s ago: executing program 8 (id=374): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[], 0x50) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r5, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'syzkaller0\x00', 0x20}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7c00000000000000000000000700000044140001ac1414aa00000000ac1414000000000000441c0003e0000001000000007f000001000000000000000000000000442c", @ANYRESHEX=r3, @ANYBLOB="f4a5b2feabfbcae2098d2058efa98d30a7d76e087dbf036b13f1d04d754e8b3bd86eb202570f63b1af455378632ce0f9c1e609e38734174ecbd47c096e69bdcaceb5a0b0579079df622f1b219bd44c1cba080d5ae226a80580206cfef78b54cbf4b96abcdbd6a99010aadc0e4d55a3015205a1a9fe23211764fead0d24f93917706d45ca29f2a82ec7f3e6e9ffacc284f50c6896b33d0a", @ANYRES8=r3], 0x230}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r7 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000080)="48000000140081fb7092012ba659ae08060c040002ff0f03900000000000000000006fabca3b4e7d06a6bd7c00000000030000068a562ad6e74703c48f93bc2a02000000461eb886", 0x48}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r6, &(0x7f0000000740)=ANY=[@ANYBLOB="1e0308004d8c71ef2885634a8270e7"], 0xffdd) ioctl$TUNSETOFFLOAD(r3, 0x400454cc, 0x1c) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000bc0), 0x4) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'pim6reg0\x00', 0x2}) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000064008188040f80ec59acbc0413a1f848290000005e140602000000010e000a000f00000002800000", 0x2c}], 0x1}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x4, [@volatile={0xf, 0x0, 0x0, 0x9, 0x1}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x29, 0x0, 0x1f, 0x1}, @restrict={0x8, 0x0, 0x0, 0xb, 0x4}, @decl_tag={0x7, 0x0, 0x0, 0x11, 0x2}, @struct={0xe, 0x5, 0x0, 0x4, 0x0, 0x7ff, [{0x1, 0x0, 0x8}, {0xa, 0x5, 0x3}, {0x5, 0x3, 0x3}, {0xc, 0x4, 0x1}, {0x3, 0x5, 0x7}]}, @ptr={0x6, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000940)=""/224, 0xb4, 0xe0, 0x1, 0x8, 0x10000}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x2, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x12, 0x0, &(0x7f0000000a40), 0x0, 0xb, 0x0, &(0x7f0000000400), 0x41000, 0x10, '\x00', 0x0, @cgroup_sock_addr=0x32, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x9, 0x2, 0x1}, 0x10, r12, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000c40), 0x10, 0xc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xe, 0xd, &(0x7f0000000480)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], &(0x7f00000002c0)='syzkaller\x00', 0xa, 0xa8, &(0x7f0000000500)=""/168, 0x41100, 0x4c, '\x00', r10, @sk_skb=0x4, r11, 0x8, &(0x7f0000000700)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0xe, 0x2, 0x56}, 0x10, r12, r0, 0x5, 0x0, &(0x7f0000000a40)=[{0x1, 0x3, 0x4, 0x7}, {0x0, 0x5, 0x9, 0x1}, {0x4, 0x2, 0xd, 0x3}, {0x0, 0x3, 0x5, 0x7}, {0x0, 0x5, 0xf, 0x2}], 0x10, 0x80000000}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)=@generic={&(0x7f00000001c0)='./file0\x00', r0}, 0x18) 5.461240085s ago: executing program 7 (id=376): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0xc1842, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x0, 0x24c, 0x6, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, 0x50) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'pimreg\x00'}) 5.369794064s ago: executing program 4 (id=377): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000002"], 0x0}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3b) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x549800, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000000c0)=r0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x10, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="b40000000000000079104800000000007100000c0000000095007400000000000389c0dc1b1e8fcc938d01cf519bb9961bd83651f709c94ff5ae1b8970b266a297034656858dc13d3dc6e7203903445d797181deb467614fe3"], &(0x7f0000003ff6)='GPL\x00', 0x8, 0xc3, &(0x7f0000000400)=""/198, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffff52}, 0x37) r2 = getpid() perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x2, 0x3cd, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, r2, 0x0, 0xffffffffffffffff, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ffffffff8500000004000000850000000e00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='afs_reload_dir\x00', r3}, 0x18) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f8480d0000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x8010743f, 0xf0ff1f00000000) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'team0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) 5.233240098s ago: executing program 7 (id=378): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x40000000001, 0xffffffffffffffff, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x100) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x86bf2056334f3ae6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000300)='syzkaller\x00'}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x1f, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0x75}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x34}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x1) socket$kcm(0x2, 0x1, 0x84) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'bond0\x00'}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f0000000500)=r4, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='qgroup_update_reserve\x00', r4, 0x0, 0x7}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000000980)=[0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x1e, &(0x7f0000000a00)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x9e, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x18, 0x2, &(0x7f0000000a00)=@raw=[@call={0x85, 0x0, 0x0, 0x31}, @jmp={0x5, 0x0, 0xc, 0x7, 0x9, 0x2, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x2, 0x47, &(0x7f0000000a80)=""/71, 0x0, 0x10, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x8, &(0x7f0000000b00)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, r7, r1, 0x3, &(0x7f0000000bc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000c00)=[{0x1, 0x2, 0x9, 0xc}, {0x4, 0x5, 0x8, 0xb}, {0x1, 0x4, 0x3, 0x9}], 0x10, 0x3}, 0x94) r8 = socket$kcm(0x21, 0x2, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaf, &(0x7f0000000600)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0xec, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) sendmsg$kcm(r8, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0xfffc, 0x2, 0x1c, {0xa, 0xfffc, 0x4, @dev, 0xf5}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0xfc00) 2.808735109s ago: executing program 7 (id=379): r0 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r0, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000580)="1c0000005e007fa69801d76ab0a272a2d27cfc05a4313bb97f499b2a", 0x1c}], 0x1}, 0x0) 1.10022059s ago: executing program 8 (id=380): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x2, 0x922000000001, 0x106) setsockopt$sock_attach_bpf(r2, 0x1, 0x45, &(0x7f0000000000), 0xff7b) 1.031231157s ago: executing program 7 (id=381): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb7020000080000000503000000000000850000000600000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)=r0}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1, 0xffffffffffffffff}, 0x4) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x69, 0xf, 0x10000, 0x2008, 0xffffffffffffffff, 0xb, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0xe}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{0x1, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000540)=r0}, 0x20) r7 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r7, &(0x7f0000000180)={&(0x7f0000000080)={0x2, 0x4e24, @private=0xa010102}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)="b7", 0x1}], 0x1}, 0x20008050) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r7, 0x84, 0x10, &(0x7f0000000000)=r9, 0xc) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000680), 0x8) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x50) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f00000007c0)='./file0\x00', 0x0, 0x10}, 0x18) r13 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x0, 0x0, r10, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{0x1, 0xffffffffffffffff}, &(0x7f00000008c0), &(0x7f0000000900)=r0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x2e, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @exit, @ldst={0x3, 0x2, 0x2, 0x9, 0xb, 0x80, 0xffffffffffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @exit, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000380)='syzkaller\x00', 0xbb2, 0x0, &(0x7f00000003c0), 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000980)=[r5, r6, r9, r10, r11, r12, r13, r14], &(0x7f00000009c0)=[{0x1, 0x4, 0xe, 0xa}, {0x1, 0x3, 0xd, 0x4}, {0x3, 0x1, 0xa}, {0x3, 0x2, 0x1, 0x4}, {0x4, 0x5, 0xb}, {0x2, 0x5, 0xf}], 0x10, 0x8}, 0x94) 1.030085627s ago: executing program 5 (id=382): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="0100000004000000060000000b"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b70300000000ff80850000000400000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='console\x00', r2}, 0x18) ioctl$SIOCSIFHWADDR(r0, 0x8943, &(0x7f0000000100)={'syz_tun\x00', @random="f401401000"}) (fail_nth: 6) 893.863301ms ago: executing program 8 (id=383): openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x2, 0x5, 0x84) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x13, &(0x7f0000000380)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}, @printk={@lli, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x7b}}]}, &(0x7f0000000040)='GPL\x00', 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xb, 0x0, &(0x7f0000000100)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00Q', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) 831.509367ms ago: executing program 5 (id=384): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c01803002e000b12d25a80648c2594f90124fc60100c02400a000000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r7 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r7, 0x84, 0x1e, &(0x7f0000000000)=r6, 0x4) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x18, 0x6, &(0x7f0000000000)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0xa}, @generic={0xed, 0xc, 0x7, 0x9, 0x7}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}, @exit], &(0x7f0000000200)='GPL\x00', 0x2, 0x1000, &(0x7f00000006c0)=""/4096, 0x41000, 0x1, '\x00', 0x0, @fallback=0x16, r2, 0x8, &(0x7f0000000180)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0xe64b, 0x8}, 0x10, 0x0, r1, 0x6, 0x0, &(0x7f00000002c0)=[{0x4, 0x5, 0xf, 0xb}, {0x5, 0x5, 0x2, 0xc}, {0x5, 0x1, 0x10, 0x1}, {0x4, 0x2, 0x8, 0xc}, {0x2, 0x2, 0xe, 0x5}, {0x5, 0x1, 0xd, 0x2}], 0x10, 0x401}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002940)={r1, 0xe0, &(0x7f0000002840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000600)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa, &(0x7f00000026c0)=[0x0], &(0x7f0000002700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x51, &(0x7f0000002740)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000002780), &(0x7f00000027c0), 0x8, 0xaa, 0x8, 0x8, &(0x7f0000002800)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002a80)={0x6, 0xf, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0xf6}, [@jmp={0x5, 0x0, 0xf, 0xb, 0x0, 0xffffffffffffffb4}, @jmp={0x5, 0x0, 0x3, 0x2, 0x5, 0x18, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @call={0x85, 0x0, 0x0, 0x7e}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, @generic={0x8, 0x3, 0x5, 0xe0, 0x4}, @map_fd={0x18, 0x6, 0x1, 0x0, 0x1}]}, &(0x7f00000005c0)='GPL\x00', 0x7, 0x1000, &(0x7f00000016c0)=""/4096, 0x41000, 0xc, '\x00', r8, 0x25, r6, 0x8, &(0x7f0000002980)={0x7, 0x4}, 0x8, 0x10, &(0x7f00000029c0)={0x1, 0x5, 0x8}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000002a00)=[r0, r0, r6, r7, r0, r6, r6], &(0x7f0000002a40)=[{0x4, 0x1, 0x4, 0xa}, {0x1, 0x1, 0x0, 0x3}, {0x2, 0x2, 0xc, 0x9}], 0x10, 0x8}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@typedef={0x4, 0x0, 0x0, 0x7}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x10}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x21000000, [{0x0, 0x2, 0x1000000}]}]}, {0x0, [0x0, 0x0, 0x0, 0xda]}}, 0x0, 0x52, 0x0, 0x1}, 0x28) 632.000147ms ago: executing program 5 (id=385): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="85000000070000006a0a00ff000000000c00000000000000950000000000000018100000", @ANYRES32=r0, @ANYRES8=r1], &(0x7f0000000140)='GPL\x00', 0x2, 0x95, &(0x7f0000000180)=""/149, 0x41100, 0x0, '\x00', 0x0, @flow_dissector}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)={@ifindex, r3, 0x11, 0x0, 0x0, @void, @value=r2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x9, 0x7, 0x7, 0x10010, r2, 0xa6b, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5, 0x2}, 0x50) r4 = socket$kcm(0x2, 0x3, 0x84) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18020000040000000000000000000000850000002c000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000380)="b9ff0300600d698cff9e14f086dd", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f00000001c0)="2e00000010008188040f46ecdb4cb9cca7480ef40f000000e3bd6efb010509000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000001000)={r6, r3}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x12, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@map_fd={0x18, 0x1, 0x1, 0x0, r8}, @call={0x85, 0x0, 0x0, 0x75}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xed41d0969ec4053c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000000000070100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r10}, 0x10) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 573.091472ms ago: executing program 8 (id=386): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000071000000010"], 0x48) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, @perf_config_ext={0x0, 0x100000000000000}, 0x800, 0xc8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) r0 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r0, &(0x7f0000006480)={0x0, 0x0, 0x0}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'pim6reg1\x00', 0x2}) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x114301, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$TUNSETLINK(r1, 0x400454cd, 0x336) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="14000000040000000400000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r5, &(0x7f0000000140), &(0x7f0000000200)=""/221}, 0x20) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @link_local}) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000580)="1c0000005e007fa69801d76ab0a272a2d27cfc05a4313bb97f499b2a", 0x1c}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) 470.846883ms ago: executing program 5 (id=387): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0xc1842, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x0, 0x24c, 0x6, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, 0x50) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'pimreg\x00'}) 317.597088ms ago: executing program 5 (id=388): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x40000000001, 0xffffffffffffffff, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x100) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x86bf2056334f3ae6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000300)='syzkaller\x00'}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x1f, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0x75}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x34}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x1) socket$kcm(0x2, 0x1, 0x84) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'bond0\x00'}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f0000000500)=r4, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='qgroup_update_reserve\x00', r4, 0x0, 0x7}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000000980)=[0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x1e, &(0x7f0000000a00)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x9e, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x18, 0x2, &(0x7f0000000a00)=@raw=[@call={0x85, 0x0, 0x0, 0x31}, @jmp={0x5, 0x0, 0xc, 0x7, 0x9, 0x2, 0x4}], &(0x7f0000000a40)='syzkaller\x00', 0x2, 0x47, &(0x7f0000000a80)=""/71, 0x0, 0x10, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x8, &(0x7f0000000b00)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, r7, r1, 0x3, &(0x7f0000000bc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000c00)=[{0x1, 0x2, 0x9, 0xc}, {0x4, 0x5, 0x8, 0xb}, {0x1, 0x4, 0x3, 0x9}], 0x10, 0x3}, 0x94) r8 = socket$kcm(0x21, 0x2, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaf, &(0x7f0000000600)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0xec, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) sendmsg$kcm(r8, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0xfffc, 0x2, 0x1c, {0xa, 0xfffc, 0x4, @dev, 0xf5}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0xfc00) 256.002494ms ago: executing program 4 (id=389): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[], 0x50) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r5, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'syzkaller0\x00', 0x20}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7c00000000000000000000000700000044140001ac1414aa00000000ac1414000000000000441c0003e0000001000000007f000001000000000000000000000000442c", @ANYRESHEX=r3, @ANYBLOB="f4a5b2feabfbcae2098d2058efa98d30a7d76e087dbf036b13f1d04d754e8b3bd86eb202570f63b1af455378632ce0f9c1e609e38734174ecbd47c096e69bdcaceb5a0b0579079df622f1b219bd44c1cba080d5ae226a80580206cfef78b54cbf4b96abcdbd6a99010aadc0e4d55a3015205a1a9fe23211764fead0d24f93917706d45ca29f2a82ec7f3e6e9ffacc284f50c6896b33d0a", @ANYRES8=r3], 0x230}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r7 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000080)="48000000140081fb7092012ba659ae08060c040002ff0f03900000000000000000006fabca3b4e7d06a6bd7c00000000030000068a562ad6e74703c48f93bc2a02000000461eb886", 0x48}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r6, &(0x7f0000000740)=ANY=[@ANYBLOB="1e0308004d8c71ef2885634a8270e7"], 0xffdd) ioctl$TUNSETOFFLOAD(r3, 0x400454cc, 0x1c) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000bc0), 0x4) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'pim6reg0\x00', 0x2}) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000064008188040f80ec59acbc0413a1f848290000005e140602000000010e000a000f0000000280000012", 0x2d}], 0x1}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x4, [@volatile={0xf, 0x0, 0x0, 0x9, 0x1}, @volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x29, 0x0, 0x1f, 0x1}, @restrict={0x8, 0x0, 0x0, 0xb, 0x4}, @decl_tag={0x7, 0x0, 0x0, 0x11, 0x2}, @struct={0xe, 0x5, 0x0, 0x4, 0x0, 0x7ff, [{0x1, 0x0, 0x8}, {0xa, 0x5, 0x3}, {0x5, 0x3, 0x3}, {0xc, 0x4, 0x1}, {0x3, 0x5, 0x7}]}, @ptr={0x6, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000940)=""/224, 0xb4, 0xe0, 0x1, 0x8, 0x10000}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x2, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x12, 0x0, &(0x7f0000000a40), 0x0, 0xb, 0x0, &(0x7f0000000400), 0x41000, 0x10, '\x00', 0x0, @cgroup_sock_addr=0x32, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x9, 0x2, 0x1}, 0x10, r12, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000c40), 0x10, 0xc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xe, 0xd, &(0x7f0000000480)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], &(0x7f00000002c0)='syzkaller\x00', 0xa, 0xa8, &(0x7f0000000500)=""/168, 0x41100, 0x4c, '\x00', r10, @sk_skb=0x4, r11, 0x8, &(0x7f0000000700)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0xe, 0x2, 0x56}, 0x10, r12, r0, 0x5, 0x0, &(0x7f0000000a40)=[{0x1, 0x3, 0x4, 0x7}, {0x0, 0x5, 0x9, 0x1}, {0x4, 0x2, 0xd, 0x3}, {0x0, 0x3, 0x5, 0x7}, {0x0, 0x5, 0xf, 0x2}], 0x10, 0x80000000}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)=@generic={&(0x7f00000001c0)='./file0\x00', r0}, 0x18) 178.948162ms ago: executing program 8 (id=390): r0 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r0, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000580)="1c0000005e007fa69801d76ab0a272a2d27cfc05a4313bb97f499b2a", 0x1c}], 0x1}, 0x0) 81.705762ms ago: executing program 5 (id=391): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000090000002f4900000500000041000000", @ANYRES32=0x1, @ANYBLOB="fc15ffff000000000000000000000000000000de", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000140)="600000002e000d190a762d7f089e", 0xfca2}, {&(0x7f0000000280)="68cabf2dfb58fc0a1d6b689866f05d490d010088a8ffff0200258f2e4409b8f9e6aaeb88bea123dc2c6726e89b1ae2f6e8bcb5ee52dcd7298d39093c510293bca0b646a3ce904f6e6b788b3204c233e60ddc", 0x52}], 0x2}, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003d000b08d25a80648c7494f90224fc60580002400c000400030082c137153e3719ac018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'syzkaller0\x00', 0x20}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7c00000000000000000000000700000044140001ac1414aa00000000ac1414000000000000441c0003e0000001000000007f000001000000000000000000000000442c", @ANYRESHEX=r3, @ANYBLOB="f4a5b2feabfbcae2098d2058efa98d30a7d76e087dbf036b13f1d04d754e8b3bd86eb202570f63b1af455378632ce0f9c1e609e38734174ecbd47c096e69bdcaceb5a0b0579079df622f1b219bd44c1cba080d5ae226a80580206cfef78b54cbf4b96abcdbd6a99010aadc0e4d55a3015205a1a9fe23211764fead0d24f93917706d45ca29f2a82ec7f3e6e9ffacc284f50c6896b33d0a", @ANYRES8=r3], 0x230}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r7 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000000080)="48000000140081fb7092012ba659ae08060c040002ff0f03900000000000000000006fabca3b4e7d06a6bd7c00000000030000068a562ad6e74703c48f93bc2a02000000461eb886", 0x48}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r6, &(0x7f0000000740)=ANY=[@ANYBLOB="1e0308004d8c71ef2885634a8270e7"], 0xffdd) ioctl$TUNSETOFFLOAD(r3, 0x400454cc, 0x1c) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000bc0), 0x4) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'pim6reg0\x00', 0x2}) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000064008188040f80ec59acbc0413a1f848290000005e140602000000010e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000000940)=""/224, 0x1c, 0xe0, 0x1, 0x8, 0x10000}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x2, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x12, 0x0, &(0x7f0000000a40), 0x0, 0xb, 0x0, &(0x7f0000000400), 0x41000, 0x10, '\x00', 0x0, @cgroup_sock_addr=0x32, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x9, 0x2, 0x1}, 0x10, r12, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000c40), 0x10, 0xc}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xe, 0xd, &(0x7f0000000480)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], &(0x7f00000002c0)='syzkaller\x00', 0xa, 0xa8, &(0x7f0000000500)=""/168, 0x41100, 0x4c, '\x00', r10, @sk_skb=0x4, r11, 0x8, &(0x7f0000000700)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0xe, 0x2, 0x56}, 0x10, r12, r0, 0x5, 0x0, &(0x7f0000000a40)=[{0x1, 0x3, 0x4, 0x7}, {0x0, 0x5, 0x9, 0x1}, {0x4, 0x2, 0xd, 0x3}, {0x0, 0x3, 0x5, 0x7}, {0x0, 0x5, 0xf, 0x2}], 0x10, 0x80000000}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)=@generic={&(0x7f00000001c0)='./file0\x00', r0}, 0x18) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000140), 0xca, r1}, 0x38) 13.718338ms ago: executing program 7 (id=392): bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg$unix(r2, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x3c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}], 0xa0}, 0x2160) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000731139000000000020000000000000009500200000000000"], &(0x7f0000003ff6)='GPL\x00', 0xa, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffffffffffedd}, 0x48) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) (async) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x7602, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='objagg_obj_root_create\x00', r5, 0x0, 0x3}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 0s ago: executing program 8 (id=393): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)=""/262, 0x106}, {&(0x7f0000000900)=""/205, 0xcd}, {&(0x7f0000001a40)=""/4127, 0x101f}, {&(0x7f0000002b80)=""/224, 0xe0}, {&(0x7f0000000a00)=""/208, 0xd0}, {&(0x7f0000000300)=""/294, 0x126}, {&(0x7f0000000640)=""/230, 0xe6}, {&(0x7f0000003ac0)=""/4122, 0x101a}], 0x8}, 0x100) write$cgroup_subtree(r2, &(0x7f0000001a00)=ANY=[@ANYBLOB="13100000120091ef"], 0xfe33) recvmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r3 = socket$kcm(0x2, 0x922000000001, 0x106) setsockopt$sock_attach_bpf(r3, 0x1, 0x23, &(0x7f0000000000), 0xff7b) kernel console output (not intermixed with test programs): [ 161.263682][ T11] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 161.337243][ T11] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 161.452184][ T11] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 161.569998][ T11] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 161.717932][ T6029] chnl_net:caif_netlink_parms(): no params data found [ 161.957449][ T6031] chnl_net:caif_netlink_parms(): no params data found [ 162.116972][ T6035] chnl_net:caif_netlink_parms(): no params data found [ 162.146284][ T6029] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.157560][ T6029] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.165195][ T6029] bridge_slave_0: entered allmulticast mode [ 162.173698][ T6029] bridge_slave_0: entered promiscuous mode [ 162.251873][ T6029] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.260633][ T6029] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.267860][ T6029] bridge_slave_1: entered allmulticast mode [ 162.276444][ T6029] bridge_slave_1: entered promiscuous mode [ 162.379027][ T6029] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.431104][ T6031] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.440060][ T6031] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.447352][ T6031] bridge_slave_0: entered allmulticast mode [ 162.455695][ T6031] bridge_slave_0: entered promiscuous mode [ 162.464643][ T6031] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.472544][ T6031] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.480835][ T6031] bridge_slave_1: entered allmulticast mode [ 162.488511][ T6031] bridge_slave_1: entered promiscuous mode [ 162.496560][ T6033] chnl_net:caif_netlink_parms(): no params data found [ 162.527067][ T6029] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.740247][ T6029] team0: Port device team_slave_0 added [ 162.750242][ T6035] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.763658][ T6035] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.771429][ T6035] bridge_slave_0: entered allmulticast mode [ 162.780211][ T6035] bridge_slave_0: entered promiscuous mode [ 162.810350][ T6031] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.835098][ T6031] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.869188][ T5790] Bluetooth: hci4: command tx timeout [ 162.886276][ T6029] team0: Port device team_slave_1 added [ 162.932334][ T6035] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.946909][ T6035] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.954160][ T5790] Bluetooth: hci5: command tx timeout [ 162.971773][ T6035] bridge_slave_1: entered allmulticast mode [ 162.985475][ T6035] bridge_slave_1: entered promiscuous mode [ 163.028221][ T5790] Bluetooth: hci6: command tx timeout [ 163.038725][ T5790] Bluetooth: hci2: command tx timeout [ 163.206176][ T6029] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 163.213404][ T6029] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 163.239802][ T6029] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 163.253836][ T6035] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.284811][ T6031] team0: Port device team_slave_0 added [ 163.305124][ T6033] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.312545][ T6033] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.320395][ T6033] bridge_slave_0: entered allmulticast mode [ 163.327447][ T6033] bridge_slave_0: entered promiscuous mode [ 163.335736][ T6029] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 163.342779][ T6029] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 163.370490][ T6029] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 163.384967][ T6035] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.404897][ T6031] team0: Port device team_slave_1 added [ 163.449677][ T6033] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.456876][ T6033] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.464695][ T6033] bridge_slave_1: entered allmulticast mode [ 163.472682][ T6033] bridge_slave_1: entered promiscuous mode [ 163.532199][ T6035] team0: Port device team_slave_0 added [ 163.597086][ T6035] team0: Port device team_slave_1 added [ 163.639698][ T6029] hsr_slave_0: entered promiscuous mode [ 163.646372][ T6029] hsr_slave_1: entered promiscuous mode [ 163.652935][ T6029] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 163.660687][ T6029] Cannot create hsr debugfs directory [ 163.667439][ T6031] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 163.674540][ T6031] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 163.700999][ T6031] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 163.715238][ T6031] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 163.722320][ T6031] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 163.749849][ T6031] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 163.765969][ T6033] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.792508][ T6035] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 163.799775][ T6035] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 163.827597][ T6035] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 163.954652][ T6033] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.984012][ T6035] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 163.991670][ T6035] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 164.018802][ T6035] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 164.136089][ T6033] team0: Port device team_slave_0 added [ 164.160100][ T6033] team0: Port device team_slave_1 added [ 164.393921][ T6031] hsr_slave_0: entered promiscuous mode [ 164.401912][ T6031] hsr_slave_1: entered promiscuous mode [ 164.409218][ T6031] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 164.416849][ T6031] Cannot create hsr debugfs directory [ 164.464935][ T6035] hsr_slave_0: entered promiscuous mode [ 164.471864][ T6035] hsr_slave_1: entered promiscuous mode [ 164.479360][ T6035] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 164.486967][ T6035] Cannot create hsr debugfs directory [ 164.522744][ T6033] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 164.533121][ T6033] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 164.559287][ T6033] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 164.579069][ T11] hsr_slave_0: left promiscuous mode [ 164.585408][ T11] hsr_slave_1: left promiscuous mode [ 164.592730][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 164.600305][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 164.608757][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 164.616245][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 164.624670][ T11] bridge_slave_1: left allmulticast mode [ 164.631084][ T11] bridge_slave_1: left promiscuous mode [ 164.637764][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.652931][ T11] bridge_slave_0: left allmulticast mode [ 164.658824][ T11] bridge_slave_0: left promiscuous mode [ 164.664534][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.694363][ T11] veth1_macvtap: left promiscuous mode [ 164.700386][ T11] veth0_macvtap: left promiscuous mode [ 164.706005][ T11] veth1_vlan: left promiscuous mode [ 164.714614][ T11] veth0_vlan: left promiscuous mode [ 164.948220][ T5790] Bluetooth: hci4: command tx timeout [ 165.028871][ T5790] Bluetooth: hci5: command tx timeout [ 165.108998][ T5796] Bluetooth: hci6: command tx timeout [ 165.114538][ T5790] Bluetooth: hci2: command tx timeout [ 165.229428][ T11] team0 (unregistering): Port device team_slave_1 removed [ 165.278067][ T11] team0 (unregistering): Port device team_slave_0 removed [ 165.317456][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 165.361794][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 165.760323][ T11] bond0 (unregistering): Released all slaves [ 165.895544][ T6033] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 165.906849][ T6033] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.934087][ T6033] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 166.116600][ T6033] hsr_slave_0: entered promiscuous mode [ 166.125649][ T6033] hsr_slave_1: entered promiscuous mode [ 166.132569][ T6033] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 166.140540][ T6033] Cannot create hsr debugfs directory [ 166.533169][ T6029] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 166.584749][ T6029] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 166.629181][ T6029] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 166.705627][ T11] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 166.725263][ T6029] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 166.790379][ T6033] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 166.839018][ T11] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 166.880876][ T6033] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 166.900318][ T6033] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 166.970418][ T11] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 167.002712][ T6033] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 167.029681][ T5790] Bluetooth: hci4: command tx timeout [ 167.118322][ T5790] Bluetooth: hci5: command tx timeout [ 167.119513][ T11] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 167.172784][ T6031] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 167.183729][ T6031] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 167.192141][ T5790] Bluetooth: hci2: command tx timeout [ 167.197601][ T5790] Bluetooth: hci6: command tx timeout [ 167.213099][ T6031] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 167.252151][ T6031] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 167.334395][ T6035] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 167.415129][ T6035] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 167.435569][ T6035] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 167.536049][ T6035] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 167.634366][ T11] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 167.731185][ T11] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 167.817987][ T11] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 167.843456][ T6029] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.936023][ T11] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 167.990951][ T6029] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.016806][ T6033] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.060042][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.067263][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.122970][ T6033] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.165595][ T6031] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.187358][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.194674][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.287098][ T6035] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.321218][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.328433][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.347024][ T6018] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.354303][ T6018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.377828][ T6031] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.449911][ T11] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 168.521419][ T11] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 168.552318][ T139] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.559518][ T139] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.585518][ T6018] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.592724][ T6018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.621093][ T6035] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.644237][ T11] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 168.712652][ T139] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.719905][ T139] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.822400][ T11] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 168.894775][ T6019] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.902031][ T6019] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.110889][ T5790] Bluetooth: hci4: command tx timeout [ 169.133022][ T6033] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 169.188440][ T5790] Bluetooth: hci5: command tx timeout [ 169.269789][ T5790] Bluetooth: hci6: command tx timeout [ 169.275281][ T5790] Bluetooth: hci2: command tx timeout [ 170.064960][ T6029] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.215672][ T6035] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.243153][ T6031] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.725318][ T6033] veth0_vlan: entered promiscuous mode [ 170.880807][ T6033] veth1_vlan: entered promiscuous mode [ 171.206805][ T6033] veth0_macvtap: entered promiscuous mode [ 171.297216][ T6033] veth1_macvtap: entered promiscuous mode [ 171.439201][ T6031] veth0_vlan: entered promiscuous mode [ 171.550893][ T6031] veth1_vlan: entered promiscuous mode [ 171.654551][ T6029] veth0_vlan: entered promiscuous mode [ 171.700007][ T6033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 171.715483][ T6033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.727055][ T6033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 171.745632][ T6033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.761334][ T6033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 171.772206][ T6033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.784477][ T6033] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 171.833960][ T6033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 171.845533][ T6033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.856823][ T6033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 171.869064][ T6033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.879000][ T6033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 171.889492][ T6033] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.901675][ T6033] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 171.948271][ T6035] veth0_vlan: entered promiscuous mode [ 171.978678][ T6033] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 171.987455][ T6033] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.000320][ T6033] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.009813][ T6033] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.021977][ T6029] veth1_vlan: entered promiscuous mode [ 172.032421][ T6031] veth0_macvtap: entered promiscuous mode [ 172.045603][ T6035] veth1_vlan: entered promiscuous mode [ 172.080785][ T6031] veth1_macvtap: entered promiscuous mode [ 172.307965][ T6031] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 172.319860][ T6031] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.335343][ T6031] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 172.345999][ T6031] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.356097][ T6031] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 172.366710][ T6031] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.376632][ T6031] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 172.387252][ T6031] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.399247][ T6031] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 172.410618][ T6031] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 172.421724][ T6031] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.432345][ T6031] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 172.443054][ T6031] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.453297][ T6031] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 172.464195][ T6031] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.474893][ T6031] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 172.485638][ T6031] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.497282][ T6031] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 172.522494][ T6019] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 172.531699][ T6019] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 172.569040][ T6035] veth0_macvtap: entered promiscuous mode [ 172.581074][ T6031] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.591549][ T6031] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.601213][ T6031] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.610933][ T6031] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.647182][ T6035] veth1_macvtap: entered promiscuous mode [ 172.663085][ T6029] veth0_macvtap: entered promiscuous mode [ 172.705446][ T139] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 172.707867][ T6029] veth1_macvtap: entered promiscuous mode [ 172.720074][ T139] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 172.770780][ T6035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 172.787744][ T6035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.799730][ T6035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 172.810840][ T6035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.821374][ T6035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 172.832168][ T6035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.845733][ T6035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 172.861452][ T6035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.871895][ T6035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 172.882732][ T6035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 172.895140][ T6035] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 173.003679][ T11] hsr_slave_0: left promiscuous mode [ 173.023905][ T11] hsr_slave_1: left promiscuous mode [ 173.036350][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 173.052318][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 173.064338][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 173.076852][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 173.093980][ T11] bridge_slave_1: left allmulticast mode [ 173.103369][ T11] bridge_slave_1: left promiscuous mode [ 173.120583][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.140193][ T11] bridge_slave_0: left allmulticast mode [ 173.145920][ T11] bridge_slave_0: left promiscuous mode [ 173.160210][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.178292][ T11] hsr_slave_0: left promiscuous mode [ 173.184443][ T11] hsr_slave_1: left promiscuous mode [ 173.192673][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 173.202469][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 173.210803][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 173.218644][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 173.226642][ T11] bond0: left allmulticast mode [ 173.234154][ T11] bond_slave_0: left allmulticast mode [ 173.240903][ T11] bond_slave_1: left allmulticast mode [ 173.246684][ T11] bridge0: port 3(bond0) entered disabled state [ 173.256683][ T11] bridge_slave_1: left allmulticast mode [ 173.264487][ T11] bridge_slave_1: left promiscuous mode [ 173.272991][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.286108][ T11] bridge_slave_0: left allmulticast mode [ 173.300865][ T11] bridge_slave_0: left promiscuous mode [ 173.306686][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.335155][ T11] hsr_slave_0: left promiscuous mode [ 173.355020][ T11] hsr_slave_1: left promiscuous mode [ 173.361763][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 173.370517][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 173.379004][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 173.386463][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 173.396512][ T11] bond0: left allmulticast mode [ 173.401971][ T11] bond_slave_0: left allmulticast mode [ 173.407483][ T11] bond_slave_1: left allmulticast mode [ 173.413802][ T11] bridge0: port 3(bond0) entered disabled state [ 173.432063][ T11] bridge_slave_1: left allmulticast mode [ 173.437783][ T11] bridge_slave_1: left promiscuous mode [ 173.444005][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.463350][ T11] bridge_slave_0: left allmulticast mode [ 173.474617][ T11] bridge_slave_0: left promiscuous mode [ 173.484207][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.564629][ T11] veth1_macvtap: left promiscuous mode [ 173.570440][ T11] veth0_macvtap: left promiscuous mode [ 173.576052][ T11] veth1_vlan: left promiscuous mode [ 173.582499][ T11] veth0_vlan: left promiscuous mode [ 173.592883][ T11] veth1_macvtap: left promiscuous mode [ 173.598724][ T11] veth0_macvtap: left promiscuous mode [ 173.604400][ T11] veth1_vlan: left promiscuous mode [ 173.609816][ T11] veth0_vlan: left promiscuous mode [ 173.617679][ T11] veth1_macvtap: left promiscuous mode [ 173.623896][ T11] veth0_macvtap: left promiscuous mode [ 173.629668][ T11] veth1_vlan: left promiscuous mode [ 173.635635][ T11] veth0_vlan: left promiscuous mode [ 174.404123][ T11] team0 (unregistering): Port device team_slave_1 removed [ 174.453770][ T11] team0 (unregistering): Port device C removed [ 174.494043][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 174.503049][ T11] bond_slave_1 (unregistering): left promiscuous mode [ 174.550199][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 174.559511][ T11] bond_slave_0 (unregistering): left promiscuous mode [ 174.989353][ T11] bond0 (unregistering): (slave bridge0): Releasing backup interface [ 174.998478][ T11] bridge0 (unregistering): left promiscuous mode [ 175.004973][ T11] bond0 (unregistering): Released all slaves [ 175.454844][ T11] team0 (unregistering): Port device team_slave_1 removed [ 175.498413][ T11] team0 (unregistering): Port device team_slave_0 removed [ 175.536111][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 175.545714][ T11] bond_slave_1 (unregistering): left promiscuous mode [ 175.584308][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 175.595104][ T11] bond_slave_0 (unregistering): left promiscuous mode [ 176.042607][ T11] bond0 (unregistering): Released all slaves [ 176.494949][ T11] team0 (unregistering): Port device team_slave_1 removed [ 176.533997][ T11] team0 (unregistering): Port device C removed [ 176.574880][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 176.587513][ T11] bond_slave_1 (unregistering): left promiscuous mode [ 176.629350][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 176.641634][ T11] bond_slave_0 (unregistering): left promiscuous mode [ 177.062283][ T11] bond0 (unregistering): Released all slaves [ 177.137431][ T6029] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 177.152461][ T6029] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.172498][ T6029] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 177.186619][ T6029] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.205333][ T6029] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 177.221901][ T6029] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.234774][ T6029] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 177.285781][ T6035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 177.314787][ T6035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.324807][ T6035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 177.336343][ T6035] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.358442][ T6035] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 177.377047][ T6035] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.404903][ T6035] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.415663][ T6035] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.424886][ T6035] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.473179][ T2882] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 177.501123][ T2882] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 177.535236][ T6235] C: renamed from team_slave_0 (while UP) [ 177.565991][ T6235] netlink: 'syz.5.37': attribute type 3 has an invalid length. [ 177.574127][ T6235] netlink: 'syz.5.37': attribute type 1 has an invalid length. [ 177.591159][ T6235] netlink: 116 bytes leftover after parsing attributes in process `syz.5.37'. [ 177.665111][ T6029] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 177.677450][ T6029] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.688754][ T6029] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 177.701776][ T6029] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.712561][ T6029] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 177.723474][ T6029] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.736504][ T6029] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 177.769622][ T60] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 177.777841][ T60] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 177.821590][ T6029] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.831929][ T6029] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.844432][ T6029] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.854287][ T6029] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 178.167979][ T34] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 178.176000][ T34] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 178.255556][ T60] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 178.267174][ T60] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 178.307285][ T6246] netlink: 'syz.7.39': attribute type 10 has an invalid length. [ 178.335640][ T6246] netlink: 2 bytes leftover after parsing attributes in process `syz.7.39'. [ 178.348445][ T6246] bond0: entered promiscuous mode [ 178.375275][ T6246] bond_slave_0: entered promiscuous mode [ 178.430399][ T6246] bond_slave_1: entered promiscuous mode [ 178.436606][ T6246] bridge0: port 3(bond0) entered blocking state [ 178.461766][ T6246] bridge0: port 3(bond0) entered disabled state [ 178.474403][ T6246] bond0: entered allmulticast mode [ 178.487197][ T6246] bond_slave_0: entered allmulticast mode [ 178.504927][ T6246] bond_slave_1: entered allmulticast mode [ 178.514416][ T6246] bridge0: port 3(bond0) entered blocking state [ 178.520903][ T6246] bridge0: port 3(bond0) entered forwarding state [ 178.556492][ T60] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 178.575784][ T60] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 178.810662][ T6256] syzkaller0: entered promiscuous mode [ 178.816222][ T6256] syzkaller0: entered allmulticast mode [ 178.905721][ T60] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 178.947762][ T60] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 179.394633][ T6275] netlink: 'syz.6.43': attribute type 1 has an invalid length. [ 179.402624][ T6275] netlink: 168864 bytes leftover after parsing attributes in process `syz.6.43'. [ 180.908997][ T6273] netlink: 60 bytes leftover after parsing attributes in process `syz.6.43'. [ 181.168180][ T6288] netlink: 60 bytes leftover after parsing attributes in process `syz.7.44'. [ 181.218722][ T6288] netlink: 'syz.7.44': attribute type 1 has an invalid length. [ 181.226431][ T6288] netlink: 168864 bytes leftover after parsing attributes in process `syz.7.44'. [ 181.236554][ T6289] netlink: 'syz.4.36': attribute type 10 has an invalid length. [ 181.313865][ T6289] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.321765][ T6289] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.483827][ T6289] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.491088][ T6289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.498684][ T6289] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.505896][ T6289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.608263][ T6301] netlink: 'syz.6.47': attribute type 9 has an invalid length. [ 181.647891][ T6301] netlink: 209836 bytes leftover after parsing attributes in process `syz.6.47'. [ 181.700728][ T6289] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 181.710737][ T6306] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 182.627863][ T6300] delete_channel: no stack [ 182.928520][ T6308] netlink: 'syz.6.47': attribute type 9 has an invalid length. [ 182.969821][ T6308] netlink: 209836 bytes leftover after parsing attributes in process `syz.6.47'. [ 183.475076][ T6329] warning: `syz.7.49' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 [ 183.564485][ T6336] netlink: 196 bytes leftover after parsing attributes in process `syz.6.50'. [ 183.673762][ T6336] netlink: 'syz.6.50': attribute type 29 has an invalid length. [ 183.712973][ T6336] netlink: 'syz.6.50': attribute type 29 has an invalid length. [ 183.750380][ T6339] netlink: 'syz.6.50': attribute type 29 has an invalid length. [ 183.774514][ T6336] netlink: 'syz.6.50': attribute type 29 has an invalid length. [ 183.927304][ T6336] netlink: 'syz.6.50': attribute type 29 has an invalid length. [ 184.863504][ T6360] netlink: 'syz.6.55': attribute type 10 has an invalid length. [ 184.877651][ T6360] netlink: 2 bytes leftover after parsing attributes in process `syz.6.55'. [ 184.900638][ T6360] bond0: entered promiscuous mode [ 184.916303][ T6360] bond_slave_0: entered promiscuous mode [ 184.922770][ T6360] bond_slave_1: entered promiscuous mode [ 184.939683][ T6360] bridge0: port 3(bond0) entered blocking state [ 184.979102][ T6360] bridge0: port 3(bond0) entered disabled state [ 185.018409][ T6360] bond0: entered allmulticast mode [ 185.023612][ T6360] bond_slave_0: entered allmulticast mode [ 185.076548][ T6360] bond_slave_1: entered allmulticast mode [ 185.128524][ T6360] bridge0: port 3(bond0) entered blocking state [ 185.135001][ T6360] bridge0: port 3(bond0) entered forwarding state [ 185.294732][ T6369] netlink: 'syz.4.56': attribute type 10 has an invalid length. [ 185.489807][ T6369] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.497867][ T6369] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.600970][ T6373] netlink: 'syz.5.58': attribute type 10 has an invalid length. [ 185.619691][ T6373] netlink: 2 bytes leftover after parsing attributes in process `syz.5.58'. [ 185.653066][ T6373] bond0: entered promiscuous mode [ 185.664992][ T6373] bond_slave_0: entered promiscuous mode [ 185.679177][ T6373] bond_slave_1: entered promiscuous mode [ 185.685661][ T6373] bridge0: port 3(bond0) entered blocking state [ 185.739353][ T6373] bridge0: port 3(bond0) entered disabled state [ 185.811097][ T6373] bond0: entered allmulticast mode [ 185.845860][ T6373] bond_slave_0: entered allmulticast mode [ 185.888651][ T6373] bond_slave_1: entered allmulticast mode [ 185.947533][ T6373] bridge0: port 3(bond0) entered blocking state [ 185.954031][ T6373] bridge0: port 3(bond0) entered forwarding state [ 186.670227][ T6395] netlink: 'syz.5.61': attribute type 1 has an invalid length. [ 186.677900][ T6395] netlink: 168864 bytes leftover after parsing attributes in process `syz.5.61'. [ 186.863932][ T6394] netlink: 60 bytes leftover after parsing attributes in process `syz.5.61'. [ 186.911411][ T6398] netlink: 196 bytes leftover after parsing attributes in process `syz.7.62'. [ 187.241261][ T6395] syzkaller0: entered promiscuous mode [ 187.246825][ T6395] syzkaller0: entered allmulticast mode [ 190.153785][ T6419] validate_nla: 5 callbacks suppressed [ 190.153803][ T6419] netlink: 'syz.6.65': attribute type 10 has an invalid length. [ 190.179723][ T6419] bridge0: port 3(bond0) entered disabled state [ 190.186259][ T6419] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.194057][ T6419] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.231262][ T6419] bridge0: port 3(bond0) entered blocking state [ 190.237702][ T6419] bridge0: port 3(bond0) entered forwarding state [ 190.244573][ T6419] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.251821][ T6419] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.259386][ T6419] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.266554][ T6419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.277920][ T6419] bridge0: port 3(bond0) entered disabled state [ 190.284474][ T6419] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.291904][ T6419] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.213688][ T6443] -1: renamed from syzkaller0 [ 192.409628][ T6470] netlink: 196 bytes leftover after parsing attributes in process `syz.5.73'. [ 192.516601][ T6470] netlink: 'syz.5.73': attribute type 29 has an invalid length. [ 192.997514][ T6470] netlink: 'syz.5.73': attribute type 29 has an invalid length. [ 193.153976][ T6477] netlink: 'syz.5.73': attribute type 29 has an invalid length. [ 193.292555][ T6479] netlink: 'syz.5.73': attribute type 29 has an invalid length. [ 193.468460][ T6470] netlink: 'syz.5.73': attribute type 29 has an invalid length. [ 193.690630][ T6487] netlink: 60 bytes leftover after parsing attributes in process `syz.4.75'. [ 193.705103][ T6487] netlink: 'syz.4.75': attribute type 1 has an invalid length. [ 193.721775][ T6487] netlink: 168864 bytes leftover after parsing attributes in process `syz.4.75'. [ 194.024806][ T6489] syzkaller0: entered promiscuous mode [ 194.097129][ T6489] syzkaller0: entered allmulticast mode [ 194.234630][ T6496] netlink: 'syz.7.85': attribute type 10 has an invalid length. [ 194.265366][ T6496] netlink: 2 bytes leftover after parsing attributes in process `syz.7.85'. [ 194.558587][ T1289] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.565005][ T1289] ieee802154 phy1 wpan1: encryption failed: -22 [ 196.856777][ T6517] raw_sendmsg: syz.5.83 forgot to set AF_INET. Fix it! [ 196.881522][ T6519] -1: renamed from syzkaller0 [ 196.937065][ T11] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 197.094512][ T11] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 197.303892][ T11] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 197.475184][ T11] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 198.181617][ T6533] ref_tracker: memory allocation failure, unreliable refcount tracker. [ 198.560753][ T5796] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 198.571891][ T5796] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 198.586244][ T5796] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 198.606696][ T5796] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 198.640503][ T5796] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 198.650015][ T5796] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 198.782569][ T5796] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 198.799622][ T5796] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 198.814027][ T5796] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 198.859202][ T5796] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 198.878918][ T5796] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 198.887443][ T5796] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 198.896255][ T6549] syz.5.96[6549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.896630][ T6549] syz.5.96[6549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.305038][ T6540] chnl_net:caif_netlink_parms(): no params data found [ 199.497643][ T11] hsr_slave_0: left promiscuous mode [ 199.503948][ T11] hsr_slave_1: left promiscuous mode [ 199.510198][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 199.517619][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 199.527814][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 199.535587][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 199.544841][ T11] bond0: left allmulticast mode [ 199.550825][ T11] bond_slave_0: left allmulticast mode [ 199.556331][ T11] bond_slave_1: left allmulticast mode [ 199.562222][ T11] bridge0: port 3(bond0) entered disabled state [ 199.570796][ T11] bridge_slave_1: left allmulticast mode [ 199.576460][ T11] bridge_slave_1: left promiscuous mode [ 199.582629][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.592765][ T11] bridge_slave_0: left allmulticast mode [ 199.599980][ T11] bridge_slave_0: left promiscuous mode [ 199.605701][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.632007][ T11] veth1_macvtap: left promiscuous mode [ 199.637568][ T11] veth0_macvtap: left promiscuous mode [ 199.644659][ T11] veth1_vlan: left promiscuous mode [ 199.650914][ T11] veth0_vlan: left promiscuous mode [ 200.180567][ T11] team0 (unregistering): Port device team_slave_1 removed [ 200.228277][ T11] team0 (unregistering): Port device team_slave_0 removed [ 200.267894][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 200.277121][ T11] bond_slave_1 (unregistering): left promiscuous mode [ 200.323789][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 200.340623][ T11] bond_slave_0 (unregistering): left promiscuous mode [ 200.709433][ T5790] Bluetooth: hci0: command tx timeout [ 200.764215][ T11] bond0 (unregistering): Released all slaves [ 200.873461][ T6540] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.882344][ T6540] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.889970][ T6540] bridge_slave_0: entered allmulticast mode [ 200.897460][ T6540] bridge_slave_0: entered promiscuous mode [ 200.913495][ T6540] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.920894][ T6540] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.928565][ T6540] bridge_slave_1: entered allmulticast mode [ 200.943076][ T6540] bridge_slave_1: entered promiscuous mode [ 200.950254][ T5790] Bluetooth: hci1: command tx timeout [ 201.005853][ T6540] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 201.019062][ T6540] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.132135][ T6540] team0: Port device team_slave_0 added [ 201.141927][ T6540] team0: Port device team_slave_1 added [ 201.175901][ T6540] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 201.183438][ T6540] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 201.210240][ T6540] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 201.223271][ T6540] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 201.231577][ T6540] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 201.257730][ T6540] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 201.281818][ T6542] chnl_net:caif_netlink_parms(): no params data found [ 201.332115][ T6540] hsr_slave_0: entered promiscuous mode [ 201.339588][ T6540] hsr_slave_1: entered promiscuous mode [ 201.464830][ T6542] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.473070][ T6542] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.480758][ T6542] bridge_slave_0: entered allmulticast mode [ 201.487857][ T6542] bridge_slave_0: entered promiscuous mode [ 201.498632][ T6542] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.506199][ T6542] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.516354][ T6542] bridge_slave_1: entered allmulticast mode [ 201.524255][ T6542] bridge_slave_1: entered promiscuous mode [ 201.597312][ T6542] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 201.610891][ T6542] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.671778][ T6542] team0: Port device team_slave_0 added [ 201.696482][ T11] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 201.733153][ T6542] team0: Port device team_slave_1 added [ 201.766698][ T6542] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 201.773998][ T6542] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 201.800699][ T6542] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 201.826373][ T11] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 201.854074][ T6542] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 201.861402][ T6542] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 201.889134][ T6542] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 201.920451][ T11] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 201.997184][ T6542] hsr_slave_0: entered promiscuous mode [ 202.008559][ T6542] hsr_slave_1: entered promiscuous mode [ 202.015448][ T6542] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 202.026397][ T6542] Cannot create hsr debugfs directory [ 202.044923][ T11] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 202.332541][ T6540] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 202.358592][ T6540] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 202.368865][ T6540] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 202.380395][ T6540] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 202.495630][ T6542] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 202.507460][ T6542] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 202.524250][ T6542] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 202.534297][ T6542] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 202.687172][ T6540] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.749349][ T6540] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.775735][ T2882] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.782947][ T2882] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.796137][ T2882] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.803374][ T2882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.811348][ T5790] Bluetooth: hci0: command tx timeout [ 202.840058][ T6542] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.908382][ T6542] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.955842][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.963057][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.990290][ T2882] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.997536][ T2882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.030829][ T5790] Bluetooth: hci1: command tx timeout [ 203.377080][ T11] hsr_slave_0: left promiscuous mode [ 203.383353][ T11] hsr_slave_1: left promiscuous mode [ 203.395411][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 203.404153][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 203.414327][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 203.422011][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 203.430362][ T11] bond0: left allmulticast mode [ 203.435260][ T11] bond_slave_0: left allmulticast mode [ 203.441922][ T11] bond_slave_1: left allmulticast mode [ 203.447672][ T11] bridge0: port 3(bond0) entered disabled state [ 203.457333][ T11] bridge_slave_1: left allmulticast mode [ 203.463193][ T11] bridge_slave_1: left promiscuous mode [ 203.469302][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.477946][ T11] bridge_slave_0: left allmulticast mode [ 203.484138][ T11] bridge_slave_0: left promiscuous mode [ 203.490044][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.517023][ T11] veth1_macvtap: left promiscuous mode [ 203.523365][ T11] veth0_macvtap: left promiscuous mode [ 203.529966][ T11] veth1_vlan: left promiscuous mode [ 203.535283][ T11] veth0_vlan: left promiscuous mode [ 204.052626][ T11] team0 (unregistering): Port device team_slave_1 removed [ 204.094563][ T11] team0 (unregistering): Port device team_slave_0 removed [ 204.143877][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 204.153352][ T11] bond_slave_1 (unregistering): left promiscuous mode [ 204.194703][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 204.204414][ T11] bond_slave_0 (unregistering): left promiscuous mode [ 204.631805][ T11] bond0 (unregistering): Released all slaves [ 204.747355][ T6542] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 204.776857][ T6540] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 204.878359][ T5790] Bluetooth: hci0: command tx timeout [ 205.113767][ T5790] Bluetooth: hci1: command tx timeout [ 205.453766][ T6542] veth0_vlan: entered promiscuous mode [ 205.487583][ T6542] veth1_vlan: entered promiscuous mode [ 205.567013][ T6540] veth0_vlan: entered promiscuous mode [ 205.575417][ T6542] veth0_macvtap: entered promiscuous mode [ 205.594936][ T6542] veth1_macvtap: entered promiscuous mode [ 205.617783][ T6540] veth1_vlan: entered promiscuous mode [ 205.645738][ T6542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 205.656454][ T6542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.666834][ T6542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 205.677705][ T6542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.690770][ T6542] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 205.702931][ T6542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 205.714731][ T6542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.725142][ T6542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 205.736027][ T6542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.747567][ T6542] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 205.768894][ T6542] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.777643][ T6542] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.786768][ T6542] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.798473][ T6542] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.836451][ T6540] veth0_macvtap: entered promiscuous mode [ 205.854758][ T6540] veth1_macvtap: entered promiscuous mode [ 205.889653][ T6540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 205.904293][ T6540] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.917179][ T6540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 205.927979][ T6540] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.939478][ T6540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 205.950554][ T6540] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.962189][ T6540] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 206.002951][ T6540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 206.014204][ T6540] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.024298][ T6540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 206.035261][ T6540] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.045334][ T6540] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 206.055951][ T6540] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.070109][ T6540] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 206.083122][ T6540] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 206.092149][ T6540] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 206.102001][ T6540] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 206.110972][ T6540] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 206.125603][ T2882] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 206.136543][ T2882] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 206.193097][ T60] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 206.203888][ T60] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 206.262945][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 206.284234][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 206.320944][ T60] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 206.334918][ T60] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 206.437470][ T6600] netlink: 60 bytes leftover after parsing attributes in process `syz.8.94'. [ 206.502666][ T6600] netlink: 'syz.8.94': attribute type 1 has an invalid length. [ 206.522638][ T6603] FAULT_INJECTION: forcing a failure. [ 206.522638][ T6603] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 206.537548][ T6603] CPU: 1 PID: 6603 Comm: syz.5.104 Not tainted syzkaller #0 [ 206.544898][ T6603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 206.555023][ T6603] Call Trace: [ 206.555943][ T6600] netlink: 168864 bytes leftover after parsing attributes in process `syz.8.94'. [ 206.558317][ T6603] [ 206.558338][ T6603] dump_stack_lvl+0x16c/0x230 [ 206.558382][ T6603] ? show_regs_print_info+0x20/0x20 [ 206.558408][ T6603] ? load_image+0x3b0/0x3b0 [ 206.558432][ T6603] ? __might_fault+0xaa/0x120 [ 206.589618][ T6603] ? __lock_acquire+0x7c80/0x7c80 [ 206.594703][ T6603] should_fail_ex+0x39d/0x4d0 [ 206.599431][ T6603] _copy_from_user+0x2f/0xe0 [ 206.604058][ T6603] ___sys_sendmsg+0x159/0x290 [ 206.608788][ T6603] ? __sys_sendmsg+0x270/0x270 [ 206.613715][ T6603] ? __lock_acquire+0x7c80/0x7c80 [ 206.618802][ T6603] __se_sys_sendmsg+0x1a5/0x270 [ 206.623710][ T6603] ? __x64_sys_sendmsg+0x80/0x80 [ 206.628714][ T6603] ? lockdep_hardirqs_on+0x98/0x150 [ 206.633958][ T6603] do_syscall_64+0x55/0xb0 [ 206.638412][ T6603] ? clear_bhb_loop+0x40/0x90 [ 206.643120][ T6603] ? clear_bhb_loop+0x40/0x90 [ 206.647831][ T6603] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 206.653757][ T6603] RIP: 0033:0x7f9dd1b8f6c9 [ 206.658214][ T6603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 206.677870][ T6603] RSP: 002b:00007f9dd2985038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 206.686315][ T6603] RAX: ffffffffffffffda RBX: 00007f9dd1de6090 RCX: 00007f9dd1b8f6c9 [ 206.694312][ T6603] RDX: 0000000000000840 RSI: 00002000000000c0 RDI: 0000000000000005 [ 206.702303][ T6603] RBP: 00007f9dd2985090 R08: 0000000000000000 R09: 0000000000000000 [ 206.710308][ T6603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 206.718291][ T6603] R13: 00007f9dd1de6128 R14: 00007f9dd1de6090 R15: 00007ffd7fc3a008 [ 206.726291][ T6603] [ 206.947950][ T6606] syzkaller0: entered promiscuous mode [ 206.948781][ T5790] Bluetooth: hci0: command tx timeout [ 206.954481][ T6606] syzkaller0: entered allmulticast mode [ 207.025297][ T6609] -1: renamed from syzkaller0 [ 207.199805][ T5790] Bluetooth: hci1: command tx timeout [ 208.946213][ T6616] netlink: 8 bytes leftover after parsing attributes in process `syz.5.99'. [ 209.720832][ T6637] netlink: 4083 bytes leftover after parsing attributes in process `syz.7.107'. [ 209.746653][ T6637] netlink: 4083 bytes leftover after parsing attributes in process `syz.7.107'. [ 209.756464][ T6636] netlink: 4083 bytes leftover after parsing attributes in process `syz.7.107'. [ 209.779693][ T6637] netlink: 4083 bytes leftover after parsing attributes in process `syz.7.107'. [ 209.978271][ T6645] netlink: 60 bytes leftover after parsing attributes in process `syz.4.111'. [ 210.020641][ T6645] netlink: 'syz.4.111': attribute type 1 has an invalid length. [ 210.033945][ T6645] netlink: 168864 bytes leftover after parsing attributes in process `syz.4.111'. [ 210.362596][ T6651] syzkaller0: entered promiscuous mode [ 210.368516][ T6651] syzkaller0: entered allmulticast mode [ 210.507714][ T6658] mac80211_hwsim hwsim22 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 212.583297][ T6682] delete_channel: no stack [ 213.040579][ T6686] netlink: 'syz.5.121': attribute type 10 has an invalid length. [ 213.050443][ T6686] netlink: 2 bytes leftover after parsing attributes in process `syz.5.121'. [ 213.110741][ T12] wlan1: Trigger new scan to find an IBSS to join [ 213.928318][ T6695] netlink: 'syz.4.125': attribute type 10 has an invalid length. [ 214.236590][ T6695] team0: Port device wlan1 added [ 214.254782][ T6699] netlink: 'syz.5.126': attribute type 10 has an invalid length. [ 214.397526][ T6695] syz.4.125 (6695) used greatest stack depth: 18224 bytes left [ 214.462069][ T6699] team0: Port device wlan1 added [ 214.876389][ T6713] netlink: 199824 bytes leftover after parsing attributes in process `syz.5.130'. [ 215.642735][ T6719] netlink: 'syz.5.131': attribute type 10 has an invalid length. [ 215.703887][ T6721] netlink: 'syz.8.132': attribute type 10 has an invalid length. [ 215.706615][ T6718] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 215.728336][ T6721] netlink: 2 bytes leftover after parsing attributes in process `syz.8.132'. [ 215.754230][ T6721] bond0: entered promiscuous mode [ 215.772061][ T6721] bond_slave_0: entered promiscuous mode [ 215.777970][ T6721] bond_slave_1: entered promiscuous mode [ 215.810720][ T6721] bridge0: port 3(bond0) entered blocking state [ 215.823303][ T6721] bridge0: port 3(bond0) entered disabled state [ 215.830968][ T6721] bond0: entered allmulticast mode [ 215.836152][ T6721] bond_slave_0: entered allmulticast mode [ 215.847299][ T6721] bond_slave_1: entered allmulticast mode [ 215.857109][ T6721] bridge0: port 3(bond0) entered blocking state [ 215.863584][ T6721] bridge0: port 3(bond0) entered forwarding state [ 215.970941][ T6727] netlink: 60 bytes leftover after parsing attributes in process `syz.5.134'. [ 216.025157][ T6730] netlink: 'syz.5.134': attribute type 1 has an invalid length. [ 216.039179][ T6730] netlink: 168864 bytes leftover after parsing attributes in process `syz.5.134'. [ 216.460099][ T6730] syzkaller0: entered promiscuous mode [ 216.465734][ T6730] syzkaller0: entered allmulticast mode [ 216.487956][ T6746] netlink: 'syz.8.137': attribute type 10 has an invalid length. [ 216.554522][ T6746] team0: Port device wlan1 added [ 218.159288][ T6019] wlan1: Trigger new scan to find an IBSS to join [ 218.468871][ T6748] netlink: 'syz.4.138': attribute type 10 has an invalid length. [ 218.597113][ T6757] syzkaller0: entered promiscuous mode [ 218.603352][ T6757] syzkaller0: entered allmulticast mode [ 218.656121][ T6766] netlink: 'syz.4.141': attribute type 1 has an invalid length. [ 218.669669][ T6766] netlink: 168864 bytes leftover after parsing attributes in process `syz.4.141'. [ 219.130491][ T60] wlan1: Creating new IBSS network, BSSID 5a:44:d6:d8:e6:d3 [ 220.358338][ T6765] netlink: 60 bytes leftover after parsing attributes in process `syz.4.141'. [ 221.303400][ T6780] netlink: 'syz.7.144': attribute type 10 has an invalid length. [ 221.311923][ T6780] netlink: 2 bytes leftover after parsing attributes in process `syz.7.144'. [ 221.321401][ T6780] bond0: entered promiscuous mode [ 221.326834][ T6780] bond_slave_0: entered promiscuous mode [ 221.333839][ T6780] bond_slave_1: entered promiscuous mode [ 221.340955][ T6780] bridge0: port 3(bond0) entered blocking state [ 221.347485][ T6780] bridge0: port 3(bond0) entered disabled state [ 221.358382][ T6780] bond0: entered allmulticast mode [ 221.364170][ T6780] bond_slave_0: entered allmulticast mode [ 221.370790][ T6780] bond_slave_1: entered allmulticast mode [ 221.380024][ T6780] bridge0: port 3(bond0) entered blocking state [ 221.386527][ T6780] bridge0: port 3(bond0) entered forwarding state [ 221.651043][ T6794] netlink: 'syz.7.149': attribute type 10 has an invalid length. [ 221.891125][ T6794] team0: Port device wlan1 added [ 221.962796][ T6800] netlink: 'syz.8.150': attribute type 10 has an invalid length. [ 222.002244][ T6800] bridge0: port 3(bond0) entered disabled state [ 222.009030][ T6800] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.016749][ T6800] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.135981][ T6800] bridge0: port 3(bond0) entered blocking state [ 222.142503][ T6800] bridge0: port 3(bond0) entered forwarding state [ 222.149337][ T6800] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.156505][ T6800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.164073][ T6800] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.171325][ T6800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.242365][ T6800] bridge0: port 3(bond0) entered disabled state [ 222.249092][ T6800] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.256445][ T6800] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.264403][ T6809] syz.7.153 uses obsolete (PF_INET,SOCK_PACKET) [ 222.306352][ T6808] netlink: 'syz.7.153': attribute type 10 has an invalid length. [ 222.315611][ T6808] vlan0: entered allmulticast mode [ 222.342891][ T6808] veth0_vlan: entered allmulticast mode [ 222.377855][ T6808] team0: Port device vlan0 added [ 222.419178][ T6803] mac80211_hwsim hwsim11 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 223.195036][ T6813] syzkaller0: entered promiscuous mode [ 223.207920][ T6813] syzkaller0: entered allmulticast mode [ 224.151140][ T6019] wlan1: Trigger new scan to find an IBSS to join [ 225.251493][ T6828] netlink: 'syz.7.158': attribute type 10 has an invalid length. [ 225.259851][ T6828] netlink: 2 bytes leftover after parsing attributes in process `syz.7.158'. [ 225.470272][ T6838] netlink: 144 bytes leftover after parsing attributes in process `syz.7.162'. [ 225.528289][ T6838] FAULT_INJECTION: forcing a failure. [ 225.528289][ T6838] name failslab, interval 1, probability 0, space 0, times 0 [ 225.578164][ T6838] CPU: 0 PID: 6838 Comm: syz.7.162 Not tainted syzkaller #0 [ 225.585529][ T6838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 225.595630][ T6838] Call Trace: [ 225.598942][ T6838] [ 225.601901][ T6838] dump_stack_lvl+0x16c/0x230 [ 225.606658][ T6838] ? show_regs_print_info+0x20/0x20 [ 225.611898][ T6838] ? load_image+0x3b0/0x3b0 [ 225.616445][ T6838] ? __might_sleep+0xe0/0xe0 [ 225.621075][ T6838] ? __lock_acquire+0x7c80/0x7c80 [ 225.626142][ T6838] should_fail_ex+0x39d/0x4d0 [ 225.630872][ T6838] should_failslab+0x9/0x20 [ 225.635417][ T6838] slab_pre_alloc_hook+0x59/0x310 [ 225.640501][ T6838] ? lockdep_hardirqs_on+0x98/0x150 [ 225.645737][ T6838] kmem_cache_alloc_node+0x60/0x330 [ 225.650994][ T6838] ? __alloc_skb+0x108/0x2c0 [ 225.655652][ T6838] __alloc_skb+0x108/0x2c0 [ 225.660129][ T6838] netlink_ack+0x376/0x1110 [ 225.664683][ T6838] ? __dev_queue_xmit+0x245/0x35a0 [ 225.669838][ T6838] ? netlink_dump+0xde0/0xde0 [ 225.674559][ T6838] ? ref_tracker_free+0x634/0x7d0 [ 225.679613][ T6838] ? __copy_skb_header+0xa7/0x550 [ 225.684690][ T6838] netlink_rcv_skb+0x29a/0x480 [ 225.689495][ T6838] ? rtnetlink_bind+0x80/0x80 [ 225.694207][ T6838] ? netlink_ack+0x1110/0x1110 [ 225.699024][ T6838] ? __lock_acquire+0x7c80/0x7c80 [ 225.704106][ T6838] ? netlink_deliver_tap+0x2e/0x1b0 [ 225.709358][ T6838] netlink_unicast+0x751/0x8d0 [ 225.714183][ T6838] netlink_sendmsg+0x8c1/0xbe0 [ 225.719017][ T6838] ? netlink_getsockopt+0x580/0x580 [ 225.724260][ T6838] ? aa_sock_msg_perm+0x94/0x150 [ 225.729297][ T6838] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 225.734631][ T6838] ? security_socket_sendmsg+0x80/0xa0 [ 225.740135][ T6838] ? netlink_getsockopt+0x580/0x580 [ 225.745375][ T6838] ____sys_sendmsg+0x5bf/0x950 [ 225.750200][ T6838] ? __asan_memset+0x22/0x40 [ 225.754835][ T6838] ? __sys_sendmsg_sock+0x30/0x30 [ 225.759908][ T6838] ? __import_iovec+0x5f2/0x860 [ 225.764811][ T6838] ? import_iovec+0x73/0xa0 [ 225.769360][ T6838] ___sys_sendmsg+0x220/0x290 [ 225.774089][ T6838] ? __sys_sendmsg+0x270/0x270 [ 225.778919][ T6838] ? __lock_acquire+0x7c80/0x7c80 [ 225.784005][ T6838] __se_sys_sendmsg+0x1a5/0x270 [ 225.788903][ T6838] ? perf_trace_preemptirq_template+0x281/0x340 [ 225.795187][ T6838] ? __x64_sys_sendmsg+0x80/0x80 [ 225.800182][ T6838] ? lockdep_hardirqs_on+0x98/0x150 [ 225.805413][ T6838] do_syscall_64+0x55/0xb0 [ 225.809866][ T6838] ? clear_bhb_loop+0x40/0x90 [ 225.814576][ T6838] ? clear_bhb_loop+0x40/0x90 [ 225.819290][ T6838] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 225.825211][ T6838] RIP: 0033:0x7faead18f6c9 [ 225.829658][ T6838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 225.849309][ T6838] RSP: 002b:00007faeadfc5038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 225.857760][ T6838] RAX: ffffffffffffffda RBX: 00007faead3e5fa0 RCX: 00007faead18f6c9 [ 225.865766][ T6838] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 225.873770][ T6838] RBP: 00007faeadfc5090 R08: 0000000000000000 R09: 0000000000000000 [ 225.881768][ T6838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 225.889765][ T6838] R13: 00007faead3e6038 R14: 00007faead3e5fa0 R15: 00007ffeccf52878 [ 225.897805][ T6838] [ 226.169700][ T6848] syz.5.164: vmalloc error: size 8589938688, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz5,mems_allowed=0-1 [ 226.193918][ T6848] CPU: 1 PID: 6848 Comm: syz.5.164 Not tainted syzkaller #0 [ 226.201280][ T6848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 226.211380][ T6848] Call Trace: [ 226.214722][ T6848] [ 226.217687][ T6848] dump_stack_lvl+0x16c/0x230 [ 226.222426][ T6848] ? show_regs_print_info+0x20/0x20 [ 226.227681][ T6848] ? load_image+0x3b0/0x3b0 [ 226.232232][ T6848] ? cpuset_print_current_mems_allowed+0x1f/0x360 [ 226.238698][ T6848] ? cpuset_print_current_mems_allowed+0x2e3/0x360 [ 226.245248][ T6848] warn_alloc+0x210/0x300 [ 226.249636][ T6848] ? zone_watermark_ok_safe+0x230/0x230 [ 226.255239][ T6848] ? kasan_set_track+0x5f/0x70 [ 226.260039][ T6848] ? kasan_set_track+0x4e/0x70 [ 226.264843][ T6848] ? __kasan_kmalloc+0x8f/0xa0 [ 226.269654][ T6848] ? xsk_init_queue+0xb0/0x110 [ 226.274456][ T6848] ? xsk_setsockopt+0x4db/0x6f0 [ 226.279344][ T6848] ? do_sock_setsockopt+0x175/0x1a0 [ 226.284601][ T6848] ? __x64_sys_setsockopt+0x184/0x200 [ 226.290028][ T6848] __vmalloc_node_range+0x126/0x1320 [ 226.295409][ T6848] ? free_vm_area+0x50/0x50 [ 226.299961][ T6848] vmalloc_user+0x74/0x80 [ 226.304317][ T6848] ? xskq_create+0xbf/0x170 [ 226.308840][ T6848] xskq_create+0xbf/0x170 [ 226.313189][ T6848] xsk_init_queue+0xb0/0x110 [ 226.317798][ T6848] xsk_setsockopt+0x4db/0x6f0 [ 226.322500][ T6848] ? xsk_poll+0x670/0x670 [ 226.326845][ T6848] ? __fget_files+0x28/0x4d0 [ 226.331452][ T6848] ? aa_sock_opt_perm+0x74/0x100 [ 226.336418][ T6848] ? bpf_lsm_socket_setsockopt+0x9/0x10 [ 226.342007][ T6848] ? security_socket_setsockopt+0x7e/0xa0 [ 226.347762][ T6848] ? xsk_poll+0x670/0x670 [ 226.352213][ T6848] do_sock_setsockopt+0x175/0x1a0 [ 226.357266][ T6848] ? __fdget+0x180/0x210 [ 226.361531][ T6848] __x64_sys_setsockopt+0x184/0x200 [ 226.366757][ T6848] do_syscall_64+0x55/0xb0 [ 226.371190][ T6848] ? clear_bhb_loop+0x40/0x90 [ 226.375880][ T6848] ? clear_bhb_loop+0x40/0x90 [ 226.380664][ T6848] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 226.386575][ T6848] RIP: 0033:0x7f9dd1b8f6c9 [ 226.391002][ T6848] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 226.410620][ T6848] RSP: 002b:00007f9dd2985038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 226.419051][ T6848] RAX: ffffffffffffffda RBX: 00007f9dd1de6090 RCX: 00007f9dd1b8f6c9 [ 226.427034][ T6848] RDX: 0000000000000002 RSI: 000000000000011b RDI: 0000000000000012 [ 226.435014][ T6848] RBP: 00007f9dd1c11f91 R08: 0000000000000004 R09: 0000000000000000 [ 226.442996][ T6848] R10: 0000200000000900 R11: 0000000000000246 R12: 0000000000000000 [ 226.450980][ T6848] R13: 00007f9dd1de6128 R14: 00007f9dd1de6090 R15: 00007ffd7fc3a008 [ 226.458975][ T6848] [ 226.489835][ T6848] Mem-Info: [ 226.493316][ T6848] active_anon:7978 inactive_anon:0 isolated_anon:0 [ 226.493316][ T6848] active_file:3016 inactive_file:39918 isolated_file:0 [ 226.493316][ T6848] unevictable:768 dirty:32 writeback:0 [ 226.493316][ T6848] slab_reclaimable:10449 slab_unreclaimable:96950 [ 226.493316][ T6848] mapped:26279 shmem:1397 pagetables:457 [ 226.493316][ T6848] sec_pagetables:0 bounce:0 [ 226.493316][ T6848] kernel_misc_reclaimable:0 [ 226.493316][ T6848] free:1351272 free_pcp:12838 free_cma:0 [ 226.540665][ T6848] Node 0 active_anon:31912kB inactive_anon:0kB active_file:12064kB inactive_file:159468kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:105116kB dirty:128kB writeback:0kB shmem:4052kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:11120kB pagetables:1828kB sec_pagetables:0kB all_unreclaimable? no [ 226.580228][ T6848] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:1536kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB sec_pagetables:0kB all_unreclaimable? no [ 226.622993][ T6848] Node 0 DMA free:15360kB boost:0kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 226.664270][ T6848] lowmem_reserve[]: 0 2525 2526 2526 2526 [ 226.670650][ T6848] Node 0 DMA32 free:1500132kB boost:0kB min:34676kB low:43344kB high:52012kB reserved_highatomic:0KB active_anon:31864kB inactive_anon:0kB active_file:12064kB inactive_file:158156kB unevictable:1536kB writepending:128kB present:3129332kB managed:2589600kB mlocked:0kB bounce:0kB free_pcp:28744kB local_pcp:18032kB free_cma:0kB [ 226.713676][ T6848] lowmem_reserve[]: 0 0 1 1 1 [ 226.726082][ T6848] Node 0 Normal free:16kB boost:0kB min:16kB low:20kB high:24kB reserved_highatomic:0KB active_anon:48kB inactive_anon:0kB active_file:0kB inactive_file:1312kB unevictable:0kB writepending:0kB present:1048576kB managed:1384kB mlocked:0kB bounce:0kB free_pcp:8kB local_pcp:8kB free_cma:0kB [ 226.761032][ T6848] lowmem_reserve[]: 0 0 0 0 0 [ 226.766064][ T6848] Node 1 Normal free:3889580kB boost:0kB min:55208kB low:69008kB high:82808kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB writepending:0kB present:4194304kB managed:4117312kB mlocked:0kB bounce:0kB free_pcp:22916kB local_pcp:12128kB free_cma:0kB [ 226.804373][ T6848] lowmem_reserve[]: 0 0 0 0 0 [ 226.812810][ T6848] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 226.840381][ T6848] Node 0 DMA32: 1*4kB (U) 104*8kB (M) 110*16kB (UM) 52*32kB (ME) 29*64kB (UM) 6*128kB (UM) 3*256kB (UME) 3*512kB (UME) 2*1024kB (U) 1*2048kB (M) 363*4096kB (M) = 1500132kB [ 226.877735][ T6848] Node 0 Normal: 0*4kB 0*8kB 1*16kB (M) 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 16kB [ 226.897670][ T6848] Node 1 Normal: 255*4kB (U) 48*8kB (UME) 43*16kB (UME) 54*32kB (UME) 21*64kB (UE) 7*128kB (UME) 0*256kB 3*512kB (UME) 1*1024kB (E) 1*2048kB (E) 947*4096kB (M) = 3889580kB [ 226.932440][ T6848] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 226.956895][ T6848] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 226.971620][ T6848] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 226.982986][ T6848] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 226.997791][ T6848] 44331 total pagecache pages [ 227.004508][ T6848] 0 pages in swap cache [ 227.013855][ T6848] Free swap = 124996kB [ 227.018289][ T6848] Total swap = 124996kB [ 227.022512][ T6848] 2097051 pages RAM [ 227.026361][ T6848] 0 pages HighMem/MovableOnly [ 227.041140][ T6848] 416137 pages reserved [ 227.045729][ T6848] 0 pages cma reserved [ 227.125426][ T6019] wlan1: Trigger new scan to find an IBSS to join [ 229.029005][ T6019] wlan1: Creating new IBSS network, BSSID f2:92:67:02:05:21 [ 229.628396][ T6862] netlink: 'syz.4.169': attribute type 10 has an invalid length. [ 230.208405][ T6869] syzkaller0: entered promiscuous mode [ 230.214139][ T6869] syzkaller0: entered allmulticast mode [ 230.290189][ T6871] netlink: 'syz.5.171': attribute type 10 has an invalid length. [ 230.399468][ T6871] netlink: 2 bytes leftover after parsing attributes in process `syz.5.171'. [ 230.582450][ T6878] netlink: 'syz.5.173': attribute type 33 has an invalid length. [ 232.975059][ T6898] netlink: 65051 bytes leftover after parsing attributes in process `syz.5.177'. [ 233.076312][ T6900] netlink: 'syz.8.175': attribute type 10 has an invalid length. [ 233.091872][ T6900] bridge0: port 3(bond0) entered blocking state [ 233.098395][ T6900] bridge0: port 3(bond0) entered forwarding state [ 233.105208][ T6900] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.112449][ T6900] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.120009][ T6900] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.127232][ T6900] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.155605][ T6900] bridge0: port 3(bond0) entered disabled state [ 233.162215][ T6900] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.169531][ T6900] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.404393][ T6913] netlink: 'syz.5.180': attribute type 21 has an invalid length. [ 234.489362][ T6915] netlink: 'syz.7.181': attribute type 10 has an invalid length. [ 234.497173][ T6915] netlink: 2 bytes leftover after parsing attributes in process `syz.7.181'. [ 235.090862][ T6929] syzkaller0: entered promiscuous mode [ 235.096402][ T6929] syzkaller0: entered allmulticast mode [ 237.163951][ T6933] netlink: 65051 bytes leftover after parsing attributes in process `syz.4.187'. [ 237.484214][ T6944] netlink: 'syz.4.198': attribute type 10 has an invalid length. [ 237.509404][ T6943] netlink: 'syz.7.191': attribute type 10 has an invalid length. [ 237.517323][ T6943] netlink: 2 bytes leftover after parsing attributes in process `syz.7.191'. [ 237.544213][ T6947] netlink: 'syz.8.190': attribute type 10 has an invalid length. [ 237.652942][ T6947] bridge0: port 3(bond0) entered blocking state [ 237.659464][ T6947] bridge0: port 3(bond0) entered forwarding state [ 237.666287][ T6947] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.673684][ T6947] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.681406][ T6947] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.688683][ T6947] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.005443][ T6947] bridge0: port 3(bond0) entered disabled state [ 238.012823][ T6947] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.020179][ T6947] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.326719][ T6952] netlink: 40 bytes leftover after parsing attributes in process `syz.5.194'. [ 238.394138][ T6950] netlink: 212912 bytes leftover after parsing attributes in process `syz.7.193'. [ 238.488575][ T6950] openvswitch: netlink: IP tunnel dst address not specified [ 238.758966][ T6954] netlink: set zone limit has 8 unknown bytes [ 239.034754][ T6961] netlink: 'syz.5.195': attribute type 10 has an invalid length. [ 239.189437][ T6961] bridge0: port 3(bond0) entered disabled state [ 239.196244][ T6961] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.204028][ T6961] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.644768][ T6961] bridge0: port 3(bond0) entered blocking state [ 239.651252][ T6961] bridge0: port 3(bond0) entered forwarding state [ 239.658130][ T6961] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.665448][ T6961] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.673043][ T6961] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.680300][ T6961] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.978790][ T6961] bridge0: port 3(bond0) entered disabled state [ 239.985311][ T6961] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.992715][ T6961] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.969948][ T6969] syzkaller0: entered promiscuous mode [ 240.975486][ T6969] syzkaller0: entered allmulticast mode [ 243.268948][ T6977] netlink: 65051 bytes leftover after parsing attributes in process `syz.7.200'. [ 243.979997][ T6984] netlink: 'syz.5.203': attribute type 10 has an invalid length. [ 243.987919][ T6984] netlink: 2 bytes leftover after parsing attributes in process `syz.5.203'. [ 244.267802][ T6992] netlink: 60 bytes leftover after parsing attributes in process `syz.8.206'. [ 244.293345][ T6992] netlink: 'syz.8.206': attribute type 1 has an invalid length. [ 244.328247][ T6992] netlink: 168864 bytes leftover after parsing attributes in process `syz.8.206'. [ 244.417441][ T6997] syzkaller0: entered promiscuous mode [ 244.427772][ T6997] syzkaller0: entered allmulticast mode [ 244.460295][ T7001] netlink: 'syz.4.217': attribute type 10 has an invalid length. [ 244.472085][ T7001] netlink: 2 bytes leftover after parsing attributes in process `syz.4.217'. [ 244.481532][ T7001] bond0: entered promiscuous mode [ 244.486682][ T7001] bond_slave_0: entered promiscuous mode [ 244.494045][ T7001] bond_slave_1: entered promiscuous mode [ 244.502014][ T7001] bridge0: entered promiscuous mode [ 244.508249][ T7001] bridge0: port 3(bond0) entered blocking state [ 244.514844][ T7001] bridge0: port 3(bond0) entered disabled state [ 244.521946][ T7001] bond0: entered allmulticast mode [ 244.528714][ T7001] bond_slave_0: entered allmulticast mode [ 244.534683][ T7001] bond_slave_1: entered allmulticast mode [ 244.543249][ T7001] bridge0: entered allmulticast mode [ 244.569092][ T7001] bond0: left allmulticast mode [ 244.584455][ T7001] bond_slave_0: left allmulticast mode [ 244.667559][ T7001] bond_slave_1: left allmulticast mode [ 244.674632][ T7001] bridge0: left allmulticast mode [ 244.735585][ T7002] netlink: 10 bytes leftover after parsing attributes in process `syz.8.206'. [ 244.818965][ T7004] netlink: 'syz.5.209': attribute type 10 has an invalid length. [ 244.858574][ T7004] bridge0: port 3(bond0) entered blocking state [ 244.865061][ T7004] bridge0: port 3(bond0) entered forwarding state [ 244.871930][ T7004] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.879170][ T7004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 244.886979][ T7004] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.894257][ T7004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.931710][ T7004] bridge0: port 3(bond0) entered disabled state [ 244.938314][ T7004] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.945552][ T7004] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.094888][ T7006] syzkaller0: entered promiscuous mode [ 245.110156][ T7006] syzkaller0: entered allmulticast mode [ 248.915081][ T7024] netlink: 'syz.7.211': attribute type 10 has an invalid length. [ 248.984649][ T7024] bridge0: port 3(bond0) entered disabled state [ 248.991470][ T7024] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.999277][ T7024] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.049212][ T7024] bridge0: port 3(bond0) entered blocking state [ 249.055673][ T7024] bridge0: port 3(bond0) entered forwarding state [ 249.062513][ T7024] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.069758][ T7024] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.077301][ T7024] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.084593][ T7024] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.127401][ T7024] bridge0: port 3(bond0) entered disabled state [ 249.133988][ T7024] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.141327][ T7024] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.552168][ T7033] netlink: 'syz.4.214': attribute type 10 has an invalid length. [ 251.618151][ T7050] netlink: 'syz.5.219': attribute type 10 has an invalid length. [ 251.625946][ T7050] netlink: 2 bytes leftover after parsing attributes in process `syz.5.219'. [ 252.047099][ T7054] syzkaller0: entered promiscuous mode [ 252.088715][ T7054] syzkaller0: entered allmulticast mode [ 252.276617][ T7057] bond0: left allmulticast mode [ 252.281999][ T7057] bond_slave_0: left allmulticast mode [ 252.295494][ T7057] bond_slave_1: left allmulticast mode [ 252.307119][ T7057] bridge0: port 3(bond0) entered disabled state [ 252.329732][ T7057] bridge_slave_1: left allmulticast mode [ 252.335501][ T7057] bridge_slave_1: left promiscuous mode [ 252.343084][ T7057] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.356490][ T7057] bridge_slave_0: left allmulticast mode [ 252.362678][ T7057] bridge_slave_0: left promiscuous mode [ 252.373238][ T7057] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.730525][ T7064] netlink: 'syz.5.223': attribute type 1 has an invalid length. [ 252.739360][ T7064] netlink: 168864 bytes leftover after parsing attributes in process `syz.5.223'. [ 252.756473][ T7065] FAULT_INJECTION: forcing a failure. [ 252.756473][ T7065] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 252.784001][ T7065] CPU: 0 PID: 7065 Comm: syz.4.224 Not tainted syzkaller #0 [ 252.791369][ T7065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 252.801480][ T7065] Call Trace: [ 252.804883][ T7065] [ 252.807872][ T7065] dump_stack_lvl+0x16c/0x230 [ 252.812617][ T7065] ? show_regs_print_info+0x20/0x20 [ 252.817874][ T7065] ? load_image+0x3b0/0x3b0 [ 252.822417][ T7065] ? __lock_acquire+0x7c80/0x7c80 [ 252.827459][ T7065] ? mark_lock+0x94/0x320 [ 252.831804][ T7065] should_fail_ex+0x39d/0x4d0 [ 252.836685][ T7065] prepare_alloc_pages+0x1e2/0x5f0 [ 252.841845][ T7065] __alloc_pages+0x127/0x460 [ 252.846491][ T7065] ? zone_statistics+0x170/0x170 [ 252.851459][ T7065] ? do_wp_page+0x826/0x3630 [ 252.856081][ T7065] ? do_wp_page+0x1024/0x3630 [ 252.860790][ T7065] __folio_alloc+0x10/0x20 [ 252.865230][ T7065] vma_alloc_folio+0x47a/0x8f0 [ 252.870038][ T7065] do_wp_page+0x128e/0x3630 [ 252.874612][ T7065] ? folio_put+0xd0/0xd0 [ 252.878904][ T7065] ? do_raw_spin_lock+0x121/0x2c0 [ 252.883979][ T7065] ? __rwlock_init+0x150/0x150 [ 252.888807][ T7065] ? handle_mm_fault+0xd1/0x4920 [ 252.893802][ T7065] handle_mm_fault+0x12d4/0x4920 [ 252.898815][ T7065] ? handle_mm_fault+0xd1/0x4920 [ 252.903847][ T7065] ? numa_migrate_prep+0x350/0x350 [ 252.909125][ T7065] ? lock_mm_and_find_vma+0x9c/0x300 [ 252.914568][ T7065] do_user_addr_fault+0x738/0x12e0 [ 252.919765][ T7065] exc_page_fault+0x67/0x110 [ 252.924405][ T7065] asm_exc_page_fault+0x26/0x30 [ 252.929301][ T7065] RIP: 0010:rep_movs_alternative+0x33/0x90 [ 252.935167][ T7065] Code: 40 83 f9 08 73 21 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 8b 06 <48> 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 df 83 f9 08 73 e8 eb [ 252.954819][ T7065] RSP: 0018:ffffc9000f7f7cd0 EFLAGS: 00050212 [ 252.960939][ T7065] RAX: 0000000000000000 RBX: 0000000000000010 RCX: 0000000000000010 [ 252.968954][ T7065] RDX: 0000000000000000 RSI: ffff8880251c7880 RDI: 0000200000001680 [ 252.976962][ T7065] RBP: ffffc9000f7f7dd8 R08: ffff8880251c788f R09: 1ffff11004a38f11 [ 252.984976][ T7065] R10: dffffc0000000000 R11: ffffed1004a38f12 R12: 0000200000001690 [ 252.992991][ T7065] R13: 0000000000000000 R14: 0000200000001680 R15: ffff8880251c7880 [ 253.001024][ T7065] _copy_to_user+0x85/0xa0 [ 253.005586][ T7065] map_lookup_and_delete_elem+0x8b0/0xa50 [ 253.011366][ T7065] __sys_bpf+0x4ca/0x800 [ 253.015660][ T7065] ? bpf_link_show_fdinfo+0x350/0x350 [ 253.021098][ T7065] ? lock_chain_count+0x20/0x20 [ 253.026012][ T7065] __x64_sys_bpf+0x7c/0x90 [ 253.030494][ T7065] do_syscall_64+0x55/0xb0 [ 253.034955][ T7065] ? clear_bhb_loop+0x40/0x90 [ 253.039682][ T7065] ? clear_bhb_loop+0x40/0x90 [ 253.044393][ T7065] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 253.050305][ T7065] RIP: 0033:0x7f4e2f38f6c9 [ 253.054743][ T7065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 253.074366][ T7065] RSP: 002b:00007f4e30220038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 253.082787][ T7065] RAX: ffffffffffffffda RBX: 00007f4e2f5e6090 RCX: 00007f4e2f38f6c9 [ 253.090778][ T7065] RDX: 0000000000000020 RSI: 0000200000000580 RDI: 0000000000000015 [ 253.098756][ T7065] RBP: 00007f4e30220090 R08: 0000000000000000 R09: 0000000000000000 [ 253.106746][ T7065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 253.114745][ T7065] R13: 00007f4e2f5e6128 R14: 00007f4e2f5e6090 R15: 00007ffd5f7e8b68 [ 253.122762][ T7065] [ 254.719228][ T7061] netlink: 60 bytes leftover after parsing attributes in process `syz.5.223'. [ 254.742423][ T7073] netlink: 10 bytes leftover after parsing attributes in process `syz.5.223'. [ 255.060549][ T7084] netlink: 'syz.8.227': attribute type 10 has an invalid length. [ 255.149958][ T7084] bridge0: port 3(bond0) entered blocking state [ 255.156446][ T7084] bridge0: port 3(bond0) entered forwarding state [ 255.163446][ T7084] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.170754][ T7084] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.178449][ T7084] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.185744][ T7084] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.244240][ T7084] bridge0: port 3(bond0) entered disabled state [ 255.250890][ T7084] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.258303][ T7084] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.387692][ T7091] netlink: 'syz.7.229': attribute type 10 has an invalid length. [ 255.496605][ T7091] bridge0: port 3(bond0) entered blocking state [ 255.503126][ T7091] bridge0: port 3(bond0) entered forwarding state [ 255.510030][ T7091] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.517254][ T7091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.524824][ T7091] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.532108][ T7091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.329140][ T1289] ieee802154 phy0 wpan0: encryption failed: -22 [ 256.335748][ T1289] ieee802154 phy1 wpan1: encryption failed: -22 [ 256.468196][ T7091] bridge0: port 3(bond0) entered disabled state [ 256.474788][ T7091] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.482221][ T7091] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.512588][ T7102] FAULT_INJECTION: forcing a failure. [ 257.512588][ T7102] name failslab, interval 1, probability 0, space 0, times 0 [ 257.563622][ T7102] CPU: 0 PID: 7102 Comm: syz.4.232 Not tainted syzkaller #0 [ 257.570995][ T7102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 257.581093][ T7102] Call Trace: [ 257.584406][ T7102] [ 257.587371][ T7102] dump_stack_lvl+0x16c/0x230 [ 257.592110][ T7102] ? show_regs_print_info+0x20/0x20 [ 257.597361][ T7102] ? load_image+0x3b0/0x3b0 [ 257.601917][ T7102] ? __lock_acquire+0x7c80/0x7c80 [ 257.607005][ T7102] should_fail_ex+0x39d/0x4d0 [ 257.611735][ T7102] should_failslab+0x9/0x20 [ 257.616290][ T7102] slab_pre_alloc_hook+0x59/0x310 [ 257.621365][ T7102] ? __lock_acquire+0x7c80/0x7c80 [ 257.626437][ T7102] kmem_cache_alloc+0x5a/0x2e0 [ 257.631254][ T7102] ? security_file_alloc+0x34/0x120 [ 257.636506][ T7102] security_file_alloc+0x34/0x120 [ 257.641674][ T7102] init_file+0x94/0x1f0 [ 257.645885][ T7102] alloc_empty_file+0xb7/0x1d0 [ 257.650714][ T7102] alloc_file+0x5c/0x600 [ 257.655015][ T7102] alloc_file_pseudo+0x17e/0x200 [ 257.660016][ T7102] ? alloc_empty_backing_file+0xe0/0xe0 [ 257.665702][ T7102] ? __lock_acquire+0x7c80/0x7c80 [ 257.670767][ T7102] ? __local_bh_enable_ip+0x12e/0x1c0 [ 257.676184][ T7102] ? _local_bh_enable+0xa0/0xa0 [ 257.681081][ T7102] anon_inode_getfile+0xc5/0x1a0 [ 257.686076][ T7102] bpf_link_prime+0xa6/0x1d0 [ 257.690711][ T7102] bpf_raw_tp_link_attach+0x33c/0x560 [ 257.696132][ T7102] ? bpf_insn_prepare_dump+0x840/0x840 [ 257.701660][ T7102] bpf_raw_tracepoint_open+0x197/0x210 [ 257.707163][ T7102] __sys_bpf+0x364/0x800 [ 257.711459][ T7102] ? bpf_link_show_fdinfo+0x350/0x350 [ 257.716914][ T7102] ? lock_chain_count+0x20/0x20 [ 257.721923][ T7102] __x64_sys_bpf+0x7c/0x90 [ 257.726395][ T7102] do_syscall_64+0x55/0xb0 [ 257.730872][ T7102] ? clear_bhb_loop+0x40/0x90 [ 257.735601][ T7102] ? clear_bhb_loop+0x40/0x90 [ 257.740333][ T7102] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 257.746281][ T7102] RIP: 0033:0x7f4e2f38f6c9 [ 257.750741][ T7102] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 257.770387][ T7102] RSP: 002b:00007f4e30241038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 257.778846][ T7102] RAX: ffffffffffffffda RBX: 00007f4e2f5e5fa0 RCX: 00007f4e2f38f6c9 [ 257.786859][ T7102] RDX: 0000000000000010 RSI: 0000200000000200 RDI: 0000000000000011 [ 257.794844][ T7102] RBP: 00007f4e30241090 R08: 0000000000000000 R09: 0000000000000000 [ 257.802831][ T7102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 257.810903][ T7102] R13: 00007f4e2f5e6038 R14: 00007f4e2f5e5fa0 R15: 00007ffd5f7e8b68 [ 257.818913][ T7102] [ 257.919790][ T7104] FAULT_INJECTION: forcing a failure. [ 257.919790][ T7104] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 257.998269][ T7104] CPU: 0 PID: 7104 Comm: syz.5.231 Not tainted syzkaller #0 [ 258.005652][ T7104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 258.015752][ T7104] Call Trace: [ 258.019156][ T7104] [ 258.022126][ T7104] dump_stack_lvl+0x16c/0x230 [ 258.026869][ T7104] ? show_regs_print_info+0x20/0x20 [ 258.032118][ T7104] ? load_image+0x3b0/0x3b0 [ 258.036667][ T7104] ? __might_fault+0xaa/0x120 [ 258.041386][ T7104] ? __lock_acquire+0x7c80/0x7c80 [ 258.046461][ T7104] should_fail_ex+0x39d/0x4d0 [ 258.051205][ T7104] _copy_from_user+0x2f/0xe0 [ 258.055843][ T7104] kstrtouint_from_user+0xc2/0x150 [ 258.061003][ T7104] ? kstrtol_from_user+0x150/0x150 [ 258.066189][ T7104] proc_fail_nth_write+0x89/0x240 [ 258.071276][ T7104] ? proc_fail_nth_read+0x250/0x250 [ 258.076533][ T7104] ? proc_fail_nth_read+0x250/0x250 [ 258.081780][ T7104] vfs_write+0x288/0x940 [ 258.086084][ T7104] ? file_end_write+0x250/0x250 [ 258.090988][ T7104] ? __fget_files+0x28/0x4d0 [ 258.095618][ T7104] ? __fget_files+0x44a/0x4d0 [ 258.100351][ T7104] ? __fdget_pos+0x2a3/0x330 [ 258.104984][ T7104] ? ksys_write+0x75/0x250 [ 258.109448][ T7104] ksys_write+0x147/0x250 [ 258.113829][ T7104] ? __ia32_sys_read+0x90/0x90 [ 258.118640][ T7104] ? lockdep_hardirqs_on+0x98/0x150 [ 258.123876][ T7104] do_syscall_64+0x55/0xb0 [ 258.128332][ T7104] ? clear_bhb_loop+0x40/0x90 [ 258.133049][ T7104] ? clear_bhb_loop+0x40/0x90 [ 258.137768][ T7104] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 258.143700][ T7104] RIP: 0033:0x7f9dd1b8e17f [ 258.148154][ T7104] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 258.167807][ T7104] RSP: 002b:00007f9dd2985030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 258.176320][ T7104] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9dd1b8e17f [ 258.184334][ T7104] RDX: 0000000000000001 RSI: 00007f9dd29850a0 RDI: 0000000000000011 [ 258.192438][ T7104] RBP: 00007f9dd2985090 R08: 0000000000000000 R09: 0000000000000000 [ 258.200540][ T7104] R10: 0000200000000100 R11: 0000000000000293 R12: 0000000000000001 [ 258.208550][ T7104] R13: 00007f9dd1de6128 R14: 00007f9dd1de6090 R15: 00007ffd7fc3a008 [ 258.216594][ T7104] [ 258.435728][ T7109] netlink: 'syz.4.234': attribute type 10 has an invalid length. [ 259.042556][ T60] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 259.363532][ T7118] netlink: 'syz.5.236': attribute type 10 has an invalid length. [ 260.426184][ T7125] netlink: 60 bytes leftover after parsing attributes in process `syz.8.237'. [ 260.450968][ T7125] netlink: 'syz.8.237': attribute type 1 has an invalid length. [ 260.476375][ T7125] netlink: 168864 bytes leftover after parsing attributes in process `syz.8.237'. [ 260.670232][ T7127] syzkaller0: entered promiscuous mode [ 260.683249][ T7127] syzkaller0: entered allmulticast mode [ 260.756005][ T7128] syzkaller0: entered promiscuous mode [ 260.761679][ T7128] syzkaller0: entered allmulticast mode [ 260.812851][ T7125] netlink: 10 bytes leftover after parsing attributes in process `syz.8.237'. [ 264.417563][ T7135] netlink: 'syz.8.239': attribute type 10 has an invalid length. [ 264.427001][ T7135] netlink: 2 bytes leftover after parsing attributes in process `syz.8.239'. [ 265.669198][ T7153] netlink: 60 bytes leftover after parsing attributes in process `syz.8.248'. [ 265.688708][ T7153] netlink: 'syz.8.248': attribute type 1 has an invalid length. [ 265.706225][ T7154] netlink: 'syz.7.246': attribute type 10 has an invalid length. [ 265.714265][ T7153] netlink: 168864 bytes leftover after parsing attributes in process `syz.8.248'. [ 265.743794][ T7154] bridge0: port 3(bond0) entered blocking state [ 265.750338][ T7154] bridge0: port 3(bond0) entered forwarding state [ 265.757174][ T7154] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.764540][ T7154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.772120][ T7154] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.779427][ T7154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.958514][ T7154] bridge0: port 3(bond0) entered disabled state [ 265.965084][ T7154] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.972396][ T7154] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.440672][ T7170] netlink: 'syz.5.250': attribute type 10 has an invalid length. [ 266.473965][ T7170] netlink: 2 bytes leftover after parsing attributes in process `syz.5.250'. [ 266.535789][ T7176] netlink: 10 bytes leftover after parsing attributes in process `syz.8.248'. [ 266.817340][ T7165] syzkaller0: entered promiscuous mode [ 266.859986][ T7165] syzkaller0: entered allmulticast mode [ 269.426383][ T7185] netlink: 'syz.5.251': attribute type 10 has an invalid length. [ 270.283493][ T7200] netlink: 'syz.4.257': attribute type 10 has an invalid length. [ 271.516306][ T7212] netlink: 60 bytes leftover after parsing attributes in process `syz.7.261'. [ 271.537834][ T7212] netlink: 'syz.7.261': attribute type 1 has an invalid length. [ 271.545915][ T7212] netlink: 168864 bytes leftover after parsing attributes in process `syz.7.261'. [ 271.562987][ T7211] netlink: 'syz.5.260': attribute type 10 has an invalid length. [ 271.576757][ T7211] netlink: 2 bytes leftover after parsing attributes in process `syz.5.260'. [ 271.808570][ T7215] syzkaller0: entered promiscuous mode [ 271.814157][ T7215] syzkaller0: entered allmulticast mode [ 271.895365][ T7212] netlink: 10 bytes leftover after parsing attributes in process `syz.7.261'. [ 272.064870][ T7218] syzkaller0: entered promiscuous mode [ 272.072509][ T7218] syzkaller0: entered allmulticast mode [ 275.758474][ T7242] netlink: 'syz.8.268': attribute type 10 has an invalid length. [ 275.779579][ T7242] bridge0: port 3(bond0) entered blocking state [ 275.786016][ T7242] bridge0: port 3(bond0) entered forwarding state [ 275.793611][ T7242] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.800915][ T7242] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.808519][ T7242] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.815752][ T7242] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.827354][ T7242] bridge0: port 3(bond0) entered disabled state [ 275.833948][ T7242] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.841282][ T7242] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.144042][ T7250] netlink: 'syz.7.271': attribute type 10 has an invalid length. [ 276.152616][ T7250] netlink: 2 bytes leftover after parsing attributes in process `syz.7.271'. [ 276.893481][ T7266] netlink: 60 bytes leftover after parsing attributes in process `syz.7.275'. [ 276.911490][ T7270] netlink: 'syz.7.275': attribute type 1 has an invalid length. [ 276.923465][ T7270] netlink: 168864 bytes leftover after parsing attributes in process `syz.7.275'. [ 277.081861][ T7271] syzkaller0: entered promiscuous mode [ 277.087755][ T7271] syzkaller0: entered allmulticast mode [ 277.235706][ T7270] syzkaller0: entered promiscuous mode [ 277.243869][ T7270] syzkaller0: entered allmulticast mode [ 277.278743][ T7277] netlink: 10 bytes leftover after parsing attributes in process `syz.7.275'. [ 281.047430][ T7285] netlink: 'syz.4.280': attribute type 10 has an invalid length. [ 281.055447][ T7285] netlink: 2 bytes leftover after parsing attributes in process `syz.4.280'. [ 281.065227][ T7285] bridge0: port 3(bond0) entered blocking state [ 281.072091][ T7285] bridge0: port 3(bond0) entered disabled state [ 281.079285][ T7285] bond0: entered allmulticast mode [ 281.084441][ T7285] bond_slave_0: entered allmulticast mode [ 281.090357][ T7285] bond_slave_1: entered allmulticast mode [ 281.096158][ T7285] bridge0: entered allmulticast mode [ 281.103102][ T7285] bond0: left allmulticast mode [ 281.108694][ T7285] bond_slave_0: left allmulticast mode [ 281.114205][ T7285] bond_slave_1: left allmulticast mode [ 281.119838][ T7285] bridge0: left allmulticast mode [ 281.496725][ T7298] netlink: 'syz.7.283': attribute type 10 has an invalid length. [ 281.564150][ T7298] bridge0: port 3(bond0) entered blocking state [ 281.570657][ T7298] bridge0: port 3(bond0) entered forwarding state [ 281.577541][ T7298] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.584893][ T7298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.592544][ T7298] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.599957][ T7298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.618899][ T7298] bridge0: port 3(bond0) entered disabled state [ 281.625615][ T7298] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.633016][ T7298] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.669665][ T7303] netlink: 'syz.8.285': attribute type 10 has an invalid length. [ 281.695317][ T7303] bridge0: port 3(bond0) entered blocking state [ 281.701896][ T7303] bridge0: port 3(bond0) entered forwarding state [ 281.708794][ T7303] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.715988][ T7303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.723584][ T7303] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.731065][ T7303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.741537][ T7303] bridge0: port 3(bond0) entered disabled state [ 281.748150][ T7303] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.755552][ T7303] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.935728][ T7316] netlink: 'syz.5.289': attribute type 10 has an invalid length. [ 282.945066][ T7316] netlink: 2 bytes leftover after parsing attributes in process `syz.5.289'. [ 283.141732][ T7319] syzkaller0: entered promiscuous mode [ 283.147367][ T7319] syzkaller0: entered allmulticast mode [ 283.182411][ T7322] netlink: 'syz.5.291': attribute type 39 has an invalid length. [ 283.191672][ T7322] veth0_macvtap: left promiscuous mode [ 283.441882][ T7326] netlink: 'syz.5.292': attribute type 1 has an invalid length. [ 283.450161][ T7326] netlink: 168864 bytes leftover after parsing attributes in process `syz.5.292'. [ 283.668590][ T5794] Bluetooth: hci6: command 0x0406 tx timeout [ 283.678209][ T5794] Bluetooth: hci4: command 0x0406 tx timeout [ 285.126179][ T7325] netlink: 60 bytes leftover after parsing attributes in process `syz.5.292'. [ 285.163577][ T7334] netlink: 10 bytes leftover after parsing attributes in process `syz.5.292'. [ 285.879239][ T7350] FAULT_INJECTION: forcing a failure. [ 285.879239][ T7350] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 285.892906][ T7350] CPU: 1 PID: 7350 Comm: syz.7.299 Not tainted syzkaller #0 [ 285.900336][ T7350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 285.910462][ T7350] Call Trace: [ 285.913760][ T7350] [ 285.916711][ T7350] dump_stack_lvl+0x16c/0x230 [ 285.921446][ T7350] ? show_regs_print_info+0x20/0x20 [ 285.926704][ T7350] ? load_image+0x3b0/0x3b0 [ 285.931247][ T7350] ? __might_fault+0xaa/0x120 [ 285.935963][ T7350] ? __lock_acquire+0x7c80/0x7c80 [ 285.941021][ T7350] ? tomoyo_path_number_perm+0x4dc/0x590 [ 285.946682][ T7350] ? tomoyo_path_number_perm+0x1ba/0x590 [ 285.952340][ T7350] should_fail_ex+0x39d/0x4d0 [ 285.957044][ T7350] _copy_from_user+0x2f/0xe0 [ 285.961677][ T7350] wext_handle_ioctl+0xbb/0x1c0 [ 285.966983][ T7350] ? call_commit_handler+0xf0/0xf0 [ 285.972132][ T7350] sock_ioctl+0x160/0x7a0 [ 285.976485][ T7350] ? sock_poll+0x3d0/0x3d0 [ 285.980928][ T7350] ? bpf_lsm_file_ioctl+0x9/0x10 [ 285.985883][ T7350] ? security_file_ioctl+0x80/0xa0 [ 285.991017][ T7350] ? sock_poll+0x3d0/0x3d0 [ 285.995490][ T7350] __se_sys_ioctl+0xfd/0x170 [ 286.000133][ T7350] do_syscall_64+0x55/0xb0 [ 286.004583][ T7350] ? clear_bhb_loop+0x40/0x90 [ 286.009275][ T7350] ? clear_bhb_loop+0x40/0x90 [ 286.013971][ T7350] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 286.019882][ T7350] RIP: 0033:0x7faead18f6c9 [ 286.024315][ T7350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 286.043939][ T7350] RSP: 002b:00007faeadfc5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 286.052395][ T7350] RAX: ffffffffffffffda RBX: 00007faead3e5fa0 RCX: 00007faead18f6c9 [ 286.060397][ T7350] RDX: 0000200000000000 RSI: 0000000000008b28 RDI: 000000000000000b [ 286.068381][ T7350] RBP: 00007faeadfc5090 R08: 0000000000000000 R09: 0000000000000000 [ 286.076364][ T7350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 286.084347][ T7350] R13: 00007faead3e6038 R14: 00007faead3e5fa0 R15: 00007ffeccf52878 [ 286.092346][ T7350] [ 286.297242][ T7353] netlink: 'syz.8.300': attribute type 10 has an invalid length. [ 286.313115][ T7353] netlink: 2 bytes leftover after parsing attributes in process `syz.8.300'. [ 286.354088][ T7355] netlink: 60 bytes leftover after parsing attributes in process `syz.7.302'. [ 286.375606][ T7355] netlink: 'syz.7.302': attribute type 1 has an invalid length. [ 286.389273][ T7355] netlink: 168864 bytes leftover after parsing attributes in process `syz.7.302'. [ 286.566902][ T7364] syzkaller0: entered promiscuous mode [ 286.573293][ T7364] syzkaller0: entered allmulticast mode [ 286.646521][ T7366] syzkaller0: entered promiscuous mode [ 286.653570][ T7366] syzkaller0: entered allmulticast mode [ 286.662587][ T7371] netlink: 10 bytes leftover after parsing attributes in process `syz.7.302'. [ 286.672668][ T7360] netlink: 'syz.4.303': attribute type 10 has an invalid length. [ 286.749731][ T7360] team0: Port device wlan1 removed [ 286.755253][ T7368] FAULT_INJECTION: forcing a failure. [ 286.755253][ T7368] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 286.772927][ T7368] CPU: 1 PID: 7368 Comm: syz.8.304 Not tainted syzkaller #0 [ 286.780286][ T7368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 286.790393][ T7368] Call Trace: [ 286.793716][ T7368] [ 286.796688][ T7368] dump_stack_lvl+0x16c/0x230 [ 286.797370][ T7360] mac80211_hwsim hwsim17 wlan1: entered promiscuous mode [ 286.801405][ T7368] ? show_regs_print_info+0x20/0x20 [ 286.801439][ T7368] ? load_image+0x3b0/0x3b0 [ 286.801467][ T7368] ? __lock_acquire+0x7c80/0x7c80 [ 286.801495][ T7368] ? snprintf+0xdb/0x120 [ 286.801522][ T7368] should_fail_ex+0x39d/0x4d0 [ 286.801557][ T7368] _copy_to_user+0x2f/0xa0 [ 286.801584][ T7368] simple_read_from_buffer+0xe7/0x150 [ 286.801641][ T7368] proc_fail_nth_read+0x1e3/0x250 [ 286.801674][ T7368] ? proc_fault_inject_write+0x340/0x340 [ 286.801709][ T7368] ? fsnotify_perm+0x271/0x5e0 [ 286.801742][ T7368] ? proc_fault_inject_write+0x340/0x340 [ 286.801769][ T7368] vfs_read+0x27e/0x920 [ 286.801807][ T7368] ? kernel_read+0x1e0/0x1e0 [ 286.801837][ T7368] ? __fget_files+0x28/0x4d0 [ 286.801866][ T7368] ? __fget_files+0x44a/0x4d0 [ 286.801906][ T7368] ? __fdget_pos+0x2a3/0x330 [ 286.801938][ T7368] ? ksys_read+0x75/0x250 [ 286.801970][ T7368] ksys_read+0x147/0x250 [ 286.802002][ T7368] ? vfs_write+0x940/0x940 [ 286.802036][ T7368] ? lockdep_hardirqs_on+0x98/0x150 [ 286.802064][ T7368] do_syscall_64+0x55/0xb0 [ 286.802091][ T7368] ? clear_bhb_loop+0x40/0x90 [ 286.815646][ T7360] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 286.818946][ T7368] ? clear_bhb_loop+0x40/0x90 [ 286.818981][ T7368] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 286.819006][ T7368] RIP: 0033:0x7f1055d8e0dc [ 286.819026][ T7368] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 286.819045][ T7368] RSP: 002b:00007f1056d19030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 286.819070][ T7368] RAX: ffffffffffffffda RBX: 00007f1055fe5fa0 RCX: 00007f1055d8e0dc [ 286.819087][ T7368] RDX: 000000000000000f RSI: 00007f1056d190a0 RDI: 0000000000000004 [ 286.819100][ T7368] RBP: 00007f1056d19090 R08: 0000000000000000 R09: 0000000000000000 [ 286.819114][ T7368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 286.819128][ T7368] R13: 00007f1055fe6038 R14: 00007f1055fe5fa0 R15: 00007ffecc7a7588 [ 286.819166][ T7368] [ 287.053204][ T7360] syz.4.303 (7360) used greatest stack depth: 17640 bytes left [ 290.177207][ T34] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 291.055407][ T7387] netlink: 'syz.7.306': attribute type 10 has an invalid length. [ 291.133027][ T7387] bridge0: port 3(bond0) entered blocking state [ 291.139543][ T7387] bridge0: port 3(bond0) entered forwarding state [ 291.146483][ T7387] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.153784][ T7387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.161470][ T7387] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.168800][ T7387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 291.223359][ T7387] bridge0: port 3(bond0) entered disabled state [ 291.229960][ T7387] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.237231][ T7387] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.680206][ T7412] netlink: 60 bytes leftover after parsing attributes in process `syz.5.315'. [ 292.711013][ T7408] netlink: 'syz.8.313': attribute type 10 has an invalid length. [ 292.719647][ T7412] netlink: 'syz.5.315': attribute type 1 has an invalid length. [ 292.727351][ T7412] netlink: 168864 bytes leftover after parsing attributes in process `syz.5.315'. [ 292.746632][ T7408] netlink: 2 bytes leftover after parsing attributes in process `syz.8.313'. [ 292.950480][ T7419] syzkaller0: entered promiscuous mode [ 292.956115][ T7419] syzkaller0: entered allmulticast mode [ 293.020405][ T7421] syzkaller0: entered promiscuous mode [ 293.031543][ T7421] syzkaller0: entered allmulticast mode [ 293.123321][ T7412] netlink: 10 bytes leftover after parsing attributes in process `syz.5.315'. [ 296.936238][ T7440] netlink: 'syz.8.323': attribute type 3 has an invalid length. [ 296.954709][ T7440] netlink: 'syz.8.323': attribute type 16 has an invalid length. [ 296.965302][ T7440] netlink: 132 bytes leftover after parsing attributes in process `syz.8.323'. [ 297.161193][ T7447] FAULT_INJECTION: forcing a failure. [ 297.161193][ T7447] name failslab, interval 1, probability 0, space 0, times 0 [ 297.175271][ T7447] CPU: 0 PID: 7447 Comm: syz.8.326 Not tainted syzkaller #0 [ 297.182614][ T7447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 297.192725][ T7447] Call Trace: [ 297.196028][ T7447] [ 297.198976][ T7447] dump_stack_lvl+0x16c/0x230 [ 297.203703][ T7447] ? show_regs_print_info+0x20/0x20 [ 297.208939][ T7447] ? load_image+0x3b0/0x3b0 [ 297.213490][ T7447] ? __might_sleep+0xe0/0xe0 [ 297.218107][ T7447] ? __lock_acquire+0x7c80/0x7c80 [ 297.223171][ T7447] should_fail_ex+0x39d/0x4d0 [ 297.227879][ T7447] should_failslab+0x9/0x20 [ 297.232415][ T7447] slab_pre_alloc_hook+0x59/0x310 [ 297.237483][ T7447] kmem_cache_alloc_node+0x60/0x330 [ 297.242734][ T7447] ? __alloc_skb+0x108/0x2c0 [ 297.247352][ T7447] __alloc_skb+0x108/0x2c0 [ 297.251796][ T7447] netlink_dump+0x1cf/0xde0 [ 297.256329][ T7447] ? rcu_is_watching+0x15/0xb0 [ 297.261113][ T7447] ? trace_contention_end+0x39/0xe0 [ 297.266339][ T7447] ? netlink_lookup+0x200/0x200 [ 297.271222][ T7447] ? netlink_autobind+0x300/0x300 [ 297.276271][ T7447] ? netlink_lookup+0x30/0x200 [ 297.281050][ T7447] ? netlink_lookup+0x30/0x200 [ 297.285832][ T7447] __netlink_dump_start+0x5f1/0x810 [ 297.291059][ T7447] xsk_diag_handler_dump+0x184/0x220 [ 297.296360][ T7447] ? __lock_acquire+0x7c80/0x7c80 [ 297.301395][ T7447] ? xp_dma_sync_for_device_slow+0x50/0x50 [ 297.307226][ T7447] ? xsk_diag_handler_dump+0x220/0x220 [ 297.312706][ T7447] ? sock_diag_lock_handler+0x19/0x280 [ 297.318176][ T7447] ? sock_diag_lock_handler+0x19/0x280 [ 297.323648][ T7447] ? xp_dma_sync_for_device_slow+0x50/0x50 [ 297.329475][ T7447] sock_diag_rcv_msg+0x3d8/0x600 [ 297.334432][ T7447] netlink_rcv_skb+0x216/0x480 [ 297.339226][ T7447] ? sock_diag_bind+0xb0/0xb0 [ 297.343926][ T7447] ? netlink_ack+0x1110/0x1110 [ 297.348724][ T7447] ? __lock_acquire+0x7c80/0x7c80 [ 297.353774][ T7447] ? netlink_deliver_tap+0x2e/0x1b0 [ 297.358992][ T7447] sock_diag_rcv+0x2a/0x40 [ 297.363423][ T7447] netlink_unicast+0x751/0x8d0 [ 297.368218][ T7447] netlink_sendmsg+0x8c1/0xbe0 [ 297.373010][ T7447] ? netlink_getsockopt+0x580/0x580 [ 297.378228][ T7447] ? aa_sock_msg_perm+0x94/0x150 [ 297.383190][ T7447] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 297.388491][ T7447] ? security_socket_sendmsg+0x80/0xa0 [ 297.393965][ T7447] ? netlink_getsockopt+0x580/0x580 [ 297.399185][ T7447] ____sys_sendmsg+0x5bf/0x950 [ 297.404006][ T7447] ? __asan_memset+0x22/0x40 [ 297.408618][ T7447] ? __sys_sendmsg_sock+0x30/0x30 [ 297.413661][ T7447] ? __import_iovec+0x5f2/0x860 [ 297.418552][ T7447] ? import_iovec+0x73/0xa0 [ 297.423077][ T7447] ___sys_sendmsg+0x220/0x290 [ 297.427798][ T7447] ? __sys_sendmsg+0x270/0x270 [ 297.432605][ T7447] ? __lock_acquire+0x7c80/0x7c80 [ 297.437671][ T7447] __se_sys_sendmsg+0x1a5/0x270 [ 297.442551][ T7447] ? __x64_sys_sendmsg+0x80/0x80 [ 297.447527][ T7447] ? lockdep_hardirqs_on+0x98/0x150 [ 297.452745][ T7447] do_syscall_64+0x55/0xb0 [ 297.457205][ T7447] ? clear_bhb_loop+0x40/0x90 [ 297.461940][ T7447] ? clear_bhb_loop+0x40/0x90 [ 297.466635][ T7447] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 297.472540][ T7447] RIP: 0033:0x7f1055d8f6c9 [ 297.476967][ T7447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 297.496583][ T7447] RSP: 002b:00007f1056d19038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 297.505016][ T7447] RAX: ffffffffffffffda RBX: 00007f1055fe5fa0 RCX: 00007f1055d8f6c9 [ 297.513006][ T7447] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000006 [ 297.520990][ T7447] RBP: 00007f1056d19090 R08: 0000000000000000 R09: 0000000000000000 [ 297.528974][ T7447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 297.537158][ T7447] R13: 00007f1055fe6038 R14: 00007f1055fe5fa0 R15: 00007ffecc7a7588 [ 297.545171][ T7447] [ 297.622337][ T7445] netlink: 'syz.4.325': attribute type 10 has an invalid length. [ 297.630347][ T7445] netlink: 2 bytes leftover after parsing attributes in process `syz.4.325'. [ 297.648307][ T7445] bridge0: port 3(bond0) entered blocking state [ 297.654945][ T7445] bridge0: port 3(bond0) entered disabled state [ 297.661892][ T7445] bond0: entered allmulticast mode [ 297.667180][ T7445] bond_slave_0: entered allmulticast mode [ 297.710271][ T7445] bond_slave_1: entered allmulticast mode [ 297.716084][ T7445] bridge0: entered allmulticast mode [ 297.727410][ T7445] mac80211_hwsim hwsim17 wlan1: entered allmulticast mode [ 297.760122][ T7445] bond0: left allmulticast mode [ 297.765063][ T7445] bond_slave_0: left allmulticast mode [ 297.780058][ T7445] bond_slave_1: left allmulticast mode [ 297.785619][ T7445] bridge0: left allmulticast mode [ 297.795324][ T7445] mac80211_hwsim hwsim17 wlan1: left allmulticast mode [ 297.814905][ T7451] netlink: 'syz.7.327': attribute type 10 has an invalid length. [ 297.830672][ T7451] bridge0: port 3(bond0) entered blocking state [ 297.837131][ T7451] bridge0: port 3(bond0) entered forwarding state [ 297.843992][ T7451] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.851246][ T7451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 297.858823][ T7451] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.866081][ T7451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.881279][ T7451] bridge0: port 3(bond0) entered disabled state [ 297.887924][ T7451] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.895397][ T7451] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.030497][ T7462] netlink: 'syz.4.330': attribute type 1 has an invalid length. [ 298.054705][ T7462] netlink: 168864 bytes leftover after parsing attributes in process `syz.4.330'. [ 298.082612][ T7461] netlink: 60 bytes leftover after parsing attributes in process `syz.4.330'. [ 298.522288][ T7464] syzkaller0: entered promiscuous mode [ 298.535954][ T7464] syzkaller0: entered allmulticast mode [ 298.641110][ T7467] syzkaller0: entered promiscuous mode [ 298.646858][ T7467] syzkaller0: entered allmulticast mode [ 298.654111][ T7471] netlink: 10 bytes leftover after parsing attributes in process `syz.4.330'. [ 302.236174][ T7478] netlink: 26 bytes leftover after parsing attributes in process `syz.5.334'. [ 302.247107][ T7479] netlink: 26 bytes leftover after parsing attributes in process `syz.5.334'. [ 302.283837][ T7478] netlink: 144316 bytes leftover after parsing attributes in process `syz.5.334'. [ 302.452263][ T7486] netlink: 201392 bytes leftover after parsing attributes in process `syz.4.336'. [ 302.464711][ T7486] netlink: zone id is out of range [ 302.488211][ T7486] netlink: zone id is out of range [ 302.493419][ T7486] netlink: zone id is out of range [ 302.517302][ T7486] netlink: zone id is out of range [ 302.534151][ T7487] syz_tun: refused to change device tx_queue_len [ 302.545025][ T7486] netlink: zone id is out of range [ 302.555678][ T7486] netlink: del zone limit has 8 unknown bytes [ 302.859637][ T7494] netlink: 'syz.5.339': attribute type 10 has an invalid length. [ 302.882145][ T7494] netlink: 2 bytes leftover after parsing attributes in process `syz.5.339'. [ 303.149321][ T7504] netlink: 60 bytes leftover after parsing attributes in process `syz.4.342'. [ 303.187631][ T7504] netlink: 'syz.4.342': attribute type 1 has an invalid length. [ 303.226118][ T7504] netlink: 168864 bytes leftover after parsing attributes in process `syz.4.342'. [ 303.457582][ T7509] syzkaller0: entered promiscuous mode [ 303.500639][ T7509] syzkaller0: entered allmulticast mode [ 303.564710][ T7504] netlink: 10 bytes leftover after parsing attributes in process `syz.4.342'. [ 303.706208][ T7512] syzkaller0: entered promiscuous mode [ 303.715146][ T7512] syzkaller0: entered allmulticast mode [ 305.443437][ T7517] syz_tun: refused to change device tx_queue_len [ 307.691464][ T7530] netlink: 'syz.8.350': attribute type 10 has an invalid length. [ 307.701278][ T7530] bridge0: port 3(bond0) entered blocking state [ 307.707699][ T7530] bridge0: port 3(bond0) entered forwarding state [ 307.714590][ T7530] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.721882][ T7530] bridge0: port 2(bridge_slave_1) entered forwarding state [ 307.729577][ T7530] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.736808][ T7530] bridge0: port 1(bridge_slave_0) entered forwarding state [ 307.751121][ T7530] bridge0: port 3(bond0) entered disabled state [ 307.757646][ T7530] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.764980][ T7530] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.820264][ T7529] netlink: 'syz.5.351': attribute type 10 has an invalid length. [ 307.849417][ T7529] netlink: 2 bytes leftover after parsing attributes in process `syz.5.351'. [ 308.482219][ T7556] netlink: 60 bytes leftover after parsing attributes in process `syz.7.360'. [ 308.514265][ T7556] netlink: 'syz.7.360': attribute type 1 has an invalid length. [ 308.535726][ T7556] netlink: 168864 bytes leftover after parsing attributes in process `syz.7.360'. [ 308.663115][ T7562] syzkaller0: entered promiscuous mode [ 308.669334][ T7562] syzkaller0: entered allmulticast mode [ 308.688526][ T7561] netlink: 'syz.5.362': attribute type 10 has an invalid length. [ 308.698307][ T7561] netlink: 2 bytes leftover after parsing attributes in process `syz.5.362'. [ 308.765360][ T7563] syzkaller0: entered promiscuous mode [ 308.778661][ T7563] syzkaller0: entered allmulticast mode [ 308.865873][ T7563] netlink: 10 bytes leftover after parsing attributes in process `syz.7.360'. [ 312.607709][ T7586] syz.7.370[7586] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.607848][ T7586] syz.7.370[7586] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.697670][ T7591] FAULT_INJECTION: forcing a failure. [ 312.697670][ T7591] name failslab, interval 1, probability 0, space 0, times 0 [ 312.741964][ T7591] CPU: 0 PID: 7591 Comm: syz.8.369 Not tainted syzkaller #0 [ 312.749340][ T7591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 312.759638][ T7591] Call Trace: [ 312.763048][ T7591] [ 312.766031][ T7591] dump_stack_lvl+0x16c/0x230 [ 312.770771][ T7591] ? show_regs_print_info+0x20/0x20 [ 312.776024][ T7591] ? load_image+0x3b0/0x3b0 [ 312.780579][ T7591] ? __might_sleep+0xe0/0xe0 [ 312.785236][ T7591] ? __lock_acquire+0x7c80/0x7c80 [ 312.790314][ T7591] should_fail_ex+0x39d/0x4d0 [ 312.795043][ T7591] should_failslab+0x9/0x20 [ 312.799599][ T7591] slab_pre_alloc_hook+0x59/0x310 [ 312.804990][ T7591] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 312.810948][ T7591] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 312.816941][ T7591] __kmem_cache_alloc_node+0x53/0x260 [ 312.822646][ T7591] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 312.828595][ T7591] __kmalloc+0xa4/0x240 [ 312.833331][ T7591] tomoyo_realpath_from_path+0xe3/0x5d0 [ 312.839217][ T7591] tomoyo_path_number_perm+0x1ea/0x590 [ 312.845079][ T7591] ? tomoyo_path_number_perm+0x1ba/0x590 [ 312.850896][ T7591] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 312.856522][ T7591] ? ksys_write+0x1c1/0x250 [ 312.861097][ T7591] ? __fget_files+0x28/0x4d0 [ 312.865844][ T7591] security_file_ioctl+0x70/0xa0 [ 312.870853][ T7591] __se_sys_ioctl+0x48/0x170 [ 312.875599][ T7591] do_syscall_64+0x55/0xb0 [ 312.880071][ T7591] ? clear_bhb_loop+0x40/0x90 [ 312.884797][ T7591] ? clear_bhb_loop+0x40/0x90 [ 312.889525][ T7591] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 312.895551][ T7591] RIP: 0033:0x7f1055d8f6c9 [ 312.901921][ T7591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 312.921935][ T7591] RSP: 002b:00007f1056d19038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 312.930758][ T7591] RAX: ffffffffffffffda RBX: 00007f1055fe5fa0 RCX: 00007f1055d8f6c9 [ 312.938881][ T7591] RDX: 0000200000000080 RSI: 0000000000008940 RDI: 0000000000000006 [ 312.947014][ T7591] RBP: 00007f1056d19090 R08: 0000000000000000 R09: 0000000000000000 [ 312.955161][ T7591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 312.963286][ T7591] R13: 00007f1055fe6038 R14: 00007f1055fe5fa0 R15: 00007ffecc7a7588 [ 312.971379][ T7591] [ 312.987799][ T7591] ERROR: Out of memory at tomoyo_realpath_from_path. [ 313.061588][ T7595] netlink: 'syz.7.372': attribute type 10 has an invalid length. [ 313.069808][ T7595] netlink: 2 bytes leftover after parsing attributes in process `syz.7.372'. [ 313.277517][ T7603] netlink: 60 bytes leftover after parsing attributes in process `syz.5.375'. [ 313.303209][ T7603] netlink: 'syz.5.375': attribute type 1 has an invalid length. [ 313.331577][ T7603] netlink: 168864 bytes leftover after parsing attributes in process `syz.5.375'. [ 313.433432][ T7608] syzkaller0: entered promiscuous mode [ 313.441209][ T7608] syzkaller0: entered allmulticast mode [ 313.470091][ T7609] netlink: 'syz.4.377': attribute type 10 has an invalid length. [ 313.644477][ T7610] syzkaller0: entered promiscuous mode [ 313.655741][ T7610] syzkaller0: entered allmulticast mode [ 315.763068][ T7610] netlink: 10 bytes leftover after parsing attributes in process `syz.5.375'. [ 317.434463][ T1289] ieee802154 phy0 wpan0: encryption failed: -22 [ 317.441154][ T1289] ieee802154 phy1 wpan1: encryption failed: -22 [ 317.713099][ T7629] syz_tun: refused to change device tx_queue_len [ 317.878757][ T7634] netlink: 'syz.5.384': attribute type 2 has an invalid length. [ 317.886863][ T7634] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.384'. [ 318.093015][ T7636] netlink: 'syz.5.385': attribute type 10 has an invalid length. [ 318.100875][ T7636] netlink: 2 bytes leftover after parsing attributes in process `syz.5.385'. [ 318.717684][ T7658] netlink: 'syz.5.391': attribute type 1 has an invalid length. [ 318.748470][ T7658] netlink: 168864 bytes leftover after parsing attributes in process `syz.5.391'. [ 318.797276][ T7650] syzkaller0: entered promiscuous mode [ 318.814316][ T7650] syzkaller0: entered allmulticast mode [ 318.833559][ T7652] netlink: 60 bytes leftover after parsing attributes in process `syz.5.391'. [ 318.864728][ T7662] netlink: 4083 bytes leftover after parsing attributes in process `syz.8.393'. [ 318.959644][ T7662] netlink: 4083 bytes leftover after parsing attributes in process `syz.8.393'. [ 319.235455][ T7652] syzkaller0: entered promiscuous mode [ 319.254379][ T7652] syzkaller0: entered allmulticast mode [ 319.274745][ T7660] netlink: 4083 bytes leftover after parsing attributes in process `syz.8.393'. [ 319.542094][ T7656] ------------[ cut here ]------------ [ 319.547774][ T7656] WARNING: CPU: 1 PID: 7656 at kernel/events/core.c:6806 perf_pending_task+0x35c/0x470 [ 319.557593][ T7656] Modules linked in: [ 319.562320][ T7656] CPU: 1 PID: 7656 Comm: syz.7.392 Not tainted syzkaller #0 [ 319.569824][ T7656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 319.580042][ T7656] RIP: 0010:perf_pending_task+0x35c/0x470 [ 319.585828][ T7656] Code: ff 84 db 75 14 e8 04 47 d6 ff 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 f0 46 d6 ff e8 7b 53 51 ff eb e5 e8 e4 46 d6 ff <0f> 0b e9 f3 fe ff ff e8 d8 46 d6 ff 48 c7 c7 f0 d0 dc 8c 4c 89 f6 [ 319.605619][ T7656] RSP: 0018:ffffc9000f2079e0 EFLAGS: 00010293 [ 319.612199][ T7656] RAX: ffffffff81af48ac RBX: ffff88802eb928f8 RCX: ffff888028001e00 [ 319.620570][ T7656] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 319.628756][ T7656] RBP: 0000000000000001 R08: ffffffff8e4a8d6f R09: 1ffffffff1c951ad [ 319.636786][ T7656] R10: dffffc0000000000 R11: fffffbfff1c951ae R12: ffff888028001e00 [ 319.644932][ T7656] R13: ffff88805e2bd930 R14: ffff88802eb926b8 R15: 1ffff11005d724d7 [ 319.653012][ T7656] FS: 0000000000000000(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 [ 319.662177][ T7656] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 319.669567][ T7656] CR2: 00007f9dd2942f98 CR3: 000000000cb30000 CR4: 00000000003506e0 [ 319.677778][ T7656] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 319.685849][ T7656] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 319.693947][ T7656] Call Trace: [ 319.697259][ T7656] [ 319.700273][ T7656] task_work_run+0x1ce/0x250 [ 319.704924][ T7656] ? task_work_cancel+0x240/0x240 [ 319.710066][ T7656] do_exit+0x90b/0x23c0 [ 319.714292][ T7656] ? lock_chain_count+0x20/0x20 [ 319.719248][ T7656] ? put_task_struct+0xc0/0xc0 [ 319.724076][ T7656] ? asm_sysvec_irq_work+0x1a/0x20 [ 319.729359][ T7656] ? lockdep_hardirqs_on+0x98/0x150 [ 319.734601][ T7656] ? asm_sysvec_irq_work+0x1a/0x20 [ 319.739933][ T7656] do_group_exit+0x21b/0x2d0 [ 319.744575][ T7656] ? _raw_spin_unlock_irq+0x29/0x50 [ 319.749864][ T7656] get_signal+0x12fc/0x1400 [ 319.754463][ T7656] arch_do_signal_or_restart+0x9c/0x7b0 [ 319.760134][ T7656] ? get_sigframe_size+0x20/0x20 [ 319.765849][ T7656] ? exit_to_user_mode_loop+0x3b/0x110 [ 319.771523][ T7656] exit_to_user_mode_loop+0x70/0x110 [ 319.776962][ T7656] exit_to_user_mode_prepare+0xf6/0x180 [ 319.782609][ T7656] syscall_exit_to_user_mode+0x1a/0x50 [ 319.788186][ T7656] do_syscall_64+0x61/0xb0 [ 319.792660][ T7656] ? clear_bhb_loop+0x40/0x90 [ 319.797379][ T7656] ? clear_bhb_loop+0x40/0x90 [ 319.802195][ T7656] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 319.808207][ T7656] RIP: 0033:0x7faead1b7e00 [ 319.812636][ T7656] Code: Unable to access opcode bytes at 0x7faead1b7dd6. [ 319.819736][ T7656] RSP: 002b:00007faeadfa2c78 EFLAGS: 00000283 [ 319.825862][ T7656] RAX: 0000000000000000 RBX: 00007faeadfa3d30 RCX: 00007faead3a8120 [ 319.833937][ T7656] RDX: 00007faeadfa2c80 RSI: 00007faeadfa2db0 RDI: 0000000000000021 [ 319.841993][ T7656] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 319.850193][ T7656] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 319.858256][ T7656] R13: 00007faeadfa3eb0 R14: 9999999999999999 R15: 0000000000000000 [ 319.866295][ T7656] [ 319.869998][ T7656] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 319.877309][ T7656] CPU: 1 PID: 7656 Comm: syz.7.392 Not tainted syzkaller #0 [ 319.884634][ T7656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 319.894714][ T7656] Call Trace: [ 319.898031][ T7656] [ 319.900974][ T7656] dump_stack_lvl+0x16c/0x230 [ 319.905969][ T7656] ? show_regs_print_info+0x20/0x20 [ 319.911461][ T7656] ? load_image+0x3b0/0x3b0 [ 319.916426][ T7656] panic+0x2c0/0x710 [ 319.920343][ T7656] ? bpf_jit_dump+0xd0/0xd0 [ 319.924869][ T7656] __warn+0x2e0/0x470 [ 319.928871][ T7656] ? perf_pending_task+0x35c/0x470 [ 319.934031][ T7656] ? perf_pending_task+0x35c/0x470 [ 319.939189][ T7656] report_bug+0x2be/0x4f0 [ 319.943534][ T7656] ? perf_pending_task+0x35c/0x470 [ 319.948749][ T7656] ? perf_pending_task+0x35c/0x470 [ 319.953876][ T7656] ? perf_pending_task+0x35e/0x470 [ 319.959008][ T7656] handle_bug+0xcf/0x120 [ 319.963271][ T7656] exc_invalid_op+0x1a/0x50 [ 319.967834][ T7656] asm_exc_invalid_op+0x1a/0x20 [ 319.972715][ T7656] RIP: 0010:perf_pending_task+0x35c/0x470 [ 319.978471][ T7656] Code: ff 84 db 75 14 e8 04 47 d6 ff 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 f0 46 d6 ff e8 7b 53 51 ff eb e5 e8 e4 46 d6 ff <0f> 0b e9 f3 fe ff ff e8 d8 46 d6 ff 48 c7 c7 f0 d0 dc 8c 4c 89 f6 [ 319.998111][ T7656] RSP: 0018:ffffc9000f2079e0 EFLAGS: 00010293 [ 320.004205][ T7656] RAX: ffffffff81af48ac RBX: ffff88802eb928f8 RCX: ffff888028001e00 [ 320.012191][ T7656] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 320.020262][ T7656] RBP: 0000000000000001 R08: ffffffff8e4a8d6f R09: 1ffffffff1c951ad [ 320.028245][ T7656] R10: dffffc0000000000 R11: fffffbfff1c951ae R12: ffff888028001e00 [ 320.036235][ T7656] R13: ffff88805e2bd930 R14: ffff88802eb926b8 R15: 1ffff11005d724d7 [ 320.044315][ T7656] ? perf_pending_task+0x35c/0x470 [ 320.049462][ T7656] task_work_run+0x1ce/0x250 [ 320.054078][ T7656] ? task_work_cancel+0x240/0x240 [ 320.059135][ T7656] do_exit+0x90b/0x23c0 [ 320.063315][ T7656] ? lock_chain_count+0x20/0x20 [ 320.068179][ T7656] ? put_task_struct+0xc0/0xc0 [ 320.072964][ T7656] ? asm_sysvec_irq_work+0x1a/0x20 [ 320.078095][ T7656] ? lockdep_hardirqs_on+0x98/0x150 [ 320.083323][ T7656] ? asm_sysvec_irq_work+0x1a/0x20 [ 320.088451][ T7656] do_group_exit+0x21b/0x2d0 [ 320.093067][ T7656] ? _raw_spin_unlock_irq+0x29/0x50 [ 320.098283][ T7656] get_signal+0x12fc/0x1400 [ 320.102830][ T7656] arch_do_signal_or_restart+0x9c/0x7b0 [ 320.108398][ T7656] ? get_sigframe_size+0x20/0x20 [ 320.113370][ T7656] ? exit_to_user_mode_loop+0x3b/0x110 [ 320.118848][ T7656] exit_to_user_mode_loop+0x70/0x110 [ 320.124152][ T7656] exit_to_user_mode_prepare+0xf6/0x180 [ 320.129723][ T7656] syscall_exit_to_user_mode+0x1a/0x50 [ 320.135278][ T7656] do_syscall_64+0x61/0xb0 [ 320.139723][ T7656] ? clear_bhb_loop+0x40/0x90 [ 320.144409][ T7656] ? clear_bhb_loop+0x40/0x90 [ 320.149103][ T7656] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 320.155013][ T7656] RIP: 0033:0x7faead1b7e00 [ 320.159440][ T7656] Code: Unable to access opcode bytes at 0x7faead1b7dd6. [ 320.166492][ T7656] RSP: 002b:00007faeadfa2c78 EFLAGS: 00000283 [ 320.172572][ T7656] RAX: 0000000000000000 RBX: 00007faeadfa3d30 RCX: 00007faead3a8120 [ 320.180559][ T7656] RDX: 00007faeadfa2c80 RSI: 00007faeadfa2db0 RDI: 0000000000000021 [ 320.188543][ T7656] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 320.196524][ T7656] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 320.204593][ T7656] R13: 00007faeadfa3eb0 R14: 9999999999999999 R15: 0000000000000000 [ 320.212587][ T7656] [ 320.215927][ T7656] Kernel Offset: disabled [ 320.220262][ T7656] Rebooting in 86400 seconds..