last executing test programs: 49m24.256753776s ago: executing program 32 (id=590): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r0}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x42124, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0xb5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x1, 0x0, 0x8, 0xfffffffffffffffe, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, &(0x7f0000000940)=ANY=[@ANYBLOB="18050000000000000000000000000000851000000600000018100000", @ANYRES32=r4, @ANYBLOB="00000000000000006600000000000000180000000000000000000000000000009500000000000000a60a000000000000180000002020782500000000002020207b0af8ff00000000bd510000000000000701000000feffffb702000008000000b700040000000000000000001900000095"], &(0x7f0000000000)='GPL\x00', 0x7, 0xdd, &(0x7f0000000340)=""/221}, 0x94) syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) close(0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000340)='8\']:#:*+\'-,!^]{*-{#)!&\x00') ioctl$TUNGETVNETLE(r5, 0x8004745a, &(0x7f0000000180)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) 47m20.879380894s ago: executing program 33 (id=1440): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 46m52.363931898s ago: executing program 3 (id=1625): bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x12, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000001000000000000000000000071182d000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @cgroup_sock_addr=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 46m52.13131235s ago: executing program 3 (id=1627): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000005a0000008500000022000000180100002020702500000000002020200100000000000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r4}, &(0x7f0000000280), &(0x7f0000000240)=r1}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) sendmsg$inet(r3, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 46m51.94666754s ago: executing program 3 (id=1629): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r5, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1, 0x0, 0x0, 0x6000}, 0x20) 46m50.97992088s ago: executing program 3 (id=1633): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040)}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) close(0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={r1}, 0x4) 46m50.805568069s ago: executing program 3 (id=1634): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x3, 0x2, 0x3, 0x0, 0xffffffffffffffff, 0x3}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x15, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000002000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000025000000850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000090000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x61800, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r2, r1, 0x6000}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000), 0x4) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x1, 0xf, &(0x7f0000000480)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1d}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000ac0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r9}, &(0x7f0000000000), &(0x7f0000000140)=r6}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001812", @ANYRES32=r9, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000002000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f00000000c0)=r10, 0x4) sendmsg$inet(r8, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x7fff}, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0xeb6, 0x80000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdd7}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[], &(0x7f0000000080)='GPL\x00'}, 0x94) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x2, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xffb2, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r11}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xb, 0x9, 0x0, 0x0, 0x2000}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc, 0x7}, {0x18, 0x2, 0x2, 0x0, r11}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 46m50.239115848s ago: executing program 3 (id=1640): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r0}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x42124, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0xb5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x1, 0x0, 0x8, 0xfffffffffffffffe, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, &(0x7f0000000940)=ANY=[@ANYBLOB="18050000000000000000000000000000851000000600000018100000", @ANYRES32=r4, @ANYBLOB="00000000000000006600000000000000180000000000000000000000000000009500000000000000a60a000000000000180000002020782500000000002020207b0af8ff00000000bd510000000000000701000000feffffb702000008000000b700040000000000000000001900000095"], &(0x7f0000000000)='GPL\x00', 0x7, 0xdd, &(0x7f0000000340)=""/221}, 0x94) syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) close(0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000340)='8\']:#:*+\'-,!^]{*-{#)!&\x00') ioctl$TUNGETVNETLE(r5, 0x8004745a, &(0x7f0000000180)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) 46m49.235056591s ago: executing program 34 (id=1572): socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r0}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r1}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xb, 0xff, 0x5, 0x7f, 0x1, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r2}, 0x50) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000580)='ns/pid_for_children\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='memory.stat\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x80}, 0x94) 46m35.149513953s ago: executing program 35 (id=1640): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r0}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x42124, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0xb5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x1, 0x0, 0x8, 0xfffffffffffffffe, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, &(0x7f0000000940)=ANY=[@ANYBLOB="18050000000000000000000000000000851000000600000018100000", @ANYRES32=r4, @ANYBLOB="00000000000000006600000000000000180000000000000000000000000000009500000000000000a60a000000000000180000002020782500000000002020207b0af8ff00000000bd510000000000000701000000feffffb702000008000000b700040000000000000000001900000095"], &(0x7f0000000000)='GPL\x00', 0x7, 0xdd, &(0x7f0000000340)=""/221}, 0x94) syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) close(0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000340)='8\']:#:*+\'-,!^]{*-{#)!&\x00') ioctl$TUNGETVNETLE(r5, 0x8004745a, &(0x7f0000000180)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) 46m11.437475767s ago: executing program 6 (id=1782): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000000000000000000000e300850000009e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x9, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0x60100200, 0x0, 0x0, 0x0, 0x0, 0x0) 46m10.587363642s ago: executing program 6 (id=1786): bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1e, 0x0, 0x2, 0xff}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 46m10.250547509s ago: executing program 6 (id=1790): perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r5, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1, 0x0, 0x0, 0x6000}, 0x20) 46m9.26731344s ago: executing program 6 (id=1796): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000180)="dffc69ab81d4bcf5247bc635203d377980be633fff9b38e6", 0x18}, {&(0x7f00000001c0)="5b91b97ad84d46c089ba74e0a004131a153a4ad9ee679008e4f482ce48d5c1a614ccc82075f2af7a162a4cbd3a8c7863b93be0027a9337a6702f86a908aa766a28e4b4afc253a46844eea1af24466598", 0x50}, {&(0x7f00000002c0)="cd39d5e20ee24ba1d90b36df1cf248d9de65da775a2043ab3297d4f249a624ff0bfcdf03804333881c5a20d4c7d0235a23205d4488903c94317f9b384e9714e509f498b65e7c8ea0bb0ef35d51166d6af6f0b9a2f83252ff004ec800513d7fcd24fb6796df53c5666bfa7353902e32ecdb1a32", 0x73}, {&(0x7f0000000380)="88da824cae8fa7741f5e14cfb40591801d07738738b1f1cfe9a04625b2753e4b2a4f88083419fc2ce27641b2891f760c7cf301f7f62fc33321dae3ebbc0593a35f602edd9af641a7ed7caf8eb20379976f00ffb08f8cf304bc528bdb810696e001747b67cee44d1d9b75aae907f9de358c9df302599205aec503b700f8a9027a8628a6e4d92efe7ec8e9b78e560e18769b7a925c5d3879c1dffa30300cee91ffc4e2f1fc4135e9d6ec6624aaf137aa376745f9ef738a11b9a07e4098c9603e6f8be6c377b4773ca47ea0100a8fc905683b541d8ec24ed411eed293bc118cd97dd4", 0xe1}], 0x4, &(0x7f0000000500)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff7f67}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x400}}], 0x30}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x2, 0x0, 0x0, 0x0, 0x63, 0x11, 0x8f}, [@ldst={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}], {0x95, 0x0, 0x74}}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000007112cd000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000300)=r0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 46m4.719265466s ago: executing program 6 (id=1808): socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socket$kcm(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xb}, 0x210, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socket$kcm(0x10, 0x2, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x98}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$inet(r3, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00'], 0x30}, 0x0) 46m4.362768025s ago: executing program 6 (id=1811): syz_clone(0x61801680, 0x0, 0x1f, 0x0, 0x0, 0x0) write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x200000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0xc, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x25, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 45m49.231510482s ago: executing program 36 (id=1811): syz_clone(0x61801680, 0x0, 0x1f, 0x0, 0x0, 0x0) write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x200000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0xc, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x25, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 45m18.648052773s ago: executing program 9 (id=1849): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r0}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r1}, 0x38) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x11, 0x5, &(0x7f0000000340)=ANY=[], 0x0, 0x0, 0x33, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffff6}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x7f, 0x0, 0x0, 0x7602, 0x7f, 0x80120, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x8, 0x5, 0x200, 0x2, 0x3, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x5) socketpair$nbd(0x1, 0x1, 0x0, 0x0) close(r2) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x201, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000780)=ANY=[], &(0x7f0000000200)='syzkaller\x00'}, 0x94) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000300)=r4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x143842, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNGETVNETBE(0xffffffffffffffff, 0x800454df, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) 45m3.412858885s ago: executing program 37 (id=1849): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r0}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r1}, 0x38) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x11, 0x5, &(0x7f0000000340)=ANY=[], 0x0, 0x0, 0x33, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffff6}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x7f, 0x0, 0x0, 0x7602, 0x7f, 0x80120, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x8, 0x5, 0x200, 0x2, 0x3, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x5) socketpair$nbd(0x1, 0x1, 0x0, 0x0) close(r2) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x201, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000780)=ANY=[], &(0x7f0000000200)='syzkaller\x00'}, 0x94) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000300)=r4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x143842, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNGETVNETBE(0xffffffffffffffff, 0x800454df, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) 44m29.152301668s ago: executing program 4 (id=2112): socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socket$kcm(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xb}, 0x210, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socket$kcm(0x10, 0x2, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x98}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$inet(r3, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00'], 0x30}, 0x0) 44m27.58019175s ago: executing program 4 (id=2114): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80460, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46a, 0x1, @perf_bp={0x0}, 0x81, 0x3, 0x0, 0xbb68c6b7e07d1536, 0x1, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_config_ext={0x0, 0x7fff}, 0x11400, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@enum={0x4, 0x1, 0x0, 0x6, 0x4, [{0x2}]}]}, {0x0, [0x0, 0x41, 0x2e, 0x61]}}, &(0x7f0000000400)=""/188, 0x32, 0xbc, 0x1}, 0x28) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4) socket$kcm(0x2, 0x3, 0x84) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x2, 0x8, 0x9, 0x0, 0x6, 0x0, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x2000, 0xff, 0x9, 0x0, 0x4, 0x1461, 0x1, 0x0, 0x3f8, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000b00)={0x2, 0x4e20, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000001480)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1ff}}, @ip_retopts={{0x78, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x1b, 0x0, 0x4, [0xfe50]}, @lsrr={0x83, 0x13, 0x98, [@multicast2, @multicast2, @local, @multicast1]}, @end, @timestamp={0x44, 0x20, 0x84, 0x0, 0x4, [0x1, 0x3, 0x80, 0x330, 0x8, 0x2, 0xfff]}, @generic={0x82, 0x2}, @cipso={0x86, 0x1d, 0x3, [{0x1, 0x8, "369a53d71102"}, {0x2, 0xb, "d5aaac2132f160583e"}, {0x0, 0x2}, {0x6, 0x2}]}, @ssrr={0x89, 0xb, 0x96, [@local, @loopback]}, @end]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0xb9, [@private=0xa010102]}, @ra={0x94, 0x4}, @generic={0x44, 0x2}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}], 0xe0}, 0x40000) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r2, 0x20, &(0x7f0000000100)={&(0x7f00000000c0)=""/23, 0x17, 0x0, &(0x7f00000005c0)=""/123, 0x7b}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0xc, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x10000009}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000340)="c1dfb080cd21d308098ee688b5c6", 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r5 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0xe, &(0x7f0000000040), 0x3b) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x0, '\x00', 0x0, r2, 0x5, 0x3, 0x3}, 0x50) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28e9, 0x0, @perf_config_ext={0x1, 0xc7d2d38}, 0x4110, 0x0, 0x0, 0x5, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r7, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) 44m22.980504949s ago: executing program 4 (id=2116): r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f00000024c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, 0x0, 0x0) socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x53, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x1, @perf_config_ext={0x3d95, 0xffffffffffffffff}, 0x400, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x4000008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0xd, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0xd}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f00000006c0)='@', 0x1}], 0x1, 0x0, 0x18}, 0x41) setsockopt$sock_attach_bpf(r0, 0x84, 0x7c, &(0x7f0000000000), 0xc) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf20000000000000070000000f0000003d030100000000009500ffb1000000006926000000000000bf6700000000000036000b000fff52004507000015300000d60600000ee60ee6bf050000000000003d63000000000000650700000200000007070000fbffffff1f75000000000000bf54000000000000070000000410f900bd430100000000009500000000000000050000000000000095000000000000001c15a3ce747c693a74b62fd0758b15f09429c09074bc4b2bd2dc480dd7a064b8673e2060162cc43bcba1060999eef9d60bb39d0af449deaa27ea949e8f9000d885deea2783835e29eba8546fc020c1966f8b5f32b095f566edf66b7751828da9dbd5b996b9e8d897e461c01c697671d100000000400036c17fb01dde179c1f26cac1c7b21bde7d1a55d6ebe700b3be005e47ef55e0dd81244b18590e000000000000356d82e43407a6d7fa94b21002f06cd247b126b6349ab62d7b07ba0a71a72145edade9941f49f300a8c8913e0e4ea9e4c77740ab3312edee62a4dc2fc85755d387d8a1bc8eb71fbe11b2216cc8d1f0160c237d929b49d828724b95555b459f4763c6222175c974be2f76fb5f330b015a68587a75c013000000000000000000000003000000000000d6ddc46e58eff8f4fbadfc6a3af8123b7f4240713a4c0cdc9d7820c4eb67cc0f8b5fe9258eeacb5776aebbab3d5c55020000006082778366dadfc36029633e0514cbcee1f3928970bde148c940434f33acd377cbad17673b2d30b6339255c98eba97efb4e9ac1f11be815dd6045592edcbee7f253ec74c7c1313505bd7ff8fd58b3a6569c91dbdef1df585aeaea7346a2a65caee5c85f9eddeeeee3c8a2e523c864ac430eb47cb4d0c8767b9d4125661b5a1a170c04b64da3a99ddb93bf14fae3ca2d1e882375b8dbac83978e136c34f90b33cc0eeb57debcfe26589efc08125d5d62a7e593c9738a50171adf051ea4f07e7e7e770c2016eeacbe8511afffffbea75759a1ea5404f5453c0b5c46c9700808c096cf8cf5223f341cbea3841b5cd224c1b381d56afebe9f99a00e3cd94dc0bb7af9e8709db487cc4d9b3b96723d69d512ddd57b0dee9b9f6ae80a502cce352098603e77f9ecced07fa25e99e9e415414c91f8bfd1c150570512f26c4ee34a64c131dce3800000000000000006c86287945bd8d258442870e000000000000000000000000f7e6a10de4bf7369b0d5b5373829b09bf5b7b34099b27ac7770fca449d4c4ca15f88b588b2429af2e1d1a4e1fa44cb80fcfae6e50d7e5b4675d7e0be706224f34e6eed553b40e2b897e73752fc7d1e4b0f4c5967eefd7448d5fde5841fa464a67267c631052bd7333769a4b8d19d4794357edce762e8136ab9d7ed34a72baffd849b90579b96b3"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000a80)) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000fc0)={0xffffffffffffffff, &(0x7f0000000ec0)}, 0x20) sendmsg$kcm(r1, &(0x7f00000000c0)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x3, @remote, 0x5, 0x3}, 0x80, 0x0}, 0x2600c055) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000840000000400000002"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r2, &(0x7f0000000140), &(0x7f0000000000)=""/6, 0x2}, 0x20) r3 = socket$kcm(0x11, 0x2, 0x0) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r4, 0x107, 0x12, &(0x7f00000000c0)=r3, 0x8) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x4}, 0x0, 0x0, 0x0, 0x8, 0x2, 0xfffffffc}, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x100) 44m20.07682343s ago: executing program 4 (id=2122): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="020000000400000008000000"], 0x48) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0xcdd, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x5, 0x80, 0xff, 0x0, 0x40, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x85a, 0x4}, 0x0, 0x7b, 0x8, 0x8, 0x1, 0x0, 0x82, 0x0, 0x7, 0x0, 0xa}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x1e, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000080000850000002d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xd, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @sock_ops}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000100)={r2, r0}, 0xc) perf_event_open$cgroup(&(0x7f00000002c0)={0x3, 0x80, 0x0, 0xb6, 0xd, 0xf2, 0x0, 0x3, 0x80, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x102000, 0x7fffffffffffffff, 0x1, 0x2, 0xf, 0x5, 0x7, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x35, &(0x7f00000005c0), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)=ANY=[], 0x50) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[], 0x0, 0x37, 0x0, 0x0, 0x1}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000080)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@map=r0, 0x2b, 0x1, 0x8, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xc, 0x0, 0x0, &(0x7f0000000380), &(0x7f0000000180)=[0x0, 0x0]}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) 44m19.540127378s ago: executing program 4 (id=2123): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80460, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46a, 0x1, @perf_bp={0x0}, 0x81, 0x3, 0x0, 0xbb68c6b7e07d1536, 0x1, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_config_ext={0x0, 0x7fff}, 0x11400, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x4, 0x1, 0x0, 0x6, 0x4, [{0x2}]}]}, {0x0, [0x41, 0x5f, 0x61]}}, &(0x7f0000000400)=""/188, 0x31, 0xbc, 0x1}, 0x28) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4) socket$kcm(0x2, 0x3, 0x84) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x2, 0x8, 0x9, 0x0, 0x6, 0x0, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x2000, 0xff, 0x9, 0x0, 0x4, 0x1461, 0x1, 0x0, 0x3f8, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1ff}}, @ip_retopts={{0x78, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x1b, 0x0, 0x4, [0xfe50]}, @lsrr={0x83, 0x13, 0x98, [@multicast2, @multicast2, @local, @multicast1]}, @end, @timestamp={0x44, 0x20, 0x84, 0x0, 0x4, [0x1, 0x3, 0x80, 0x330, 0x8, 0x2, 0xfff]}, @generic={0x82, 0x2}, @cipso={0x86, 0x1d, 0x3, [{0x1, 0x8, "369a53d71102"}, {0x2, 0xb, "d5aaac2132f160583e"}, {0x0, 0x2}, {0x6, 0x2}]}, @ssrr={0x89, 0xb, 0x96, [@local, @loopback]}, @end]}}}, @ip_retopts={{0x1c, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0xb9, [@private=0xa010102]}, @generic={0x44, 0x2}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x5}}], 0xe0}, 0x40000) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r2, 0x20, &(0x7f0000000100)={&(0x7f00000000c0)=""/23, 0x17, 0x0, &(0x7f00000005c0)=""/123, 0x7b}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0xc, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x10000009}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000340)="c1dfb080cd21d308098ee688b5c6", 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r5 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0xe, &(0x7f0000000040), 0x3b) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x0, '\x00', 0x0, r2, 0x5, 0x3, 0x3}, 0x50) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28e9, 0x0, @perf_config_ext={0x1, 0xc7d2d38}, 0x4110, 0x0, 0x0, 0x5, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r7, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) 44m18.17100495s ago: executing program 4 (id=2128): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80460, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46a, 0x1, @perf_bp={0x0}, 0x81, 0x3, 0x0, 0xbb68c6b7e07d1536, 0x1, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_config_ext={0x0, 0x7fff}, 0x11400, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x4, 0x1, 0x0, 0x6, 0x4, [{0x2}]}]}, {0x0, [0x41, 0x5f, 0x61]}}, &(0x7f0000000400)=""/188, 0x31, 0xbc, 0x1}, 0x28) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4) socket$kcm(0x2, 0x3, 0x84) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x2, 0x8, 0x9, 0x0, 0x6, 0x0, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x2000, 0xff, 0x9, 0x0, 0x4, 0x1461, 0x1, 0x0, 0x3f8, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)}, 0x40000) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r2, 0x20, &(0x7f0000000100)={&(0x7f00000000c0)=""/23, 0x17, 0x0, &(0x7f00000005c0)=""/123, 0x7b}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0xc, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x10000009}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000340)="c1dfb080cd21d308098ee688b5c6", 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r5 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0xe, &(0x7f0000000040), 0x3b) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x0, '\x00', 0x0, r2, 0x5, 0x3, 0x3}, 0x50) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28e9, 0x0, @perf_config_ext={0x1, 0xc7d2d38}, 0x4110, 0x0, 0x0, 0x5, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r7, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) 44m2.689028635s ago: executing program 38 (id=2128): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80460, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46a, 0x1, @perf_bp={0x0}, 0x81, 0x3, 0x0, 0xbb68c6b7e07d1536, 0x1, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_config_ext={0x0, 0x7fff}, 0x11400, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x4, 0x1, 0x0, 0x6, 0x4, [{0x2}]}]}, {0x0, [0x41, 0x5f, 0x61]}}, &(0x7f0000000400)=""/188, 0x31, 0xbc, 0x1}, 0x28) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4) socket$kcm(0x2, 0x3, 0x84) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x2, 0x8, 0x9, 0x0, 0x6, 0x0, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x2000, 0xff, 0x9, 0x0, 0x4, 0x1461, 0x1, 0x0, 0x3f8, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)}, 0x40000) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r2, 0x20, &(0x7f0000000100)={&(0x7f00000000c0)=""/23, 0x17, 0x0, &(0x7f00000005c0)=""/123, 0x7b}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0xc, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x8}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x10000009}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000340)="c1dfb080cd21d308098ee688b5c6", 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r5 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0xe, &(0x7f0000000040), 0x3b) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x2, 0x0, r2, 0x0, '\x00', 0x0, r2, 0x5, 0x3, 0x3}, 0x50) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28e9, 0x0, @perf_config_ext={0x1, 0xc7d2d38}, 0x4110, 0x0, 0x0, 0x5, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r7, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) 37m53.555187059s ago: executing program 2 (id=3782): bpf$MAP_CREATE(0x0, &(0x7f0000001380)=@base={0xf, 0x4, 0x8, 0x1}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000002000000000000000000000085000000870000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000009b00000095000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000001c0)={&(0x7f0000000080), 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, 0x4}, 0x38) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0xfffffd26) 37m52.213959648s ago: executing program 2 (id=3789): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4800, 0x2, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r0, 0x20, &(0x7f00000002c0)={&(0x7f0000000080)=""/73, 0x49, 0x0, &(0x7f0000000240)=""/110, 0x6e}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x4, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000071183d000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)='%pB \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x1f, 0xe4e7, 0x795f000, 0x44, 0x8801, r1, 0x7, '\x00', r2, r0, 0x1, 0x5, 0x1, 0x0, @value=r0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x105082, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000580), 0x5}, 0x111be0, 0x7ffe, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x4b, 0x0, 0x1300) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000140)="d800000018007b29e00212ba0d8105040a601800fe0f040b067c55a1bc000900b80006990600000015000500fe800000000000000300014002000c0901ac04000bd67f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5", 0x5f}, {&(0x7f0000000780)="6144c338abfb60e94f608498bd0e32960c945aed3bc143d3f34fdbc3a3105cce44aa66696ef36edf4b8c25d7b3c8c3043d7f8028d026744b475b8bdd6abc194e74e30f789f6aa9fb3f91c2834187309b03813bd071b84dc58d6fb09360a845326960d8415c09d1d96109006569d7f5a557e906c41bb3910b63", 0x79}], 0x2, 0x0, 0x0, 0x2663}, 0x50000) 37m50.818411631s ago: executing program 2 (id=3791): close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x2, &(0x7f0000000100)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xc}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x65, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x97ee657e03f9ef42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x12228, 0x0, 0x800, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc4201100, 0x0, 0x0, 0x0, 0x0, 0x0) 37m41.781946221s ago: executing program 2 (id=3803): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x24, 0x0, &(0x7f0000000500)="b9ff03076804268cb89e14f088a847e0ffff2000600000010000ac141416e000000129a1", 0x0, 0x2800, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x1, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x5, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1c, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r4 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r4, &(0x7f00000010c0)={&(0x7f0000000140)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000480)='\\', 0x1}], 0x1}, 0x4000040) r5 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="39000000120081ae10003c000500018311001f9f660fcf066505acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) sendmsg$inet(r4, &(0x7f00000002c0)={&(0x7f0000000000)={0x2, 0x4e21, @rand_addr=0x64010101}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000180)="84", 0x1}], 0x1}, 0x8040) close(r4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0xe, &(0x7f0000002300)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040)}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000008c0)={r6, 0x18000000000002a0, 0xa3, 0x0, &(0x7f0000000940)="d23dcc69b39dd4a578fb6e98b41ec1e2e601e08250298c01784738ef54c9cf634f19f4190debc0e80dee9e45a4659584e78dd58b71d71e6c720d2ca18ded1607ac4b5082760e7f0cd1368d235f1f8620622f22cff4130d21ef804b680634e14bdb6d07b9dd88b2714a5252ae175d9fef16744c2187c40b9bf29a910400022c10eacd0415145d2cd36a15a78b845df658ba8100"/163, 0x0, 0xfe6, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x1d) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000080)="2e00000010008188040f46ecdb4cb9cca7480ef431000000e3bd6efb010509000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) 37m38.620121516s ago: executing program 2 (id=3807): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) socket$kcm(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) socket$kcm(0x23, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x959, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x64, &(0x7f0000000000)=r4, 0x10) sendmsg$inet(r1, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xffc0}], 0x1}, 0x80d1) 37m37.465624495s ago: executing program 2 (id=3809): close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x2, &(0x7f0000000100)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xc}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x65, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x97ee657e03f9ef42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x12228, 0x0, 0x800, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc4201100, 0x0, 0x0, 0x0, 0x0, 0x0) 37m22.302491054s ago: executing program 39 (id=3809): close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x2, &(0x7f0000000100)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xc}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x65, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x97ee657e03f9ef42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x12228, 0x0, 0x800, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc4201100, 0x0, 0x0, 0x0, 0x0, 0x0) 13.135067929s ago: executing program 0 (id=13319): socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="1c0000001e0081054e81f782db02", 0xe}], 0x1}, 0x804) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000b80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="1400000035000b45d30000000000000001d25a80", 0x14}], 0x1}, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) sendmsg$inet(r2, &(0x7f0000000b40)={&(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000a40)=[{&(0x7f0000000500)="51019609e0d36e5fdd67b84f58c3400662a48c8ce5ba395e3b7bfa6634c87ed5148e18abfd785d0d684541c592d78480904dc035ebfea8e93ac3d444cf51b05ac974d64aedfeef1c3950532d40d4751561c5a7299f34f87db968576e0db811fed7b9050fdbc1c4a8ef427fd027f1991e15f0af97e7f35735e678959135", 0x7d}, {&(0x7f00000006c0)="c4d4c175ada8e889530aa65a81d5cb17d3bf31f1a887f765ca8b5639549e5ae4af48806c058955a978e2ca8c6079d618377e1fa3827a8bea50479ca82d8f2d2b3d62d6ae069647033d52a9c3a636d3a2f1f2c222315b6a2b41f854fe1fab001e30667958a42a1c1d95e1b1d4c61eda612b6c292b037e5d4613d9a669b924d8bbd031e1ec1c53", 0x86}, {&(0x7f0000000840)="1adbe2c725622c00fff9efe1b23a2a2e3c61874739186c9a9743e0787ed05d3ac19fa2b0e38898029d6d48d83e5d7c9c4ca433115ca133075f9376dda8dc28456c8eb0f65d760636cbabf03080a90703c6f322a3024a055ee0cb8f80a86d4355a03f7017d4ca6a585267a59b7d69a3702c769295f2243fe08af1eac7d6618ffd5ebde69692b4a1a1c5b105dad09921a4e9617cdb4043dd64e79a2041ce0263b06959db744c4941178d38efd9e436b9c96ef226a73df62208dc36c7b75715988d37f41c74ebe4", 0xc6}, {&(0x7f0000000940)}, {&(0x7f0000000c40)="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"/347, 0x15b}], 0x5, &(0x7f0000000ac0)=[@ip_retopts={{0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x11}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x200}}], 0x48}, 0x804) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000011c0)=ANY=[@ANYBLOB="1800000000000000000000000000200018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000fdffffff850000007100"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0x8, 0x8, &(0x7f0000000580)="0000ffffffffa000", &(0x7f0000000340)=""/8, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d080006067c09e8fe55a10a0015400400142603600e120800067c00001001a8001600a400034003", 0x39}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)=@rxrpc=@in4={0x21, 0x1, 0x2, 0xffffffffffffff7a, {0x2, 0x4e23, @multicast2}}, 0x80, 0x0}, 0x4004090) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)="d800000010008104685fa3aa7143a0f8c81ded0b25000000e8fe09a118001500060014ea000000120800030043000040a8002b000a00", 0x36}], 0x1}, 0x20000880) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfe33) write$cgroup_subtree(r4, &(0x7f0000000040)={[{0x2b, 'cpu'}]}, 0x5) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63f580fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r8, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) 11.195090312s ago: executing program 1 (id=13325): r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000047000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a876d839240d29c035055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7e8dc34f17e3946ef3bb622e03b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bb44b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334583239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd713089856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bf4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff22dc508afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd360000000000000000ae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae526aca54183fb01c73f979ca9857399537f5831808b0dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c97a088a22e8b15c3e233db00002e30d46a0024d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e4845535a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c29c5c0ed5bcdf510c3c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9003f07000099d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ced92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f68fa8d7c2dfb28e1f05e46b0933c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d588afd80e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda6900002a070886df42b27098773b45198b4a34ac97febd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d63521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a8639034a75f4c7df3ea8fc2018d07afef12ef060cd4403a099f32468f658000b4082d43e12186195cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea209b53b230ef0f2ab85cbdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bd3339403004b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab900000000000000000000d71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdbf24a0c5441ce046078492b53467cfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89cb349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce1d9bc7ef3e3f40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb15f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c00c57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137df47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b558982016b0679b5d6fccbecfae5553d9950d48c774eaa35b24fce69a20d8b49e3d0168bf7eac90529cd6af061c9e53addddc620ce73c5d177e3d097159f2768636fc10276c6a0adc57483b3f7083f66b87ef296ee85a3009a5d30f479e293a3302e11350ea857b37e76ca3f50378e4092ce2c574ad278b9b7b717c571afb2077b019fd9d89efd59b41f051ec5a8ff87ecc8df917a1e386d849fcd10e2f9ca52e02339c2f4666b0c8ffe0d508dcee3070e8b42ac38545e25f1cd62421c28d25994be0cff7271a0dee38d7ac4ac736b090e1d29f98117919472b61b20026d7e646174b55d251f7f8ca5ccc22a5efb33b217eff5597a3c3a5f3a9bb54abb40e54593e1a7ce4cfa17b3c3fe91c06363496341eae20dcc59b6179b32ddddef5c34000096a54c0c571a91878f61f74912e2299e5501d4d6943bfd74c856511726f0ac8f7d17f1c6b4451c1bcdc6b6e1700e4cd87709d97afc5423c96fa981873d4369b04bbf1fb9f68f17991540868e408201ad1a74179e489aa61f021a437a3fa935588be2068f7ff9b253106326fde795e530b93626cc68e06e602198724249b4444e69902e4d8f5da4e94cc36794258fd4032de7ab36bc24000000000000000000000000000000000000cd3211b3842b68a4eddca2eae28529e97a98d7ec3fd902df1ba8fc2ad2377e72d4e7aeacbbccef5614cd965511558f40720025c022bc9c213e407f6bc4b673c55aa8e729299a37fd6339acd906ac861ba56c9fa9b8b12b5e68a3cdadb906355e1f1d336a243172affe50d0fb36c3718a7498eed3d398f405a34d494414e87ef1ce1845510d43d00171d6b4b762f89564c22d542a119878709cd6822c3a3eb47a849b0737929fe9e1eecd1bff5a2b9880e2a6d8a3b3b7e88a673c96cda4455eff1c530db0e6598a2686aa09aeaf0f1aed95aeb8b0a2cc5ca31c0f56285cc05f7090a0e0583cf540d18cd8817e685c7b4ff176178ac1234f23e54445ec20b2689832d78409897a0307e89ebcd5f4ba042a3d10237a5a8a9a6eda36d2f337dc54537b80e8433341b135b4c5bb0173ffde46ccd260e1d4f2c51e8b07bb256f1317912cb1fc9e491e0bb9109e475cc795c23ad9f4f0042c5e9c655a4d865bc4a266e6a1d3d2b7ee53be9efb33a98933b5ba74ee3ac8d34b6af8c1fdbffade3abc80842b74354162f5b994ab5254cb068bc5e2ae242a1d37d0d49947c9317fa1a46c9e259ce0e1f9db992c53f7830a5e8f4fac6b187eb9f15ba61f730f86d7d7b63bbc7a1d9ff37e87a90a14e0655304da069f9009b62717649b6c6af94fcba713f8ee6fcce25aef44d009966614b61be9369ffc589a79051b0a0000000000000003ebd34c41afe268c33c9322c3a783772aec998f51a6e70fb932a8019e72ef5ab127bb30c79ebfd867441083546305fb39449c40a166ea389a6b77b7c87f66e8bf5806726b8fc50b943627314803a12c33312dce0a10f852da3e000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0x1c, 0x0, &(0x7f0000001280)="b9ffddc1ddcccdde75537d53888edfff70bf2dfe443b1b5e2a908137", 0x0, 0x3, 0x60000009, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e00000010008188040f80ec59acbc0413a1f848110000005e1406", 0x1b}], 0x1}, 0x8084) r2 = socket$kcm(0x10, 0x2, 0x10) socket$kcm(0xa, 0x3, 0x73) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000012000000000000000000"], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r3, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xc, 0xffffffffffffd059}, 0x0, 0x2000003, 0x0, 0x5, 0x0, 0x48e7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xdf1203a3, &(0x7f0000000080)=[{&(0x7f00000000c0)="0901020028000b05d25a806f8c6394f90224fc600d00030009000100ff3582c137153e370248018010000000d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000100)=@qipcrtr={0x2a, 0x4, 0x7fff}, 0x80, &(0x7f0000000500)}, 0x0) r4 = perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x1, 0x9, 0x8, 0xc5, 0x0, 0x7fff, 0x80440, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x4, @perf_bp={&(0x7f00000001c0), 0xc}, 0x2052, 0x0, 0x7fffffff, 0x2, 0x2, 0x3e27, 0x80, 0x0, 0x96, 0x0, 0x100}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x2, 0x9, 0x81, 0xf, 0x0, 0x4, 0xcdcd322fef762636, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x298, 0xe99a}, 0x11040, 0xb09800000, 0xffffff49, 0x4, 0x7, 0x960e, 0x0, 0x0, 0x2, 0x0, 0x9}, 0x0, 0x0, r4, 0xa) r5 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB='-netXprio\x00-perf_event '], 0x16) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) openat$cgroup_devices(r6, &(0x7f0000000200)='devices.deny\x00', 0x2, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={r7}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r8, 0x0, 0xb, 0x0, &(0x7f0000000600)="3d25ff005b19c4cbe60170", 0x0, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 11.117581036s ago: executing program 0 (id=13327): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x24, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r0, &(0x7f0000000080)={'c', ' *:* ', 'rw\x00'}, 0x9) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x7fff, @local, 0x8}, 0x80, &(0x7f0000000340)=[{&(0x7f00000003c0)='`', 0x1}], 0x1}, 0x41) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_config_ext={0xff, 0x4}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x1000009, 0x8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x3, 0x3, &(0x7f0000000a80)=@framed={{0x18, 0x0, 0x5}}, &(0x7f0000000b40)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[0xffffffffffffffff]}, 0x94) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7ff0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x2, @perf_bp={0x0, 0x4}, 0x14105, 0x2e, 0xfffffbdf, 0x3, 0x6, 0x200, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) recvmsg(r3, &(0x7f0000002700)={&(0x7f0000000400)=@generic, 0x80, 0x0}, 0xc0) openat$cgroup_ro(r5, &(0x7f00000002c0)='blkio.bfq.time\x00', 0x26e1, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='notify_on_release\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @generic={0x66}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28}, 0x94) syz_clone(0x80001000, 0x0, 0x0, &(0x7f0000000680), 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000680)="5c00000015006b0300224ed86e6c1d00", 0x10}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 10.880815099s ago: executing program 8 (id=13328): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x24, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r0, &(0x7f0000000080)={'c', ' *:* ', 'rw\x00'}, 0x9) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x7fff, @local, 0x8}, 0x80, &(0x7f0000000340)=[{&(0x7f00000003c0)='`', 0x1}], 0x1}, 0x41) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_config_ext={0xff, 0x4}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x1000009, 0x8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x50) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x3, 0x3, &(0x7f0000000a80)=@framed={{0x18, 0x0, 0x5}}, &(0x7f0000000b40)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[r4]}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r5, 0x20, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000dc0)=""/4096, 0x1000}}, 0x10) socket$kcm(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7ff0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x2, @perf_bp={0x0, 0x4}, 0x14105, 0x2e, 0xfffffbdf, 0x3, 0x6, 0x200, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f00000002c0)='blkio.bfq.time\x00', 0x26e1, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='notify_on_release\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @generic={0x66}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28}, 0x94) syz_clone(0x80001000, 0x0, 0x0, &(0x7f0000000680), 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000680)="5c00000015006b0300224ed86e6c1d00", 0x10}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 10.410982824s ago: executing program 1 (id=13329): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000840000000400000002"], 0x50) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000600)="5c00000013006bcd8e3fe3dc4e48aa31086b8703300000001f00000000000000040014000d002900070100009ee537d34460bc08eab556a705251e8e6182949a3651f60a84c9f5d1938837e779a6d0bdd735310e4509c5bb5a00f698", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000000400000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) r5 = socket$kcm(0xa, 0x2, 0x3a) recvmsg(r5, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x40010040) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000560013f16ff28e036afc004a07"], 0xfe33) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)="89000000120081ae08060cdc030000017f03e3f7000000006ee2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c0001000b080c00bdad01409bbc7a46e39a8285dcdf12176679df069163ce947ee2b49e33538afaeb2713f450ebd010a20ff27fff0000000000000000", 0x89}], 0x1}, 0xff0f000000000000) recvmsg$kcm(r6, &(0x7f0000001340)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, 0x0}, 0x0) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000900)=ANY=[@ANYBLOB="9feb01001800000000000000b4000000b4000000020000000800000001000004010000000f0000000100000009000000000000000000000300000000010000080400000004000000020000000000000a0400000008000000020000043e0600000700000004000000ff0300000700000081000000040000000000000000000003000000000200000002000000010000801000000004000085080000000b00000002000000b1ab00001000000002000000060000000800000004000000a00800000a00000002000000988c00000000"], &(0x7f0000000280)=""/154, 0xce, 0x9a, 0x1, 0x400}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="1700000002000000000000000000000081200000", @ANYRES32=0x1, @ANYBLOB="0300"/20, @ANYRES32=r3, @ANYRES32=r7, @ANYBLOB="04000000030000000500000000000000000000000000000000000000597522bd02ea627280674c9ea592dc16b6776dd6133408d04adce781dfa82b7987b7aec23837df45db6d9125ca3e5939e74907bc1ffce24165b9db690dd4bfd1244d73afbfa755fca10383cfd27199cc06893b91c091f8deea02f9482f8c50b320ca7907dcc3ed6aeefdf7e4d783f498f7a08dd9a430bd71e9b0d0973f6e04875de5b958ca7eb28485247a0ff366052a31e19682a2100c48e94fb58fc1103b7a2366e8e0"], 0x50) r8 = perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0x1, 0x4, 0x0, 0xc4, 0x0, 0x2, 0x18120, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20b, 0x2, @perf_config_ext={0x2, 0x2}, 0x220, 0x3, 0x2bcae747, 0x3, 0x6, 0x4, 0xff4, 0x0, 0x7, 0x0, 0xe62}, 0xffffffffffffffff, 0x1000000000000d, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ID(r8, 0x80082407, &(0x7f0000000480)) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0xb4) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x6a, 0xfc, 0x1, 0x9, 0x0, 0x6, 0x300, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000001c0), 0x4}, 0x358, 0x2, 0x7fffffff, 0x8, 0x1000, 0x8, 0x0, 0x0, 0x50000, 0x0, 0xfffffffffffffff9}, r9, 0x10, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r2}, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r0}) 9.864851633s ago: executing program 5 (id=13330): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_clone(0x4010000, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000440)="df1b4d05d23380af6b680ec5db2eb92ef3712effab4d9c6327794c66b29efe2c3fb432db2cd73fbb65be0830a3749d24a9819c8b3ff0c8817e6387be82eb68d5e2c414f08f62ed367af6fb5b06310d1b4e81ce584e6d83e242a93dbe8098bb274f87b71c067194de30420c21c8acf41bcd87c733f3427348c8d5d4f57bb4205d94662a331175caa0d0966a1a1beede71670e44e2ea76b6bef84f") perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x3e, 0xfc, 0x0, 0xbd, 0x0, 0x40, 0x42, 0xa, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1000, 0x5, @perf_bp={&(0x7f0000000080), 0x6}, 0x941, 0xf, 0x7, 0x9, 0x4, 0xdc, 0x4, 0x0, 0xff, 0x0, 0x100}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x23}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7}, 0x48) 9.271735395s ago: executing program 7 (id=13331): socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x2, 0x3, 0x106) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xec, 0x0, 0x0, 0x1, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f00000004c0), 0x2}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x8, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x81}, 0x100c, 0x7, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x10e, 0xa, &(0x7f0000000000), 0x4) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000720000001801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xffffffffffffff7e) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x41, 0x0, 0x11}, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x64, &(0x7f0000000000)=r5, 0x10) sendmsg$inet(r2, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xffc0}], 0x1}, 0x80d1) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10, 0x0}, 0x40040d4) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000000), 0x10) close(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8927, &(0x7f0000000080)) r6 = socket$kcm(0x2, 0x3, 0x106) sendmsg$inet(r6, &(0x7f0000000040)={&(0x7f0000000380)={0x2, 0xfffd, @remote}, 0x10, &(0x7f0000000c00)}, 0x8400) 8.750656113s ago: executing program 5 (id=13332): r0 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="364000001a00913a"], 0x82d7) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x6, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000002200)=""/4096, 0x7ffff000}, {&(0x7f0000003200)=""/4073, 0xfe9}], 0x2}, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x28) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x1003}, 0x38) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x4, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ethernet={0x1, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="345cf24eadae346260f6a1973044b351be14acb5508a002bde9c1eb7946d0e5b5a3c2a5e146827ed9cc348566b7305bfb536ca26fe3b84ccfb28eef001709dc4", 0x40}], 0x1, &(0x7f00000001c0)}, 0x8011) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x8, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000050000000000000080000000850000007500000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, 0x0) sendmsg$kcm(r3, 0x0, 0x0) socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x46, 0x4, 0x8, 0x7, 0x0, 0xa, 0x18208, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffb, 0x4, @perf_config_ext={0x51, 0x4}, 0x1, 0x3, 0xffffffbd, 0x4, 0x10000, 0x7, 0xfff8, 0x0, 0x9}, r6, 0x1, 0xffffffffffffffff, 0x18) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 8.748623663s ago: executing program 8 (id=13333): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000040)='syz1\x00', 0x1ff) openat$cgroup_ro(r1, &(0x7f0000000000)='freezer.state\x00', 0x0, 0x0) recvmsg(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000680)=""/140, 0x8c}], 0x1, &(0x7f0000002f40)=""/229, 0xe5}, 0x40000004) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="18010000"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x4}, 0x0, 0x0, 0x0, 0x8, 0x2, 0xfffffffc}, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) 7.999473133s ago: executing program 0 (id=13334): socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x2, 0x3, 0x106) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xec, 0x0, 0x0, 0x1, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f00000004c0), 0x2}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x8, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x81}, 0x100c, 0x7, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x10e, 0xa, &(0x7f0000000000), 0x4) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000720000001801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xffffffffffffff7e) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x41, 0x0, 0x11}, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x64, &(0x7f0000000000)=r5, 0x10) sendmsg$inet(r2, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xffc0}], 0x1}, 0x80d1) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10, 0x0}, 0x40040d4) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000000), 0x10) close(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8927, &(0x7f0000000080)) r6 = socket$kcm(0x2, 0x3, 0x106) sendmsg$inet(r6, &(0x7f0000000040)={&(0x7f0000000380)={0x2, 0xfffd, @remote}, 0x10, &(0x7f0000000c00)}, 0x8400) 7.998386813s ago: executing program 1 (id=13344): r0 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0x4e26, @local}, 0x10, &(0x7f00000002c0)=[{&(0x7f00000003c0)="47c0", 0x2}], 0x1}, 0x0) sendmsg$inet(r0, &(0x7f0000002700)={&(0x7f0000000040)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000080)="9a", 0x1}], 0x1}, 0x8040) sendmsg$inet(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f00000001c0)="e9", 0x34000}], 0x1}, 0x8054) (fail_nth: 2) 7.323123769s ago: executing program 7 (id=13335): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000003140)={0x6, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000240)=r2}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x18000000000002a0, 0x5ee, 0xfd60, &(0x7f0000000580)="b9ff03076804d773000000000100", 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x50) 7.051782513s ago: executing program 8 (id=13336): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x3}, 0x10c002, 0xac5d, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0xffff, 0x81}, 0x100c, 0x7, 0xffff, 0x7, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000040000000c"], 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x4, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0xe9) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000003140)={0x6, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000080), &(0x7f0000000240)=r3}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x18000000000002a0, 0x5ee, 0xfd60, &(0x7f0000000580)="b9ff03076804d773000000000100", 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x50) 7.049903513s ago: executing program 1 (id=13347): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000040)='syz1\x00', 0x1ff) openat$cgroup_ro(r1, &(0x7f0000000000)='freezer.state\x00', 0x0, 0x0) recvmsg(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000680)=""/140, 0x8c}], 0x1, &(0x7f0000002f40)=""/229, 0xe5}, 0x40000004) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="18010000"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x4}, 0x0, 0x0, 0x0, 0x8, 0x2, 0xfffffffc}, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) 6.897829221s ago: executing program 7 (id=13337): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x24, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r0, &(0x7f0000000080)={'c', ' *:* ', 'rw\x00'}, 0x9) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x7fff, @local, 0x8}, 0x80, &(0x7f0000000340)=[{&(0x7f00000003c0)='`', 0x1}], 0x1}, 0x41) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_config_ext={0xff, 0x4}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x1000009, 0x8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x50) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x3, 0x3, &(0x7f0000000a80)=@framed={{0x18, 0x0, 0x5}}, &(0x7f0000000b40)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[r4]}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r5, 0x20, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000dc0)=""/4096, 0x1000}}, 0x10) socket$kcm(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7ff0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x2, @perf_bp={0x0, 0x4}, 0x14105, 0x2e, 0xfffffbdf, 0x3, 0x6, 0x200, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f00000002c0)='blkio.bfq.time\x00', 0x26e1, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='notify_on_release\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @generic={0x66}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28}, 0x94) syz_clone(0x80001000, 0x0, 0x0, &(0x7f0000000680), 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000680)="5c00000015006b0300224ed86e6c1d00", 0x10}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 6.626024716s ago: executing program 0 (id=13338): r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0x1c, 0x0, &(0x7f0000001280)="b9ffddc1ddcccdde75537d53888edfff70bf2dfe443b1b5e2a908137", 0x0, 0x3, 0x60000009, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e00000010008188040f80ec59acbc0413a1f848110000005e1406", 0x1b}], 0x1}, 0x8084) r2 = socket$kcm(0x10, 0x2, 0x10) socket$kcm(0xa, 0x3, 0x73) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000012000000000000"], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r3, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xc, 0xffffffffffffd059}, 0x0, 0x2000003, 0x0, 0x5, 0x0, 0x48e7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xdf1203a3, &(0x7f0000000080)=[{&(0x7f00000000c0)="0901020028000b05d25a806f8c6394f90224fc600d00030009000100ff3582c137153e370248018010000000d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000100)=@qipcrtr={0x2a, 0x4, 0x7fff}, 0x80, &(0x7f0000000500)}, 0x0) r4 = perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x1, 0x9, 0x8, 0xc5, 0x0, 0x7fff, 0x80440, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x4, @perf_bp={&(0x7f00000001c0), 0xc}, 0x2052, 0x0, 0x7fffffff, 0x2, 0x2, 0x3e27, 0x80, 0x0, 0x96, 0x0, 0x100}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) perf_event_open(0x0, 0x0, 0x0, r4, 0xa) r5 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB='-netXprio\x00-perf_event '], 0x16) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r7 = openat$cgroup_devices(r6, &(0x7f0000000200)='devices.deny\x00', 0x2, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={r8}, 0x4) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r9, 0x0, 0x0, 0x0, &(0x7f0000000600), 0x0, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_devices(r7, 0x0, 0xa) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) 6.032725298s ago: executing program 5 (id=13339): socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="1c0000001e0081054e81f782db02", 0xe}], 0x1}, 0x804) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000b80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="1400000035000b45d30000000000000001d25a80", 0x14}], 0x1}, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) sendmsg$inet(r2, &(0x7f0000000b40)={&(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000a40)=[{&(0x7f0000000500)="51019609e0d36e5fdd67b84f58c3400662a48c8ce5ba395e3b7bfa6634c87ed5148e18abfd785d0d684541c592d78480904dc035ebfea8e93ac3d444cf51b05ac974d64aedfeef1c3950532d40d4751561c5a7299f34f87db968576e0db811fed7b9050fdbc1c4a8ef427fd027f1991e15f0af97e7f35735e678959135", 0x7d}, {&(0x7f00000006c0)="c4d4c175ada8e889530aa65a81d5cb17d3bf31f1a887f765ca8b5639549e5ae4af48806c058955a978e2ca8c6079d618377e1fa3827a8bea50479ca82d8f2d2b3d62d6ae069647033d52a9c3a636d3a2f1f2c222315b6a2b41f854fe1fab001e30667958a42a1c1d95e1b1d4c61eda612b6c292b037e5d4613d9a669b924d8bbd031e1ec1c53", 0x86}, {&(0x7f0000000840)="1adbe2c725622c00fff9efe1b23a2a2e3c61874739186c9a9743e0787ed05d3ac19fa2b0e38898029d6d48d83e5d7c9c4ca433115ca133075f9376dda8dc28456c8eb0f65d760636cbabf03080a90703c6f322a3024a055ee0cb8f80a86d4355a03f7017d4ca6a585267a59b7d69a3702c769295f2243fe08af1eac7d6618ffd5ebde69692b4a1a1c5b105dad09921a4e9617cdb4043dd64e79a2041ce0263b06959db744c4941178d38efd9e436b9c96ef226a73df62208dc36c7b75715988d37f41c74ebe4", 0xc6}, {&(0x7f0000000940)}, {&(0x7f0000000c40)="694d63af4b508dd59531b3d579d6b45ebdc99d5e27b5ac1e1836100358d4365721a426b60f4e978c1d5e88aad1d7ae8ce719a70dd127fcde40fe6cc66974825801621ad2c67db2d0ff451f8ff19ae6413f7bb131a733f69c0e414e55f6d40a4caacc94ce0535ccc7623e629fff2a8a1e3391cdefd7ec53943542b1f3c160cc114ee77cce20786223b5dbc808ccd58c0daa60d59d835b8dc69aa15dcedebaf0e4eb341694fd5c43bfe3c4630416dd04e8714721c6a5548f06c6389aacd3ad8e0e64c4a40158674b30fe5c408ce787e217e172ba66825b2f14031d508c0b1e30923282350972d7a9acb36fc72eb777e9c0fc9fb2adef913c19131154119d03d5c0f21594c279927611feb50c5287543829abdafb2b2787f32747b78643a0f1ff5e84262d288d9d1f90d7759a917ec377b8aa40aac11f56e831d9a7b6963071576baff392cccc088a652800"/347, 0x15b}], 0x5, &(0x7f0000000ac0)=[@ip_retopts={{0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x11}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x200}}], 0x48}, 0x804) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000011c0)=ANY=[@ANYBLOB="1800000000000000000000000000200018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000fdffffff850000007100"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0x8, 0x8, &(0x7f0000000580)="0000ffffffffa000", &(0x7f0000000340)=""/8, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d080006067c09e8fe55a10a0015400400142603600e120800067c00001001a8001600a400034003", 0x39}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)=@rxrpc=@in4={0x21, 0x1, 0x2, 0xffffffffffffff7a, {0x2, 0x4e23, @multicast2}}, 0x80, 0x0}, 0x4004090) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)="d800000010008104685fa3aa7143a0f8c81ded0b25000000e8fe09a118001500060014ea000000120800030043000040a8002b000a00", 0x36}], 0x1}, 0x20000880) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfe33) write$cgroup_subtree(r4, &(0x7f0000000040)={[{0x2b, 'cpu'}]}, 0x5) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63f580fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r8, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) 4.585176315s ago: executing program 8 (id=13340): r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000047000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a876d839240d29c035055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7e8dc34f17e3946ef3bb622e03b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bb44b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334583239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd713089856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bf4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff22dc508afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd360000000000000000ae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae526aca54183fb01c73f979ca9857399537f5831808b0dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c97a088a22e8b15c3e233db00002e30d46a0024d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e4845535a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c29c5c0ed5bcdf510c3c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9003f07000099d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ced92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f68fa8d7c2dfb28e1f05e46b0933c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d588afd80e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda6900002a070886df42b27098773b45198b4a34ac97febd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d63521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a8639034a75f4c7df3ea8fc2018d07afef12ef060cd4403a099f32468f658000b4082d43e12186195cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea209b53b230ef0f2ab85cbdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bd3339403004b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab900000000000000000000d71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdbf24a0c5441ce046078492b53467cfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89cb349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce1d9bc7ef3e3f40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb15f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c00c57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137df47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b558982016b0679b5d6fccbecfae5553d9950d48c774eaa35b24fce69a20d8b49e3d0168bf7eac90529cd6af061c9e53addddc620ce73c5d177e3d097159f2768636fc10276c6a0adc57483b3f7083f66b87ef296ee85a3009a5d30f479e293a3302e11350ea857b37e76ca3f50378e4092ce2c574ad278b9b7b717c571afb2077b019fd9d89efd59b41f051ec5a8ff87ecc8df917a1e386d849fcd10e2f9ca52e02339c2f4666b0c8ffe0d508dcee3070e8b42ac38545e25f1cd62421c28d25994be0cff7271a0dee38d7ac4ac736b090e1d29f98117919472b61b20026d7e646174b55d251f7f8ca5ccc22a5efb33b217eff5597a3c3a5f3a9bb54abb40e54593e1a7ce4cfa17b3c3fe91c06363496341eae20dcc59b6179b32ddddef5c34000096a54c0c571a91878f61f74912e2299e5501d4d6943bfd74c856511726f0ac8f7d17f1c6b4451c1bcdc6b6e1700e4cd87709d97afc5423c96fa981873d4369b04bbf1fb9f68f17991540868e408201ad1a74179e489aa61f021a437a3fa935588be2068f7ff9b253106326fde795e530b93626cc68e06e602198724249b4444e69902e4d8f5da4e94cc36794258fd4032de7ab36bc24000000000000000000000000000000000000cd3211b3842b68a4eddca2eae28529e97a98d7ec3fd902df1ba8fc2ad2377e72d4e7aeacbbccef5614cd965511558f40720025c022bc9c213e407f6bc4b673c55aa8e729299a37fd6339acd906ac861ba56c9fa9b8b12b5e68a3cdadb906355e1f1d336a243172affe50d0fb36c3718a7498eed3d398f405a34d494414e87ef1ce1845510d43d00171d6b4b762f89564c22d542a119878709cd6822c3a3eb47a849b0737929fe9e1eecd1bff5a2b9880e2a6d8a3b3b7e88a673c96cda4455eff1c530db0e6598a2686aa09aeaf0f1aed95aeb8b0a2cc5ca31c0f56285cc05f7090a0e0583cf540d18cd8817e685c7b4ff176178ac1234f23e54445ec20b2689832d78409897a0307e89ebcd5f4ba042a3d10237a5a8a9a6eda36d2f337dc54537b80e8433341b135b4c5bb0173ffde46ccd260e1d4f2c51e8b07bb256f1317912cb1fc9e491e0bb9109e475cc795c23ad9f4f0042c5e9c655a4d865bc4a266e6a1d3d2b7ee53be9efb33a98933b5ba74ee3ac8d34b6af8c1fdbffade3abc80842b74354162f5b994ab5254cb068bc5e2ae242a1d37d0d49947c9317fa1a46c9e259ce0e1f9db992c53f7830a5e8f4fac6b187eb9f15ba61f730f86d7d7b63bbc7a1d9ff37e87a90a14e0655304da069f9009b62717649b6c6af94fcba713f8ee6fcce25aef44d009966614b61be9369ffc589a79051b0a0000000000000003ebd34c41afe268c33c9322c3a783772aec998f51a6e70fb932a8019e72ef5ab127bb30c79ebfd867441083546305fb39449c40a166ea389a6b77b7c87f66e8bf5806726b8fc50b943627314803a12c33312dce0a10f852da3e000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0x1c, 0x0, &(0x7f0000001280)="b9ffddc1ddcccdde75537d53888edfff70bf2dfe443b1b5e2a908137", 0x0, 0x3, 0x60000009, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e00000010008188040f80ec59acbc0413a1f848110000005e1406", 0x1b}], 0x1}, 0x8084) r2 = socket$kcm(0x10, 0x2, 0x10) socket$kcm(0xa, 0x3, 0x73) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000012000000000000000000"], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r3, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xc, 0xffffffffffffd059}, 0x0, 0x2000003, 0x0, 0x5, 0x0, 0x48e7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xdf1203a3, &(0x7f0000000080)=[{&(0x7f00000000c0)="0901020028000b05d25a806f8c6394f90224fc600d00030009000100ff3582c137153e370248018010000000d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000100)=@qipcrtr={0x2a, 0x4, 0x7fff}, 0x80, &(0x7f0000000500)}, 0x0) r4 = perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x1, 0x9, 0x8, 0xc5, 0x0, 0x7fff, 0x80440, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x4, @perf_bp={&(0x7f00000001c0), 0xc}, 0x2052, 0x0, 0x7fffffff, 0x2, 0x2, 0x3e27, 0x80, 0x0, 0x96, 0x0, 0x100}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x2, 0x9, 0x81, 0xf, 0x0, 0x4, 0xcdcd322fef762636, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x298, 0xe99a}, 0x11040, 0xb09800000, 0xffffff49, 0x4, 0x7, 0x960e, 0x0, 0x0, 0x2, 0x0, 0x9}, 0x0, 0x0, r4, 0xa) r5 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB='-netXprio\x00-perf_event '], 0x16) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) openat$cgroup_devices(r6, &(0x7f0000000200)='devices.deny\x00', 0x2, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={r7}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r8, 0x0, 0xb, 0x0, &(0x7f0000000600)="3d25ff005b19c4cbe60170", 0x0, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 4.291644661s ago: executing program 1 (id=13341): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x24, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)={'c', ' *:* ', 'rw\x00'}, 0x9) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x7fff, @local, 0x8}, 0x80, &(0x7f0000000340)=[{&(0x7f00000003c0)='`', 0x1}], 0x1}, 0x41) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_config_ext={0xff, 0x4}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x1000009, 0x8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x20, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000dc0)=""/4096, 0x1000}}, 0x10) socket$kcm(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7ff0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x2, @perf_bp={0x0, 0x4}, 0x14105, 0x2e, 0xfffffbdf, 0x3, 0x6, 0x200, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f00000002c0)='blkio.bfq.time\x00', 0x26e1, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='notify_on_release\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @generic={0x66}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28}, 0x94) syz_clone(0x80001000, 0x0, 0x0, &(0x7f0000000680), 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000680)="5c00000015006b0300224ed86e6c1d00", 0x10}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 4.200996076s ago: executing program 5 (id=13342): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_clone(0x4010000, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000440)="df1b4d05d23380af6b680ec5db2eb92ef3712effab4d9c6327794c66b29efe2c3fb432db2cd73fbb65be0830a3749d24a9819c8b3ff0c8817e6387be82eb68d5e2c414f08f62ed367af6fb5b06310d1b4e81ce584e6d83e242a93dbe8098bb274f87b71c067194de30420c21c8acf41bcd87c733f3427348c8d5d4f57bb4205d94662a331175caa0d0966a1a1beede71670e44e2ea76b6bef84f") perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x3e, 0xfc, 0x0, 0xbd, 0x0, 0x40, 0x42, 0xa, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1000, 0x5, @perf_bp={&(0x7f0000000080), 0x6}, 0x941, 0xf, 0x7, 0x9, 0x4, 0xdc, 0x4, 0x0, 0xff, 0x0, 0x100}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x23}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7}, 0x48) 3.780607908s ago: executing program 8 (id=13343): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000840000000400000002"], 0x50) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000600)="5c00000013006bcd8e3fe3dc4e48aa31086b8703300000001f00000000000000040014000d002900070100009ee537d34460bc08eab556a705251e8e6182949a3651f60a84c9f5d1938837e779a6d0bdd735310e4509c5bb5a00f698", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000000400000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = socket$kcm(0xa, 0x2, 0x3a) recvmsg(r4, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x40010040) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000560013f16ff28e036afc004a07"], 0xfe33) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)="89000000120081ae08060cdc030000017f03e3f7000000006ee2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c0001000b080c00bdad01409bbc7a46e39a8285dcdf12176679df069163ce947ee2b49e33538afaeb2713f450ebd010a20ff27fff0000000000000000", 0x89}], 0x1}, 0xff0f000000000000) recvmsg$kcm(r5, &(0x7f0000001340)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000900)=ANY=[@ANYBLOB="9feb01001800000000000000b4000000b4000000020000000800000001000004010000000f0000000100000009000000000000000000000300000000010000080400000004000000020000000000000a0400000008000000020000043e0600000700000004000000ff0300000700000081000000040000000000000000000003000000000200000002000000010000801000000004000085080000000b00000002000000b1ab00001000000002000000060000000800000004000000a00800000a00000002000000988c00000000"], &(0x7f0000000280)=""/154, 0xce, 0x9a, 0x1, 0x400}, 0x28) r6 = perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0x1, 0x4, 0x0, 0xc4, 0x0, 0x2, 0x18120, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20b, 0x2, @perf_config_ext={0x2, 0x2}, 0x220, 0x3, 0x2bcae747, 0x3, 0x6, 0x4, 0xff4, 0x0, 0x7, 0x0, 0xe62}, 0xffffffffffffffff, 0x1000000000000d, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000480)) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0xb4) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x80, 0x6a, 0xfc, 0x1, 0x9, 0x0, 0x6, 0x300, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000001c0), 0x4}, 0x358, 0x2, 0x7fffffff, 0x8, 0x1000, 0x8, 0x0, 0x0, 0x50000, 0x0, 0xfffffffffffffff9}, r7, 0x10, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r2}, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r0}) 3.763518739s ago: executing program 7 (id=13355): r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0x18000000000002a0, 0x1c, 0x0, &(0x7f0000001280)="b9ffddc1ddcccdde75537d53888edfff70bf2dfe443b1b5e2a908137", 0x0, 0x3, 0x60000009, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e00000010008188040f80ec59acbc0413a1f848110000005e1406", 0x1b}], 0x1}, 0x8084) r2 = socket$kcm(0x10, 0x2, 0x10) socket$kcm(0xa, 0x3, 0x73) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000012000000000000"], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r3, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xc, 0xffffffffffffd059}, 0x0, 0x2000003, 0x0, 0x5, 0x0, 0x48e7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xdf1203a3, &(0x7f0000000080)=[{&(0x7f00000000c0)="0901020028000b05d25a806f8c6394f90224fc600d00030009000100ff3582c137153e370248018010000000d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000100)=@qipcrtr={0x2a, 0x4, 0x7fff}, 0x80, &(0x7f0000000500)}, 0x0) r4 = perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x1, 0x9, 0x8, 0xc5, 0x0, 0x7fff, 0x80440, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x101, 0x4, @perf_bp={&(0x7f00000001c0), 0xc}, 0x2052, 0x0, 0x7fffffff, 0x2, 0x2, 0x3e27, 0x80, 0x0, 0x96, 0x0, 0x100}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) perf_event_open(0x0, 0x0, 0x0, r4, 0xa) r5 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB='-netXprio\x00-perf_event '], 0x16) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r7 = openat$cgroup_devices(r6, &(0x7f0000000200)='devices.deny\x00', 0x2, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={r8}, 0x4) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r9, 0x0, 0x0, 0x0, &(0x7f0000000600), 0x0, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_devices(r7, 0x0, 0xa) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) 3.762989759s ago: executing program 0 (id=13345): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x24, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r0, &(0x7f0000000080)={'c', ' *:* ', 'rw\x00'}, 0x9) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x7fff, @local, 0x8}, 0x80, &(0x7f0000000340)=[{&(0x7f00000003c0)='`', 0x1}], 0x1}, 0x41) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_config_ext={0xff, 0x4}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x1000009, 0x8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x3, 0x3, &(0x7f0000000a80)=@framed={{0x18, 0x0, 0x5}}, &(0x7f0000000b40)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[0xffffffffffffffff]}, 0x94) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7ff0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x2, @perf_bp={0x0, 0x4}, 0x14105, 0x2e, 0xfffffbdf, 0x3, 0x6, 0x200, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) recvmsg(r3, &(0x7f0000002700)={&(0x7f0000000400)=@generic, 0x80, 0x0}, 0xc0) openat$cgroup_ro(r5, 0x0, 0x26e1, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='notify_on_release\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @generic={0x66}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28}, 0x94) syz_clone(0x80001000, 0x0, 0x0, &(0x7f0000000680), 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000680)="5c00000015006b0300224ed86e6c1d00", 0x10}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 3.37919827s ago: executing program 5 (id=13346): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r0, &(0x7f0000000080)={'c', ' *:* ', 'rw\x00'}, 0x9) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x7fff, @local, 0x8}, 0x80, &(0x7f0000000340)=[{&(0x7f00000003c0)='`', 0x1}], 0x1}, 0x41) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_config_ext={0xff, 0x4}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x1000009, 0x8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x20, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000dc0)=""/4096, 0x1000}}, 0x10) socket$kcm(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7ff0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x2, @perf_bp={0x0, 0x4}, 0x14105, 0x2e, 0xfffffbdf, 0x3, 0x6, 0x200, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f00000002c0)='blkio.bfq.time\x00', 0x26e1, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='notify_on_release\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @generic={0x66}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28}, 0x94) syz_clone(0x80001000, 0x0, 0x0, &(0x7f0000000680), 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000680)="5c00000015006b0300224ed86e6c1d00", 0x10}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 1.260900312s ago: executing program 7 (id=13348): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x13, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020750d0000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = socket$kcm(0x10, 0x2, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000ffffffff58feffff"], &(0x7f00000009c0)=""/129, 0x2e, 0x81, 0x1}, 0x20) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000280)="89000000120081ae08060cdc030000007f1be3f74001000000e2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00122800014008080c000a0000009bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)}, 0x4840) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x60}, 0x40002002) 218.350558ms ago: executing program 5 (id=13349): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x3}, 0x10c002, 0xac5d, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0xffff, 0x81}, 0x100c, 0x7, 0xffff, 0x7, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000040000000c"], 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x4, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0xe9) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000003140)={0x6, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000080), &(0x7f0000000240)=r3}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x18000000000002a0, 0x5ee, 0xfd60, &(0x7f0000000580)="b9ff03076804d773000000000100", 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x202, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="1802000000000000000000000000100085000000530000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095000000000000007f0cff0a196e6d57113f3eab28c85d691f724ad140108934a3e3efa560dc8db4700e191ff5f03fd7f83f6e1e9aaee2afc55f025e56e0ded37be12657f5e837cfc27b55"], &(0x7f0000000080)='syzkaller\x00'}, 0x88) 188.24092ms ago: executing program 1 (id=13350): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x3}, 0x10c002, 0xac5d, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0xffff, 0x81}, 0x100c, 0x7, 0xffff, 0x7, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000040000000c"], 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x4, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0xe9) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000003140)={0x6, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000080), &(0x7f0000000240)=r3}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x18000000000002a0, 0x5ee, 0xfd60, &(0x7f0000000580)="b9ff03076804d773000000000100", 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8}, 0x50) 160.557931ms ago: executing program 0 (id=13351): socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x2, 0x3, 0x106) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xec, 0x0, 0x0, 0x1, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f00000004c0), 0x2}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x8, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x81}, 0x100c, 0x7, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x10e, 0xa, &(0x7f0000000000), 0x4) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000720000001801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xffffffffffffff7e) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xf, 0xae, 0x2, 0x2, 0x0, 0x4, 0x8, 0x9, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xff, 0x2, @perf_config_ext={0x101, 0x9}, 0x32f6, 0x0, 0x4, 0x6, 0x4, 0x8, 0x101, 0x0, 0x2, 0x0, 0x9}, 0x0, 0xa, 0xffffffffffffffff, 0x2) r2 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x64, &(0x7f0000000000)=r5, 0x10) sendmsg$inet(r2, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xffc0}], 0x1}, 0x80d1) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10, 0x0}, 0x40040d4) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000000), 0x10) close(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8927, &(0x7f0000000080)) r6 = socket$kcm(0x2, 0x3, 0x106) sendmsg$inet(r6, &(0x7f0000000040)={&(0x7f0000000380)={0x2, 0xfffd, @remote}, 0x10, &(0x7f0000000c00)}, 0x8400) 158.114281ms ago: executing program 7 (id=13352): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x24, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r0, &(0x7f0000000080)={'c', ' *:* ', 'rw\x00'}, 0x9) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x7fff, @local, 0x8}, 0x80, &(0x7f0000000340)=[{&(0x7f00000003c0)='`', 0x1}], 0x1}, 0x41) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_config_ext={0xff, 0x4}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x1000009, 0x8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x50) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x3, 0x3, &(0x7f0000000a80)=@framed={{0x18, 0x0, 0x5}}, &(0x7f0000000b40)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[r4]}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r5, 0x20, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000dc0)=""/4096, 0x1000}}, 0x10) socket$kcm(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7ff0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x2, @perf_bp={0x0, 0x4}, 0x14105, 0x2e, 0xfffffbdf, 0x3, 0x6, 0x200, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f00000002c0)='blkio.bfq.time\x00', 0x26e1, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='notify_on_release\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @generic={0x66}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28}, 0x94) syz_clone(0x80001000, 0x0, 0x0, &(0x7f0000000680), 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000680)="5c00000015006b0300224ed86e6c1d00", 0x10}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 0s ago: executing program 8 (id=13353): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000040)='syz1\x00', 0x1ff) openat$cgroup_ro(r1, &(0x7f0000000000)='freezer.state\x00', 0x0, 0x0) recvmsg(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000680)=""/140, 0x8c}], 0x1, &(0x7f0000002f40)=""/229, 0xe5}, 0x40000004) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="18010000"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x4}, 0x0, 0x0, 0x0, 0x8, 0x2, 0xfffffffc}, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) kernel console output (not intermixed with test programs): 'syz.0.12437': attribute type 10 has an invalid length. [ 3154.898760][T16578] device syzkaller0 entered promiscuous mode [ 3158.443411][T16640] FAULT_INJECTION: forcing a failure. [ 3158.443411][T16640] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3158.480635][T16640] CPU: 1 PID: 16640 Comm: syz.0.12459 Not tainted syzkaller #0 [ 3158.488502][T16640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3158.498650][T16640] Call Trace: [ 3158.501952][T16640] [ 3158.504894][T16640] dump_stack_lvl+0x188/0x24e [ 3158.509700][T16640] ? show_regs_print_info+0x12/0x12 [ 3158.514922][T16640] ? load_image+0x400/0x400 [ 3158.519622][T16640] ? __lock_acquire+0x7d10/0x7d10 [ 3158.524693][T16640] should_fail_ex+0x399/0x4d0 [ 3158.529509][T16640] _copy_from_iter+0x1c0/0x1130 [ 3158.534414][T16640] ? __lock_acquire+0x7d10/0x7d10 [ 3158.539493][T16640] ? sock_alloc_send_pskb+0x89d/0x9a0 [ 3158.544912][T16640] ? copyout_mc+0x110/0x110 [ 3158.549451][T16640] ? __virt_addr_valid+0x188/0x540 [ 3158.554636][T16640] ? __virt_addr_valid+0x188/0x540 [ 3158.559797][T16640] ? __virt_addr_valid+0x465/0x540 [ 3158.564974][T16640] ? __check_object_size+0x500/0xa40 [ 3158.570301][T16640] skb_copy_datagram_from_iter+0xef/0x690 [ 3158.576058][T16640] ? skb_put+0x117/0x210 [ 3158.580330][T16640] tun_get_user+0xb81/0x3c70 [ 3158.584965][T16640] ? rcu_read_unlock+0xa0/0xa0 [ 3158.589759][T16640] ? tun_get+0x1c/0x2e0 [ 3158.593934][T16640] ? __lock_acquire+0x7d10/0x7d10 [ 3158.599002][T16640] ? tun_get+0x1c/0x2e0 [ 3158.603211][T16640] tun_chr_write_iter+0x112/0x1f0 [ 3158.608259][T16640] vfs_write+0x4b1/0xa30 [ 3158.612559][T16640] ? file_end_write+0x250/0x250 [ 3158.617433][T16640] ? __fget_files+0x43d/0x4b0 [ 3158.622138][T16640] ? __fdget_pos+0x1d4/0x360 [ 3158.626768][T16640] ? ksys_write+0x71/0x250 [ 3158.631213][T16640] ksys_write+0x14c/0x250 [ 3158.635567][T16640] ? __ia32_sys_read+0x80/0x80 [ 3158.640384][T16640] ? lockdep_hardirqs_on+0x94/0x140 [ 3158.645601][T16640] do_syscall_64+0x4c/0xa0 [ 3158.650072][T16640] ? clear_bhb_loop+0x60/0xb0 [ 3158.654773][T16640] ? clear_bhb_loop+0x60/0xb0 [ 3158.659474][T16640] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3158.665384][T16640] RIP: 0033:0x7ff92319c819 [ 3158.669833][T16640] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3158.689477][T16640] RSP: 002b:00007ff923f9c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3158.697913][T16640] RAX: ffffffffffffffda RBX: 00007ff923415fa0 RCX: 00007ff92319c819 [ 3158.705905][T16640] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 3158.713888][T16640] RBP: 00007ff923f9c090 R08: 0000000000000000 R09: 0000000000000000 [ 3158.721892][T16640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3158.729993][T16640] R13: 00007ff923416038 R14: 00007ff923415fa0 R15: 00007fff84a83cf8 [ 3158.738009][T16640] [ 3159.244346][T16642] netlink: 'syz.0.12460': attribute type 1 has an invalid length. [ 3159.283273][T16642] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.12460'. [ 3160.555581][T16652] netlink: 'syz.0.12462': attribute type 1 has an invalid length. [ 3160.564883][T16652] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.12462'. [ 3161.381234][T16659] netlink: 'syz.0.12465': attribute type 1 has an invalid length. [ 3161.389932][T16659] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.12465'. [ 3162.040957][T16620] netlink: 'syz.5.12454': attribute type 10 has an invalid length. [ 3162.551792][T16682] netlink: 'syz.1.12474': attribute type 10 has an invalid length. [ 3162.581321][T16679] netlink: 'syz.0.12473': attribute type 1 has an invalid length. [ 3162.594820][T16679] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.12473'. [ 3163.938655][T16688] delete_channel: no stack [ 3164.310134][T16714] device syzkaller0 entered promiscuous mode [ 3164.382690][T16720] netlink: 'syz.0.12485': attribute type 1 has an invalid length. [ 3164.412139][T16720] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.12485'. [ 3165.184750][T16740] FAULT_INJECTION: forcing a failure. [ 3165.184750][T16740] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3165.265416][T16740] CPU: 1 PID: 16740 Comm: syz.8.12489 Not tainted syzkaller #0 [ 3165.273170][T16740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3165.283379][T16740] Call Trace: [ 3165.286689][T16740] [ 3165.289653][T16740] dump_stack_lvl+0x188/0x24e [ 3165.294379][T16740] ? show_regs_print_info+0x12/0x12 [ 3165.299713][T16740] ? load_image+0x400/0x400 [ 3165.304272][T16740] ? __lock_acquire+0x7d10/0x7d10 [ 3165.309386][T16740] ? tomoyo_path_number_perm+0x205/0x650 [ 3165.315077][T16740] ? tomoyo_path_number_perm+0x5a4/0x650 [ 3165.320767][T16740] should_fail_ex+0x399/0x4d0 [ 3165.325491][T16740] _copy_from_user+0x2c/0x170 [ 3165.330273][T16740] wext_handle_ioctl+0xc4/0x1d0 [ 3165.335286][T16740] ? call_commit_handler+0xf0/0xf0 [ 3165.340468][T16740] sock_ioctl+0x143/0x710 [ 3165.344832][T16740] ? sock_poll+0x410/0x410 [ 3165.349320][T16740] ? bpf_lsm_file_ioctl+0x5/0x10 [ 3165.354294][T16740] ? security_file_ioctl+0x7c/0xa0 [ 3165.359454][T16740] ? sock_poll+0x410/0x410 [ 3165.363900][T16740] __se_sys_ioctl+0xfa/0x170 [ 3165.368542][T16740] do_syscall_64+0x4c/0xa0 [ 3165.373056][T16740] ? clear_bhb_loop+0x60/0xb0 [ 3165.377781][T16740] ? clear_bhb_loop+0x60/0xb0 [ 3165.382509][T16740] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3165.388448][T16740] RIP: 0033:0x7f6d3f59c819 [ 3165.392906][T16740] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3165.412725][T16740] RSP: 002b:00007f6d404fa028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3165.421192][T16740] RAX: ffffffffffffffda RBX: 00007f6d3f816090 RCX: 00007f6d3f59c819 [ 3165.429213][T16740] RDX: 0000200000000000 RSI: 0000000000008b34 RDI: 0000000000000004 [ 3165.437226][T16740] RBP: 00007f6d404fa090 R08: 0000000000000000 R09: 0000000000000000 [ 3165.445321][T16740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3165.453326][T16740] R13: 00007f6d3f816128 R14: 00007f6d3f816090 R15: 00007ffecd0373b8 [ 3165.461357][T16740] [ 3166.046622][T21223] Bluetooth: hci0: command 0x0406 tx timeout [ 3166.284382][T16753] netlink: 16178 bytes leftover after parsing attributes in process `syz.1.12494'. [ 3168.720090][T16737] netlink: 'syz.0.12488': attribute type 27 has an invalid length. [ 3168.733813][T16742] netlink: 'syz.8.12490': attribute type 10 has an invalid length. [ 3169.052446][T16765] netlink: 'syz.0.12498': attribute type 1 has an invalid length. [ 3169.104575][T16765] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.12498'. [ 3169.207283][T16776] FAULT_INJECTION: forcing a failure. [ 3169.207283][T16776] name failslab, interval 1, probability 0, space 0, times 0 [ 3169.258786][T16773] netlink: 'syz.5.12500': attribute type 3 has an invalid length. [ 3169.289506][T16776] CPU: 0 PID: 16776 Comm: syz.8.12502 Not tainted syzkaller #0 [ 3169.297171][T16776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3169.307280][T16776] Call Trace: [ 3169.310610][T16776] [ 3169.313582][T16776] dump_stack_lvl+0x188/0x24e [ 3169.318320][T16776] ? show_regs_print_info+0x12/0x12 [ 3169.323657][T16776] ? load_image+0x400/0x400 [ 3169.328212][T16776] ? __might_sleep+0xd0/0xd0 [ 3169.329264][T16773] netlink: 'syz.5.12500': attribute type 1 has an invalid length. [ 3169.332829][T16776] ? __lock_acquire+0x7d10/0x7d10 [ 3169.332902][T16776] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 3169.332937][T16776] should_fail_ex+0x399/0x4d0 [ 3169.356478][T16776] should_failslab+0x5/0x20 [ 3169.361041][T16776] slab_pre_alloc_hook+0x59/0x310 [ 3169.366097][T16776] ? tcp_sendmsg_fastopen+0x1d5/0x600 [ 3169.371537][T16776] __kmem_cache_alloc_node+0x4f/0x260 [ 3169.376948][T16776] ? tcp_sendmsg_fastopen+0x1d5/0x600 [ 3169.382379][T16776] kmalloc_trace+0x26/0xe0 [ 3169.386861][T16776] tcp_sendmsg_fastopen+0x1d5/0x600 [ 3169.392121][T16776] tcp_sendmsg_locked+0x3616/0x3a90 [ 3169.397413][T16776] ? mark_lock+0x94/0x320 [ 3169.401799][T16776] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 3169.407821][T16776] ? lock_chain_count+0x20/0x20 [ 3169.412803][T16776] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 3169.419005][T16776] ? lockdep_hardirqs_on+0x94/0x140 [ 3169.424260][T16776] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 3169.430483][T16776] ? tcp_sendmsg+0x1d/0x40 [ 3169.434953][T16776] ? tcp_set_state+0x520/0x520 [ 3169.439759][T16776] ? __local_bh_enable_ip+0x13e/0x1c0 [ 3169.445181][T16776] tcp_sendmsg+0x2b/0x40 [ 3169.449455][T16776] ? inet_send_prepare+0x260/0x260 [ 3169.454601][T16776] ____sys_sendmsg+0x5be/0x970 [ 3169.459429][T16776] ? __sys_sendmsg_sock+0x30/0x30 [ 3169.464484][T16776] ? __import_iovec+0x315/0x500 [ 3169.469382][T16776] ? import_iovec+0x6f/0xa0 [ 3169.473917][T16776] ___sys_sendmsg+0x2a2/0x360 [ 3169.478636][T16776] ? __sys_sendmsg+0x290/0x290 [ 3169.483467][T16776] ? ktime_get_real_ts64+0x440/0x440 [ 3169.488817][T16776] __se_sys_sendmsg+0x1bb/0x2a0 [ 3169.493766][T16776] ? __x64_sys_sendmsg+0x80/0x80 [ 3169.498779][T16776] ? trace_sys_enter+0x22/0x80 [ 3169.503593][T16776] do_syscall_64+0x4c/0xa0 [ 3169.508062][T16776] ? clear_bhb_loop+0x60/0xb0 [ 3169.512775][T16776] ? clear_bhb_loop+0x60/0xb0 [ 3169.517495][T16776] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3169.523420][T16776] RIP: 0033:0x7f6d3f59c819 [ 3169.527871][T16776] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3169.547599][T16776] RSP: 002b:00007f6d4051b028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3169.556109][T16776] RAX: ffffffffffffffda RBX: 00007f6d3f815fa0 RCX: 00007f6d3f59c819 [ 3169.564108][T16776] RDX: 000000003000c085 RSI: 0000200000000080 RDI: 0000000000000004 [ 3169.572110][T16776] RBP: 00007f6d4051b090 R08: 0000000000000000 R09: 0000000000000000 [ 3169.580111][T16776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3169.588113][T16776] R13: 00007f6d3f816038 R14: 00007f6d3f815fa0 R15: 00007ffecd0373b8 [ 3169.596233][T16776] [ 3169.631931][T16773] netlink: 116 bytes leftover after parsing attributes in process `syz.5.12500'. [ 3170.126073][T16789] netlink: 'syz.0.12506': attribute type 1 has an invalid length. [ 3170.174938][T16789] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.12506'. [ 3170.545749][T16793] netlink: 'syz.5.12507': attribute type 3 has an invalid length. [ 3170.572035][T16793] netlink: 'syz.5.12507': attribute type 1 has an invalid length. [ 3170.582727][T16793] netlink: 116 bytes leftover after parsing attributes in process `syz.5.12507'. [ 3170.908190][T16803] netlink: 'syz.0.12510': attribute type 10 has an invalid length. [ 3171.838858][T16829] FAULT_INJECTION: forcing a failure. [ 3171.838858][T16829] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3171.864931][T16829] CPU: 0 PID: 16829 Comm: syz.1.12519 Not tainted syzkaller #0 [ 3171.872576][T16829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3171.882681][T16829] Call Trace: [ 3171.886001][T16829] [ 3171.888962][T16829] dump_stack_lvl+0x188/0x24e [ 3171.893701][T16829] ? show_regs_print_info+0x12/0x12 [ 3171.899005][T16829] ? load_image+0x400/0x400 [ 3171.903560][T16829] ? __lock_acquire+0x7d10/0x7d10 [ 3171.908630][T16829] ? __virt_addr_valid+0x188/0x540 [ 3171.913898][T16829] should_fail_ex+0x399/0x4d0 [ 3171.918623][T16829] _copy_to_user+0x2c/0x130 [ 3171.923164][T16829] map_get_next_key+0x4fa/0x620 [ 3171.928075][T16829] ? map_get_next_key+0x2d4/0x620 [ 3171.933121][T16829] __sys_bpf+0x466/0x780 [ 3171.937385][T16829] ? bpf_link_show_fdinfo+0x380/0x380 [ 3171.942788][T16829] ? lock_chain_count+0x20/0x20 [ 3171.947669][T16829] __x64_sys_bpf+0x78/0x90 [ 3171.952111][T16829] do_syscall_64+0x4c/0xa0 [ 3171.956545][T16829] ? clear_bhb_loop+0x60/0xb0 [ 3171.961240][T16829] ? clear_bhb_loop+0x60/0xb0 [ 3171.965937][T16829] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3171.971844][T16829] RIP: 0033:0x7fe0a079c819 [ 3171.976295][T16829] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3171.996011][T16829] RSP: 002b:00007fe0a1655028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3172.004441][T16829] RAX: ffffffffffffffda RBX: 00007fe0a0a15fa0 RCX: 00007fe0a079c819 [ 3172.012426][T16829] RDX: 0000000000000020 RSI: 0000200000000340 RDI: 0000000000000004 [ 3172.020407][T16829] RBP: 00007fe0a1655090 R08: 0000000000000000 R09: 0000000000000000 [ 3172.028405][T16829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3172.036390][T16829] R13: 00007fe0a0a16038 R14: 00007fe0a0a15fa0 R15: 00007ffe6c477498 [ 3172.044389][T16829] [ 3172.595323][T16835] netlink: 'syz.1.12520': attribute type 1 has an invalid length. [ 3172.648042][T16840] FAULT_INJECTION: forcing a failure. [ 3172.648042][T16840] name failslab, interval 1, probability 0, space 0, times 0 [ 3172.667775][T16835] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.12520'. [ 3172.717126][T16840] CPU: 0 PID: 16840 Comm: syz.7.12522 Not tainted syzkaller #0 [ 3172.724807][T16840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3172.734897][T16840] Call Trace: [ 3172.738205][T16840] [ 3172.741265][T16840] dump_stack_lvl+0x188/0x24e [ 3172.745994][T16840] ? show_regs_print_info+0x12/0x12 [ 3172.751237][T16840] ? load_image+0x400/0x400 [ 3172.755805][T16840] ? __might_sleep+0xd0/0xd0 [ 3172.760468][T16840] ? __lock_acquire+0x7d10/0x7d10 [ 3172.765557][T16840] should_fail_ex+0x399/0x4d0 [ 3172.770302][T16840] should_failslab+0x5/0x20 [ 3172.774879][T16840] slab_pre_alloc_hook+0x59/0x310 [ 3172.780007][T16840] kmem_cache_alloc_node+0x5a/0x320 [ 3172.785273][T16840] ? __alloc_skb+0xfc/0x7e0 [ 3172.789857][T16840] __alloc_skb+0xfc/0x7e0 [ 3172.794237][T16840] ? netlink_autobind+0xda/0x300 [ 3172.799233][T16840] netlink_sendmsg+0x654/0xbd0 [ 3172.804051][T16840] ? netlink_getsockopt+0x550/0x550 [ 3172.809301][T16840] ? aa_sock_msg_perm+0x94/0x150 [ 3172.814300][T16840] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 3172.819645][T16840] ? security_socket_sendmsg+0x7c/0xa0 [ 3172.825169][T16840] ? netlink_getsockopt+0x550/0x550 [ 3172.830426][T16840] ____sys_sendmsg+0x5be/0x970 [ 3172.835257][T16840] ? __sys_sendmsg_sock+0x30/0x30 [ 3172.840354][T16840] ? __import_iovec+0x315/0x500 [ 3172.845277][T16840] ? import_iovec+0x6f/0xa0 [ 3172.849847][T16840] ___sys_sendmsg+0x2a2/0x360 [ 3172.854586][T16840] ? __sys_sendmsg+0x290/0x290 [ 3172.859433][T16840] ? __lock_acquire+0x7d10/0x7d10 [ 3172.864535][T16840] __se_sys_sendmsg+0x1bb/0x2a0 [ 3172.869444][T16840] ? __x64_sys_sendmsg+0x80/0x80 [ 3172.874448][T16840] ? trace_sys_enter+0x22/0x80 [ 3172.879259][T16840] do_syscall_64+0x4c/0xa0 [ 3172.883722][T16840] ? clear_bhb_loop+0x60/0xb0 [ 3172.888439][T16840] ? clear_bhb_loop+0x60/0xb0 [ 3172.893159][T16840] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3172.899112][T16840] RIP: 0033:0x7fdc9179c819 [ 3172.903656][T16840] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3172.923313][T16840] RSP: 002b:00007fdc9274b028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3172.931785][T16840] RAX: ffffffffffffffda RBX: 00007fdc91a15fa0 RCX: 00007fdc9179c819 [ 3172.939808][T16840] RDX: 0000000000040000 RSI: 0000200000000600 RDI: 0000000000000003 [ 3172.947835][T16840] RBP: 00007fdc9274b090 R08: 0000000000000000 R09: 0000000000000000 [ 3172.955860][T16840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3172.963884][T16840] R13: 00007fdc91a16038 R14: 00007fdc91a15fa0 R15: 00007fffabac8688 [ 3172.971921][T16840] [ 3173.506058][T16855] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.12526'. [ 3175.745691][T16908] validate_nla: 2 callbacks suppressed [ 3175.745712][T16908] netlink: 'syz.8.12546': attribute type 3 has an invalid length. [ 3175.829211][T16908] netlink: 132 bytes leftover after parsing attributes in process `syz.8.12546'. [ 3175.913368][T16915] netlink: 'syz.7.12537': attribute type 1 has an invalid length. [ 3175.969348][T16915] netlink: 112865 bytes leftover after parsing attributes in process `syz.7.12537'. [ 3178.283043][T16922] netlink: 'syz.0.12539': attribute type 1 has an invalid length. [ 3178.306382][T16922] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.12539'. [ 3178.405728][T16933] netlink: 'syz.1.12552': attribute type 3 has an invalid length. [ 3178.425039][T16933] netlink: 132 bytes leftover after parsing attributes in process `syz.1.12552'. [ 3178.529217][T16929] FAULT_INJECTION: forcing a failure. [ 3178.529217][T16929] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3178.619765][T16929] CPU: 0 PID: 16929 Comm: syz.7.12542 Not tainted syzkaller #0 [ 3178.627445][T16929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3178.637578][T16929] Call Trace: [ 3178.640944][T16929] [ 3178.643934][T16929] dump_stack_lvl+0x188/0x24e [ 3178.648698][T16929] ? show_regs_print_info+0x12/0x12 [ 3178.653968][T16929] ? load_image+0x400/0x400 [ 3178.658547][T16929] ? __lock_acquire+0x7d10/0x7d10 [ 3178.663643][T16929] ? unix_ioctl+0x25d/0x660 [ 3178.668236][T16929] should_fail_ex+0x399/0x4d0 [ 3178.672997][T16929] _copy_from_user+0x2c/0x170 [ 3178.677759][T16929] sock_do_ioctl+0x18c/0x320 [ 3178.682440][T16929] ? sock_show_fdinfo+0xb0/0xb0 [ 3178.687412][T16929] sock_ioctl+0x4d2/0x710 [ 3178.691830][T16929] ? sock_poll+0x410/0x410 [ 3178.696352][T16929] ? bpf_lsm_file_ioctl+0x5/0x10 [ 3178.701352][T16929] ? security_file_ioctl+0x7c/0xa0 [ 3178.706552][T16929] ? sock_poll+0x410/0x410 [ 3178.711059][T16929] __se_sys_ioctl+0xfa/0x170 [ 3178.715735][T16929] do_syscall_64+0x4c/0xa0 [ 3178.720229][T16929] ? clear_bhb_loop+0x60/0xb0 [ 3178.724975][T16929] ? clear_bhb_loop+0x60/0xb0 [ 3178.729730][T16929] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3178.735695][T16929] RIP: 0033:0x7fdc9179c819 [ 3178.740175][T16929] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3178.759865][T16929] RSP: 002b:00007fdc9274b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3178.768372][T16929] RAX: ffffffffffffffda RBX: 00007fdc91a15fa0 RCX: 00007fdc9179c819 [ 3178.776475][T16929] RDX: 0000200000000300 RSI: 0000000000008923 RDI: 0000000000000006 [ 3178.784547][T16929] RBP: 00007fdc9274b090 R08: 0000000000000000 R09: 0000000000000000 [ 3178.792616][T16929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3178.800660][T16929] R13: 00007fdc91a16038 R14: 00007fdc91a15fa0 R15: 00007fffabac8688 [ 3178.808853][T16929] [ 3179.101554][T16937] netlink: 'syz.8.12543': attribute type 10 has an invalid length. [ 3183.438431][T16979] mac80211_hwsim hwsim104 ªªªªªª: renamed from wlan0 [ 3184.115153][T16990] netlink: 'syz.8.12558': attribute type 3 has an invalid length. [ 3184.374187][T16990] netlink: 132 bytes leftover after parsing attributes in process `syz.8.12558'. [ 3185.003983][T17001] netlink: 'syz.5.12561': attribute type 1 has an invalid length. [ 3185.031217][T17001] netlink: 112865 bytes leftover after parsing attributes in process `syz.5.12561'. [ 3185.074409][T17009] netlink: 'syz.7.12564': attribute type 2 has an invalid length. [ 3185.115437][T17009] netlink: 'syz.7.12564': attribute type 4 has an invalid length. [ 3185.179695][T17009] netlink: 132 bytes leftover after parsing attributes in process `syz.7.12564'. [ 3185.254980][T17011] netlink: 'syz.7.12564': attribute type 6 has an invalid length. [ 3185.279876][T17011] netlink: 164 bytes leftover after parsing attributes in process `syz.7.12564'. [ 3189.665526][T17046] netlink: 'syz.0.12571': attribute type 6 has an invalid length. [ 3189.694723][T17046] netlink: 164 bytes leftover after parsing attributes in process `syz.0.12571'. [ 3191.060915][T17070] tap0: tun_chr_ioctl cmd 2147767517 [ 3191.633339][T17079] netlink: 'syz.5.12579': attribute type 2 has an invalid length. [ 3191.672202][T17079] netlink: 'syz.5.12579': attribute type 4 has an invalid length. [ 3191.706274][T17079] netlink: 132 bytes leftover after parsing attributes in process `syz.5.12579'. [ 3191.818052][T17084] netlink: 'syz.5.12579': attribute type 6 has an invalid length. [ 3191.886184][T17084] netlink: 164 bytes leftover after parsing attributes in process `syz.5.12579'. [ 3193.407372][T17106] netlink: 'syz.8.12584': attribute type 1 has an invalid length. [ 3193.419191][T17106] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.12584'. [ 3194.915943][T17112] netlink: 'syz.5.12586': attribute type 41 has an invalid length. [ 3195.265822][T17124] netlink: 'syz.1.12589': attribute type 10 has an invalid length. [ 3195.555035][T17123] netlink: 'syz.0.12588': attribute type 3 has an invalid length. [ 3195.607309][T17123] netlink: 132 bytes leftover after parsing attributes in process `syz.0.12588'. [ 3196.137543][T17136] device pim6reg1 entered promiscuous mode [ 3196.934673][T17144] netlink: 16178 bytes leftover after parsing attributes in process `syz.8.12595'. [ 3197.705506][T17151] netlink: 'syz.8.12597': attribute type 2 has an invalid length. [ 3197.748866][T17151] netlink: 'syz.8.12597': attribute type 4 has an invalid length. [ 3197.847616][T17151] netlink: 132 bytes leftover after parsing attributes in process `syz.8.12597'. [ 3197.924078][T17154] netlink: 'syz.8.12597': attribute type 6 has an invalid length. [ 3197.959858][T17154] netlink: 164 bytes leftover after parsing attributes in process `syz.8.12597'. [ 3198.765341][T17176] netlink: 'syz.0.12600': attribute type 10 has an invalid length. [ 3198.819838][T17186] netlink: 'syz.8.12604': attribute type 3 has an invalid length. [ 3198.861364][T17186] netlink: 132 bytes leftover after parsing attributes in process `syz.8.12604'. [ 3198.871576][T17176] netlink: 2 bytes leftover after parsing attributes in process `syz.0.12600'. [ 3198.977066][T17176] device hsr0 entered promiscuous mode [ 3199.065728][T17176] bridge0: port 4(hsr0) entered blocking state [ 3199.166846][T17176] bridge0: port 4(hsr0) entered disabled state [ 3199.255380][T17176] bridge0: port 4(hsr0) entered blocking state [ 3199.262048][T17176] bridge0: port 4(hsr0) entered forwarding state [ 3200.957564][T17198] netlink: 16178 bytes leftover after parsing attributes in process `syz.1.12607'. [ 3201.023569][T17205] netlink: 'syz.0.12608': attribute type 3 has an invalid length. [ 3201.035637][T17207] netlink: 'syz.7.12606': attribute type 1 has an invalid length. [ 3201.058027][T17205] netlink: 132 bytes leftover after parsing attributes in process `syz.0.12608'. [ 3201.069780][T17207] netlink: 112865 bytes leftover after parsing attributes in process `syz.7.12606'. [ 3202.192556][T17232] netlink: 'syz.1.12617': attribute type 1 has an invalid length. [ 3202.294775][T17232] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.12617'. [ 3202.790168][T17239] netlink: 'syz.7.12619': attribute type 41 has an invalid length. [ 3204.118375][T17264] netlink: 'syz.1.12627': attribute type 3 has an invalid length. [ 3204.129660][T17264] netlink: 132 bytes leftover after parsing attributes in process `syz.1.12627'. [ 3204.316719][T21223] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 3204.329370][T21223] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 3204.338046][T21223] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 3204.346843][T21223] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 3204.355090][T21223] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 3204.367883][T21223] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 3204.552592][T17272] netlink: 'syz.8.12629': attribute type 1 has an invalid length. [ 3204.595483][T17272] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.12629'. [ 3204.609058][ T9650] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3204.800716][ T9650] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3204.922714][ T1278] ieee802154 phy0 wpan0: encryption failed: -22 [ 3204.929631][ T1278] ieee802154 phy1 wpan1: encryption failed: -22 [ 3205.047675][ T9650] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3205.099577][T17275] netlink: 'syz.5.12630': attribute type 1 has an invalid length. [ 3205.145714][T17275] netlink: 112865 bytes leftover after parsing attributes in process `syz.5.12630'. [ 3205.389245][ T9650] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3205.695079][T17291] netlink: 16178 bytes leftover after parsing attributes in process `syz.1.12634'. [ 3205.716485][T17295] FAULT_INJECTION: forcing a failure. [ 3205.716485][T17295] name failslab, interval 1, probability 0, space 0, times 0 [ 3205.839883][T17295] CPU: 1 PID: 17295 Comm: syz.5.12635 Not tainted syzkaller #0 [ 3205.847612][T17295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3205.857725][T17295] Call Trace: [ 3205.861053][T17295] [ 3205.864024][T17295] dump_stack_lvl+0x188/0x24e [ 3205.868765][T17295] ? show_regs_print_info+0x12/0x12 [ 3205.874018][T17295] ? load_image+0x400/0x400 [ 3205.878588][T17295] ? __might_sleep+0xd0/0xd0 [ 3205.883309][T17295] ? __lock_acquire+0x7d10/0x7d10 [ 3205.888393][T17295] should_fail_ex+0x399/0x4d0 [ 3205.893122][T17295] should_failslab+0x5/0x20 [ 3205.897668][T17295] slab_pre_alloc_hook+0x59/0x310 [ 3205.902745][T17295] ? ip_options_get+0x4c/0x430 [ 3205.907621][T17295] __kmem_cache_alloc_node+0x4f/0x260 [ 3205.913079][T17295] ? ip_options_get+0x4c/0x430 [ 3205.917921][T17295] __kmalloc+0xa0/0x240 [ 3205.922131][T17295] ip_options_get+0x4c/0x430 [ 3205.926775][T17295] ip_cmsg_send+0x4fc/0xa50 [ 3205.931354][T17295] raw_sendmsg+0x573/0x1b20 [ 3205.935963][T17295] ? compat_raw_ioctl+0x60/0x60 [ 3205.940889][T17295] ? __might_fault+0xa6/0x120 [ 3205.945624][T17295] ? tomoyo_socket_sendmsg_permission+0x212/0x2f0 [ 3205.952098][T17295] ? sock_rps_record_flow+0x19/0x3f0 [ 3205.957430][T17295] ? inet_sendmsg+0x78/0x2f0 [ 3205.962065][T17295] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 3205.967390][T17295] ? security_socket_sendmsg+0x7c/0xa0 [ 3205.972902][T17295] ? inet_send_prepare+0x260/0x260 [ 3205.978054][T17295] ____sys_sendmsg+0x5be/0x970 [ 3205.983052][T17295] ? __sys_sendmsg_sock+0x30/0x30 [ 3205.988116][T17295] ? __import_iovec+0x315/0x500 [ 3205.993009][T17295] ? import_iovec+0x6f/0xa0 [ 3205.997727][T17295] ___sys_sendmsg+0x2a2/0x360 [ 3206.002447][T17295] ? __sys_sendmsg+0x290/0x290 [ 3206.007268][T17295] ? __lock_acquire+0x7d10/0x7d10 [ 3206.012349][T17295] __se_sys_sendmsg+0x1bb/0x2a0 [ 3206.017237][T17295] ? __x64_sys_sendmsg+0x80/0x80 [ 3206.022227][T17295] ? lockdep_hardirqs_on+0x94/0x140 [ 3206.027456][T17295] do_syscall_64+0x4c/0xa0 [ 3206.031907][T17295] ? clear_bhb_loop+0x60/0xb0 [ 3206.036700][T17295] ? clear_bhb_loop+0x60/0xb0 [ 3206.041407][T17295] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3206.047331][T17295] RIP: 0033:0x7f6545b9c819 [ 3206.051770][T17295] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3206.071414][T17295] RSP: 002b:00007f6546a3c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3206.079870][T17295] RAX: ffffffffffffffda RBX: 00007f6545e15fa0 RCX: 00007f6545b9c819 [ 3206.087953][T17295] RDX: 0000000020000000 RSI: 0000200000001640 RDI: 0000000000000003 [ 3206.095953][T17295] RBP: 00007f6546a3c090 R08: 0000000000000000 R09: 0000000000000000 [ 3206.103970][T17295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3206.111962][T17295] R13: 00007f6545e16038 R14: 00007f6545e15fa0 R15: 00007ffedf8d9e78 [ 3206.119986][T17295] [ 3206.158448][T17269] chnl_net:caif_netlink_parms(): no params data found [ 3206.424263][T17269] bridge0: port 1(bridge_slave_0) entered blocking state [ 3206.431743][T17269] bridge0: port 1(bridge_slave_0) entered disabled state [ 3206.440239][ T4316] Bluetooth: hci2: command 0x0409 tx timeout [ 3206.443378][T17269] device bridge_slave_0 entered promiscuous mode [ 3206.459488][T17269] bridge0: port 2(bridge_slave_1) entered blocking state [ 3206.466941][T17269] bridge0: port 2(bridge_slave_1) entered disabled state [ 3206.550809][T17269] device bridge_slave_1 entered promiscuous mode [ 3207.076355][T17269] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3207.089347][T17269] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3207.749867][T17269] team0: Port device team_slave_0 added [ 3207.766535][T17330] netlink: 'syz.8.12642': attribute type 3 has an invalid length. [ 3207.841124][T17330] netlink: 132 bytes leftover after parsing attributes in process `syz.8.12642'. [ 3208.040409][T17335] netlink: 16178 bytes leftover after parsing attributes in process `syz.5.12643'. [ 3208.054986][T17269] team0: Port device team_slave_1 added [ 3208.389341][T17269] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3208.396381][T17269] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3208.519457][ T4316] Bluetooth: hci2: command 0x041b tx timeout [ 3208.554334][T17269] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3208.587774][T17269] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3208.605990][T17269] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3208.715682][T17269] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3209.235498][T17269] device hsr_slave_0 entered promiscuous mode [ 3209.299728][T17269] device hsr_slave_1 entered promiscuous mode [ 3209.353278][T17269] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 3209.381588][T17269] Cannot create hsr debugfs directory [ 3210.600235][ T4316] Bluetooth: hci2: command 0x040f tx timeout [ 3210.670645][T17377] netlink: 'syz.8.12653': attribute type 1 has an invalid length. [ 3210.747082][T17377] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.12653'. [ 3210.852957][T17382] netlink: 16178 bytes leftover after parsing attributes in process `syz.1.12654'. [ 3211.287692][T17392] netlink: 'syz.8.12656': attribute type 1 has an invalid length. [ 3211.328572][T17392] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.12656'. [ 3211.590102][T17401] netlink: 'syz.1.12657': attribute type 3 has an invalid length. [ 3211.598270][T17401] netlink: 132 bytes leftover after parsing attributes in process `syz.1.12657'. [ 3211.936614][ T9650] bond0: (slave wlan1): Releasing backup interface [ 3212.171552][T17411] netlink: 'syz.8.12660': attribute type 29 has an invalid length. [ 3212.384979][T17411] netlink: 'syz.8.12660': attribute type 29 has an invalid length. [ 3212.405300][T17416] netlink: 'syz.8.12660': attribute type 29 has an invalid length. [ 3212.466613][ T9650] device hsr_slave_0 left promiscuous mode [ 3212.475739][ T9650] device hsr_slave_1 left promiscuous mode [ 3212.486587][ T9650] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3212.509179][ T9650] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3212.518368][ T9650] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3212.536998][ T9650] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3212.547787][ T9650] batman_adv: batadv0: Interface deactivated: vlan1 [ 3212.560043][ T9650] batman_adv: batadv0: Removing interface: vlan1 [ 3212.573105][ T9650] bridge0: port 4(hsr0) entered disabled state [ 3212.600895][ T9650] bridge0: port 3(team0) entered disabled state [ 3212.627235][ T9650] device bridge_slave_1 left promiscuous mode [ 3212.633774][ T9650] bridge0: port 2(bridge_slave_1) entered disabled state [ 3212.679254][ T4316] Bluetooth: hci2: command 0x0419 tx timeout [ 3212.687653][ T9650] device bridge_slave_0 left promiscuous mode [ 3212.701085][ T9650] bridge0: port 1(bridge_slave_0) entered disabled state [ 3212.829863][ T9650] device veth1_macvtap left promiscuous mode [ 3212.844332][ T9650] device veth0_macvtap left promiscuous mode [ 3212.867896][ T9650] device veth0_vlan left promiscuous mode [ 3213.216472][T17435] netlink: 'syz.1.12665': attribute type 1 has an invalid length. [ 3213.250878][T17435] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.12665'. [ 3213.590271][ T9650] device geneve1 left promiscuous mode [ 3213.623515][ T9650] team0 (unregistering): Port device geneve1 removed [ 3213.690032][T17445] netlink: 16178 bytes leftover after parsing attributes in process `syz.5.12667'. [ 3213.724103][T17442] netlink: 'syz.1.12666': attribute type 1 has an invalid length. [ 3213.755820][T17442] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.12666'. [ 3214.103657][T17454] netlink: 'syz.1.12669': attribute type 1 has an invalid length. [ 3214.175757][T17454] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.12669'. [ 3214.880063][T17466] FAULT_INJECTION: forcing a failure. [ 3214.880063][T17466] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3214.910365][T17466] CPU: 1 PID: 17466 Comm: syz.5.12673 Not tainted syzkaller #0 [ 3214.917985][T17466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3214.928095][T17466] Call Trace: [ 3214.931404][T17466] [ 3214.934368][T17466] dump_stack_lvl+0x188/0x24e [ 3214.939099][T17466] ? show_regs_print_info+0x12/0x12 [ 3214.944339][T17466] ? load_image+0x400/0x400 [ 3214.948894][T17466] ? __lock_acquire+0x7d10/0x7d10 [ 3214.953985][T17466] should_fail_ex+0x399/0x4d0 [ 3214.958791][T17466] _copy_from_user+0x2c/0x170 [ 3214.963517][T17466] __sys_bpf+0x2ea/0x780 [ 3214.967813][T17466] ? bpf_link_show_fdinfo+0x380/0x380 [ 3214.973245][T17466] ? lock_chain_count+0x20/0x20 [ 3214.978150][T17466] __x64_sys_bpf+0x78/0x90 [ 3214.982609][T17466] do_syscall_64+0x4c/0xa0 [ 3214.987072][T17466] ? clear_bhb_loop+0x60/0xb0 [ 3214.991799][T17466] ? clear_bhb_loop+0x60/0xb0 [ 3214.996523][T17466] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3215.002465][T17466] RIP: 0033:0x7f6545b9c819 [ 3215.006929][T17466] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3215.026660][T17466] RSP: 002b:00007f6546a3c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3215.035181][T17466] RAX: ffffffffffffffda RBX: 00007f6545e15fa0 RCX: 00007f6545b9c819 [ 3215.043166][T17466] RDX: 0000000000000038 RSI: 0000200000000300 RDI: 000000000000001a [ 3215.051150][T17466] RBP: 00007f6546a3c090 R08: 0000000000000000 R09: 0000000000000000 [ 3215.059134][T17466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3215.067112][T17466] R13: 00007f6545e16038 R14: 00007f6545e15fa0 R15: 00007ffedf8d9e78 [ 3215.075109][T17466] [ 3215.541202][ T9650] device team_slave_1 left promiscuous mode [ 3215.556952][ T9650] team0 (unregistering): Port device team_slave_1 removed [ 3215.658086][ T9650] device C left promiscuous mode [ 3215.664636][ T9650] team0 (unregistering): Port device C removed [ 3215.768156][ T9650] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3216.246777][ T9650] bond0 (unregistering): (slave bridge0): Releasing backup interface [ 3216.255806][ T9650] bond0 (unregistering): (slave bridge0): last VLAN challenged slave left bond - VLAN blocking is removed [ 3216.267439][ T9650] bond0 (unregistering): Released all slaves [ 3216.409420][T17473] netlink: 64019 bytes leftover after parsing attributes in process `syz.5.12675'. [ 3216.457541][T17269] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 3216.509781][T17462] : port 1(ip6gretap0) entered blocking state [ 3216.516096][T17462] : port 1(ip6gretap0) entered disabled state [ 3216.537018][T17462] device ip6gretap0 entered promiscuous mode [ 3216.583239][T17269] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 3216.634381][T17464] device ip6gretap0 left promiscuous mode [ 3216.642772][T17464] : port 1(ip6gretap0) entered disabled state [ 3216.829781][T17269] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 3216.870242][T17269] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 3216.903695][T17481] netlink: 'syz.8.12677': attribute type 1 has an invalid length. [ 3216.919425][T17481] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.12677'. [ 3216.954676][T17485] tap0: tun_chr_ioctl cmd 2147767517 [ 3217.421035][T17269] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3217.597920][T17494] netlink: 'syz.8.12681': attribute type 1 has an invalid length. [ 3217.613464][T17494] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.12681'. [ 3217.655016][T17269] 8021q: adding VLAN 0 to HW filter on device team0 [ 3217.663145][ T4377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 3217.677612][ T4377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 3217.797525][ T4377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 3217.817297][ T4377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 3217.854423][ T4377] bridge0: port 1(bridge_slave_0) entered blocking state [ 3217.861699][ T4377] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3217.934531][ T4377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 3217.963519][ T4377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 3218.000232][ T4377] bridge0: port 2(bridge_slave_1) entered blocking state [ 3218.007429][ T4377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3218.049461][ T4377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 3218.110613][ T4377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 3218.219717][ T1169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 3218.229910][ T1169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 3218.230803][T17503] netlink: 'syz.7.12683': attribute type 1 has an invalid length. [ 3218.253727][ T1169] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 3218.276283][ T1169] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 3218.329638][T17162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 3218.339706][T17503] netlink: 112865 bytes leftover after parsing attributes in process `syz.7.12683'. [ 3218.345537][T17162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 3218.392636][T17162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 3218.452872][T17162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 3218.487500][T17269] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 3218.541113][T17269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 3218.575719][T17162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 3218.608925][T17162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 3219.047468][T17530] FAULT_INJECTION: forcing a failure. [ 3219.047468][T17530] name failslab, interval 1, probability 0, space 0, times 0 [ 3219.210865][T17530] CPU: 1 PID: 17530 Comm: syz.7.12696 Not tainted syzkaller #0 [ 3219.218512][T17530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3219.228591][T17530] Call Trace: [ 3219.231987][T17530] [ 3219.234943][T17530] dump_stack_lvl+0x188/0x24e [ 3219.239786][T17530] ? show_regs_print_info+0x12/0x12 [ 3219.245021][T17530] ? load_image+0x400/0x400 [ 3219.249562][T17530] ? __might_sleep+0xd0/0xd0 [ 3219.254192][T17530] ? __lock_acquire+0x7d10/0x7d10 [ 3219.259258][T17530] should_fail_ex+0x399/0x4d0 [ 3219.263993][T17530] should_failslab+0x5/0x20 [ 3219.268536][T17530] slab_pre_alloc_hook+0x59/0x310 [ 3219.273606][T17530] ? tomoyo_encode+0x27e/0x540 [ 3219.278397][T17530] __kmem_cache_alloc_node+0x4f/0x260 [ 3219.283789][T17530] ? tomoyo_encode+0x27e/0x540 [ 3219.288617][T17530] __kmalloc+0xa0/0x240 [ 3219.292798][T17530] tomoyo_encode+0x27e/0x540 [ 3219.297415][T17530] tomoyo_realpath_from_path+0x58e/0x5d0 [ 3219.303075][T17530] ? tomoyo_path_number_perm+0x205/0x650 [ 3219.308725][T17530] tomoyo_path_number_perm+0x22f/0x650 [ 3219.314215][T17530] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 3219.319697][T17530] ? ksys_write+0x1c0/0x250 [ 3219.324222][T17530] ? common_file_perm+0x171/0x1c0 [ 3219.329291][T17530] ? __fget_files+0x28/0x4b0 [ 3219.333896][T17530] ? __fget_files+0x28/0x4b0 [ 3219.338521][T17530] security_file_ioctl+0x6c/0xa0 [ 3219.343483][T17530] __se_sys_ioctl+0x48/0x170 [ 3219.348102][T17530] do_syscall_64+0x4c/0xa0 [ 3219.352564][T17530] ? clear_bhb_loop+0x60/0xb0 [ 3219.357259][T17530] ? clear_bhb_loop+0x60/0xb0 [ 3219.361959][T17530] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3219.367881][T17530] RIP: 0033:0x7fdc9179c819 [ 3219.372313][T17530] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3219.391952][T17530] RSP: 002b:00007fdc92709028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3219.400390][T17530] RAX: ffffffffffffffda RBX: 00007fdc91a16180 RCX: 00007fdc9179c819 [ 3219.408374][T17530] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 0000000000000010 [ 3219.416359][T17530] RBP: 00007fdc92709090 R08: 0000000000000000 R09: 0000000000000000 [ 3219.424339][T17530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3219.432413][T17530] R13: 00007fdc91a16218 R14: 00007fdc91a16180 R15: 00007fffabac8688 [ 3219.440723][T17530] [ 3219.529202][T17530] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3219.817022][ T1169] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 3219.849513][ T1169] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 3219.909264][T17269] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3220.012505][ T1169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 3220.062280][ T1169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 3220.147220][T17269] device veth0_vlan entered promiscuous mode [ 3220.166031][ T1169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 3220.204094][ T1169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 3220.246209][ T4377] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 3220.258875][T17547] netlink: 'syz.8.12691': attribute type 1 has an invalid length. [ 3220.289318][T17547] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.12691'. [ 3220.312518][ T4377] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 3220.365741][T17269] device veth1_vlan entered promiscuous mode [ 3220.480000][ T1169] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 3220.508307][ T1169] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 3220.575875][ T1169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 3220.615247][ T1169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 3220.652266][T17269] device veth0_macvtap entered promiscuous mode [ 3220.705425][T17269] device veth1_macvtap entered promiscuous mode [ 3220.849169][ T4335] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 3220.896980][ T4335] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 3220.986792][T17269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3221.087963][T17269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3221.170772][T17561] netlink: 'syz.1.12695': attribute type 1 has an invalid length. [ 3221.177708][T17269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3221.231969][T17561] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.12695'. [ 3221.264644][T17269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3221.320084][T17269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3221.359127][T17269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3221.389199][T17269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3221.410307][T17269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3221.470912][T17269] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3221.510350][ T4335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 3221.549432][ T4335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 3221.583711][T17269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3221.628211][T17269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3221.685273][T17269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3221.714360][T17269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3221.745011][T17269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3221.796545][T17269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3221.889239][T17269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3221.935221][T17269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3221.996065][T17579] can: request_module (can-proto-0) failed. [ 3222.011056][T17269] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3222.029149][ T4335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 3222.041430][ T4335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 3222.110550][T17588] netlink: 16098 bytes leftover after parsing attributes in process `syz.8.12700'. [ 3222.184667][T17269] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3222.203828][T17269] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3222.237211][T17269] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3222.262393][T17269] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3222.438694][T17593] netlink: 'syz.5.12701': attribute type 3 has an invalid length. [ 3222.491112][T17593] netlink: 'syz.5.12701': attribute type 1 has an invalid length. [ 3222.517119][T17593] netlink: 116 bytes leftover after parsing attributes in process `syz.5.12701'. [ 3222.556399][T17600] FAULT_INJECTION: forcing a failure. [ 3222.556399][T17600] name failslab, interval 1, probability 0, space 0, times 0 [ 3222.607410][ T4335] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3222.621164][ T4335] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3222.642579][T17600] CPU: 1 PID: 17600 Comm: syz.8.12702 Not tainted syzkaller #0 [ 3222.650216][T17600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3222.660323][T17600] Call Trace: [ 3222.663696][T17600] [ 3222.666674][T17600] dump_stack_lvl+0x188/0x24e [ 3222.671401][T17600] ? show_regs_print_info+0x12/0x12 [ 3222.676738][T17600] ? load_image+0x400/0x400 [ 3222.681285][T17600] ? __might_sleep+0xd0/0xd0 [ 3222.685917][T17600] ? __lock_acquire+0x7d10/0x7d10 [ 3222.690997][T17600] should_fail_ex+0x399/0x4d0 [ 3222.695719][T17600] should_failslab+0x5/0x20 [ 3222.700248][T17600] slab_pre_alloc_hook+0x59/0x310 [ 3222.705317][T17600] ? sk_prot_alloc+0xe7/0x210 [ 3222.710018][T17600] __kmem_cache_alloc_node+0x4f/0x260 [ 3222.715431][T17600] ? sk_prot_alloc+0xe7/0x210 [ 3222.720132][T17600] __kmalloc+0xa0/0x240 [ 3222.724401][T17600] sk_prot_alloc+0xe7/0x210 [ 3222.728922][T17600] ? sk_alloc+0x20/0x340 [ 3222.733289][T17600] sk_alloc+0x36/0x340 [ 3222.737373][T17600] ? bpf_ctx_init+0x163/0x1a0 [ 3222.742071][T17600] ? bpf_prog_test_run_skb+0x26f/0x12a0 [ 3222.747636][T17600] bpf_prog_test_run_skb+0x35e/0x12a0 [ 3222.753030][T17600] ? __fget_files+0x28/0x4b0 [ 3222.757669][T17600] ? __fget_files+0x43d/0x4b0 [ 3222.762372][T17600] ? cpu_online+0xa0/0xa0 [ 3222.766718][T17600] bpf_prog_test_run+0x31e/0x390 [ 3222.771678][T17600] __sys_bpf+0x62b/0x780 [ 3222.775948][T17600] ? bpf_link_show_fdinfo+0x380/0x380 [ 3222.781353][T17600] ? lock_chain_count+0x20/0x20 [ 3222.786316][T17600] __x64_sys_bpf+0x78/0x90 [ 3222.790753][T17600] do_syscall_64+0x4c/0xa0 [ 3222.795195][T17600] ? clear_bhb_loop+0x60/0xb0 [ 3222.799894][T17600] ? clear_bhb_loop+0x60/0xb0 [ 3222.804592][T17600] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3222.810505][T17600] RIP: 0033:0x7f6d3f59c819 [ 3222.814933][T17600] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3222.834551][T17600] RSP: 002b:00007f6d4051b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3222.842985][T17600] RAX: ffffffffffffffda RBX: 00007f6d3f815fa0 RCX: 00007f6d3f59c819 [ 3222.850971][T17600] RDX: 0000000000000050 RSI: 0000200000000d80 RDI: 000000000000000a [ 3222.858953][T17600] RBP: 00007f6d4051b090 R08: 0000000000000000 R09: 0000000000000000 [ 3222.866938][T17600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3222.874918][T17600] R13: 00007f6d3f816038 R14: 00007f6d3f815fa0 R15: 00007ffecd0373b8 [ 3222.882918][T17600] [ 3222.913796][ T4335] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 3222.976907][ T9650] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3222.989645][ T9650] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3223.007364][T17162] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 3223.152365][T17613] netlink: 'syz.7.12704': attribute type 1 has an invalid length. [ 3223.196515][T17613] netlink: 112865 bytes leftover after parsing attributes in process `syz.7.12704'. [ 3223.577497][T17626] netlink: 'syz.1.12707': attribute type 3 has an invalid length. [ 3223.739342][T17626] netlink: 132 bytes leftover after parsing attributes in process `syz.1.12707'. [ 3226.960388][T17646] netlink: 'syz.5.12712': attribute type 41 has an invalid length. [ 3229.114948][T17703] netlink: 'syz.8.12722': attribute type 1 has an invalid length. [ 3229.162887][T17703] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.12722'. [ 3229.631335][T17719] FAULT_INJECTION: forcing a failure. [ 3229.631335][T17719] name failslab, interval 1, probability 0, space 0, times 0 [ 3229.678534][T17719] CPU: 1 PID: 17719 Comm: syz.1.12726 Not tainted syzkaller #0 [ 3229.686269][T17719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3229.696375][T17719] Call Trace: [ 3229.699690][T17719] [ 3229.702653][T17719] dump_stack_lvl+0x188/0x24e [ 3229.707386][T17719] ? show_regs_print_info+0x12/0x12 [ 3229.712667][T17719] ? load_image+0x400/0x400 [ 3229.717230][T17719] ? __local_bh_enable_ip+0x136/0x1c0 [ 3229.722677][T17719] ? lockdep_hardirqs_on+0x94/0x140 [ 3229.727944][T17719] ? __local_bh_enable_ip+0x136/0x1c0 [ 3229.733553][T17719] should_fail_ex+0x399/0x4d0 [ 3229.738277][T17719] should_failslab+0x5/0x20 [ 3229.742805][T17719] slab_pre_alloc_hook+0x59/0x310 [ 3229.747950][T17719] ? sctp_get_port_local+0xd75/0x1510 [ 3229.753366][T17719] ? sctp_add_bind_addr+0x89/0x350 [ 3229.758520][T17719] __kmem_cache_alloc_node+0x4f/0x260 [ 3229.763919][T17719] ? sctp_add_bind_addr+0x89/0x350 [ 3229.769056][T17719] kmalloc_trace+0x26/0xe0 [ 3229.773538][T17719] sctp_add_bind_addr+0x89/0x350 [ 3229.778718][T17719] sctp_do_bind+0x616/0x990 [ 3229.783555][T17719] sctp_connect_new_asoc+0x266/0x6a0 [ 3229.788897][T17719] ? __sctp_connect+0xd80/0xd80 [ 3229.793794][T17719] ? sctp_endpoint_lookup_assoc+0xcd/0x260 [ 3229.799624][T17719] __sctp_connect+0x5b3/0xd80 [ 3229.804360][T17719] ? sctp_setsockopt+0x1f5/0xf90 [ 3229.809338][T17719] ? sctp_send_asconf+0x170/0x170 [ 3229.814383][T17719] ? __local_bh_enable_ip+0x136/0x1c0 [ 3229.819776][T17719] ? lockdep_hardirqs_on+0x94/0x140 [ 3229.824994][T17719] ? __local_bh_enable_ip+0x136/0x1c0 [ 3229.830380][T17719] ? bpf_lsm_sctp_bind_connect+0x5/0x10 [ 3229.835944][T17719] ? security_sctp_bind_connect+0x85/0xb0 [ 3229.841701][T17719] sctp_setsockopt_connectx+0x101/0x1a0 [ 3229.847355][T17719] sctp_setsockopt+0x8f4/0xf90 [ 3229.852142][T17719] ? sock_common_recvmsg+0x190/0x190 [ 3229.857452][T17719] __sys_setsockopt+0x2bf/0x3d0 [ 3229.862331][T17719] __x64_sys_setsockopt+0xb1/0xc0 [ 3229.867463][T17719] do_syscall_64+0x4c/0xa0 [ 3229.871905][T17719] ? clear_bhb_loop+0x60/0xb0 [ 3229.876605][T17719] ? clear_bhb_loop+0x60/0xb0 [ 3229.881302][T17719] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3229.887217][T17719] RIP: 0033:0x7fe0a079c819 [ 3229.891646][T17719] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3229.911459][T17719] RSP: 002b:00007fe0a1655028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 3229.919908][T17719] RAX: ffffffffffffffda RBX: 00007fe0a0a15fa0 RCX: 00007fe0a079c819 [ 3229.927900][T17719] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 3229.935885][T17719] RBP: 00007fe0a1655090 R08: 0000000000000011 R09: 0000000000000000 [ 3229.944227][T17719] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3229.952210][T17719] R13: 00007fe0a0a16038 R14: 00007fe0a0a15fa0 R15: 00007ffe6c477498 [ 3229.960212][T17719] [ 3230.902823][T17750] netlink: 'syz.1.12731': attribute type 3 has an invalid length. [ 3230.979732][T17750] netlink: 132 bytes leftover after parsing attributes in process `syz.1.12731'. [ 3231.362716][T17755] netlink: 'syz.8.12733': attribute type 3 has an invalid length. [ 3231.398797][T17755] netlink: 132 bytes leftover after parsing attributes in process `syz.8.12733'. [ 3231.563590][T17762] netlink: 'syz.5.12735': attribute type 1 has an invalid length. [ 3231.662666][T17762] netlink: 112865 bytes leftover after parsing attributes in process `syz.5.12735'. [ 3231.887401][T17764] netlink: 15743 bytes leftover after parsing attributes in process `syz.0.12734'. [ 3232.593096][T17774] device syzkaller0 entered promiscuous mode [ 3232.641720][T17776] netlink: 'syz.5.12739': attribute type 41 has an invalid length. [ 3236.950482][T17817] netlink: 'syz.7.12747': attribute type 3 has an invalid length. [ 3236.991365][T17817] netlink: 132 bytes leftover after parsing attributes in process `syz.7.12747'. [ 3237.090882][T17824] netlink: 'syz.1.12749': attribute type 1 has an invalid length. [ 3237.159300][T17824] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.12749'. [ 3244.015882][T17822] netlink: 132 bytes leftover after parsing attributes in process `syz.0.12748'. [ 3245.307854][T17893] netlink: 'syz.7.12764': attribute type 25 has an invalid length. [ 3245.337191][T17893] netlink: 'syz.7.12764': attribute type 3 has an invalid length. [ 3245.356733][T17893] netlink: 132 bytes leftover after parsing attributes in process `syz.7.12764'. [ 3247.942399][T17916] netlink: 'syz.5.12767': attribute type 21 has an invalid length. [ 3249.015658][T17931] netlink: 'syz.1.12770': attribute type 1 has an invalid length. [ 3249.047384][T17931] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.12770'. [ 3250.043873][T17944] device syzkaller0 entered promiscuous mode [ 3250.424326][T17952] netlink: 132 bytes leftover after parsing attributes in process `syz.1.12774'. [ 3250.496398][T17951] netlink: 'syz.7.12776': attribute type 1 has an invalid length. [ 3250.508020][T17951] netlink: 112865 bytes leftover after parsing attributes in process `syz.7.12776'. [ 3250.533464][T17955] netlink: 'syz.0.12777': attribute type 3 has an invalid length. [ 3250.564367][T17955] netlink: 132 bytes leftover after parsing attributes in process `syz.0.12777'. [ 3253.407018][T17998] netlink: 'syz.7.12785': attribute type 1 has an invalid length. [ 3253.428657][T17998] netlink: 112865 bytes leftover after parsing attributes in process `syz.7.12785'. [ 3254.828683][T18015] netlink: 'syz.1.12789': attribute type 1 has an invalid length. [ 3254.846506][T18015] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.12789'. [ 3256.667347][T17963] netlink: 'syz.5.12780': attribute type 41 has an invalid length. [ 3256.699161][T18019] netlink: 'syz.1.12790': attribute type 21 has an invalid length. [ 3257.276563][T18034] netlink: 'syz.7.12795': attribute type 41 has an invalid length. [ 3257.576674][T18044] netlink: 'syz.1.12797': attribute type 1 has an invalid length. [ 3257.717636][T18044] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.12797'. [ 3258.521488][T18060] netlink: 'syz.1.12800': attribute type 1 has an invalid length. [ 3258.561542][T18060] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.12800'. [ 3259.098100][T18073] netlink: 'syz.8.12803': attribute type 41 has an invalid length. [ 3260.287122][T18086] netlink: 'syz.0.12808': attribute type 1 has an invalid length. [ 3260.309590][T18086] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.12808'. [ 3260.747952][T18095] netlink: 'syz.7.12810': attribute type 41 has an invalid length. [ 3260.790012][T18098] netlink: 'syz.0.12811': attribute type 21 has an invalid length. [ 3260.886555][T18097] netlink: 'syz.1.12812': attribute type 1 has an invalid length. [ 3260.927061][T18097] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.12812'. [ 3262.295040][T18118] netlink: 'syz.1.12826': attribute type 1 has an invalid length. [ 3262.317525][T18118] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.12826'. [ 3262.995347][T18129] netlink: 'syz.8.12817': attribute type 25 has an invalid length. [ 3263.021846][T18129] netlink: 'syz.8.12817': attribute type 3 has an invalid length. [ 3263.060497][T18129] netlink: 132 bytes leftover after parsing attributes in process `syz.8.12817'. [ 3263.431973][T18136] netlink: 'syz.0.12821': attribute type 1 has an invalid length. [ 3263.460918][T18136] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.12821'. [ 3265.646664][T18183] netlink: 'syz.8.12832': attribute type 41 has an invalid length. [ 3265.833812][T18184] netlink: 'syz.5.12833': attribute type 1 has an invalid length. [ 3265.864118][T18184] netlink: 112865 bytes leftover after parsing attributes in process `syz.5.12833'. [ 3265.881514][T18176] device pim6reg1 entered promiscuous mode [ 3266.290330][T18195] netlink: 'syz.5.12836': attribute type 3 has an invalid length. [ 3266.319396][T18195] netlink: 132 bytes leftover after parsing attributes in process `syz.5.12836'. [ 3266.362103][ T1278] ieee802154 phy0 wpan0: encryption failed: -22 [ 3266.368620][ T1278] ieee802154 phy1 wpan1: encryption failed: -22 [ 3268.217968][T18222] device syzkaller0 entered promiscuous mode [ 3268.402486][T18224] netlink: 'syz.1.12845': attribute type 39 has an invalid length. [ 3269.729647][T18231] netlink: 'syz.5.12846': attribute type 3 has an invalid length. [ 3269.746437][T18231] netlink: 'syz.5.12846': attribute type 1 has an invalid length. [ 3269.764531][T18231] netlink: 116 bytes leftover after parsing attributes in process `syz.5.12846'. [ 3270.348720][T18247] netlink: 'syz.1.12849': attribute type 3 has an invalid length. [ 3270.511811][T18247] netlink: 132 bytes leftover after parsing attributes in process `syz.1.12849'. [ 3273.046598][T18271] netlink: 'syz.7.12857': attribute type 29 has an invalid length. [ 3275.817864][T18271] netlink: 'syz.7.12857': attribute type 29 has an invalid length. [ 3276.070271][T18277] netlink: 'syz.5.12858': attribute type 1 has an invalid length. [ 3276.134702][T18277] netlink: 112865 bytes leftover after parsing attributes in process `syz.5.12858'. [ 3276.205027][T18282] netlink: 'syz.8.12859': attribute type 1 has an invalid length. [ 3276.241453][T18282] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.12859'. [ 3276.615869][T18298] netlink: 'syz.5.12865': attribute type 41 has an invalid length. [ 3278.166063][T18331] netlink: 'syz.8.12872': attribute type 3 has an invalid length. [ 3278.190593][T18331] netlink: 132 bytes leftover after parsing attributes in process `syz.8.12872'. [ 3278.431262][T18336] FAULT_INJECTION: forcing a failure. [ 3278.431262][T18336] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3278.456302][T18336] CPU: 0 PID: 18336 Comm: syz.5.12873 Not tainted syzkaller #0 [ 3278.463939][T18336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3278.474045][T18336] Call Trace: [ 3278.477366][T18336] [ 3278.480329][T18336] dump_stack_lvl+0x188/0x24e [ 3278.485073][T18336] ? show_regs_print_info+0x12/0x12 [ 3278.490418][T18336] ? load_image+0x400/0x400 [ 3278.494969][T18336] ? __lock_acquire+0x7d10/0x7d10 [ 3278.500047][T18336] ? perf_trace_lock_acquire+0x100/0x3e0 [ 3278.505819][T18336] should_fail_ex+0x399/0x4d0 [ 3278.510544][T18336] _copy_from_user+0x2c/0x170 [ 3278.515280][T18336] dev_ethtool+0xc2/0x12f0 [ 3278.519828][T18336] ? ethtool_get_module_eeprom_call+0x170/0x170 [ 3278.526113][T18336] ? __lock_acquire+0x7d10/0x7d10 [ 3278.531167][T18336] ? __kmem_cache_free+0xb6/0x1f0 [ 3278.536219][T18336] ? full_name_hash+0x8e/0xe0 [ 3278.540911][T18336] ? dev_load+0x1d/0x1e0 [ 3278.545222][T18336] ? dev_load+0x1d/0x1e0 [ 3278.549483][T18336] dev_ioctl+0x474/0xe80 [ 3278.553743][T18336] sock_do_ioctl+0x245/0x320 [ 3278.558349][T18336] ? sock_show_fdinfo+0xb0/0xb0 [ 3278.563233][T18336] sock_ioctl+0x4d2/0x710 [ 3278.567577][T18336] ? sock_poll+0x410/0x410 [ 3278.572017][T18336] ? bpf_lsm_file_ioctl+0x5/0x10 [ 3278.576970][T18336] ? security_file_ioctl+0x7c/0xa0 [ 3278.582102][T18336] ? sock_poll+0x410/0x410 [ 3278.586535][T18336] __se_sys_ioctl+0xfa/0x170 [ 3278.591149][T18336] do_syscall_64+0x4c/0xa0 [ 3278.595593][T18336] ? clear_bhb_loop+0x60/0xb0 [ 3278.600285][T18336] ? clear_bhb_loop+0x60/0xb0 [ 3278.604993][T18336] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3278.610902][T18336] RIP: 0033:0x7f6545b9c819 [ 3278.615333][T18336] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3278.634954][T18336] RSP: 002b:00007f6546a3c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3278.643391][T18336] RAX: ffffffffffffffda RBX: 00007f6545e15fa0 RCX: 00007f6545b9c819 [ 3278.651397][T18336] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 0000000000000010 [ 3278.659380][T18336] RBP: 00007f6546a3c090 R08: 0000000000000000 R09: 0000000000000000 [ 3278.667363][T18336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3278.675369][T18336] R13: 00007f6545e16038 R14: 00007f6545e15fa0 R15: 00007ffedf8d9e78 [ 3278.683418][T18336] [ 3279.046189][T18346] netlink: 'syz.7.12877': attribute type 1 has an invalid length. [ 3279.089234][T18346] netlink: 112865 bytes leftover after parsing attributes in process `syz.7.12877'. [ 3279.195075][T18349] netlink: 15487 bytes leftover after parsing attributes in process `syz.0.12878'. [ 3282.025162][T18397] netlink: 'syz.5.12889': attribute type 3 has an invalid length. [ 3282.146157][T18399] netlink: 'syz.1.12891': attribute type 1 has an invalid length. [ 3282.160816][T18397] netlink: 132 bytes leftover after parsing attributes in process `syz.5.12889'. [ 3282.323018][T18399] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.12891'. [ 3282.741107][T18412] FAULT_INJECTION: forcing a failure. [ 3282.741107][T18412] name failslab, interval 1, probability 0, space 0, times 0 [ 3282.764036][T18412] CPU: 1 PID: 18412 Comm: syz.7.12894 Not tainted syzkaller #0 [ 3282.771704][T18412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3282.781999][T18412] Call Trace: [ 3282.785317][T18412] [ 3282.788287][T18412] dump_stack_lvl+0x188/0x24e [ 3282.793019][T18412] ? show_regs_print_info+0x12/0x12 [ 3282.798301][T18412] ? load_image+0x400/0x400 [ 3282.802855][T18412] ? __might_sleep+0xd0/0xd0 [ 3282.807483][T18412] ? __lock_acquire+0x7d10/0x7d10 [ 3282.812560][T18412] should_fail_ex+0x399/0x4d0 [ 3282.817279][T18412] should_failslab+0x5/0x20 [ 3282.821904][T18412] slab_pre_alloc_hook+0x59/0x310 [ 3282.826970][T18412] ? sk_prot_alloc+0xe7/0x210 [ 3282.831693][T18412] __kmem_cache_alloc_node+0x4f/0x260 [ 3282.837192][T18412] ? sk_prot_alloc+0xe7/0x210 [ 3282.841910][T18412] __kmalloc+0xa0/0x240 [ 3282.846116][T18412] sk_prot_alloc+0xe7/0x210 [ 3282.850655][T18412] ? sk_alloc+0x20/0x340 [ 3282.854948][T18412] sk_alloc+0x36/0x340 [ 3282.859162][T18412] ? bpf_ctx_init+0x163/0x1a0 [ 3282.863955][T18412] ? bpf_prog_test_run_skb+0x26f/0x12a0 [ 3282.869522][T18412] bpf_prog_test_run_skb+0x35e/0x12a0 [ 3282.874907][T18412] ? __fget_files+0x28/0x4b0 [ 3282.879519][T18412] ? __fget_files+0x43d/0x4b0 [ 3282.884221][T18412] ? cpu_online+0xa0/0xa0 [ 3282.888593][T18412] bpf_prog_test_run+0x31e/0x390 [ 3282.893557][T18412] __sys_bpf+0x62b/0x780 [ 3282.897820][T18412] ? bpf_link_show_fdinfo+0x380/0x380 [ 3282.903243][T18412] ? lock_chain_count+0x20/0x20 [ 3282.908249][T18412] __x64_sys_bpf+0x78/0x90 [ 3282.912709][T18412] do_syscall_64+0x4c/0xa0 [ 3282.917270][T18412] ? clear_bhb_loop+0x60/0xb0 [ 3282.922078][T18412] ? clear_bhb_loop+0x60/0xb0 [ 3282.926792][T18412] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3282.932815][T18412] RIP: 0033:0x7fdc9179c819 [ 3282.937262][T18412] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3282.956909][T18412] RSP: 002b:00007fdc9272a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3282.965435][T18412] RAX: ffffffffffffffda RBX: 00007fdc91a16090 RCX: 00007fdc9179c819 [ 3282.973439][T18412] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 3282.981430][T18412] RBP: 00007fdc9272a090 R08: 0000000000000000 R09: 0000000000000000 [ 3282.989414][T18412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3282.997405][T18412] R13: 00007fdc91a16128 R14: 00007fdc91a16090 R15: 00007fffabac8688 [ 3283.005419][T18412] [ 3283.208076][T18416] netlink: 'syz.0.12893': attribute type 1 has an invalid length. [ 3283.217526][T18416] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.12893'. [ 3283.579354][T18433] FAULT_INJECTION: forcing a failure. [ 3283.579354][T18433] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3283.672777][T18433] CPU: 0 PID: 18433 Comm: syz.8.12900 Not tainted syzkaller #0 [ 3283.680425][T18433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3283.690518][T18433] Call Trace: [ 3283.693828][T18433] [ 3283.696786][T18433] dump_stack_lvl+0x188/0x24e [ 3283.701518][T18433] ? show_regs_print_info+0x12/0x12 [ 3283.706779][T18433] ? load_image+0x400/0x400 [ 3283.711417][T18433] ? __lock_acquire+0x7d10/0x7d10 [ 3283.716486][T18433] ? snprintf+0xe5/0x140 [ 3283.720773][T18433] should_fail_ex+0x399/0x4d0 [ 3283.725493][T18433] _copy_to_user+0x2c/0x130 [ 3283.730059][T18433] simple_read_from_buffer+0xe3/0x150 [ 3283.735490][T18433] proc_fail_nth_read+0x1a6/0x220 [ 3283.740550][T18433] ? proc_fault_inject_write+0x310/0x310 [ 3283.746219][T18433] ? fsnotify_perm+0x248/0x550 [ 3283.751012][T18433] ? proc_fault_inject_write+0x310/0x310 [ 3283.756660][T18433] vfs_read+0x2de/0xa00 [ 3283.760849][T18433] ? kernel_read+0x1e0/0x1e0 [ 3283.765463][T18433] ? __fget_files+0x28/0x4b0 [ 3283.770068][T18433] ? __fget_files+0x28/0x4b0 [ 3283.774677][T18433] ? __fget_files+0x43d/0x4b0 [ 3283.779384][T18433] ? __fdget_pos+0x2ae/0x360 [ 3283.783994][T18433] ? ksys_read+0x71/0x250 [ 3283.788349][T18433] ksys_read+0x14c/0x250 [ 3283.792621][T18433] ? vfs_write+0xa30/0xa30 [ 3283.797060][T18433] ? lockdep_hardirqs_on+0x94/0x140 [ 3283.802274][T18433] do_syscall_64+0x4c/0xa0 [ 3283.806709][T18433] ? clear_bhb_loop+0x60/0xb0 [ 3283.811409][T18433] ? clear_bhb_loop+0x60/0xb0 [ 3283.816210][T18433] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3283.822133][T18433] RIP: 0033:0x7f6d3f55d04e [ 3283.826664][T18433] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 3283.846285][T18433] RSP: 002b:00007f6d4051afe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3283.854722][T18433] RAX: ffffffffffffffda RBX: 00007f6d4051b6c0 RCX: 00007f6d3f55d04e [ 3283.862709][T18433] RDX: 000000000000000f RSI: 00007f6d4051b0a0 RDI: 0000000000000004 [ 3283.870691][T18433] RBP: 00007f6d4051b090 R08: 0000000000000000 R09: 0000000000000000 [ 3283.878670][T18433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3283.886649][T18433] R13: 00007f6d3f816038 R14: 00007f6d3f815fa0 R15: 00007ffecd0373b8 [ 3283.894648][T18433] [ 3284.146705][T18445] netlink: 'syz.1.12902': attribute type 1 has an invalid length. [ 3284.182783][T18445] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.12902'. [ 3284.932276][T18459] netlink: 'syz.1.12906': attribute type 1 has an invalid length. [ 3284.977879][T18459] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.12906'. [ 3287.206950][T18491] netlink: 'syz.8.12915': attribute type 1 has an invalid length. [ 3287.255807][T18491] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.12915'. [ 3288.438166][T18521] netlink: 'syz.7.12923': attribute type 3 has an invalid length. [ 3288.517278][T18521] netlink: 132 bytes leftover after parsing attributes in process `syz.7.12923'. [ 3289.426761][T18542] netlink: 'syz.0.12926': attribute type 1 has an invalid length. [ 3289.442552][T18542] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.12926'. [ 3290.047521][T18552] netlink: 'syz.1.12931': attribute type 1 has an invalid length. [ 3290.095621][T18552] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.12931'. [ 3290.526549][T18561] netlink: 'syz.8.12934': attribute type 1 has an invalid length. [ 3290.567919][T18561] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.12934'. [ 3291.096714][T18581] netlink: 'syz.8.12938': attribute type 3 has an invalid length. [ 3291.116980][T18581] netlink: 132 bytes leftover after parsing attributes in process `syz.8.12938'. [ 3291.873402][T18597] netlink: 4 bytes leftover after parsing attributes in process `syz.1.12942'. [ 3292.297605][T18601] netlink: 'syz.8.12943': attribute type 1 has an invalid length. [ 3292.348814][T18601] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.12943'. [ 3292.754616][T18616] netlink: 'syz.8.12948': attribute type 1 has an invalid length. [ 3292.768089][T18616] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.12948'. [ 3294.901963][T18643] netlink: 15487 bytes leftover after parsing attributes in process `syz.1.12954'. [ 3296.935391][T18673] netlink: 'syz.7.12971': attribute type 1 has an invalid length. [ 3296.986542][T18673] netlink: 112865 bytes leftover after parsing attributes in process `syz.7.12971'. [ 3297.142575][T18680] netlink: 'syz.8.12961': attribute type 1 has an invalid length. [ 3297.174463][T18680] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.12961'. [ 3298.032894][T18693] netlink: 'syz.0.12966': attribute type 3 has an invalid length. [ 3298.132308][T18693] netlink: 132 bytes leftover after parsing attributes in process `syz.0.12966'. [ 3299.599107][T18726] netlink: 'syz.1.12981': attribute type 3 has an invalid length. [ 3299.807152][T18733] netlink: 'syz.0.12974': attribute type 1 has an invalid length. [ 3299.882770][T18726] netlink: 132 bytes leftover after parsing attributes in process `syz.1.12981'. [ 3299.967865][T18733] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.12974'. [ 3300.389315][T18738] netlink: 'syz.7.12975': attribute type 41 has an invalid length. [ 3300.538625][T18720] netlink: 15487 bytes leftover after parsing attributes in process `syz.5.12970'. [ 3300.681420][T18741] netlink: 'syz.0.12976': attribute type 1 has an invalid length. [ 3300.739135][T18741] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.12976'. [ 3303.946630][T18793] netlink: 'syz.5.12986': attribute type 3 has an invalid length. [ 3304.107128][T18793] netlink: 'syz.5.12986': attribute type 1 has an invalid length. [ 3304.279802][T18800] netlink: 'syz.1.12989': attribute type 3 has an invalid length. [ 3304.404092][T18793] netlink: 116 bytes leftover after parsing attributes in process `syz.5.12986'. [ 3304.489441][T18800] netlink: 132 bytes leftover after parsing attributes in process `syz.1.12989'. [ 3305.250233][T18816] netlink: 'syz.0.12991': attribute type 1 has an invalid length. [ 3305.313513][T18816] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.12991'. [ 3305.336912][T18819] netlink: 4 bytes leftover after parsing attributes in process `syz.8.12993'. [ 3306.066341][T18833] FAULT_INJECTION: forcing a failure. [ 3306.066341][T18833] name failslab, interval 1, probability 0, space 0, times 0 [ 3306.207634][T18833] CPU: 0 PID: 18833 Comm: syz.5.12994 Not tainted syzkaller #0 [ 3306.215285][T18833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3306.225387][T18833] Call Trace: [ 3306.228700][T18833] [ 3306.231669][T18833] dump_stack_lvl+0x188/0x24e [ 3306.236402][T18833] ? show_regs_print_info+0x12/0x12 [ 3306.241655][T18833] ? load_image+0x400/0x400 [ 3306.246203][T18833] ? __might_sleep+0xd0/0xd0 [ 3306.250847][T18833] ? __lock_acquire+0x7d10/0x7d10 [ 3306.255931][T18833] should_fail_ex+0x399/0x4d0 [ 3306.260654][T18833] should_failslab+0x5/0x20 [ 3306.265194][T18833] slab_pre_alloc_hook+0x59/0x310 [ 3306.270258][T18833] ? sk_prot_alloc+0xe7/0x210 [ 3306.274976][T18833] __kmem_cache_alloc_node+0x4f/0x260 [ 3306.280454][T18833] ? sk_prot_alloc+0xe7/0x210 [ 3306.285182][T18833] __kmalloc+0xa0/0x240 [ 3306.289390][T18833] sk_prot_alloc+0xe7/0x210 [ 3306.293933][T18833] ? sk_alloc+0x20/0x340 [ 3306.298219][T18833] sk_alloc+0x36/0x340 [ 3306.302323][T18833] ? bpf_ctx_init+0x163/0x1a0 [ 3306.307211][T18833] ? bpf_prog_test_run_skb+0x26f/0x12a0 [ 3306.312824][T18833] bpf_prog_test_run_skb+0x35e/0x12a0 [ 3306.318239][T18833] ? lockdep_hardirqs_on+0x94/0x140 [ 3306.323563][T18833] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 3306.329781][T18833] ? cpu_online+0xa0/0xa0 [ 3306.334188][T18833] bpf_prog_test_run+0x31e/0x390 [ 3306.339179][T18833] __sys_bpf+0x62b/0x780 [ 3306.343475][T18833] ? bpf_link_show_fdinfo+0x380/0x380 [ 3306.348908][T18833] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 3306.355120][T18833] __x64_sys_bpf+0x78/0x90 [ 3306.359593][T18833] do_syscall_64+0x4c/0xa0 [ 3306.364053][T18833] ? clear_bhb_loop+0x60/0xb0 [ 3306.368771][T18833] ? clear_bhb_loop+0x60/0xb0 [ 3306.373494][T18833] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3306.379428][T18833] RIP: 0033:0x7f6545b9c819 [ 3306.383882][T18833] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3306.403540][T18833] RSP: 002b:00007f6546a3c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3306.412007][T18833] RAX: ffffffffffffffda RBX: 00007f6545e15fa0 RCX: 00007f6545b9c819 [ 3306.420026][T18833] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 3306.428040][T18833] RBP: 00007f6546a3c090 R08: 0000000000000000 R09: 0000000000000000 [ 3306.436061][T18833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3306.444084][T18833] R13: 00007f6545e16038 R14: 00007f6545e15fa0 R15: 00007ffedf8d9e78 [ 3306.452127][T18833] [ 3306.520501][T18835] delete_channel: no stack [ 3306.525753][T18835] delete_channel: no stack [ 3306.572341][T18835] netlink: 'syz.1.12996': attribute type 4 has an invalid length. [ 3306.686594][T18835] netlink: 152 bytes leftover after parsing attributes in process `syz.1.12996'. [ 3307.055924][T18835] A link change request failed with some changes committed already. Interface hsr_slave_1 may have been left with an inconsistent configuration, please check. [ 3307.678361][T18844] netlink: 'syz.0.13000': attribute type 10 has an invalid length. [ 3307.875578][T18844] device hsr0 entered promiscuous mode [ 3307.891477][T18854] netlink: 'syz.8.13002': attribute type 3 has an invalid length. [ 3308.044313][T18854] netlink: 132 bytes leftover after parsing attributes in process `syz.8.13002'. [ 3308.170637][T18844] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 3308.219097][T18844] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 3308.251337][T18844] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 3308.284852][T18844] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 3311.764312][T18913] netlink: 'syz.1.13016': attribute type 1 has an invalid length. [ 3311.951851][T18913] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.13016'. [ 3313.037538][T18922] FAULT_INJECTION: forcing a failure. [ 3313.037538][T18922] name failslab, interval 1, probability 0, space 0, times 0 [ 3313.117451][T18922] CPU: 1 PID: 18922 Comm: syz.8.13019 Not tainted syzkaller #0 [ 3313.125089][T18922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3313.135210][T18922] Call Trace: [ 3313.138526][T18922] [ 3313.141487][T18922] dump_stack_lvl+0x188/0x24e [ 3313.146214][T18922] ? show_regs_print_info+0x12/0x12 [ 3313.151447][T18922] ? load_image+0x400/0x400 [ 3313.155996][T18922] ? __lock_acquire+0x7d10/0x7d10 [ 3313.161064][T18922] should_fail_ex+0x399/0x4d0 [ 3313.165786][T18922] should_failslab+0x5/0x20 [ 3313.170331][T18922] slab_pre_alloc_hook+0x59/0x310 [ 3313.175404][T18922] ? __lock_acquire+0x7d10/0x7d10 [ 3313.180479][T18922] kmem_cache_alloc_lru+0x49/0x2e0 [ 3313.185620][T18922] ? __d_alloc+0x31/0x700 [ 3313.189988][T18922] __d_alloc+0x31/0x700 [ 3313.194180][T18922] ? __mutex_unlock_slowpath+0x1b0/0x6c0 [ 3313.199892][T18922] d_alloc_pseudo+0x19/0x70 [ 3313.204423][T18922] alloc_file_pseudo+0xe0/0x200 [ 3313.209317][T18922] ? alloc_empty_file_noaccount+0x80/0x80 [ 3313.215079][T18922] ? alloc_perf_context+0x230/0x2d0 [ 3313.220334][T18922] anon_inode_getfile+0xc1/0x1a0 [ 3313.225404][T18922] __se_sys_perf_event_open+0xc26/0x1ec0 [ 3313.231083][T18922] ? __fget_files+0x43d/0x4b0 [ 3313.235827][T18922] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 3313.241788][T18922] ? lockdep_hardirqs_on+0x94/0x140 [ 3313.247019][T18922] ? __x64_sys_perf_event_open+0x1c/0xc0 [ 3313.252700][T18922] do_syscall_64+0x4c/0xa0 [ 3313.257189][T18922] ? clear_bhb_loop+0x60/0xb0 [ 3313.262003][T18922] ? clear_bhb_loop+0x60/0xb0 [ 3313.266721][T18922] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3313.272655][T18922] RIP: 0033:0x7f6d3f59c819 [ 3313.277123][T18922] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3313.297116][T18922] RSP: 002b:00007f6d4051b028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 3313.305662][T18922] RAX: ffffffffffffffda RBX: 00007f6d3f815fa0 RCX: 00007f6d3f59c819 [ 3313.313662][T18922] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000200000000040 [ 3313.321666][T18922] RBP: 00007f6d4051b090 R08: 0000000000000000 R09: 0000000000000000 [ 3313.329669][T18922] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 3313.337679][T18922] R13: 00007f6d3f816038 R14: 00007f6d3f815fa0 R15: 00007ffecd0373b8 [ 3313.345716][T18922] [ 3314.011896][T18930] netlink: 'syz.1.13021': attribute type 41 has an invalid length. [ 3314.647288][T18938] netlink: 'syz.7.13022': attribute type 1 has an invalid length. [ 3314.727106][T18944] netlink: 'syz.8.13023': attribute type 3 has an invalid length. [ 3314.783223][T18944] netlink: 132 bytes leftover after parsing attributes in process `syz.8.13023'. [ 3314.829333][T18938] netlink: 112865 bytes leftover after parsing attributes in process `syz.7.13022'. [ 3317.580429][T18981] netlink: 'syz.8.13032': attribute type 1 has an invalid length. [ 3317.680302][T18981] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.13032'. [ 3318.767901][T19000] netlink: 'syz.5.13037': attribute type 1 has an invalid length. [ 3318.788717][T19001] netlink: 'syz.8.13039': attribute type 41 has an invalid length. [ 3318.904804][T19002] netlink: 'syz.7.13038': attribute type 3 has an invalid length. [ 3318.999310][T19000] netlink: 112865 bytes leftover after parsing attributes in process `syz.5.13037'. [ 3319.029419][T19002] netlink: 132 bytes leftover after parsing attributes in process `syz.7.13038'. [ 3319.843630][T19008] device syzkaller0 entered promiscuous mode [ 3319.998632][T19014] netlink: 212168 bytes leftover after parsing attributes in process `syz.7.13042'. [ 3320.144300][T19018] netlink: 'syz.5.13041': attribute type 1 has an invalid length. [ 3320.185712][T19018] netlink: 112865 bytes leftover after parsing attributes in process `syz.5.13041'. [ 3321.556364][T19037] netlink: 'syz.7.13047': attribute type 1 has an invalid length. [ 3321.625417][T19037] netlink: 112865 bytes leftover after parsing attributes in process `syz.7.13047'. [ 3321.998542][T19043] netlink: 127868 bytes leftover after parsing attributes in process `syz.7.13049'. [ 3325.548862][T19041] netlink: 'syz.5.13048': attribute type 3 has an invalid length. [ 3325.556904][T19041] netlink: 'syz.5.13048': attribute type 1 has an invalid length. [ 3325.565061][T19041] netlink: 116 bytes leftover after parsing attributes in process `syz.5.13048'. [ 3325.832170][T19051] netlink: 'syz.8.13051': attribute type 1 has an invalid length. [ 3325.853530][T19051] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.13051'. [ 3325.940364][T19061] netlink: 'syz.1.13054': attribute type 41 has an invalid length. [ 3326.520365][T19077] netlink: 'syz.0.13057': attribute type 1 has an invalid length. [ 3326.871957][T19077] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.13057'. [ 3328.044530][ T1278] ieee802154 phy0 wpan0: encryption failed: -22 [ 3328.050928][ T1278] ieee802154 phy1 wpan1: encryption failed: -22 [ 3329.278724][T19113] netlink: 'syz.0.13066': attribute type 3 has an invalid length. [ 3329.327145][T19113] netlink: 132 bytes leftover after parsing attributes in process `syz.0.13066'. [ 3329.464865][T19112] device syzkaller0 entered promiscuous mode [ 3330.039345][T21223] Bluetooth: hci2: command 0x0406 tx timeout [ 3330.136533][T19122] netlink: 'syz.8.13068': attribute type 1 has an invalid length. [ 3330.152271][T19122] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.13068'. [ 3330.317590][T19129] netlink: 'syz.0.13070': attribute type 1 has an invalid length. [ 3330.398169][T19129] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.13070'. [ 3332.971134][T19176] netlink: 'syz.8.13080': attribute type 3 has an invalid length. [ 3332.989913][T19176] netlink: 132 bytes leftover after parsing attributes in process `syz.8.13080'. [ 3333.794742][T19178] FAULT_INJECTION: forcing a failure. [ 3333.794742][T19178] name failslab, interval 1, probability 0, space 0, times 0 [ 3333.810633][T19178] CPU: 0 PID: 19178 Comm: syz.8.13081 Not tainted syzkaller #0 [ 3333.818269][T19178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3333.828352][T19178] Call Trace: [ 3333.831659][T19178] [ 3333.834630][T19178] dump_stack_lvl+0x188/0x24e [ 3333.839364][T19178] ? show_regs_print_info+0x12/0x12 [ 3333.844585][T19178] ? load_image+0x400/0x400 [ 3333.849118][T19178] ? __might_sleep+0xd0/0xd0 [ 3333.853761][T19178] ? __lock_acquire+0x7d10/0x7d10 [ 3333.859013][T19178] ? __lock_acquire+0x12f4/0x7d10 [ 3333.864065][T19178] ? verify_lock_unused+0x140/0x140 [ 3333.869284][T19178] should_fail_ex+0x399/0x4d0 [ 3333.873989][T19178] should_failslab+0x5/0x20 [ 3333.878488][T19178] slab_pre_alloc_hook+0x59/0x310 [ 3333.883540][T19178] kmem_cache_alloc_node+0x5a/0x320 [ 3333.888759][T19178] ? __alloc_skb+0xfc/0x7e0 [ 3333.893284][T19178] __alloc_skb+0xfc/0x7e0 [ 3333.897614][T19178] ? __lock_acquire+0x12f4/0x7d10 [ 3333.902646][T19178] alloc_skb_with_frags+0xa7/0x710 [ 3333.907813][T19178] ? __lock_acquire+0x12f4/0x7d10 [ 3333.912888][T19178] sock_alloc_send_pskb+0x87f/0x9a0 [ 3333.918141][T19178] ? sock_kzfree_s+0x50/0x50 [ 3333.922779][T19178] ? dev_get_by_index+0x1e/0x2d0 [ 3333.927725][T19178] ? dev_get_by_index+0x1e/0x2d0 [ 3333.932688][T19178] packet_sendmsg+0x32b0/0x4e60 [ 3333.937575][T19178] ? __might_sleep+0xd0/0xd0 [ 3333.942181][T19178] ? verify_lock_unused+0x140/0x140 [ 3333.947442][T19178] ? aa_sk_perm+0x81f/0x950 [ 3333.951990][T19178] ? packet_getsockopt+0x9a0/0x9a0 [ 3333.957163][T19178] ? aa_sock_msg_perm+0x94/0x150 [ 3333.962110][T19178] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 3333.967486][T19178] ? security_socket_sendmsg+0x7c/0xa0 [ 3333.972974][T19178] ? packet_getsockopt+0x9a0/0x9a0 [ 3333.978116][T19178] ____sys_sendmsg+0x5be/0x970 [ 3333.982891][T19178] ? __sys_sendmsg_sock+0x30/0x30 [ 3333.987922][T19178] ? __import_iovec+0x315/0x500 [ 3333.992814][T19178] ? import_iovec+0x6f/0xa0 [ 3333.997348][T19178] ___sys_sendmsg+0x2a2/0x360 [ 3334.002041][T19178] ? __sys_sendmsg+0x290/0x290 [ 3334.006820][T19178] ? __lock_acquire+0x7d10/0x7d10 [ 3334.011894][T19178] __se_sys_sendmsg+0x1bb/0x2a0 [ 3334.016823][T19178] ? __x64_sys_sendmsg+0x80/0x80 [ 3334.021775][T19178] ? lockdep_hardirqs_on+0x94/0x140 [ 3334.026976][T19178] do_syscall_64+0x4c/0xa0 [ 3334.031430][T19178] ? clear_bhb_loop+0x60/0xb0 [ 3334.036149][T19178] ? clear_bhb_loop+0x60/0xb0 [ 3334.040832][T19178] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3334.046726][T19178] RIP: 0033:0x7f6d3f59c819 [ 3334.051154][T19178] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3334.070811][T19178] RSP: 002b:00007f6d4051b028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3334.079263][T19178] RAX: ffffffffffffffda RBX: 00007f6d3f815fa0 RCX: 00007f6d3f59c819 [ 3334.087260][T19178] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000003 [ 3334.095242][T19178] RBP: 00007f6d4051b090 R08: 0000000000000000 R09: 0000000000000000 [ 3334.103235][T19178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3334.111239][T19178] R13: 00007f6d3f816038 R14: 00007f6d3f815fa0 R15: 00007ffecd0373b8 [ 3334.119272][T19178] [ 3334.273317][T19180] netlink: 'syz.8.13082': attribute type 1 has an invalid length. [ 3334.284887][T19180] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.13082'. [ 3334.576342][T19183] netlink: 'syz.8.13083': attribute type 1 has an invalid length. [ 3334.585002][T19183] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.13083'. [ 3335.115239][T19132] netlink: 'syz.1.13071': attribute type 41 has an invalid length. [ 3335.528511][T19188] netlink: 'syz.5.13086': attribute type 41 has an invalid length. [ 3338.205292][T19210] netlink: 'syz.0.13100': attribute type 3 has an invalid length. [ 3338.307291][T19210] netlink: 132 bytes leftover after parsing attributes in process `syz.0.13100'. [ 3338.464848][T19227] netlink: 'syz.8.13093': attribute type 1 has an invalid length. [ 3338.759180][T19227] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.13093'. [ 3339.132558][T19234] netlink: 'syz.0.13094': attribute type 1 has an invalid length. [ 3339.248475][T19234] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.13094'. [ 3339.470616][T19244] netlink: 'syz.1.13096': attribute type 3 has an invalid length. [ 3339.514809][T19244] netlink: 199824 bytes leftover after parsing attributes in process `syz.1.13096'. [ 3339.727591][T19249] netlink: 'syz.0.13099': attribute type 41 has an invalid length. [ 3339.928110][T19254] netlink: 'syz.8.13101': attribute type 41 has an invalid length. [ 3340.211245][T19259] netlink: 'syz.7.13103': attribute type 3 has an invalid length. [ 3340.289225][T19259] netlink: 13435 bytes leftover after parsing attributes in process `syz.7.13103'. [ 3341.084294][T19268] netlink: 'syz.0.13106': attribute type 2 has an invalid length. [ 3341.171952][T19268] netlink: 132 bytes leftover after parsing attributes in process `syz.0.13106'. [ 3341.363462][T19281] netlink: 'syz.8.13109': attribute type 1 has an invalid length. [ 3341.919437][T19281] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.13109'. [ 3342.619848][T19295] netlink: 'syz.0.13111': attribute type 3 has an invalid length. [ 3342.659842][T19295] netlink: 132 bytes leftover after parsing attributes in process `syz.0.13111'. [ 3342.684946][T19296] netlink: 132 bytes leftover after parsing attributes in process `syz.8.13112'. [ 3343.196990][T19302] netlink: 116 bytes leftover after parsing attributes in process `syz.5.13114'. [ 3343.760813][T19314] validate_nla: 3 callbacks suppressed [ 3343.760840][T19314] netlink: 'syz.0.13118': attribute type 1 has an invalid length. [ 3343.799604][T19314] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.13118'. [ 3347.221511][T19352] device macvlan0 entered promiscuous mode [ 3347.304939][T19349] netlink: 'syz.1.13129': attribute type 1 has an invalid length. [ 3347.344758][T19349] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.13129'. [ 3348.266827][T19370] FAULT_INJECTION: forcing a failure. [ 3348.266827][T19370] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3348.331528][T19372] FAULT_INJECTION: forcing a failure. [ 3348.331528][T19372] name failslab, interval 1, probability 0, space 0, times 0 [ 3348.345337][T19370] CPU: 1 PID: 19370 Comm: syz.0.13131 Not tainted syzkaller #0 [ 3348.352947][T19370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3348.363034][T19370] Call Trace: [ 3348.366344][T19370] [ 3348.369399][T19370] dump_stack_lvl+0x188/0x24e [ 3348.374132][T19370] ? show_regs_print_info+0x12/0x12 [ 3348.379390][T19370] ? load_image+0x400/0x400 [ 3348.383951][T19370] ? __lock_acquire+0x7d10/0x7d10 [ 3348.389033][T19370] should_fail_ex+0x399/0x4d0 [ 3348.393757][T19370] _copy_from_user+0x2c/0x170 [ 3348.398469][T19370] kstrtouint_from_user+0xda/0x170 [ 3348.403625][T19370] ? kstrtol_from_user+0x190/0x190 [ 3348.408797][T19370] proc_fail_nth_write+0x8b/0x200 [ 3348.413869][T19370] ? proc_fail_nth_read+0x220/0x220 [ 3348.419103][T19370] ? common_file_perm+0x171/0x1c0 [ 3348.424172][T19370] ? proc_fail_nth_read+0x220/0x220 [ 3348.429403][T19370] vfs_write+0x2e6/0xa30 [ 3348.433689][T19370] ? file_end_write+0x250/0x250 [ 3348.438591][T19370] ? __fget_files+0x28/0x4b0 [ 3348.443222][T19370] ? __fget_files+0x28/0x4b0 [ 3348.447858][T19370] ? __fget_files+0x43d/0x4b0 [ 3348.452586][T19370] ? __fdget_pos+0x2ae/0x360 [ 3348.457215][T19370] ? ksys_write+0x71/0x250 [ 3348.461671][T19370] ksys_write+0x14c/0x250 [ 3348.466054][T19370] ? __ia32_sys_read+0x80/0x80 [ 3348.470869][T19370] ? lockdep_hardirqs_on+0x94/0x140 [ 3348.476100][T19370] do_syscall_64+0x4c/0xa0 [ 3348.480554][T19370] ? clear_bhb_loop+0x60/0xb0 [ 3348.485263][T19370] ? clear_bhb_loop+0x60/0xb0 [ 3348.490024][T19370] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3348.495955][T19370] RIP: 0033:0x7f40ce35d04e [ 3348.500393][T19370] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 3348.520029][T19370] RSP: 002b:00007f40cf30dfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3348.528469][T19370] RAX: ffffffffffffffda RBX: 00007f40cf30e6c0 RCX: 00007f40ce35d04e [ 3348.536464][T19370] RDX: 0000000000000001 RSI: 00007f40cf30e0a0 RDI: 0000000000000004 [ 3348.544448][T19370] RBP: 00007f40cf30e090 R08: 0000000000000000 R09: 0000000000000000 [ 3348.552447][T19370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3348.560433][T19370] R13: 00007f40ce616128 R14: 00007f40ce616090 R15: 00007ffde89c4de8 [ 3348.568438][T19370] [ 3348.571833][T19372] CPU: 0 PID: 19372 Comm: syz.1.13132 Not tainted syzkaller #0 [ 3348.579429][T19372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3348.589791][T19372] Call Trace: [ 3348.593109][T19372] [ 3348.596080][T19372] dump_stack_lvl+0x188/0x24e [ 3348.600818][T19372] ? show_regs_print_info+0x12/0x12 [ 3348.606067][T19372] ? load_image+0x400/0x400 [ 3348.606377][T19375] netlink: 'syz.5.13133': attribute type 3 has an invalid length. [ 3348.610605][T19372] ? __might_sleep+0xd0/0xd0 [ 3348.610631][T19372] ? __lock_acquire+0x7d10/0x7d10 [ 3348.610664][T19372] should_fail_ex+0x399/0x4d0 [ 3348.610692][T19372] should_failslab+0x5/0x20 [ 3348.637490][T19372] slab_pre_alloc_hook+0x59/0x310 [ 3348.642607][T19372] ? sk_prot_alloc+0xe7/0x210 [ 3348.644336][T19375] netlink: 199824 bytes leftover after parsing attributes in process `syz.5.13133'. [ 3348.647309][T19372] __kmem_cache_alloc_node+0x4f/0x260 [ 3348.662093][T19372] ? sk_prot_alloc+0xe7/0x210 [ 3348.666809][T19372] __kmalloc+0xa0/0x240 [ 3348.671014][T19372] sk_prot_alloc+0xe7/0x210 [ 3348.675561][T19372] ? sk_alloc+0x20/0x340 [ 3348.679856][T19372] sk_alloc+0x36/0x340 [ 3348.683961][T19372] ? bpf_ctx_init+0x163/0x1a0 [ 3348.688712][T19372] ? bpf_prog_test_run_skb+0x26f/0x12a0 [ 3348.694307][T19372] bpf_prog_test_run_skb+0x35e/0x12a0 [ 3348.699725][T19372] ? __fget_files+0x28/0x4b0 [ 3348.704357][T19372] ? __fget_files+0x43d/0x4b0 [ 3348.709097][T19372] ? cpu_online+0xa0/0xa0 [ 3348.713467][T19372] bpf_prog_test_run+0x31e/0x390 [ 3348.718462][T19372] __sys_bpf+0x62b/0x780 [ 3348.722758][T19372] ? bpf_link_show_fdinfo+0x380/0x380 [ 3348.728191][T19372] ? lock_chain_count+0x20/0x20 [ 3348.733103][T19372] __x64_sys_bpf+0x78/0x90 [ 3348.737576][T19372] do_syscall_64+0x4c/0xa0 [ 3348.742052][T19372] ? clear_bhb_loop+0x60/0xb0 [ 3348.746880][T19372] ? clear_bhb_loop+0x60/0xb0 [ 3348.751648][T19372] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3348.757597][T19372] RIP: 0033:0x7fe0a079c819 [ 3348.762062][T19372] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3348.781745][T19372] RSP: 002b:00007fe0a1655028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3348.790182][T19372] RAX: ffffffffffffffda RBX: 00007fe0a0a15fa0 RCX: 00007fe0a079c819 [ 3348.798172][T19372] RDX: 000000000000002a RSI: 0000200000000080 RDI: 000000000000000a [ 3348.806190][T19372] RBP: 00007fe0a1655090 R08: 0000000000000000 R09: 0000000000000000 [ 3348.814176][T19372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3348.822158][T19372] R13: 00007fe0a0a16038 R14: 00007fe0a0a15fa0 R15: 00007ffe6c477498 [ 3348.830242][T19372] [ 3349.303394][T19388] netlink: 'syz.0.13136': attribute type 1 has an invalid length. [ 3349.360526][T19388] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.13136'. [ 3350.538835][T19398] netlink: 128 bytes leftover after parsing attributes in process `syz.0.13139'. [ 3350.590551][T19399] netlink: 'syz.1.13137': attribute type 1 has an invalid length. [ 3350.598483][T19399] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.13137'. [ 3350.608503][T19398] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 3350.713009][T19398] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 3351.346716][T19410] netlink: 'syz.5.13143': attribute type 1 has an invalid length. [ 3351.440875][T19410] netlink: 112865 bytes leftover after parsing attributes in process `syz.5.13143'. [ 3351.496089][T19418] netlink: 128 bytes leftover after parsing attributes in process `syz.0.13146'. [ 3351.530421][T19418] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 3351.644228][T19418] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 3351.837939][T19426] FAULT_INJECTION: forcing a failure. [ 3351.837939][T19426] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3351.911377][T19426] CPU: 1 PID: 19426 Comm: syz.8.13148 Not tainted syzkaller #0 [ 3351.919018][T19426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3351.929118][T19426] Call Trace: [ 3351.932501][T19426] [ 3351.935480][T19426] dump_stack_lvl+0x188/0x24e [ 3351.940227][T19426] ? show_regs_print_info+0x12/0x12 [ 3351.945565][T19426] ? load_image+0x400/0x400 [ 3351.950192][T19426] ? __lock_acquire+0x7d10/0x7d10 [ 3351.955276][T19426] should_fail_ex+0x399/0x4d0 [ 3351.959999][T19426] _copy_from_user+0x2c/0x170 [ 3351.964724][T19426] iovec_from_user+0x143/0x360 [ 3351.969539][T19426] __import_iovec+0x6d/0x500 [ 3351.974179][T19426] import_iovec+0x6f/0xa0 [ 3351.978541][T19426] ___sys_sendmsg+0x252/0x360 [ 3351.983251][T19426] ? __sys_sendmsg+0x290/0x290 [ 3351.988053][T19426] ? __lock_acquire+0x7d10/0x7d10 [ 3351.993131][T19426] __se_sys_sendmsg+0x1bb/0x2a0 [ 3351.998024][T19426] ? __x64_sys_sendmsg+0x80/0x80 [ 3352.003002][T19426] ? lockdep_hardirqs_on+0x94/0x140 [ 3352.008233][T19426] do_syscall_64+0x4c/0xa0 [ 3352.012672][T19426] ? clear_bhb_loop+0x60/0xb0 [ 3352.017452][T19426] ? clear_bhb_loop+0x60/0xb0 [ 3352.022146][T19426] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3352.028057][T19426] RIP: 0033:0x7f6d3f59c819 [ 3352.032489][T19426] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3352.052118][T19426] RSP: 002b:00007f6d4051b028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3352.060639][T19426] RAX: ffffffffffffffda RBX: 00007f6d3f815fa0 RCX: 00007f6d3f59c819 [ 3352.068623][T19426] RDX: 0000000000040001 RSI: 00002000000008c0 RDI: 0000000000000003 [ 3352.076608][T19426] RBP: 00007f6d4051b090 R08: 0000000000000000 R09: 0000000000000000 [ 3352.084592][T19426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3352.092579][T19426] R13: 00007f6d3f816038 R14: 00007f6d3f815fa0 R15: 00007ffecd0373b8 [ 3352.100587][T19426] [ 3352.276629][T19436] netlink: 'syz.5.13150': attribute type 1 has an invalid length. [ 3352.285441][T19435] netlink: 'syz.8.13151': attribute type 41 has an invalid length. [ 3352.289130][T19436] netlink: 112865 bytes leftover after parsing attributes in process `syz.5.13150'. [ 3352.473101][T19441] netlink: 'syz.0.13152': attribute type 3 has an invalid length. [ 3352.513720][T19441] netlink: 199824 bytes leftover after parsing attributes in process `syz.0.13152'. [ 3354.000402][T19465] netlink: 'syz.7.13166': attribute type 1 has an invalid length. [ 3354.008300][T19465] netlink: 112865 bytes leftover after parsing attributes in process `syz.7.13166'. [ 3356.243900][T19491] netlink: 'syz.1.13164': attribute type 1 has an invalid length. [ 3356.344355][T19491] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.13164'. [ 3359.245849][T19509] netlink: 'syz.5.13171': attribute type 1 has an invalid length. [ 3359.326075][T19509] netlink: 112865 bytes leftover after parsing attributes in process `syz.5.13171'. [ 3359.582505][T19510] netlink: 168864 bytes leftover after parsing attributes in process `syz.1.13172'. [ 3359.648136][T19527] netlink: 'syz.5.13175': attribute type 41 has an invalid length. [ 3359.700422][T19510] netlink: zone id is out of range [ 3359.705634][T19510] netlink: zone id is out of range [ 3359.796712][T19510] netlink: zone id is out of range [ 3359.829720][T19510] netlink: zone id is out of range [ 3359.835001][T19510] netlink: zone id is out of range [ 3359.899252][T19510] netlink: zone id is out of range [ 3360.445902][T19538] netlink: 4 bytes leftover after parsing attributes in process `syz.7.13178'. [ 3360.506885][T19536] netlink: 'syz.5.13177': attribute type 3 has an invalid length. [ 3360.592030][T19536] netlink: 'syz.5.13177': attribute type 1 has an invalid length. [ 3360.707569][T19536] netlink: 116 bytes leftover after parsing attributes in process `syz.5.13177'. [ 3361.181564][T19557] netlink: 'syz.7.13182': attribute type 1 has an invalid length. [ 3361.238317][T19557] netlink: 112865 bytes leftover after parsing attributes in process `syz.7.13182'. [ 3361.447959][T19562] FAULT_INJECTION: forcing a failure. [ 3361.447959][T19562] name failslab, interval 1, probability 0, space 0, times 0 [ 3361.519441][T19562] CPU: 1 PID: 19562 Comm: syz.1.13183 Not tainted syzkaller #0 [ 3361.527099][T19562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3361.537317][T19562] Call Trace: [ 3361.540725][T19562] [ 3361.543708][T19562] dump_stack_lvl+0x188/0x24e [ 3361.548458][T19562] ? show_regs_print_info+0x12/0x12 [ 3361.553770][T19562] ? load_image+0x400/0x400 [ 3361.558330][T19562] ? __might_sleep+0xd0/0xd0 [ 3361.562965][T19562] ? __lock_acquire+0x7d10/0x7d10 [ 3361.568044][T19562] should_fail_ex+0x399/0x4d0 [ 3361.572774][T19562] should_failslab+0x5/0x20 [ 3361.577320][T19562] slab_pre_alloc_hook+0x59/0x310 [ 3361.582405][T19562] ? sk_prot_alloc+0xe7/0x210 [ 3361.587137][T19562] __kmem_cache_alloc_node+0x4f/0x260 [ 3361.592750][T19562] ? sk_prot_alloc+0xe7/0x210 [ 3361.597480][T19562] __kmalloc+0xa0/0x240 [ 3361.601699][T19562] sk_prot_alloc+0xe7/0x210 [ 3361.606248][T19562] ? sk_alloc+0x20/0x340 [ 3361.610542][T19562] sk_alloc+0x36/0x340 [ 3361.614651][T19562] ? bpf_ctx_init+0x163/0x1a0 [ 3361.619367][T19562] ? bpf_prog_test_run_skb+0x26f/0x12a0 [ 3361.624967][T19562] bpf_prog_test_run_skb+0x35e/0x12a0 [ 3361.630384][T19562] ? __fget_files+0x28/0x4b0 [ 3361.635025][T19562] ? __fget_files+0x43d/0x4b0 [ 3361.639759][T19562] ? cpu_online+0xa0/0xa0 [ 3361.644131][T19562] bpf_prog_test_run+0x31e/0x390 [ 3361.649118][T19562] __sys_bpf+0x62b/0x780 [ 3361.653405][T19562] ? bpf_link_show_fdinfo+0x380/0x380 [ 3361.658834][T19562] ? lock_chain_count+0x20/0x20 [ 3361.663735][T19562] __x64_sys_bpf+0x78/0x90 [ 3361.668183][T19562] do_syscall_64+0x4c/0xa0 [ 3361.672636][T19562] ? clear_bhb_loop+0x60/0xb0 [ 3361.677341][T19562] ? clear_bhb_loop+0x60/0xb0 [ 3361.682070][T19562] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3361.688019][T19562] RIP: 0033:0x7fe0a079c819 [ 3361.692472][T19562] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3361.712152][T19562] RSP: 002b:00007fe0a1655028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3361.720611][T19562] RAX: ffffffffffffffda RBX: 00007fe0a0a15fa0 RCX: 00007fe0a079c819 [ 3361.728617][T19562] RDX: 0000000000000050 RSI: 0000200000000280 RDI: 000000000000000a [ 3361.736625][T19562] RBP: 00007fe0a1655090 R08: 0000000000000000 R09: 0000000000000000 [ 3361.744626][T19562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3361.752667][T19562] R13: 00007fe0a0a16038 R14: 00007fe0a0a15fa0 R15: 00007ffe6c477498 [ 3361.760700][T19562] [ 3362.845363][T19586] netlink: 'syz.0.13190': attribute type 10 has an invalid length. [ 3364.361379][T19586] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 3365.062182][T19615] netlink: 'syz.1.13198': attribute type 1 has an invalid length. [ 3365.090742][T19615] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.13198'. [ 3365.406478][T19628] FAULT_INJECTION: forcing a failure. [ 3365.406478][T19628] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3365.520240][T19628] CPU: 1 PID: 19628 Comm: syz.0.13200 Not tainted syzkaller #0 [ 3365.527898][T19628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3365.538000][T19628] Call Trace: [ 3365.541419][T19628] [ 3365.544400][T19628] dump_stack_lvl+0x188/0x24e [ 3365.549160][T19628] ? show_regs_print_info+0x12/0x12 [ 3365.554415][T19628] ? load_image+0x400/0x400 [ 3365.558982][T19628] ? __lock_acquire+0x7d10/0x7d10 [ 3365.564055][T19628] ? unix_ioctl+0x25d/0x660 [ 3365.568622][T19628] should_fail_ex+0x399/0x4d0 [ 3365.573353][T19628] _copy_from_user+0x2c/0x170 [ 3365.578165][T19628] sock_do_ioctl+0x18c/0x320 [ 3365.582891][T19628] ? sock_show_fdinfo+0xb0/0xb0 [ 3365.587798][T19628] sock_ioctl+0x4d2/0x710 [ 3365.592164][T19628] ? sock_poll+0x410/0x410 [ 3365.596629][T19628] ? bpf_lsm_file_ioctl+0x5/0x10 [ 3365.601618][T19628] ? security_file_ioctl+0x7c/0xa0 [ 3365.606769][T19628] ? sock_poll+0x410/0x410 [ 3365.611221][T19628] __se_sys_ioctl+0xfa/0x170 [ 3365.615873][T19628] do_syscall_64+0x4c/0xa0 [ 3365.620335][T19628] ? clear_bhb_loop+0x60/0xb0 [ 3365.625070][T19628] ? clear_bhb_loop+0x60/0xb0 [ 3365.629811][T19628] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3365.635844][T19628] RIP: 0033:0x7f40ce39c819 [ 3365.640391][T19628] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3365.660226][T19628] RSP: 002b:00007f40cf32f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3365.668699][T19628] RAX: ffffffffffffffda RBX: 00007f40ce615fa0 RCX: 00007f40ce39c819 [ 3365.676719][T19628] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 0000000000000005 [ 3365.684743][T19628] RBP: 00007f40cf32f090 R08: 0000000000000000 R09: 0000000000000000 [ 3365.692766][T19628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3365.700787][T19628] R13: 00007f40ce616038 R14: 00007f40ce615fa0 R15: 00007ffde89c4de8 [ 3365.708825][T19628] [ 3367.817121][T19680] netlink: 'syz.7.13214': attribute type 41 has an invalid length. [ 3367.893882][T19673] netlink: 'syz.1.13213': attribute type 1 has an invalid length. [ 3367.910544][T19673] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.13213'. [ 3368.381623][T19695] netlink: 4 bytes leftover after parsing attributes in process `syz.0.13217'. [ 3370.323860][T19726] FAULT_INJECTION: forcing a failure. [ 3370.323860][T19726] name failslab, interval 1, probability 0, space 0, times 0 [ 3370.336640][T19726] CPU: 1 PID: 19726 Comm: syz.1.13225 Not tainted syzkaller #0 [ 3370.344239][T19726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3370.354330][T19726] Call Trace: [ 3370.357624][T19726] [ 3370.360573][T19726] dump_stack_lvl+0x188/0x24e [ 3370.365284][T19726] ? verify_lock_unused+0x140/0x140 [ 3370.370509][T19726] ? show_regs_print_info+0x12/0x12 [ 3370.375733][T19726] ? load_image+0x400/0x400 [ 3370.380446][T19726] should_fail_ex+0x399/0x4d0 [ 3370.385144][T19726] should_failslab+0x5/0x20 [ 3370.389662][T19726] slab_pre_alloc_hook+0x59/0x310 [ 3370.394706][T19726] kmem_cache_alloc+0x56/0x2f0 [ 3370.399487][T19726] ? __nf_conntrack_alloc+0x99/0x380 [ 3370.404851][T19726] __nf_conntrack_alloc+0x99/0x380 [ 3370.409980][T19726] init_conntrack+0x25b/0x11a0 [ 3370.414762][T19726] ? early_drop+0x870/0x870 [ 3370.419282][T19726] ? nf_conntrack_find_get+0x670/0x670 [ 3370.424772][T19726] ? __siphash_unaligned+0x25b/0x3a0 [ 3370.430077][T19726] nf_conntrack_in+0xd3e/0x17b0 [ 3370.434955][T19726] ? nf_ct_pernet+0x270/0x270 [ 3370.439678][T19726] ? ip6t_alloc_initial_table+0x640/0x640 [ 3370.445485][T19726] ? ipv6_defrag+0x2d2/0x3a0 [ 3370.450096][T19726] ? ipv4_confirm+0x380/0x380 [ 3370.454787][T19726] nf_hook_slow+0xb9/0x200 [ 3370.459238][T19726] NF_HOOK+0x219/0x3b0 [ 3370.463326][T19726] ? sk_setup_caps+0xaa0/0xaa0 [ 3370.468282][T19726] ? net_zcopy_put_abort+0x90/0x90 [ 3370.473417][T19726] ? NF_HOOK+0x9b/0x3b0 [ 3370.477593][T19726] ? ip6_rcv_core+0x1750/0x1750 [ 3370.482474][T19726] ? net_zcopy_put_abort+0x90/0x90 [ 3370.487614][T19726] ? ip6_rcv_finish_core+0x420/0x420 [ 3370.492934][T19726] __netif_receive_skb+0xcc/0x290 [ 3370.498046][T19726] ? netif_receive_skb+0x11e/0x830 [ 3370.503177][T19726] netif_receive_skb+0x1d4/0x830 [ 3370.508134][T19726] ? enqueue_to_backlog+0xd30/0xd30 [ 3370.513353][T19726] ? ct_irq_exit_irqson+0x113/0x170 [ 3370.518606][T19726] ? tun_rx_batched+0x182/0x790 [ 3370.523483][T19726] tun_rx_batched+0x1db/0x790 [ 3370.528186][T19726] ? pskb_may_pull+0xf0/0xf0 [ 3370.532801][T19726] ? __local_bh_enable_ip+0x136/0x1c0 [ 3370.538190][T19726] ? lockdep_hardirqs_on+0x94/0x140 [ 3370.543404][T19726] ? read_lock_is_recursive+0x10/0x10 [ 3370.548794][T19726] ? __local_bh_enable_ip+0x136/0x1c0 [ 3370.554187][T19726] ? _local_bh_enable+0xa0/0xa0 [ 3370.559051][T19726] ? skb_copy_datagram_from_iter+0x5a8/0x690 [ 3370.565057][T19726] tun_get_user+0x286f/0x3c70 [ 3370.569763][T19726] ? tun_get_user+0x249b/0x3c70 [ 3370.574647][T19726] ? rcu_read_unlock+0xa0/0xa0 [ 3370.579440][T19726] ? tun_get+0x1c/0x2e0 [ 3370.583616][T19726] ? __lock_acquire+0x7d10/0x7d10 [ 3370.588667][T19726] ? tun_get+0x1c/0x2e0 [ 3370.592854][T19726] tun_chr_write_iter+0x112/0x1f0 [ 3370.597903][T19726] vfs_write+0x4b1/0xa30 [ 3370.602168][T19726] ? file_end_write+0x250/0x250 [ 3370.607041][T19726] ? __fget_files+0x43d/0x4b0 [ 3370.611765][T19726] ? __fdget_pos+0x1d4/0x360 [ 3370.616377][T19726] ? ksys_write+0x71/0x250 [ 3370.620831][T19726] ksys_write+0x14c/0x250 [ 3370.625179][T19726] ? __ia32_sys_read+0x80/0x80 [ 3370.629963][T19726] ? lockdep_hardirqs_on+0x94/0x140 [ 3370.635201][T19726] do_syscall_64+0x4c/0xa0 [ 3370.639638][T19726] ? clear_bhb_loop+0x60/0xb0 [ 3370.644331][T19726] ? clear_bhb_loop+0x60/0xb0 [ 3370.649024][T19726] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3370.654932][T19726] RIP: 0033:0x7fe0a079c819 [ 3370.659361][T19726] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3370.678980][T19726] RSP: 002b:00007fe0a1655028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3370.687408][T19726] RAX: ffffffffffffffda RBX: 00007fe0a0a15fa0 RCX: 00007fe0a079c819 [ 3370.695393][T19726] RDX: 000000000000cfa4 RSI: 00002000000006c0 RDI: 00000000000000c8 [ 3370.703379][T19726] RBP: 00007fe0a1655090 R08: 0000000000000000 R09: 0000000000000000 [ 3370.711358][T19726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3370.719339][T19726] R13: 00007fe0a0a16038 R14: 00007fe0a0a15fa0 R15: 00007ffe6c477498 [ 3370.727418][T19726] [ 3371.310322][T19731] bridge0: port 3(veth0_to_bridge) entered blocking state [ 3371.333653][T19734] netlink: 'syz.0.13228': attribute type 1 has an invalid length. [ 3371.361499][T19731] bridge0: port 3(veth0_to_bridge) entered disabled state [ 3371.376811][T19734] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.13228'. [ 3371.526814][T19731] device veth0_to_bridge entered promiscuous mode [ 3371.591625][T19731] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3371.686265][T19731] bridge0: port 3(veth0_to_bridge) entered blocking state [ 3371.694584][T19731] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 3372.003828][T19747] netlink: 'syz.0.13232': attribute type 16 has an invalid length. [ 3372.069658][T19747] netlink: 'syz.0.13232': attribute type 4 has an invalid length. [ 3372.169344][T19747] netlink: 132 bytes leftover after parsing attributes in process `syz.0.13232'. [ 3372.397965][T19756] netlink: 'syz.8.13234': attribute type 41 has an invalid length. [ 3373.380177][T19767] netlink: 'syz.1.13237': attribute type 1 has an invalid length. [ 3373.419266][T19767] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.13237'. [ 3373.496067][T19775] netlink: 'syz.0.13238': attribute type 3 has an invalid length. [ 3373.507256][T19775] netlink: 132 bytes leftover after parsing attributes in process `syz.0.13238'. [ 3375.172268][T19807] netlink: 'syz.1.13249': attribute type 10 has an invalid length. [ 3375.272413][T19807] device dummy0 entered promiscuous mode [ 3375.326525][T19807] team0: Port device dummy0 added [ 3375.379929][T19809] netlink: 'syz.5.13251': attribute type 1 has an invalid length. [ 3375.402127][T19809] netlink: 112865 bytes leftover after parsing attributes in process `syz.5.13251'. [ 3375.426032][T19815] netlink: 'syz.0.13253': attribute type 41 has an invalid length. [ 3379.384389][T19841] netlink: 'syz.1.13261': attribute type 1 has an invalid length. [ 3379.432449][T19841] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.13261'. [ 3379.790426][T19857] netlink: 'syz.0.13265': attribute type 1 has an invalid length. [ 3379.813343][T19857] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.13265'. [ 3380.369280][T19875] bridge0: port 4(veth0_to_bridge) entered blocking state [ 3380.471065][T19875] bridge0: port 4(veth0_to_bridge) entered disabled state [ 3380.661621][T19875] device veth0_to_bridge entered promiscuous mode [ 3380.808287][T19875] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3380.834171][T19881] netlink: 'syz.5.13271': attribute type 3 has an invalid length. [ 3380.924138][T19881] netlink: 132 bytes leftover after parsing attributes in process `syz.5.13271'. [ 3381.039446][T19875] bridge0: port 4(veth0_to_bridge) entered blocking state [ 3381.046766][T19875] bridge0: port 4(veth0_to_bridge) entered forwarding state [ 3383.969169][T19894] netlink: 'syz.7.13273': attribute type 41 has an invalid length. [ 3384.669874][T19911] netlink: 'syz.8.13277': attribute type 29 has an invalid length. [ 3384.696801][T19911] netlink: 'syz.8.13277': attribute type 29 has an invalid length. [ 3384.779942][T19918] netlink: 'syz.8.13277': attribute type 29 has an invalid length. [ 3384.780554][T19917] netlink: 'syz.7.13278': attribute type 7 has an invalid length. [ 3385.069529][T19923] netlink: 'syz.1.13280': attribute type 1 has an invalid length. [ 3385.078923][T19923] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.13280'. [ 3385.147616][T19928] netlink: 'syz.0.13282': attribute type 41 has an invalid length. [ 3385.741676][T19943] netlink: 'syz.1.13285': attribute type 3 has an invalid length. [ 3385.789310][T19943] netlink: 132 bytes leftover after parsing attributes in process `syz.1.13285'. [ 3389.928243][T19968] netlink: 'syz.0.13291': attribute type 1 has an invalid length. [ 3389.960847][T19967] netlink: 'syz.5.13293': attribute type 41 has an invalid length. [ 3390.109312][ T1278] ieee802154 phy0 wpan0: encryption failed: -22 [ 3390.115798][ T1278] ieee802154 phy1 wpan1: encryption failed: -22 [ 3390.371416][T19968] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.13291'. [ 3391.429735][T19982] netlink: 'syz.8.13295': attribute type 1 has an invalid length. [ 3391.485934][T19982] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.13295'. [ 3392.110792][T20000] netlink: 'syz.1.13301': attribute type 41 has an invalid length. [ 3392.331154][T19997] netlink: 'syz.0.13298': attribute type 3 has an invalid length. [ 3392.692247][T19997] netlink: 132 bytes leftover after parsing attributes in process `syz.0.13298'. [ 3393.869865][T20018] netlink: 'syz.0.13315': attribute type 3 has an invalid length. [ 3394.159199][T20018] netlink: 132 bytes leftover after parsing attributes in process `syz.0.13315'. [ 3394.366152][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3394.378702][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3394.391002][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3394.403322][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3394.415587][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3394.427855][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3394.440126][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3394.452424][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3394.464697][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3394.476989][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3399.369295][ C1] net_ratelimit: 4943 callbacks suppressed [ 3399.369319][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3399.387573][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3399.400041][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3399.412367][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3399.424637][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3399.436908][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3399.449198][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3399.461469][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3399.473767][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3399.486047][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3400.133017][T20035] netlink: 'syz.7.13318': attribute type 10 has an invalid length. [ 3400.179326][T20038] netlink: 'syz.1.13307': attribute type 41 has an invalid length. [ 3400.447583][T20044] netlink: 'syz.0.13308': attribute type 41 has an invalid length. [ 3400.462879][T20040] netlink: 'syz.8.13309': attribute type 1 has an invalid length. [ 3400.500093][T20040] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.13309'. [ 3402.548292][T20061] netlink: 'syz.5.13314': attribute type 41 has an invalid length. [ 3404.196344][T20083] netlink: 'syz.8.13321': attribute type 3 has an invalid length. [ 3404.227309][T20083] netlink: 132 bytes leftover after parsing attributes in process `syz.8.13321'. [ 3404.439342][ C1] net_ratelimit: 5341 callbacks suppressed [ 3404.439365][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3404.457723][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3404.470081][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3404.482515][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3404.494916][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3404.507678][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3404.520028][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3404.532692][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3404.545145][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3404.557612][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3405.959977][T20101] netlink: 'syz.7.13326': attribute type 41 has an invalid length. [ 3406.071315][T20105] netlink: 'syz.1.13325': attribute type 1 has an invalid length. [ 3406.181429][T20105] netlink: 112865 bytes leftover after parsing attributes in process `syz.1.13325'. [ 3406.735145][T20117] netlink: 'syz.1.13329': attribute type 41 has an invalid length. [ 3409.207897][T20144] FAULT_INJECTION: forcing a failure. [ 3409.207897][T20144] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3409.309116][T20144] CPU: 0 PID: 20144 Comm: syz.1.13344 Not tainted syzkaller #0 [ 3409.316754][T20144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3409.326822][T20144] Call Trace: [ 3409.330151][T20144] [ 3409.333103][T20144] dump_stack_lvl+0x188/0x24e [ 3409.337807][T20144] ? show_regs_print_info+0x12/0x12 [ 3409.343028][T20144] ? load_image+0x400/0x400 [ 3409.347729][T20144] ? __lock_acquire+0x7d10/0x7d10 [ 3409.352781][T20144] should_fail_ex+0x399/0x4d0 [ 3409.357561][T20144] _copy_from_user+0x2c/0x170 [ 3409.362259][T20144] __copy_msghdr+0x3b7/0x580 [ 3409.366974][T20144] ___sys_sendmsg+0x210/0x360 [ 3409.371677][T20144] ? __sys_sendmsg+0x290/0x290 [ 3409.376500][T20144] ? __lock_acquire+0x7d10/0x7d10 [ 3409.381564][T20144] __se_sys_sendmsg+0x1bb/0x2a0 [ 3409.386450][T20144] ? ct_nmi_exit+0x145/0x1c0 [ 3409.391056][T20144] ? __x64_sys_sendmsg+0x80/0x80 [ 3409.396027][T20144] ? lockdep_hardirqs_on+0x94/0x140 [ 3409.401245][T20144] do_syscall_64+0x4c/0xa0 [ 3409.405682][T20144] ? clear_bhb_loop+0x60/0xb0 [ 3409.410376][T20144] ? clear_bhb_loop+0x60/0xb0 [ 3409.415078][T20144] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3409.421032][T20144] RIP: 0033:0x7fe0a079c819 [ 3409.425461][T20144] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3409.445168][T20144] RSP: 002b:00007fe0a1655028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3409.453602][T20144] RAX: ffffffffffffffda RBX: 00007fe0a0a15fa0 RCX: 00007fe0a079c819 [ 3409.461588][T20144] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 3409.469568][T20144] RBP: 00007fe0a1655090 R08: 0000000000000000 R09: 0000000000000000 [ 3409.477567][T20144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3409.485546][T20144] R13: 00007fe0a0a16038 R14: 00007fe0a0a15fa0 R15: 00007ffe6c477498 [ 3409.493542][T20144] [ 3409.502134][ C1] net_ratelimit: 4244 callbacks suppressed [ 3409.502153][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:17, vlan:0) [ 3409.520550][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3409.532970][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:17, vlan:0) [ 3409.545920][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:17, vlan:0) [ 3409.558580][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3409.570971][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:17, vlan:0) [ 3409.583745][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:17, vlan:0) [ 3409.596197][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3409.608618][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:17, vlan:0) [ 3409.622025][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:17, vlan:0) [ 3411.692520][T20171] netlink: 'syz.5.13339': attribute type 3 has an invalid length. [ 3411.849122][T20171] netlink: 'syz.5.13339': attribute type 1 has an invalid length. [ 3412.139060][T20171] netlink: 116 bytes leftover after parsing attributes in process `syz.5.13339'. [ 3412.293526][T20174] netlink: 'syz.0.13338': attribute type 1 has an invalid length. [ 3412.437751][T20174] netlink: 112865 bytes leftover after parsing attributes in process `syz.0.13338'. [ 3412.670361][T20177] netlink: 'syz.8.13340': attribute type 1 has an invalid length. [ 3412.749125][T20177] netlink: 112865 bytes leftover after parsing attributes in process `syz.8.13340'. [ 3413.307917][T20185] netlink: 'syz.8.13343': attribute type 41 has an invalid length. [ 3413.738113][T20194] netlink: 'syz.7.13355': attribute type 1 has an invalid length. [ 3413.832670][T20194] netlink: 112865 bytes leftover after parsing attributes in process `syz.7.13355'. [ 3414.510179][ C1] net_ratelimit: 3089 callbacks suppressed [ 3414.510219][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:17, vlan:0) [ 3414.538426][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3414.559753][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:17, vlan:0) [ 3414.579865][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:17, vlan:0) [ 3414.596318][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3414.618394][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:17, vlan:0) [ 3414.641845][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:17, vlan:0) [ 3414.660429][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 3414.686721][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:17, vlan:0) [ 3414.716560][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:17, vlan:0) [ 3417.205123][T20215] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 3417.213040][T20215] #PF: supervisor instruction fetch in kernel mode [ 3417.219598][T20215] #PF: error_code(0x0010) - not-present page [ 3417.225598][T20215] PGD 64372067 P4D 64372067 PUD 0 [ 3417.230753][T20215] Oops: 0010 [#1] PREEMPT SMP KASAN [ 3417.235975][T20215] CPU: 0 PID: 20215 Comm: syz.5.13349 Not tainted syzkaller #0 [ 3417.243551][T20215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3417.253626][T20215] RIP: 0010:0x0 [ 3417.257113][T20215] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 3417.264506][T20215] RSP: 0018:ffffc900035e7458 EFLAGS: 00010246 [ 3417.270962][T20215] RAX: 1ffffffff1733f0f RBX: 1ffff920006bce9c RCX: 0000000000000001 [ 3417.278974][T20215] RDX: ffffc900035e7500 RSI: 0000000000000001 RDI: ffff888057d04000 [ 3417.287143][T20215] RBP: ffffc900035e7570 R08: ffff888057d0403f R09: 1ffff1100afa0807 [ 3417.295151][T20215] R10: dffffc0000000000 R11: ffffed100afa0808 R12: ffffe8ffffc641b0 [ 3417.303155][T20215] R13: ffffffff8b99f878 R14: 0000000000000000 R15: ffff888057d04000 [ 3417.311158][T20215] FS: 00007f6546a3c6c0(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000 [ 3417.320199][T20215] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3417.326815][T20215] CR2: ffffffffffffffd6 CR3: 0000000066cbd000 CR4: 00000000003506f0 [ 3417.334820][T20215] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3417.342811][T20215] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 3417.350819][T20215] Call Trace: [ 3417.354118][T20215] [ 3417.357061][T20215] bond_xdp_xmit+0x31e/0x550 [ 3417.361780][T20215] ? bond_xdp_xmit+0x94/0x550 [ 3417.366497][T20215] ? bond_xdp+0x850/0x850 [ 3417.370854][T20215] ? __next_zones_zonelist+0x99/0x120 [ 3417.376256][T20215] bq_xmit_all+0xd3f/0x11b0 [ 3417.380933][T20215] ? zone_statistics+0x170/0x170 [ 3417.385900][T20215] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 3417.391919][T20215] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 3417.398119][T20215] ? __dev_flush+0x1b0/0x1b0 [ 3417.402744][T20215] ? __alloc_pages_bulk+0x49a/0x920 [ 3417.407969][T20215] ? xdp_test_run_init_page+0x33b/0x440 [ 3417.413539][T20215] ? memcpy+0x3c/0x60 [ 3417.417594][T20215] ? rcu_is_watching+0x11/0xa0 [ 3417.422391][T20215] ? bq_enqueue+0x2ee/0x3d0 [ 3417.426929][T20215] ? rcu_is_watching+0x11/0xa0 [ 3417.431731][T20215] ? trace_xdp_redirect+0xb3/0x2b0 [ 3417.436907][T20215] __dev_flush+0xbf/0x1b0 [ 3417.441357][T20215] xdp_do_flush+0xa/0x20 [ 3417.445628][T20215] bpf_test_run_xdp_live+0x1545/0x1a90 [ 3417.451125][T20215] ? 0xffffffffa0004440 [ 3417.455319][T20215] ? bpf_test_run_xdp_live+0x518/0x1a90 [ 3417.460896][T20215] ? xdp_convert_md_to_buff+0x330/0x330 [ 3417.466486][T20215] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 3417.472844][T20215] ? bpf_test_init+0x119/0x140 [ 3417.477637][T20215] ? xdp_convert_md_to_buff+0x5b/0x330 [ 3417.483159][T20215] bpf_prog_test_run_xdp+0x736/0xf10 [ 3417.488479][T20215] ? dev_put+0x80/0x80 [ 3417.492596][T20215] ? dev_put+0x80/0x80 [ 3417.496710][T20215] bpf_prog_test_run+0x31e/0x390 [ 3417.501694][T20215] __sys_bpf+0x62b/0x780 [ 3417.505980][T20215] ? bpf_link_show_fdinfo+0x380/0x380 [ 3417.511409][T20215] ? lock_chain_count+0x20/0x20 [ 3417.516309][T20215] __x64_sys_bpf+0x78/0x90 [ 3417.520771][T20215] do_syscall_64+0x4c/0xa0 [ 3417.525232][T20215] ? clear_bhb_loop+0x60/0xb0 [ 3417.529938][T20215] ? clear_bhb_loop+0x60/0xb0 [ 3417.534652][T20215] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3417.540575][T20215] RIP: 0033:0x7f6545b9c819 [ 3417.545019][T20215] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3417.564661][T20215] RSP: 002b:00007f6546a3c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3417.573139][T20215] RAX: ffffffffffffffda RBX: 00007f6545e15fa0 RCX: 00007f6545b9c819 [ 3417.581134][T20215] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 3417.589215][T20215] RBP: 00007f6545c32c91 R08: 0000000000000000 R09: 0000000000000000 [ 3417.597212][T20215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3417.605211][T20215] R13: 00007f6545e16038 R14: 00007f6545e15fa0 R15: 00007ffedf8d9e78 [ 3417.613215][T20215] [ 3417.616340][T20215] Modules linked in: [ 3417.620262][T20215] CR2: 0000000000000000 [ 3417.624440][T20215] ---[ end trace 0000000000000000 ]--- [ 3417.629915][T20215] RIP: 0010:0x0 [ 3417.633399][T20215] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 3417.640952][T20215] RSP: 0018:ffffc900035e7458 EFLAGS: 00010246 [ 3417.647041][T20215] RAX: 1ffffffff1733f0f RBX: 1ffff920006bce9c RCX: 0000000000000001 [ 3417.655038][T20215] RDX: ffffc900035e7500 RSI: 0000000000000001 RDI: ffff888057d04000 [ 3417.663109][T20215] RBP: ffffc900035e7570 R08: ffff888057d0403f R09: 1ffff1100afa0807 [ 3417.671135][T20215] R10: dffffc0000000000 R11: ffffed100afa0808 R12: ffffe8ffffc641b0 [ 3417.679215][T20215] R13: ffffffff8b99f878 R14: 0000000000000000 R15: ffff888057d04000 [ 3417.687313][T20215] FS: 00007f6546a3c6c0(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000 [ 3417.696297][T20215] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3417.702925][T20215] CR2: ffffffffffffffd6 CR3: 0000000066cbd000 CR4: 00000000003506f0 [ 3417.710926][T20215] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3417.718932][T20215] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 3417.726933][T20215] Kernel panic - not syncing: Fatal exception in interrupt [ 3417.734598][T20215] Kernel Offset: disabled [ 3417.738925][T20215] Rebooting in 86400 seconds..