last executing test programs: 4m30.179774255s ago: executing program 2 (id=550): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000500), 0x4) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff7ffa}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x100000, 0x0, 0x2, 0x0, 0x80}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x2002) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x4) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000005c0)=0xe0000000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000940)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0xcc7b, 0x0, 0x0, 0x65a487fb1e407410, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x6bc2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, 0x0, 0x30}, 0x7e8166965e22236a) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x18, 0x7, &(0x7f0000000040)=ANY=[], 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x4, 0xc, &(0x7f0000000540)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100200}, [@call={0x85, 0x0, 0x0, 0x11}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x6, 0x0, 0x0, 0x41, 0x0, 0x71, 0x11, 0x72}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) r2 = socket$kcm(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8947, &(0x7f00000002c0)={'bond0\x00', @random="d8b30100"}) setsockopt$sock_attach_bpf(r2, 0x6, 0x10, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xe, 0x3, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffff41, 0x0, 0x0, 0x0, 0xa}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9}, 0x94) 4m29.92014919s ago: executing program 2 (id=551): openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000691226000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x400c015) sendmsg$sock(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000340)=@nfc={0x27, 0x0, 0x0, 0x6}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000400)="37b0a14cd185f61e7c6b3e7efa89c8de7d3d4ea57d789b26623b0020ea8f3402ea0f3e24d52c9465adf8064d386cbf6d27a25010cc88", 0x36}, {&(0x7f0000000580)="61ef5dc1a9a75511f412d20cdf037982267fb758a11840", 0x17}, {&(0x7f0000000700)="3a2a3e6c95e34e4d6127a28a6fc509cae961f45ed771de351b88f47bb653a369de5182fdeaeff3367445686fd5ba4aec75d2f746f048db78184ea8ee5c275249414dbbeb8f1f71c0cf11f4d859a18c348ad022799e8cbb1deecdd518527f2a30d1cb69b5a95dfa", 0x67}], 0x3, &(0x7f00000007c0)}, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x3}, 0x202, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000d40)=ANY=[@ANYBLOB="01ed000000000000000000581200"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001f80)={&(0x7f0000001d00)=@ll={0x11, 0x3, 0x0, 0x1, 0x7}, 0x80, 0x0}, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x3}, 0x50) socket$kcm(0x10, 0x2, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 4m29.532444783s ago: executing program 2 (id=553): r0 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x3, 0x3, &(0x7f0000000480)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)=ANY=[], 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)=ANY=[], 0x20) sendmsg$kcm(r0, 0x0, 0x24000044) socketpair(0x11, 0x2, 0xd, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000001cc0)={&(0x7f0000001540)=@tipc=@id={0x1e, 0x3, 0x2, {0x4e21}}, 0x80, &(0x7f0000001b80)=[{&(0x7f00000015c0)="a3d177c475d5340408654efb66268f9efb8d5a92b4e394df61609b5210503827716aa1ac72fa472e7af7eba4c820d4e7b7f1d375cddbcf1208b1393e8e0a8f8bbac3affd59a1c4270007339ec9056b0169a9480553fedac823078120d4eca39784c357e34713623696b4e5c9a80ad17702a5f9fa4790d848b6f5e7a4b6d44321eff39ad1d8f97e0b268ad1e2c010d162f07aa13d1fa68b002cfb6387537226", 0x9f}, {&(0x7f0000001740)="f7693122f9df9d9ad5958ccc172448877b6313c0026bfa1743307a91093967ab1658e0da3e576c202188cd6c7442f8348d0cdf2fd443e16eb9d2e22d9b75b72ea9c13372a9b016b5058c0f0b770a4947853b7c9ce1b27525a7f7b8d235da6e835250720383858363c258a698967b414c5c49ef5bf0abcf1b2b2b64dceac90c452a66951e23d0943ca302528bbc8871d05dcbb1d68442ac019a0928bd5ef768edc18de4bb97e07bfef94ca35ee2c7b793681feb5521da27652a344c1703d1cce1579c27cb7c347b977a4f7e1467a6cdd7f1a90e02e7", 0xd5}, {&(0x7f0000001840)="650f638975dbd7895abdec868abe8bbadde046ceeaae7fc5b5f190f123b22e4ca514836305a802526988d20a842050d4d851b7e602f2567f0f9bb01fbd2ed6a57dfcbe1d1627fe28268d14ef6d7a82e59319952a3d83da0e70ff5d24b81f1671d0ea9dbd7ee38045e6195a8eedb5da6fbd05b162bb68d08f7b33aa5357a5a14d8bef652b01ee9eea7a1c157f51707cc49772b3afefbcc031dd6f7bc11b7ae7ccda65b3a6a74b8604194a1914c1997a3a16ef2389fdc28f37f0e6f8e818b59e58f04c60eac6459c026e4293951a4fdd744d4e79ebc5ba5ed1d19ea1", 0xdb}, {&(0x7f0000001940)="551e9e1a850560f4867ef841aa5d0790e417551664d069ebf3c48d62559ac286dbe118", 0x23}, {0x0}, {&(0x7f0000001980)="b8bdadbb77a971796781cf6a88b4392ded362d56b0a102bb606e0590365a398905923c4ee73c0cabcc4d7cd396d5c37538b4965bf2f89954a7f7053cfcde09da4780507f7cb1d75bf65358d56267405cccbcc77608a538d8975b302d63635a8dcb6aec6951061dae92adf51c684dd7d1d43b5f7919767ff1c77064f81d19bd8c6509eb8da92cdc282082745bad2c8ae07eab300834518440f322123f0e9973a52369918c28f24afcf6fe90f59bbe6c7265ac1dd334e9e7c94511e5616ddd61c5ff7e50d16078e89602", 0xc9}, {&(0x7f0000001a80)="fc12067f1ce7c3bdce1e75247ab4c02bea14c22cd70f464ad698c0e2f8166038a9f730d3a89c157a51e29fc9351c1847eedc4b9703cbb4a537060973f927bb87d20b7f005ba4bd60cf4158e0ef52719aeac27b371b996b05e08a9ffc7c270f201eb2b556ed2df8f5d1dcb38ea04e19aed18831b96b392d7e16e6087d4eb654febb45693d9890869a6fe939cbb4535e30cdfa4a889e57be33170363edcaa090bdc68550648548b9be9abd45c1361ecfef24a76f4e01c4a2acd4021f8e43c51264db82e2a3c82506c7fb6df5fe3e648ce618c1fcf070327731b2a506633d2d3a2a8d7f8789a1a94eb7", 0xe8}], 0x7, &(0x7f0000001c40)=[@txtime={{0x18, 0x1, 0x3d, 0x3ff}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}], 0x48}, 0x4008800) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000006c0)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r4}, 0xc) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@pppoe, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)=""/123, 0x7b}, {&(0x7f0000000240)=""/115, 0x73}, {&(0x7f00000002c0)=""/126, 0x7e}], 0x3, &(0x7f0000000540)=""/4096, 0x1000}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000400)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x3, 0x0, 0x0, {0xa, 0x1000, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x80, 0x0}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='/proc/1/\x00\x82q\xee\xe5\xa0\xbd\xc2\x98#YP\xee\x9c2G\xf0\x81x\x97'}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f00000011c0)='blkio.bfq.io_service_time_recursive\x00', 0x275a, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', r8, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002080)={0x11, 0x2d, &(0x7f0000001d40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @alu={0x7, 0x41fb8e2c388b5fcf, 0xc, 0xa, 0x7, 0xfffffffffffffff4, 0x1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}, @tail_call, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @map_val={0x18, 0x4, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001ec0)='syzkaller\x00', 0x6, 0xbf, &(0x7f0000001f00)=""/191, 0x41100, 0x23, '\x00', r8, 0x0, r7, 0x8, &(0x7f0000001fc0)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000002000)=[r7, r3, r3, r3, r3], &(0x7f0000002040)=[{0x3, 0x2, 0x9, 0x6}], 0x10, 0x819}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x1, 0x7, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r10, 0x2000000, 0xe, 0x0, &(0x7f00000004c0)="630b008646dc3f0adf33c9f7b986", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) r11 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r11, 0x84, 0x9, &(0x7f0000000380), 0x98) ioctl$SIOCSIFHWADDR(r5, 0x8b0f, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000002940)}], 0x1, 0x0, 0x0, 0x81000000}, 0x4) 4m27.029349248s ago: executing program 2 (id=561): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x3, 0x1c, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x2000000}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x17}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a4}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x4000000}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000001c0), 0x12) 4m26.769794373s ago: executing program 2 (id=563): socket$kcm(0x10, 0x2, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'vlan0\x00', 0x8000}) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="180200"/12], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0x1}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="13000000100000000200"/19, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00', 0x4000}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0xf, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xb3b9}, [@call={0x85, 0x0, 0x0, 0x86}, @alu={0x7, 0x0, 0x8, 0x2, 0xb, 0x4, 0xffffffffffffffff}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @call={0x85, 0x0, 0x0, 0x8a}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @ldst={0x2, 0x3, 0x2, 0x0, 0x2, 0x100}, @exit]}, &(0x7f0000000200)='GPL\x00', 0x3, 0x8, &(0x7f0000000380)=""/8, 0x40f00, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0)={0x5, 0x0, 0x2, 0x3eec4b6}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000400), &(0x7f00000005c0)=[{0x5, 0x3, 0x9, 0xb}, {0x2, 0x4, 0x4, 0xb}, {0x5, 0x1, 0xa, 0x1}, {0x1, 0x4, 0x7, 0x6}, {0x4, 0x2, 0x0, 0x3}, {0x5, 0x3, 0x9, 0xc}, {0x1, 0x2, 0x5, 0xc}, {0x1, 0x3, 0x10, 0x7}, {0x5, 0x2, 0x2, 0x1}], 0x10, 0x3b}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000bc0)="d80000001a0081044e81f782db4cb9041c1d0800fe007c05e8fe55a1080001000002000000000000080005007a010401a80016002000034004020000035c0461c9d67f4f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee501534eedba07d6e239b7a1ca16854695d1f79064485e75106300fa125f3d4ece1a0fa80983a3f1fdb3fefe626503fd22d1cc58463d0346a61fde641561ee9c851dc0c1cd706ff2f41398d8e7429039e7ff837d3150d78569e4243b96f7e5080199891344de62a210156a7b0a", 0xd8}], 0x1}, 0x4) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000280)={'wlan0\x00', @multicast}) perf_event_open(0x0, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4m25.465047698s ago: executing program 2 (id=569): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="0212000902000000e4a17c45c8", 0xd}], 0x1}, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7902009875f37538e486dd6317ce62667f2c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa88"], 0xfdef) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000580)={{}, &(0x7f0000000400), &(0x7f0000000440)='%pi6 \x00'}, 0x20) r1 = socket$kcm(0x18, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0xd, r3, 0x1, 0xa, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f00000002c0)}, 0x4000088) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_ext={0x1c, 0x0, &(0x7f00000005c0), &(0x7f00000006c0)='GPL\x00', 0x4, 0x0, &(0x7f0000000700), 0x41000, 0x14, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x12d45, r0, 0x0, &(0x7f0000000780), 0x0, 0x10, 0xde}, 0x94) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000040)="d8000000190081054e81f782db4cb9040a1d080006007c02e8fe55a10a0014000900142603600e1208000f4f1b000401a8001600200005400400027c035c0461c1d67f6f94007134cf6efb8000a007a29045bace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d9d428d9ab6fd1364c3871e66b30dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723", 0xd8}], 0x1}, 0x0) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0xa, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xff29) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x31) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000000000000182300", @ANYRES32=r6], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x28) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={@map=r6, 0xc028b0c7b1eeea03, 0x0, 0x4, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={@cgroup=r5, r7, 0x2c, 0x2008, r5, @value=r5, @void, @void, @void, r8}, 0x20) socketpair(0x3, 0x800, 0x4, &(0x7f0000000440)) 4m9.964542928s ago: executing program 32 (id=569): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="0212000902000000e4a17c45c8", 0xd}], 0x1}, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7902009875f37538e486dd6317ce62667f2c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa88"], 0xfdef) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000580)={{}, &(0x7f0000000400), &(0x7f0000000440)='%pi6 \x00'}, 0x20) r1 = socket$kcm(0x18, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000040)=@ll={0x11, 0xd, r3, 0x1, 0xa, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f00000002c0)}, 0x4000088) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_ext={0x1c, 0x0, &(0x7f00000005c0), &(0x7f00000006c0)='GPL\x00', 0x4, 0x0, &(0x7f0000000700), 0x41000, 0x14, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x12d45, r0, 0x0, &(0x7f0000000780), 0x0, 0x10, 0xde}, 0x94) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000040)="d8000000190081054e81f782db4cb9040a1d080006007c02e8fe55a10a0014000900142603600e1208000f4f1b000401a8001600200005400400027c035c0461c1d67f6f94007134cf6efb8000a007a29045bace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d9d428d9ab6fd1364c3871e66b30dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723", 0xd8}], 0x1}, 0x0) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0xa, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xff29) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x31) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000000000000182300", @ANYRES32=r6], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x28) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={@map=r6, 0xc028b0c7b1eeea03, 0x0, 0x4, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={@cgroup=r5, r7, 0x2c, 0x2008, r5, @value=r5, @void, @void, @void, r8}, 0x20) socketpair(0x3, 0x800, 0x4, &(0x7f0000000440)) 3.889782134s ago: executing program 4 (id=1940): socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x64239, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x3, @perf_config_ext={0x8, 0x7ff}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x4000000000200c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000400000001"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000cd03000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0xedf0e51957efc755, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000240), &(0x7f0000000380)=r2}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x18000000000002a0, 0x5ee, 0x20, &(0x7f0000000580)="b9ff03076804268c989e14f088a8", 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 2.126869006s ago: executing program 4 (id=1942): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x2, 0x80, 0x5, 0xb, 0x99, 0x2, 0x0, 0x2, 0x84000, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x10, 0x23, 0x1, 0x1, 0x8, 0x5, 0x4d2d, 0x0, 0xff, 0x0, 0x5}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) r1 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r1, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4e23, 0x0, @dev, 0x2}, 0x80, 0x0}, 0xe07e872420dfefca) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_tracing={0x1a, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="2d700000fcffffff18540000030b00000000000000000000a402ba71941330940d1bfb535c9cbd0d352c6b3320b61f62f50379cbf639682d43d2fed187c8aeea1d1f135df2629ae13743134216fc13a7caa86d454f548f66ef9a8a5bbc3da536415f7d8e727a7a0d1cddae0fde3d2f5ca119ed22df182af7f49f0a7091241cb933743e65b7b877c2335f099c44963f19e957de0373af90560c24b224abe0a7582c8bf80a97dd5c6fcdc3"], &(0x7f0000000340)='syzkaller\x00', 0x985b, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xf, 0x6a19, 0xfffffbff}, 0x10, 0x1bd23, 0xffffffffffffffff, 0x4, &(0x7f00000004c0)=[0x1], &(0x7f0000000500)=[{0x0, 0x2, 0x10, 0xc}, {0x5, 0x2, 0x0, 0x6}, {0x0, 0x2, 0x10, 0xa}, {0x2, 0x3, 0x1, 0x6}], 0x10, 0x7}, 0x94) socketpair(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r3, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYRES64=0x0], 0x28) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x15, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000100008500000082"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000a80)={r7, 0x0, 0x0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000080)=ANY=[], &(0x7f0000000480)='syzkaller\x00'}, 0x94) r8 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x1, 0x2b4}, 0x0, 0x10000, 0x0, 0x0, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000140)="5c00000011006bcc9e3be35c6e17aa31076b876c1d0000007ea60864160af36514001ac004000202080002000300010004000500eab556a705251e618294ff0051f60a84c9f4d4938037e786a6d0001000000e4509c5bbcd72c6c953", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) sendmsg$kcm(r8, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000001040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000880)=ANY=[@ANYRES32=r0, @ANYRES32=r2, @ANYBLOB="1300000005000000", @ANYRES32, @ANYBLOB="2db184d79a9149d0e29b91a2fe016d72a5ddbd872685aceefd1d6d72c9df625414b2028f988cc67e055f81d5f0202a2d64940920c8cec094", @ANYRES32=r9, @ANYBLOB, @ANYRES64], 0x20) r10 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="89000000120081ae08060cdc030000007f03e3f7000000006ee2ffca1b1f0000001004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c00014002080c00bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x0) 1.931150897s ago: executing program 3 (id=1944): bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x88) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x48440, 0x0) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x20242, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e}, 0x94) socket$kcm(0x10, 0x400000002, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 1.877222201s ago: executing program 0 (id=1945): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x9, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}, @type_tag={0x7, 0x0, 0x0, 0x12, 0x1}]}, {0x0, [0x30, 0x0, 0x5f, 0x30, 0x51, 0x0, 0x5f]}}, 0x0, 0x39, 0x0, 0x0, 0x1}, 0x28) (fail_nth: 8) 1.638805794s ago: executing program 0 (id=1947): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1400}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) socketpair(0x1, 0x1, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000000c0)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1af06, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540), 0x10, 0x8}, 0x94) r0 = socket$kcm(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000090000000000000000000000c50000000ea20000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.freeze\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xffffffffffffffff}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000180)=@phonet={0x23, 0x6, 0x7, 0xfa}, 0x80, 0x0}, 0x40000) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0xfffffffd, @empty}, 0x80, 0x0}, 0x20000001) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000500)={0x3, 0x80, 0x28, 0x1, 0x2, 0x0, 0x0, 0x400000000004, 0x640b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7a, 0x2, @perf_bp={0x0, 0xc}, 0x19122, 0x32, 0x43a1bd76, 0x7, 0x9, 0x4, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x1000000, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xfffffffeffffffff}, 0xc001, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x10) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000003c0)="2e00000011008b88040f80ec59acbc0413a1f8480f0000005e2900421803001825000a001400000002800000121fb719b6", 0x31}], 0x1}, 0x0) 1.523007091s ago: executing program 4 (id=1948): socket$kcm(0xa, 0x5, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000004c0)={r0}, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x4, 0x14, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x100}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0xb6}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r2, 0x0, 0x10, 0x10, &(0x7f00000006c0)="0000000005000000", &(0x7f0000000700)=""/8, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0xfffe, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffc69) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000a40)="d8000000100081044e81f782db44b904021d08000b000000e8fe55a1180015000600142603600e1209000d00e8030000a80016000a0003fd16025ba3f23472bc2099d2df2fcf936124b15066826a1f62f95a09d18c5d15a717d25a96fe39e4bb8670940eb5b91b09374ff08667f2b4bfa1f829ea7eb9e6c8a9722cfb5d05e84e13e2e1027a0319d3d29467a3fccf20d4a3dd9e96c30fda48c056737641a9ee5c7e3adc9be44bc5cd081a9f1756a2f8442f6f51621b9716ae750e1e937651ef863e00"/208, 0xd0}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="d800000010008104687da3aa7143a0b8c81d080b25000000e8fe5538250015000600149b0000001208000313eba96240a8002b", 0x33}], 0x1}, 0x80) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfe33) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r6}, &(0x7f0000000840), &(0x7f0000000880)=r7}, 0x20) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r7, r6}, 0xc) 1.522447621s ago: executing program 3 (id=1949): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73f72cc9f0ba1f848360000005e140602000000000e000a", 0x23}], 0x1}, 0x0) 1.507395822s ago: executing program 0 (id=1951): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1d, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x5460, 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000b0000000000000000900040018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000008300", @ANYRES32, @ANYBLOB], 0x0, 0x4, 0x47, &(0x7f0000000340)=""/71, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb}, 0x94) socket$kcm(0xa, 0x5, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x15, &(0x7f0000000ac0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb01001800000000000000640000006400000006000000020000000200000f00fffffff100ff00cf47ffff0000000000000000000000000000000042000000000300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f03000000980fe900005f"], 0x0, 0x82, 0x0, 0x1}, 0x1f) r3 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="364000001a00913a"], 0x82d7) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000002200)=""/4096, 0x1000}, {&(0x7f0000003200)=""/4073, 0xfe9}], 0x2}, 0x40) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socket$kcm(0xa, 0x2, 0x3a) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={0x0, 0x0, 0x4000}, 0x18) ioctl$SIOCSIFHWADDR(r4, 0x8922, &(0x7f0000002280)={'team0\x00', @random="2b0100004ec6"}) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 1.422862197s ago: executing program 1 (id=1952): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x4c, &(0x7f0000000300), 0x4) sendmsg$unix(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000180)={0x0, 0x18000000, &(0x7f0000000080)=[{&(0x7f0000000040)="1800000039000511d25a80648c63940d0424fc600b003540", 0x18}], 0x1}, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0xf}, 0x90208, 0x0, 0x310c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000100081044e81f782db44b904021d080307000000e8", 0x19}], 0x1, 0x0, 0x0, 0x7400}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001ec0)=ANY=[@ANYBLOB="13120000120091ef04e9befbbd00005c0a"], 0xfe33) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x42) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="920000000400000000000000955ba0430b000004"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) close(r5) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)) ioctl$SIOCSIFHWADDR(r5, 0x8b19, &(0x7f0000000000)={'wlan0\x00', @random="7cf1e97c9e4f"}) 1.341228512s ago: executing program 3 (id=1953): mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x201, 0x4, 0x0, 0x1, 0x0, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x16, 0x5, &(0x7f0000002a00)=ANY=[@ANYBLOB], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x1e, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3c}, 0x110011, 0x0, 0x4, 0x0, 0x0, 0xc, 0x2, 0x0, 0xfffffffc}, 0xffffffffffffffff, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) socketpair(0xb, 0x4, 0x10000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0xa, 0x2, 0x3a) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000000080), 0x4) r3 = perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0xfffffffffffffffd, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x40000060) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xb, 0x5, &(0x7f0000000800)=ANY=[@ANYRES8=r3], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f0000000200)=ANY=[@ANYRES64], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87e5}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=ANY=[@ANYBLOB="1200000024000000080000000b"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r5}, &(0x7f0000000340), &(0x7f0000000380)=r4}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x28) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xb}, 0x100000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)="f420cf29f51d01619d8e7bb498ddb6a4573f89b7a33b1f3ae033c322943679a9219f962b6ffe33c96effebd0964b54497e752f46108c852e3f6b20a569a5832c9832fcc4ba31e20d46f8fa836b2b6a86c8153863ed2452eef9d2ecd27ef1325d84e2cb8b27702d01c3c3001f46e72ca784f6dba5f3cb76a9fdedfb970290be1de774ac26383403e8381bc9e51674371a58e80744f1951d5da203dd1fa7b654b1afb73b94e066add35c5943c8f53600af33e1") ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x891e, 0x0) r6 = socket$kcm(0x2, 0x922000000001, 0x106) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) setsockopt$sock_attach_bpf(r6, 0x6, 0x21, &(0x7f0000001540), 0x20) close(0xffffffffffffffff) r7 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={&(0x7f0000001340)=@hci={0x1f, 0x300, 0x31}, 0x80, &(0x7f0000000380)=[{&(0x7f00000000c0)="c2e512c476edf7", 0x7}], 0x1}, 0x40400c0) 1.20690296s ago: executing program 0 (id=1954): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)}], 0x1, &(0x7f00000001c0)=[@ip_tos_int={{0x14}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}, @ip_tos_u8={{0x11, 0x2}}], 0x78}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0xa, 0x2200, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x5, 0x3fff8000}, 0x0, 0x35, 0x47a1bd76, 0x7, 0x9, 0x7, 0xc, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x89, 0x5, 0x7, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f0000000640), 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x2224, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x4602, 0x0, 0x0, 0x0, 0x9, 0x2, 0x7, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8916, &(0x7f0000000040)={'veth1_macvtap\x00', @random="0200ac7f7f00"}) bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$kcm(0xa, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socket$kcm(0x10, 0x400000002, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}, 0x1090da, 0x0, 0x0, 0x0, 0x0, 0x4, 0x749}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xb, 0xe, &(0x7f0000003fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000310081044e81f782db44b904021d080005000000e8fe55a1180015000600142603600e120900210000090401a80016000a00014006f5ff00036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb5", 0x93}], 0x1}, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) 1.147775563s ago: executing program 1 (id=1955): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x640b9, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000180), 0xa}, 0x0, 0x35, 0x43a1bd76, 0x0, 0x9, 0x0, 0x2, 0x0, 0x1, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x8001, 0x4}, 0x14208, 0x1, 0x2, 0x0, 0x0, 0xfffffffd, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000010880)=@base={0xa, 0x4, 0x8, 0xc}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xb, &(0x7f0000000340)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0x0, 0x0, &(0x7f0000000600), 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b07, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x2, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x1, 0x0) r2 = socket$kcm(0x23, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89ef, &(0x7f0000000000)={r2}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000061190800008d2f009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x80) socketpair(0x1, 0x2, 0x3, &(0x7f0000000000)) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x10, 0x400000002, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000002200)=ANY=[], 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000010400)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x6d}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) 1.102858285s ago: executing program 4 (id=1956): socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="2e0000003600f7ffffff80698c6390090124fc602f6e354016000180008e9279ed91d47825d7563c5ddbeceb16e7", 0x2e}], 0x1, 0x0, 0x0, 0x39c}, 0x40000) socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x64239, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x3, @perf_config_ext={0x8, 0x7ff}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x4000000000200c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000400000001"], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000cd03000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0xedf0e51957efc755, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, &(0x7f0000000240), &(0x7f0000000380)=r4}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x18000000000002a0, 0x5ee, 0x0, &(0x7f0000000580)="b9ff03076804268c989e14f088a8", 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e8, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={&(0x7f0000000280)="faaca1faa110cbb9aa55136f8aeae4a8b6716c8d1c34b42a8677397ee7d761bd2d3425f344c268787f3a81881701f46bc7c6afc950f01ca68d42c19c7a903da46c95c71dcbd3b2241ab74eae8319a384614e0673e2992f1610725c9842f108044fdf975dff9c4c07650198a1ad7b14b7c74c2b69", &(0x7f0000000300)=""/33, &(0x7f0000000340)="3ab7097ab31ea0653225eff393a76a687f2425b399479776ab8fca46fe5d24474aa6e05be3df6d4fd2cb7aefa4a632c1b8ef85c659273de6", &(0x7f00000003c0)="5c21b1a91c5e71294346ed987f9450962fe5ca90c198aca02422f4812a615edae4263455d9d4b0262e661bcca83c002ae4126c6da9e8f13cc12f616a1bd6efdd365b0abdbfe8c5df075cc51837024dcdc29fd0066e5e6014bf7e85c36cbc06ad68678b1f2fef5cd3494878d287fe942260c35c5d87a219374435d92368aa38c5562a3b6b882a49596942d7e3532e05b2f688291771cd", 0x3, r2}, 0x38) 1.064995568s ago: executing program 3 (id=1957): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x22, &(0x7f0000000340)=r1, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x50) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x1f, 0x15, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x83}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x48001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0xa6}}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x11}, 0x94) r5 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) r7 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r7, 0x84, 0x9, &(0x7f0000000380), 0x98) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_lsm={0x3, 0x5, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1124, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x7fffffff, 0x0, 0x0, 0x4000002, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) sendmsg$inet(r8, &(0x7f00000007c0)={&(0x7f0000000040)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000240)="cc", 0x1}], 0x1}, 0x24044851) sendmsg$inet(r8, &(0x7f0000000980)={&(0x7f00000005c0)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000780)=[{&(0x7f0000000600)="e72291a433463e09dde0d33ad006949820c6bc4b9d85711bec4fedb9e933d729d6e147d50732bc61b5eb7a1227d98f359a62ddbbcf3a78a047c5fe51bcf424df8014d02dbf0637fb4f37335a9214b7a588a8", 0x52}], 0x1, &(0x7f0000000800)=[@ip_ttl={{0x14, 0x0, 0x2, 0x4}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5e76}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xf8}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}], 0x60}, 0x800) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r8, 0x84, 0x11, &(0x7f0000000000)=r11, 0x8) r12 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r12, 0x29, 0x23, &(0x7f0000000040), 0xcf) close(r12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 936.775605ms ago: executing program 1 (id=1958): openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events.local\x00', 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events.local\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) (async) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) write$cgroup_devices(r1, 0x0, 0xffdd) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000300)={&(0x7f0000000040)=@isdn, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000100)}, {&(0x7f0000000140)=""/180, 0xb4}, {&(0x7f0000000200)=""/132, 0x84}], 0x3}, 0x2001) 616.901094ms ago: executing program 4 (id=1959): bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x88) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x48440, 0x0) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x20242, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e}, 0x94) socket$kcm(0x10, 0x400000002, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 539.799758ms ago: executing program 1 (id=1960): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1400}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) socketpair(0x1, 0x1, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000000c0)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1af06, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540), 0x10, 0x8}, 0x94) r0 = socket$kcm(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000090000000000000000000000c50000000ea20000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.freeze\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xffffffffffffffff}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000180)=@phonet={0x23, 0x6, 0x7, 0xfa}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000200)="93f6556354d8137f49dde2", 0xb}], 0x1}, 0x40000) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0xfffffffd, @empty}, 0x80, 0x0}, 0x20000001) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000500)={0x3, 0x80, 0x28, 0x1, 0x2, 0x0, 0x0, 0x400000000004, 0x640b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7a, 0x2, @perf_bp={0x0, 0xc}, 0x19122, 0x32, 0x43a1bd76, 0x7, 0x9, 0x4, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x1000000, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xfffffffeffffffff}, 0xc001, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x10) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000003c0)="2e00000011008b88040f80ec59acbc0413a1f8480f0000005e2900421803001825000a001400000002800000121fb719b6", 0x31}], 0x1}, 0x0) 451.572163ms ago: executing program 0 (id=1961): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73f72cc9f0ba1f848360000005e140602000000000e000a", 0x23}], 0x1}, 0x0) 334.8818ms ago: executing program 3 (id=1962): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1d, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x5460, 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000b0000000000000000900040018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000008300", @ANYRES32, @ANYBLOB], 0x0, 0x4, 0x47, &(0x7f0000000340)=""/71, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb}, 0x94) socket$kcm(0xa, 0x5, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x15, &(0x7f0000000ac0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb01001800000000000000640000006400000006000000020000000200000f00fffffff100ff00cf47ffff0000000000000000000000000000000042000000000300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f03000000980fe900005f"], 0x0, 0x82, 0x0, 0x1}, 0x1f) r3 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="364000001a00913a"], 0x82d7) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000002200)=""/4096, 0x1000}, {&(0x7f0000003200)=""/4073, 0xfe9}], 0x2}, 0x40) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socket$kcm(0xa, 0x2, 0x3a) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={0x0, 0x0, 0x4000}, 0x18) ioctl$SIOCSIFHWADDR(r4, 0x8922, &(0x7f0000002280)={'team0\x00', @random="2b0100004ec6"}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r5, 0x0, &(0x7f0000000940)=""/4096}, 0x20) 320.332621ms ago: executing program 1 (id=1963): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) close(r0) ioctl$SIOCSIFHWADDR(r0, 0x8b19, &(0x7f0000000000)={'wlan0\x00', @random="7cf1e97c9e4f"}) 305.140942ms ago: executing program 0 (id=1964): socket$kcm(0xa, 0x5, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000004c0)={r0}, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x4, 0x14, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x100}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0xb6}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r2, 0x0, 0x10, 0x10, &(0x7f00000006c0)="0000000005000000", &(0x7f0000000700)=""/8, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0xfffe, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffc69) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000a40)="d8000000100081044e81f782db44b904021d08000b000000e8fe55a1180015000600142603600e1209000d00e8030000a80016000a0003fd16025ba3f23472bc2099d2df2fcf936124b15066826a1f62f95a09d18c5d15a717d25a96fe39e4bb8670940eb5b91b09374ff08667f2b4bfa1f829ea7eb9e6c8a9722cfb5d05e84e13e2e1027a0319d3d29467a3fccf20d4a3dd9e96c30fda48c056737641a9ee5c7e3adc9be44bc5cd081a9f1756a2f8442f6f51621b9716ae750e1e937651ef863e00"/208, 0xd0}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="d800000010008104687da3aa7143a0b8c81d080b25000000e8fe5538250015000600149b0000001208000313eba96240a8002b", 0x33}], 0x1}, 0x80) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfe33) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r6}, &(0x7f0000000840), &(0x7f0000000880)=r7}, 0x20) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r7, r6}, 0xc) 224.870697ms ago: executing program 4 (id=1965): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0xd040, 0x10000}, 0x14403, 0xfffc, 0x0, 0x5, 0x582, 0x20005, 0x8, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0xff9d}, 0x48) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x4, 0x1, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)=@generic={&(0x7f00000001c0)='./file0\x00', 0x0, 0x30}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0xe40, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x1f00) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000000), 0xfffffd26) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x8, 0x0, r4, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x4}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000, 0x0, 0x2, 0x0, 0x80}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r4}, &(0x7f0000000300), &(0x7f0000000380)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0xd040, 0x10000}, 0x14403, 0xfffc, 0x0, 0x5, 0x582, 0x20005, 0x8, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r5, 0xffff0000, 0x10, 0x0, &(0x7f0000000000)="2b206d0748010097737ea49da2aae9f8", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 106.503094ms ago: executing program 1 (id=1966): bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0xa2b8, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r0, 0x5, 0x10}, 0xc) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="07000000040000008000000001"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000c40)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000020000850000001b000000b700000000000000180100002120732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000e001400400000004000000041"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000140), &(0x7f00000002c0), 0x1003, r4}, 0x38) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='^!\x00') bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000b80)={r4, &(0x7f00000014c0), &(0x7f0000000100)=""/31}, 0x20) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r3}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f0000000080)}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xb5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x9, 0x5, 0x8000, 0xfff7, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1f, 0xb, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000009000080850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r5 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000005, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x11540}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0x1, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe4b, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000bc0)={{r6}, &(0x7f0000000b40), &(0x7f0000000b80)}, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r7) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x828, 0x0, 0x0, 0x0, 0x2, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000200)) 0s ago: executing program 3 (id=1967): socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="2e0000003600f7ffffff80698c6390090124fc602f6e354016000180008e9279ed91d47825d7563c5ddbeceb16e7", 0x2e}], 0x1, 0x0, 0x0, 0x39c}, 0x40000) socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x64239, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x3, @perf_config_ext={0x8, 0x7ff}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x4000000000200c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000400000001"], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000cd03000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0xedf0e51957efc755, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, &(0x7f0000000240), &(0x7f0000000380)=r4}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x18000000000002a0, 0x5ee, 0x0, &(0x7f0000000580)="b9ff03076804268c989e14f088a8", 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e8, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={&(0x7f0000000280)="faaca1faa110cbb9aa55136f8aeae4a8b6716c8d1c34b42a8677397ee7d761bd2d3425f344c268787f3a81881701f46bc7c6afc950f01ca68d42c19c7a903da46c95c71dcbd3b2241ab74eae8319a384614e0673e2992f1610725c9842f108044fdf975dff9c4c07650198a1ad7b14b7c74c2b69", &(0x7f0000000300)=""/33, &(0x7f0000000340)="3ab7097ab31ea0653225eff393a76a687f2425b399479776ab8fca46fe5d24474aa6e05be3df6d4fd2cb7aefa4a632c1b8ef85c659273de6", &(0x7f00000003c0)="5c21b1a91c5e71294346ed987f9450962fe5ca90c198aca02422f4812a615edae4263455d9d4b0262e661bcca83c002ae4126c6da9e8f13cc12f616a1bd6efdd365b0abdbfe8c5df075cc51837024dcdc29fd0066e5e6014bf7e85c36cbc06ad68678b1f2fef5cd3494878d287fe942260c35c5d87a219374435d92368aa38c5562a3b6b882a49596942d7e3532e05b2f688291771cd", 0x3, r2}, 0x38) kernel console output (not intermixed with test programs): ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 299.741258][ T9065] ? security_socket_sendmsg+0x80/0xa0 [ 299.746801][ T9065] ? inet_send_prepare+0x260/0x260 [ 299.752023][ T9065] ____sys_sendmsg+0x5ba/0x960 [ 299.756892][ T9065] ? __lock_acquire+0x7d40/0x7d40 [ 299.762043][ T9065] ? __asan_memset+0x22/0x40 [ 299.766757][ T9065] ? __sys_sendmsg_sock+0x30/0x30 [ 299.771867][ T9065] ? __import_iovec+0x5f2/0x850 [ 299.776863][ T9065] ? import_iovec+0x73/0xa0 [ 299.781487][ T9065] ___sys_sendmsg+0x2a6/0x360 [ 299.786278][ T9065] ? __sys_sendmsg+0x2a0/0x2a0 [ 299.791230][ T9065] ? __lock_acquire+0x7d40/0x7d40 [ 299.796453][ T9065] __se_sys_sendmsg+0x1c2/0x2b0 [ 299.801422][ T9065] ? __x64_sys_sendmsg+0x80/0x80 [ 299.806511][ T9065] ? lockdep_hardirqs_on+0x98/0x150 [ 299.811800][ T9065] do_syscall_64+0x55/0xa0 [ 299.816286][ T9065] ? clear_bhb_loop+0x40/0x90 [ 299.821021][ T9065] ? clear_bhb_loop+0x40/0x90 [ 299.825775][ T9065] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 299.831726][ T9065] RIP: 0033:0x7f1b0439bf79 [ 299.836197][ T9065] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 299.855880][ T9065] RSP: 002b:00007f1b051f4028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 299.864356][ T9065] RAX: ffffffffffffffda RBX: 00007f1b04615fa0 RCX: 00007f1b0439bf79 [ 299.872381][ T9065] RDX: 00000000000080d1 RSI: 0000200000000140 RDI: 0000000000000005 [ 299.880405][ T9065] RBP: 00007f1b051f4090 R08: 0000000000000000 R09: 0000000000000000 [ 299.888448][ T9065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 299.896470][ T9065] R13: 00007f1b04616038 R14: 00007f1b04615fa0 R15: 00007ffe53333ee8 [ 299.904635][ T9065] [ 300.328214][ T9078] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1073'. [ 300.720729][ T9092] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1077'. [ 301.056074][ T9114] netlink: 'syz.1.1081': attribute type 17 has an invalid length. [ 301.084591][ T9114] netlink: 152 bytes leftover after parsing attributes in process `syz.1.1081'. [ 301.114657][ T9114] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 301.325752][ T9119] netlink: 164 bytes leftover after parsing attributes in process `syz.3.1082'. [ 301.848973][ T9125] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1084'. [ 302.119422][ T9134] netlink: 'syz.3.1085': attribute type 12 has an invalid length. [ 302.137784][ T9134] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1085'. [ 302.739772][ T9161] netlink: 'syz.4.1092': attribute type 1 has an invalid length. [ 302.768479][ T9161] netlink: 193500 bytes leftover after parsing attributes in process `syz.4.1092'. [ 302.814757][ T9153] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1089'. [ 303.858370][ T9182] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1095'. [ 304.893576][ T9210] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1103'. [ 305.070745][ T9216] netlink: 'syz.3.1105': attribute type 1 has an invalid length. [ 305.102582][ T9216] netlink: 193500 bytes leftover after parsing attributes in process `syz.3.1105'. [ 306.013589][ T9238] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1110'. [ 306.522323][ T9252] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1115'. [ 307.453554][ T9278] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1123'. [ 308.148527][ T9291] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1128'. [ 308.324629][ T9295] netlink: 'syz.3.1131': attribute type 20 has an invalid length. [ 308.342318][ T9299] FAULT_INJECTION: forcing a failure. [ 308.342318][ T9299] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 308.398411][ T9299] CPU: 1 PID: 9299 Comm: syz.1.1132 Not tainted syzkaller #0 [ 308.405973][ T9299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 308.416102][ T9299] Call Trace: [ 308.419443][ T9299] [ 308.422425][ T9299] dump_stack_lvl+0x18c/0x250 [ 308.427182][ T9299] ? show_regs_print_info+0x20/0x20 [ 308.432447][ T9299] ? load_image+0x400/0x400 [ 308.437060][ T9299] ? __might_fault+0xaa/0x120 [ 308.441792][ T9299] ? __lock_acquire+0x7d40/0x7d40 [ 308.446873][ T9299] should_fail_ex+0x39d/0x4d0 [ 308.451614][ T9299] _copy_from_user+0x2f/0xe0 [ 308.456259][ T9299] ___sys_recvmsg+0x176/0x590 [ 308.461012][ T9299] ? __sys_recvmsg+0x2a0/0x2a0 [ 308.465854][ T9299] ? ksys_write+0x1c4/0x260 [ 308.470486][ T9299] ? __fget_files+0x43d/0x4b0 [ 308.475244][ T9299] __x64_sys_recvmsg+0x20c/0x2e0 [ 308.480244][ T9299] ? ___sys_recvmsg+0x590/0x590 [ 308.485166][ T9299] ? lockdep_hardirqs_on+0x98/0x150 [ 308.490412][ T9299] do_syscall_64+0x55/0xa0 [ 308.494882][ T9299] ? clear_bhb_loop+0x40/0x90 [ 308.499639][ T9299] ? clear_bhb_loop+0x40/0x90 [ 308.504374][ T9299] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 308.510335][ T9299] RIP: 0033:0x7feded39bf79 [ 308.514804][ T9299] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 308.534556][ T9299] RSP: 002b:00007fedee1d2028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 308.543029][ T9299] RAX: ffffffffffffffda RBX: 00007feded615fa0 RCX: 00007feded39bf79 [ 308.551063][ T9299] RDX: 0000000000000000 RSI: 0000200000000700 RDI: 0000000000000003 [ 308.559163][ T9299] RBP: 00007fedee1d2090 R08: 0000000000000000 R09: 0000000000000000 [ 308.567186][ T9299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 308.575205][ T9299] R13: 00007feded616038 R14: 00007feded615fa0 R15: 00007ffcfe1e74b8 [ 308.583239][ T9299] [ 308.731195][ T9301] syzkaller0: entered promiscuous mode [ 308.777523][ T9301] syzkaller0: entered allmulticast mode [ 311.203193][ T9310] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1134'. [ 311.445367][ T9333] netlink: 'syz.1.1142': attribute type 20 has an invalid length. [ 311.808254][ T9345] netlink: 'syz.1.1147': attribute type 1 has an invalid length. [ 311.837768][ T9345] netlink: 193500 bytes leftover after parsing attributes in process `syz.1.1147'. [ 312.259354][ T9352] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1149'. [ 312.867579][ T9370] netlink: 'syz.1.1155': attribute type 20 has an invalid length. [ 313.006041][ T9374] FAULT_INJECTION: forcing a failure. [ 313.006041][ T9374] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 313.025826][ T9374] CPU: 1 PID: 9374 Comm: syz.3.1157 Not tainted syzkaller #0 [ 313.033288][ T9374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 313.043386][ T9374] Call Trace: [ 313.046707][ T9374] [ 313.049682][ T9374] dump_stack_lvl+0x18c/0x250 [ 313.054430][ T9374] ? show_regs_print_info+0x20/0x20 [ 313.059720][ T9374] ? load_image+0x400/0x400 [ 313.064286][ T9374] ? __lock_acquire+0x7d40/0x7d40 [ 313.069370][ T9374] ? snprintf+0xe9/0x140 [ 313.073675][ T9374] should_fail_ex+0x39d/0x4d0 [ 313.078418][ T9374] _copy_to_user+0x2f/0xa0 [ 313.082896][ T9374] simple_read_from_buffer+0xe7/0x150 [ 313.088334][ T9374] proc_fail_nth_read+0x1e8/0x260 [ 313.093429][ T9374] ? proc_fault_inject_write+0x360/0x360 [ 313.099119][ T9374] ? fsnotify_perm+0x271/0x5e0 [ 313.103942][ T9374] ? proc_fault_inject_write+0x360/0x360 [ 313.109635][ T9374] vfs_read+0x28b/0x970 [ 313.113864][ T9374] ? kernel_read+0x1e0/0x1e0 [ 313.118503][ T9374] ? __fget_files+0x28/0x4b0 [ 313.123150][ T9374] ? __fget_files+0x28/0x4b0 [ 313.127803][ T9374] ? __fget_files+0x43d/0x4b0 [ 313.132541][ T9374] ? __fdget_pos+0x2a3/0x330 [ 313.137184][ T9374] ? ksys_read+0x75/0x260 [ 313.141578][ T9374] ksys_read+0x150/0x260 [ 313.145893][ T9374] ? vfs_write+0x990/0x990 [ 313.150361][ T9374] ? lockdep_hardirqs_on+0x98/0x150 [ 313.155599][ T9374] do_syscall_64+0x55/0xa0 [ 313.160058][ T9374] ? clear_bhb_loop+0x40/0x90 [ 313.164760][ T9374] ? clear_bhb_loop+0x40/0x90 [ 313.169470][ T9374] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 313.175474][ T9374] RIP: 0033:0x7f1b0435c84e [ 313.179915][ T9374] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 313.199566][ T9374] RSP: 002b:00007f1b051f3fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 313.208021][ T9374] RAX: ffffffffffffffda RBX: 00007f1b051f46c0 RCX: 00007f1b0435c84e [ 313.216045][ T9374] RDX: 000000000000000f RSI: 00007f1b051f40a0 RDI: 0000000000000008 [ 313.224068][ T9374] RBP: 00007f1b051f4090 R08: 0000000000000000 R09: 0000000000000000 [ 313.232074][ T9374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 313.240069][ T9374] R13: 00007f1b04616038 R14: 00007f1b04615fa0 R15: 00007ffe53333ee8 [ 313.248087][ T9374] [ 313.267436][ T9376] netlink: 'syz.0.1158': attribute type 1 has an invalid length. [ 313.286577][ T9376] netlink: 193500 bytes leftover after parsing attributes in process `syz.0.1158'. [ 313.713455][ T9390] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1161'. [ 314.212643][ T9393] netlink: 156 bytes leftover after parsing attributes in process `syz.1.1163'. [ 314.337858][ T9402] netlink: 'syz.3.1164': attribute type 10 has an invalid length. [ 314.356345][ T9402] netlink: 40 bytes leftover after parsing attributes in process `syz.3.1164'. [ 314.605849][ T9402] batman_adv: batadv0: Adding interface: hsr_slave_1 [ 314.617292][ T9402] batman_adv: batadv0: The MTU of interface hsr_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 314.670823][ T9402] batman_adv: batadv0: Interface activated: hsr_slave_1 [ 314.725420][ T9401] netlink: 10 bytes leftover after parsing attributes in process `syz.0.1166'. [ 314.747077][ T9394] delete_channel: no stack [ 315.038903][ T9416] netlink: 'syz.0.1169': attribute type 1 has an invalid length. [ 315.049498][ T9416] netlink: 193500 bytes leftover after parsing attributes in process `syz.0.1169'. [ 315.942965][ T9428] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1173'. [ 317.012881][ T9446] netlink: 'syz.0.1179': attribute type 10 has an invalid length. [ 317.032744][ T9446] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1179'. [ 317.056342][ T9446] batman_adv: batadv0: Adding interface: hsr_slave_1 [ 317.077701][ T9446] batman_adv: batadv0: The MTU of interface hsr_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 317.136695][ T9446] batman_adv: batadv0: Interface activated: hsr_slave_1 [ 317.233181][ T9445] delete_channel: no stack [ 317.425857][ T1281] ieee802154 phy0 wpan0: encryption failed: -22 [ 317.433809][ T1281] ieee802154 phy1 wpan1: encryption failed: -22 [ 317.522180][ T9457] netlink: 'syz.0.1183': attribute type 20 has an invalid length. [ 317.540161][ T9455] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1182'. [ 317.563572][ T9460] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.1185'. [ 317.594216][ T9460] openvswitch: netlink: Key type 29 is not supported [ 317.782608][ T9467] netlink: 'syz.0.1187': attribute type 10 has an invalid length. [ 317.832889][ T9467] team0: Cannot enslave team device to itself [ 317.864770][ T9463] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1184'. [ 318.638922][ T9478] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1190'. [ 319.208570][ T9490] syzkaller0: entered promiscuous mode [ 319.224455][ T9490] syzkaller0: entered allmulticast mode [ 319.231535][ T9491] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1195'. [ 320.921528][ T9527] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1206'. [ 321.059036][ T9529] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1208'. [ 321.204481][ T9535] FAULT_INJECTION: forcing a failure. [ 321.204481][ T9535] name failslab, interval 1, probability 0, space 0, times 0 [ 321.246962][ T9535] CPU: 1 PID: 9535 Comm: syz.4.1210 Not tainted syzkaller #0 [ 321.254525][ T9535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 321.264639][ T9535] Call Trace: [ 321.267967][ T9535] [ 321.270935][ T9535] dump_stack_lvl+0x18c/0x250 [ 321.275690][ T9535] ? show_regs_print_info+0x20/0x20 [ 321.280951][ T9535] ? load_image+0x400/0x400 [ 321.285517][ T9535] ? __might_sleep+0xe0/0xe0 [ 321.290165][ T9535] ? __lock_acquire+0x7d40/0x7d40 [ 321.295255][ T9535] should_fail_ex+0x39d/0x4d0 [ 321.300023][ T9535] should_failslab+0x9/0x20 [ 321.304606][ T9535] slab_pre_alloc_hook+0x59/0x310 [ 321.309699][ T9535] ? fib6_get_table+0x39/0x260 [ 321.314504][ T9535] ? fib6_info_alloc+0x30/0xf0 [ 321.319306][ T9535] ? fib6_info_alloc+0x30/0xf0 [ 321.324108][ T9535] __kmem_cache_alloc_node+0x53/0x250 [ 321.329522][ T9535] ? fib6_info_alloc+0x30/0xf0 [ 321.334317][ T9535] __kmalloc+0xa4/0x230 [ 321.338507][ T9535] fib6_info_alloc+0x30/0xf0 [ 321.343132][ T9535] ip6_route_info_create+0x44f/0x1240 [ 321.348540][ T9535] ? nla_memcpy+0x59/0xb0 [ 321.352914][ T9535] ? nla_find+0x138/0x150 [ 321.357284][ T9535] inet6_rtm_newroute+0x5ae/0x1c90 [ 321.362447][ T9535] ? ipv6_route_sysctl_table_size+0x50/0x50 [ 321.368387][ T9535] ? rcu_is_watching+0x15/0xb0 [ 321.373181][ T9535] ? trace_contention_end+0x39/0xe0 [ 321.378432][ T9535] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 321.383575][ T9535] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 321.388716][ T9535] ? ipv6_route_sysctl_table_size+0x50/0x50 [ 321.394746][ T9535] rtnetlink_rcv_msg+0x869/0xfa0 [ 321.399725][ T9535] ? lockdep_hardirqs_on+0x98/0x150 [ 321.404961][ T9535] ? rtnetlink_bind+0x80/0x80 [ 321.409838][ T9535] ? perf_trace_preemptirq_template+0xac/0x330 [ 321.416032][ T9535] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 321.422059][ T9535] ? lock_chain_count+0x20/0x20 [ 321.426937][ T9535] ? __local_bh_enable_ip+0x13a/0x1c0 [ 321.432351][ T9535] ? lockdep_hardirqs_on+0x98/0x150 [ 321.437592][ T9535] ? __local_bh_enable_ip+0x13a/0x1c0 [ 321.443005][ T9535] ? _local_bh_enable+0xa0/0xa0 [ 321.447910][ T9535] ? __dev_queue_xmit+0x26b/0x36b0 [ 321.453060][ T9535] ? __dev_queue_xmit+0x26b/0x36b0 [ 321.458292][ T9535] ? __dev_queue_xmit+0x124f/0x36b0 [ 321.463534][ T9535] ? __dev_queue_xmit+0x26b/0x36b0 [ 321.468699][ T9535] ? ref_tracker_free+0x690/0x840 [ 321.473762][ T9535] netlink_rcv_skb+0x241/0x4d0 [ 321.478615][ T9535] ? rtnetlink_bind+0x80/0x80 [ 321.483325][ T9535] ? netlink_ack+0x1180/0x1180 [ 321.488139][ T9535] ? __lock_acquire+0x7d40/0x7d40 [ 321.494093][ T9535] ? netlink_deliver_tap+0x2e/0x1b0 [ 321.499346][ T9535] netlink_unicast+0x751/0x8d0 [ 321.504160][ T9535] netlink_sendmsg+0x8d0/0xbf0 [ 321.509001][ T9535] ? netlink_getsockopt+0x590/0x590 [ 321.514292][ T9535] ? aa_sock_msg_perm+0x94/0x150 [ 321.519277][ T9535] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 321.524600][ T9535] ? security_socket_sendmsg+0x80/0xa0 [ 321.530083][ T9535] ? netlink_getsockopt+0x590/0x590 [ 321.535329][ T9535] ____sys_sendmsg+0x5ba/0x960 [ 321.540123][ T9535] ? __asan_memset+0x22/0x40 [ 321.544761][ T9535] ? __sys_sendmsg_sock+0x30/0x30 [ 321.549819][ T9535] ? __import_iovec+0x3fa/0x850 [ 321.554717][ T9535] ? import_iovec+0x73/0xa0 [ 321.559263][ T9535] ___sys_sendmsg+0x2a6/0x360 [ 321.563964][ T9535] ? get_pid_task+0x20/0x1e0 [ 321.568588][ T9535] ? __sys_sendmsg+0x2a0/0x2a0 [ 321.573400][ T9535] ? __lock_acquire+0x7d40/0x7d40 [ 321.578478][ T9535] __se_sys_sendmsg+0x1c2/0x2b0 [ 321.583379][ T9535] ? __x64_sys_sendmsg+0x80/0x80 [ 321.588365][ T9535] ? lockdep_hardirqs_on+0x98/0x150 [ 321.593630][ T9535] do_syscall_64+0x55/0xa0 [ 321.598095][ T9535] ? clear_bhb_loop+0x40/0x90 [ 321.602828][ T9535] ? clear_bhb_loop+0x40/0x90 [ 321.607539][ T9535] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 321.613459][ T9535] RIP: 0033:0x7fd43059bf79 [ 321.617907][ T9535] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 321.637552][ T9535] RSP: 002b:00007fd4314aa028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 321.645994][ T9535] RAX: ffffffffffffffda RBX: 00007fd430815fa0 RCX: 00007fd43059bf79 [ 321.654000][ T9535] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 321.662001][ T9535] RBP: 00007fd4314aa090 R08: 0000000000000000 R09: 0000000000000000 [ 321.669999][ T9535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 321.677997][ T9535] R13: 00007fd430816038 R14: 00007fd430815fa0 R15: 00007ffdf0c5ca38 [ 321.686101][ T9535] [ 321.845379][ T9533] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1209'. [ 321.869616][ T9540] netlink: 192440 bytes leftover after parsing attributes in process `syz.1.1212'. [ 321.879701][ T9540] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 321.903933][ T9540] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 322.556270][ T9557] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1219'. [ 323.020805][ T9564] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1221'. [ 323.214880][ T9573] FAULT_INJECTION: forcing a failure. [ 323.214880][ T9573] name failslab, interval 1, probability 0, space 0, times 0 [ 323.249302][ T9573] CPU: 0 PID: 9573 Comm: syz.1.1223 Not tainted syzkaller #0 [ 323.256766][ T9573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 323.266922][ T9573] Call Trace: [ 323.270246][ T9573] [ 323.273220][ T9573] dump_stack_lvl+0x18c/0x250 [ 323.277965][ T9573] ? show_regs_print_info+0x20/0x20 [ 323.283227][ T9573] ? load_image+0x400/0x400 [ 323.287786][ T9573] ? __might_sleep+0xe0/0xe0 [ 323.292526][ T9573] ? __lock_acquire+0x7d40/0x7d40 [ 323.297605][ T9573] ? trace_raw_output_contention_end+0xd0/0xd0 [ 323.303808][ T9573] should_fail_ex+0x39d/0x4d0 [ 323.308546][ T9573] should_failslab+0x9/0x20 [ 323.313111][ T9573] slab_pre_alloc_hook+0x59/0x310 [ 323.318197][ T9573] ? find_get_pmu_context+0x81/0x9e0 [ 323.323539][ T9573] __kmem_cache_alloc_node+0x53/0x250 [ 323.328975][ T9573] ? find_get_pmu_context+0x81/0x9e0 [ 323.334317][ T9573] kmalloc_trace+0x2a/0xe0 [ 323.338792][ T9573] find_get_pmu_context+0x81/0x9e0 [ 323.343958][ T9573] ? find_get_context+0x3d8/0x4f0 [ 323.349048][ T9573] __se_sys_perf_event_open+0xb7b/0x1c50 [ 323.354761][ T9573] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 323.360498][ T9573] ? lock_chain_count+0x20/0x20 [ 323.365424][ T9573] ? lockdep_hardirqs_on+0x98/0x150 [ 323.370673][ T9573] ? __x64_sys_perf_event_open+0x20/0xc0 [ 323.376362][ T9573] do_syscall_64+0x55/0xa0 [ 323.380840][ T9573] ? clear_bhb_loop+0x40/0x90 [ 323.385566][ T9573] ? clear_bhb_loop+0x40/0x90 [ 323.390296][ T9573] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 323.396242][ T9573] RIP: 0033:0x7feded39bf79 [ 323.400726][ T9573] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 323.420392][ T9573] RSP: 002b:00007fedee1d2028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 323.428886][ T9573] RAX: ffffffffffffffda RBX: 00007feded615fa0 RCX: 00007feded39bf79 [ 323.436919][ T9573] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000000040 [ 323.445030][ T9573] RBP: 00007fedee1d2090 R08: 0000000000000000 R09: 0000000000000000 [ 323.453074][ T9573] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 323.461105][ T9573] R13: 00007feded616038 R14: 00007feded615fa0 R15: 00007ffcfe1e74b8 [ 323.469146][ T9573] [ 323.606850][ T9579] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1225'. [ 324.466298][ T9604] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1234'. [ 325.230892][ T9618] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1238'. [ 326.009819][ T9635] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1245'. [ 326.034697][ T9637] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1243'. [ 326.976872][ T9654] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1250'. [ 327.195165][ T9657] netlink: 199816 bytes leftover after parsing attributes in process `syz.3.1251'. [ 327.411863][ T9661] netlink: 129384 bytes leftover after parsing attributes in process `syz.0.1253'. [ 327.619897][ T9667] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1255'. [ 327.637909][ T9667] FAULT_INJECTION: forcing a failure. [ 327.637909][ T9667] name failslab, interval 1, probability 0, space 0, times 0 [ 327.651585][ T9668] FAULT_INJECTION: forcing a failure. [ 327.651585][ T9668] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 327.670379][ T9667] CPU: 0 PID: 9667 Comm: syz.3.1255 Not tainted syzkaller #0 [ 327.677819][ T9667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 327.687992][ T9667] Call Trace: [ 327.691304][ T9667] [ 327.694262][ T9667] dump_stack_lvl+0x18c/0x250 [ 327.698983][ T9667] ? show_regs_print_info+0x20/0x20 [ 327.704225][ T9667] ? load_image+0x400/0x400 [ 327.708760][ T9667] ? __might_sleep+0xe0/0xe0 [ 327.713382][ T9667] ? __lock_acquire+0x7d40/0x7d40 [ 327.718442][ T9667] should_fail_ex+0x39d/0x4d0 [ 327.723151][ T9667] should_failslab+0x9/0x20 [ 327.727688][ T9667] slab_pre_alloc_hook+0x59/0x310 [ 327.732745][ T9667] ? nsim_fib_event_nb+0x79a/0x1080 [ 327.737978][ T9667] ? atomic_notifier_call_chain+0x26/0x180 [ 327.743815][ T9667] kmem_cache_alloc_node+0x60/0x320 [ 327.749053][ T9667] ? __alloc_skb+0x103/0x2c0 [ 327.753684][ T9667] __alloc_skb+0x103/0x2c0 [ 327.758139][ T9667] ? fib4_rule_fill+0x4b0/0x4b0 [ 327.763019][ T9667] notify_rule_change+0xab/0x210 [ 327.768001][ T9667] fib_nl_newrule+0x1b7e/0x1dc0 [ 327.772902][ T9667] ? fib_rules_seq_read+0xf0/0xf0 [ 327.777979][ T9667] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 327.783125][ T9667] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 327.788258][ T9667] ? fib_rules_seq_read+0xf0/0xf0 [ 327.793310][ T9667] rtnetlink_rcv_msg+0x869/0xfa0 [ 327.798277][ T9667] ? lockdep_hardirqs_on+0x98/0x150 [ 327.803508][ T9667] ? rtnetlink_bind+0x80/0x80 [ 327.808210][ T9667] ? perf_trace_preemptirq_template+0xac/0x330 [ 327.814401][ T9667] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 327.820427][ T9667] ? lock_chain_count+0x20/0x20 [ 327.825317][ T9667] ? __local_bh_enable_ip+0x13a/0x1c0 [ 327.830715][ T9667] ? lockdep_hardirqs_on+0x98/0x150 [ 327.836116][ T9667] ? __local_bh_enable_ip+0x13a/0x1c0 [ 327.841511][ T9667] ? _local_bh_enable+0xa0/0xa0 [ 327.846477][ T9667] ? __dev_queue_xmit+0x26b/0x36b0 [ 327.851617][ T9667] ? __dev_queue_xmit+0x26b/0x36b0 [ 327.856761][ T9667] ? __dev_queue_xmit+0x124f/0x36b0 [ 327.861992][ T9667] ? __dev_queue_xmit+0x26b/0x36b0 [ 327.867152][ T9667] ? ref_tracker_free+0x690/0x840 [ 327.872212][ T9667] netlink_rcv_skb+0x241/0x4d0 [ 327.877008][ T9667] ? rtnetlink_bind+0x80/0x80 [ 327.881712][ T9667] ? netlink_ack+0x1180/0x1180 [ 327.886518][ T9667] ? __lock_acquire+0x7d40/0x7d40 [ 327.891578][ T9667] ? netlink_deliver_tap+0x2e/0x1b0 [ 327.896832][ T9667] netlink_unicast+0x751/0x8d0 [ 327.901645][ T9667] netlink_sendmsg+0x8d0/0xbf0 [ 327.906448][ T9667] ? netlink_getsockopt+0x590/0x590 [ 327.911688][ T9667] ? aa_sock_msg_perm+0x94/0x150 [ 327.916656][ T9667] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 327.921974][ T9667] ? security_socket_sendmsg+0x80/0xa0 [ 327.927459][ T9667] ? netlink_getsockopt+0x590/0x590 [ 327.932687][ T9667] ____sys_sendmsg+0x5ba/0x960 [ 327.937484][ T9667] ? __asan_memset+0x22/0x40 [ 327.942105][ T9667] ? __sys_sendmsg_sock+0x30/0x30 [ 327.947159][ T9667] ? __import_iovec+0x5f2/0x850 [ 327.952054][ T9667] ? import_iovec+0x73/0xa0 [ 327.956591][ T9667] ___sys_sendmsg+0x2a6/0x360 [ 327.961302][ T9667] ? get_pid_task+0x20/0x1e0 [ 327.965969][ T9667] ? __sys_sendmsg+0x2a0/0x2a0 [ 327.970775][ T9667] ? __lock_acquire+0x7d40/0x7d40 [ 327.975844][ T9667] __se_sys_sendmsg+0x1c2/0x2b0 [ 327.980722][ T9667] ? __x64_sys_sendmsg+0x80/0x80 [ 327.985785][ T9667] ? lockdep_hardirqs_on+0x98/0x150 [ 327.991036][ T9667] do_syscall_64+0x55/0xa0 [ 327.995478][ T9667] ? clear_bhb_loop+0x40/0x90 [ 328.000187][ T9667] ? clear_bhb_loop+0x40/0x90 [ 328.004891][ T9667] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 328.010812][ T9667] RIP: 0033:0x7f1b0439bf79 [ 328.015254][ T9667] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 328.034888][ T9667] RSP: 002b:00007f1b051f4028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 328.043331][ T9667] RAX: ffffffffffffffda RBX: 00007f1b04615fa0 RCX: 00007f1b0439bf79 [ 328.051336][ T9667] RDX: 0000000000000004 RSI: 00002000000000c0 RDI: 0000000000000003 [ 328.059331][ T9667] RBP: 00007f1b051f4090 R08: 0000000000000000 R09: 0000000000000000 [ 328.067322][ T9667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 328.075314][ T9667] R13: 00007f1b04616038 R14: 00007f1b04615fa0 R15: 00007ffe53333ee8 [ 328.083335][ T9667] [ 328.088203][ T9668] CPU: 0 PID: 9668 Comm: syz.0.1254 Not tainted syzkaller #0 [ 328.095656][ T9668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 328.105783][ T9668] Call Trace: [ 328.109099][ T9668] [ 328.112070][ T9668] dump_stack_lvl+0x18c/0x250 [ 328.116806][ T9668] ? show_regs_print_info+0x20/0x20 [ 328.122054][ T9668] ? load_image+0x400/0x400 [ 328.126610][ T9668] ? __might_fault+0xaa/0x120 [ 328.131324][ T9668] ? __lock_acquire+0x7d40/0x7d40 [ 328.136389][ T9668] should_fail_ex+0x39d/0x4d0 [ 328.141109][ T9668] _copy_from_iter+0x1d9/0x12e0 [ 328.146041][ T9668] ? slab_post_alloc_hook+0x8a/0x4b0 [ 328.151367][ T9668] ? __virt_addr_valid+0x18c/0x540 [ 328.156520][ T9668] ? __lock_acquire+0x7d40/0x7d40 [ 328.161582][ T9668] ? rcu_is_watching+0x15/0xb0 [ 328.166392][ T9668] ? copyout_mc+0x70/0x70 [ 328.170762][ T9668] ? __virt_addr_valid+0x18c/0x540 [ 328.175899][ T9668] ? __virt_addr_valid+0x18c/0x540 [ 328.181036][ T9668] ? __virt_addr_valid+0x469/0x540 [ 328.186178][ T9668] ? __check_object_size+0x506/0xa20 [ 328.191515][ T9668] netlink_sendmsg+0x76b/0xbf0 [ 328.196332][ T9668] ? netlink_getsockopt+0x590/0x590 [ 328.201565][ T9668] ? aa_sock_msg_perm+0x94/0x150 [ 328.206539][ T9668] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 328.211856][ T9668] ? security_socket_sendmsg+0x80/0xa0 [ 328.217341][ T9668] ? netlink_getsockopt+0x590/0x590 [ 328.222577][ T9668] ____sys_sendmsg+0x5ba/0x960 [ 328.227372][ T9668] ? __asan_memset+0x22/0x40 [ 328.231989][ T9668] ? __sys_sendmsg_sock+0x30/0x30 [ 328.237056][ T9668] ? __import_iovec+0x5f2/0x850 [ 328.241950][ T9668] ? import_iovec+0x73/0xa0 [ 328.246493][ T9668] ___sys_sendmsg+0x2a6/0x360 [ 328.251197][ T9668] ? get_pid_task+0x20/0x1e0 [ 328.255825][ T9668] ? __sys_sendmsg+0x2a0/0x2a0 [ 328.260628][ T9668] ? __lock_acquire+0x7d40/0x7d40 [ 328.265698][ T9668] __se_sys_sendmsg+0x1c2/0x2b0 [ 328.270580][ T9668] ? __x64_sys_sendmsg+0x80/0x80 [ 328.275570][ T9668] ? lockdep_hardirqs_on+0x98/0x150 [ 328.280920][ T9668] do_syscall_64+0x55/0xa0 [ 328.285367][ T9668] ? clear_bhb_loop+0x40/0x90 [ 328.290066][ T9668] ? clear_bhb_loop+0x40/0x90 [ 328.294798][ T9668] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 328.300720][ T9668] RIP: 0033:0x7fc16af9bf79 [ 328.305163][ T9668] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 328.324795][ T9668] RSP: 002b:00007fc16bea1028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 328.333237][ T9668] RAX: ffffffffffffffda RBX: 00007fc16b215fa0 RCX: 00007fc16af9bf79 [ 328.341236][ T9668] RDX: 0000000000000000 RSI: 00002000000002c0 RDI: 0000000000000005 [ 328.349249][ T9668] RBP: 00007fc16bea1090 R08: 0000000000000000 R09: 0000000000000000 [ 328.357253][ T9668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 328.365244][ T9668] R13: 00007fc16b216038 R14: 00007fc16b215fa0 R15: 00007ffce377b518 [ 328.373258][ T9668] [ 329.178037][ T9682] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1260'. [ 329.254731][ T9684] netlink: 199816 bytes leftover after parsing attributes in process `syz.1.1263'. [ 329.782215][ T9695] FAULT_INJECTION: forcing a failure. [ 329.782215][ T9695] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 329.817995][ T9695] CPU: 0 PID: 9695 Comm: syz.1.1267 Not tainted syzkaller #0 [ 329.825457][ T9695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 329.835557][ T9695] Call Trace: [ 329.838963][ T9695] [ 329.841928][ T9695] dump_stack_lvl+0x18c/0x250 [ 329.846662][ T9695] ? show_regs_print_info+0x20/0x20 [ 329.851928][ T9695] ? load_image+0x400/0x400 [ 329.856490][ T9695] ? __might_fault+0xaa/0x120 [ 329.861211][ T9695] ? __lock_acquire+0x7d40/0x7d40 [ 329.866295][ T9695] should_fail_ex+0x39d/0x4d0 [ 329.871024][ T9695] _copy_to_user+0x2f/0xa0 [ 329.875491][ T9695] bpf_test_finish+0x19f/0x650 [ 329.880308][ T9695] ? convert___skb_to_skb+0x590/0x590 [ 329.885726][ T9695] ? convert_skb_to___skb+0x420/0x420 [ 329.891152][ T9695] bpf_prog_test_run_skb+0xcc3/0x12b0 [ 329.896587][ T9695] ? cpu_online+0x60/0x60 [ 329.900961][ T9695] bpf_prog_test_run+0x321/0x390 [ 329.905953][ T9695] __sys_bpf+0x49d/0x890 [ 329.910251][ T9695] ? bpf_link_show_fdinfo+0x390/0x390 [ 329.915677][ T9695] ? lock_chain_count+0x20/0x20 [ 329.920584][ T9695] __x64_sys_bpf+0x7c/0x90 [ 329.925038][ T9695] do_syscall_64+0x55/0xa0 [ 329.929508][ T9695] ? clear_bhb_loop+0x40/0x90 [ 329.934234][ T9695] ? clear_bhb_loop+0x40/0x90 [ 329.939047][ T9695] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 329.944980][ T9695] RIP: 0033:0x7feded39bf79 [ 329.949430][ T9695] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 329.969075][ T9695] RSP: 002b:00007fedee1d2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 329.977529][ T9695] RAX: ffffffffffffffda RBX: 00007feded615fa0 RCX: 00007feded39bf79 [ 329.985544][ T9695] RDX: 0000000000000048 RSI: 00002000000003c0 RDI: 000000000000000a [ 329.993548][ T9695] RBP: 00007fedee1d2090 R08: 0000000000000000 R09: 0000000000000000 [ 330.001555][ T9695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 330.009569][ T9695] R13: 00007feded616038 R14: 00007feded615fa0 R15: 00007ffcfe1e74b8 [ 330.017606][ T9695] [ 330.142891][ T5786] Bluetooth: hci4: command 0x0406 tx timeout [ 330.991466][ T9711] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1273'. [ 331.539637][ T9720] netlink: 8191 bytes leftover after parsing attributes in process `syz.1.1276'. [ 333.597620][ T9747] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1283'. [ 334.066970][ T9762] netlink: 199816 bytes leftover after parsing attributes in process `syz.3.1288'. [ 334.078416][ T9755] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1287'. [ 335.043155][ T9780] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1296'. [ 335.389106][ T9785] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1298'. [ 335.729133][ T9794] netlink: 199816 bytes leftover after parsing attributes in process `syz.1.1302'. [ 335.758873][ T9787] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1299'. [ 336.409223][ T9807] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1306'. [ 336.639741][ T9814] netlink: 55631 bytes leftover after parsing attributes in process `syz.0.1310'. [ 336.658728][ T9814] ±ÿ: renamed from bond_slave_0 [ 337.007057][ T9820] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1313'. [ 337.083287][ T9825] FAULT_INJECTION: forcing a failure. [ 337.083287][ T9825] name failslab, interval 1, probability 0, space 0, times 0 [ 337.103311][ T9825] CPU: 1 PID: 9825 Comm: syz.1.1315 Not tainted syzkaller #0 [ 337.110804][ T9825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 337.120932][ T9825] Call Trace: [ 337.124272][ T9825] [ 337.127258][ T9825] dump_stack_lvl+0x18c/0x250 [ 337.132011][ T9825] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 337.138240][ T9825] ? show_regs_print_info+0x20/0x20 [ 337.143517][ T9825] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 337.149752][ T9825] ? dump_stack+0x9/0x20 [ 337.154081][ T9825] should_fail_ex+0x39d/0x4d0 [ 337.158843][ T9825] should_failslab+0x9/0x20 [ 337.163422][ T9825] slab_pre_alloc_hook+0x59/0x310 [ 337.168512][ T9825] ? lockdep_hardirqs_on+0x98/0x150 [ 337.173844][ T9825] ? genl_start+0x1c9/0x6b0 [ 337.178401][ T9825] __kmem_cache_alloc_node+0x53/0x250 [ 337.183830][ T9825] ? genl_start+0x1c9/0x6b0 [ 337.188389][ T9825] kmalloc_trace+0x2a/0xe0 [ 337.192857][ T9825] genl_start+0x1c9/0x6b0 [ 337.197242][ T9825] ? netlink_lookup+0x30/0x200 [ 337.202063][ T9825] __netlink_dump_start+0x4a9/0x810 [ 337.207321][ T9825] genl_family_rcv_msg_dumpit+0x214/0x310 [ 337.213101][ T9825] ? genl_rcv_msg+0x7a0/0x7a0 [ 337.217831][ T9825] ? genl_get_cmd+0x7f1/0x920 [ 337.222584][ T9825] ? genl_family_rcv_msg_doit+0x310/0x310 [ 337.228363][ T9825] ? genl_start+0x6b0/0x6b0 [ 337.232930][ T9825] ? genl_dumpit+0x1a0/0x1a0 [ 337.237586][ T9825] ? bpf_lsm_capable+0x9/0x10 [ 337.242313][ T9825] ? security_capable+0x89/0xb0 [ 337.247214][ T9825] genl_rcv_msg+0x5e5/0x7a0 [ 337.251776][ T9825] ? genl_bind+0x360/0x360 [ 337.256250][ T9825] ? batadv_dat_free+0x380/0x380 [ 337.261248][ T9825] netlink_rcv_skb+0x241/0x4d0 [ 337.266072][ T9825] ? genl_bind+0x360/0x360 [ 337.270540][ T9825] ? netlink_ack+0x1180/0x1180 [ 337.275386][ T9825] ? down_read+0x1ac/0x2e0 [ 337.279857][ T9825] genl_rcv+0x28/0x40 [ 337.283891][ T9825] netlink_unicast+0x751/0x8d0 [ 337.288711][ T9825] netlink_sendmsg+0x8d0/0xbf0 [ 337.293540][ T9825] ? netlink_getsockopt+0x590/0x590 [ 337.298786][ T9825] ? aa_sock_msg_perm+0x94/0x150 [ 337.303781][ T9825] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 337.309115][ T9825] ? security_socket_sendmsg+0x80/0xa0 [ 337.314667][ T9825] ? netlink_getsockopt+0x590/0x590 [ 337.320017][ T9825] ____sys_sendmsg+0x5ba/0x960 [ 337.324839][ T9825] ? __asan_memset+0x22/0x40 [ 337.329487][ T9825] ? __sys_sendmsg_sock+0x30/0x30 [ 337.334551][ T9825] ? __import_iovec+0x5f2/0x850 [ 337.339465][ T9825] ? import_iovec+0x73/0xa0 [ 337.344031][ T9825] ___sys_sendmsg+0x2a6/0x360 [ 337.348759][ T9825] ? __sys_sendmsg+0x2a0/0x2a0 [ 337.353575][ T9825] ? irqentry_enter+0x37/0x50 [ 337.358357][ T9825] __se_sys_sendmsg+0x1c2/0x2b0 [ 337.363255][ T9825] ? __x64_sys_sendmsg+0x80/0x80 [ 337.368251][ T9825] ? syscall_enter_from_user_mode+0x2e/0x80 [ 337.374198][ T9825] do_syscall_64+0x55/0xa0 [ 337.378661][ T9825] ? clear_bhb_loop+0x40/0x90 [ 337.383416][ T9825] ? clear_bhb_loop+0x40/0x90 [ 337.388147][ T9825] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 337.394085][ T9825] RIP: 0033:0x7feded39bf79 [ 337.398536][ T9825] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 337.418184][ T9825] RSP: 002b:00007fedee1d2028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 337.426651][ T9825] RAX: ffffffffffffffda RBX: 00007feded615fa0 RCX: 00007feded39bf79 [ 337.434664][ T9825] RDX: 00000000200000c0 RSI: 0000200000000000 RDI: 0000000000000005 [ 337.442681][ T9825] RBP: 00007fedee1d2090 R08: 0000000000000000 R09: 0000000000000000 [ 337.450695][ T9825] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 337.458704][ T9825] R13: 00007feded616038 R14: 00007feded615fa0 R15: 00007ffcfe1e74b8 [ 337.466758][ T9825] [ 338.439896][ T9854] FAULT_INJECTION: forcing a failure. [ 338.439896][ T9854] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 338.460431][ T9854] CPU: 0 PID: 9854 Comm: syz.3.1327 Not tainted syzkaller #0 [ 338.467895][ T9854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 338.478004][ T9854] Call Trace: [ 338.481324][ T9854] [ 338.484299][ T9854] dump_stack_lvl+0x18c/0x250 [ 338.489037][ T9854] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 338.495252][ T9854] ? show_regs_print_info+0x20/0x20 [ 338.500526][ T9854] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 338.506771][ T9854] should_fail_ex+0x39d/0x4d0 [ 338.511527][ T9854] _copy_from_user+0x2f/0xe0 [ 338.516175][ T9854] ___sys_sendmsg+0x1c7/0x360 [ 338.520920][ T9854] ? __sys_sendmsg+0x2a0/0x2a0 [ 338.525801][ T9854] __se_sys_sendmsg+0x1c2/0x2b0 [ 338.530808][ T9854] ? hrtimer_interrupt+0x7bb/0x9c0 [ 338.536046][ T9854] ? __x64_sys_sendmsg+0x80/0x80 [ 338.541058][ T9854] ? lockdep_hardirqs_on+0x98/0x150 [ 338.546313][ T9854] do_syscall_64+0x55/0xa0 [ 338.550787][ T9854] ? clear_bhb_loop+0x40/0x90 [ 338.555512][ T9854] ? clear_bhb_loop+0x40/0x90 [ 338.560253][ T9854] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 338.566193][ T9854] RIP: 0033:0x7f1b0439bf79 [ 338.570632][ T9854] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 338.590262][ T9854] RSP: 002b:00007f1b051f4028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 338.598709][ T9854] RAX: ffffffffffffffda RBX: 00007f1b04615fa0 RCX: 00007f1b0439bf79 [ 338.606733][ T9854] RDX: 00000000000080d1 RSI: 0000200000000140 RDI: 0000000000000004 [ 338.614731][ T9854] RBP: 00007f1b051f4090 R08: 0000000000000000 R09: 0000000000000000 [ 338.622729][ T9854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 338.630721][ T9854] R13: 00007f1b04616038 R14: 00007f1b04615fa0 R15: 00007ffe53333ee8 [ 338.638738][ T9854] [ 339.239119][ T9868] __nla_validate_parse: 3 callbacks suppressed [ 339.239157][ T9868] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1332'. [ 339.313436][ T9867] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1333'. [ 339.331576][ T9871] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1334'. [ 339.645429][ T9878] netlink: 'syz.1.1338': attribute type 2 has an invalid length. [ 339.676377][ T9878] netlink: 209852 bytes leftover after parsing attributes in process `syz.1.1338'. [ 340.326397][ T9896] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1344'. [ 340.374879][ T9898] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1345'. [ 340.638486][ T9902] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1347'. [ 341.247688][ T9925] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1355'. [ 341.274750][ T9925] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1355'. [ 341.289622][ T9925] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1355'. [ 341.341961][ T9928] FAULT_INJECTION: forcing a failure. [ 341.341961][ T9928] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 341.412879][ T9928] CPU: 1 PID: 9928 Comm: syz.0.1355 Not tainted syzkaller #0 [ 341.420358][ T9928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 341.430462][ T9928] Call Trace: [ 341.433769][ T9928] [ 341.436723][ T9928] dump_stack_lvl+0x18c/0x250 [ 341.441444][ T9928] ? show_regs_print_info+0x20/0x20 [ 341.446676][ T9928] ? load_image+0x400/0x400 [ 341.451223][ T9928] ? __might_fault+0xaa/0x120 [ 341.455959][ T9928] ? __lock_acquire+0x7d40/0x7d40 [ 341.461013][ T9928] should_fail_ex+0x39d/0x4d0 [ 341.465730][ T9928] _copy_from_user+0x2f/0xe0 [ 341.470349][ T9928] ___sys_recvmsg+0x176/0x590 [ 341.475075][ T9928] ? __sys_recvmsg+0x2a0/0x2a0 [ 341.479888][ T9928] ? ksys_write+0x1c4/0x260 [ 341.484440][ T9928] ? __fget_files+0x43d/0x4b0 [ 341.489203][ T9928] __x64_sys_recvmsg+0x20c/0x2e0 [ 341.494967][ T9928] ? ___sys_recvmsg+0x590/0x590 [ 341.499858][ T9928] ? lockdep_hardirqs_on+0x98/0x150 [ 341.505089][ T9928] do_syscall_64+0x55/0xa0 [ 341.509554][ T9928] ? clear_bhb_loop+0x40/0x90 [ 341.514257][ T9928] ? clear_bhb_loop+0x40/0x90 [ 341.518964][ T9928] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 341.524901][ T9928] RIP: 0033:0x7fc16af9bf79 [ 341.529343][ T9928] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 341.549002][ T9928] RSP: 002b:00007fc16be80028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 341.557457][ T9928] RAX: ffffffffffffffda RBX: 00007fc16b216090 RCX: 00007fc16af9bf79 [ 341.565484][ T9928] RDX: 0000000000010182 RSI: 00002000000005c0 RDI: 0000000000000003 [ 341.573476][ T9928] RBP: 00007fc16be80090 R08: 0000000000000000 R09: 0000000000000000 [ 341.581482][ T9928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 341.589476][ T9928] R13: 00007fc16b216128 R14: 00007fc16b216090 R15: 00007ffce377b518 [ 341.597482][ T9928] [ 344.243317][T10027] FAULT_INJECTION: forcing a failure. [ 344.243317][T10027] name failslab, interval 1, probability 0, space 0, times 0 [ 344.267297][T10027] CPU: 0 PID: 10027 Comm: syz.4.1380 Not tainted syzkaller #0 [ 344.274857][T10027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 344.285152][T10027] Call Trace: [ 344.288473][T10027] [ 344.291442][T10027] dump_stack_lvl+0x18c/0x250 [ 344.296265][T10027] ? show_regs_print_info+0x20/0x20 [ 344.301513][T10027] ? load_image+0x400/0x400 [ 344.306065][T10027] ? __might_sleep+0xe0/0xe0 [ 344.310702][T10027] ? __lock_acquire+0x7d40/0x7d40 [ 344.315797][T10027] should_fail_ex+0x39d/0x4d0 [ 344.320529][T10027] should_failslab+0x9/0x20 [ 344.325080][T10027] slab_pre_alloc_hook+0x59/0x310 [ 344.330332][T10027] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 344.336107][T10027] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 344.341873][T10027] __kmem_cache_alloc_node+0x53/0x250 [ 344.347322][T10027] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 344.353083][T10027] __kmalloc+0xa4/0x230 [ 344.357289][T10027] tomoyo_realpath_from_path+0xe3/0x5d0 [ 344.362886][T10027] tomoyo_path_number_perm+0x248/0x620 [ 344.368403][T10027] ? tomoyo_path_number_perm+0x217/0x620 [ 344.374135][T10027] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 344.379654][T10027] ? ksys_write+0x1c4/0x260 [ 344.384240][T10027] ? __fget_files+0x28/0x4b0 [ 344.388879][T10027] ? __fget_files+0x28/0x4b0 [ 344.393530][T10027] security_file_ioctl+0x70/0xa0 [ 344.398518][T10027] __se_sys_ioctl+0x48/0x170 [ 344.403152][T10027] do_syscall_64+0x55/0xa0 [ 344.407617][T10027] ? clear_bhb_loop+0x40/0x90 [ 344.412327][T10027] ? clear_bhb_loop+0x40/0x90 [ 344.417041][T10027] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 344.422977][T10027] RIP: 0033:0x7fd43059bf79 [ 344.427434][T10027] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 344.447086][T10027] RSP: 002b:00007fd4314aa028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 344.455548][T10027] RAX: ffffffffffffffda RBX: 00007fd430815fa0 RCX: 00007fd43059bf79 [ 344.463561][T10027] RDX: 0000200000000080 RSI: 0000000000008b0f RDI: 0000000000000003 [ 344.471571][T10027] RBP: 00007fd4314aa090 R08: 0000000000000000 R09: 0000000000000000 [ 344.479662][T10027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 344.487675][T10027] R13: 00007fd430816038 R14: 00007fd430815fa0 R15: 00007ffdf0c5ca38 [ 344.495794][T10027] [ 344.525610][T10027] ERROR: Out of memory at tomoyo_realpath_from_path. [ 344.582036][T10033] __nla_validate_parse: 14 callbacks suppressed [ 344.582054][T10033] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1379'. [ 345.035399][T10042] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1388'. [ 345.103549][T10046] netlink: 'syz.1.1387': attribute type 1 has an invalid length. [ 345.153188][T10046] netlink: 193500 bytes leftover after parsing attributes in process `syz.1.1387'. [ 345.307607][T10050] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1397'. [ 348.992277][T10071] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1394'. [ 349.018472][T10069] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1395'. [ 349.067206][T10074] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1398'. [ 349.306797][T10078] netlink: 'syz.0.1401': attribute type 1 has an invalid length. [ 349.320414][T10078] netlink: 193500 bytes leftover after parsing attributes in process `syz.0.1401'. [ 349.614788][T10090] FAULT_INJECTION: forcing a failure. [ 349.614788][T10090] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 349.629810][T10090] CPU: 0 PID: 10090 Comm: syz.1.1405 Not tainted syzkaller #0 [ 349.637355][T10090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 349.647463][T10090] Call Trace: [ 349.650782][T10090] [ 349.653749][T10090] dump_stack_lvl+0x18c/0x250 [ 349.658486][T10090] ? show_regs_print_info+0x20/0x20 [ 349.663740][T10090] ? load_image+0x400/0x400 [ 349.668309][T10090] ? __might_fault+0xaa/0x120 [ 349.673146][T10090] ? __lock_acquire+0x7d40/0x7d40 [ 349.678231][T10090] should_fail_ex+0x39d/0x4d0 [ 349.682968][T10090] _copy_from_user+0x2f/0xe0 [ 349.687613][T10090] ___sys_sendmsg+0x1c7/0x360 [ 349.692339][T10090] ? get_pid_task+0x20/0x1e0 [ 349.696980][T10090] ? __sys_sendmsg+0x2a0/0x2a0 [ 349.701805][T10090] ? __lock_acquire+0x7d40/0x7d40 [ 349.706954][T10090] __se_sys_sendmsg+0x1c2/0x2b0 [ 349.711857][T10090] ? __x64_sys_sendmsg+0x80/0x80 [ 349.716851][T10090] ? lockdep_hardirqs_on+0x98/0x150 [ 349.722184][T10090] do_syscall_64+0x55/0xa0 [ 349.726665][T10090] ? clear_bhb_loop+0x40/0x90 [ 349.731396][T10090] ? clear_bhb_loop+0x40/0x90 [ 349.736246][T10090] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 349.742195][T10090] RIP: 0033:0x7feded39bf79 [ 349.746674][T10090] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 349.766602][T10090] RSP: 002b:00007fedee1d2028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 349.775169][T10090] RAX: ffffffffffffffda RBX: 00007feded615fa0 RCX: 00007feded39bf79 [ 349.783194][T10090] RDX: 0000000000000000 RSI: 0000200000000540 RDI: 0000000000000004 [ 349.791302][T10090] RBP: 00007fedee1d2090 R08: 0000000000000000 R09: 0000000000000000 [ 349.799308][T10090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 349.807311][T10090] R13: 00007feded616038 R14: 00007feded615fa0 R15: 00007ffcfe1e74b8 [ 349.815324][T10090] [ 350.046078][T10091] netlink: 'syz.3.1403': attribute type 153 has an invalid length. [ 350.062911][T10091] netlink: 128124 bytes leftover after parsing attributes in process `syz.3.1403'. [ 350.445213][T10103] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1408'. [ 350.639276][T10105] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1409'. [ 350.770710][T10107] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1410'. [ 350.786013][T10110] netlink: 'syz.0.1412': attribute type 1 has an invalid length. [ 350.797296][T10110] netlink: 193500 bytes leftover after parsing attributes in process `syz.0.1412'. [ 351.762103][T10132] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1419'. [ 351.889929][T10135] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1420'. [ 352.140223][T10137] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1421'. [ 352.377569][T10143] netlink: 'syz.0.1423': attribute type 153 has an invalid length. [ 352.425844][T10143] netlink: 128124 bytes leftover after parsing attributes in process `syz.0.1423'. [ 352.525108][T10149] netlink: 'syz.1.1425': attribute type 1 has an invalid length. [ 352.550082][T10149] netlink: 193500 bytes leftover after parsing attributes in process `syz.1.1425'. [ 353.568877][T10161] netlink: 'syz.3.1428': attribute type 6 has an invalid length. [ 354.727703][T10180] netlink: 'syz.1.1435': attribute type 1 has an invalid length. [ 355.545161][T10188] FAULT_INJECTION: forcing a failure. [ 355.545161][T10188] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 355.558792][T10188] CPU: 0 PID: 10188 Comm: syz.1.1438 Not tainted syzkaller #0 [ 355.566311][T10188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 355.576414][T10188] Call Trace: [ 355.579739][T10188] [ 355.582743][T10188] dump_stack_lvl+0x18c/0x250 [ 355.587493][T10188] ? show_regs_print_info+0x20/0x20 [ 355.592830][T10188] ? load_image+0x400/0x400 [ 355.597392][T10188] ? __might_fault+0xaa/0x120 [ 355.602211][T10188] ? __lock_acquire+0x7d40/0x7d40 [ 355.607303][T10188] should_fail_ex+0x39d/0x4d0 [ 355.612048][T10188] _copy_from_user+0x2f/0xe0 [ 355.616694][T10188] ___sys_sendmsg+0x1c7/0x360 [ 355.621429][T10188] ? get_pid_task+0x20/0x1e0 [ 355.626165][T10188] ? __sys_sendmsg+0x2a0/0x2a0 [ 355.630987][T10188] ? __lock_acquire+0x7d40/0x7d40 [ 355.636083][T10188] __se_sys_sendmsg+0x1c2/0x2b0 [ 355.640986][T10188] ? __x64_sys_sendmsg+0x80/0x80 [ 355.645987][T10188] ? lockdep_hardirqs_on+0x98/0x150 [ 355.651325][T10188] do_syscall_64+0x55/0xa0 [ 355.655807][T10188] ? clear_bhb_loop+0x40/0x90 [ 355.660533][T10188] ? clear_bhb_loop+0x40/0x90 [ 355.665358][T10188] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 355.671301][T10188] RIP: 0033:0x7feded39bf79 [ 355.675763][T10188] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 355.695424][T10188] RSP: 002b:00007fedee1d2028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 355.704064][T10188] RAX: ffffffffffffffda RBX: 00007feded615fa0 RCX: 00007feded39bf79 [ 355.712081][T10188] RDX: 0000000024000044 RSI: 0000200000000500 RDI: 0000000000000003 [ 355.720093][T10188] RBP: 00007fedee1d2090 R08: 0000000000000000 R09: 0000000000000000 [ 355.728118][T10188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 355.736130][T10188] R13: 00007feded616038 R14: 00007feded615fa0 R15: 00007ffcfe1e74b8 [ 355.744160][T10188] [ 356.303142][T10193] netlink: 'syz.1.1439': attribute type 153 has an invalid length. [ 356.332136][T10193] __nla_validate_parse: 4 callbacks suppressed [ 356.332178][T10193] netlink: 128124 bytes leftover after parsing attributes in process `syz.1.1439'. [ 356.440435][T10198] netlink: 'syz.4.1441': attribute type 1 has an invalid length. [ 356.466414][T10198] netlink: 193500 bytes leftover after parsing attributes in process `syz.4.1441'. [ 357.492652][T10203] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1442'. [ 357.507589][T10207] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1443'. [ 360.217559][T10226] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1449'. [ 360.460399][T10238] netlink: 'syz.3.1452': attribute type 1 has an invalid length. [ 360.485967][T10238] netlink: 193500 bytes leftover after parsing attributes in process `syz.3.1452'. [ 361.528057][T10285] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1454'. [ 363.589851][T10313] netlink: 'syz.4.1464': attribute type 1 has an invalid length. [ 363.602623][T10313] netlink: 193500 bytes leftover after parsing attributes in process `syz.4.1464'. [ 363.944070][T10316] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1465'. [ 364.189488][T10323] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1467'. [ 364.239082][T10330] netlink: 'syz.0.1469': attribute type 1 has an invalid length. [ 364.286061][T10330] netlink: 193500 bytes leftover after parsing attributes in process `syz.0.1469'. [ 364.653250][T10342] netlink: 4595 bytes leftover after parsing attributes in process `syz.1.1474'. [ 364.676463][T10342] netlink: 4595 bytes leftover after parsing attributes in process `syz.1.1474'. [ 364.707762][T10342] netlink: 4595 bytes leftover after parsing attributes in process `syz.1.1474'. [ 364.736649][T10342] netlink: 4595 bytes leftover after parsing attributes in process `syz.1.1474'. [ 368.096062][T10355] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1479'. [ 368.115806][T10359] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1481'. [ 368.279205][T10364] FAULT_INJECTION: forcing a failure. [ 368.279205][T10364] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 368.321041][T10364] CPU: 1 PID: 10364 Comm: syz.3.1482 Not tainted syzkaller #0 [ 368.328581][T10364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 368.338860][T10364] Call Trace: [ 368.342181][T10364] [ 368.345149][T10364] dump_stack_lvl+0x18c/0x250 [ 368.349866][T10364] ? show_regs_print_info+0x20/0x20 [ 368.355097][T10364] ? load_image+0x400/0x400 [ 368.359720][T10364] ? __lock_acquire+0x7d40/0x7d40 [ 368.364776][T10364] ? mark_lock+0x94/0x320 [ 368.369139][T10364] should_fail_ex+0x39d/0x4d0 [ 368.373853][T10364] prepare_alloc_pages+0x1e2/0x5f0 [ 368.379012][T10364] __alloc_pages+0x134/0x460 [ 368.383626][T10364] ? zone_statistics+0x170/0x170 [ 368.388719][T10364] ? do_wp_page+0x7ca/0x35f0 [ 368.393337][T10364] ? do_wp_page+0xfc5/0x35f0 [ 368.397956][T10364] __folio_alloc+0x10/0x20 [ 368.402401][T10364] vma_alloc_folio+0x47a/0x8f0 [ 368.407198][T10364] do_wp_page+0x1243/0x35f0 [ 368.411771][T10364] ? folio_put+0xd0/0xd0 [ 368.416049][T10364] ? do_raw_spin_lock+0x11f/0x2c0 [ 368.421106][T10364] ? __rwlock_init+0x150/0x150 [ 368.425909][T10364] handle_mm_fault+0x135d/0x4c00 [ 368.430874][T10364] ? handle_mm_fault+0xe7/0x4c00 [ 368.435846][T10364] ? numa_migrate_prep+0x350/0x350 [ 368.441012][T10364] ? lock_mm_and_find_vma+0x9c/0x2f0 [ 368.446321][T10364] do_user_addr_fault+0x730/0x12c0 [ 368.451471][T10364] exc_page_fault+0x64/0x100 [ 368.456088][T10364] asm_exc_page_fault+0x26/0x30 [ 368.460964][T10364] RIP: 0010:rep_movs_alternative+0x4a/0x90 [ 368.466813][T10364] Code: 75 f1 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 df 83 f9 08 73 e8 eb c9 a4 c3 48 8b 06 48 89 07 48 8d 47 08 48 83 e0 f8 48 29 f8 48 01 [ 368.486447][T10364] RSP: 0018:ffffc9000ea9f718 EFLAGS: 00050206 [ 368.492546][T10364] RAX: ffffffff8426f901 RBX: 1ffff92001d53fc7 RCX: 000000000000a5d0 [ 368.500542][T10364] RDX: 0000000000000000 RSI: ffff88805c2c5ce8 RDI: 0000200000006000 [ 368.508634][T10364] RBP: ffffc9000ea9f878 R08: ffff88805c2d02b7 R09: 1ffff1100b85a056 [ 368.516633][T10364] R10: dffffc0000000000 R11: ffffed100b85a057 R12: ffff88805c2c00e8 [ 368.524629][T10364] R13: 00000000000101d0 R14: 00000000000101d0 R15: ffffc9000ea9fe48 [ 368.532637][T10364] ? _copy_to_iter+0x171/0x1120 [ 368.537529][T10364] _copy_to_iter+0x24f/0x1120 [ 368.542272][T10364] ? _raw_spin_unlock_irqrestore+0xc5/0x120 [ 368.548206][T10364] ? iov_iter_init+0x1e0/0x1e0 [ 368.553001][T10364] ? __virt_addr_valid+0x18c/0x540 [ 368.558147][T10364] ? __virt_addr_valid+0x469/0x540 [ 368.563297][T10364] ? __phys_addr_symbol+0x2f/0x70 [ 368.568347][T10364] ? __check_object_size+0x506/0xa20 [ 368.573671][T10364] __skb_datagram_iter+0xdb/0x780 [ 368.578728][T10364] ? tsk_importance+0x150/0x150 [ 368.583605][T10364] ? skb_copy_datagram_iter+0x200/0x200 [ 368.589188][T10364] skb_copy_datagram_iter+0xb1/0x200 [ 368.594513][T10364] tipc_recvstream+0x72b/0xe70 [ 368.599315][T10364] ? tipc_sendstream+0x70/0x70 [ 368.604100][T10364] ____sys_recvmsg+0x2ce/0x5e0 [ 368.608901][T10364] ? __sys_recvmsg_sock+0x50/0x50 [ 368.613967][T10364] ? import_iovec+0x73/0xa0 [ 368.618510][T10364] ___sys_recvmsg+0x216/0x590 [ 368.623313][T10364] ? __sys_recvmsg+0x2a0/0x2a0 [ 368.628112][T10364] ? ksys_write+0x1c4/0x260 [ 368.632664][T10364] ? __fget_files+0x43d/0x4b0 [ 368.637472][T10364] __x64_sys_recvmsg+0x20c/0x2e0 [ 368.642445][T10364] ? ___sys_recvmsg+0x590/0x590 [ 368.647331][T10364] ? lockdep_hardirqs_on+0x98/0x150 [ 368.652552][T10364] do_syscall_64+0x55/0xa0 [ 368.657014][T10364] ? clear_bhb_loop+0x40/0x90 [ 368.661719][T10364] ? clear_bhb_loop+0x40/0x90 [ 368.666422][T10364] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 368.672340][T10364] RIP: 0033:0x7f1b0439bf79 [ 368.676780][T10364] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 368.696409][T10364] RSP: 002b:00007f1b051f4028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 368.704859][T10364] RAX: ffffffffffffffda RBX: 00007f1b04615fa0 RCX: 00007f1b0439bf79 [ 368.712970][T10364] RDX: 0000000000001f00 RSI: 0000200000000500 RDI: 0000000000000004 [ 368.721398][T10364] RBP: 00007f1b051f4090 R08: 0000000000000000 R09: 0000000000000000 [ 368.729399][T10364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 368.737396][T10364] R13: 00007f1b04616038 R14: 00007f1b04615fa0 R15: 00007ffe53333ee8 [ 368.745490][T10364] [ 368.775633][T10366] netlink: 'syz.4.1483': attribute type 1 has an invalid length. [ 368.793598][T10366] netlink: 193500 bytes leftover after parsing attributes in process `syz.4.1483'. [ 368.815177][T10369] netlink: 'syz.0.1484': attribute type 21 has an invalid length. [ 368.860636][T10369] netlink: 156 bytes leftover after parsing attributes in process `syz.0.1484'. [ 371.252602][T10387] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1491'. [ 371.263144][T10390] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1492'. [ 371.476838][T10394] netlink: 'syz.3.1493': attribute type 20 has an invalid length. [ 371.581660][T10399] netlink: 'syz.1.1495': attribute type 1 has an invalid length. [ 371.590436][T10399] netlink: 193500 bytes leftover after parsing attributes in process `syz.1.1495'. [ 371.937578][T10405] netlink: 'syz.1.1498': attribute type 21 has an invalid length. [ 372.161088][ T5085] Bluetooth: hci3: ISO packet for unknown connection handle 5 [ 372.716799][T10413] netlink: 60 bytes leftover after parsing attributes in process `syz.4.1501'. [ 372.729388][T10413] netlink: 60 bytes leftover after parsing attributes in process `syz.4.1501'. [ 372.741113][T10413] netlink: 60 bytes leftover after parsing attributes in process `syz.4.1501'. [ 373.327510][T10427] netlink: 'syz.1.1507': attribute type 21 has an invalid length. [ 373.339944][T10427] __nla_validate_parse: 1 callbacks suppressed [ 373.339966][T10427] netlink: 156 bytes leftover after parsing attributes in process `syz.1.1507'. [ 374.190063][T10437] netlink: 'syz.1.1511': attribute type 21 has an invalid length. [ 374.769117][T10450] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1513'. [ 375.117666][T10456] netlink: 'syz.4.1516': attribute type 1 has an invalid length. [ 375.147911][T10456] netlink: 193500 bytes leftover after parsing attributes in process `syz.4.1516'. [ 375.355002][T10454] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1524'. [ 377.373181][T10492] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1528'. [ 377.590784][T10494] netlink: 'syz.0.1529': attribute type 1 has an invalid length. [ 377.612598][T10494] netlink: 193500 bytes leftover after parsing attributes in process `syz.0.1529'. [ 378.967714][ T1281] ieee802154 phy0 wpan0: encryption failed: -22 [ 378.974151][ T1281] ieee802154 phy1 wpan1: encryption failed: -22 [ 379.057600][T10511] FAULT_INJECTION: forcing a failure. [ 379.057600][T10511] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 379.076166][T10511] CPU: 1 PID: 10511 Comm: syz.3.1534 Not tainted syzkaller #0 [ 379.083712][T10511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 379.093812][T10511] Call Trace: [ 379.097129][T10511] [ 379.100095][T10511] dump_stack_lvl+0x18c/0x250 [ 379.104840][T10511] ? show_regs_print_info+0x20/0x20 [ 379.110092][T10511] ? load_image+0x400/0x400 [ 379.114647][T10511] ? __might_fault+0xaa/0x120 [ 379.119375][T10511] ? __lock_acquire+0x7d40/0x7d40 [ 379.124466][T10511] should_fail_ex+0x39d/0x4d0 [ 379.129284][T10511] _copy_from_user+0x2f/0xe0 [ 379.133922][T10511] do_ipv6_setsockopt+0x3a2/0x3e20 [ 379.139117][T10511] ? sk_dst_reset+0xa0/0xa0 [ 379.143721][T10511] ? verify_lock_unused+0x140/0x140 [ 379.149000][T10511] ? mark_lock+0x94/0x320 [ 379.153387][T10511] ? __lock_acquire+0x1273/0x7d40 [ 379.158473][T10511] ? aa_label_sk_perm+0x463/0x5c0 [ 379.163586][T10511] ? aa_sk_perm+0x970/0x970 [ 379.168171][T10511] ? __might_sleep+0xe0/0xe0 [ 379.172829][T10511] ? ksys_write+0x1c4/0x260 [ 379.177415][T10511] ? aa_sk_perm+0x83c/0x970 [ 379.181979][T10511] ? __fget_files+0x28/0x4b0 [ 379.186637][T10511] ? aa_af_perm+0x330/0x330 [ 379.191201][T10511] ? __fget_files+0x28/0x4b0 [ 379.195864][T10511] ? __fget_files+0x28/0x4b0 [ 379.200511][T10511] ? aa_sock_opt_perm+0x74/0x100 [ 379.205504][T10511] ipv6_setsockopt+0x59/0x190 [ 379.210252][T10511] ? sock_common_recvmsg+0x190/0x190 [ 379.215607][T10511] do_sock_setsockopt+0x175/0x1a0 [ 379.220697][T10511] ? __fdget+0x180/0x210 [ 379.224999][T10511] __x64_sys_setsockopt+0x182/0x200 [ 379.230286][T10511] do_syscall_64+0x55/0xa0 [ 379.234763][T10511] ? clear_bhb_loop+0x40/0x90 [ 379.239486][T10511] ? clear_bhb_loop+0x40/0x90 [ 379.244216][T10511] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 379.250247][T10511] RIP: 0033:0x7f1b0439bf79 [ 379.254727][T10511] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 379.274378][T10511] RSP: 002b:00007f1b051f4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 379.282840][T10511] RAX: ffffffffffffffda RBX: 00007f1b04615fa0 RCX: 00007f1b0439bf79 [ 379.290859][T10511] RDX: 0000000000000019 RSI: 0000000000000029 RDI: 0000000000000003 [ 379.298880][T10511] RBP: 00007f1b051f4090 R08: 0000000000000004 R09: 0000000000000000 [ 379.306903][T10511] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 379.314926][T10511] R13: 00007f1b04616038 R14: 00007f1b04615fa0 R15: 00007ffe53333ee8 [ 379.323049][T10511] [ 379.349081][T10513] netlink: 16178 bytes leftover after parsing attributes in process `syz.0.1535'. [ 380.169763][T10531] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1542'. [ 380.182326][T10531] FAULT_INJECTION: forcing a failure. [ 380.182326][T10531] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 380.195808][T10531] CPU: 0 PID: 10531 Comm: syz.1.1542 Not tainted syzkaller #0 [ 380.203357][T10531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 380.213491][T10531] Call Trace: [ 380.216823][T10531] [ 380.219810][T10531] dump_stack_lvl+0x18c/0x250 [ 380.224570][T10531] ? show_regs_print_info+0x20/0x20 [ 380.229859][T10531] ? load_image+0x400/0x400 [ 380.234444][T10531] ? __might_fault+0xaa/0x120 [ 380.239194][T10531] should_fail_ex+0x39d/0x4d0 [ 380.243946][T10531] copyin+0x1a/0x90 [ 380.247858][T10531] _copy_from_iter+0x54f/0x12e0 [ 380.252799][T10531] ? copyout_mc+0x70/0x70 [ 380.257200][T10531] ? __sk_mem_raise_allocated+0xa29/0x1340 [ 380.263090][T10531] ? page_copy_sane+0x16a/0x270 [ 380.268015][T10531] copy_page_from_iter+0x7b/0x100 [ 380.273112][T10531] mptcp_sendmsg+0x9f2/0x16d0 [ 380.277907][T10531] ? mptcp_shutdown+0x80/0x80 [ 380.282645][T10531] ? inet_send_prepare+0x5c/0x260 [ 380.287762][T10531] ? inet6_sendmsg+0x5f/0xd0 [ 380.292413][T10531] ? inet6_compat_ioctl+0x3c0/0x3c0 [ 380.297676][T10531] ____sys_sendmsg+0x5ba/0x960 [ 380.302497][T10531] ? __lock_acquire+0x7d40/0x7d40 [ 380.307609][T10531] ? __sys_sendmsg_sock+0x30/0x30 [ 380.312699][T10531] ? __import_iovec+0x3fa/0x850 [ 380.317651][T10531] ? import_iovec+0x73/0xa0 [ 380.322262][T10531] ___sys_sendmsg+0x2a6/0x360 [ 380.327005][T10531] ? __sys_sendmsg+0x2a0/0x2a0 [ 380.331917][T10531] ? __lock_acquire+0x7d40/0x7d40 [ 380.337072][T10531] __se_sys_sendmsg+0x1c2/0x2b0 [ 380.341994][T10531] ? __x64_sys_sendmsg+0x80/0x80 [ 380.347030][T10531] ? lockdep_hardirqs_on+0x98/0x150 [ 380.352386][T10531] do_syscall_64+0x55/0xa0 [ 380.356862][T10531] ? clear_bhb_loop+0x40/0x90 [ 380.361606][T10531] ? clear_bhb_loop+0x40/0x90 [ 380.366358][T10531] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 380.372310][T10531] RIP: 0033:0x7feded39bf79 [ 380.376786][T10531] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 380.396461][T10531] RSP: 002b:00007fedee1d2028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 380.404948][T10531] RAX: ffffffffffffffda RBX: 00007feded615fa0 RCX: 00007feded39bf79 [ 380.412993][T10531] RDX: 0000000000000000 RSI: 0000200000000e00 RDI: 0000000000000003 [ 380.421025][T10531] RBP: 00007fedee1d2090 R08: 0000000000000000 R09: 0000000000000000 [ 380.429064][T10531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 380.437101][T10531] R13: 00007feded616038 R14: 00007feded615fa0 R15: 00007ffcfe1e74b8 [ 380.445180][T10531] [ 380.545751][T10537] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1543'. [ 380.634190][T10541] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1545'. [ 380.656580][T10541] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1545'. [ 380.686147][T10541] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1545'. [ 380.726916][T10541] FAULT_INJECTION: forcing a failure. [ 380.726916][T10541] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 380.801894][T10541] CPU: 1 PID: 10541 Comm: syz.1.1545 Not tainted syzkaller #0 [ 380.809439][T10541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 380.819552][T10541] Call Trace: [ 380.822873][T10541] [ 380.825861][T10541] dump_stack_lvl+0x18c/0x250 [ 380.830685][T10541] ? show_regs_print_info+0x20/0x20 [ 380.835940][T10541] ? load_image+0x400/0x400 [ 380.840493][T10541] ? __might_fault+0xaa/0x120 [ 380.845213][T10541] ? __lock_acquire+0x7d40/0x7d40 [ 380.850287][T10541] should_fail_ex+0x39d/0x4d0 [ 380.855029][T10541] _copy_from_user+0x2f/0xe0 [ 380.859679][T10541] ___sys_recvmsg+0x176/0x590 [ 380.864416][T10541] ? __sys_recvmsg+0x2a0/0x2a0 [ 380.869235][T10541] ? trace_call_bpf+0xc3/0x6c0 [ 380.874073][T10541] ? trace_call_bpf+0x5e9/0x6c0 [ 380.879005][T10541] ? __fget_files+0x43d/0x4b0 [ 380.883753][T10541] __x64_sys_recvmsg+0x20c/0x2e0 [ 380.888738][T10541] ? perf_trace_preemptirq_template+0x269/0x330 [ 380.895036][T10541] ? ___sys_recvmsg+0x590/0x590 [ 380.899956][T10541] ? lockdep_hardirqs_on+0x98/0x150 [ 380.905207][T10541] do_syscall_64+0x55/0xa0 [ 380.909676][T10541] ? clear_bhb_loop+0x40/0x90 [ 380.914486][T10541] ? clear_bhb_loop+0x40/0x90 [ 380.919258][T10541] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 380.925200][T10541] RIP: 0033:0x7feded39bf79 [ 380.929660][T10541] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 380.949402][T10541] RSP: 002b:00007fedee1d2028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 380.957870][T10541] RAX: ffffffffffffffda RBX: 00007feded615fa0 RCX: 00007feded39bf79 [ 380.965926][T10541] RDX: 0000000000010182 RSI: 00002000000005c0 RDI: 0000000000000003 [ 380.973952][T10541] RBP: 00007fedee1d2090 R08: 0000000000000000 R09: 0000000000000000 [ 380.981974][T10541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 380.989990][T10541] R13: 00007feded616038 R14: 00007feded615fa0 R15: 00007ffcfe1e74b8 [ 380.998021][T10541] [ 381.150639][T10554] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1549'. [ 381.174157][T10554] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1549'. [ 381.199252][T10554] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1549'. [ 381.515414][T10568] netlink: 'syz.4.1553': attribute type 6 has an invalid length. [ 381.527979][T10568] netlink: 'syz.4.1553': attribute type 1 has an invalid length. [ 381.550359][T10568] netlink: 199820 bytes leftover after parsing attributes in process `syz.4.1553'. [ 382.239911][T10576] netlink: 'syz.3.1558': attribute type 2 has an invalid length. [ 382.256244][T10576] netlink: 'syz.3.1558': attribute type 8 has an invalid length. [ 383.378308][T10612] FAULT_INJECTION: forcing a failure. [ 383.378308][T10612] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 383.406350][T10612] CPU: 0 PID: 10612 Comm: syz.3.1571 Not tainted syzkaller #0 [ 383.413914][T10612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 383.424068][T10612] Call Trace: [ 383.427407][T10612] [ 383.430389][T10612] dump_stack_lvl+0x18c/0x250 [ 383.435143][T10612] ? show_regs_print_info+0x20/0x20 [ 383.440391][T10612] ? load_image+0x400/0x400 [ 383.444932][T10612] ? __might_fault+0xaa/0x120 [ 383.449641][T10612] ? __lock_acquire+0x7d40/0x7d40 [ 383.454710][T10612] should_fail_ex+0x39d/0x4d0 [ 383.459424][T10612] _copy_from_iter+0x1d9/0x12e0 [ 383.464313][T10612] ? slab_post_alloc_hook+0x8a/0x4b0 [ 383.469637][T10612] ? __virt_addr_valid+0x18c/0x540 [ 383.474792][T10612] ? __lock_acquire+0x7d40/0x7d40 [ 383.479852][T10612] ? rcu_is_watching+0x15/0xb0 [ 383.484657][T10612] ? copyout_mc+0x70/0x70 [ 383.489023][T10612] ? __virt_addr_valid+0x18c/0x540 [ 383.494186][T10612] ? __virt_addr_valid+0x18c/0x540 [ 383.499341][T10612] ? __virt_addr_valid+0x469/0x540 [ 383.504491][T10612] ? __check_object_size+0x506/0xa20 [ 383.509817][T10612] netlink_sendmsg+0x76b/0xbf0 [ 383.514622][T10612] ? netlink_getsockopt+0x590/0x590 [ 383.519874][T10612] ? aa_sock_msg_perm+0x94/0x150 [ 383.524876][T10612] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 383.530229][T10612] ? security_socket_sendmsg+0x80/0xa0 [ 383.535724][T10612] ? netlink_getsockopt+0x590/0x590 [ 383.540967][T10612] ____sys_sendmsg+0x5ba/0x960 [ 383.545762][T10612] ? __asan_memset+0x22/0x40 [ 383.550390][T10612] ? __sys_sendmsg_sock+0x30/0x30 [ 383.555448][T10612] ? __import_iovec+0x5f2/0x850 [ 383.560350][T10612] ? import_iovec+0x73/0xa0 [ 383.564907][T10612] ___sys_sendmsg+0x2a6/0x360 [ 383.569615][T10612] ? __sys_sendmsg+0x2a0/0x2a0 [ 383.574420][T10612] ? trace_call_bpf+0xc3/0x6c0 [ 383.579249][T10612] __se_sys_sendmsg+0x1c2/0x2b0 [ 383.584130][T10612] ? __x64_sys_sendmsg+0x80/0x80 [ 383.589100][T10612] ? lockdep_hardirqs_on+0x98/0x150 [ 383.594355][T10612] do_syscall_64+0x55/0xa0 [ 383.598807][T10612] ? clear_bhb_loop+0x40/0x90 [ 383.603515][T10612] ? clear_bhb_loop+0x40/0x90 [ 383.608213][T10612] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 383.614305][T10612] RIP: 0033:0x7f1b0439bf79 [ 383.618758][T10612] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 383.638391][T10612] RSP: 002b:00007f1b051f4028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 383.646833][T10612] RAX: ffffffffffffffda RBX: 00007f1b04615fa0 RCX: 00007f1b0439bf79 [ 383.654830][T10612] RDX: 0000000000000000 RSI: 0000200000000940 RDI: 0000000000000003 [ 383.662857][T10612] RBP: 00007f1b051f4090 R08: 0000000000000000 R09: 0000000000000000 [ 383.670852][T10612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 383.680255][T10612] R13: 00007f1b04616038 R14: 00007f1b04615fa0 R15: 00007ffe53333ee8 [ 383.688285][T10612] [ 384.544681][T10626] netlink: 'syz.0.1576': attribute type 9 has an invalid length. [ 384.590554][T10626] __nla_validate_parse: 6 callbacks suppressed [ 384.590572][T10626] netlink: 61951 bytes leftover after parsing attributes in process `syz.0.1576'. [ 384.630793][T10628] netlink: 'syz.0.1576': attribute type 9 has an invalid length. [ 384.642676][T10628] netlink: 61951 bytes leftover after parsing attributes in process `syz.0.1576'. [ 384.713018][T10626] IPv6: NLM_F_CREATE should be specified when creating new route [ 385.146427][T10637] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1579'. [ 385.637148][T10650] netlink: 164 bytes leftover after parsing attributes in process `syz.1.1584'. [ 385.671130][T10650] netlink: 'syz.1.1584': attribute type 2 has an invalid length. [ 385.679515][T10650] netlink: 'syz.1.1584': attribute type 8 has an invalid length. [ 385.688425][T10650] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1584'. [ 386.840011][T10665] FAULT_INJECTION: forcing a failure. [ 386.840011][T10665] name failslab, interval 1, probability 0, space 0, times 0 [ 386.859624][T10665] CPU: 0 PID: 10665 Comm: syz.1.1591 Not tainted syzkaller #0 [ 386.867194][T10665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 386.877339][T10665] Call Trace: [ 386.880703][T10665] [ 386.883712][T10665] dump_stack_lvl+0x18c/0x250 [ 386.888496][T10665] ? show_regs_print_info+0x20/0x20 [ 386.893801][T10665] ? load_image+0x400/0x400 [ 386.898477][T10665] should_fail_ex+0x39d/0x4d0 [ 386.903282][T10665] should_failslab+0x9/0x20 [ 386.907876][T10665] slab_pre_alloc_hook+0x59/0x310 [ 386.913007][T10665] ? sctp_association_new+0x89/0x25c0 [ 386.918474][T10665] __kmem_cache_alloc_node+0x53/0x250 [ 386.923960][T10665] ? sctp_association_new+0x89/0x25c0 [ 386.929429][T10665] kmalloc_trace+0x2a/0xe0 [ 386.934114][T10665] sctp_association_new+0x89/0x25c0 [ 386.939430][T10665] ? bpf_lsm_capable+0x9/0x10 [ 386.944330][T10665] ? security_capable+0x89/0xb0 [ 386.949298][T10665] sctp_connect_new_asoc+0x2de/0x6a0 [ 386.954703][T10665] ? __sctp_connect+0xd80/0xd80 [ 386.959635][T10665] ? __local_bh_enable_ip+0x13a/0x1c0 [ 386.965098][T10665] ? _local_bh_enable+0xa0/0xa0 [ 386.970038][T10665] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 386.975935][T10665] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 386.981833][T10665] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 386.987469][T10665] ? security_sctp_bind_connect+0x89/0xb0 [ 386.993312][T10665] sctp_sendmsg+0x1575/0x28c0 [ 386.998145][T10665] ? sctp_getsockopt+0xb60/0xb60 [ 387.003178][T10665] ? aa_sk_perm+0x83c/0x970 [ 387.007804][T10665] ? aa_af_perm+0x330/0x330 [ 387.012405][T10665] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 387.018939][T10665] ? sock_rps_record_flow+0x19/0x3f0 [ 387.024366][T10665] ? inet_sendmsg+0x7c/0x2f0 [ 387.029058][T10665] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 387.034520][T10665] ? security_socket_sendmsg+0x80/0xa0 [ 387.040068][T10665] ? inet_send_prepare+0x260/0x260 [ 387.045283][T10665] ____sys_sendmsg+0x5ba/0x960 [ 387.050128][T10665] ? __lock_acquire+0x7d40/0x7d40 [ 387.055266][T10665] ? __asan_memset+0x22/0x40 [ 387.059950][T10665] ? __sys_sendmsg_sock+0x30/0x30 [ 387.065062][T10665] ? __import_iovec+0x5f2/0x850 [ 387.070043][T10665] ? import_iovec+0x73/0xa0 [ 387.074690][T10665] ___sys_sendmsg+0x2a6/0x360 [ 387.079554][T10665] ? __sys_sendmsg+0x2a0/0x2a0 [ 387.084483][T10665] ? __lock_acquire+0x7d40/0x7d40 [ 387.089683][T10665] __se_sys_sendmsg+0x1c2/0x2b0 [ 387.094624][T10665] ? __x64_sys_sendmsg+0x80/0x80 [ 387.099729][T10665] ? lockdep_hardirqs_on+0x98/0x150 [ 387.105054][T10665] do_syscall_64+0x55/0xa0 [ 387.109570][T10665] ? clear_bhb_loop+0x40/0x90 [ 387.114341][T10665] ? clear_bhb_loop+0x40/0x90 [ 387.119122][T10665] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 387.125104][T10665] RIP: 0033:0x7feded39bf79 [ 387.129604][T10665] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 387.149301][T10665] RSP: 002b:00007fedee1d2028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 387.157823][T10665] RAX: ffffffffffffffda RBX: 00007feded615fa0 RCX: 00007feded39bf79 [ 387.165914][T10665] RDX: 00000000000080d1 RSI: 0000200000000140 RDI: 0000000000000004 [ 387.173983][T10665] RBP: 00007fedee1d2090 R08: 0000000000000000 R09: 0000000000000000 [ 387.182041][T10665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 387.190102][T10665] R13: 00007feded616038 R14: 00007feded615fa0 R15: 00007ffcfe1e74b8 [ 387.198219][T10665] [ 387.448141][T10670] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1592'. [ 387.515699][T10674] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1593'. [ 387.742686][T10676] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1601'. [ 388.586714][T10695] netlink: 164 bytes leftover after parsing attributes in process `syz.3.1599'. [ 388.616216][T10695] netlink: 'syz.3.1599': attribute type 2 has an invalid length. [ 388.624737][T10695] netlink: 'syz.3.1599': attribute type 8 has an invalid length. [ 388.632884][T10695] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1599'. [ 389.361989][T10711] batman_adv: The newly added mac address (00:72:1a:bc:2e:b3) already exists on: batadv_slave_0 [ 389.402284][T10711] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 389.872068][T10715] netlink: 'syz.0.1608': attribute type 21 has an invalid length. [ 389.884499][T10715] IPv6: NLM_F_CREATE should be specified when creating new route [ 390.087253][T10721] netlink: 'syz.0.1608': attribute type 10 has an invalid length. [ 390.162003][T10721] veth0_vlan: left allmulticast mode [ 390.195025][T10721] veth0_vlan: left promiscuous mode [ 390.220399][T10721] veth0_vlan: entered promiscuous mode [ 390.252384][T10721] team0: Device veth0_vlan failed to register rx_handler [ 390.615276][T10731] __nla_validate_parse: 4 callbacks suppressed [ 390.615298][T10731] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1612'. [ 390.633398][T10731] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1612'. [ 390.662009][T10729] netlink: 164 bytes leftover after parsing attributes in process `syz.1.1611'. [ 390.685104][T10731] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1612'. [ 390.724405][T10729] netlink: 'syz.1.1611': attribute type 2 has an invalid length. [ 390.740362][T10729] netlink: 'syz.1.1611': attribute type 8 has an invalid length. [ 390.769008][T10729] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1611'. [ 390.790198][T10731] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1612'. [ 390.988138][T10739] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1616'. [ 391.019684][T10736] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1613'. [ 391.078863][T10739] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1616'. [ 391.095659][T10740] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1615'. [ 394.755700][T10775] FAULT_INJECTION: forcing a failure. [ 394.755700][T10775] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 394.802829][T10775] CPU: 1 PID: 10775 Comm: syz.0.1630 Not tainted syzkaller #0 [ 394.810399][T10775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 394.820509][T10775] Call Trace: [ 394.823842][T10775] [ 394.826825][T10775] dump_stack_lvl+0x18c/0x250 [ 394.831581][T10775] ? show_regs_print_info+0x20/0x20 [ 394.836851][T10775] ? load_image+0x400/0x400 [ 394.841422][T10775] ? __lock_acquire+0x7d40/0x7d40 [ 394.846515][T10775] ? snprintf+0xe9/0x140 [ 394.850811][T10775] should_fail_ex+0x39d/0x4d0 [ 394.855548][T10775] _copy_to_user+0x2f/0xa0 [ 394.860023][T10775] simple_read_from_buffer+0xe7/0x150 [ 394.865458][T10775] proc_fail_nth_read+0x1e8/0x260 [ 394.870626][T10775] ? proc_fault_inject_write+0x360/0x360 [ 394.876321][T10775] ? fsnotify_perm+0x271/0x5e0 [ 394.881140][T10775] ? proc_fault_inject_write+0x360/0x360 [ 394.886836][T10775] vfs_read+0x28b/0x970 [ 394.891048][T10775] ? kernel_read+0x1e0/0x1e0 [ 394.895683][T10775] ? __fget_files+0x28/0x4b0 [ 394.900322][T10775] ? __fget_files+0x28/0x4b0 [ 394.904962][T10775] ? __fget_files+0x43d/0x4b0 [ 394.909709][T10775] ? __fdget_pos+0x2a3/0x330 [ 394.914365][T10775] ? ksys_read+0x75/0x260 [ 394.918756][T10775] ksys_read+0x150/0x260 [ 394.923040][T10775] ? vfs_write+0x990/0x990 [ 394.927491][T10775] ? lockdep_hardirqs_on+0x98/0x150 [ 394.932724][T10775] do_syscall_64+0x55/0xa0 [ 394.937169][T10775] ? clear_bhb_loop+0x40/0x90 [ 394.941875][T10775] ? clear_bhb_loop+0x40/0x90 [ 394.946601][T10775] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 394.952538][T10775] RIP: 0033:0x7fc16af5c84e [ 394.956990][T10775] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 394.976633][T10775] RSP: 002b:00007fc16bea0fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 394.985075][T10775] RAX: ffffffffffffffda RBX: 00007fc16bea16c0 RCX: 00007fc16af5c84e [ 394.993064][T10775] RDX: 000000000000000f RSI: 00007fc16bea10a0 RDI: 0000000000000005 [ 395.001055][T10775] RBP: 00007fc16bea1090 R08: 0000000000000000 R09: 0000000000000000 [ 395.009049][T10775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 395.017046][T10775] R13: 00007fc16b216038 R14: 00007fc16b215fa0 R15: 00007ffce377b518 [ 395.025061][T10775] [ 395.708440][T10792] FAULT_INJECTION: forcing a failure. [ 395.708440][T10792] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 395.758281][T10789] netlink: 'syz.4.1634': attribute type 21 has an invalid length. [ 395.766913][T10792] CPU: 0 PID: 10792 Comm: syz.1.1636 Not tainted syzkaller #0 [ 395.774429][T10792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 395.784540][T10792] Call Trace: [ 395.787868][T10792] [ 395.790841][T10792] dump_stack_lvl+0x18c/0x250 [ 395.795587][T10792] ? show_regs_print_info+0x20/0x20 [ 395.800847][T10792] ? load_image+0x400/0x400 [ 395.805483][T10792] ? __might_fault+0xaa/0x120 [ 395.810210][T10792] ? __lock_acquire+0x7d40/0x7d40 [ 395.815273][T10792] should_fail_ex+0x39d/0x4d0 [ 395.819991][T10792] _copy_from_iter+0x1d9/0x12e0 [ 395.824874][T10792] ? __virt_addr_valid+0x18c/0x540 [ 395.830019][T10792] ? __lock_acquire+0x7d40/0x7d40 [ 395.835074][T10792] ? copyout_mc+0x70/0x70 [ 395.839438][T10792] ? __virt_addr_valid+0x18c/0x540 [ 395.844579][T10792] ? __virt_addr_valid+0x18c/0x540 [ 395.849712][T10792] ? __virt_addr_valid+0x469/0x540 [ 395.854861][T10792] ? __check_object_size+0x506/0xa20 [ 395.860198][T10792] tcp_sendmsg_locked+0x1e39/0x4ba0 [ 395.865436][T10792] ? verify_lock_unused+0x140/0x140 [ 395.870713][T10792] ? tcp_set_state+0x680/0x680 [ 395.875523][T10792] tcp_sendmsg+0x2f/0x50 [ 395.879790][T10792] ? inet_send_prepare+0x260/0x260 [ 395.884960][T10792] ____sys_sendmsg+0x5ba/0x960 [ 395.889750][T10792] ? __asan_memset+0x22/0x40 [ 395.894396][T10792] ? __sys_sendmsg_sock+0x30/0x30 [ 395.899444][T10792] ? __import_iovec+0x5f2/0x850 [ 395.904342][T10792] ? import_iovec+0x73/0xa0 [ 395.908881][T10792] ___sys_sendmsg+0x2a6/0x360 [ 395.913611][T10792] ? get_pid_task+0x20/0x1e0 [ 395.918237][T10792] ? __sys_sendmsg+0x2a0/0x2a0 [ 395.923040][T10792] ? __lock_acquire+0x7d40/0x7d40 [ 395.928109][T10792] __se_sys_sendmsg+0x1c2/0x2b0 [ 395.932988][T10792] ? __x64_sys_sendmsg+0x80/0x80 [ 395.937958][T10792] ? lockdep_hardirqs_on+0x98/0x150 [ 395.943187][T10792] do_syscall_64+0x55/0xa0 [ 395.947630][T10792] ? clear_bhb_loop+0x40/0x90 [ 395.952333][T10792] ? clear_bhb_loop+0x40/0x90 [ 395.957078][T10792] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 395.963088][T10792] RIP: 0033:0x7feded39bf79 [ 395.967533][T10792] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 395.987165][T10792] RSP: 002b:00007fedee1d2028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 395.996039][T10792] RAX: ffffffffffffffda RBX: 00007feded615fa0 RCX: 00007feded39bf79 [ 396.004036][T10792] RDX: 000000000000d2cc RSI: 0000200000000040 RDI: 0000000000000003 [ 396.012030][T10792] RBP: 00007fedee1d2090 R08: 0000000000000000 R09: 0000000000000000 [ 396.020027][T10792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 396.028020][T10792] R13: 00007feded616038 R14: 00007feded615fa0 R15: 00007ffcfe1e74b8 [ 396.036034][T10792] [ 396.045029][T10789] IPv6: NLM_F_CREATE should be specified when creating new route [ 396.132091][T10790] netlink: 'syz.4.1634': attribute type 10 has an invalid length. [ 396.166147][T10790] veth0_vlan: left allmulticast mode [ 396.182961][T10796] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 396.271391][T10790] veth0_vlan: left promiscuous mode [ 396.308938][T10790] veth0_vlan: entered promiscuous mode [ 396.317403][T10790] team0: Device veth0_vlan failed to register rx_handler [ 396.552346][T10800] __nla_validate_parse: 7 callbacks suppressed [ 396.552384][T10800] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1639'. [ 396.703637][T10808] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1640'. [ 396.992316][T10813] À: port 1(vlan0) entered blocking state [ 397.008759][T10813] À: port 1(vlan0) entered disabled state [ 397.025756][T10813] vlan0: entered allmulticast mode [ 397.046387][T10813] veth0_vlan: entered allmulticast mode [ 397.059144][T10813] vlan0: entered promiscuous mode [ 397.089162][T10818] 7: renamed from À [ 397.787869][T10828] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1649'. [ 397.803904][T10831] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1651'. [ 397.823444][T10833] netlink: 'syz.4.1650': attribute type 10 has an invalid length. [ 397.857835][T10833] team0: Port device hsr_slave_0 added [ 398.098829][T10837] netlink: 'syz.3.1652': attribute type 21 has an invalid length. [ 398.120414][T10837] IPv6: NLM_F_CREATE should be specified when creating new route [ 398.233801][T10840] netlink: 'syz.3.1652': attribute type 10 has an invalid length. [ 398.246384][T10840] veth0_vlan: left allmulticast mode [ 398.260340][T10840] veth0_vlan: left promiscuous mode [ 398.267520][T10840] veth0_vlan: entered promiscuous mode [ 398.275807][T10840] team0: Device veth0_vlan failed to register rx_handler [ 398.304421][T10839] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1654'. [ 398.329758][T10843] netlink: 164 bytes leftover after parsing attributes in process `syz.1.1655'. [ 398.358098][T10844] netlink: 'syz.1.1655': attribute type 2 has an invalid length. [ 398.387141][T10844] netlink: 'syz.1.1655': attribute type 8 has an invalid length. [ 398.407930][T10844] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1655'. [ 398.618345][T10849] FAULT_INJECTION: forcing a failure. [ 398.618345][T10849] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 398.648742][T10850] netlink: 'syz.0.1658': attribute type 10 has an invalid length. [ 398.665506][T10849] CPU: 0 PID: 10849 Comm: syz.3.1657 Not tainted syzkaller #0 [ 398.673083][T10849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 398.683199][T10849] Call Trace: [ 398.686535][T10849] [ 398.689514][T10849] dump_stack_lvl+0x18c/0x250 [ 398.694261][T10849] ? show_regs_print_info+0x20/0x20 [ 398.699514][T10849] ? load_image+0x400/0x400 [ 398.704086][T10849] ? __might_fault+0xaa/0x120 [ 398.708813][T10849] ? __lock_acquire+0x7d40/0x7d40 [ 398.713893][T10849] should_fail_ex+0x39d/0x4d0 [ 398.718635][T10849] _copy_from_user+0x2f/0xe0 [ 398.723375][T10849] ___sys_sendmsg+0x1c7/0x360 [ 398.728101][T10849] ? __sys_sendmsg+0x2a0/0x2a0 [ 398.732934][T10849] ? trace_call_bpf+0xc3/0x6c0 [ 398.737780][T10849] __se_sys_sendmsg+0x1c2/0x2b0 [ 398.742676][T10849] ? __x64_sys_sendmsg+0x80/0x80 [ 398.747767][T10849] ? lockdep_hardirqs_on+0x98/0x150 [ 398.753029][T10849] do_syscall_64+0x55/0xa0 [ 398.757520][T10849] ? clear_bhb_loop+0x40/0x90 [ 398.762253][T10849] ? clear_bhb_loop+0x40/0x90 [ 398.766981][T10849] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 398.772936][T10849] RIP: 0033:0x7f1b0439bf79 [ 398.777406][T10849] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 398.797068][T10849] RSP: 002b:00007f1b051f4028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 398.805529][T10849] RAX: ffffffffffffffda RBX: 00007f1b04615fa0 RCX: 00007f1b0439bf79 [ 398.813530][T10849] RDX: 0000000000000000 RSI: 0000200000000600 RDI: 0000000000000003 [ 398.821524][T10849] RBP: 00007f1b051f4090 R08: 0000000000000000 R09: 0000000000000000 [ 398.829518][T10849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 398.837511][T10849] R13: 00007f1b04616038 R14: 00007f1b04615fa0 R15: 00007ffe53333ee8 [ 398.845519][T10849] [ 398.867161][T10850] team0: Port device hsr_slave_0 added [ 398.900321][T10851] netlink: 'syz.0.1658': attribute type 1 has an invalid length. [ 399.102748][T10857] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1661'. [ 400.287921][T10877] tun0: tun_chr_ioctl cmd 1074025675 [ 400.295589][T10877] tun0: persist enabled [ 400.300248][T10877] tun0: tun_chr_ioctl cmd 1074025675 [ 400.330239][T10877] tun0: persist disabled [ 400.352865][T10876] netlink: 164 bytes leftover after parsing attributes in process `syz.4.1667'. [ 400.389838][T10876] netlink: 'syz.4.1667': attribute type 2 has an invalid length. [ 400.398403][T10876] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1667'. [ 400.905065][T10891] validate_nla: 1 callbacks suppressed [ 400.905133][T10891] netlink: 'syz.0.1675': attribute type 1 has an invalid length. [ 401.300846][T10903] netlink: 'syz.0.1678': attribute type 29 has an invalid length. [ 401.317205][T10903] netlink: 'syz.0.1678': attribute type 29 has an invalid length. [ 401.618942][T10907] __nla_validate_parse: 2 callbacks suppressed [ 401.618961][T10907] netlink: 164 bytes leftover after parsing attributes in process `syz.4.1681'. [ 401.657566][T10909] netlink: 'syz.4.1681': attribute type 2 has an invalid length. [ 401.683565][T10909] netlink: 'syz.4.1681': attribute type 8 has an invalid length. [ 401.702291][T10909] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1681'. [ 401.956260][T10914] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1683'. [ 402.198722][T10920] netlink: 'syz.0.1686': attribute type 10 has an invalid length. [ 402.246888][T10920] team0: Device veth0_vlan failed to register rx_handler [ 402.397286][T10922] netlink: 'syz.3.1687': attribute type 1 has an invalid length. [ 402.444061][T10922] netlink: 193500 bytes leftover after parsing attributes in process `syz.3.1687'. [ 402.462903][T10927] veth0_vlan: entered allmulticast mode [ 402.507482][T10929] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1689'. [ 402.531381][T10929] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1689'. [ 402.570133][T10930] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1689'. [ 402.596685][T10929] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1689'. [ 402.833496][T10934] netlink: 199816 bytes leftover after parsing attributes in process `syz.3.1691'. [ 402.858320][T10937] netlink: 164 bytes leftover after parsing attributes in process `syz.1.1692'. [ 402.885304][T10937] netlink: 'syz.1.1692': attribute type 2 has an invalid length. [ 402.900614][T10937] netlink: 'syz.1.1692': attribute type 8 has an invalid length. [ 403.109127][T10944] FAULT_INJECTION: forcing a failure. [ 403.109127][T10944] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 403.140641][T10944] CPU: 1 PID: 10944 Comm: syz.1.1694 Not tainted syzkaller #0 [ 403.148189][T10944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 403.158291][T10944] Call Trace: [ 403.161624][T10944] [ 403.164603][T10944] dump_stack_lvl+0x18c/0x250 [ 403.169343][T10944] ? show_regs_print_info+0x20/0x20 [ 403.174603][T10944] ? load_image+0x400/0x400 [ 403.179160][T10944] ? __might_fault+0xaa/0x120 [ 403.183891][T10944] ? __lock_acquire+0x7d40/0x7d40 [ 403.188972][T10944] should_fail_ex+0x39d/0x4d0 [ 403.193730][T10944] _copy_from_user+0x2f/0xe0 [ 403.198373][T10944] ___sys_recvmsg+0x176/0x590 [ 403.203103][T10944] ? __sys_recvmsg+0x2a0/0x2a0 [ 403.207928][T10944] ? ksys_write+0x1c4/0x260 [ 403.212502][T10944] ? __fget_files+0x43d/0x4b0 [ 403.217245][T10944] __x64_sys_recvmsg+0x20c/0x2e0 [ 403.222232][T10944] ? ___sys_recvmsg+0x590/0x590 [ 403.227148][T10944] ? lockdep_hardirqs_on+0x98/0x150 [ 403.232393][T10944] do_syscall_64+0x55/0xa0 [ 403.236856][T10944] ? clear_bhb_loop+0x40/0x90 [ 403.241564][T10944] ? clear_bhb_loop+0x40/0x90 [ 403.246295][T10944] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 403.252218][T10944] RIP: 0033:0x7feded39bf79 [ 403.256666][T10944] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 403.276296][T10944] RSP: 002b:00007fedee1d2028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 403.284741][T10944] RAX: ffffffffffffffda RBX: 00007feded615fa0 RCX: 00007feded39bf79 [ 403.292738][T10944] RDX: 0000000000010182 RSI: 00002000000005c0 RDI: 0000000000000003 [ 403.300817][T10944] RBP: 00007fedee1d2090 R08: 0000000000000000 R09: 0000000000000000 [ 403.308834][T10944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 403.316834][T10944] R13: 00007feded616038 R14: 00007feded615fa0 R15: 00007ffcfe1e74b8 [ 403.324842][T10944] [ 403.717231][T10952] ±ÿ: renamed from team_slave_1 (while UP) [ 404.135678][T10961] À: port 1(vlan0) entered blocking state [ 404.145538][T10961] À: port 1(vlan0) entered disabled state [ 404.153669][T10961] vlan0: entered allmulticast mode [ 404.162708][T10961] veth0_vlan: entered allmulticast mode [ 404.187312][T10961] vlan0: entered promiscuous mode [ 404.567138][T10966] netlink: 'syz.4.1702': attribute type 2 has an invalid length. [ 405.275545][T10984] veth0_vlan: left allmulticast mode [ 405.304684][T10984] veth0_vlan: left promiscuous mode [ 405.322283][T10984] veth0_vlan: entered promiscuous mode [ 405.345192][T10984] team0: Device veth0_vlan failed to register rx_handler [ 405.699251][T10994] veth0_vlan: left promiscuous mode [ 405.723623][T10994] veth0_vlan: entered promiscuous mode [ 405.739805][T10994] team0: Device veth0_vlan failed to register rx_handler [ 406.192620][T11004] validate_nla: 3 callbacks suppressed [ 406.192639][T11004] netlink: 'syz.0.1714': attribute type 2 has an invalid length. [ 406.260823][T11004] netlink: 'syz.0.1714': attribute type 8 has an invalid length. [ 407.533437][T11031] ±ÿ: renamed from team_slave_1 (while UP) [ 407.838959][T11040] À: port 1(vlan0) entered blocking state [ 407.855562][T11040] À: port 1(vlan0) entered disabled state [ 407.870008][T11040] vlan0: entered allmulticast mode [ 407.890805][T11040] vlan0: entered promiscuous mode [ 408.231520][T11043] __nla_validate_parse: 9 callbacks suppressed [ 408.231540][T11043] netlink: 164 bytes leftover after parsing attributes in process `syz.0.1728'. [ 408.302904][T11043] netlink: 'syz.0.1728': attribute type 2 has an invalid length. [ 408.322311][T11043] netlink: 'syz.0.1728': attribute type 8 has an invalid length. [ 408.341706][T11043] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1728'. [ 408.828707][T11057] netlink: 164 bytes leftover after parsing attributes in process `syz.3.1743'. [ 408.905101][T11062] netlink: 'syz.3.1743': attribute type 2 has an invalid length. [ 408.960115][T11062] netlink: 'syz.3.1743': attribute type 8 has an invalid length. [ 408.971239][T11062] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1743'. [ 408.980964][T11065] ±ÿ: renamed from team_slave_1 (while UP) [ 409.966916][T11094] FAULT_INJECTION: forcing a failure. [ 409.966916][T11094] name failslab, interval 1, probability 0, space 0, times 0 [ 409.980113][T11094] CPU: 1 PID: 11094 Comm: syz.1.1749 Not tainted syzkaller #0 [ 409.987635][T11094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 409.997743][T11094] Call Trace: [ 410.001066][T11094] [ 410.004041][T11094] dump_stack_lvl+0x18c/0x250 [ 410.008795][T11094] ? show_regs_print_info+0x20/0x20 [ 410.014058][T11094] ? load_image+0x400/0x400 [ 410.018629][T11094] ? __might_sleep+0xe0/0xe0 [ 410.023289][T11094] ? __lock_acquire+0x7d40/0x7d40 [ 410.028360][T11094] ? __lock_acquire+0x1273/0x7d40 [ 410.033433][T11094] should_fail_ex+0x39d/0x4d0 [ 410.038156][T11094] should_failslab+0x9/0x20 [ 410.042700][T11094] slab_pre_alloc_hook+0x59/0x310 [ 410.047858][T11094] kmem_cache_alloc_node+0x60/0x320 [ 410.053096][T11094] ? __alloc_skb+0x103/0x2c0 [ 410.057727][T11094] __alloc_skb+0x103/0x2c0 [ 410.062196][T11094] alloc_skb_with_frags+0xca/0x7b0 [ 410.067337][T11094] ? __lock_acquire+0x7d40/0x7d40 [ 410.072406][T11094] ? __lock_acquire+0x1273/0x7d40 [ 410.077476][T11094] sock_alloc_send_pskb+0x883/0x9a0 [ 410.082713][T11094] ? __might_fault+0xaa/0x120 [ 410.087427][T11094] ? sock_kzfree_s+0x50/0x50 [ 410.092049][T11094] ? verify_lock_unused+0x140/0x140 [ 410.097278][T11094] ? dev_get_by_index+0x22/0x2d0 [ 410.102247][T11094] ? dev_get_by_index+0x22/0x2d0 [ 410.107213][T11094] packet_sendmsg+0x316e/0x4d70 [ 410.112212][T11094] ? __might_sleep+0xe0/0xe0 [ 410.116834][T11094] ? verify_lock_unused+0x140/0x140 [ 410.122078][T11094] ? mark_lock+0x94/0x320 [ 410.126444][T11094] ? __lock_acquire+0x1273/0x7d40 [ 410.131491][T11094] ? verify_lock_unused+0x140/0x140 [ 410.136756][T11094] ? aa_sk_perm+0x83c/0x970 [ 410.141303][T11094] ? packet_getsockopt+0xad0/0xad0 [ 410.146552][T11094] ? aa_sock_msg_perm+0x94/0x150 [ 410.151615][T11094] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 410.156934][T11094] ? security_socket_sendmsg+0x80/0xa0 [ 410.162427][T11094] ? packet_getsockopt+0xad0/0xad0 [ 410.167577][T11094] ____sys_sendmsg+0x5ba/0x960 [ 410.172408][T11094] ? __lock_acquire+0x7d40/0x7d40 [ 410.177465][T11094] ? __asan_memset+0x22/0x40 [ 410.182124][T11094] ? __sys_sendmsg_sock+0x30/0x30 [ 410.187171][T11094] ? __import_iovec+0x5f2/0x850 [ 410.192061][T11094] ? import_iovec+0x73/0xa0 [ 410.196602][T11094] ___sys_sendmsg+0x2a6/0x360 [ 410.201302][T11094] ? get_pid_task+0x20/0x1e0 [ 410.205955][T11094] ? __sys_sendmsg+0x2a0/0x2a0 [ 410.210765][T11094] ? __lock_acquire+0x7d40/0x7d40 [ 410.215860][T11094] __se_sys_sendmsg+0x1c2/0x2b0 [ 410.220744][T11094] ? __x64_sys_sendmsg+0x80/0x80 [ 410.225716][T11094] ? lockdep_hardirqs_on+0x98/0x150 [ 410.230953][T11094] do_syscall_64+0x55/0xa0 [ 410.235399][T11094] ? clear_bhb_loop+0x40/0x90 [ 410.240099][T11094] ? clear_bhb_loop+0x40/0x90 [ 410.244802][T11094] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 410.250718][T11094] RIP: 0033:0x7feded39bf79 [ 410.255158][T11094] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 410.274791][T11094] RSP: 002b:00007fedee1d2028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 410.283244][T11094] RAX: ffffffffffffffda RBX: 00007feded615fa0 RCX: 00007feded39bf79 [ 410.291247][T11094] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 410.299249][T11094] RBP: 00007fedee1d2090 R08: 0000000000000000 R09: 0000000000000000 [ 410.307251][T11094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 410.315255][T11094] R13: 00007feded616038 R14: 00007feded615fa0 R15: 00007ffcfe1e74b8 [ 410.323360][T11094] [ 410.554273][T11097] netlink: 164 bytes leftover after parsing attributes in process `syz.1.1750'. [ 410.626102][T11097] netlink: 'syz.1.1750': attribute type 2 has an invalid length. [ 410.642511][T11097] netlink: 'syz.1.1750': attribute type 8 has an invalid length. [ 410.706230][T11097] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1750'. [ 411.249419][T11106] netlink: 199816 bytes leftover after parsing attributes in process `syz.1.1753'. [ 411.300392][T11105] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1754'. [ 411.312875][T11109] veth0_vlan: entered allmulticast mode [ 411.915691][T11127] netlink: 164 bytes leftover after parsing attributes in process `syz.0.1761'. [ 412.002076][T11123] netlink: 'syz.0.1761': attribute type 2 has an invalid length. [ 412.010196][T11123] netlink: 'syz.0.1761': attribute type 8 has an invalid length. [ 412.033912][T11123] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1761'. [ 412.429312][T11133] FAULT_INJECTION: forcing a failure. [ 412.429312][T11133] name failslab, interval 1, probability 0, space 0, times 0 [ 412.444181][T11133] CPU: 1 PID: 11133 Comm: syz.4.1764 Not tainted syzkaller #0 [ 412.451706][T11133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 412.461812][T11133] Call Trace: [ 412.465132][T11133] [ 412.468122][T11133] dump_stack_lvl+0x18c/0x250 [ 412.472848][T11133] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 412.479146][T11133] ? show_regs_print_info+0x20/0x20 [ 412.484403][T11133] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 412.490626][T11133] should_fail_ex+0x39d/0x4d0 [ 412.495370][T11133] should_failslab+0x9/0x20 [ 412.499930][T11133] slab_pre_alloc_hook+0x59/0x310 [ 412.505057][T11133] ? __debug_object_init+0xec/0x450 [ 412.510304][T11133] kmem_cache_alloc+0x5a/0x2d0 [ 412.515115][T11133] ? slab_build_skb+0x2b/0x3f0 [ 412.519923][T11133] slab_build_skb+0x2b/0x3f0 [ 412.524557][T11133] bpf_prog_test_run_skb+0x3c8/0x12b0 [ 412.529999][T11133] ? __fget_files+0x28/0x4b0 [ 412.534621][T11133] ? __fget_files+0x28/0x4b0 [ 412.539250][T11133] ? __fget_files+0x43d/0x4b0 [ 412.543961][T11133] ? cpu_online+0x60/0x60 [ 412.548328][T11133] bpf_prog_test_run+0x321/0x390 [ 412.553299][T11133] __sys_bpf+0x49d/0x890 [ 412.557580][T11133] ? bpf_link_show_fdinfo+0x390/0x390 [ 412.562989][T11133] ? lock_chain_count+0x20/0x20 [ 412.567859][T11133] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 412.573888][T11133] __x64_sys_bpf+0x7c/0x90 [ 412.578334][T11133] do_syscall_64+0x55/0xa0 [ 412.582781][T11133] ? clear_bhb_loop+0x40/0x90 [ 412.587482][T11133] ? clear_bhb_loop+0x40/0x90 [ 412.592184][T11133] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 412.598104][T11133] RIP: 0033:0x7fd43059bf79 [ 412.602547][T11133] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 412.622195][T11133] RSP: 002b:00007fd4314aa028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 412.630638][T11133] RAX: ffffffffffffffda RBX: 00007fd430815fa0 RCX: 00007fd43059bf79 [ 412.638642][T11133] RDX: 0000000000000048 RSI: 00002000000002c0 RDI: 000000000000000a [ 412.646637][T11133] RBP: 00007fd4314aa090 R08: 0000000000000000 R09: 0000000000000000 [ 412.654632][T11133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 412.662628][T11133] R13: 00007fd430816038 R14: 00007fd430815fa0 R15: 00007ffdf0c5ca38 [ 412.670658][T11133] [ 413.301089][T11145] __nla_validate_parse: 1 callbacks suppressed [ 413.301127][T11145] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1769'. [ 413.533025][T11157] netlink: 164 bytes leftover after parsing attributes in process `syz.4.1773'. [ 413.568665][T11157] netlink: 'syz.4.1773': attribute type 2 has an invalid length. [ 413.577641][T11157] netlink: 'syz.4.1773': attribute type 8 has an invalid length. [ 413.588024][T11157] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1773'. [ 414.118136][T11177] netlink: 199816 bytes leftover after parsing attributes in process `syz.4.1779'. [ 414.820755][T11184] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1782'. [ 415.124373][T11195] netlink: 164 bytes leftover after parsing attributes in process `syz.1.1786'. [ 415.192784][T11195] netlink: 'syz.1.1786': attribute type 2 has an invalid length. [ 415.240453][T11195] netlink: 'syz.1.1786': attribute type 8 has an invalid length. [ 415.269909][T11195] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1786'. [ 415.843568][T11214] netlink: 199816 bytes leftover after parsing attributes in process `syz.1.1793'. [ 417.202166][T11243] netlink: 164 bytes leftover after parsing attributes in process `syz.0.1801'. [ 417.229335][T11243] netlink: 'syz.0.1801': attribute type 2 has an invalid length. [ 417.260439][T11243] netlink: 'syz.0.1801': attribute type 8 has an invalid length. [ 417.278179][T11243] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1801'. [ 418.697643][T11271] FAULT_INJECTION: forcing a failure. [ 418.697643][T11271] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 418.738348][T11271] CPU: 1 PID: 11271 Comm: syz.1.1812 Not tainted syzkaller #0 [ 418.746097][T11271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 418.756205][T11271] Call Trace: [ 418.759526][T11271] [ 418.762496][T11271] dump_stack_lvl+0x18c/0x250 [ 418.767260][T11271] ? show_regs_print_info+0x20/0x20 [ 418.772527][T11271] ? load_image+0x400/0x400 [ 418.777092][T11271] ? __might_fault+0xaa/0x120 [ 418.781800][T11271] ? __lock_acquire+0x7d40/0x7d40 [ 418.786859][T11271] should_fail_ex+0x39d/0x4d0 [ 418.791598][T11271] _copy_from_iter+0x1d9/0x12e0 [ 418.796499][T11271] ? copyout_mc+0x70/0x70 [ 418.800865][T11271] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 418.806882][T11271] ? lock_chain_count+0x20/0x20 [ 418.811756][T11271] ? _raw_spin_lock_irq+0xbb/0xf0 [ 418.816810][T11271] ? _raw_spin_lock_irqsave+0x100/0x100 [ 418.822386][T11271] ? page_copy_sane+0x4e/0x270 [ 418.827197][T11271] copy_page_from_iter+0x7b/0x100 [ 418.832264][T11271] pipe_write+0x868/0x1b10 [ 418.836718][T11271] ? pipe_write+0xe11/0x1b10 [ 418.841357][T11271] ? pipe_read+0x1310/0x1310 [ 418.845985][T11271] ? wake_bit_function+0x200/0x200 [ 418.851119][T11271] ? common_file_perm+0x198/0x1f0 [ 418.856180][T11271] vfs_write+0x46c/0x990 [ 418.860455][T11271] ? file_end_write+0x250/0x250 [ 418.865348][T11271] ? __fget_files+0x43d/0x4b0 [ 418.870057][T11271] ? __fdget_pos+0x1d8/0x330 [ 418.874685][T11271] ? ksys_write+0x75/0x260 [ 418.879141][T11271] ksys_write+0x150/0x260 [ 418.883505][T11271] ? __ia32_sys_read+0x90/0x90 [ 418.888318][T11271] ? lockdep_hardirqs_on+0x98/0x150 [ 418.893641][T11271] do_syscall_64+0x55/0xa0 [ 418.898095][T11271] ? clear_bhb_loop+0x40/0x90 [ 418.902802][T11271] ? clear_bhb_loop+0x40/0x90 [ 418.907518][T11271] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 418.913452][T11271] RIP: 0033:0x7feded39bf79 [ 418.917902][T11271] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 418.937553][T11271] RSP: 002b:00007fedee1d2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 418.946012][T11271] RAX: ffffffffffffffda RBX: 00007feded615fa0 RCX: 00007feded39bf79 [ 418.954022][T11271] RDX: 000000000000fdef RSI: 0000200000000180 RDI: 0000000000000000 [ 418.962017][T11271] RBP: 00007fedee1d2090 R08: 0000000000000000 R09: 0000000000000000 [ 418.970020][T11271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 418.978108][T11271] R13: 00007feded616038 R14: 00007feded615fa0 R15: 00007ffcfe1e74b8 [ 418.986124][T11271] [ 419.190901][T11279] __nla_validate_parse: 1 callbacks suppressed [ 419.190973][T11279] netlink: 199816 bytes leftover after parsing attributes in process `syz.3.1817'. [ 419.342577][T11281] netlink: 164 bytes leftover after parsing attributes in process `syz.1.1816'. [ 419.399231][T11281] netlink: 'syz.1.1816': attribute type 2 has an invalid length. [ 419.419755][T11281] netlink: 'syz.1.1816': attribute type 8 has an invalid length. [ 419.481596][T11281] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1816'. [ 419.735665][T11299] netlink: 'syz.1.1822': attribute type 20 has an invalid length. [ 419.908851][T11304] FAULT_INJECTION: forcing a failure. [ 419.908851][T11304] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 419.954944][T11303] netlink: 'syz.3.1824': attribute type 20 has an invalid length. [ 419.965160][T11304] CPU: 0 PID: 11304 Comm: syz.4.1825 Not tainted syzkaller #0 [ 419.972697][T11304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 419.982806][T11304] Call Trace: [ 419.986144][T11304] [ 419.989127][T11304] dump_stack_lvl+0x18c/0x250 [ 419.993975][T11304] ? show_regs_print_info+0x20/0x20 [ 419.999233][T11304] ? load_image+0x400/0x400 [ 420.003790][T11304] ? __might_fault+0xaa/0x120 [ 420.008521][T11304] ? __lock_acquire+0x7d40/0x7d40 [ 420.013615][T11304] should_fail_ex+0x39d/0x4d0 [ 420.018365][T11304] _copy_from_user+0x2f/0xe0 [ 420.023020][T11304] ___sys_recvmsg+0x176/0x590 [ 420.027759][T11304] ? __sys_recvmsg+0x2a0/0x2a0 [ 420.032576][T11304] ? ksys_write+0x1c4/0x260 [ 420.037151][T11304] ? __fget_files+0x43d/0x4b0 [ 420.041903][T11304] __x64_sys_recvmsg+0x20c/0x2e0 [ 420.046896][T11304] ? ___sys_recvmsg+0x590/0x590 [ 420.051809][T11304] ? lockdep_hardirqs_on+0x98/0x150 [ 420.057078][T11304] do_syscall_64+0x55/0xa0 [ 420.061549][T11304] ? clear_bhb_loop+0x40/0x90 [ 420.066280][T11304] ? clear_bhb_loop+0x40/0x90 [ 420.071008][T11304] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 420.076972][T11304] RIP: 0033:0x7fd43059bf79 [ 420.081440][T11304] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 420.101097][T11304] RSP: 002b:00007fd4314aa028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 420.109565][T11304] RAX: ffffffffffffffda RBX: 00007fd430815fa0 RCX: 00007fd43059bf79 [ 420.117591][T11304] RDX: 0000000000001f00 RSI: 0000200000000500 RDI: 0000000000000003 [ 420.125622][T11304] RBP: 00007fd4314aa090 R08: 0000000000000000 R09: 0000000000000000 [ 420.133645][T11304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 420.141670][T11304] R13: 00007fd430816038 R14: 00007fd430815fa0 R15: 00007ffdf0c5ca38 [ 420.149710][T11304] [ 421.040653][T11311] syzkaller0: entered promiscuous mode [ 421.058335][T11311] syzkaller0: entered allmulticast mode [ 421.227808][T11318] netlink: 199816 bytes leftover after parsing attributes in process `syz.4.1829'. [ 428.447153][T11323] netlink: 164 bytes leftover after parsing attributes in process `syz.1.1830'. [ 428.457257][T11322] netlink: 'syz.1.1830': attribute type 2 has an invalid length. [ 428.482211][T11322] netlink: 'syz.1.1830': attribute type 8 has an invalid length. [ 428.505149][T11322] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1830'. [ 428.751806][T11333] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1834'. [ 429.466761][T11346] netlink: 'syz.1.1838': attribute type 20 has an invalid length. [ 429.985459][T11353] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1841'. [ 430.496385][T11361] netlink: 164 bytes leftover after parsing attributes in process `syz.4.1843'. [ 430.525101][T11361] netlink: 'syz.4.1843': attribute type 2 has an invalid length. [ 430.537414][T11361] netlink: 'syz.4.1843': attribute type 8 has an invalid length. [ 430.554748][T11361] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1843'. [ 430.773593][T11364] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1844'. [ 430.936402][T11372] FAULT_INJECTION: forcing a failure. [ 430.936402][T11372] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 430.959070][T11372] CPU: 1 PID: 11372 Comm: syz.0.1848 Not tainted syzkaller #0 [ 430.966614][T11372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 430.976872][T11372] Call Trace: [ 430.980196][T11372] [ 430.983173][T11372] dump_stack_lvl+0x18c/0x250 [ 430.987928][T11372] ? show_regs_print_info+0x20/0x20 [ 430.993183][T11372] ? load_image+0x400/0x400 [ 430.997740][T11372] ? __might_fault+0xaa/0x120 [ 431.002477][T11372] ? __lock_acquire+0x7d40/0x7d40 [ 431.007558][T11372] should_fail_ex+0x39d/0x4d0 [ 431.012292][T11372] _copy_from_user+0x2f/0xe0 [ 431.016931][T11372] ___sys_sendmsg+0x1c7/0x360 [ 431.021654][T11372] ? get_pid_task+0x20/0x1e0 [ 431.026342][T11372] ? __sys_sendmsg+0x2a0/0x2a0 [ 431.031180][T11372] ? __lock_acquire+0x7d40/0x7d40 [ 431.036279][T11372] __se_sys_sendmsg+0x1c2/0x2b0 [ 431.041174][T11372] ? __x64_sys_sendmsg+0x80/0x80 [ 431.046174][T11372] ? lockdep_hardirqs_on+0x98/0x150 [ 431.051428][T11372] do_syscall_64+0x55/0xa0 [ 431.055901][T11372] ? clear_bhb_loop+0x40/0x90 [ 431.060627][T11372] ? clear_bhb_loop+0x40/0x90 [ 431.065357][T11372] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 431.071308][T11372] RIP: 0033:0x7fc16af9bf79 [ 431.075779][T11372] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 431.095448][T11372] RSP: 002b:00007fc16bea1028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 431.103922][T11372] RAX: ffffffffffffffda RBX: 00007fc16b215fa0 RCX: 00007fc16af9bf79 [ 431.111957][T11372] RDX: 0000000000000000 RSI: 0000200000000940 RDI: 0000000000000003 [ 431.119982][T11372] RBP: 00007fc16bea1090 R08: 0000000000000000 R09: 0000000000000000 [ 431.127997][T11372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 431.136030][T11372] R13: 00007fc16b216038 R14: 00007fc16b215fa0 R15: 00007ffce377b518 [ 431.144107][T11372] [ 431.200633][T11377] sock: sock_timestamping_bind_phc: sock not bind to device [ 431.785997][T11385] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1851'. [ 432.081678][T11394] netlink: 164 bytes leftover after parsing attributes in process `syz.0.1855'. [ 432.483606][T11402] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1858'. [ 432.723793][T11409] FAULT_INJECTION: forcing a failure. [ 432.723793][T11409] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 432.762224][T11409] CPU: 0 PID: 11409 Comm: syz.0.1860 Not tainted syzkaller #0 [ 432.769798][T11409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 432.779913][T11409] Call Trace: [ 432.783241][T11409] [ 432.786233][T11409] dump_stack_lvl+0x18c/0x250 [ 432.790969][T11409] ? show_regs_print_info+0x20/0x20 [ 432.796214][T11409] ? load_image+0x400/0x400 [ 432.800751][T11409] ? __lock_acquire+0x7d40/0x7d40 [ 432.805814][T11409] ? snprintf+0xe9/0x140 [ 432.810106][T11409] should_fail_ex+0x39d/0x4d0 [ 432.814878][T11409] _copy_to_user+0x2f/0xa0 [ 432.819371][T11409] simple_read_from_buffer+0xe7/0x150 [ 432.824790][T11409] proc_fail_nth_read+0x1e8/0x260 [ 432.829847][T11409] ? proc_fault_inject_write+0x360/0x360 [ 432.835509][T11409] ? fsnotify_perm+0x271/0x5e0 [ 432.840308][T11409] ? proc_fault_inject_write+0x360/0x360 [ 432.846005][T11409] vfs_read+0x28b/0x970 [ 432.850196][T11409] ? kernel_read+0x1e0/0x1e0 [ 432.854829][T11409] ? __fget_files+0x28/0x4b0 [ 432.859480][T11409] ? __fget_files+0x28/0x4b0 [ 432.864110][T11409] ? __fget_files+0x43d/0x4b0 [ 432.868821][T11409] ? __fdget_pos+0x2a3/0x330 [ 432.873441][T11409] ? ksys_read+0x75/0x260 [ 432.877818][T11409] ksys_read+0x150/0x260 [ 432.882099][T11409] ? vfs_write+0x990/0x990 [ 432.886548][T11409] ? lockdep_hardirqs_on+0x98/0x150 [ 432.891776][T11409] do_syscall_64+0x55/0xa0 [ 432.896233][T11409] ? clear_bhb_loop+0x40/0x90 [ 432.900951][T11409] ? clear_bhb_loop+0x40/0x90 [ 432.905662][T11409] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 432.911664][T11409] RIP: 0033:0x7fc16af5c84e [ 432.916106][T11409] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 432.935743][T11409] RSP: 002b:00007fc16be7ffe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 432.944183][T11409] RAX: ffffffffffffffda RBX: 00007fc16be806c0 RCX: 00007fc16af5c84e [ 432.952203][T11409] RDX: 000000000000000f RSI: 00007fc16be800a0 RDI: 0000000000000004 [ 432.960208][T11409] RBP: 00007fc16be80090 R08: 0000000000000000 R09: 0000000000000000 [ 432.968318][T11409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 432.976313][T11409] R13: 00007fc16b216128 R14: 00007fc16b216090 R15: 00007ffce377b518 [ 432.984323][T11409] [ 433.875741][T11429] __nla_validate_parse: 1 callbacks suppressed [ 433.875907][T11429] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1868'. [ 434.189641][T11436] C: renamed from team_slave_0 [ 434.210207][T11436] netlink: 'syz.0.1871': attribute type 2 has an invalid length. [ 434.221046][T11436] netlink: 116 bytes leftover after parsing attributes in process `syz.0.1871'. [ 434.230722][T11436] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 434.249231][T11432] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1869'. [ 434.274240][T11436] netlink: 'syz.0.1871': attribute type 10 has an invalid length. [ 434.288053][T11436] team0: Port device netdevsim0 added [ 434.373243][T11436] netlink: 'syz.0.1871': attribute type 10 has an invalid length. [ 434.940296][T11447] netlink: 164 bytes leftover after parsing attributes in process `syz.4.1875'. [ 435.142615][T11450] netlink: 199816 bytes leftover after parsing attributes in process `syz.4.1876'. [ 435.359474][T11453] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1877'. [ 437.822662][T11477] netlink: 164 bytes leftover after parsing attributes in process `syz.1.1884'. [ 437.947951][T11479] netlink: 199816 bytes leftover after parsing attributes in process `syz.3.1885'. [ 438.102193][T11485] netlink: 'syz.4.1887': attribute type 21 has an invalid length. [ 438.131696][T11485] netlink: 128 bytes leftover after parsing attributes in process `syz.4.1887'. [ 438.172852][T11485] netlink: 'syz.4.1887': attribute type 4 has an invalid length. [ 438.204360][T11485] netlink: 'syz.4.1887': attribute type 5 has an invalid length. [ 438.227744][T11485] netlink: 3 bytes leftover after parsing attributes in process `syz.4.1887'. [ 438.811268][T11499] netlink: 'syz.0.1892': attribute type 20 has an invalid length. [ 439.054052][T11507] __nla_validate_parse: 1 callbacks suppressed [ 439.054072][T11507] netlink: 164 bytes leftover after parsing attributes in process `syz.3.1895'. [ 439.355580][T11513] netlink: 199816 bytes leftover after parsing attributes in process `syz.4.1897'. [ 440.182174][T11523] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1901'. [ 440.554299][T11526] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1902'. [ 440.566252][ T1281] ieee802154 phy0 wpan0: encryption failed: -22 [ 440.572725][ T1281] ieee802154 phy1 wpan1: encryption failed: -22 [ 442.692474][T11537] FAULT_INJECTION: forcing a failure. [ 442.692474][T11537] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 442.725821][T11537] CPU: 0 PID: 11537 Comm: syz.4.1904 Not tainted syzkaller #0 [ 442.733370][T11537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 442.743485][T11537] Call Trace: [ 442.746810][T11537] [ 442.749786][T11537] dump_stack_lvl+0x18c/0x250 [ 442.754536][T11537] ? show_regs_print_info+0x20/0x20 [ 442.759808][T11537] ? load_image+0x400/0x400 [ 442.764377][T11537] ? __might_fault+0xaa/0x120 [ 442.769110][T11537] ? __lock_acquire+0x7d40/0x7d40 [ 442.774204][T11537] should_fail_ex+0x39d/0x4d0 [ 442.778963][T11537] _copy_from_user+0x2f/0xe0 [ 442.783618][T11537] sk_setsockopt+0x2b2/0x2bc0 [ 442.788359][T11537] ? sockopt_capable+0x60/0x60 [ 442.793282][T11537] ? aa_sk_perm+0x83c/0x970 [ 442.797874][T11537] ? __fget_files+0x28/0x4b0 [ 442.802556][T11537] ? aa_af_perm+0x330/0x330 [ 442.807133][T11537] ? __fget_files+0x28/0x4b0 [ 442.811790][T11537] ? __fget_files+0x28/0x4b0 [ 442.816450][T11537] ? aa_sock_opt_perm+0x74/0x100 [ 442.821456][T11537] ? bpf_lsm_socket_setsockopt+0x9/0x10 [ 442.827067][T11537] ? security_socket_setsockopt+0x7e/0xa0 [ 442.832868][T11537] do_sock_setsockopt+0x11b/0x1a0 [ 442.837972][T11537] __x64_sys_setsockopt+0x182/0x200 [ 442.843245][T11537] do_syscall_64+0x55/0xa0 [ 442.847800][T11537] ? clear_bhb_loop+0x40/0x90 [ 442.852527][T11537] ? clear_bhb_loop+0x40/0x90 [ 442.857264][T11537] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 442.863261][T11537] RIP: 0033:0x7fd43059bf79 [ 442.867724][T11537] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 442.887414][T11537] RSP: 002b:00007fd4314aa028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 442.895901][T11537] RAX: ffffffffffffffda RBX: 00007fd430815fa0 RCX: 00007fd43059bf79 [ 442.903923][T11537] RDX: 000000000000002d RSI: 0000000000000001 RDI: 0000000000000004 [ 442.911920][T11537] RBP: 00007fd4314aa090 R08: 0000000000000010 R09: 0000000000000000 [ 442.919916][T11537] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 442.927916][T11537] R13: 00007fd430816038 R14: 00007fd430815fa0 R15: 00007ffdf0c5ca38 [ 442.936112][T11537] [ 443.053192][T11544] C: renamed from team_slave_0 [ 443.078634][T11544] netlink: 'syz.1.1907': attribute type 2 has an invalid length. [ 443.086805][T11544] netlink: 116 bytes leftover after parsing attributes in process `syz.1.1907'. [ 443.096832][T11544] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 443.114416][T11542] netlink: 164 bytes leftover after parsing attributes in process `syz.3.1906'. [ 443.133314][T11546] netlink: 'syz.1.1907': attribute type 10 has an invalid length. [ 443.150308][T11546] team0: Port device netdevsim0 added [ 443.382753][T11546] netlink: 'syz.1.1907': attribute type 10 has an invalid length. [ 443.702801][T11557] netlink: 'syz.1.1909': attribute type 1 has an invalid length. [ 443.710623][T11557] netlink: 16150 bytes leftover after parsing attributes in process `syz.1.1909'. [ 444.007937][T11560] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1911'. [ 445.094459][T11584] netlink: 164 bytes leftover after parsing attributes in process `syz.4.1921'. [ 445.531930][T11591] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1923'. [ 447.909637][T11612] FAULT_INJECTION: forcing a failure. [ 447.909637][T11612] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 447.951469][T11612] CPU: 1 PID: 11612 Comm: syz.4.1932 Not tainted syzkaller #0 [ 447.959024][T11612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 447.969128][T11612] Call Trace: [ 447.972456][T11612] [ 447.975433][T11612] dump_stack_lvl+0x18c/0x250 [ 447.980166][T11612] ? show_regs_print_info+0x20/0x20 [ 447.985419][T11612] ? load_image+0x400/0x400 [ 447.989974][T11612] ? __might_fault+0xaa/0x120 [ 447.994790][T11612] ? __lock_acquire+0x7d40/0x7d40 [ 447.999906][T11612] should_fail_ex+0x39d/0x4d0 [ 448.004661][T11612] _copy_from_user+0x2f/0xe0 [ 448.009303][T11612] __sys_bpf+0x23e/0x890 [ 448.013597][T11612] ? bpf_link_show_fdinfo+0x390/0x390 [ 448.019049][T11612] ? lock_chain_count+0x20/0x20 [ 448.023974][T11612] __x64_sys_bpf+0x7c/0x90 [ 448.028449][T11612] do_syscall_64+0x55/0xa0 [ 448.032920][T11612] ? clear_bhb_loop+0x40/0x90 [ 448.037643][T11612] ? clear_bhb_loop+0x40/0x90 [ 448.042382][T11612] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 448.048338][T11612] RIP: 0033:0x7fd43059bf79 [ 448.052801][T11612] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 448.072487][T11612] RSP: 002b:00007fd4314aa028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 448.080991][T11612] RAX: ffffffffffffffda RBX: 00007fd430815fa0 RCX: 00007fd43059bf79 [ 448.089022][T11612] RDX: 0000000000000048 RSI: 0000200000000500 RDI: 000000000000000a [ 448.097127][T11612] RBP: 00007fd4314aa090 R08: 0000000000000000 R09: 0000000000000000 [ 448.105232][T11612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 448.113234][T11612] R13: 00007fd430816038 R14: 00007fd430815fa0 R15: 00007ffdf0c5ca38 [ 448.121254][T11612] [ 448.408281][T11621] netlink: 164 bytes leftover after parsing attributes in process `syz.3.1936'. [ 448.428390][T11618] netlink: 14 bytes leftover after parsing attributes in process `syz.4.1934'. [ 450.944637][T11653] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1947'. [ 451.150797][T11658] netlink: 164 bytes leftover after parsing attributes in process `syz.4.1948'. [ 452.116036][T11682] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1960'. [ 452.420815][T11690] netlink: 164 bytes leftover after parsing attributes in process `syz.0.1964'. [ 452.721123][ C1] [ 452.721135][ C1] ================================ [ 452.721141][ C1] WARNING: inconsistent lock state [ 452.721164][ C1] syzkaller #0 Not tainted [ 452.721173][ C1] -------------------------------- [ 452.721178][ C1] inconsistent {INITIAL USE} -> {IN-NMI} usage. [ 452.721185][ C1] syz.1.1966/11696 [HC1[1]:SC0[0]:HE0:SE1] takes: [ 452.721204][ C1] ffff888047c07a20 (&htab->lockdep_key){....}-{2:2}, at: htab_lock_bucket+0x17d/0x300 [ 452.721262][ C1] {INITIAL USE} state was registered at: [ 452.721269][ C1] lock_acquire+0x19e/0x420 [ 452.721290][ C1] _raw_spin_lock+0x2e/0x40 [ 452.721308][ C1] htab_lock_bucket+0x17d/0x300 [ 452.721327][ C1] htab_lru_map_update_elem+0x2c6/0x990 [ 452.721346][ C1] bpf_map_update_value+0x660/0x720 [ 452.721362][ C1] map_update_elem+0x57b/0x700 [ 452.721380][ C1] __sys_bpf+0x6b5/0x890 [ 452.721397][ C1] __x64_sys_bpf+0x7c/0x90 [ 452.721414][ C1] do_syscall_64+0x55/0xa0 [ 452.721448][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 452.721468][ C1] irq event stamp: 8646 [ 452.721474][ C1] hardirqs last enabled at (8645): [] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 452.721503][ C1] hardirqs last disabled at (8646): [] exc_debug+0x73/0x140 [ 452.721536][ C1] softirqs last enabled at (8342): [] __irq_exit_rcu+0xd3/0x190 [ 452.721560][ C1] softirqs last disabled at (8227): [] __irq_exit_rcu+0xd3/0x190 [ 452.721583][ C1] [ 452.721583][ C1] other info that might help us debug this: [ 452.721590][ C1] Possible unsafe locking scenario: [ 452.721590][ C1] [ 452.721594][ C1] CPU0 [ 452.721597][ C1] ---- [ 452.721600][ C1] lock(&htab->lockdep_key); [ 452.721612][ C1] [ 452.721615][ C1] lock(&htab->lockdep_key); [ 452.721627][ C1] [ 452.721627][ C1] *** DEADLOCK *** [ 452.721627][ C1] [ 452.721631][ C1] no locks held by syz.1.1966/11696. [ 452.721639][ C1] [ 452.721639][ C1] stack backtrace: [ 452.721644][ C1] CPU: 1 PID: 11696 Comm: syz.1.1966 Not tainted syzkaller #0 [ 452.721663][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 452.721673][ C1] Call Trace: [ 452.721681][ C1] <#DB> [ 452.721689][ C1] dump_stack_lvl+0x18c/0x250 [ 452.721722][ C1] ? show_regs_print_info+0x20/0x20 [ 452.721762][ C1] ? print_usage_bug+0x475/0x690 [ 452.721787][ C1] ? verify_lock_unused+0x18/0x140 [ 452.721815][ C1] lock_acquire+0x2c2/0x420 [ 452.721844][ C1] ? htab_lock_bucket+0x17d/0x300 [ 452.721866][ C1] ? read_lock_is_recursive+0x20/0x20 [ 452.721911][ C1] _raw_spin_lock+0x2e/0x40 [ 452.721930][ C1] ? htab_lock_bucket+0x17d/0x300 [ 452.721952][ C1] htab_lock_bucket+0x17d/0x300 [ 452.721981][ C1] ? htab_lru_map_delete_node+0x760/0x760 [ 452.722012][ C1] ? verify_lock_unused+0x18/0x140 [ 452.722039][ C1] ? jhash+0x34e/0x740 [ 452.722066][ C1] htab_lru_map_delete_elem+0x1a4/0x650 [ 452.722099][ C1] ? htab_lru_map_update_elem+0x990/0x990 [ 452.722123][ C1] ? perf_callchain+0x220/0x220 [ 452.722158][ C1] bpf_prog_c4ae881bb5a4a584+0x4d/0x51 [ 452.722183][ C1] bpf_overflow_handler+0x1fc/0x510 [ 452.722218][ C1] ? bpf_overflow_handler+0xde/0x510 [ 452.722247][ C1] ? tp_perf_event_destroy+0x20/0x20 [ 452.722288][ C1] ? __perf_event_account_interrupt+0x187/0x280 [ 452.722318][ C1] __perf_event_overflow+0x447/0x630 [ 452.722355][ C1] perf_swevent_event+0x324/0x630 [ 452.722386][ C1] ? perf_trace_lock_acquire+0x1a0/0x410 [ 452.722418][ C1] ? perf_tp_event+0x1450/0x1450 [ 452.722467][ C1] perf_bp_event+0x2a7/0x380 [ 452.722501][ C1] ? perf_event_free_bpf_prog+0x120/0x120 [ 452.722575][ C1] ? lock_acquire+0x2c2/0x420 [ 452.722613][ C1] hw_breakpoint_exceptions_notify+0x23e/0x670 [ 452.722649][ C1] notifier_call_chain+0x197/0x380 [ 452.722681][ C1] ? atomic_notifier_call_chain+0x26/0x180 [ 452.722711][ C1] atomic_notifier_call_chain+0xda/0x180 [ 452.722742][ C1] notify_die+0x145/0x1a0 [ 452.722773][ C1] ? srcu_init_notifier_head+0x90/0x90 [ 452.722813][ C1] ? rcu_is_watching+0x15/0xb0 [ 452.722846][ C1] notify_debug+0x2e/0x50 [ 452.722866][ C1] exc_debug+0xde/0x140 [ 452.722902][ C1] asm_exc_debug+0x1e/0x40 [ 452.722922][ C1] RIP: 0010:__put_user_4+0x13/0x20 [ 452.722943][ C1] Code: c3 90 90 90 90 90 90 f3 0f 1e fa 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 f3 0f 1e fa 48 89 cb 48 c1 fb 3f 48 09 d9 0f 01 cb 89 01 <31> c9 0f 01 ca c3 90 90 90 90 90 90 90 f3 0f 1e fa 0f 01 cb 89 01 [ 452.722961][ C1] RSP: 0018:ffffc9000324fe80 EFLAGS: 00040206 [ 452.722978][ C1] RAX: 0000000000000013 RBX: 0000000000000000 RCX: 0000200000000300 [ 452.722992][ C1] RDX: 0000000000000000 RSI: ffffffff8acada80 RDI: ffffffff8b1c81e0 [ 452.723006][ C1] RBP: 0000000000000013 R08: ffffffff8e8addaf R09: 1ffffffff1d15bb5 [ 452.723019][ C1] R10: dffffc0000000000 R11: fffffbfff1d15bb6 R12: 0000000000000000 [ 452.723033][ C1] R13: 0000200000000300 R14: 0000000000000001 R15: 0000000000000001 [ 452.723072][ C1] [ 452.723078][ C1] [ 452.723083][ C1] __sys_socketpair+0xb8/0x550 [ 452.723127][ C1] __x64_sys_socketpair+0x9b/0xb0 [ 452.723162][ C1] do_syscall_64+0x55/0xa0 [ 452.723189][ C1] ? clear_bhb_loop+0x40/0x90 [ 452.723209][ C1] ? clear_bhb_loop+0x40/0x90 [ 452.723235][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 452.723255][ C1] RIP: 0033:0x7feded39bf79 [ 452.723273][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 452.723290][ C1] RSP: 002b:00007fedee1d2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 452.723310][ C1] RAX: ffffffffffffffda RBX: 00007feded615fa0 RCX: 00007feded39bf79 [ 452.723324][ C1] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 452.723335][ C1] RBP: 00007feded4327e0 R08: 0000000000000000 R09: 0000000000000000 [ 452.723347][ C1] R10: 0000200000000300 R11: 0000000000000246 R12: 0000000000000000 [ 452.723359][ C1] R13: 00007feded616038 R14: 00007feded615fa0 R15: 00007ffcfe1e74b8 [ 452.723398][ C1]