last executing test programs: 39m50.934829718s ago: executing program 4 (id=776): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x0, 0x5}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0100000005000000fd0900008400"], 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x18000000000002a0, 0xfd, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f0080048e0080000000000002177fbac141516e000030a94070203b180008902020000845013f2325f003901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014c0000c0adc043084617d7ecf41effff38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d7da058f6efa6d1f5f7ff400"/253, 0x0, 0x95bc, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x6, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r0}, 0x38) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd16a, 0x0, @perf_config_ext={0x7, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000001100)={0x0, &(0x7f0000001180)=""/127, &(0x7f0000001200), &(0x7f0000000580), 0x6e, r0}, 0x38) 39m50.402923804s ago: executing program 4 (id=777): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socket$kcm(0x21, 0x2, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) socket$kcm(0x2, 0x5, 0x84) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x0) socket$kcm(0x21, 0x2, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000004000)=ANY=[@ANYBLOB="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"], &(0x7f00000003c0)='syzkaller\x00'}, 0x51) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}], 0xa8}, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x81000600, 0x12, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888100", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 39m49.462317795s ago: executing program 4 (id=778): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x10c012, 0xac5d, 0x0, 0x2, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x8101, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0x40047440, &(0x7f0000001200)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b20, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa1", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 39m46.561972559s ago: executing program 4 (id=788): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socket$kcm(0x21, 0x2, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) socket$kcm(0x2, 0x5, 0x84) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x0) socket$kcm(0x21, 0x2, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000004000)=ANY=[@ANYBLOB="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"], &(0x7f00000003c0)='syzkaller\x00'}, 0x51) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}], 0xa8}, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x81000600, 0x12, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888100", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 39m45.339183474s ago: executing program 4 (id=792): bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x5, 0x4, &(0x7f0000000d80)=@framed={{0x18, 0x8}, [@call={0x85, 0x0, 0x0, 0x70}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 39m45.147594225s ago: executing program 4 (id=793): perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x4}, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001800000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b"], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f00000006c0)="e0b9547ed387dbb816d48283bb26", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) syz_clone(0x48002000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$unix(r2, 0x0, 0x400000e2) close(0xffffffffffffffff) socketpair(0x1, 0x20000000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) 39m29.654168686s ago: executing program 32 (id=793): perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x4}, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001800000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b"], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f00000006c0)="e0b9547ed387dbb816d48283bb26", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) syz_clone(0x48002000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$unix(r2, 0x0, 0x400000e2) close(0xffffffffffffffff) socketpair(0x1, 0x20000000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8929, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) 25m0.204041323s ago: executing program 3 (id=4275): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xf1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x201}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x4}, 0x24, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000a800000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xd0}, 0x10140) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x200}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 24m59.378093442s ago: executing program 3 (id=4278): ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000380)=@hci={0x1f, 0xdd86, 0x2}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000080)="27030200f00f00000600002fb9088965c7297a05a2019e6bafedef4e39ffffffffe1053742e0e4650058f7000000886411001144b6000300b8bf4a31accb", 0x3e}, {&(0x7f0000002500)="4fc9316bdf97a94aa4c01a71f2b55527cb347f01679ab78becd1455755985051a9b55a7c5e6cb0a37cd9c92a4b8e06a53af164e81ae37d251ce1818e9e6973374feaab4d2422070084af233d99a2dd7106672e6520a5ab0801d45a30bc7923756426ed6029cea34be70fd52bfbde2bb1171c48961a58bc64c2dafc47263af31c8d405d712a94a8f88b4e74d1e510c60100010000000000b6d31f118703445f42717726b721981296ae4348b0767e6b67335a9da9d3d4936b861ea72bb996e01bb88357f9bed242d7c1bd6b09940e23a2f9903cd9925d22f8112f9741e5658b5e62a4b23a292c858fcb8362e401d3", 0xee}, {&(0x7f00000001c0)="b6986e54ee7137807146de0ab782b34caded5e870ee7caf6296abeb8a420c3316d8feddfc875d2cb880b7880d6ce92860ccd4f7d6a5f4ae59c2ef4178d2a6e151b9177cfe4a70abc1e1267d0993ebb2a6d21ee884efb8ffba185c10803067b80f3428de425c426dd3cc9eddeab744f710419fde96d", 0x75}, {&(0x7f0000000880)="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", 0x178}, {&(0x7f0000002400)="e20650bb69f596a001a9396df3e895da88d97ebd178d47b9119f9232ea20b1637429669dc4d0c0cf864240df51aff34230940425976a91424886f7569ab0a0ed75f495341eee79791236e5437400cf79a8e84ed65e993f6897444bb5d86d94215b781ae9918681a67968825e9f5fed8e3cf996d276f78c75101b6e188cc3b29c44b07b85c76fe40f20727d081a440ce84ced2c1d50c6879b422b03412a20f6d2d4b9226a87c0fe4de731da5c6a6edb4972a2f3e7966db1e8ff048f5b61600611bbbc0905a9a9c23fa6db92243e178f7793e83e82ead265afe54086", 0xdb}, {0x0}], 0x6}, 0x60404) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000840), 0x8d2142, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000001, 0x0, @perf_config_ext, 0x5601, 0x0, 0xffff, 0x1, 0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x800000004136}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x3}, 0x0, 0x0, 0xfffffffc, 0x0, 0xb6eb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000003000000000000000040000018010000786c6c250000000000202020731af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ff0000008500000006000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x5, 0x4, 0x6d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x147b8, 0xfffffffffffffffc, 0x0, 0x0, 0x3ffff, 0x7}, 0x0, 0x4000000000000200, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x378f}, 0x1, 0xfffffffffffffffe, 0x4, 0x6, 0xfffffffffffffffe, 0x2080000a, 0xfffc, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0xd) r3 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x23, &(0x7f0000000040), 0xcf) sendmsg$kcm(r3, &(0x7f00000001c0)={&(0x7f0000000a00)=@in6={0xa, 0x4e23, 0xe, @empty, 0x7}, 0x80, 0x0}, 0x48084) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@func={0x2, 0x0, 0x0, 0xc, 0x2}, @func_proto]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x34}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f2dcc6d0e5bfb6ecc27477a80d1fcf4b137d054bd61743b079bac97f2141d9f3fc65776a653c4ec621d3c20287f5605901decf24849b329a36c04e4b9ed84e68605ca797889c2552b819a920c3ea749c4760aa70f09c9c56b6a43f7c5b6d22e5b85ad8359b1ca3ce6562fb42785fa4a7fee635efcaa4ba6fab659971224383e4bf1cf7f3e03373a9750690557a2efd747ce8afce6d4cd5"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000000c0)={0x0, 0x1}, 0x1}, 0x90) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x29, 0x43, &(0x7f0000000100), 0x120) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r2, 0xffffffffffffffef, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0}}, 0x6) r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r6}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r7, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0], 0x0, 0x92, &(0x7f00000003c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x83, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) 24m58.184359766s ago: executing program 3 (id=4283): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xf1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x201}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x4}, 0x24, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xf0}, 0x10140) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x200}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 24m57.287218907s ago: executing program 3 (id=4299): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xf1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x201}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x4}, 0x24, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xd8}, 0x10140) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x200}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 24m56.296419289s ago: executing program 3 (id=4291): syz_clone(0x630c0700, 0x0, 0x0, 0x0, 0x0, 0x0) 24m54.726830337s ago: executing program 3 (id=4300): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r2}, &(0x7f0000000280), &(0x7f0000000240)=r1}, 0x20) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) socket$kcm(0x2, 0x200000000000001, 0x106) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x8902, &(0x7f00000005c0)) syz_clone(0x630c0700, 0x0, 0x0, 0x0, 0x0, 0x0) 24m38.630280626s ago: executing program 33 (id=4300): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r2}, &(0x7f0000000280), &(0x7f0000000240)=r1}, 0x20) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) socket$kcm(0x2, 0x200000000000001, 0x106) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x8902, &(0x7f00000005c0)) syz_clone(0x630c0700, 0x0, 0x0, 0x0, 0x0, 0x0) 21m47.675284002s ago: executing program 0 (id=4733): socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380), 0x6c0ec0, 0x0) socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac59}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200002, 0x0) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa0}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x100, 0x0, 0x0, 0x8, 0x1, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0xa, 0x5, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x81000000, 0x12, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888100", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 21m44.324571891s ago: executing program 0 (id=4737): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x9, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 21m42.522125072s ago: executing program 0 (id=4748): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x9, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 21m41.369961826s ago: executing program 0 (id=4741): r0 = socket$kcm(0x2, 0x200000000000001, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x541b, &(0x7f00000000c0)) socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x31, 0x0, 0x0, 0x6, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xf475, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40000000}, 0x94) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001780)={&(0x7f00000003c0)=@caif, 0x80, 0x0}, 0x0) socket$kcm(0xa, 0x3, 0x3a) r2 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x200048cc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$inet(r5, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f00000001c0)="d7", 0x1}], 0x1}, 0x24000000) sendmsg$inet(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000280)="5c00000000006bec9e3be35c6e17aa31076b87511d0000007ea60864160af3653c000c0600000000000000000300000007002100eab556a705251e618294ff0051f60a84c9f4d4938037e786a6d0000300000000000200ffffc6c953", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x40800) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x10, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='syzkaller\x00', 0x514c, 0x0, 0x0, 0x40f00, 0x28, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000001c0)=[{0x2, 0x2, 0x3, 0xb}, {0x5, 0x3, 0x1, 0x7}, {0x2, 0x2, 0x7, 0x5}, {0x4, 0x1, 0x6}], 0x10, 0x6}, 0x94) 21m39.638675457s ago: executing program 0 (id=4747): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB="001614758a78", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x1fffffffffffffe4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1812"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0xb5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x8, 0xfffffffffffffffe, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) 21m35.787586502s ago: executing program 0 (id=4755): bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=ANY=[@ANYBLOB="18001e0003000000000000000040000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000050000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x6, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r1, r2, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000020000000000000000000009"], 0x0, 0x4e}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000580)='cpu<-0||!') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000001c0), 0x12) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000380), 0x12) close(0xffffffffffffffff) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="040000000400000004000000050001000008"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r7, 0x58, &(0x7f0000000340)}, 0x10) close(0xffffffffffffffff) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) 21m20.470822402s ago: executing program 34 (id=4755): bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=ANY=[@ANYBLOB="18001e0003000000000000000040000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000050000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x6, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r1, r2, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000020000000000000000000009"], 0x0, 0x4e}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000580)='cpu<-0||!') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000001c0), 0x12) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000380), 0x12) close(0xffffffffffffffff) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="040000000400000004000000050001000008"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r7, 0x58, &(0x7f0000000340)}, 0x10) close(0xffffffffffffffff) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) 17m22.485820547s ago: executing program 2 (id=5275): perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x91, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8940, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r1, 0x0, 0x0, 0x0}, 0x30) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0), 0xc) ioctl$SIOCSIFHWADDR(r3, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @multicast}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17m21.790325935s ago: executing program 2 (id=5279): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x9, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 17m21.220132231s ago: executing program 2 (id=5281): close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x2, &(0x7f0000000100)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x2c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffff0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x65, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRESHEX=r4, @ANYRES16=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r5}, &(0x7f0000000800), &(0x7f0000000840)=r6}, 0x20) bpf$PROG_LOAD(0x2, &(0x7f0000000680)={0x3, 0x3, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 17m17.141456769s ago: executing program 2 (id=5296): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)}, {&(0x7f0000000500)="383d180ced167f0e9ef57059e65fda2a46ea72b507f849a24f8bd9dd8ae89a3816c910a61c28d2fa089f96b9807a8f55a832c4f11e448538ffcee0c6b822436a53c33c12f3a69d81efd66f3affa37aaa31c99041171824f069f392273bd5ce1ab2b2b6f2dcd0b5b5935c360149c52fd45fec45f0cf2728205888adff194e4191575a40000000000000000000", 0x8c}], 0x2, 0x0, 0x0, 0x7400}, 0x40) socket$kcm(0xa, 0x2, 0x88) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000180)=r3, 0x4) sendmsg$unix(r1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000851}, 0x24000804) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x4156, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffc, 0x1}, 0x105e39, 0x5, 0xfffffffe, 0x6, 0x5, 0x2, 0x101, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x10) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0xc05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="240000001e006bcd9e3fe3dc6e08000007000000000000007ea60864160af36504005425", 0x24}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r5 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r6, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x3000c041) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r7, 0x20, &(0x7f00000002c0)={0x0, 0x3c, 0x0, &(0x7f00000000c0)=""/171, 0xab}}, 0x10) socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x1, 0x9, 0x6, 0x63, 0x0, 0x10000, 0x1110, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xbf7, 0x4, @perf_config_ext={0xd, 0x7f}, 0x4140, 0x8, 0x80000000, 0x8, 0x3, 0xffff, 0xb44b, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x3, 0x3a) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000140)="2e00000010008188040f80ec59acbc0413a1f8480d0000005e140602000000000e000a00100000000580607ee622", 0x2e}], 0x1}, 0x0) 17m16.553711416s ago: executing program 2 (id=5290): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x3, 0xfd5, 0x0, 0x400, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x800, 0x1, 0x2, 0x7, 0x0, 0x80000000, 0xa9ba, 0x0, 0x2, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8912, &(0x7f0000000080)) 17m15.864072624s ago: executing program 2 (id=5292): bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=ANY=[@ANYBLOB="18001e0003000000000000000040000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000050000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x6, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r1, r2, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000020000000000000000000009"], 0x0, 0x4e}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000580)='cpu<-0||!') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000001c0), 0x12) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000380), 0x12) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r7) close(r7) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f00000002c0), 0x4) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="040000000400000004000000050001000008"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r8, 0x58, &(0x7f0000000340)}, 0x10) close(0xffffffffffffffff) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) 16m59.699744934s ago: executing program 35 (id=5292): bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=ANY=[@ANYBLOB="18001e0003000000000000000040000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000050000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x6, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r1, r2, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000020000000000000000000009"], 0x0, 0x4e}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000580)='cpu<-0||!') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000001c0), 0x12) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000380), 0x12) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r7) close(r7) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f00000002c0), 0x4) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="040000000400000004000000050001000008"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r8, 0x58, &(0x7f0000000340)}, 0x10) close(0xffffffffffffffff) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) 13.688062201s ago: executing program 8 (id=8461): socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES32=0x0], 0x48) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x87, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x2, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x9000, 0x5, 0x0, 0x4, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000500), &(0x7f00000001c0)}, 0x20) gettid() r4 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000aecd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c1faca0f9d9924be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6fab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b79db2e3d5986c82b5aa94e539b204d58f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000020000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72b0000000000001cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2cc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78ac02ca3cdf6a662db1c9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea5080000000cdcd2063d11dd665647223c78a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca2533659edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffca9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a294351c5356c1d06c92cf8ce3c7c56cd31121624d74517fd3666277f670e812b28e2f30d035cee5d0e77a3c7220000000000000005a474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f034b8d3ebce68663ef5af469abe75b314fae31a0445859a5ece8fb11a4ee8e46354c9c3a041e12282ce24463aaf28345bd168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda3453602004535a976eacd3adaa4d2ee6fe0d072ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d401adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb40f7f02f750d6c977a191852c9ae031db044b2353199546609f9f69a6cfefdf879d447df53f3b9b70d10355b00300000000000000553d18a6cc50feeb7bfad9b7be3283b6450d264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5631820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe527340935aa3c0b4f3f45bfff2418a18217747ae442e31560e5b741445ea2a1acee2a81425ff000000d2a0a765d20b30f87af976a46f9a9a1ac7dea1ea684533dc6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f88735fce5115dc83ed73d8ee4a91322608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf5000000000000fa08ad0731c4b839688b22c4da2a6bc4cf45dbeea042f9b33393f85a0417854d221a2d5f96bc64647f15daa2ba79cd0f4254ed55217912ef84bd2927df82fc061aef2920c49b2a90886da75561173fa186cb7ee86dd4285c4721eb428c953296ac2f5d825da54dbef07c1b349b4901e093d13e6b9a0000009b5b22e887bc061d40bcaf0aa18623fd9b7179ccc692ba74b531b65c4decf9d080a8ac7e82d4cde1267aa64b2a94fd87a009e6742c2ddc3a9d7eccbb1831b1fa218277c2814a91cab7cb59c697166d6f1bb1a360470000000000000000000000000000000000000000000000000000f9f9b4ce7e871f507084c8c88e0652decbe579b03ed84ea94597dd1059620a050f69ea03b99b4e19d35f4a3b54e96ae2172effecec80f6baa4bf69a6ebf5392882df78b0983e662dc0cb64b77f3f006b6b25443197ae93f0be6de5a703d003f00720943c0e4b33af"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xc280, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000", @ANYBLOB="0000000000000000b7080000000002007b8af8"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, &(0x7f0000000080), 0x0}, 0x20) 13.494517824s ago: executing program 7 (id=8462): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x97}]}, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = socket$kcm(0x21, 0x2, 0x2) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)='%pI4 \x00'}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)=@o_path={&(0x7f0000000000)='./file0\x00', r2, 0x4000, r0}, 0x18) sendmsg$kcm(r1, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[], 0x10}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380), 0x6c0ec0, 0x0) socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac59}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x81000000, 0xe80, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888100", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 12.417464567s ago: executing program 5 (id=8466): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x0, 0x4, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000e001400400000004000000041"], 0x50) r1 = socket$kcm(0xa, 0x2, 0x0) close(r1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x0, 0x9, 0x6}, {0x10000002, 0x0, 0x6, 0xc}], 0x10, 0x9}, 0x94) socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x6b, &(0x7f00000001c0)=r4, 0x4) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, 0x0, &(0x7f0000000300), 0x1006, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000b80)={r0, &(0x7f00000014c0), &(0x7f0000000100)=""/31}, 0x20) r5 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r5, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket$kcm(0x2a, 0x2, 0x0) sendmsg$kcm(r6, 0x0, 0x0) sendmsg$kcm(r6, 0x0, 0x40) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg$kcm(r5, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001ec0)=[{&(0x7f0000000c80)=""/4096, 0x1000}], 0x1}, 0x40000120) socket$kcm(0xa, 0x5, 0x0) 12.009864582s ago: executing program 8 (id=8467): socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES32=0x0], 0x48) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x87, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x2, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x9000, 0x5, 0x0, 0x4, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000500), &(0x7f00000001c0)}, 0x20) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xc280, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000", @ANYBLOB="0000000000000000b7080000000002007b8af8"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, &(0x7f0000000080), 0x0}, 0x20) 11.952536842s ago: executing program 7 (id=8469): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380), 0x6c0ec0, 0x0) socket$kcm(0x21, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200002, 0x0) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x100, 0x0, 0x0, 0x8, 0x1, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x81000000, 0x12, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888100", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 11.632055117s ago: executing program 6 (id=8471): r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000140)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0x0) (fail_nth: 2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000140)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}, 0x0) 9.778908149s ago: executing program 5 (id=8472): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000680)=ANY=[@ANYBLOB="9feb010018000000ec000000800000008000713f906c00000f00000000008008000000000100000000000001000000006e003701100000000000000a03000000070000fffe00002602000000030000000f0000000800000000000000060000000800000006000000060000000d0083f63eafa800000000000006000000030000000e000000070000000c0000000e0000000e000000000000070000000000f9ffec7da163afa39e05a5146368e9c02c2d05915f3d4ec0ae06c5ef2dfc5e5c17f737d4fc49d4212c"], &(0x7f0000000140)=""/21, 0x9e, 0x15, 0x0, 0xe90}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x4, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="660a0000060000006111630000000000850000001e0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, r0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) close(r1) r2 = socket$kcm(0xa, 0x1, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000000600)={&(0x7f0000000140)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, &(0x7f0000000380)=[{&(0x7f00000001c0)="b5", 0x1}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10d101, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xccfc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x39, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001700)={r4, 0x2000002, 0x7, 0x0, &(0x7f0000000200)="df33c9f7b9a600", 0x0, 0xfffffbff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x6fa, 0x20488, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={0x0, 0xf}, 0x114905, 0x4, 0x10000, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0xbf}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x1c0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x9a) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x5, '\x00', 0x0, @flow_dissector}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x200, 0x20, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) sendmsg$kcm(r2, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000001) write$cgroup_devices(r1, 0x0, 0xffdd) 8.611998704s ago: executing program 6 (id=8473): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0xe0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000001380)}}, 0x10) 8.611127564s ago: executing program 7 (id=8474): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000680)=ANY=[@ANYBLOB="9feb010018000000ec000000800000008000713f906c00000f00000000008008000000000100000000000001000000006e003701100000000000000a03000000070000fffe00002602000000030000000f0000000800000000000000060000000800000006000000060000000d0083f63eafa800000000000006000000030000000e000000070000000c0000000e0000000e000000000000070000000000f9ffec7da163afa39e05a5146368e9c02c2d05915f3d4ec0ae06c5ef2dfc5e5c17f737d4fc49d4212c"], &(0x7f0000000140)=""/21, 0x9e, 0x15, 0x0, 0xe90}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x4, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="660a0000060000006111630000000000850000001e0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, r0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) close(r1) r2 = socket$kcm(0xa, 0x1, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000000600)={&(0x7f0000000140)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, &(0x7f0000000380)=[{&(0x7f00000001c0)="b5", 0x1}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10d101, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xccfc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x39, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001700)={r4, 0x2000002, 0x7, 0x0, &(0x7f0000000200)="df33c9f7b9a600", 0x0, 0xfffffbff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x6fa, 0x20488, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={0x0, 0xf}, 0x114905, 0x4, 0x10000, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0xbf}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x1c0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x9a) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x5, '\x00', 0x0, @flow_dissector}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x200, 0x20, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0xa, 0x6, 0x0) close(r5) sendmsg$kcm(r2, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000001) write$cgroup_devices(r1, 0x0, 0xffdd) 8.557949675s ago: executing program 5 (id=8475): socket$kcm(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB], &(0x7f0000000c00)='GPL\x00'}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getpid() (async) getpid() sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) (async) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r0, &(0x7f0000001a00)=ANY=[@ANYBLOB="13100000520091ef"], 0xfe33) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r1}, &(0x7f00000007c0), &(0x7f0000000640)}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1}, 0x0, &(0x7f0000000280)='%pS \x00'}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001380)={r1, &(0x7f00000004c0)}, 0x20) socket$kcm(0x10, 0x3, 0x10) r2 = socket$kcm(0xa, 0x1, 0x106) setsockopt$sock_attach_bpf(r2, 0x29, 0x4e, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x200000000000, 0x80420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x6, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x4) (async) close(0x4) socket$kcm(0x10, 0x2, 0x10) (async) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000032000b35d25a806f8c6394f91824fc60", 0x14}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001a40)=""/4095, 0xfff}], 0x1}, 0x0) (async) recvmsg$kcm(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001a40)=""/4095, 0xfff}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x50be}, 0x0) (async) recvmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x50be}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="5400020029000b05d25a806f8c6394f90424fc602f0011002f2f2f00053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x5000000}, 0x0) (async) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="5400020029000b05d25a806f8c6394f90424fc602f0011002f2f2f00053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x5000000}, 0x0) recvmsg$kcm(r4, &(0x7f0000000240)={&(0x7f00000002c0)=@ax25={{}, [@bcast, @remote, @default, @rose, @default, @remote, @rose, @bcast]}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000100)=""/58, 0x3a}, {&(0x7f0000000340)=""/235, 0xeb}, {&(0x7f00000005c0)=""/253, 0xfd}, {&(0x7f0000000840)=""/133, 0x85}, {&(0x7f0000000900)=""/180, 0xb4}], 0x5, &(0x7f00000001c0)=""/52, 0x34}, 0x2000) recvmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 8.539638145s ago: executing program 1 (id=8476): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x10c002, 0xac5d, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) close(0x3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r1, &(0x7f0000000b40)={&(0x7f0000000080)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000800)="e9", 0x9500}, {&(0x7f00000017c0)="ea0189bdebb0c16d420ee9b95082abd6431cc7afc22c4a6b8adecef68f76bd81a86e89f9c80e5c868a12b09e80ba8c01eb3f4b7be71f9fc2355c336cedc15eb778e3a3b35c3f72629ea4d9ae42cf4c17255815fb8a47aafd8b8ff0c202b4e09f7c42811261b5e113fcce27b4329ccb792df14b7d6dcfaf2cf8dbb51946e89c862e9252731f680ec50326fc16386aeefe654bac24", 0x94}], 0x2, &(0x7f0000000100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xd}, @loopback}}}], 0x20}, 0xe900) 8.469991616s ago: executing program 8 (id=8477): socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES32=0x0], 0x48) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x87, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x2, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x9000, 0x5, 0x0, 0x4, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000500), &(0x7f00000001c0)}, 0x20) gettid() r4 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xc280, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000", @ANYBLOB="0000000000000000b7080000000002007b8af8"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, &(0x7f0000000080), 0x0}, 0x20) 8.329177307s ago: executing program 6 (id=8478): socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}, 0x10022, 0xac5d, 0x0, 0x0, 0x0, 0x67af, 0xa6f7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000400)="d8000000140081044e81f782db44b9040a1d08020a000000040000a118000200fe8000000000000008000f0100810401a80016ea1f0008400304000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c0100000000000000cb090000001fb79164", 0x6c}], 0x1, 0x0, 0x0, 0x7400}, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000c40)="754dab32f442f2ba4eb8006cbf42311156d32ab80e64d3c0da6109de41607dbf651bbfaaa0870e0c8c67ceb73036a1c8946b2cd79d9e226f6e55a48dbdd63d39f7cfc30c873284d94d150f2bbc7af5b828720317763bd42ed27a2b9888ba8309a83636a1b8e6db9c2a542f682cf5cca673b15ce847795cbb15cbec7f14dfa5457c81aacdf58d473af363dc21c3c9a71af31c36c15afe8dd994190565e687a3defe3dba6e0c2141401c0859259867ac61b2", &(0x7f0000000d40)="9516b3c6e0b02090c1389babefbdddc1d484692bf187ce43571e20002c478e8b9c2db166a02c4d52b4895b980107d15e5268d0858745801982fd66bd693bca8f6bd1de8c5dce48060ece94915a5212745cf84310203fb6cd2ee4e620c187ddd3d53c1eb58ecf400a486f75cbdeb80c9a32fc4a75b2a3ee2615710b5321aac49433cb1b66136ae06f6d9687e4e55f1f3972f3a8b84a61328632ca83cab3c2692d67f84c6edc61c459c10f1fe2a6c54f018734f5b1c02efc63", 0x5, r1}, 0x38) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'vlan0\x00', @random="010000201000"}) 7.971007932s ago: executing program 5 (id=8479): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x97}]}, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = socket$kcm(0x21, 0x2, 0x2) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)='%pI4 \x00'}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)=@o_path={&(0x7f0000000000)='./file0\x00', r2, 0x4000, r0}, 0x18) sendmsg$kcm(r1, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[], 0x10}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380), 0x6c0ec0, 0x0) socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac59}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x81000000, 0xe80, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888100", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 7.672864615s ago: executing program 6 (id=8480): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x2, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0x1c, &(0x7f0000000480)={r0, 0x0, 0x0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x2}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc8, 0x80001, 0x1, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0xc2ba, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8186762900fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x800}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000040)=ANY=[@ANYRES8=r2, @ANYBLOB="609451dc9c899d23b96e9377e3d0ab42bb59b7434f0b9e", @ANYRESHEX], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'dvmrp1\x00', 0x2}) ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x2c}, {0x6}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r7, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x50) ioctl$SIOCSIFHWADDR(r1, 0x89a2, &(0x7f0000000080)={'bridge0\x00', @random="1c0000000988"}) 7.559238867s ago: executing program 7 (id=8481): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x1}, 0x201, 0x0, 0xc2ba, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000001700000095"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r2, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)="bf", 0x2, 0x8000}, 0x50) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x7}, 0x10000, 0xca, 0x0, 0x0, 0x0, 0x8, 0x7, 0x0, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x21, 0x2, 0x2) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x5, 0x3, 0x0, &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23}, 0x94) r4 = syz_clone(0x24050000, &(0x7f0000000380), 0x0, &(0x7f0000000180), &(0x7f0000000300), 0x0) perf_event_open(0x0, r4, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe92f5f45114c79f7}, 0x1003b9, 0x7, 0x2000, 0xa, 0x1, 0x0, 0x9}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000e700"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r5, @ANYBLOB="0000000002000000b705000008000000850000005d00000095", @ANYRES16], &(0x7f0000000300)='GPL\x00', 0x2, 0x230, &(0x7f0000002500)=""/4106, 0x0, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdf8, 0x10, 0x0, 0x34, 0x0, 0x0, 0xfffffffffffffe65}, 0x4a) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x16, 0x0, 0xb161, 0xfffffffe}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r6}, 0x0, &(0x7f0000000040)}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x28, 0x3c, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x4, 0x2}]}, @struct={0x8, 0x0, 0x0, 0x4, 0x1, 0x101}]}, {0x0, [0x30, 0x2e, 0x5f, 0x0, 0x5f, 0x5f, 0x5f]}}, &(0x7f00000004c0)=""/164, 0x41, 0xa4, 0x1}, 0x28) close(r1) recvmsg$unix(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x1c0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000008"], 0x50) r7 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) close(r7) perf_event_open(&(0x7f0000000240)={0x8, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x7e674f9da07d633b}, 0x0, 0xa0, 0x0, 0x9}, 0x0, 0xe, 0xffffffffffffffff, 0x2) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r8}, &(0x7f0000000180), &(0x7f00000001c0)=r7}, 0x20) 7.419382288s ago: executing program 1 (id=8482): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x82000, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'batadv_slave_0\x00', @local}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'nicvf0\x00', 0x200}) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd, &(0x7f00000001c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x83, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000400)=r3) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x200000, 0x0) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000480)) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f00000004c0)=""/17) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000880)={&(0x7f0000000540)=@id={0x1e, 0x3, 0x0, {0x4e22}}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000580)="30dc25e3a93c969f3773bb1b3fea69d00c0729af00b59b9f4ab93d427ed65e254871739bdc265c871ea39017ea746ca595c2dd518c253e8b8736273412e9f95fdca5dfdad2ca57b394a0fe87e21eb6aa99d52c844f4773d2e6ae16842d8b8681365ac3fdcee7c0f880922913b0bbbcfb27b3dd482ec5f776dcbed695cd249e736074b6e8e6074f91e35b6715108fbf2081e05f5aa8372655a7ec41368015732f931433a5797f5b181f85745bd1ccd6c02a46", 0xb2}, {&(0x7f0000000640)="b835f77a9525d7a49d00afc4d48ed813495fdcee900e829fe4738a9e4614e7c8fc98aad70b1c8aeca1a93bceca70d980fb763cdeb15cae35a7e48998b9827bc1c16ab0feae206969b6a2f7e0229fb5ef7987970c2d509dbe5d82c08163fac4ee131ac934294bbb5354dc53fd092bc90b1ccf275af917d71378ac711abdecb22d5381bb48b1dcda515adc9de9141fbccadaba4bb1caad60959437dee9dfe100fa92acd237655a3742c38c63f16ce4d33861e282cf4668265debbec4baa8cbcb80803f54545a5a8ba4022acd3e39d6f4a355f606f2acf225edb11e25ac3cba66a87ecd6119ab1f034d3a14ea8f0d0657816cb5b04bf620", 0xf6}, {&(0x7f0000000740)="c2f422b5121c3e121a829850fe77606b51023109ce83abfac8717756fd9ad1d8df9955d2a1534449a282164d374812b77003a5a0718c572ee71d46fe565fa085f77c67f779eabe87e447aa7a69cd9438a111f660323e1962a2c2979825196f5c4df34754817810260afd41b49315571605aa187d3e560dc0028b364fbf063f5b3383ebe81b48054a03484822", 0x8c}], 0x3, &(0x7f0000000840)="55a6fcae13d66163b6dc71ae5e8ce5", 0xf, 0x4000080}, 0x800) r6 = getpid() perf_event_open(&(0x7f00000008c0)={0x2, 0x80, 0xf7, 0x8, 0xc3, 0x8, 0x0, 0xb, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x3, 0xede2}, 0x8, 0x4, 0xd7c, 0x3, 0x6, 0x4, 0x4, 0x0, 0x99fe, 0x0, 0x5687}, r6, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000940)={0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b80)={&(0x7f0000000980)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000001ac0)=[{&(0x7f00000009c0)="63512273d97cde95f77cc872630628f5f530fc80b082edbc67ffea5c7d86792ecf852a03f1633808d740a3b7db06859d3854cb9636a6eb6d2bd527d7aa23bfbfd073555741a1960961e4692a70de63f21946c49849ea6ace464463b8bb353ac3b1d8edb27b329f64fef9c8467f2227c3315c63726546862c8f4d93bd44363a8eaa4cb0ab8823907bdc4a134654246af3f39245a5cc53f4d11d450a0ce071a0e291b5cd97ed302181ea", 0xa9}, {&(0x7f0000000a80)="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", 0x1000}, {&(0x7f0000001a80)="3b702305b1eede0914724e9567892ea2543a92a551b6403d05274586d16f7c35dd4e10ba0e9a9462a1efd259770900760730", 0x32}], 0x3, &(0x7f0000001b00)=[@ip_retopts={{0x24, 0x0, 0x7, {[@generic={0x88, 0x12, "eb93ac44b094d9ec9dbabe54a97a2c48"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @private=0xa010102, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @dev={0xac, 0x14, 0x14, 0x2d}, @loopback}}}], 0x80}, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001bc0)={0xffffffffffffffff, 0xd7ab}, 0xc) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002d80)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', r3, 0xffffffffffffffff, 0x4, 0x1, 0x2}, 0x50) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002e00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x8000, '\x00', r3, 0xffffffffffffffff, 0x0, 0x4, 0x4}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000002e80)={0x1, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002f40)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000002ec0), &(0x7f0000002f00)='%pi6 \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000002f80)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r14 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002fc0)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000030c0)={0x11, 0x17, &(0x7f0000001c00)=@raw=[@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @map_fd={0x18, 0xb, 0x1, 0x0, r8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, @ldst={0x3, 0x0, 0x0, 0xb, 0x5, 0xfffffffffffffff4, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x4b}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}], &(0x7f0000001cc0)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001d00)=""/4096, 0x41100, 0x4a, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000002d00)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000002d40)={0x5, 0x1, 0x1, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000003040)=[r9, 0x1, r10, r1, r11, 0xffffffffffffffff, r12, r13, 0x1, r14], &(0x7f0000003080)=[{0x5, 0x5, 0xd, 0x5}], 0x10, 0x848}, 0x94) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000003180)={'veth1_to_batadv\x00', @local}) sendmsg$tipc(r5, &(0x7f00000034c0)={&(0x7f00000031c0)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x1, 0x3}}, 0x10, &(0x7f0000003440)=[{&(0x7f0000003200)='&H', 0x2}, {&(0x7f0000003240)="e51bac69813b30b7f34341205727f226016db5de0a48f85386045e0e2917fb1570fc508b4db5452eb92a16562a79607e53e8c2d514b098ca4511ce01aca00e8268d10ff8cab1ffd6f85e69c7f182798a46c0ee1a3688f8cbd25974e4e8a72a42f2f53d036f06e4d81345659933e6a478c85f63c68976b7fd2a9a335b9a095445c58274b6a014ef18b75bb39030b058564b753c8a5b95ecdb406d8d90e11e8f0399c9bcb172572f55b2c232", 0xab}, {&(0x7f0000003300)="e2d7edfcda163b20607120f9c2dfa335927e5c5a276e7cbe8ceabca43a901e8d3706c6fd35b3c2d7ff4da7c58f7492373d1fd97ad83b2e4809330df5153d8a74c22067bc1858cc9720c21807a99d30faf1fc01805d9c11231c31bcaa1159242ef37e0ce8e24cbeeddc666c05fe1228df50998b4b1a2fdd4f7076b6e827fb6badf9cee21491d3b14f7636a21f322c4e90ba0d2f7a90cc", 0x96}, {&(0x7f00000033c0)="362838cc1c8fe07719fc7258953a3b8cc1fe3972000d7ce07ee4ae089f0ca5322928387a1f91d33db0a4c86ac2a9dfcf5182ed55a5547a74c237fa0246a6afbcc58bd1675bf1d89ada3fa0e1fbe22cd44e5e85573e8f8f3126ce07e16c0a0a3e2acbbef171a53d6fee0a08820a", 0x6d}], 0x4, &(0x7f0000003480)="6963080255a4a3", 0x7, 0x4000080}, 0x24044011) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000048c0)={&(0x7f0000003500)=@isdn, 0x80, &(0x7f0000004780)=[{&(0x7f0000003580)=""/44, 0x2c}, {&(0x7f00000035c0)=""/89, 0x59}, {&(0x7f0000003640)=""/224, 0xe0}, {&(0x7f0000003740)=""/62, 0x3e}, {&(0x7f0000003780)=""/4096, 0x1000}], 0x5, &(0x7f0000004800)=""/182, 0xb6}, 0x142) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000004900)=0x1) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x2) 7.238474431s ago: executing program 1 (id=8483): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x0, 0x4, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000e001400400000004000000041"], 0x50) r1 = socket$kcm(0xa, 0x2, 0x0) close(r1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x0, 0x9, 0x6}, {0x10000002, 0x0, 0x6, 0xc}], 0x10, 0x9}, 0x94) socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x6b, &(0x7f00000001c0)=r4, 0x4) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, 0x0, &(0x7f0000000300), 0x1006, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000b80)={r0, &(0x7f00000014c0), &(0x7f0000000100)=""/31}, 0x20) r5 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r5, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket$kcm(0x2a, 0x2, 0x0) sendmsg$kcm(r6, 0x0, 0x0) sendmsg$kcm(r6, 0x0, 0x40) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg$kcm(r5, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001ec0)=[{&(0x7f0000000c80)=""/4096, 0x1000}], 0x1}, 0x40000120) socket$kcm(0xa, 0x5, 0x0) 7.238233451s ago: executing program 8 (id=8484): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x2}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380), 0x6c0ec0, 0x0) socket$kcm(0x21, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200002, 0x0) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x100, 0x0, 0x0, 0x8, 0x1, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x81000000, 0x12, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888100", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 7.237859161s ago: executing program 5 (id=8485): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000680)=ANY=[@ANYBLOB="9feb010018000000ec000000800000008000713f906c00000f00000000008008000000000100000000000001000000006e003701100000000000000a03000000070000fffe00002602000000030000000f0000000800000000000000060000000800000006000000060000000d0083f63eafa800000000000006000000030000000e000000070000000c0000000e0000000e000000000000070000000000f9ffec7da163afa39e05a5146368e9c02c2d05915f3d4ec0ae06c5ef2dfc5e5c17f737d4fc49d4212c"], &(0x7f0000000140)=""/21, 0x9e, 0x15, 0x0, 0xe90}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x4, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="660a0000060000006111630000000000850000001e0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, r0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) close(r1) r2 = socket$kcm(0xa, 0x1, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000000600)={&(0x7f0000000140)={0x2, 0x0, @rand_addr=0x64010101}, 0x10, &(0x7f0000000380)=[{&(0x7f00000001c0)="b5", 0x1}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10d101, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xccfc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x39, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001700)={r4, 0x2000002, 0x7, 0x0, &(0x7f0000000200)="df33c9f7b9a600", 0x0, 0xfffffbff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x6fa, 0x20488, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={0x0, 0xf}, 0x114905, 0x4, 0x10000, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0xbf}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) recvmsg$unix(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x1c0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x9a) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x5, '\x00', 0x0, @flow_dissector}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x200, 0x20, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r2, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000001) write$cgroup_devices(r1, 0x0, 0xffdd) 7.226078911s ago: executing program 6 (id=8486): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x7, 0x0, 0x4, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, 0x0, 0x1102) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000500000000000e1ff95000000000000002ba7e1d30cb599e83f040000f300000000bd01212fb56f040026fbfefc41056bd8174b79ed317142fa9ea4158123751c5c652fbc1626cca2a2ad75806150ae0209e62f51ee988e6e06c8206ac6939fc404004900c788b277be1cb79b0a4dcf23d410f6accd3641110bec4e90a634199e07f8f6eb968f200e011ea665c45a34b8580218ce740068720000074e8b1715807ea0ca469e468eea3fd2f73902ebcfcf49822775985bf313405b367e81c700000040000000000200000000005335000000143ea70c2ab40c7cb70cc8943a6d60d7c4900282e147d08e0af4b29df814f5691db43a5c00000004000000000089faff01210cce39bf405f1e846c12423a164a330100846f26ad03dd65873d9f87463ad6f7c2e8ee1a39244960b318778f2a047f6d5bc24fef5d7d6155102b1ced1e8019e63c850af895abba14f6fbd7fb5e2a431ab914040000000000010092c9f4609646b6c5c29647d2f950a959cf9938d6dfcb8ed2cbdc2ba9d580609e31c3fa90812a533ce206e7e57a79d6fce424c2204dd418c005479ecab19bdfb15a32a4fd67ce446adb431d07db79240acaf091231b986e77d05d988d6efdffdf48dca02113a38300cabf2b5543ffc166955709009e000000000061629d1822f720ec23812770d72c700a44e113d17088fdd00600000f7889b8c7044f56ff030000000000006cd4970400cac6f45a6922ded2e29514af463f747c08f4010586903500000000000000000000be34cf0f9d640dd782ac0cbc46903243d0d0f4bc7f253d0500000032daaf281c450e64c33aac8f23e7d1c94c4505a9839688b008c370494f6734b771546d9552d3bb2da0d000000000000000009125c97f0400f5e1671bc5eb7739daa7820a91cb0e732df2ae0000c747e00a4fbfe8942fa859cd28bdaa1509309926c77fbcb15ec58b42b400005a6b649dd5f13cd776e6c7c4b5c4b0de20e033b378553ead4c8cc530b62c36364e6505992209bdbc6203da7a3797246a6adef071102f0aa2c40095ddd05176f5cb8bd99e1ba0f9568f3e3876bba7bf973334e7919a080000000000000004fb996ad919f7e9672ce107000000ad882f2aead166c94500be902ee7dabc768eb9ec13f334aae90981ecaf5f744f22f2e45afe2c9e8632276cffe5f1fc215c0797d0244cf1ce269d10525745caaa3f77d1b80116cb9a38400242010000000100000091a0116f4693133138583da5e10b434697b0443b7b4ddfb3ace29e16e5a881336aad0974269a1025e2a9a135c0508af1aec2926627b43bba1229a7466bdca64f514b7911458da09fe8681916d408d753226a83ae2434ccd3fc508216aea86833030f569d61dc998620fcf4eeb92e7bc511df63c53b82514493b8f3c74f44ba184d40e87612024da1a1ebe316923865f037c01d71b5de81121046d84b18acb5cbea7eecad9b6dd46ed83515cd9f140e5f00019be25b5910a3193e90be231a05fd82e6003969c31082ff1d0eb50a04d14644234828cbb5aaa0ece702abdd425fa25ae04a2315c89064df633700000000d9e5953ea67310993d01000000000000003ac753358791b1490273ca535e05b11d815237743a5b79ad45de2a3c91257f02c2f30f5513662809073710937ed0055b238f466e1442f8ec7a5b394228035039ceeb452dca75f9ff5332b4c4777a3d19c158a0aa9a821667c68549e9da89ad4274ce2d3d7619936768a84a1465fff4eedba55955434f132ab7b884057aeb68f3d675a79907a72ace70902459f6950a06a03507838231a335ae759ed25534f2e90a7def4b3d4af7fd47ab1a701e4b7a7dfc1d12775ed0a31bc7b5855880aa767e68196c7aa5ac115724b6cb8fcebb67719eccd87b06b38566cf61ad2f307a79d2ce9801837bf0bd3af0271de700eef2795d28cb0017000000000000000000e052d93194121b774d21a0317d0346078400004652c769fd3d3e661a2fb511164f1502ab2ac4eb3f19c042163e0bdb88b82de384a8055e8b1e24294b0546cce481ff5618b7b9585dbb64d66debf219fa479abf22f3d64fe82e466ea6f27859946e72f80bb1c9cfcde57b79625e2979fe689a5a246cbbd488f43f46b2536f175f46dfb27d5229467270246ab53616c46edf34c559d3de0c59ca3305e66825715e5e4cd5b54c1b05c09f04337a76a30373baac3ecec91fd546eb7c32dbecb18a308a0004be94dfab28c2a51dc816df0000000000c12254f041804f7f7074356789b1d4dd55f3e045a48241a4ce04d06acb2cf11eab759ba78da5da0f26126d4cf2c73e5f94030000040000000000000000c301985d603403592486204054be3fdda91f9e315886941928e5a8bc1a00e69a98c0a8f7192f6ee93cc4124cf4e7610915efc08c834a44e1d685d6835a40b5bc615949cbcd98d044fa492aa38717481455e86dcd7816ad8940bd1995369d89ae6eadeb9117e8b94ab422c8d62f858875dccdbc89572231ef5d6df6a9c55f8df763c7c64da7cc017e1e3f5cd4cb9fe6d19b11d4d38239d318016e622b9683b7e46be64dc097982e23462392a0cd05afb2e060fd42ef00dfbd057311aab94f307d10c7a1af0d8e5a0fcb547475d13c0000000000000000f1cc97103d714d1abb901f866d9d629b4fb185f45790517c4a0f5c6a5024e3359e8d83e3f6edf9e2afb5ab59c7b2b45cfb0a3c1303a98e4ed531ac11cca1cd744b431de74c7cd6533adaa8ec749061b2959d53da626aa189781dc1be4d5c81aebc0cada819895b377d6cf0a7878ba99864ae84464744c605646caf2e06b13eba7ba10acf77d91b2297e9573abb0a4da534d735a223626402b308daf7835780fa6f4e410000000000fb00000000000000000000b14952139bd4bdbccc5e334c49584655c4fce8c5bb7c54664aef6d780100358aa54b4b49926c4be9ee4659153d9fa95d07cc4efdab2c5f4503148d0255d0b748366dafe042d78479c21d832e1431ed6d646d13e8e7230300920a5642bbed1dee9b46b6f02e572024ccf3c8edd82660e5d74c52be71d780c300000000000000000000000000000000000044ff72f96f084f4b6cdcb1b4a9d8e9f99f1b85497d0c3df704c8a0034c09caeeb0e34799b755649883539258a7b33dcef15d8fd1953ebaaa3cff81a0de7a05a440f20f6b273ceb8678f10378b670be7504dabd1471355d853292775d0366891f0bcf0a6087ed4f1f25ef52394db3e9d8318bbb9baff3db95bfd68a08ded502cc08a485c804e4fd107a7ca2a64ca081c6b2f7b895cdf98b763ebab9451c65eced6f5f97a541210806d885762ac3150225036c7eccd7a05593abd963f9a02df58085115e54f675e6a08d25b5722cabf989b4bbc562e073b81bae61f05c5e1f90e021340b60cc5fb8fdb09b6d20b0d87a6ed800000000000000000000000000000000006cc6f64f583a26a78f7f417f66c0af32f5194ddfce51e5aff28f621bb2fd2a5ab719823488d6e869b08d3d4ac7950c60144cf77437e29895a23282e3c65e015d1c334832a90ee77d93596e3f12e9ca8c67c7f3c9b66c9cb03edec184ad1d9544c7a3be250e471dca00000078544d79c0efe4094e561eeb26ee4c81106d03c004bc1589ef6e13648999c8735e2634e89aaa90c571fa3c07238697b1db783c52715055445e96995fe3273b0346b03fc742c06aa3947e0d9cf0c99b5e245ede85893112deea8bd3355a32ec15e1242f170a51f28cea4105541e96a52da4984d26bd29cb0623f00c6b0a4c00ad406d729babc9d1550a683c349017a340444000000000000000000000920ca49f7cc8194aaebdcae5a62bb7587b57f41f1c2034911f23e6bd0291b3319f03a0a15dea685a8ab75b3c60391afa5483231305402b52a8f9863800f127d6b4518f73a847ca583e855d70c6a4a53f61ad753d5e740db44afd32b019d9e8b41361c2c104fe52837a19dd6952fe2724c0105ab158a54a6a73000000000000000000"], &(0x7f0000000140)='GPL\x00'}, 0x48) (fail_nth: 2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000000)="b9e403c6631e39495aa05dc7cf1c", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 4.102622949s ago: executing program 5 (id=8487): socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x10c002, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$kcm(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0xa, 0x3, 0xff, &(0x7f0000000000)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x11, 0x200000000000003, 0x300) socket$kcm(0x1e, 0x4, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x2, 0xc2ba, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)=@generic={&(0x7f0000000040)='./file0\x00', r3}, 0x18) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r2, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x3, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="18020000020000180000000002000000850000002700000085000000d000000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r5 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r5, &(0x7f0000000700)={&(0x7f0000000000)={0x2, 0x0, @private=0xa010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="280000000000000000000000070000000717a87f000001ac141400e0000001ac1e0001ac1414bb", @ANYRES64=r5], 0x48}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) sendmsg$inet(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="5c00000012006b000040017ea608601602f3650400010008000000000002009ee517c356a7b0251e616859ad3a78a76e807c857e21bea297bff435cf01c937e786a6d0bdc7fcf50e4509c5cc68b7ed9c232d786c3500000000000074", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) 4.101227729s ago: executing program 7 (id=8497): sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x4f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x3) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r1, r0, 0x0, 0x1, 0xfffffffffffffffe}, 0x17) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000001800), 0x6}, 0x10c002, 0xac5d, 0x9, 0x0, 0x0, 0xf}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe}, 0x0, 0x0, 0x10, 0x6, 0xf60, 0x4, 0x0, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='cpu<20\t&&') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24055, 0x0, 0x7, 0x0, &(0x7f0000000100)='NoFl!#;', 0x0, 0x0, 0x0, 0x7}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{}, &(0x7f0000000040)=0x700, 0x0}, 0x20) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 4.100811039s ago: executing program 1 (id=8488): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0xe0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000001380)}}, 0x10) 4.100420409s ago: executing program 6 (id=8489): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x7, 0x0, 0x4, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x2, 0x0, 0x0, 0x0, 0x4137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x20, 0x10506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x1000000000000801, 0x1}, 0x7402, 0x0, 0x0, 0x9, 0x0, 0xffffffff, 0x3, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x55}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb010789005e107538e486dd6317ce22000000fffe80000000000000101000007f0600080000000000000071273fa7b49301641184a9"], 0xfdef) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000200)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1100}, 0x48) recvmsg$unix(0xffffffffffffffff, 0x0, 0x1102) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7c}, {0x6}]}) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x20243400, 0x0, 0x1b, 0x0, 0x0, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x8000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)="befede8a702839458299f58695dee56b6985476ca1d6bd2019ecdd48776756448d2db89adf3103") r4 = socket$kcm(0xa, 0x922000000003, 0x11) syz_clone(0x1020000, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x6, 0x0, 0x10, 0xfc, 0x0, 0x20, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={0x0, 0x4}, 0x1009, 0xc8, 0x9, 0x1, 0x0, 0x80000001, 0x0, 0x0, 0x4, 0x0, 0x200000000000}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000340)=ANY=[@ANYRES64], 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r2}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0b0000000d000000010001000900000001000000", @ANYRES32, @ANYBLOB="fcffffff00000000000000000000cc21ccc84874add979382783649168000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001a40)={r5, &(0x7f00000000c0), 0x0}, 0x20) 3.987902881s ago: executing program 8 (id=8490): socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}, 0x10022, 0xac5d, 0x0, 0x0, 0x0, 0x67af, 0xa6f7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000400)="d8000000140081044e81f782db44b9040a1d08020a000000040000a118000200fe8000000000000008000f0100810401a80016ea1f0008400304000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c0100000000000000cb090000001fb79164", 0x6c}], 0x1, 0x0, 0x0, 0x7400}, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000c40)="754dab32f442f2ba4eb8006cbf42311156d32ab80e64d3c0da6109de41607dbf651bbfaaa0870e0c8c67ceb73036a1c8946b2cd79d9e226f6e55a48dbdd63d39f7cfc30c873284d94d150f2bbc7af5b828720317763bd42ed27a2b9888ba8309a83636a1b8e6db9c2a542f682cf5cca673b15ce847795cbb15cbec7f14dfa5457c81aacdf58d473af363dc21c3c9a71af31c36c15afe8dd994190565e687a3defe3dba6e0c2141401c0859259867ac61b2", &(0x7f0000000d40)="9516b3c6e0b02090c1389babefbdddc1d484692bf187ce43571e20002c478e8b9c2db166a02c4d52b4895b980107d15e5268d0858745801982fd66bd693bca8f6bd1de8c5dce48060ece94915a5212745cf84310203fb6cd2ee4e620c187ddd3d53c1eb58ecf400a486f75cbdeb80c9a32fc4a75b2a3ee2615710b5321aac49433cb1b66136ae06f6d9687e4e55f1f3972f3a8b84a61328632ca83cab3c2692d67f84c6edc61c459c10f1fe2a6c54f018734f5b1c02efc63", 0x5, r1}, 0x38) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'vlan0\x00', @random="010000201000"}) 3.941596571s ago: executing program 1 (id=8491): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)}, {0x0}, {0x0}], 0x3}, 0x0) perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x8000003, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xcc, 0x3571}, 0x402, 0x0, 0xfffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x4, 0xc272}, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x409, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9028, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f1c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x102, 0x7, 0x0, 0x4) socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x8}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x40305828, &(0x7f0000000340)={'lo\x00', @random="3f2f94c100"}) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0x10, 0x2, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x1f, &(0x7f0000000100)=r3, 0x129) socket$kcm(0xa, 0x2, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000008082295"], &(0x7f00000002c0)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0x1, 0x0, &(0x7f0000000000)="df", 0x0, 0x149d, 0x503, 0x0, 0x0, 0x0, 0x0, 0x1, 0xffff80fe, 0xfffffff1}, 0x50) 1.74709ms ago: executing program 7 (id=8492): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x10c002, 0xac5d, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) close(0x3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r1, &(0x7f0000000b40)={&(0x7f0000000080)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000800)="e9", 0x9500}, {&(0x7f00000017c0)="ea0189bdebb0c16d420ee9b95082abd6431cc7afc22c4a6b8adecef68f76bd81a86e89f9c80e5c868a12b09e80ba8c01eb3f4b7be71f9fc2355c336cedc15eb778e3a3b35c3f72629ea4d9ae42cf4c17255815fb8a47aafd8b8ff0c202b4e09f7c42811261b5e113fcce27b4329ccb792df14b7d6dcfaf2cf8dbb51946e89c862e9252731f680ec50326fc16386aeefe654bac24", 0x94}], 0x2, &(0x7f0000000100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xd}, @loopback}}}], 0x20}, 0xe900) 158.88µs ago: executing program 1 (id=8493): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x0, 0x4, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000e001400400000004000000041"], 0x50) r1 = socket$kcm(0xa, 0x2, 0x0) close(r1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x0, 0x9, 0x6}, {0x10000002, 0x0, 0x6, 0xc}], 0x10, 0x9}, 0x94) socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x6b, &(0x7f00000001c0)=r4, 0x4) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, 0x0, &(0x7f0000000300), 0x1006, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000b80)={r0, &(0x7f00000014c0), &(0x7f0000000100)=""/31}, 0x20) r5 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r5, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket$kcm(0x2a, 0x2, 0x0) sendmsg$kcm(r6, 0x0, 0x0) sendmsg$kcm(r6, 0x0, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg$kcm(r5, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001ec0)=[{&(0x7f0000000c80)=""/4096, 0x1000}], 0x1}, 0x40000120) socket$kcm(0xa, 0x5, 0x0) 0s ago: executing program 8 (id=8494): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x10c010, 0x89, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x1c092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0xb3b, 0xfffffffffffffff8}, 0x840, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x4, 0x9, 0x4c, 0x69, 0x0, 0x3, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x81, 0x2, @perf_bp={&(0x7f0000000040)}, 0x8131, 0xa, 0x8, 0x9, 0x7ff, 0x0, 0x1000, 0x0, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0x10, r0, 0x4) r1 = socket$kcm(0x21, 0x2, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0xa, 0x0, @private}}, 0x80, 0x0}, 0x0) kernel console output (not intermixed with test programs): 4.028867][ T1211] netlink: 'syz.8.8057': attribute type 29 has an invalid length. [ 2524.590560][ T1223] FAULT_INJECTION: forcing a failure. [ 2524.590560][ T1223] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2524.657742][ T1223] CPU: 1 PID: 1223 Comm: syz.8.8063 Not tainted syzkaller #0 [ 2524.665193][ T1223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2524.675295][ T1223] Call Trace: [ 2524.678614][ T1223] [ 2524.681585][ T1223] dump_stack_lvl+0x188/0x24e [ 2524.686323][ T1223] ? show_regs_print_info+0x12/0x12 [ 2524.691580][ T1223] ? load_image+0x400/0x400 [ 2524.696137][ T1223] ? __lock_acquire+0x7d10/0x7d10 [ 2524.701201][ T1223] ? perf_trace_lock_acquire+0x100/0x3e0 [ 2524.706874][ T1223] should_fail_ex+0x399/0x4d0 [ 2524.711599][ T1223] _copy_from_user+0x2c/0x170 [ 2524.716332][ T1223] ___sys_sendmsg+0x1c3/0x360 [ 2524.721078][ T1223] ? __sys_sendmsg+0x290/0x290 [ 2524.725911][ T1223] ? __lock_acquire+0x7d10/0x7d10 [ 2524.731010][ T1223] __se_sys_sendmsg+0x1bb/0x2a0 [ 2524.735917][ T1223] ? __x64_sys_sendmsg+0x80/0x80 [ 2524.740935][ T1223] ? lockdep_hardirqs_on+0x94/0x140 [ 2524.746182][ T1223] do_syscall_64+0x4c/0xa0 [ 2524.750699][ T1223] ? clear_bhb_loop+0x60/0xb0 [ 2524.755502][ T1223] ? clear_bhb_loop+0x60/0xb0 [ 2524.760220][ T1223] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2524.766149][ T1223] RIP: 0033:0x7f8c2db9cdd9 [ 2524.770611][ T1223] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2524.790277][ T1223] RSP: 002b:00007f8c2e9e2028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2524.798757][ T1223] RAX: ffffffffffffffda RBX: 00007f8c2de15fa0 RCX: 00007f8c2db9cdd9 [ 2524.806783][ T1223] RDX: 0000000020000040 RSI: 0000200000000040 RDI: 0000000000000006 [ 2524.814820][ T1223] RBP: 00007f8c2e9e2090 R08: 0000000000000000 R09: 0000000000000000 [ 2524.822858][ T1223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2524.830879][ T1223] R13: 00007f8c2de16038 R14: 00007f8c2de15fa0 R15: 00007ffcc495de88 [ 2524.838935][ T1223] [ 2526.273117][ T1320] netlink: 'syz.6.8064': attribute type 10 has an invalid length. [ 2526.322875][ T1320] netlink: 40 bytes leftover after parsing attributes in process `syz.6.8064'. [ 2526.344214][ T1320] device team0 entered promiscuous mode [ 2526.580792][ T1332] netlink: 9286 bytes leftover after parsing attributes in process `syz.8.8070'. [ 2526.684996][ T1320] device team_slave_0 entered promiscuous mode [ 2526.691543][ T1320] device team_slave_1 entered promiscuous mode [ 2526.917945][ T1320] device bond0 entered promiscuous mode [ 2527.040825][ T1320] device bond_slave_0 entered promiscuous mode [ 2527.141802][ T1320] device bond_slave_1 entered promiscuous mode [ 2527.176803][ T1320] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 2527.585600][ T1348] FAULT_INJECTION: forcing a failure. [ 2527.585600][ T1348] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2527.641699][ T1348] CPU: 0 PID: 1348 Comm: syz.1.8073 Not tainted syzkaller #0 [ 2527.649157][ T1348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2527.659258][ T1348] Call Trace: [ 2527.662583][ T1348] [ 2527.665547][ T1348] dump_stack_lvl+0x188/0x24e [ 2527.670370][ T1348] ? show_regs_print_info+0x12/0x12 [ 2527.675617][ T1348] ? load_image+0x400/0x400 [ 2527.680151][ T1348] ? __lock_acquire+0x7d10/0x7d10 [ 2527.685214][ T1348] should_fail_ex+0x399/0x4d0 [ 2527.689917][ T1348] _copy_from_user+0x2c/0x170 [ 2527.694669][ T1348] __sys_bpf+0x2ea/0x780 [ 2527.698952][ T1348] ? bpf_link_show_fdinfo+0x380/0x380 [ 2527.704375][ T1348] ? lock_chain_count+0x20/0x20 [ 2527.709264][ T1348] __x64_sys_bpf+0x78/0x90 [ 2527.713714][ T1348] do_syscall_64+0x4c/0xa0 [ 2527.718156][ T1348] ? clear_bhb_loop+0x60/0xb0 [ 2527.722865][ T1348] ? clear_bhb_loop+0x60/0xb0 [ 2527.727574][ T1348] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2527.733508][ T1348] RIP: 0033:0x7f05d019cdd9 [ 2527.737940][ T1348] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2527.757653][ T1348] RSP: 002b:00007f05ce3f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2527.766190][ T1348] RAX: ffffffffffffffda RBX: 00007f05d0415fa0 RCX: 00007f05d019cdd9 [ 2527.774193][ T1348] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 2527.782198][ T1348] RBP: 00007f05ce3f6090 R08: 0000000000000000 R09: 0000000000000000 [ 2527.790193][ T1348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2527.798175][ T1348] R13: 00007f05d0416038 R14: 00007f05d0415fa0 R15: 00007ffffc46d268 [ 2527.806177][ T1348] [ 2528.493830][ T1362] netlink: 'syz.8.8076': attribute type 29 has an invalid length. [ 2529.016217][ T1278] ieee802154 phy0 wpan0: encryption failed: -22 [ 2529.022596][ T1278] ieee802154 phy1 wpan1: encryption failed: -22 [ 2530.279034][ T1372] FAULT_INJECTION: forcing a failure. [ 2530.279034][ T1372] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2530.308220][ T1372] CPU: 1 PID: 1372 Comm: syz.1.8078 Not tainted syzkaller #0 [ 2530.315679][ T1372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2530.325783][ T1372] Call Trace: [ 2530.329107][ T1372] [ 2530.332066][ T1372] dump_stack_lvl+0x188/0x24e [ 2530.336796][ T1372] ? show_regs_print_info+0x12/0x12 [ 2530.342044][ T1372] ? load_image+0x400/0x400 [ 2530.346593][ T1372] ? __lock_acquire+0x7d10/0x7d10 [ 2530.351670][ T1372] should_fail_ex+0x399/0x4d0 [ 2530.356394][ T1372] _copy_from_user+0x2c/0x170 [ 2530.361116][ T1372] ___sys_recvmsg+0x172/0x590 [ 2530.365858][ T1372] ? __sys_recvmsg+0x290/0x290 [ 2530.370674][ T1372] ? common_file_perm+0x171/0x1c0 [ 2530.375763][ T1372] ? __fget_files+0x43d/0x4b0 [ 2530.380509][ T1372] __x64_sys_recvmsg+0x205/0x2e0 [ 2530.385499][ T1372] ? ___sys_recvmsg+0x590/0x590 [ 2530.390420][ T1372] ? lockdep_hardirqs_on+0x94/0x140 [ 2530.395664][ T1372] do_syscall_64+0x4c/0xa0 [ 2530.400116][ T1372] ? clear_bhb_loop+0x60/0xb0 [ 2530.404917][ T1372] ? clear_bhb_loop+0x60/0xb0 [ 2530.409634][ T1372] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2530.415678][ T1372] RIP: 0033:0x7f05d019cdd9 [ 2530.420127][ T1372] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2530.439774][ T1372] RSP: 002b:00007f05ce3b4028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 2530.448334][ T1372] RAX: ffffffffffffffda RBX: 00007f05d0416180 RCX: 00007f05d019cdd9 [ 2530.456347][ T1372] RDX: 0000000000000000 RSI: 0000200000001440 RDI: 0000000000000006 [ 2530.464355][ T1372] RBP: 00007f05ce3b4090 R08: 0000000000000000 R09: 0000000000000000 [ 2530.472357][ T1372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2530.480381][ T1372] R13: 00007f05d0416218 R14: 00007f05d0416180 R15: 00007ffffc46d268 [ 2530.489114][ T1372] [ 2530.687936][ T1362] netlink: 'syz.8.8076': attribute type 29 has an invalid length. [ 2530.986011][ T1380] netlink: 'syz.1.8082': attribute type 19 has an invalid length. [ 2530.994201][ T1380] netlink: 55 bytes leftover after parsing attributes in process `syz.1.8082'. [ 2531.932904][ T1394] netlink: 128 bytes leftover after parsing attributes in process `syz.6.8086'. [ 2531.950850][ T1394] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 2532.082506][ T1394] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 2532.083298][ T1401] FAULT_INJECTION: forcing a failure. [ 2532.083298][ T1401] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2532.188386][ T1401] CPU: 1 PID: 1401 Comm: syz.7.8088 Not tainted syzkaller #0 [ 2532.195862][ T1401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2532.206055][ T1401] Call Trace: [ 2532.209383][ T1401] [ 2532.212348][ T1401] dump_stack_lvl+0x188/0x24e [ 2532.217090][ T1401] ? show_regs_print_info+0x12/0x12 [ 2532.222352][ T1401] ? load_image+0x400/0x400 [ 2532.226904][ T1401] ? __lock_acquire+0x7d10/0x7d10 [ 2532.231986][ T1401] ? lockdep_hardirqs_on+0x94/0x140 [ 2532.237241][ T1401] should_fail_ex+0x399/0x4d0 [ 2532.241960][ T1401] _copy_from_user+0x2c/0x170 [ 2532.246684][ T1401] ___sys_sendmsg+0x1c3/0x360 [ 2532.251413][ T1401] ? __sys_sendmsg+0x290/0x290 [ 2532.256237][ T1401] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 2532.262024][ T1401] __se_sys_sendmsg+0x1bb/0x2a0 [ 2532.268440][ T1401] ? __x64_sys_sendmsg+0x80/0x80 [ 2532.273551][ T1401] ? syscall_enter_from_user_mode+0x2a/0x80 [ 2532.279495][ T1401] do_syscall_64+0x4c/0xa0 [ 2532.283963][ T1401] ? clear_bhb_loop+0x60/0xb0 [ 2532.288688][ T1401] ? clear_bhb_loop+0x60/0xb0 [ 2532.293407][ T1401] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2532.299349][ T1401] RIP: 0033:0x7fb81719cdd9 [ 2532.303892][ T1401] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2532.323561][ T1401] RSP: 002b:00007fb81809c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2532.332029][ T1401] RAX: ffffffffffffffda RBX: 00007fb817415fa0 RCX: 00007fb81719cdd9 [ 2532.340056][ T1401] RDX: 0000000000000000 RSI: 0000200000000940 RDI: 0000000000000003 [ 2532.348088][ T1401] RBP: 00007fb81809c090 R08: 0000000000000000 R09: 0000000000000000 [ 2532.356277][ T1401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2532.364282][ T1401] R13: 00007fb817416038 R14: 00007fb817415fa0 R15: 00007ffdd44e48d8 [ 2532.372301][ T1401] [ 2532.556880][ T1411] FAULT_INJECTION: forcing a failure. [ 2532.556880][ T1411] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2532.571312][ T1411] CPU: 0 PID: 1411 Comm: syz.7.8102 Not tainted syzkaller #0 [ 2532.578746][ T1411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2532.588850][ T1411] Call Trace: [ 2532.592172][ T1411] [ 2532.595136][ T1411] dump_stack_lvl+0x188/0x24e [ 2532.599871][ T1411] ? show_regs_print_info+0x12/0x12 [ 2532.605117][ T1411] ? load_image+0x400/0x400 [ 2532.609674][ T1411] ? __lock_acquire+0x7d10/0x7d10 [ 2532.614753][ T1411] should_fail_ex+0x399/0x4d0 [ 2532.619477][ T1411] _copy_from_iter+0x1c0/0x1130 [ 2532.624382][ T1411] ? copyout_mc+0x110/0x110 [ 2532.628954][ T1411] tun_get_user+0x1f2/0x3c70 [ 2532.633684][ T1411] ? __lock_acquire+0x7d10/0x7d10 [ 2532.638767][ T1411] ? rcu_read_unlock+0xa0/0xa0 [ 2532.643587][ T1411] ? tun_get+0x1c/0x2e0 [ 2532.647797][ T1411] ? __lock_acquire+0x7d10/0x7d10 [ 2532.652873][ T1411] ? tun_get+0x1c/0x2e0 [ 2532.657067][ T1411] tun_chr_write_iter+0x112/0x1f0 [ 2532.662123][ T1411] vfs_write+0x4b1/0xa30 [ 2532.666409][ T1411] ? file_end_write+0x250/0x250 [ 2532.671290][ T1411] ? __fget_files+0x43d/0x4b0 [ 2532.676000][ T1411] ? __fdget_pos+0x1d4/0x360 [ 2532.680614][ T1411] ? ksys_write+0x71/0x250 [ 2532.685048][ T1411] ksys_write+0x14c/0x250 [ 2532.689431][ T1411] ? __ia32_sys_read+0x80/0x80 [ 2532.694245][ T1411] ? lockdep_hardirqs_on+0x94/0x140 [ 2532.699480][ T1411] do_syscall_64+0x4c/0xa0 [ 2532.703949][ T1411] ? clear_bhb_loop+0x60/0xb0 [ 2532.708641][ T1411] ? clear_bhb_loop+0x60/0xb0 [ 2532.713337][ T1411] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2532.719249][ T1411] RIP: 0033:0x7fb81719cdd9 [ 2532.723685][ T1411] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2532.743328][ T1411] RSP: 002b:00007fb81809c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2532.751773][ T1411] RAX: ffffffffffffffda RBX: 00007fb817415fa0 RCX: 00007fb81719cdd9 [ 2532.759875][ T1411] RDX: 000000000000ffdd RSI: 00002000000001c0 RDI: 0000000000000003 [ 2532.767874][ T1411] RBP: 00007fb81809c090 R08: 0000000000000000 R09: 0000000000000000 [ 2532.775873][ T1411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2532.783861][ T1411] R13: 00007fb817416038 R14: 00007fb817415fa0 R15: 00007ffdd44e48d8 [ 2532.791947][ T1411] [ 2533.384487][ T1425] FAULT_INJECTION: forcing a failure. [ 2533.384487][ T1425] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2533.456071][ T1425] CPU: 1 PID: 1425 Comm: syz.6.8096 Not tainted syzkaller #0 [ 2533.463549][ T1425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2533.473718][ T1425] Call Trace: [ 2533.477084][ T1425] [ 2533.480118][ T1425] dump_stack_lvl+0x188/0x24e [ 2533.484830][ T1425] ? show_regs_print_info+0x12/0x12 [ 2533.490482][ T1425] ? load_image+0x400/0x400 [ 2533.495013][ T1425] ? __lock_acquire+0x7d10/0x7d10 [ 2533.500059][ T1425] should_fail_ex+0x399/0x4d0 [ 2533.504749][ T1425] _copy_from_iter+0x1c0/0x1130 [ 2533.509615][ T1425] ? copyout_mc+0x110/0x110 [ 2533.514154][ T1425] tun_get_user+0x1f2/0x3c70 [ 2533.518764][ T1425] ? __lock_acquire+0x7d10/0x7d10 [ 2533.523834][ T1425] ? rcu_read_unlock+0xa0/0xa0 [ 2533.528641][ T1425] ? tun_get+0x1c/0x2e0 [ 2533.532847][ T1425] ? __lock_acquire+0x7d10/0x7d10 [ 2533.537908][ T1425] ? tun_get+0x1c/0x2e0 [ 2533.542102][ T1425] tun_chr_write_iter+0x112/0x1f0 [ 2533.547161][ T1425] vfs_write+0x4b1/0xa30 [ 2533.551434][ T1425] ? file_end_write+0x250/0x250 [ 2533.556307][ T1425] ? __fget_files+0x43d/0x4b0 [ 2533.561008][ T1425] ? __fdget_pos+0x1d4/0x360 [ 2533.565613][ T1425] ? ksys_write+0x71/0x250 [ 2533.570047][ T1425] ksys_write+0x14c/0x250 [ 2533.574397][ T1425] ? __ia32_sys_read+0x80/0x80 [ 2533.579185][ T1425] ? lockdep_hardirqs_on+0x94/0x140 [ 2533.584401][ T1425] do_syscall_64+0x4c/0xa0 [ 2533.588832][ T1425] ? clear_bhb_loop+0x60/0xb0 [ 2533.593524][ T1425] ? clear_bhb_loop+0x60/0xb0 [ 2533.598220][ T1425] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2533.604128][ T1425] RIP: 0033:0x7f724c19cdd9 [ 2533.608581][ T1425] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2533.628374][ T1425] RSP: 002b:00007f724d0ef028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2533.636811][ T1425] RAX: ffffffffffffffda RBX: 00007f724c415fa0 RCX: 00007f724c19cdd9 [ 2533.644881][ T1425] RDX: 000000000000ffdd RSI: 00002000000001c0 RDI: 0000000000000003 [ 2533.652865][ T1425] RBP: 00007f724d0ef090 R08: 0000000000000000 R09: 0000000000000000 [ 2533.660847][ T1425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2533.668831][ T1425] R13: 00007f724c416038 R14: 00007f724c415fa0 R15: 00007fffe1eb7298 [ 2533.677787][ T1425] [ 2533.902010][ T1434] netlink: 9286 bytes leftover after parsing attributes in process `syz.5.8099'. [ 2534.345737][ T1447] netlink: 'syz.6.8104': attribute type 29 has an invalid length. [ 2534.363671][ T1448] netlink: 14 bytes leftover after parsing attributes in process `syz.1.8103'. [ 2534.384199][ T1447] netlink: 'syz.6.8104': attribute type 29 has an invalid length. [ 2534.460957][ T1447] netlink: 'syz.6.8104': attribute type 29 has an invalid length. [ 2534.469833][ T1453] netlink: 'syz.6.8104': attribute type 29 has an invalid length. [ 2534.931538][ T1458] FAULT_INJECTION: forcing a failure. [ 2534.931538][ T1458] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2534.997219][ T1458] CPU: 0 PID: 1458 Comm: syz.6.8109 Not tainted syzkaller #0 [ 2535.005117][ T1458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2535.015211][ T1458] Call Trace: [ 2535.018530][ T1458] [ 2535.021489][ T1458] dump_stack_lvl+0x188/0x24e [ 2535.026213][ T1458] ? show_regs_print_info+0x12/0x12 [ 2535.031467][ T1458] ? load_image+0x400/0x400 [ 2535.036104][ T1458] ? __lock_acquire+0x7d10/0x7d10 [ 2535.041173][ T1458] ? cap_capable+0x195/0x230 [ 2535.045855][ T1458] should_fail_ex+0x399/0x4d0 [ 2535.050581][ T1458] _copy_from_user+0x2c/0x170 [ 2535.055309][ T1458] __sys_bpf+0x2ea/0x780 [ 2535.059608][ T1458] ? bpf_link_show_fdinfo+0x380/0x380 [ 2535.065040][ T1458] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2535.071383][ T1458] __x64_sys_bpf+0x78/0x90 [ 2535.075862][ T1458] do_syscall_64+0x4c/0xa0 [ 2535.080324][ T1458] ? clear_bhb_loop+0x60/0xb0 [ 2535.085054][ T1458] ? clear_bhb_loop+0x60/0xb0 [ 2535.089778][ T1458] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2535.095736][ T1458] RIP: 0033:0x7f724c19cdd9 [ 2535.100282][ T1458] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2535.119937][ T1458] RSP: 002b:00007f724d0ef028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2535.128491][ T1458] RAX: ffffffffffffffda RBX: 00007f724c415fa0 RCX: 00007f724c19cdd9 [ 2535.136513][ T1458] RDX: 0000000000000040 RSI: 0000200000000240 RDI: 000000000000001c [ 2535.144530][ T1458] RBP: 00007f724d0ef090 R08: 0000000000000000 R09: 0000000000000000 [ 2535.152542][ T1458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2535.160558][ T1458] R13: 00007f724c416038 R14: 00007f724c415fa0 R15: 00007fffe1eb7298 [ 2535.168593][ T1458] [ 2535.371480][ T1467] netlink: 130181 bytes leftover after parsing attributes in process `syz.1.8111'. [ 2537.492876][ T1467] netlink: 'syz.1.8111': attribute type 11 has an invalid length. [ 2537.507758][ T1467] netlink: 168 bytes leftover after parsing attributes in process `syz.1.8111'. [ 2537.697949][ T1478] netlink: 'syz.6.8115': attribute type 10 has an invalid length. [ 2537.788259][ T1478] device macvlan1 entered promiscuous mode [ 2537.843322][ T1478] team0: Port device macvlan1 added [ 2538.117954][ T1489] netlink: 'syz.7.8118': attribute type 10 has an invalid length. [ 2538.180696][ T1488] netlink: 9286 bytes leftover after parsing attributes in process `syz.6.8116'. [ 2538.223080][ T1489] team0: Port device macvlan1 added [ 2538.289869][ T1491] FAULT_INJECTION: forcing a failure. [ 2538.289869][ T1491] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2538.345856][ T1491] CPU: 1 PID: 1491 Comm: syz.8.8119 Not tainted syzkaller #0 [ 2538.353325][ T1491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2538.363419][ T1491] Call Trace: [ 2538.366761][ T1491] [ 2538.369742][ T1491] dump_stack_lvl+0x188/0x24e [ 2538.374475][ T1491] ? show_regs_print_info+0x12/0x12 [ 2538.379725][ T1491] ? load_image+0x400/0x400 [ 2538.384258][ T1491] ? __lock_acquire+0x7d10/0x7d10 [ 2538.389310][ T1491] should_fail_ex+0x399/0x4d0 [ 2538.394006][ T1491] _copy_from_user+0x2c/0x170 [ 2538.398712][ T1491] ___sys_sendmsg+0x1c3/0x360 [ 2538.403416][ T1491] ? __sys_sendmsg+0x290/0x290 [ 2538.408247][ T1491] ? __lock_acquire+0x7d10/0x7d10 [ 2538.413308][ T1491] __se_sys_sendmsg+0x1bb/0x2a0 [ 2538.418194][ T1491] ? __x64_sys_sendmsg+0x80/0x80 [ 2538.423163][ T1491] ? lockdep_hardirqs_on+0x94/0x140 [ 2538.428381][ T1491] do_syscall_64+0x4c/0xa0 [ 2538.432816][ T1491] ? clear_bhb_loop+0x60/0xb0 [ 2538.437510][ T1491] ? clear_bhb_loop+0x60/0xb0 [ 2538.442205][ T1491] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2538.448114][ T1491] RIP: 0033:0x7f8c2db9cdd9 [ 2538.452539][ T1491] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2538.472174][ T1491] RSP: 002b:00007f8c2e9e2028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2538.480688][ T1491] RAX: ffffffffffffffda RBX: 00007f8c2de15fa0 RCX: 00007f8c2db9cdd9 [ 2538.488677][ T1491] RDX: 0000000000004840 RSI: 0000200000000140 RDI: 0000000000000003 [ 2538.496660][ T1491] RBP: 00007f8c2e9e2090 R08: 0000000000000000 R09: 0000000000000000 [ 2538.504650][ T1491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2538.512628][ T1491] R13: 00007f8c2de16038 R14: 00007f8c2de15fa0 R15: 00007ffcc495de88 [ 2538.520718][ T1491] [ 2538.966672][ T1509] netlink: 'syz.6.8124': attribute type 28 has an invalid length. [ 2539.003457][ T1509] netlink: 'syz.6.8124': attribute type 29 has an invalid length. [ 2539.027592][ T1509] netlink: 132 bytes leftover after parsing attributes in process `syz.6.8124'. [ 2539.241490][ T1515] FAULT_INJECTION: forcing a failure. [ 2539.241490][ T1515] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2539.273148][ T1515] CPU: 1 PID: 1515 Comm: syz.8.8125 Not tainted syzkaller #0 [ 2539.280630][ T1515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2539.290730][ T1515] Call Trace: [ 2539.294139][ T1515] [ 2539.297102][ T1515] dump_stack_lvl+0x188/0x24e [ 2539.301839][ T1515] ? show_regs_print_info+0x12/0x12 [ 2539.307087][ T1515] ? load_image+0x400/0x400 [ 2539.311642][ T1515] ? __lock_acquire+0x7d10/0x7d10 [ 2539.316728][ T1515] should_fail_ex+0x399/0x4d0 [ 2539.321453][ T1515] _copy_from_user+0x2c/0x170 [ 2539.326187][ T1515] __sys_bpf+0x2ea/0x780 [ 2539.330476][ T1515] ? bpf_link_show_fdinfo+0x380/0x380 [ 2539.335921][ T1515] ? lock_chain_count+0x20/0x20 [ 2539.340838][ T1515] __x64_sys_bpf+0x78/0x90 [ 2539.345300][ T1515] do_syscall_64+0x4c/0xa0 [ 2539.349756][ T1515] ? clear_bhb_loop+0x60/0xb0 [ 2539.354479][ T1515] ? clear_bhb_loop+0x60/0xb0 [ 2539.359210][ T1515] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2539.365151][ T1515] RIP: 0033:0x7f8c2db9cdd9 [ 2539.369606][ T1515] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2539.389254][ T1515] RSP: 002b:00007f8c2e9e2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2539.397695][ T1515] RAX: ffffffffffffffda RBX: 00007f8c2de15fa0 RCX: 00007f8c2db9cdd9 [ 2539.405682][ T1515] RDX: 000000000000004c RSI: 0000200000001300 RDI: 000000000000000a [ 2539.413670][ T1515] RBP: 00007f8c2e9e2090 R08: 0000000000000000 R09: 0000000000000000 [ 2539.421656][ T1515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2539.429639][ T1515] R13: 00007f8c2de16038 R14: 00007f8c2de15fa0 R15: 00007ffcc495de88 [ 2539.437640][ T1515] [ 2539.674050][ T1512] netlink: 'syz.1.8122': attribute type 29 has an invalid length. [ 2540.355427][ T1526] netlink: 'syz.8.8127': attribute type 2 has an invalid length. [ 2540.397402][ T1526] netlink: 199848 bytes leftover after parsing attributes in process `syz.8.8127'. [ 2541.856325][ T1513] netlink: 132 bytes leftover after parsing attributes in process `syz.6.8124'. [ 2541.871698][ T1512] netlink: 'syz.1.8122': attribute type 29 has an invalid length. [ 2542.330324][ T1536] FAULT_INJECTION: forcing a failure. [ 2542.330324][ T1536] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2542.349852][ T1536] CPU: 1 PID: 1536 Comm: syz.8.8132 Not tainted syzkaller #0 [ 2542.354536][ T1533] device lo entered promiscuous mode [ 2542.357290][ T1536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2542.372702][ T1536] Call Trace: [ 2542.376015][ T1536] [ 2542.378980][ T1536] dump_stack_lvl+0x188/0x24e [ 2542.383716][ T1536] ? show_regs_print_info+0x12/0x12 [ 2542.388972][ T1536] ? load_image+0x400/0x400 [ 2542.393523][ T1536] ? __lock_acquire+0x7d10/0x7d10 [ 2542.398599][ T1536] should_fail_ex+0x399/0x4d0 [ 2542.403304][ T1536] _copy_from_user+0x2c/0x170 [ 2542.408008][ T1536] __sys_bpf+0x2ea/0x780 [ 2542.412281][ T1536] ? bpf_link_show_fdinfo+0x380/0x380 [ 2542.417694][ T1536] ? lock_chain_count+0x20/0x20 [ 2542.422631][ T1536] __x64_sys_bpf+0x78/0x90 [ 2542.427073][ T1536] do_syscall_64+0x4c/0xa0 [ 2542.431512][ T1536] ? clear_bhb_loop+0x60/0xb0 [ 2542.436211][ T1536] ? clear_bhb_loop+0x60/0xb0 [ 2542.440990][ T1536] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2542.446904][ T1536] RIP: 0033:0x7f8c2db9cdd9 [ 2542.451335][ T1536] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2542.470962][ T1536] RSP: 002b:00007f8c2e9e2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2542.479480][ T1536] RAX: ffffffffffffffda RBX: 00007f8c2de15fa0 RCX: 00007f8c2db9cdd9 [ 2542.487468][ T1536] RDX: 0000000000000094 RSI: 0000200000000140 RDI: 0000000000000005 [ 2542.495458][ T1536] RBP: 00007f8c2e9e2090 R08: 0000000000000000 R09: 0000000000000000 [ 2542.503444][ T1536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2542.511424][ T1536] R13: 00007f8c2de16038 R14: 00007f8c2de15fa0 R15: 00007ffcc495de88 [ 2542.519504][ T1536] [ 2543.491207][ T1558] netlink: 9286 bytes leftover after parsing attributes in process `syz.7.8136'. [ 2543.665033][ T1564] device veth0_vlan left promiscuous mode [ 2543.755759][ T1564] device veth0_vlan entered promiscuous mode [ 2544.111006][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2544.135741][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2544.157818][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2544.569476][ T1584] FAULT_INJECTION: forcing a failure. [ 2544.569476][ T1584] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2544.663273][ T1584] CPU: 0 PID: 1584 Comm: syz.5.8143 Not tainted syzkaller #0 [ 2544.670749][ T1584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2544.680834][ T1584] Call Trace: [ 2544.684141][ T1584] [ 2544.687105][ T1584] dump_stack_lvl+0x188/0x24e [ 2544.691839][ T1584] ? show_regs_print_info+0x12/0x12 [ 2544.697075][ T1584] ? load_image+0x400/0x400 [ 2544.701613][ T1584] ? __lock_acquire+0x7d10/0x7d10 [ 2544.706696][ T1584] should_fail_ex+0x399/0x4d0 [ 2544.711514][ T1584] _copy_from_user+0x2c/0x170 [ 2544.716246][ T1584] __sys_bpf+0x2ea/0x780 [ 2544.720545][ T1584] ? bpf_link_show_fdinfo+0x380/0x380 [ 2544.725987][ T1584] ? lock_chain_count+0x20/0x20 [ 2544.730888][ T1584] __x64_sys_bpf+0x78/0x90 [ 2544.735357][ T1584] do_syscall_64+0x4c/0xa0 [ 2544.739816][ T1584] ? clear_bhb_loop+0x60/0xb0 [ 2544.744535][ T1584] ? clear_bhb_loop+0x60/0xb0 [ 2544.749256][ T1584] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2544.755184][ T1584] RIP: 0033:0x7fa8d9b9cdd9 [ 2544.759627][ T1584] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2544.775006][ T1582] netlink: 16222 bytes leftover after parsing attributes in process `syz.6.8144'. [ 2544.779353][ T1584] RSP: 002b:00007fa8da9d0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2544.779385][ T1584] RAX: ffffffffffffffda RBX: 00007fa8d9e15fa0 RCX: 00007fa8d9b9cdd9 [ 2544.779401][ T1584] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 2544.779415][ T1584] RBP: 00007fa8da9d0090 R08: 0000000000000000 R09: 0000000000000000 [ 2544.779430][ T1584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2544.779442][ T1584] R13: 00007fa8d9e16038 R14: 00007fa8d9e15fa0 R15: 00007ffe7b880bf8 [ 2544.779473][ T1584] [ 2545.281530][ T1596] netlink: 132 bytes leftover after parsing attributes in process `syz.5.8146'. [ 2545.291717][ T1594] FAULT_INJECTION: forcing a failure. [ 2545.291717][ T1594] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2545.327710][ T1596] netlink: 'syz.5.8146': attribute type 10 has an invalid length. [ 2545.366739][ T1594] CPU: 1 PID: 1594 Comm: syz.1.8147 Not tainted syzkaller #0 [ 2545.374191][ T1594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2545.384297][ T1594] Call Trace: [ 2545.387614][ T1594] [ 2545.390573][ T1594] dump_stack_lvl+0x188/0x24e [ 2545.395308][ T1594] ? show_regs_print_info+0x12/0x12 [ 2545.400555][ T1594] ? load_image+0x400/0x400 [ 2545.405118][ T1594] ? __lock_acquire+0x7d10/0x7d10 [ 2545.410193][ T1594] should_fail_ex+0x399/0x4d0 [ 2545.414917][ T1594] _copy_from_user+0x2c/0x170 [ 2545.419829][ T1594] ___sys_sendmsg+0x1c3/0x360 [ 2545.424565][ T1594] ? __sys_sendmsg+0x290/0x290 [ 2545.426863][ T1596] team0: Port device bridge_slave_1 added [ 2545.429385][ T1594] ? __lock_acquire+0x7d10/0x7d10 [ 2545.440214][ T1594] __se_sys_sendmsg+0x1bb/0x2a0 [ 2545.445293][ T1594] ? __x64_sys_sendmsg+0x80/0x80 [ 2545.450291][ T1594] ? lockdep_hardirqs_on+0x94/0x140 [ 2545.455531][ T1594] do_syscall_64+0x4c/0xa0 [ 2545.459993][ T1594] ? clear_bhb_loop+0x60/0xb0 [ 2545.464712][ T1594] ? clear_bhb_loop+0x60/0xb0 [ 2545.469436][ T1594] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2545.475458][ T1594] RIP: 0033:0x7f05d019cdd9 [ 2545.479949][ T1594] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2545.499655][ T1594] RSP: 002b:00007f05ce3f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2545.508081][ T1594] RAX: ffffffffffffffda RBX: 00007f05d0415fa0 RCX: 00007f05d019cdd9 [ 2545.516063][ T1594] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 2545.524048][ T1594] RBP: 00007f05ce3f6090 R08: 0000000000000000 R09: 0000000000000000 [ 2545.532028][ T1594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2545.540018][ T1594] R13: 00007f05d0416038 R14: 00007f05d0415fa0 R15: 00007ffffc46d268 [ 2545.548015][ T1594] [ 2545.648280][ T1598] netlink: 14568 bytes leftover after parsing attributes in process `syz.8.8149'. [ 2545.709553][ T1610] netlink: 'syz.7.8151': attribute type 10 has an invalid length. [ 2545.770272][ T1610] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2545.811000][ T1610] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 2546.041291][ T1621] netlink: 'syz.1.8152': attribute type 10 has an invalid length. [ 2546.443532][T29820] Bluetooth: hci5: command 0x0406 tx timeout [ 2548.998216][ T1621] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2549.007328][ T1621] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 2549.023422][ T1628] netlink: 'syz.8.8156': attribute type 10 has an invalid length. [ 2549.031376][ T1628] netlink: 40 bytes leftover after parsing attributes in process `syz.8.8156'. [ 2549.063191][ T1628] device team0 entered promiscuous mode [ 2549.068928][ T1628] device team_slave_0 entered promiscuous mode [ 2549.090619][ T1628] device team_slave_1 entered promiscuous mode [ 2549.100952][ T1628] device bond0 entered promiscuous mode [ 2549.113219][ T1628] device bond_slave_0 entered promiscuous mode [ 2549.119635][ T1628] device bond_slave_1 entered promiscuous mode [ 2549.130843][ T1628] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 2549.269869][ T1643] device veth0_vlan left promiscuous mode [ 2549.381658][ T1643] device veth0_vlan entered promiscuous mode [ 2550.111547][ T1304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2550.140741][ T1304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2550.224248][ T1304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2550.320177][ T1304] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2550.536254][ T1663] netlink: 'syz.8.8164': attribute type 10 has an invalid length. [ 2550.969666][ T1671] FAULT_INJECTION: forcing a failure. [ 2550.969666][ T1671] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2551.029988][ T1671] CPU: 1 PID: 1671 Comm: syz.8.8166 Not tainted syzkaller #0 [ 2551.037449][ T1671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2551.047536][ T1671] Call Trace: [ 2551.050837][ T1671] [ 2551.053778][ T1671] dump_stack_lvl+0x188/0x24e [ 2551.058483][ T1671] ? show_regs_print_info+0x12/0x12 [ 2551.063703][ T1671] ? load_image+0x400/0x400 [ 2551.068377][ T1671] ? __lock_acquire+0x7d10/0x7d10 [ 2551.073437][ T1671] should_fail_ex+0x399/0x4d0 [ 2551.078133][ T1671] _copy_from_user+0x2c/0x170 [ 2551.082826][ T1671] __sys_bpf+0x2ea/0x780 [ 2551.087181][ T1671] ? bpf_link_show_fdinfo+0x380/0x380 [ 2551.092582][ T1671] ? lock_chain_count+0x20/0x20 [ 2551.097495][ T1671] __x64_sys_bpf+0x78/0x90 [ 2551.101937][ T1671] do_syscall_64+0x4c/0xa0 [ 2551.106391][ T1671] ? clear_bhb_loop+0x60/0xb0 [ 2551.111087][ T1671] ? clear_bhb_loop+0x60/0xb0 [ 2551.115783][ T1671] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2551.121696][ T1671] RIP: 0033:0x7f8c2db9cdd9 [ 2551.126212][ T1671] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2551.146019][ T1671] RSP: 002b:00007f8c2e9e2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2551.154450][ T1671] RAX: ffffffffffffffda RBX: 00007f8c2de15fa0 RCX: 00007f8c2db9cdd9 [ 2551.162436][ T1671] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 2551.170512][ T1671] RBP: 00007f8c2e9e2090 R08: 0000000000000000 R09: 0000000000000000 [ 2551.178590][ T1671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2551.186572][ T1671] R13: 00007f8c2de16038 R14: 00007f8c2de15fa0 R15: 00007ffcc495de88 [ 2551.194573][ T1671] [ 2551.368262][ T1680] netlink: 14548 bytes leftover after parsing attributes in process `syz.1.8171'. [ 2553.945303][ T1701] netlink: 195032 bytes leftover after parsing attributes in process `syz.7.8170'. [ 2554.343116][ T1689] device veth0_vlan left promiscuous mode [ 2554.402561][ T1689] device veth0_vlan entered promiscuous mode [ 2554.712086][ T1706] netlink: 14 bytes leftover after parsing attributes in process `syz.8.8177'. [ 2554.982946][ T1718] FAULT_INJECTION: forcing a failure. [ 2554.982946][ T1718] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2555.009556][ T1718] CPU: 1 PID: 1718 Comm: syz.6.8182 Not tainted syzkaller #0 [ 2555.017016][ T1718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2555.027203][ T1718] Call Trace: [ 2555.030525][ T1718] [ 2555.033493][ T1718] dump_stack_lvl+0x188/0x24e [ 2555.038228][ T1718] ? show_regs_print_info+0x12/0x12 [ 2555.043485][ T1718] ? load_image+0x400/0x400 [ 2555.048037][ T1718] ? __lock_acquire+0x7d10/0x7d10 [ 2555.053113][ T1718] should_fail_ex+0x399/0x4d0 [ 2555.057838][ T1718] _copy_from_user+0x2c/0x170 [ 2555.062564][ T1718] __sys_bpf+0x2ea/0x780 [ 2555.066948][ T1718] ? bpf_link_show_fdinfo+0x380/0x380 [ 2555.072385][ T1718] ? lock_chain_count+0x20/0x20 [ 2555.077297][ T1718] __x64_sys_bpf+0x78/0x90 [ 2555.081759][ T1718] do_syscall_64+0x4c/0xa0 [ 2555.086225][ T1718] ? clear_bhb_loop+0x60/0xb0 [ 2555.090976][ T1718] ? clear_bhb_loop+0x60/0xb0 [ 2555.095710][ T1718] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2555.101738][ T1718] RIP: 0033:0x7f724c19cdd9 [ 2555.106204][ T1718] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2555.125868][ T1718] RSP: 002b:00007f724d0ef028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2555.134436][ T1718] RAX: ffffffffffffffda RBX: 00007f724c415fa0 RCX: 00007f724c19cdd9 [ 2555.142458][ T1718] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 2555.150469][ T1718] RBP: 00007f724d0ef090 R08: 0000000000000000 R09: 0000000000000000 [ 2555.158481][ T1718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2555.166487][ T1718] R13: 00007f724c416038 R14: 00007f724c415fa0 R15: 00007fffe1eb7298 [ 2555.174527][ T1718] [ 2555.479365][ T1706] device team_slave_0 left promiscuous mode [ 2555.533511][ T1706] team0: Port device team_slave_0 removed [ 2555.617904][ T1716] device veth0_vlan left promiscuous mode [ 2555.625360][ T1728] FAULT_INJECTION: forcing a failure. [ 2555.625360][ T1728] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2555.625394][ T1728] CPU: 0 PID: 1728 Comm: syz.1.8184 Not tainted syzkaller #0 [ 2555.625415][ T1728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2555.625427][ T1728] Call Trace: [ 2555.625435][ T1728] [ 2555.625445][ T1728] dump_stack_lvl+0x188/0x24e [ 2555.625484][ T1728] ? show_regs_print_info+0x12/0x12 [ 2555.625514][ T1728] ? load_image+0x400/0x400 [ 2555.625542][ T1728] ? __lock_acquire+0x7d10/0x7d10 [ 2555.681848][ T1728] should_fail_ex+0x399/0x4d0 [ 2555.686557][ T1728] _copy_from_user+0x2c/0x170 [ 2555.691255][ T1728] ___sys_sendmsg+0x1c3/0x360 [ 2555.695977][ T1728] ? __sys_sendmsg+0x290/0x290 [ 2555.700783][ T1728] ? __lock_acquire+0x7d10/0x7d10 [ 2555.705849][ T1728] __se_sys_sendmsg+0x1bb/0x2a0 [ 2555.710814][ T1728] ? __x64_sys_sendmsg+0x80/0x80 [ 2555.715786][ T1728] ? lockdep_hardirqs_on+0x94/0x140 [ 2555.720996][ T1728] do_syscall_64+0x4c/0xa0 [ 2555.725429][ T1728] ? clear_bhb_loop+0x60/0xb0 [ 2555.730119][ T1728] ? clear_bhb_loop+0x60/0xb0 [ 2555.734912][ T1728] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2555.740852][ T1728] RIP: 0033:0x7f05d019cdd9 [ 2555.745294][ T1728] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2555.764920][ T1728] RSP: 002b:00007f05ce3f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2555.773362][ T1728] RAX: ffffffffffffffda RBX: 00007f05d0415fa0 RCX: 00007f05d019cdd9 [ 2555.781344][ T1728] RDX: 0000000020040080 RSI: 0000200000000000 RDI: 0000000000000003 [ 2555.789369][ T1728] RBP: 00007f05ce3f6090 R08: 0000000000000000 R09: 0000000000000000 [ 2555.797353][ T1728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2555.805338][ T1728] R13: 00007f05d0416038 R14: 00007f05d0415fa0 R15: 00007ffffc46d268 [ 2555.813338][ T1728] [ 2556.034063][ T1716] device veth0_vlan entered promiscuous mode [ 2556.321865][ T1733] netlink: 'syz.8.8187': attribute type 3 has an invalid length. [ 2556.435789][ T1737] FAULT_INJECTION: forcing a failure. [ 2556.435789][ T1737] name failslab, interval 1, probability 0, space 0, times 0 [ 2556.443326][ T1733] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.8187'. [ 2556.584945][ T1737] CPU: 0 PID: 1737 Comm: syz.8.8187 Not tainted syzkaller #0 [ 2556.592419][ T1737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2556.602517][ T1737] Call Trace: [ 2556.605830][ T1737] [ 2556.608795][ T1737] dump_stack_lvl+0x188/0x24e [ 2556.613525][ T1737] ? show_regs_print_info+0x12/0x12 [ 2556.618937][ T1737] ? load_image+0x400/0x400 [ 2556.623484][ T1737] ? __lock_acquire+0x12f4/0x7d10 [ 2556.628564][ T1737] ? verify_lock_unused+0x140/0x140 [ 2556.633811][ T1737] should_fail_ex+0x399/0x4d0 [ 2556.638532][ T1737] should_failslab+0x5/0x20 [ 2556.643066][ T1737] slab_pre_alloc_hook+0x59/0x310 [ 2556.648147][ T1737] kmem_cache_alloc_node+0x5a/0x320 [ 2556.653473][ T1737] ? __alloc_skb+0xfc/0x7e0 [ 2556.658058][ T1737] __alloc_skb+0xfc/0x7e0 [ 2556.662441][ T1737] ? ima_match_policy+0x107/0x2120 [ 2556.667672][ T1737] tipc_msg_create+0x4b/0x4d0 [ 2556.672454][ T1737] ? tipc_own_addr+0x45/0x2a0 [ 2556.677222][ T1737] tipc_group_proto_xmit+0xcd/0x870 [ 2556.682473][ T1737] tipc_group_cong+0x4d5/0x5d0 [ 2556.687290][ T1737] ? tipc_group_update_bc_members+0x500/0x500 [ 2556.693426][ T1737] ? net_generic+0x1e/0x240 [ 2556.698031][ T1737] ? net_generic+0x1e/0x240 [ 2556.702582][ T1737] tipc_group_bc_cong+0x14e/0x210 [ 2556.707652][ T1737] tipc_send_group_bcast+0x36b/0xad0 [ 2556.712998][ T1737] ? tipc_wait_for_connect+0x640/0x640 [ 2556.718599][ T1737] ? verify_lock_unused+0x140/0x140 [ 2556.723846][ T1737] ? tomoyo_check_open_permission+0x1bf/0x440 [ 2556.729961][ T1737] ? wait_woken+0x1c0/0x1c0 [ 2556.734518][ T1737] ? mark_lock+0x94/0x320 [ 2556.738898][ T1737] __tipc_sendmsg+0x332/0x2c90 [ 2556.743738][ T1737] ? rht_lock+0x150/0x150 [ 2556.748121][ T1737] ? verify_lock_unused+0x140/0x140 [ 2556.753382][ T1737] ? verify_lock_unused+0x140/0x140 [ 2556.758670][ T1737] ? mark_lock+0x94/0x320 [ 2556.763053][ T1737] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2556.769104][ T1737] ? __local_bh_enable_ip+0x136/0x1c0 [ 2556.774610][ T1737] ? lockdep_hardirqs_on+0x94/0x140 [ 2556.779850][ T1737] ? __local_bh_enable_ip+0x136/0x1c0 [ 2556.785325][ T1737] ? _local_bh_enable+0xa0/0xa0 [ 2556.790232][ T1737] tipc_sendmsg+0x51/0x70 [ 2556.794714][ T1737] sock_write_iter+0x2d9/0x3e0 [ 2556.799527][ T1737] ? sock_read_iter+0x3a0/0x3a0 [ 2556.804432][ T1737] ? common_file_perm+0x171/0x1c0 [ 2556.809509][ T1737] vfs_write+0x4b1/0xa30 [ 2556.813810][ T1737] ? file_end_write+0x250/0x250 [ 2556.818735][ T1737] ? __fget_files+0x43d/0x4b0 [ 2556.823481][ T1737] ? __fdget_pos+0x1d4/0x360 [ 2556.828125][ T1737] ? ksys_write+0x71/0x250 [ 2556.832586][ T1737] ksys_write+0x14c/0x250 [ 2556.837051][ T1737] ? __ia32_sys_read+0x80/0x80 [ 2556.841869][ T1737] ? lockdep_hardirqs_on+0x94/0x140 [ 2556.847285][ T1737] do_syscall_64+0x4c/0xa0 [ 2556.851744][ T1737] ? clear_bhb_loop+0x60/0xb0 [ 2556.856459][ T1737] ? clear_bhb_loop+0x60/0xb0 [ 2556.861186][ T1737] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2556.867122][ T1737] RIP: 0033:0x7f8c2db9cdd9 [ 2556.871572][ T1737] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2556.891311][ T1737] RSP: 002b:00007f8c2e9a0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2556.899772][ T1737] RAX: ffffffffffffffda RBX: 00007f8c2de16180 RCX: 00007f8c2db9cdd9 [ 2556.907788][ T1737] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000004 [ 2556.915883][ T1737] RBP: 00007f8c2e9a0090 R08: 0000000000000000 R09: 0000000000000000 [ 2556.923888][ T1737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2556.931907][ T1737] R13: 00007f8c2de16218 R14: 00007f8c2de16180 R15: 00007ffcc495de88 [ 2556.939930][ T1737] [ 2557.108972][ T1745] netlink: 'syz.5.8192': attribute type 3 has an invalid length. [ 2557.139305][ T1745] netlink: 105116 bytes leftover after parsing attributes in process `syz.5.8192'. [ 2557.230700][ T1747] netlink: 195032 bytes leftover after parsing attributes in process `syz.6.8191'. [ 2557.334049][ T1751] netlink: 'syz.7.8193': attribute type 3 has an invalid length. [ 2557.403941][ T1751] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8193'. [ 2559.692291][ T1760] FAULT_INJECTION: forcing a failure. [ 2559.692291][ T1760] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2559.713947][ T1760] CPU: 1 PID: 1760 Comm: syz.5.8196 Not tainted syzkaller #0 [ 2559.721397][ T1760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2559.731587][ T1760] Call Trace: [ 2559.734932][ T1760] [ 2559.737902][ T1760] dump_stack_lvl+0x188/0x24e [ 2559.742629][ T1760] ? show_regs_print_info+0x12/0x12 [ 2559.747876][ T1760] ? load_image+0x400/0x400 [ 2559.752425][ T1760] ? __lock_acquire+0x7d10/0x7d10 [ 2559.757507][ T1760] should_fail_ex+0x399/0x4d0 [ 2559.762241][ T1760] _copy_from_user+0x2c/0x170 [ 2559.766990][ T1760] __sys_bpf+0x2ea/0x780 [ 2559.771284][ T1760] ? bpf_link_show_fdinfo+0x380/0x380 [ 2559.776737][ T1760] ? lock_chain_count+0x20/0x20 [ 2559.781673][ T1760] __x64_sys_bpf+0x78/0x90 [ 2559.786130][ T1760] do_syscall_64+0x4c/0xa0 [ 2559.790588][ T1760] ? clear_bhb_loop+0x60/0xb0 [ 2559.795299][ T1760] ? clear_bhb_loop+0x60/0xb0 [ 2559.800019][ T1760] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2559.805952][ T1760] RIP: 0033:0x7fa8d9b9cdd9 [ 2559.810398][ T1760] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2559.830057][ T1760] RSP: 002b:00007fa8da9d0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2559.838534][ T1760] RAX: ffffffffffffffda RBX: 00007fa8d9e15fa0 RCX: 00007fa8d9b9cdd9 [ 2559.846627][ T1760] RDX: 0000000000000020 RSI: 0000200000000100 RDI: 0000000000000002 [ 2559.854628][ T1760] RBP: 00007fa8da9d0090 R08: 0000000000000000 R09: 0000000000000000 [ 2559.862627][ T1760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2559.870626][ T1760] R13: 00007fa8d9e16038 R14: 00007fa8d9e15fa0 R15: 00007ffe7b880bf8 [ 2559.878645][ T1760] [ 2560.540506][ T1774] device veth0_vlan left promiscuous mode [ 2560.636220][ T1774] device veth0_vlan entered promiscuous mode [ 2560.863185][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2560.872491][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2560.921979][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2560.947485][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2561.044260][ T1791] FAULT_INJECTION: forcing a failure. [ 2561.044260][ T1791] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2561.093112][ T1791] CPU: 0 PID: 1791 Comm: syz.5.8205 Not tainted syzkaller #0 [ 2561.100582][ T1791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2561.110696][ T1791] Call Trace: [ 2561.114010][ T1791] [ 2561.116979][ T1791] dump_stack_lvl+0x188/0x24e [ 2561.121712][ T1791] ? show_regs_print_info+0x12/0x12 [ 2561.126960][ T1791] ? load_image+0x400/0x400 [ 2561.131515][ T1791] ? __lock_acquire+0x7d10/0x7d10 [ 2561.136592][ T1791] should_fail_ex+0x399/0x4d0 [ 2561.141317][ T1791] _copy_from_user+0x2c/0x170 [ 2561.146046][ T1791] ___sys_sendmsg+0x1c3/0x360 [ 2561.150865][ T1791] ? __sys_sendmsg+0x290/0x290 [ 2561.155703][ T1791] ? __lock_acquire+0x7d10/0x7d10 [ 2561.160778][ T1791] __se_sys_sendmsg+0x1bb/0x2a0 [ 2561.165678][ T1791] ? __x64_sys_sendmsg+0x80/0x80 [ 2561.170684][ T1791] ? lockdep_hardirqs_on+0x94/0x140 [ 2561.175936][ T1791] do_syscall_64+0x4c/0xa0 [ 2561.180402][ T1791] ? clear_bhb_loop+0x60/0xb0 [ 2561.185222][ T1791] ? clear_bhb_loop+0x60/0xb0 [ 2561.189948][ T1791] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2561.195883][ T1791] RIP: 0033:0x7fa8d9b9cdd9 [ 2561.200342][ T1791] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2561.219997][ T1791] RSP: 002b:00007fa8da9d0028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2561.228469][ T1791] RAX: ffffffffffffffda RBX: 00007fa8d9e15fa0 RCX: 00007fa8d9b9cdd9 [ 2561.236522][ T1791] RDX: 000000000000fffe RSI: 0000200000007940 RDI: 0000000000000003 [ 2561.244542][ T1791] RBP: 00007fa8da9d0090 R08: 0000000000000000 R09: 0000000000000000 [ 2561.252673][ T1791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2561.260689][ T1791] R13: 00007fa8d9e16038 R14: 00007fa8d9e15fa0 R15: 00007ffe7b880bf8 [ 2561.268722][ T1791] [ 2561.288779][ T1787] device veth0_vlan left promiscuous mode [ 2561.467492][ T1787] device veth0_vlan entered promiscuous mode [ 2561.587069][ T1801] FAULT_INJECTION: forcing a failure. [ 2561.587069][ T1801] name failslab, interval 1, probability 0, space 0, times 0 [ 2561.612084][ T1801] CPU: 0 PID: 1801 Comm: syz.7.8208 Not tainted syzkaller #0 [ 2561.619529][ T1801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2561.629621][ T1801] Call Trace: [ 2561.632931][ T1801] [ 2561.635889][ T1801] dump_stack_lvl+0x188/0x24e [ 2561.640642][ T1801] ? show_regs_print_info+0x12/0x12 [ 2561.645884][ T1801] ? load_image+0x400/0x400 [ 2561.650432][ T1801] ? __might_sleep+0xd0/0xd0 [ 2561.655070][ T1801] ? __lock_acquire+0x7d10/0x7d10 [ 2561.660137][ T1801] should_fail_ex+0x399/0x4d0 [ 2561.664908][ T1801] should_failslab+0x5/0x20 [ 2561.669443][ T1801] slab_pre_alloc_hook+0x59/0x310 [ 2561.674510][ T1801] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 2561.680273][ T1801] __kmem_cache_alloc_node+0x4f/0x260 [ 2561.685790][ T1801] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 2561.691554][ T1801] __kmalloc+0xa0/0x240 [ 2561.695760][ T1801] tomoyo_realpath_from_path+0xdf/0x5d0 [ 2561.701359][ T1801] ? tomoyo_path_number_perm+0x205/0x650 [ 2561.707038][ T1801] tomoyo_path_number_perm+0x22f/0x650 [ 2561.712549][ T1801] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 2561.718057][ T1801] ? ktime_get+0x7b/0x270 [ 2561.722583][ T1801] ? ktime_get+0x7b/0x270 [ 2561.726958][ T1801] ? perf_trace_preemptirq_template+0xa8/0x320 [ 2561.733250][ T1801] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2561.739292][ T1801] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2561.745603][ T1801] security_file_ioctl+0x6c/0xa0 [ 2561.750603][ T1801] __se_sys_ioctl+0x48/0x170 [ 2561.755252][ T1801] do_syscall_64+0x4c/0xa0 [ 2561.759748][ T1801] ? clear_bhb_loop+0x60/0xb0 [ 2561.764466][ T1801] ? clear_bhb_loop+0x60/0xb0 [ 2561.769199][ T1801] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2561.775305][ T1801] RIP: 0033:0x7fb81719cdd9 [ 2561.779757][ T1801] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2561.799403][ T1801] RSP: 002b:00007fb81809c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2561.807853][ T1801] RAX: ffffffffffffffda RBX: 00007fb817415fa0 RCX: 00007fb81719cdd9 [ 2561.815863][ T1801] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000011 [ 2561.823863][ T1801] RBP: 00007fb81809c090 R08: 0000000000000000 R09: 0000000000000000 [ 2561.831864][ T1801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2561.839870][ T1801] R13: 00007fb817416038 R14: 00007fb817415fa0 R15: 00007ffdd44e48d8 [ 2561.847897][ T1801] [ 2561.880569][ T1801] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2562.601452][ T1816] netlink: 195032 bytes leftover after parsing attributes in process `syz.8.8211'. [ 2565.236924][ T1824] device veth0_vlan left promiscuous mode [ 2565.620051][ T1824] device veth0_vlan entered promiscuous mode [ 2565.730860][ T1838] FAULT_INJECTION: forcing a failure. [ 2565.730860][ T1838] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2565.783265][ T1838] CPU: 0 PID: 1838 Comm: syz.1.8218 Not tainted syzkaller #0 [ 2565.790732][ T1838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2565.800817][ T1838] Call Trace: [ 2565.804128][ T1838] [ 2565.807093][ T1838] dump_stack_lvl+0x188/0x24e [ 2565.811904][ T1838] ? show_regs_print_info+0x12/0x12 [ 2565.817145][ T1838] ? load_image+0x400/0x400 [ 2565.821697][ T1838] ? __lock_acquire+0x7d10/0x7d10 [ 2565.826766][ T1838] ? snprintf+0xe5/0x140 [ 2565.831049][ T1838] should_fail_ex+0x399/0x4d0 [ 2565.835772][ T1838] _copy_to_user+0x2c/0x130 [ 2565.840316][ T1838] simple_read_from_buffer+0xe3/0x150 [ 2565.845742][ T1838] proc_fail_nth_read+0x1a6/0x220 [ 2565.850814][ T1838] ? proc_fault_inject_write+0x310/0x310 [ 2565.856664][ T1838] ? fsnotify_perm+0x248/0x550 [ 2565.861487][ T1838] ? proc_fault_inject_write+0x310/0x310 [ 2565.867158][ T1838] vfs_read+0x2de/0xa00 [ 2565.871376][ T1838] ? kernel_read+0x1e0/0x1e0 [ 2565.876019][ T1838] ? __fget_files+0x28/0x4b0 [ 2565.880655][ T1838] ? __fget_files+0x28/0x4b0 [ 2565.885290][ T1838] ? __fget_files+0x43d/0x4b0 [ 2565.890035][ T1838] ? __fdget_pos+0x2ae/0x360 [ 2565.894678][ T1838] ? ksys_read+0x71/0x250 [ 2565.899055][ T1838] ksys_read+0x14c/0x250 [ 2565.903365][ T1838] ? vfs_write+0xa30/0xa30 [ 2565.907830][ T1838] ? lockdep_hardirqs_on+0x94/0x140 [ 2565.913068][ T1838] do_syscall_64+0x4c/0xa0 [ 2565.917531][ T1838] ? clear_bhb_loop+0x60/0xb0 [ 2565.922245][ T1838] ? clear_bhb_loop+0x60/0xb0 [ 2565.926975][ T1838] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2565.932917][ T1838] RIP: 0033:0x7f05d015d60e [ 2565.937370][ T1838] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2565.957206][ T1838] RSP: 002b:00007f05ce3d4fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2565.965679][ T1838] RAX: ffffffffffffffda RBX: 00007f05ce3d56c0 RCX: 00007f05d015d60e [ 2565.973695][ T1838] RDX: 000000000000000f RSI: 00007f05ce3d50a0 RDI: 000000000000000c [ 2565.981706][ T1838] RBP: 00007f05ce3d5090 R08: 0000000000000000 R09: 0000000000000000 [ 2565.989715][ T1838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2565.997730][ T1838] R13: 00007f05d0416128 R14: 00007f05d0416090 R15: 00007ffffc46d268 [ 2566.005765][ T1838] [ 2566.185168][ T1834] netlink: 'syz.7.8217': attribute type 1 has an invalid length. [ 2566.204116][ T1834] netlink: 'syz.7.8217': attribute type 4 has an invalid length. [ 2566.211944][ T1834] netlink: 9462 bytes leftover after parsing attributes in process `syz.7.8217'. [ 2566.566446][ T1850] device veth0_vlan left promiscuous mode [ 2566.642222][ T1856] FAULT_INJECTION: forcing a failure. [ 2566.642222][ T1856] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2566.698297][ T1856] CPU: 1 PID: 1856 Comm: syz.1.8222 Not tainted syzkaller #0 [ 2566.705764][ T1856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2566.715858][ T1856] Call Trace: [ 2566.719175][ T1856] [ 2566.722158][ T1856] dump_stack_lvl+0x188/0x24e [ 2566.726889][ T1856] ? show_regs_print_info+0x12/0x12 [ 2566.732171][ T1856] ? load_image+0x400/0x400 [ 2566.736721][ T1856] ? __lock_acquire+0x7d10/0x7d10 [ 2566.741797][ T1856] should_fail_ex+0x399/0x4d0 [ 2566.746524][ T1856] _copy_from_user+0x2c/0x170 [ 2566.751242][ T1856] __sys_bpf+0x2ea/0x780 [ 2566.755538][ T1856] ? bpf_link_show_fdinfo+0x380/0x380 [ 2566.760976][ T1856] ? lock_chain_count+0x20/0x20 [ 2566.765880][ T1856] __x64_sys_bpf+0x78/0x90 [ 2566.770337][ T1856] do_syscall_64+0x4c/0xa0 [ 2566.774797][ T1856] ? clear_bhb_loop+0x60/0xb0 [ 2566.779506][ T1856] ? clear_bhb_loop+0x60/0xb0 [ 2566.784263][ T1856] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2566.790189][ T1856] RIP: 0033:0x7f05d019cdd9 [ 2566.794640][ T1856] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2566.814384][ T1856] RSP: 002b:00007f05ce3f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2566.822852][ T1856] RAX: ffffffffffffffda RBX: 00007f05d0415fa0 RCX: 00007f05d019cdd9 [ 2566.822890][ T1850] device veth0_vlan entered promiscuous mode [ 2566.830842][ T1856] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 2566.830863][ T1856] RBP: 00007f05ce3f6090 R08: 0000000000000000 R09: 0000000000000000 [ 2566.830877][ T1856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2566.830890][ T1856] R13: 00007f05d0416038 R14: 00007f05d0415fa0 R15: 00007ffffc46d268 [ 2566.830923][ T1856] [ 2567.402680][ T1864] netlink: 'syz.7.8223': attribute type 4 has an invalid length. [ 2567.459409][ T1865] device veth0_vlan left promiscuous mode [ 2567.601343][ T1865] device veth0_vlan entered promiscuous mode [ 2567.961112][ T1304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2567.975779][ T1304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2567.984301][ T1304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2568.258367][ T1874] device veth0_vlan left promiscuous mode [ 2568.922579][ T1874] device veth0_vlan entered promiscuous mode [ 2571.021272][ T1889] device veth0_vlan left promiscuous mode [ 2571.035314][ T1889] device veth0_vlan entered promiscuous mode [ 2571.063872][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2571.152583][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2571.179962][ T57] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2571.512850][ T1908] FAULT_INJECTION: forcing a failure. [ 2571.512850][ T1908] name failslab, interval 1, probability 0, space 0, times 0 [ 2571.536166][ T1908] CPU: 0 PID: 1908 Comm: syz.5.8234 Not tainted syzkaller #0 [ 2571.543619][ T1908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2571.553707][ T1908] Call Trace: [ 2571.557013][ T1908] [ 2571.559968][ T1908] dump_stack_lvl+0x188/0x24e [ 2571.564779][ T1908] ? show_regs_print_info+0x12/0x12 [ 2571.570014][ T1908] ? load_image+0x400/0x400 [ 2571.574556][ T1908] ? __might_sleep+0xd0/0xd0 [ 2571.579274][ T1908] ? __lock_acquire+0x7d10/0x7d10 [ 2571.584347][ T1908] should_fail_ex+0x399/0x4d0 [ 2571.589057][ T1908] should_failslab+0x5/0x20 [ 2571.593586][ T1908] slab_pre_alloc_hook+0x59/0x310 [ 2571.598638][ T1908] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2571.604827][ T1908] kmem_cache_alloc_node+0x5a/0x320 [ 2571.610233][ T1908] ? __alloc_skb+0xfc/0x7e0 [ 2571.614782][ T1908] __alloc_skb+0xfc/0x7e0 [ 2571.619154][ T1908] tipc_buf_acquire+0x27/0xd0 [ 2571.623868][ T1908] tipc_msg_build+0x4fa/0xde0 [ 2571.628602][ T1908] tipc_send_group_bcast+0x7d4/0xad0 [ 2571.633940][ T1908] ? tipc_wait_for_connect+0x640/0x640 [ 2571.639443][ T1908] ? perf_trace_run_bpf_submit+0x1c0/0x1c0 [ 2571.645287][ T1908] ? wait_woken+0x1c0/0x1c0 [ 2571.649936][ T1908] __tipc_sendmsg+0x332/0x2c90 [ 2571.654837][ T1908] ? rht_lock+0x150/0x150 [ 2571.659204][ T1908] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 2571.664965][ T1908] ? perf_trace_preemptirq_template+0x268/0x320 [ 2571.671267][ T1908] ? mark_lock+0x94/0x320 [ 2571.675634][ T1908] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2571.681651][ T1908] ? lock_chain_count+0x20/0x20 [ 2571.686556][ T1908] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2571.692763][ T1908] ? lockdep_hardirqs_on+0x94/0x140 [ 2571.698012][ T1908] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2571.704213][ T1908] ? __local_bh_enable_ip+0x13e/0x1c0 [ 2571.709615][ T1908] ? _local_bh_enable+0xa0/0xa0 [ 2571.714505][ T1908] tipc_sendmsg+0x51/0x70 [ 2571.718880][ T1908] sock_write_iter+0x2d9/0x3e0 [ 2571.723673][ T1908] ? sock_read_iter+0x3a0/0x3a0 [ 2571.728546][ T1908] ? lockdep_hardirqs_on+0x94/0x140 [ 2571.733786][ T1908] ? __get_task_ioprio+0xa2/0x250 [ 2571.738930][ T1908] ? __get_task_ioprio+0x102/0x250 [ 2571.744098][ T1908] vfs_write+0x4b1/0xa30 [ 2571.748486][ T1908] ? file_end_write+0x250/0x250 [ 2571.753399][ T1908] ? __fget_files+0x43d/0x4b0 [ 2571.758126][ T1908] ? __fdget_pos+0x1d4/0x360 [ 2571.762770][ T1908] ? ksys_write+0x71/0x250 [ 2571.767581][ T1908] ksys_write+0x14c/0x250 [ 2571.771947][ T1908] ? __ia32_sys_read+0x80/0x80 [ 2571.776747][ T1908] ? lockdep_hardirqs_on+0x94/0x140 [ 2571.781982][ T1908] do_syscall_64+0x4c/0xa0 [ 2571.786440][ T1908] ? clear_bhb_loop+0x60/0xb0 [ 2571.791152][ T1908] ? clear_bhb_loop+0x60/0xb0 [ 2571.795881][ T1908] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2571.801822][ T1908] RIP: 0033:0x7fa8d9b9cdd9 [ 2571.806274][ T1908] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2571.826140][ T1908] RSP: 002b:00007fa8da9d0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2571.834673][ T1908] RAX: ffffffffffffffda RBX: 00007fa8d9e15fa0 RCX: 00007fa8d9b9cdd9 [ 2571.842672][ T1908] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000004 [ 2571.850849][ T1908] RBP: 00007fa8da9d0090 R08: 0000000000000000 R09: 0000000000000000 [ 2571.858852][ T1908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2571.866849][ T1908] R13: 00007fa8d9e16038 R14: 00007fa8d9e15fa0 R15: 00007ffe7b880bf8 [ 2571.875210][ T1908] [ 2571.917901][ T1919] netlink: 'syz.7.8239': attribute type 3 has an invalid length. [ 2571.977977][ T1919] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8239'. [ 2573.810423][ T1951] FAULT_INJECTION: forcing a failure. [ 2573.810423][ T1951] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2573.905413][ T1951] CPU: 1 PID: 1951 Comm: syz.1.8240 Not tainted syzkaller #0 [ 2573.912882][ T1951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2573.923061][ T1951] Call Trace: [ 2573.926424][ T1951] [ 2573.929427][ T1951] dump_stack_lvl+0x188/0x24e [ 2573.934157][ T1951] ? show_regs_print_info+0x12/0x12 [ 2573.939413][ T1951] ? load_image+0x400/0x400 [ 2573.943980][ T1951] ? __lock_acquire+0x7d10/0x7d10 [ 2573.949102][ T1951] ? snprintf+0xe5/0x140 [ 2573.953398][ T1951] should_fail_ex+0x399/0x4d0 [ 2573.958109][ T1951] _copy_to_user+0x2c/0x130 [ 2573.962641][ T1951] simple_read_from_buffer+0xe3/0x150 [ 2573.968098][ T1951] proc_fail_nth_read+0x1a6/0x220 [ 2573.973198][ T1951] ? proc_fault_inject_write+0x310/0x310 [ 2573.979434][ T1951] ? fsnotify_perm+0x248/0x550 [ 2573.984347][ T1951] ? proc_fault_inject_write+0x310/0x310 [ 2573.990116][ T1951] vfs_read+0x2de/0xa00 [ 2573.994335][ T1951] ? kernel_read+0x1e0/0x1e0 [ 2573.998981][ T1951] ? __fget_files+0x28/0x4b0 [ 2574.003634][ T1951] ? __fget_files+0x28/0x4b0 [ 2574.008254][ T1951] ? __fget_files+0x43d/0x4b0 [ 2574.012977][ T1951] ? __fdget_pos+0x2ae/0x360 [ 2574.017595][ T1951] ? ksys_read+0x71/0x250 [ 2574.022041][ T1951] ksys_read+0x14c/0x250 [ 2574.026342][ T1951] ? vfs_write+0xa30/0xa30 [ 2574.030808][ T1951] ? lockdep_hardirqs_on+0x94/0x140 [ 2574.036045][ T1951] do_syscall_64+0x4c/0xa0 [ 2574.040500][ T1951] ? clear_bhb_loop+0x60/0xb0 [ 2574.045213][ T1951] ? clear_bhb_loop+0x60/0xb0 [ 2574.049928][ T1951] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2574.055869][ T1951] RIP: 0033:0x7f05d015d60e [ 2574.060319][ T1951] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2574.079970][ T1951] RSP: 002b:00007f05ce3b3fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2574.088426][ T1951] RAX: ffffffffffffffda RBX: 00007f05ce3b46c0 RCX: 00007f05d015d60e [ 2574.096439][ T1951] RDX: 000000000000000f RSI: 00007f05ce3b40a0 RDI: 000000000000000d [ 2574.104454][ T1951] RBP: 00007f05ce3b4090 R08: 0000000000000000 R09: 0000000000000000 [ 2574.112483][ T1951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2574.120586][ T1951] R13: 00007f05d0416218 R14: 00007f05d0416180 R15: 00007ffffc46d268 [ 2574.128601][ T1951] [ 2575.864263][ T1956] device veth0_vlan left promiscuous mode [ 2575.928984][ T1956] device veth0_vlan entered promiscuous mode [ 2576.100077][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2576.143694][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2576.151867][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2576.177557][ T1970] FAULT_INJECTION: forcing a failure. [ 2576.177557][ T1970] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2576.199999][ T1970] CPU: 0 PID: 1970 Comm: syz.5.8252 Not tainted syzkaller #0 [ 2576.207446][ T1970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2576.217540][ T1970] Call Trace: [ 2576.220852][ T1970] [ 2576.223819][ T1970] dump_stack_lvl+0x188/0x24e [ 2576.228632][ T1970] ? show_regs_print_info+0x12/0x12 [ 2576.233870][ T1970] ? load_image+0x400/0x400 [ 2576.238440][ T1970] ? __lock_acquire+0x7d10/0x7d10 [ 2576.243605][ T1970] should_fail_ex+0x399/0x4d0 [ 2576.248327][ T1970] _copy_from_user+0x2c/0x170 [ 2576.253045][ T1970] __sys_bpf+0x2ea/0x780 [ 2576.257326][ T1970] ? bpf_link_show_fdinfo+0x380/0x380 [ 2576.262729][ T1970] ? lock_chain_count+0x20/0x20 [ 2576.267608][ T1970] __x64_sys_bpf+0x78/0x90 [ 2576.272040][ T1970] do_syscall_64+0x4c/0xa0 [ 2576.276566][ T1970] ? clear_bhb_loop+0x60/0xb0 [ 2576.281262][ T1970] ? clear_bhb_loop+0x60/0xb0 [ 2576.285958][ T1970] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2576.291957][ T1970] RIP: 0033:0x7fa8d9b9cdd9 [ 2576.296388][ T1970] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2576.316150][ T1970] RSP: 002b:00007fa8da9d0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2576.324585][ T1970] RAX: ffffffffffffffda RBX: 00007fa8d9e15fa0 RCX: 00007fa8d9b9cdd9 [ 2576.332571][ T1970] RDX: 0000000000000020 RSI: 0000200000000180 RDI: 0000000000000002 [ 2576.340575][ T1970] RBP: 00007fa8da9d0090 R08: 0000000000000000 R09: 0000000000000000 [ 2576.348590][ T1970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2576.356582][ T1970] R13: 00007fa8d9e16038 R14: 00007fa8d9e15fa0 R15: 00007ffe7b880bf8 [ 2576.364585][ T1970] [ 2576.435682][ T1968] device veth0_vlan left promiscuous mode [ 2576.511637][ T1968] device veth0_vlan entered promiscuous mode [ 2576.749201][ T1316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2576.772780][ T1316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2576.863544][ T1316] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2580.602035][ T1999] FAULT_INJECTION: forcing a failure. [ 2580.602035][ T1999] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2580.641187][ T1999] CPU: 1 PID: 1999 Comm: syz.8.8261 Not tainted syzkaller #0 [ 2580.648658][ T1999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2580.658752][ T1999] Call Trace: [ 2580.662062][ T1999] [ 2580.665031][ T1999] dump_stack_lvl+0x188/0x24e [ 2580.669763][ T1999] ? show_regs_print_info+0x12/0x12 [ 2580.675015][ T1999] ? load_image+0x400/0x400 [ 2580.679551][ T1999] ? __lock_acquire+0x7d10/0x7d10 [ 2580.684590][ T1999] should_fail_ex+0x399/0x4d0 [ 2580.689304][ T1999] _copy_from_user+0x2c/0x170 [ 2580.694044][ T1999] __sys_bpf+0x2ea/0x780 [ 2580.698349][ T1999] ? bpf_link_show_fdinfo+0x380/0x380 [ 2580.703869][ T1999] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2580.710089][ T1999] __x64_sys_bpf+0x78/0x90 [ 2580.714557][ T1999] do_syscall_64+0x4c/0xa0 [ 2580.719058][ T1999] ? clear_bhb_loop+0x60/0xb0 [ 2580.723787][ T1999] ? clear_bhb_loop+0x60/0xb0 [ 2580.728601][ T1999] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2580.734547][ T1999] RIP: 0033:0x7f8c2db9cdd9 [ 2580.739100][ T1999] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2580.758842][ T1999] RSP: 002b:00007f8c2e9e2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2580.767312][ T1999] RAX: ffffffffffffffda RBX: 00007f8c2de15fa0 RCX: 00007f8c2db9cdd9 [ 2580.775334][ T1999] RDX: 0000000000000048 RSI: 0000200000000000 RDI: 0000000000000000 [ 2580.783353][ T1999] RBP: 00007f8c2e9e2090 R08: 0000000000000000 R09: 0000000000000000 [ 2580.791374][ T1999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2580.799478][ T1999] R13: 00007f8c2de16038 R14: 00007f8c2de15fa0 R15: 00007ffcc495de88 [ 2580.807508][ T1999] [ 2580.910398][ T2010] device veth0_vlan left promiscuous mode [ 2581.018132][ T2010] device veth0_vlan entered promiscuous mode [ 2581.331673][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2581.359102][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2581.368983][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2581.449576][ T2014] FAULT_INJECTION: forcing a failure. [ 2581.449576][ T2014] name failslab, interval 1, probability 0, space 0, times 0 [ 2581.484211][ T2014] CPU: 1 PID: 2014 Comm: syz.7.8267 Not tainted syzkaller #0 [ 2581.491681][ T2014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2581.501772][ T2014] Call Trace: [ 2581.505067][ T2014] [ 2581.508024][ T2014] dump_stack_lvl+0x188/0x24e [ 2581.512744][ T2014] ? show_regs_print_info+0x12/0x12 [ 2581.517964][ T2014] ? load_image+0x400/0x400 [ 2581.522498][ T2014] ? __might_sleep+0xd0/0xd0 [ 2581.527107][ T2014] ? __lock_acquire+0x7d10/0x7d10 [ 2581.532324][ T2014] should_fail_ex+0x399/0x4d0 [ 2581.537019][ T2014] should_failslab+0x5/0x20 [ 2581.541537][ T2014] slab_pre_alloc_hook+0x59/0x310 [ 2581.546583][ T2014] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 2581.552325][ T2014] __kmem_cache_alloc_node+0x4f/0x260 [ 2581.557718][ T2014] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 2581.563456][ T2014] __kmalloc+0xa0/0x240 [ 2581.567633][ T2014] tomoyo_realpath_from_path+0xdf/0x5d0 [ 2581.573293][ T2014] ? tomoyo_path_number_perm+0x205/0x650 [ 2581.578948][ T2014] tomoyo_path_number_perm+0x22f/0x650 [ 2581.584432][ T2014] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 2581.589961][ T2014] ? trace_call_bpf+0xbf/0x6b0 [ 2581.594910][ T2014] ? trace_call_bpf+0xbf/0x6b0 [ 2581.599730][ T2014] ? trace_call_bpf+0x5d6/0x6b0 [ 2581.604657][ T2014] ? __fget_files+0x28/0x4b0 [ 2581.609359][ T2014] ? __fget_files+0x28/0x4b0 [ 2581.613982][ T2014] security_file_ioctl+0x6c/0xa0 [ 2581.618949][ T2014] __se_sys_ioctl+0x48/0x170 [ 2581.623563][ T2014] do_syscall_64+0x4c/0xa0 [ 2581.628003][ T2014] ? clear_bhb_loop+0x60/0xb0 [ 2581.632707][ T2014] ? clear_bhb_loop+0x60/0xb0 [ 2581.637407][ T2014] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2581.643346][ T2014] RIP: 0033:0x7fb81719cdd9 [ 2581.647776][ T2014] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2581.667484][ T2014] RSP: 002b:00007fb81809c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2581.676026][ T2014] RAX: ffffffffffffffda RBX: 00007fb817415fa0 RCX: 00007fb81719cdd9 [ 2581.684036][ T2014] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 000000000000000b [ 2581.692043][ T2014] RBP: 00007fb81809c090 R08: 0000000000000000 R09: 0000000000000000 [ 2581.700066][ T2014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2581.708156][ T2014] R13: 00007fb817416038 R14: 00007fb817415fa0 R15: 00007ffdd44e48d8 [ 2581.716162][ T2014] [ 2581.793393][ T2014] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2582.101071][ T2029] device veth0_vlan left promiscuous mode [ 2582.245989][ T2028] FAULT_INJECTION: forcing a failure. [ 2582.245989][ T2028] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2582.292931][ T2028] CPU: 0 PID: 2028 Comm: syz.6.8280 Not tainted syzkaller #0 [ 2582.300389][ T2028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2582.310576][ T2028] Call Trace: [ 2582.313979][ T2028] [ 2582.317032][ T2028] dump_stack_lvl+0x188/0x24e [ 2582.321762][ T2028] ? show_regs_print_info+0x12/0x12 [ 2582.327011][ T2028] ? load_image+0x400/0x400 [ 2582.331564][ T2028] ? __lock_acquire+0x7d10/0x7d10 [ 2582.336635][ T2028] ? snprintf+0xe5/0x140 [ 2582.340923][ T2028] should_fail_ex+0x399/0x4d0 [ 2582.345644][ T2028] _copy_to_user+0x2c/0x130 [ 2582.350202][ T2028] simple_read_from_buffer+0xe3/0x150 [ 2582.355617][ T2028] proc_fail_nth_read+0x1a6/0x220 [ 2582.360684][ T2028] ? proc_fault_inject_write+0x310/0x310 [ 2582.366371][ T2028] ? fsnotify_perm+0x248/0x550 [ 2582.371179][ T2028] ? proc_fault_inject_write+0x310/0x310 [ 2582.376855][ T2028] vfs_read+0x2de/0xa00 [ 2582.381067][ T2028] ? kernel_read+0x1e0/0x1e0 [ 2582.385711][ T2028] ? __fget_files+0x28/0x4b0 [ 2582.390351][ T2028] ? __fget_files+0x28/0x4b0 [ 2582.394993][ T2028] ? __fget_files+0x43d/0x4b0 [ 2582.399720][ T2028] ? __fdget_pos+0x2ae/0x360 [ 2582.404347][ T2028] ? ksys_read+0x71/0x250 [ 2582.408728][ T2028] ksys_read+0x14c/0x250 [ 2582.413018][ T2028] ? vfs_write+0xa30/0xa30 [ 2582.417496][ T2028] ? syscall_enter_from_user_mode+0x2a/0x80 [ 2582.423528][ T2028] do_syscall_64+0x4c/0xa0 [ 2582.427991][ T2028] ? clear_bhb_loop+0x60/0xb0 [ 2582.432715][ T2028] ? clear_bhb_loop+0x60/0xb0 [ 2582.437441][ T2028] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2582.443389][ T2028] RIP: 0033:0x7f724c15d60e [ 2582.447852][ T2028] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2582.467586][ T2028] RSP: 002b:00007f724d0eefe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2582.476063][ T2028] RAX: ffffffffffffffda RBX: 00007f724d0ef6c0 RCX: 00007f724c15d60e [ 2582.484082][ T2028] RDX: 000000000000000f RSI: 00007f724d0ef0a0 RDI: 000000000000000a [ 2582.492115][ T2028] RBP: 00007f724d0ef090 R08: 0000000000000000 R09: 0000000000000000 [ 2582.500130][ T2028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2582.508147][ T2028] R13: 00007f724c416038 R14: 00007f724c415fa0 R15: 00007fffe1eb7298 [ 2582.516176][ T2028] [ 2582.623394][ T2029] device veth0_vlan entered promiscuous mode [ 2583.780216][ T2055] FAULT_INJECTION: forcing a failure. [ 2583.780216][ T2055] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2583.875219][ T2055] CPU: 0 PID: 2055 Comm: syz.8.8276 Not tainted syzkaller #0 [ 2583.882688][ T2055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2583.892914][ T2055] Call Trace: [ 2583.896229][ T2055] [ 2583.899197][ T2055] dump_stack_lvl+0x188/0x24e [ 2583.903931][ T2055] ? show_regs_print_info+0x12/0x12 [ 2583.909182][ T2055] ? load_image+0x400/0x400 [ 2583.913733][ T2055] ? __lock_acquire+0x7d10/0x7d10 [ 2583.918814][ T2055] should_fail_ex+0x399/0x4d0 [ 2583.923546][ T2055] _copy_from_user+0x2c/0x170 [ 2583.928274][ T2055] ___sys_sendmsg+0x1c3/0x360 [ 2583.933011][ T2055] ? __sys_sendmsg+0x290/0x290 [ 2583.937860][ T2055] ? __lock_acquire+0x7d10/0x7d10 [ 2583.942958][ T2055] __se_sys_sendmsg+0x1bb/0x2a0 [ 2583.947941][ T2055] ? ct_nmi_exit+0x145/0x1c0 [ 2583.952581][ T2055] ? __x64_sys_sendmsg+0x80/0x80 [ 2583.957586][ T2055] ? lockdep_hardirqs_on+0x94/0x140 [ 2583.962845][ T2055] do_syscall_64+0x4c/0xa0 [ 2583.967292][ T2055] ? clear_bhb_loop+0x60/0xb0 [ 2583.972000][ T2055] ? clear_bhb_loop+0x60/0xb0 [ 2583.976684][ T2055] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2583.982608][ T2055] RIP: 0033:0x7f8c2db9cdd9 [ 2583.987039][ T2055] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2584.006783][ T2055] RSP: 002b:00007f8c2e9a0028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2584.015251][ T2055] RAX: ffffffffffffffda RBX: 00007f8c2de16180 RCX: 00007f8c2db9cdd9 [ 2584.023261][ T2055] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000010 [ 2584.031269][ T2055] RBP: 00007f8c2e9a0090 R08: 0000000000000000 R09: 0000000000000000 [ 2584.039253][ T2055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2584.047238][ T2055] R13: 00007f8c2de16218 R14: 00007f8c2de16180 R15: 00007ffcc495de88 [ 2584.055250][ T2055] [ 2585.548851][ T2068] device lo left promiscuous mode [ 2585.691287][ T2070] netlink: 'syz.8.8278': attribute type 10 has an invalid length. [ 2587.217154][ T2098] device veth0_vlan left promiscuous mode [ 2587.357914][ T2098] device veth0_vlan entered promiscuous mode [ 2587.687166][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2587.717618][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2587.744184][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2589.124610][ T2108] device veth0_vlan left promiscuous mode [ 2589.360629][ T2108] device veth0_vlan entered promiscuous mode [ 2590.746174][ T1278] ieee802154 phy0 wpan0: encryption failed: -22 [ 2590.752613][ T1278] ieee802154 phy1 wpan1: encryption failed: -22 [ 2590.784840][ T2105] device veth0_vlan left promiscuous mode [ 2591.005979][ T2105] device veth0_vlan entered promiscuous mode [ 2591.020563][ T1312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2591.041976][ T1312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2591.082492][ T1312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2592.007102][ T2155] device veth0_vlan left promiscuous mode [ 2592.351975][ T2155] device veth0_vlan entered promiscuous mode [ 2592.624275][ T2173] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 2592.630811][ T2173] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 2592.664921][ T2162] device veth0_vlan left promiscuous mode [ 2592.729977][ T2162] device veth0_vlan entered promiscuous mode [ 2592.906074][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2592.929877][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2592.938273][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2596.878602][ T2208] netlink: 'syz.8.8318': attribute type 13 has an invalid length. [ 2596.888360][ T2208] netlink: 152 bytes leftover after parsing attributes in process `syz.8.8318'. [ 2596.926769][ T2208] netlink: 'syz.8.8318': attribute type 13 has an invalid length. [ 2596.938215][ T2208] netlink: 152 bytes leftover after parsing attributes in process `syz.8.8318'. [ 2596.952504][ T2207] device veth0_vlan left promiscuous mode [ 2597.045228][ T2207] device veth0_vlan entered promiscuous mode [ 2597.594597][ T1294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2597.629353][ T1294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2597.732099][ T1294] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2603.484873][ T48] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 2603.509865][ T48] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 2603.518516][ T48] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 2603.541337][ T48] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 2603.557031][ T48] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 2603.571852][ T48] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 2605.477756][ T2282] device veth0_vlan left promiscuous mode [ 2605.644444][ T48] Bluetooth: hci0: command 0x0409 tx timeout [ 2605.664077][ T2282] device veth0_vlan entered promiscuous mode [ 2606.007043][ T2284] device lo entered promiscuous mode [ 2606.037665][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2606.097345][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2606.165668][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2606.366228][ T2297] netlink: 14719 bytes leftover after parsing attributes in process `syz.5.8340'. [ 2606.917693][ T2272] chnl_net:caif_netlink_parms(): no params data found [ 2607.245993][ T2272] bridge0: port 1(bridge_slave_0) entered blocking state [ 2607.261951][ T2272] bridge0: port 1(bridge_slave_0) entered disabled state [ 2607.270843][ T2272] device bridge_slave_0 entered promiscuous mode [ 2607.376046][ T2272] bridge0: port 2(bridge_slave_1) entered blocking state [ 2607.421115][ T2272] bridge0: port 2(bridge_slave_1) entered disabled state [ 2607.486018][ T2272] device bridge_slave_1 entered promiscuous mode [ 2607.656529][ T2272] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2607.733943][ T48] Bluetooth: hci0: command 0x041b tx timeout [ 2607.751344][ T2272] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2608.071360][ T2272] team0: Port device team_slave_0 added [ 2608.165267][ T2272] team0: Port device team_slave_1 added [ 2608.602102][ T2272] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2608.617842][ T2272] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2608.672299][ T2272] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2608.709984][ T2272] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2608.724166][ T2272] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2608.781452][ T2272] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2609.098117][ T2341] FAULT_INJECTION: forcing a failure. [ 2609.098117][ T2341] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2609.116196][ T2334] device veth0_vlan left promiscuous mode [ 2609.250146][ T2341] CPU: 0 PID: 2341 Comm: syz.6.8353 Not tainted syzkaller #0 [ 2609.257787][ T2341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2609.267885][ T2341] Call Trace: [ 2609.271196][ T2341] [ 2609.274154][ T2341] dump_stack_lvl+0x188/0x24e [ 2609.278883][ T2341] ? show_regs_print_info+0x12/0x12 [ 2609.284123][ T2341] ? load_image+0x400/0x400 [ 2609.288769][ T2341] ? __lock_acquire+0x7d10/0x7d10 [ 2609.293854][ T2341] should_fail_ex+0x399/0x4d0 [ 2609.298591][ T2341] _copy_from_user+0x2c/0x170 [ 2609.303317][ T2341] ___sys_recvmsg+0x172/0x590 [ 2609.308050][ T2341] ? __sys_recvmsg+0x290/0x290 [ 2609.312865][ T2341] ? common_file_perm+0x171/0x1c0 [ 2609.317937][ T2341] ? __fget_files+0x43d/0x4b0 [ 2609.322670][ T2341] __x64_sys_recvmsg+0x205/0x2e0 [ 2609.327663][ T2341] ? ___sys_recvmsg+0x590/0x590 [ 2609.332673][ T2341] ? lockdep_hardirqs_on+0x94/0x140 [ 2609.337918][ T2341] do_syscall_64+0x4c/0xa0 [ 2609.342470][ T2341] ? clear_bhb_loop+0x60/0xb0 [ 2609.347185][ T2341] ? clear_bhb_loop+0x60/0xb0 [ 2609.351910][ T2341] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2609.358103][ T2341] RIP: 0033:0x7f724c19cdd9 [ 2609.362554][ T2341] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2609.382205][ T2341] RSP: 002b:00007f724d0ce028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 2609.390663][ T2341] RAX: ffffffffffffffda RBX: 00007f724c416090 RCX: 00007f724c19cdd9 [ 2609.398762][ T2341] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 2609.406852][ T2341] RBP: 00007f724d0ce090 R08: 0000000000000000 R09: 0000000000000000 [ 2609.414866][ T2341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2609.422873][ T2341] R13: 00007f724c416128 R14: 00007f724c416090 R15: 00007fffe1eb7298 [ 2609.430895][ T2341] [ 2609.677498][ T2334] device veth0_vlan entered promiscuous mode [ 2609.692442][ T2272] device hsr_slave_0 entered promiscuous mode [ 2609.705227][ T2272] device hsr_slave_1 entered promiscuous mode [ 2609.712307][ T2272] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2609.731850][ T2272] Cannot create hsr debugfs directory [ 2609.738099][ T2336] device lo entered promiscuous mode [ 2609.803105][ T48] Bluetooth: hci0: command 0x040f tx timeout [ 2609.856275][ T2346] FAULT_INJECTION: forcing a failure. [ 2609.856275][ T2346] name failslab, interval 1, probability 0, space 0, times 0 [ 2609.943892][ T2346] CPU: 0 PID: 2346 Comm: syz.7.8356 Not tainted syzkaller #0 [ 2609.951362][ T2346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2609.961460][ T2346] Call Trace: [ 2609.964772][ T2346] [ 2609.967740][ T2346] dump_stack_lvl+0x188/0x24e [ 2609.972467][ T2346] ? show_regs_print_info+0x12/0x12 [ 2609.977708][ T2346] ? load_image+0x400/0x400 [ 2609.982258][ T2346] ? __might_sleep+0xd0/0xd0 [ 2609.986884][ T2346] ? __lock_acquire+0x7d10/0x7d10 [ 2609.991955][ T2346] should_fail_ex+0x399/0x4d0 [ 2609.996673][ T2346] should_failslab+0x5/0x20 [ 2610.001227][ T2346] slab_pre_alloc_hook+0x59/0x310 [ 2610.006290][ T2346] kmem_cache_alloc_node+0x5a/0x320 [ 2610.011523][ T2346] ? perf_event_alloc+0x154/0x21b0 [ 2610.016672][ T2346] perf_event_alloc+0x154/0x21b0 [ 2610.021656][ T2346] ? _raw_spin_unlock+0x24/0x40 [ 2610.026541][ T2346] ? alloc_fd+0x58f/0x630 [ 2610.030907][ T2346] ? find_lively_task_by_vpid+0x19/0x290 [ 2610.036589][ T2346] ? find_lively_task_by_vpid+0x19/0x290 [ 2610.042263][ T2346] __se_sys_perf_event_open+0x6fd/0x1ec0 [ 2610.048017][ T2346] ? __fget_files+0x43d/0x4b0 [ 2610.052747][ T2346] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 2610.058442][ T2346] ? lockdep_hardirqs_on+0x94/0x140 [ 2610.063686][ T2346] ? __x64_sys_perf_event_open+0x1c/0xc0 [ 2610.069378][ T2346] do_syscall_64+0x4c/0xa0 [ 2610.073850][ T2346] ? clear_bhb_loop+0x60/0xb0 [ 2610.078577][ T2346] ? clear_bhb_loop+0x60/0xb0 [ 2610.083304][ T2346] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2610.089240][ T2346] RIP: 0033:0x7fb81719cdd9 [ 2610.093689][ T2346] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2610.113338][ T2346] RSP: 002b:00007fb81809c028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2610.121789][ T2346] RAX: ffffffffffffffda RBX: 00007fb817415fa0 RCX: 00007fb81719cdd9 [ 2610.129793][ T2346] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000000500 [ 2610.137825][ T2346] RBP: 00007fb81809c090 R08: 0000000000000009 R09: 0000000000000000 [ 2610.145829][ T2346] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2610.153840][ T2346] R13: 00007fb817416038 R14: 00007fb817415fa0 R15: 00007ffdd44e48d8 [ 2610.161858][ T2346] [ 2611.884002][ T48] Bluetooth: hci0: command 0x0419 tx timeout [ 2612.988482][ T2272] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2613.142120][ T2272] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2613.167616][ T2377] device veth0_vlan left promiscuous mode [ 2613.271127][ T2377] device veth0_vlan entered promiscuous mode [ 2613.911014][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2613.935823][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2613.985858][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2614.066389][ T2272] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2614.168209][ T2391] device lo entered promiscuous mode [ 2614.175413][ T2397] FAULT_INJECTION: forcing a failure. [ 2614.175413][ T2397] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2614.223897][ T2397] CPU: 1 PID: 2397 Comm: syz.6.8369 Not tainted syzkaller #0 [ 2614.231358][ T2397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2614.241544][ T2397] Call Trace: [ 2614.244855][ T2397] [ 2614.247818][ T2397] dump_stack_lvl+0x188/0x24e [ 2614.252551][ T2397] ? show_regs_print_info+0x12/0x12 [ 2614.257803][ T2397] ? load_image+0x400/0x400 [ 2614.262451][ T2397] ? __lock_acquire+0x7d10/0x7d10 [ 2614.267535][ T2397] should_fail_ex+0x399/0x4d0 [ 2614.272249][ T2397] strncpy_from_user+0x32/0x350 [ 2614.277183][ T2397] bpf_prog_load+0x1f3/0x1560 [ 2614.281889][ T2397] ? map_freeze+0x390/0x390 [ 2614.286429][ T2397] ? __might_fault+0xa6/0x120 [ 2614.291216][ T2397] ? __might_fault+0xa6/0x120 [ 2614.295929][ T2397] ? __might_fault+0xc2/0x120 [ 2614.300814][ T2397] ? __might_fault+0xa6/0x120 [ 2614.305530][ T2397] ? bpf_lsm_bpf+0x5/0x10 [ 2614.309897][ T2397] ? security_bpf+0x7a/0xa0 [ 2614.314528][ T2397] __sys_bpf+0x5b8/0x780 [ 2614.318907][ T2397] ? bpf_link_show_fdinfo+0x380/0x380 [ 2614.324353][ T2397] ? lock_chain_count+0x20/0x20 [ 2614.329261][ T2397] __x64_sys_bpf+0x78/0x90 [ 2614.333742][ T2397] do_syscall_64+0x4c/0xa0 [ 2614.338209][ T2397] ? clear_bhb_loop+0x60/0xb0 [ 2614.342930][ T2397] ? clear_bhb_loop+0x60/0xb0 [ 2614.347645][ T2397] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2614.353569][ T2397] RIP: 0033:0x7f724c19cdd9 [ 2614.358006][ T2397] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2614.377665][ T2397] RSP: 002b:00007f724d0ef028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2614.386106][ T2397] RAX: ffffffffffffffda RBX: 00007f724c415fa0 RCX: 00007f724c19cdd9 [ 2614.394094][ T2397] RDX: 0000000000000094 RSI: 0000200000000880 RDI: 0000000000000005 [ 2614.402079][ T2397] RBP: 00007f724d0ef090 R08: 0000000000000000 R09: 0000000000000000 [ 2614.410062][ T2397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2614.418065][ T2397] R13: 00007f724c416038 R14: 00007f724c415fa0 R15: 00007fffe1eb7298 [ 2614.426086][ T2397] [ 2614.466447][ T2272] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2614.870585][ T2272] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 2614.890873][ T2272] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 2614.930807][ T2272] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 2614.981913][ T2272] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 2615.279309][ T2272] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2615.339484][ T1316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2615.356345][ T1316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2615.389989][ T2272] 8021q: adding VLAN 0 to HW filter on device team0 [ 2617.879156][ T2431] netlink: 'syz.7.8381': attribute type 12 has an invalid length. [ 2617.892478][ T2431] netlink: 132 bytes leftover after parsing attributes in process `syz.7.8381'. [ 2617.902412][ T2430] device veth0_vlan left promiscuous mode [ 2617.909808][ T2430] device veth0_vlan entered promiscuous mode [ 2617.944396][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2617.980883][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2618.000012][ T1308] bridge0: port 1(bridge_slave_0) entered blocking state [ 2618.007320][ T1308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2618.023636][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2618.055624][ T1316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2618.074467][ T1316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2618.092226][ T1316] bridge0: port 2(bridge_slave_1) entered blocking state [ 2618.099436][ T1316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2618.125859][ T1316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2618.206167][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2618.260962][ T1294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2618.295338][ T1294] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2618.306416][ T2448] FAULT_INJECTION: forcing a failure. [ 2618.306416][ T2448] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2618.324592][ T1294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2618.361797][ T1294] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2618.404483][ T1294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2618.409314][ T2448] CPU: 0 PID: 2448 Comm: syz.5.8385 Not tainted syzkaller #0 [ 2618.419856][ T2448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2618.429958][ T2448] Call Trace: [ 2618.433274][ T2448] [ 2618.436229][ T2448] dump_stack_lvl+0x188/0x24e [ 2618.440955][ T2448] ? show_regs_print_info+0x12/0x12 [ 2618.446189][ T2448] ? load_image+0x400/0x400 [ 2618.450817][ T2448] ? __lock_acquire+0x7d10/0x7d10 [ 2618.455888][ T2448] should_fail_ex+0x399/0x4d0 [ 2618.460605][ T2448] strncpy_from_user+0x32/0x350 [ 2618.465498][ T2448] bpf_prog_load+0x1f3/0x1560 [ 2618.470220][ T2448] ? map_freeze+0x390/0x390 [ 2618.474758][ T2448] ? __might_fault+0xa6/0x120 [ 2618.479475][ T2448] ? __might_fault+0xa6/0x120 [ 2618.484183][ T2448] ? __might_fault+0xc2/0x120 [ 2618.488891][ T2448] ? __might_fault+0xa6/0x120 [ 2618.493684][ T2448] ? bpf_lsm_bpf+0x5/0x10 [ 2618.498043][ T2448] ? security_bpf+0x7a/0xa0 [ 2618.502585][ T2448] __sys_bpf+0x5b8/0x780 [ 2618.506963][ T2448] ? bpf_link_show_fdinfo+0x380/0x380 [ 2618.512390][ T2448] ? lock_chain_count+0x20/0x20 [ 2618.517286][ T2448] __x64_sys_bpf+0x78/0x90 [ 2618.521740][ T2448] do_syscall_64+0x4c/0xa0 [ 2618.526187][ T2448] ? clear_bhb_loop+0x60/0xb0 [ 2618.530901][ T2448] ? clear_bhb_loop+0x60/0xb0 [ 2618.535608][ T2448] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2618.541535][ T2448] RIP: 0033:0x7fa8d9b9cdd9 [ 2618.545978][ T2448] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2618.565609][ T2448] RSP: 002b:00007fa8da9d0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2618.574053][ T2448] RAX: ffffffffffffffda RBX: 00007fa8d9e15fa0 RCX: 00007fa8d9b9cdd9 [ 2618.582069][ T2448] RDX: 0000000000000048 RSI: 000020000000e000 RDI: 0000000000000005 [ 2618.590122][ T2448] RBP: 00007fa8da9d0090 R08: 0000000000000000 R09: 0000000000000000 [ 2618.598134][ T2448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2618.606137][ T2448] R13: 00007fa8d9e16038 R14: 00007fa8d9e15fa0 R15: 00007ffe7b880bf8 [ 2618.614159][ T2448] [ 2618.646520][ T1294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2618.677577][ T1294] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2618.703796][ T2272] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2618.721406][ T2272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2618.763681][ T2454] device lo entered promiscuous mode [ 2618.812542][ T2454] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 2618.854118][ T1316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2618.892070][ T1316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2618.923599][ T2461] netlink: 156 bytes leftover after parsing attributes in process `syz.7.8397'. [ 2619.446809][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2619.454728][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2619.472289][ T2272] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2621.302403][ T2496] device veth0_vlan left promiscuous mode [ 2621.322464][ T2496] device veth0_vlan entered promiscuous mode [ 2621.725384][ T2511] FAULT_INJECTION: forcing a failure. [ 2621.725384][ T2511] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2621.738877][ T2511] CPU: 1 PID: 2511 Comm: syz.5.8399 Not tainted syzkaller #0 [ 2621.746392][ T2511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2621.756581][ T2511] Call Trace: [ 2621.759896][ T2511] [ 2621.762866][ T2511] dump_stack_lvl+0x188/0x24e [ 2621.767685][ T2511] ? show_regs_print_info+0x12/0x12 [ 2621.772949][ T2511] ? load_image+0x400/0x400 [ 2621.777507][ T2511] ? __lock_acquire+0x7d10/0x7d10 [ 2621.782603][ T2511] should_fail_ex+0x399/0x4d0 [ 2621.785747][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2621.787320][ T2511] _copy_from_user+0x2c/0x170 [ 2621.787357][ T2511] __copy_msghdr+0x3b7/0x580 [ 2621.804816][ T2511] ___sys_sendmsg+0x210/0x360 [ 2621.809647][ T2511] ? __sys_sendmsg+0x290/0x290 [ 2621.814529][ T2511] ? __lock_acquire+0x7d10/0x7d10 [ 2621.815079][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2621.819607][ T2511] __se_sys_sendmsg+0x1bb/0x2a0 [ 2621.832659][ T2511] ? __x64_sys_sendmsg+0x80/0x80 [ 2621.837667][ T2511] ? lockdep_hardirqs_on+0x94/0x140 [ 2621.842892][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2621.844082][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2621.850536][ T2511] do_syscall_64+0x4c/0xa0 [ 2621.850574][ T2511] ? clear_bhb_loop+0x60/0xb0 [ 2621.867441][ T2511] ? clear_bhb_loop+0x60/0xb0 [ 2621.872207][ T2511] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2621.878150][ T2511] RIP: 0033:0x7fa8d9b9cdd9 [ 2621.882600][ T2511] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2621.902418][ T2511] RSP: 002b:00007fa8da9d0028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2621.910897][ T2511] RAX: ffffffffffffffda RBX: 00007fa8d9e15fa0 RCX: 00007fa8d9b9cdd9 [ 2621.918908][ T2511] RDX: 0000000000000000 RSI: 00002000000003c0 RDI: 0000000000000003 [ 2621.927011][ T2511] RBP: 00007fa8da9d0090 R08: 0000000000000000 R09: 0000000000000000 [ 2621.935031][ T2511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2621.943046][ T2511] R13: 00007fa8d9e16038 R14: 00007fa8d9e15fa0 R15: 00007ffe7b880bf8 [ 2621.951092][ T2511] [ 2622.021581][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2622.058620][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2622.101718][ T2272] device veth0_vlan entered promiscuous mode [ 2622.197744][ T2272] device veth1_vlan entered promiscuous mode [ 2622.364864][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2622.390476][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2622.495955][ T2272] device veth0_macvtap entered promiscuous mode [ 2622.524430][ T1294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2622.549691][ T1294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2622.578032][ T2514] netlink: 'syz.1.8400': attribute type 10 has an invalid length. [ 2622.598108][ T2514] netlink: 2 bytes leftover after parsing attributes in process `syz.1.8400'. [ 2622.623468][ T2514] device hsr0 entered promiscuous mode [ 2622.738970][ T1294] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2622.777339][ T2272] device veth1_macvtap entered promiscuous mode [ 2622.904367][ T2535] FAULT_INJECTION: forcing a failure. [ 2622.904367][ T2535] name failslab, interval 1, probability 0, space 0, times 0 [ 2622.917570][ T2535] CPU: 1 PID: 2535 Comm: syz.6.8407 Not tainted syzkaller #0 [ 2622.925038][ T2535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2622.926606][ T2272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2622.935197][ T2535] Call Trace: [ 2622.935208][ T2535] [ 2622.935218][ T2535] dump_stack_lvl+0x188/0x24e [ 2622.956732][ T2535] ? show_regs_print_info+0x12/0x12 [ 2622.961984][ T2535] ? load_image+0x400/0x400 [ 2622.966625][ T2535] ? __might_sleep+0xd0/0xd0 [ 2622.971251][ T2535] ? __lock_acquire+0x7d10/0x7d10 [ 2622.976323][ T2535] should_fail_ex+0x399/0x4d0 [ 2622.981216][ T2535] should_failslab+0x5/0x20 [ 2622.985760][ T2535] slab_pre_alloc_hook+0x59/0x310 [ 2622.990827][ T2535] ? bpf_prog_test_run_flow_dissector+0x255/0x640 [ 2622.997438][ T2535] __kmem_cache_alloc_node+0x4f/0x260 [ 2623.002853][ T2535] ? bpf_prog_test_run_flow_dissector+0x255/0x640 [ 2623.009309][ T2535] __kmalloc+0xa0/0x240 [ 2623.013510][ T2535] bpf_prog_test_run_flow_dissector+0x255/0x640 [ 2623.015966][ T2272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2623.019781][ T2535] ? xdp_convert_buff_to_md+0x200/0x200 [ 2623.035177][ T2535] ? __fget_files+0x28/0x4b0 [ 2623.039792][ T2535] ? __fget_files+0x28/0x4b0 [ 2623.044404][ T2535] ? __fget_files+0x43d/0x4b0 [ 2623.049106][ T2535] ? xdp_convert_buff_to_md+0x200/0x200 [ 2623.054670][ T2535] bpf_prog_test_run+0x31e/0x390 [ 2623.059743][ T2535] __sys_bpf+0x62b/0x780 [ 2623.064025][ T2535] ? bpf_link_show_fdinfo+0x380/0x380 [ 2623.069443][ T2535] ? lock_chain_count+0x20/0x20 [ 2623.074338][ T2535] __x64_sys_bpf+0x78/0x90 [ 2623.078779][ T2535] do_syscall_64+0x4c/0xa0 [ 2623.083217][ T2535] ? clear_bhb_loop+0x60/0xb0 [ 2623.087919][ T2535] ? clear_bhb_loop+0x60/0xb0 [ 2623.092703][ T2535] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2623.098628][ T2535] RIP: 0033:0x7f724c19cdd9 [ 2623.103056][ T2535] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2623.122761][ T2535] RSP: 002b:00007f724d0ef028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2623.131195][ T2535] RAX: ffffffffffffffda RBX: 00007f724c415fa0 RCX: 00007f724c19cdd9 [ 2623.139183][ T2535] RDX: 000000000000004c RSI: 0000200000000640 RDI: 000000000000000a [ 2623.147254][ T2535] RBP: 00007f724d0ef090 R08: 0000000000000000 R09: 0000000000000000 [ 2623.155238][ T2535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2623.163236][ T2535] R13: 00007f724c416038 R14: 00007f724c415fa0 R15: 00007fffe1eb7298 [ 2623.171234][ T2535] [ 2623.243468][ T2272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2623.293275][ T2272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2623.352076][ T2272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2623.388950][ T2272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2623.427373][ T2272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2623.442951][ T2272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2623.460983][ T2272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2623.472085][ T2272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2623.499168][ T2272] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2625.802380][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2625.812142][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2625.821286][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2625.887136][ T2272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2625.910889][ T2272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2625.921201][ T2272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2625.939108][ T2272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2625.950370][ T2272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2625.974796][ T2272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2625.985068][ T2272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2625.995642][ T2272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2626.006017][ T2272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2626.016969][ T2272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2626.038639][ T2272] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2626.056145][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2626.084012][ T1324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2626.177448][ T2566] netlink: 17279 bytes leftover after parsing attributes in process `syz.7.8416'. [ 2626.199809][ T2573] FAULT_INJECTION: forcing a failure. [ 2626.199809][ T2573] name failslab, interval 1, probability 0, space 0, times 0 [ 2626.226963][ T2272] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2626.243943][ T2272] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2626.252769][ T2272] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2626.272517][ T2573] CPU: 1 PID: 2573 Comm: syz.6.8418 Not tainted syzkaller #0 [ 2626.279963][ T2573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2626.290047][ T2573] Call Trace: [ 2626.293353][ T2573] [ 2626.296306][ T2573] dump_stack_lvl+0x188/0x24e [ 2626.301183][ T2573] ? show_regs_print_info+0x12/0x12 [ 2626.306467][ T2573] ? load_image+0x400/0x400 [ 2626.310994][ T2573] ? __might_sleep+0xd0/0xd0 [ 2626.315599][ T2573] ? __lock_acquire+0x7d10/0x7d10 [ 2626.320662][ T2573] should_fail_ex+0x399/0x4d0 [ 2626.325387][ T2573] should_failslab+0x5/0x20 [ 2626.329921][ T2573] slab_pre_alloc_hook+0x59/0x310 [ 2626.335047][ T2573] ? tomoyo_encode+0x27e/0x540 [ 2626.340109][ T2573] __kmem_cache_alloc_node+0x4f/0x260 [ 2626.345509][ T2573] ? tomoyo_encode+0x27e/0x540 [ 2626.350351][ T2573] __kmalloc+0xa0/0x240 [ 2626.354535][ T2573] tomoyo_encode+0x27e/0x540 [ 2626.359240][ T2573] tomoyo_realpath_from_path+0x58e/0x5d0 [ 2626.364986][ T2573] ? tomoyo_path_number_perm+0x205/0x650 [ 2626.370636][ T2573] tomoyo_path_number_perm+0x22f/0x650 [ 2626.376203][ T2573] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 2626.381679][ T2573] ? ksys_write+0x1c0/0x250 [ 2626.386204][ T2573] ? common_file_perm+0x171/0x1c0 [ 2626.391301][ T2573] ? __fget_files+0x28/0x4b0 [ 2626.395920][ T2573] ? __fget_files+0x28/0x4b0 [ 2626.400540][ T2573] security_file_ioctl+0x6c/0xa0 [ 2626.405528][ T2573] __se_sys_ioctl+0x48/0x170 [ 2626.410143][ T2573] do_syscall_64+0x4c/0xa0 [ 2626.414581][ T2573] ? clear_bhb_loop+0x60/0xb0 [ 2626.419286][ T2573] ? clear_bhb_loop+0x60/0xb0 [ 2626.423984][ T2573] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2626.429891][ T2573] RIP: 0033:0x7f724c19cdd9 [ 2626.434324][ T2573] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2626.453948][ T2573] RSP: 002b:00007f724d0ef028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2626.462380][ T2573] RAX: ffffffffffffffda RBX: 00007f724c415fa0 RCX: 00007f724c19cdd9 [ 2626.470361][ T2573] RDX: 0000200000000000 RSI: 0000000000008b1a RDI: 0000000000000003 [ 2626.478343][ T2573] RBP: 00007f724d0ef090 R08: 0000000000000000 R09: 0000000000000000 [ 2626.486338][ T2573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2626.494335][ T2573] R13: 00007f724c416038 R14: 00007f724c415fa0 R15: 00007fffe1eb7298 [ 2626.502357][ T2573] [ 2626.513215][ T2573] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2626.573153][ T2272] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2627.265965][ T2598] FAULT_INJECTION: forcing a failure. [ 2627.265965][ T2598] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2627.303668][ T2598] CPU: 1 PID: 2598 Comm: syz.1.8425 Not tainted syzkaller #0 [ 2627.311139][ T2598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2627.321327][ T2598] Call Trace: [ 2627.324653][ T2598] [ 2627.327638][ T2598] dump_stack_lvl+0x188/0x24e [ 2627.332366][ T2598] ? show_regs_print_info+0x12/0x12 [ 2627.337595][ T2598] ? load_image+0x400/0x400 [ 2627.342124][ T2598] ? __lock_acquire+0x7d10/0x7d10 [ 2627.347207][ T2598] should_fail_ex+0x399/0x4d0 [ 2627.351930][ T2598] strncpy_from_user+0x32/0x350 [ 2627.356837][ T2598] bpf_prog_load+0x1f3/0x1560 [ 2627.361570][ T2598] ? map_freeze+0x390/0x390 [ 2627.366094][ T2598] ? __might_fault+0xa6/0x120 [ 2627.370782][ T2598] ? trace_call_bpf+0xbf/0x6b0 [ 2627.375582][ T2598] ? __might_fault+0xa6/0x120 [ 2627.380270][ T2598] ? __might_fault+0xc2/0x120 [ 2627.384960][ T2598] ? __might_fault+0xa6/0x120 [ 2627.389649][ T2598] ? bpf_lsm_bpf+0x5/0x10 [ 2627.393993][ T2598] ? security_bpf+0x7a/0xa0 [ 2627.398513][ T2598] __sys_bpf+0x5b8/0x780 [ 2627.402785][ T2598] ? bpf_link_show_fdinfo+0x380/0x380 [ 2627.408193][ T2598] ? lock_chain_count+0x20/0x20 [ 2627.413073][ T2598] __x64_sys_bpf+0x78/0x90 [ 2627.417598][ T2598] do_syscall_64+0x4c/0xa0 [ 2627.422039][ T2598] ? clear_bhb_loop+0x60/0xb0 [ 2627.427169][ T2598] ? clear_bhb_loop+0x60/0xb0 [ 2627.431866][ T2598] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2627.437775][ T2598] RIP: 0033:0x7f05d019cdd9 [ 2627.442215][ T2598] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2627.461918][ T2598] RSP: 002b:00007f05ce3f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2627.470351][ T2598] RAX: ffffffffffffffda RBX: 00007f05d0415fa0 RCX: 00007f05d019cdd9 [ 2627.478356][ T2598] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 2627.486451][ T2598] RBP: 00007f05ce3f6090 R08: 0000000000000000 R09: 0000000000000000 [ 2627.494471][ T2598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2627.502458][ T2598] R13: 00007f05d0416038 R14: 00007f05d0415fa0 R15: 00007ffffc46d268 [ 2627.510465][ T2598] [ 2627.655849][ T1316] device hsr_slave_0 left promiscuous mode [ 2627.789256][ T1316] device hsr_slave_1 left promiscuous mode [ 2627.814445][ T1316] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2627.833593][ T1316] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2627.862252][ T1316] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2627.891785][ T1316] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2628.019324][ T1316] device veth0_macvtap left promiscuous mode [ 2628.060678][ T1316] device veth1_vlan left promiscuous mode [ 2628.083655][ T1316] device veth0_vlan left promiscuous mode [ 2631.160849][ T2622] FAULT_INJECTION: forcing a failure. [ 2631.160849][ T2622] name failslab, interval 1, probability 0, space 0, times 0 [ 2631.175180][ T2622] CPU: 0 PID: 2622 Comm: syz.1.8431 Not tainted syzkaller #0 [ 2631.182645][ T2622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2631.192831][ T2622] Call Trace: [ 2631.196160][ T2622] [ 2631.199110][ T2622] dump_stack_lvl+0x188/0x24e [ 2631.203833][ T2622] ? show_regs_print_info+0x12/0x12 [ 2631.209095][ T2622] ? load_image+0x400/0x400 [ 2631.213626][ T2622] ? __might_sleep+0xd0/0xd0 [ 2631.218280][ T2622] ? __lock_acquire+0x7d10/0x7d10 [ 2631.223340][ T2622] should_fail_ex+0x399/0x4d0 [ 2631.228066][ T2622] should_failslab+0x5/0x20 [ 2631.232584][ T2622] slab_pre_alloc_hook+0x59/0x310 [ 2631.237632][ T2622] ? prepend_path+0xa68/0xc20 [ 2631.242451][ T2622] ? tomoyo_encode+0x27e/0x540 [ 2631.247239][ T2622] __kmem_cache_alloc_node+0x4f/0x260 [ 2631.252627][ T2622] ? tomoyo_encode+0x27e/0x540 [ 2631.257402][ T2622] __kmalloc+0xa0/0x240 [ 2631.261575][ T2622] tomoyo_encode+0x27e/0x540 [ 2631.266216][ T2622] tomoyo_realpath_from_path+0x58e/0x5d0 [ 2631.271892][ T2622] ? tomoyo_path_number_perm+0x205/0x650 [ 2631.277596][ T2622] tomoyo_path_number_perm+0x22f/0x650 [ 2631.283097][ T2622] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 2631.288610][ T2622] ? ksys_write+0x1c0/0x250 [ 2631.293139][ T2622] ? common_file_perm+0x171/0x1c0 [ 2631.298235][ T2622] ? __fget_files+0x28/0x4b0 [ 2631.302835][ T2622] ? __fget_files+0x28/0x4b0 [ 2631.307455][ T2622] security_file_ioctl+0x6c/0xa0 [ 2631.312402][ T2622] __se_sys_ioctl+0x48/0x170 [ 2631.317021][ T2622] do_syscall_64+0x4c/0xa0 [ 2631.321484][ T2622] ? clear_bhb_loop+0x60/0xb0 [ 2631.326168][ T2622] ? clear_bhb_loop+0x60/0xb0 [ 2631.330860][ T2622] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2631.336776][ T2622] RIP: 0033:0x7f05d019cdd9 [ 2631.341222][ T2622] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2631.360843][ T2622] RSP: 002b:00007f05ce3f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2631.369266][ T2622] RAX: ffffffffffffffda RBX: 00007f05d0415fa0 RCX: 00007f05d019cdd9 [ 2631.377268][ T2622] RDX: 0000200000000040 RSI: 0000000040305829 RDI: 0000000000000003 [ 2631.385260][ T2622] RBP: 00007f05ce3f6090 R08: 0000000000000000 R09: 0000000000000000 [ 2631.393287][ T2622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2631.401293][ T2622] R13: 00007f05d0416038 R14: 00007f05d0415fa0 R15: 00007ffffc46d268 [ 2631.409295][ T2622] [ 2631.423984][ T2622] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2631.946171][ T1316] device team_slave_1 left promiscuous mode [ 2631.956358][ T1316] team0 (unregistering): Port device team_slave_1 removed [ 2632.007905][ T1316] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2632.016837][ T1316] device bond_slave_1 left promiscuous mode [ 2632.064703][ T1316] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2632.074764][ T1316] device bond_slave_0 left promiscuous mode [ 2632.380195][ T1316] device bond0 left promiscuous mode [ 2632.387468][ T1316] team0 (unregistering): Port device bond0 removed [ 2632.430037][ T1316] bond0 (unregistering): Released all slaves [ 2632.476872][ T2593] device veth0_vlan left promiscuous mode [ 2632.483595][ T2593] device veth0_vlan entered promiscuous mode [ 2632.528604][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2632.574425][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2632.591729][ T1308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2632.703526][ T1312] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2632.711654][ T1312] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2632.757476][ T1312] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2632.785757][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2632.810373][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2632.832423][ T1312] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2632.971165][T29820] Bluetooth: hci1: ISO packet for unknown connection handle 255 [ 2633.029884][ T2641] FAULT_INJECTION: forcing a failure. [ 2633.029884][ T2641] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2633.253431][ T2641] CPU: 1 PID: 2641 Comm: syz.8.8334 Not tainted syzkaller #0 [ 2633.260995][ T2641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2633.271093][ T2641] Call Trace: [ 2633.274405][ T2641] [ 2633.277377][ T2641] dump_stack_lvl+0x188/0x24e [ 2633.282146][ T2641] ? show_regs_print_info+0x12/0x12 [ 2633.287390][ T2641] ? load_image+0x400/0x400 [ 2633.291940][ T2641] ? __lock_acquire+0x7d10/0x7d10 [ 2633.297003][ T2641] ? snprintf+0xe5/0x140 [ 2633.301283][ T2641] should_fail_ex+0x399/0x4d0 [ 2633.306002][ T2641] _copy_to_user+0x2c/0x130 [ 2633.310730][ T2641] simple_read_from_buffer+0xe3/0x150 [ 2633.316143][ T2641] proc_fail_nth_read+0x1a6/0x220 [ 2633.321209][ T2641] ? proc_fault_inject_write+0x310/0x310 [ 2633.326894][ T2641] ? fsnotify_perm+0x248/0x550 [ 2633.331725][ T2641] ? proc_fault_inject_write+0x310/0x310 [ 2633.337392][ T2641] vfs_read+0x2de/0xa00 [ 2633.341605][ T2641] ? kernel_read+0x1e0/0x1e0 [ 2633.346243][ T2641] ? __fget_files+0x28/0x4b0 [ 2633.350876][ T2641] ? __fget_files+0x28/0x4b0 [ 2633.355538][ T2641] ? __fget_files+0x43d/0x4b0 [ 2633.360274][ T2641] ? __fdget_pos+0x2ae/0x360 [ 2633.364903][ T2641] ? ksys_read+0x71/0x250 [ 2633.369275][ T2641] ksys_read+0x14c/0x250 [ 2633.373560][ T2641] ? vfs_write+0xa30/0xa30 [ 2633.378018][ T2641] ? lockdep_hardirqs_on+0x94/0x140 [ 2633.383258][ T2641] do_syscall_64+0x4c/0xa0 [ 2633.387714][ T2641] ? clear_bhb_loop+0x60/0xb0 [ 2633.392423][ T2641] ? clear_bhb_loop+0x60/0xb0 [ 2633.397142][ T2641] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2633.403075][ T2641] RIP: 0033:0x7f94dc15d60e [ 2633.407526][ T2641] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2633.427176][ T2641] RSP: 002b:00007f94dd07ffe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2633.435636][ T2641] RAX: ffffffffffffffda RBX: 00007f94dd0806c0 RCX: 00007f94dc15d60e [ 2633.443640][ T2641] RDX: 000000000000000f RSI: 00007f94dd0800a0 RDI: 0000000000000007 [ 2633.451642][ T2641] RBP: 00007f94dd080090 R08: 0000000000000000 R09: 0000000000000000 [ 2633.459642][ T2641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2633.467644][ T2641] R13: 00007f94dc416038 R14: 00007f94dc415fa0 R15: 00007ffd09c49328 [ 2633.475661][ T2641] [ 2636.135478][ T2654] FAULT_INJECTION: forcing a failure. [ 2636.135478][ T2654] name failslab, interval 1, probability 0, space 0, times 0 [ 2636.175157][ T2654] CPU: 0 PID: 2654 Comm: syz.1.8439 Not tainted syzkaller #0 [ 2636.182621][ T2654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2636.192727][ T2654] Call Trace: [ 2636.196057][ T2654] [ 2636.199026][ T2654] dump_stack_lvl+0x188/0x24e [ 2636.203767][ T2654] ? show_regs_print_info+0x12/0x12 [ 2636.209021][ T2654] ? load_image+0x400/0x400 [ 2636.213582][ T2654] ? __might_sleep+0xd0/0xd0 [ 2636.218215][ T2654] ? __lock_acquire+0x7d10/0x7d10 [ 2636.223320][ T2654] should_fail_ex+0x399/0x4d0 [ 2636.228043][ T2654] should_failslab+0x5/0x20 [ 2636.232583][ T2654] slab_pre_alloc_hook+0x59/0x310 [ 2636.237652][ T2654] ? vmemdup_user+0x45/0x1d0 [ 2636.242340][ T2654] __kmem_cache_alloc_node+0x4f/0x260 [ 2636.247743][ T2654] ? vmemdup_user+0x45/0x1d0 [ 2636.252361][ T2654] __kmalloc_node+0xa0/0x240 [ 2636.256980][ T2654] vmemdup_user+0x45/0x1d0 [ 2636.261423][ T2654] map_lookup_elem+0x2a7/0x5e0 [ 2636.266213][ T2654] __sys_bpf+0x546/0x780 [ 2636.270563][ T2654] ? bpf_link_show_fdinfo+0x380/0x380 [ 2636.275968][ T2654] ? lock_chain_count+0x20/0x20 [ 2636.280850][ T2654] __x64_sys_bpf+0x78/0x90 [ 2636.285323][ T2654] do_syscall_64+0x4c/0xa0 [ 2636.289757][ T2654] ? clear_bhb_loop+0x60/0xb0 [ 2636.294453][ T2654] ? clear_bhb_loop+0x60/0xb0 [ 2636.299163][ T2654] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2636.305075][ T2654] RIP: 0033:0x7f05d019cdd9 [ 2636.309531][ T2654] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2636.329157][ T2654] RSP: 002b:00007f05ce3d5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2636.337604][ T2654] RAX: ffffffffffffffda RBX: 00007f05d0416090 RCX: 00007f05d019cdd9 [ 2636.345603][ T2654] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000001 [ 2636.353602][ T2654] RBP: 00007f05ce3d5090 R08: 0000000000000000 R09: 0000000000000000 [ 2636.361685][ T2654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2636.369675][ T2654] R13: 00007f05d0416128 R14: 00007f05d0416090 R15: 00007ffffc46d268 [ 2636.377778][ T2654] [ 2636.649809][ T2670] bridge0: port 3(veth0_to_bridge) entered blocking state [ 2636.698625][ T2670] bridge0: port 3(veth0_to_bridge) entered disabled state [ 2636.767037][ T2670] device veth0_to_bridge entered promiscuous mode [ 2636.795028][ T2670] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 2636.812139][ T2670] bridge0: port 3(veth0_to_bridge) entered blocking state [ 2636.819551][ T2670] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 2638.783267][ T2706] netlink: 'syz.1.8453': attribute type 10 has an invalid length. [ 2638.843853][ T2706] netlink: 40 bytes leftover after parsing attributes in process `syz.1.8453'. [ 2638.940964][ T2706] device team0 entered promiscuous mode [ 2639.054624][ T2706] device team_slave_0 entered promiscuous mode [ 2639.116065][ T2706] device team_slave_1 entered promiscuous mode [ 2639.138595][ T2706] device bond0 entered promiscuous mode [ 2639.170004][ T2706] device bond_slave_0 entered promiscuous mode [ 2639.193698][ T2706] device bond_slave_1 entered promiscuous mode [ 2639.215658][ T2706] device batadv0 entered promiscuous mode [ 2639.252751][ T2706] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 2640.816311][ T2726] FAULT_INJECTION: forcing a failure. [ 2640.816311][ T2726] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2640.858154][ T2726] CPU: 0 PID: 2726 Comm: syz.6.8457 Not tainted syzkaller #0 [ 2640.865631][ T2726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2640.875736][ T2726] Call Trace: [ 2640.879062][ T2726] [ 2640.882047][ T2726] dump_stack_lvl+0x188/0x24e [ 2640.886794][ T2726] ? show_regs_print_info+0x12/0x12 [ 2640.892024][ T2726] ? load_image+0x400/0x400 [ 2640.896567][ T2726] ? __lock_acquire+0x7d10/0x7d10 [ 2640.901634][ T2726] should_fail_ex+0x399/0x4d0 [ 2640.906347][ T2726] _copy_from_user+0x2c/0x170 [ 2640.911063][ T2726] __copy_msghdr+0x3b7/0x580 [ 2640.915701][ T2726] ___sys_sendmsg+0x210/0x360 [ 2640.920419][ T2726] ? __sys_sendmsg+0x290/0x290 [ 2640.925257][ T2726] ? __lock_acquire+0x7d10/0x7d10 [ 2640.930358][ T2726] __se_sys_sendmsg+0x1bb/0x2a0 [ 2640.935245][ T2726] ? __x64_sys_sendmsg+0x80/0x80 [ 2640.940240][ T2726] ? lockdep_hardirqs_on+0x94/0x140 [ 2640.945554][ T2726] do_syscall_64+0x4c/0xa0 [ 2640.950001][ T2726] ? clear_bhb_loop+0x60/0xb0 [ 2640.954706][ T2726] ? clear_bhb_loop+0x60/0xb0 [ 2640.959500][ T2726] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2640.965433][ T2726] RIP: 0033:0x7f724c19cdd9 [ 2640.969870][ T2726] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2640.989503][ T2726] RSP: 002b:00007f724d0ef028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2640.997945][ T2726] RAX: ffffffffffffffda RBX: 00007f724c415fa0 RCX: 00007f724c19cdd9 [ 2641.005937][ T2726] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 2641.013930][ T2726] RBP: 00007f724d0ef090 R08: 0000000000000000 R09: 0000000000000000 [ 2641.021918][ T2726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2641.029908][ T2726] R13: 00007f724c416038 R14: 00007f724c415fa0 R15: 00007fffe1eb7298 [ 2641.037939][ T2726] [ 2641.404394][ T2741] device veth0_vlan left promiscuous mode [ 2641.436670][ T2741] device veth0_vlan entered promiscuous mode [ 2641.539886][ T1312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2641.564907][ T1312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2641.612724][ T1312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2643.454383][ T2772] FAULT_INJECTION: forcing a failure. [ 2643.454383][ T2772] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2643.715095][ T2772] CPU: 0 PID: 2772 Comm: syz.6.8471 Not tainted syzkaller #0 [ 2643.722681][ T2772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2643.732796][ T2772] Call Trace: [ 2643.736113][ T2772] [ 2643.739095][ T2772] dump_stack_lvl+0x188/0x24e [ 2643.743839][ T2772] ? show_regs_print_info+0x12/0x12 [ 2643.749102][ T2772] ? load_image+0x400/0x400 [ 2643.753643][ T2772] ? __lock_acquire+0x7d10/0x7d10 [ 2643.758723][ T2772] should_fail_ex+0x399/0x4d0 [ 2643.763534][ T2772] _copy_from_user+0x2c/0x170 [ 2643.768260][ T2772] __copy_msghdr+0x3b7/0x580 [ 2643.772919][ T2772] ___sys_sendmsg+0x210/0x360 [ 2643.777742][ T2772] ? __sys_sendmsg+0x290/0x290 [ 2643.782570][ T2772] ? trace_call_bpf+0xbf/0x6b0 [ 2643.787415][ T2772] __se_sys_sendmsg+0x1bb/0x2a0 [ 2643.792325][ T2772] ? __x64_sys_sendmsg+0x80/0x80 [ 2643.797334][ T2772] ? lockdep_hardirqs_on+0x94/0x140 [ 2643.802580][ T2772] do_syscall_64+0x4c/0xa0 [ 2643.807057][ T2772] ? clear_bhb_loop+0x60/0xb0 [ 2643.811779][ T2772] ? clear_bhb_loop+0x60/0xb0 [ 2643.816502][ T2772] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2643.822613][ T2772] RIP: 0033:0x7f724c19cdd9 [ 2643.827072][ T2772] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2643.846806][ T2772] RSP: 002b:00007f724d0ef028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2643.855358][ T2772] RAX: ffffffffffffffda RBX: 00007f724c415fa0 RCX: 00007f724c19cdd9 [ 2643.863369][ T2772] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 2643.871370][ T2772] RBP: 00007f724d0ef090 R08: 0000000000000000 R09: 0000000000000000 [ 2643.879372][ T2772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2643.887553][ T2772] R13: 00007f724c416038 R14: 00007f724c415fa0 R15: 00007fffe1eb7298 [ 2643.895581][ T2772] [ 2645.752528][ T2761] device veth0_vlan left promiscuous mode [ 2645.808226][ T2761] device veth0_vlan entered promiscuous mode [ 2645.867453][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2645.882209][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2645.899809][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2647.489831][ T2842] FAULT_INJECTION: forcing a failure. [ 2647.489831][ T2842] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2647.540199][ T2842] CPU: 0 PID: 2842 Comm: syz.6.8486 Not tainted syzkaller #0 [ 2647.547660][ T2842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2647.557753][ T2842] Call Trace: [ 2647.561071][ T2842] [ 2647.564046][ T2842] dump_stack_lvl+0x188/0x24e [ 2647.568872][ T2842] ? show_regs_print_info+0x12/0x12 [ 2647.574132][ T2842] ? load_image+0x400/0x400 [ 2647.578690][ T2842] ? __lock_acquire+0x7d10/0x7d10 [ 2647.583770][ T2842] should_fail_ex+0x399/0x4d0 [ 2647.588492][ T2842] strncpy_from_user+0x32/0x350 [ 2647.593373][ T2842] bpf_prog_load+0x1f3/0x1560 [ 2647.598071][ T2842] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2647.604080][ T2842] ? lock_chain_count+0x20/0x20 [ 2647.608960][ T2842] ? map_freeze+0x390/0x390 [ 2647.613494][ T2842] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2647.619664][ T2842] ? lockdep_hardirqs_on+0x94/0x140 [ 2647.624894][ T2842] ? copy_user_enhanced_fast_string+0xc/0x40 [ 2647.630900][ T2842] ? bpf_lsm_bpf+0x5/0x10 [ 2647.635281][ T2842] ? security_bpf+0x7a/0xa0 [ 2647.639804][ T2842] __sys_bpf+0x5b8/0x780 [ 2647.644101][ T2842] ? bpf_link_show_fdinfo+0x380/0x380 [ 2647.649536][ T2842] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2647.655721][ T2842] __x64_sys_bpf+0x78/0x90 [ 2647.660179][ T2842] do_syscall_64+0x4c/0xa0 [ 2647.664704][ T2842] ? clear_bhb_loop+0x60/0xb0 [ 2647.669403][ T2842] ? clear_bhb_loop+0x60/0xb0 [ 2647.674103][ T2842] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2647.680017][ T2842] RIP: 0033:0x7f724c19cdd9 [ 2647.684451][ T2842] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2647.704071][ T2842] RSP: 002b:00007f724d0ef028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2647.712514][ T2842] RAX: ffffffffffffffda RBX: 00007f724c415fa0 RCX: 00007f724c19cdd9 [ 2647.720500][ T2842] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 0000000000000005 [ 2647.728483][ T2842] RBP: 00007f724d0ef090 R08: 0000000000000000 R09: 0000000000000000 [ 2647.736465][ T2842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2647.744446][ T2842] R13: 00007f724c416038 R14: 00007f724c415fa0 R15: 00007fffe1eb7298 [ 2647.752452][ T2842] [ 2651.888721][ T1278] ieee802154 phy0 wpan0: encryption failed: -22 [ 2651.895177][ T1278] ieee802154 phy1 wpan1: encryption failed: -22 [ 2654.539608][ T2851] ------------[ cut here ]------------ [ 2654.545345][ T2851] WARNING: CPU: 1 PID: 2851 at kernel/events/core.c:6592 perf_pending_task+0x358/0x470 [ 2654.555174][ T2851] Modules linked in: [ 2654.559858][ T2851] CPU: 1 PID: 2851 Comm: syz.6.8489 Not tainted syzkaller #0 [ 2654.567357][ T2851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2654.577591][ T2851] RIP: 0010:perf_pending_task+0x358/0x470 [ 2654.583408][ T2851] Code: ff 84 db 75 14 e8 e8 76 da ff 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d4 76 da ff e8 37 85 58 ff eb e5 e8 c8 76 da ff <0f> 0b e9 f3 fe ff ff e8 bc 76 da ff 48 c7 c7 10 2d bc 8c 4c 89 f6 [ 2654.603218][ T2851] RSP: 0018:ffffc90005fb78e0 EFLAGS: 00010293 [ 2654.609338][ T2851] RAX: ffffffff81a7fe88 RBX: ffff888062521658 RCX: ffff88802d8abb80 [ 2654.617508][ T2851] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 2654.625569][ T2851] RBP: 0000000000000001 R08: ffff88802d8ac583 R09: 1ffff11005b158b0 [ 2654.633633][ T2851] R10: dffffc0000000000 R11: ffffed1005b158b1 R12: ffff88802d8abb80 [ 2654.641648][ T2851] R13: ffff888051411960 R14: ffff888062521420 R15: 1ffff1100c4a4284 [ 2654.649715][ T2851] FS: 0000000000000000(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 [ 2654.658747][ T2851] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2654.665432][ T2851] CR2: 000055557f2664e8 CR3: 0000000054835000 CR4: 00000000003506e0 [ 2654.673581][ T2851] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 2654.681601][ T2851] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 2654.689773][ T2851] Call Trace: [ 2654.693229][ T2851] [ 2654.696209][ T2851] task_work_run+0x1d0/0x260 [ 2654.700946][ T2851] ? task_work_cancel+0x220/0x220 [ 2654.706093][ T2851] ? do_raw_spin_unlock+0x11d/0x230 [ 2654.711341][ T2851] do_exit+0x982/0x2480 [ 2654.715630][ T2851] ? put_task_struct+0x80/0x80 [ 2654.720465][ T2851] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2654.726570][ T2851] ? lock_chain_count+0x20/0x20 [ 2654.731474][ T2851] do_group_exit+0x217/0x2d0 [ 2654.736177][ T2851] ? lockdep_hardirqs_on+0x94/0x140 [ 2654.741440][ T2851] get_signal+0x1272/0x1350 [ 2654.746081][ T2851] arch_do_signal_or_restart+0xc4/0x1350 [ 2654.751851][ T2851] ? bpf_prog_free_id+0x190/0x190 [ 2654.756988][ T2851] ? __bpf_trace_bpf_trace_printk+0x20/0x20 [ 2654.762937][ T2851] ? bpf_prog_test_run_xdp+0x1/0xf10 [ 2654.768351][ T2851] ? dev_put+0x80/0x80 [ 2654.772483][ T2851] ? get_sigframe_size+0x10/0x10 [ 2654.777547][ T2851] ? perf_trace_run_bpf_submit+0x124/0x1c0 [ 2654.783550][ T2851] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2654.789847][ T2851] ? exit_to_user_mode_loop+0x3b/0x110 [ 2654.795514][ T2851] exit_to_user_mode_loop+0x70/0x110 [ 2654.800918][ T2851] exit_to_user_mode_prepare+0xee/0x180 [ 2654.806628][ T2851] syscall_exit_to_user_mode+0x16/0x40 [ 2654.812145][ T2851] do_syscall_64+0x58/0xa0 [ 2654.816687][ T2851] ? clear_bhb_loop+0x60/0xb0 [ 2654.821415][ T2851] ? clear_bhb_loop+0x60/0xb0 [ 2654.826379][ T2851] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2654.832416][ T2851] RIP: 0033:0x7f724c19cdd9 [ 2654.837027][ T2851] Code: Unable to access opcode bytes at 0x7f724c19cdaf. [ 2654.844155][ T2851] RSP: 002b:00007f724d0ef028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2654.852624][ T2851] RAX: fffffffffffffffc RBX: 00007f724c415fa0 RCX: 00007f724c19cdd9 [ 2654.860713][ T2851] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 2654.868869][ T2851] RBP: 00007f724c232d69 R08: 0000000000000000 R09: 0000000000000000 [ 2654.876944][ T2851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2654.885039][ T2851] R13: 00007f724c416038 R14: 00007f724c415fa0 R15: 00007fffe1eb7298 [ 2654.893133][ T2851] [ 2654.896194][ T2851] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 2654.903507][ T2851] CPU: 1 PID: 2851 Comm: syz.6.8489 Not tainted syzkaller #0 [ 2654.910924][ T2851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2654.921012][ T2851] Call Trace: [ 2654.924319][ T2851] [ 2654.927282][ T2851] dump_stack_lvl+0x188/0x24e [ 2654.932018][ T2851] ? memcpy+0x3c/0x60 [ 2654.936108][ T2851] ? show_regs_print_info+0x12/0x12 [ 2654.941361][ T2851] ? load_image+0x400/0x400 [ 2654.945945][ T2851] panic+0x2e5/0x730 [ 2654.949925][ T2851] ? bpf_jit_dump+0xd0/0xd0 [ 2654.954485][ T2851] __warn+0x2f8/0x4f0 [ 2654.958514][ T2851] ? perf_pending_task+0x358/0x470 [ 2654.963670][ T2851] ? perf_pending_task+0x358/0x470 [ 2654.968831][ T2851] report_bug+0x2ba/0x4f0 [ 2654.973244][ T2851] ? perf_pending_task+0x358/0x470 [ 2654.978411][ T2851] handle_bug+0x3a/0x70 [ 2654.982615][ T2851] exc_invalid_op+0x16/0x40 [ 2654.987267][ T2851] asm_exc_invalid_op+0x16/0x20 [ 2654.992165][ T2851] RIP: 0010:perf_pending_task+0x358/0x470 [ 2654.998018][ T2851] Code: ff 84 db 75 14 e8 e8 76 da ff 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d4 76 da ff e8 37 85 58 ff eb e5 e8 c8 76 da ff <0f> 0b e9 f3 fe ff ff e8 bc 76 da ff 48 c7 c7 10 2d bc 8c 4c 89 f6 [ 2655.017854][ T2851] RSP: 0018:ffffc90005fb78e0 EFLAGS: 00010293 [ 2655.023970][ T2851] RAX: ffffffff81a7fe88 RBX: ffff888062521658 RCX: ffff88802d8abb80 [ 2655.032110][ T2851] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 2655.040295][ T2851] RBP: 0000000000000001 R08: ffff88802d8ac583 R09: 1ffff11005b158b0 [ 2655.048580][ T2851] R10: dffffc0000000000 R11: ffffed1005b158b1 R12: ffff88802d8abb80 [ 2655.056592][ T2851] R13: ffff888051411960 R14: ffff888062521420 R15: 1ffff1100c4a4284 [ 2655.064618][ T2851] ? perf_pending_task+0x358/0x470 [ 2655.069789][ T2851] task_work_run+0x1d0/0x260 [ 2655.074435][ T2851] ? task_work_cancel+0x220/0x220 [ 2655.079499][ T2851] ? do_raw_spin_unlock+0x11d/0x230 [ 2655.084743][ T2851] do_exit+0x982/0x2480 [ 2655.088957][ T2851] ? put_task_struct+0x80/0x80 [ 2655.093773][ T2851] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2655.099816][ T2851] ? lock_chain_count+0x20/0x20 [ 2655.104731][ T2851] do_group_exit+0x217/0x2d0 [ 2655.109390][ T2851] ? lockdep_hardirqs_on+0x94/0x140 [ 2655.114633][ T2851] get_signal+0x1272/0x1350 [ 2655.119209][ T2851] arch_do_signal_or_restart+0xc4/0x1350 [ 2655.124890][ T2851] ? bpf_prog_free_id+0x190/0x190 [ 2655.129991][ T2851] ? __bpf_trace_bpf_trace_printk+0x20/0x20 [ 2655.135946][ T2851] ? bpf_prog_test_run_xdp+0x1/0xf10 [ 2655.141298][ T2851] ? dev_put+0x80/0x80 [ 2655.145419][ T2851] ? get_sigframe_size+0x10/0x10 [ 2655.150405][ T2851] ? perf_trace_run_bpf_submit+0x124/0x1c0 [ 2655.156304][ T2851] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2655.162511][ T2851] ? exit_to_user_mode_loop+0x3b/0x110 [ 2655.168027][ T2851] exit_to_user_mode_loop+0x70/0x110 [ 2655.173360][ T2851] exit_to_user_mode_prepare+0xee/0x180 [ 2655.179186][ T2851] syscall_exit_to_user_mode+0x16/0x40 [ 2655.184878][ T2851] do_syscall_64+0x58/0xa0 [ 2655.189344][ T2851] ? clear_bhb_loop+0x60/0xb0 [ 2655.194068][ T2851] ? clear_bhb_loop+0x60/0xb0 [ 2655.198789][ T2851] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2655.204735][ T2851] RIP: 0033:0x7f724c19cdd9 [ 2655.209185][ T2851] Code: Unable to access opcode bytes at 0x7f724c19cdaf. [ 2655.216250][ T2851] RSP: 002b:00007f724d0ef028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2655.224704][ T2851] RAX: fffffffffffffffc RBX: 00007f724c415fa0 RCX: 00007f724c19cdd9 [ 2655.232715][ T2851] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 2655.240729][ T2851] RBP: 00007f724c232d69 R08: 0000000000000000 R09: 0000000000000000 [ 2655.248995][ T2851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2655.257005][ T2851] R13: 00007f724c416038 R14: 00007f724c415fa0 R15: 00007fffe1eb7298 [ 2655.265044][ T2851] [ 2655.268443][ T2851] Kernel Offset: disabled [ 2655.272796][ T2851] Rebooting in 86400 seconds..