last executing test programs: 6m11.712073795s ago: executing program 3 (id=4): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020039000b05d25a806f8c6394f90424fc602f00000008000100feff000037153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000440), 0x8) perf_event_open$cgroup(0x0, r1, 0x3, 0xffffffffffffffff, 0x1) r2 = socket$kcm(0xa, 0x1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0a00000005000000020000000700000002000000", @ANYRES32=r1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r3}, 0x38) r4 = syz_clone(0x45004400, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$kcm(0x2, 0x2, 0x0) sendmsg$inet(r5, 0x0, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r2, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x20000001) socketpair(0x1e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x5, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_config_ext={0x7, 0x3}, 0x404, 0x10000, 0x9e4, 0x1, 0x9, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r6) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[], 0x0}, 0x94) r7 = socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40a10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0xffffffffffffec23, 0x0, 0x7, 0x1c3b0979, 0x0, 0x10, 0x0, 0x0, 0x0, 0x959}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) sendmsg$inet(r7, &(0x7f0000000100)={0x0, 0x11, &(0x7f0000000080)=[{&(0x7f0000000140)="600000002c000d190a762d7f089e", 0xfca2}, {&(0x7f0000000280)="68cabf2dfb58fc0a1d6b689866f05d490d010088a8ffff0200258f2e4409b8f9e6aaeb88bea123dc2c6726e89b1ae2f6e8bcb5ee52dcd7298d39093c510293bca0b646a3ce904f6e6b788b3204c233e60ddc", 0x52}], 0x2}, 0x0) 6m11.505907567s ago: executing program 0 (id=1): r0 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc6, 0xc6, 0xb, [@volatile={0x10, 0x0, 0x0, 0x9, 0x3}, @ptr={0x7, 0x0, 0x0, 0x2, 0x2}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x21, 0x0, 0x7d, 0x4}, @union={0xe, 0x8, 0x0, 0x5, 0x0, 0x12b9, [{0x10, 0x4, 0x3ff}, {0xe, 0x5}, {0x1, 0x1, 0x8}, {0xf, 0x0, 0x3}, {0x3, 0x2, 0x8f47}, {0x9, 0x3, 0x2}, {0xa, 0x4, 0x1}, {0xf, 0x3, 0x3}]}, @datasec={0x9, 0x2, 0x0, 0xf, 0x2, [{0x3, 0x9, 0x6}, {0x3, 0xffff4485, 0x9}], '\\\''}, @typedef={0xa, 0x0, 0x0, 0x8, 0x4}]}, {0x0, [0x0, 0x66, 0x0, 0x2e, 0x5f, 0x5f, 0x61, 0x61, 0x61]}}, &(0x7f0000000980)=""/45, 0xeb, 0x2d, 0x1, 0x8}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) sendmsg(r0, &(0x7f0000000840)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @multicast2}, 0x0, 0x3, 0x3}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000080)="fcc7307b259115bd3731176354baae589dc6c786", 0x14}, {&(0x7f00000000c0)="8c49a2806f7cbb6147294ae9012f2076435158c3420f8dafe18e02b54b4bae0e6eeb3553740068cc9650d3e7f522c07b3b74daefe578af32f522b2c755742b8c4170a06b495bbb6a55d1c808f6ede89809b09fdb1cc33d97", 0x58}, {&(0x7f0000000140)="c284af490dcbccf212dfe27d4e6157161cea05717cb47ed91eae58896da680c9a9a3e4fb45c9cfd8da20247e6c374e045ccd3ee4e5e91365bc84c766cb6daff10ae632ff2e4f6e3c53838f0c921c899fa5b1f8f055362b0aba48eff0787d2581c48ba0ad330b4333a2c68e1efe4a245425a8f117daa896298671f0fec5366bb81268e4ca12cb7360827489b828ec3f63980c4c9f7c628dd60981e0e4b8fd005e10851c794100b57883493656a2ea028a800bc28cea5999685f2ce89f97a14ad472e6391c1cc44281e35ad7b48cee65e66d743da0d48272bff4b59be14df8f355a6b0150bb5dd23db3e62741c605962819521", 0xf2}, {&(0x7f0000000240)="98604ae8ac1ae330f6195b555a469f7750084b37dc289694cd36b42babf68a6f8e63854beaf177f8d9677f2ebf98f01064eb8b13054af5b239a02a5486793fbc5f186a621aa130d3caab8f241f11d5599f1335860a6533c9d59b374e2e072229fa0930f6eee4d45d27ff8b60d50a7ab15c532cbf087ddcacecc57a4798d4b36b103df4d0b323ad4d243bd27c2e2ab9", 0x8f}, {&(0x7f0000000300)="ba7c9e1930fa03df5de3cbb3b450838f0fee89cd64bf2b531038db05f996201a5d77da48858973de44fe01c002c8272130eede71ae18812c99a4ac2e5770b596b26683b4d9854ef93147c525f80c151b577aace88767d706d7ad07ea691aa7e0c78dfa41fff6", 0x66}, {&(0x7f0000000380)="d0cb412ac8ed0e3b3f931c2275fe1f2907f073dd9ad83ae0ba65677c2b5a41025d857bbc", 0x24}, {&(0x7f00000003c0)="cb8e4769d77722d0ebff775a05f85bc4b7f94b53be0d48ac4e745180142c853eda708cb57debd5ec6780c8b206812c0083b3bed50b86a593b3861107a9df0a3fef514948fd3b5ac75dbbfe7814edf6ec1c0fd96b3336b43d1b756547862f303572da1892ea822db66f1e2c931a7d3be81814f4318fe49b28979fbb120fa3d61d223f4305e59daaf4ea4416cae103bfc0e2937d96608048caf8c130cb5a30c22bd5a566cac102aff4a2", 0xa9}, {&(0x7f0000000500)="f40d0b5bc4f77cfc70f83cd6514196c309ff06df1d2356817a10f0070b992c8f38c480759dcc03641173a63b9ee3faa766cca77ee9486edef9fdf7a8d0a9ed44832b7d65918475e9be0d77899f35c97c5e3634419a0da204ff1d762eb3e997a19881254a8d2665fcf6c6dd093d603c172e886b1ab86d952ca0b6019d52ff8a5c36f14f607d3de4a916d64e56818905d7419ee177e82fcea206029f00e90ecdb17ffae75577cb7adfdccb710ef308b2", 0xaf}, {&(0x7f00000005c0)="507c37060150640c9d336cdb0e5658ea1abb4977250e452423580af5976c4f7a95a54b32b625055a8f2a4db6b0916cafb60ba32da576cfba38e243184b38f4db0defb6d17751f3887fd42acdcbab7db683eeeade224377aec72a3c3aa4521b044b002b771a2a4995330e537f6c4f86c166c15bbc3d877c7def4eebd64ce0e0bc539063279a67233cc7b77479e8f43e87e604f5c491f3686cdb3ba7d269ef0caa4dae", 0xa2}, {&(0x7f0000000680)="23024039112d4c6321ec13cde7a71ec27c894e16a776790e8faead9c7cc5390eec63cdccb4b7454ba631d66832a8b3ae9422eb76256d1e41b52423ff8a9f105a071e14f6775e71fce3711ad9c2314e974ace6144a15d6e89899348a3b3e4be355157ff9b5d0e6a63b881436708758359c05eacb9eca8bd5b2282dd29f52cd52ca3f91a108ad8d3a79eed7c7a18580908c1abaaee43b05fbe5a7077efa65ded76a2b22982969e42915f25ebc829ff8f3daa88a7c59a4a901452daadebf6c903700dc5a464364868cebfcf56ec64151fa9aa0ee4becbae0e927cf25cde88009fc222242772da9301a12de4a07c3623e0bdfbe86b06bf78", 0xf6}], 0xa, &(0x7f0000000480)=ANY=[@ANYBLOB="28000000000000000100000001000000614dbc697e0b46825efd180511a5d06c661c3e178a53c310"], 0x28}, 0x4) syz_clone(0x9040000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x180000, &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f00000004c0)='Y', 0x1}], 0x1}, 0x4000040) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000bc0)={r2, 0x20, &(0x7f0000000b80)={&(0x7f0000000a00)=""/133, 0x85, 0x0, &(0x7f0000000ac0)=""/177, 0xb1}}, 0x10) close(r0) 6m10.087069289s ago: executing program 0 (id=7): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x1}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) r4 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x1a, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7020000140000007bf3031e8e5a58594dbcdb7891a75cddb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000185600000c00000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000006"], 0x0, 0xfb7, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xd3}, 0x94) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x72, &(0x7f0000000000)=r5, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x11, 0x17, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1ff}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x6}, {0x66, 0x0, 0x0, 0x80ffffff}}, [@printk={@p, {0x3, 0x3, 0x3, 0xa, 0x9, 0xfe00}, {0x6, 0x1, 0x5, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x56}}], {{0x4, 0x1, 0x2, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000000040)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x4a, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x29, 0x46, &(0x7f0000000040), 0xcf) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000280)="89000000120081ae08060cdc030ec0007f03e3f70000000000e272f750375ed08a56331dbf9ed7a15e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec08120800020004000000bdad446b9bbc7ace5b0dd385dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff00"/137, 0x89}], 0x1}, 0x0) recvmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x40012100) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x4, 0x4, 0x12, 0x20d0}, 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000980)=ANY=[@ANYRES32=r11, @ANYRES32=r10, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r11}, &(0x7f0000000000), &(0x7f0000000080)=r8}, 0x20) sendmsg$inet(r9, &(0x7f0000000500)={0x0, 0x4000000, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 6m10.058004201s ago: executing program 3 (id=8): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020039000b05d25a806f8c6394f90424fc602f00000008000100feff000037153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000440), 0x8) perf_event_open$cgroup(0x0, r1, 0x3, 0xffffffffffffffff, 0x1) r2 = socket$kcm(0xa, 0x1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0a00000005000000020000000700000002000000", @ANYRES32=r1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r3}, 0x38) r4 = syz_clone(0x45004400, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x3, 0x20000000000002ee, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xf}, 0x94) perf_event_open(0x0, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$kcm(0x2, 0x2, 0x0) sendmsg$inet(r5, 0x0, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r2, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x20000001) socketpair(0x1e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x5, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_config_ext={0x7, 0x3}, 0x404, 0x10000, 0x9e4, 0x1, 0x9, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r6) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[], 0x0}, 0x94) r7 = socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40a10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0xffffffffffffec23, 0x0, 0x7, 0x1c3b0979, 0x0, 0x10, 0x0, 0x0, 0x0, 0x959}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) sendmsg$inet(r7, &(0x7f0000000100)={0x0, 0x11, &(0x7f0000000080)=[{&(0x7f0000000140)="600000002c000d190a762d7f089e", 0xfca2}, {&(0x7f0000000280)="68cabf2dfb58fc0a1d6b689866f05d490d010088a8ffff0200258f2e4409b8f9e6aaeb88bea123dc2c6726e89b1ae2f6e8bcb5ee52dcd7298d39093c510293bca0b646a3ce904f6e6b788b3204c233e60ddc", 0x52}], 0x2}, 0x0) 6m7.411523253s ago: executing program 3 (id=14): r0 = syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0xd682, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x8509, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) socket$kcm(0x21, 0x2, 0xa) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000c40), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=0xffffffffffffffff, 0x4) close(0x3) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001980)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3, 0xffffffffffffffff}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000027000000f8ffffffbfa400000000000007040000f0ffffffb70200000200000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b704000008000000850000004900000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="7638300c000000000000e900feff", 0x0, 0x2f000000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 6m7.225589174s ago: executing program 0 (id=15): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020039000b05d25a806f8c6394f90424fc602f00000008000100feff000037153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000440), 0x8) perf_event_open$cgroup(0x0, r1, 0x3, 0xffffffffffffffff, 0x1) r2 = socket$kcm(0xa, 0x1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0a00000005000000020000000700000002000000", @ANYRES32=r1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r3}, 0x38) syz_clone(0x45004400, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x3, 0x20000000000002ee, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xf}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) sendmsg$inet(r4, 0x0, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r2, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x20000001) socketpair(0x1e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x5, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_config_ext={0x7, 0x3}, 0x404, 0x10000, 0x9e4, 0x1, 0x9, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r5) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[], 0x0}, 0x94) r6 = socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40a10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0xffffffffffffec23, 0x0, 0x7, 0x1c3b0979, 0x0, 0x10, 0x0, 0x0, 0x0, 0x959}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) sendmsg$inet(r6, &(0x7f0000000100)={0x0, 0x11, &(0x7f0000000080)=[{&(0x7f0000000140)="600000002c000d190a762d7f089e", 0xfca2}, {&(0x7f0000000280)="68cabf2dfb58fc0a1d6b689866f05d490d010088a8ffff0200258f2e4409b8f9e6aaeb88bea123dc2c6726e89b1ae2f6e8bcb5ee52dcd7298d39093c510293bca0b646a3ce904f6e6b788b3204c233e60ddc", 0x52}], 0x2}, 0x0) 5m50.534305267s ago: executing program 32 (id=14): r0 = syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0xd682, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x8509, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) socket$kcm(0x21, 0x2, 0xa) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000c40), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=0xffffffffffffffff, 0x4) close(0x3) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001980)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3, 0xffffffffffffffff}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000027000000f8ffffffbfa400000000000007040000f0ffffffb70200000200000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b704000008000000850000004900000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="7638300c000000000000e900feff", 0x0, 0x2f000000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 5m50.533358717s ago: executing program 33 (id=15): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020039000b05d25a806f8c6394f90424fc602f00000008000100feff000037153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000440), 0x8) perf_event_open$cgroup(0x0, r1, 0x3, 0xffffffffffffffff, 0x1) r2 = socket$kcm(0xa, 0x1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0a00000005000000020000000700000002000000", @ANYRES32=r1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r3}, 0x38) syz_clone(0x45004400, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x3, 0x20000000000002ee, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xf}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) sendmsg$inet(r4, 0x0, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r2, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x20000001) socketpair(0x1e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x5, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_config_ext={0x7, 0x3}, 0x404, 0x10000, 0x9e4, 0x1, 0x9, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r5) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[], 0x0}, 0x94) r6 = socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40a10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0xffffffffffffec23, 0x0, 0x7, 0x1c3b0979, 0x0, 0x10, 0x0, 0x0, 0x0, 0x959}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) sendmsg$inet(r6, &(0x7f0000000100)={0x0, 0x11, &(0x7f0000000080)=[{&(0x7f0000000140)="600000002c000d190a762d7f089e", 0xfca2}, {&(0x7f0000000280)="68cabf2dfb58fc0a1d6b689866f05d490d010088a8ffff0200258f2e4409b8f9e6aaeb88bea123dc2c6726e89b1ae2f6e8bcb5ee52dcd7298d39093c510293bca0b646a3ce904f6e6b788b3204c233e60ddc", 0x52}], 0x2}, 0x0) 7.120896069s ago: executing program 1 (id=1013): sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x0, 0x23, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r1, 0x84, 0x9, &(0x7f0000000380), 0x98) socket$kcm(0xa, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1f00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000006d008e1598dd304f9da97cd36dc5e848cf53d132d4bcdfff0000000000000000000000000000000000c80a36cd03e0205a26ff4a752d10e9b413e97877d90bb811ed56fe6865dcf9cf43874cb6e8df9b09e1f80fdef0b78a53a4ca53acb1be952326f6146d6b68d5836be358e668b75fa38049bf5f8531d36e2c35a8869ca2d69cda2b"], 0x50) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x4) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000ec0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func_proto]}, {0x0, [0x61]}}, &(0x7f0000000340)=""/81, 0x27, 0x51, 0x1, 0x5}, 0x28) openat$cgroup_int(r2, &(0x7f0000000480)='cpu.max\x00', 0x2, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000000000791008e4ffffffff1da0000000f5ff2ec1a392228a1bae71"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r3}, &(0x7f0000000040), &(0x7f0000000580)=r4}, 0x20) r5 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r5, &(0x7f00000000c0)={0x0, 0xfe, &(0x7f0000000000)=[{&(0x7f0000000040)="0207000902000000e4a17c45c8d260c9", 0x10}], 0x1}, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0xa2, 0xfd, 0x6, 0xf8, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x8}, 0x86bf2056334f3ae6, 0x0, 0x1, 0x0, 0x10, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x40000000000}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0xb) socket$kcm(0xa, 0x1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r7 = socket$kcm(0xa, 0x8, 0x88) sendmsg$kcm(r7, &(0x7f0000000340)={&(0x7f00000002c0)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000240)="0ea415", 0x3}, {&(0x7f0000000740)="8b0a751c7aead06880515a5d", 0xc}, {&(0x7f0000000800)="c8ea972e8fbc5218c56e7b9c7ef9c62f186d531c8a26c50e09e4267c68eedb106c2f9d33ca75", 0x26}], 0x3}, 0x200ce0c0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000fc007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 6.939738949s ago: executing program 5 (id=1014): r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000001) sendmsg$sock(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x97}, 0x44004) 6.739101641s ago: executing program 5 (id=1016): bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000c00)=ANY=[@ANYBLOB="b7020000c3000000bf230000000000002703000000fefeff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400011000000404000001007d60b7030000000000006a0a00fe80000000850000002600000020000000000000009500001000000000acaa8e53a53cb864c300094c07000000000000d94cf0987b00a749a8e53b5c9491cd1f2b94a64f1de23d03a8f0362ebfc44c77511e60070e25510070f7778d3e77ad85319f0113abbac795f8c24abca246150226eb93fe39233add8f68f87699162334343befce832cb8075c5f0ae30cde221371ff00000067e4b75da95370ae6fd2b99ac18f98403494d4a94e95fb8dcd813487b2bdb006c6465c15f04485a9f8c8e49d00000097184c8e9d34b1e382b25e9614634e8e09194f7b83138f5275d9ab463797a2f6dcb45d5f278cd4fb74559575da3560c01cdf1eaa3fc7a3fb4f1689dfd5b626174770e4dfd1c82a694efc62f9ef9c8c0ea1efa5b949ce22827f6fd1dfc69d03482d8ec264e3d96ad19a0c99a234b4b71b0bc22573f8594b91781cd8ff7f000000000000299ebf94588e60abe9a565c5bbdc0358226f8580dc1a83c6a44408de23475a74ef0deda8da4089269ccb4e728dee6320444576c87cc576291e5367a5f1a5d5a12f8313ffff0b7f73335279aa2b68c9f045831119881764c71bb65b5138c50e06024e80fd9656bc077e4e259695748989335ba9eeef288de73815f20fefd4acfb6813ffff00000b971aec1a3e618a08a94ecbd401c8109c87ee3f5c0501857538d2a766bfcf4128fbe726903aca577aa8943af747760718dee5a21396dce6f61c6f3c7e000000cb0868b48719e47296f2299df3ecfb5f3f0e42f6f1eb1dc64dcc8e397366d12033f6288edbda3b838100000000000000000000800000edd4e1266dc9d73223fe614f025a7f284de76b3b676a13c57a0ed24f6270c4cbbf93472eb8093d8296c68dfbb03ddedc3e029b08959b145a7b110068ba071e75d75716243052ad24b624fddc2f0f3a018c0085c2319c248d643cd09fa855b20a6d453f2e954ff0e55c010000008547c5a0ecefcc44cc9532f729167f215937357a4bb9746193c1ec000000000000dd43c108c2109d221b7b26b7c9c209000005b7918a6cd856b8fa806c85480443159c6bed51a0e021f05f7caa1b99cdb4d08d9031210ac00e67d8c40a18503cb7aabcc066dfbfd7f87abe1122f00e5454bec3563a19582e0000000000000000000000000084b27fc6a3f95bf02b4eb5f1599dd46edcad432cc216316fe07afe27649c89cf022a90d895a2d70fcde7a9c37ede0c47c27f44595ab4b1fb1ed5b1d91314b2d50f94a768fb605679485041a6376b8344a39af68aed2be39794dd86ae82f9660cf4f935255d71f9fab2e430ac42bba1f54141cf39d4d50c4ded504beacb0de210d7a3716dca7362c134b91cef3efc514fbcb4747e6814ac16449ac02a43d9d4151697b4b7890ec6b481c5f0ca8c52a6322f34a796fa5941d23409ecf73458223baaffb94a89ee2884df000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffca8, 0x10, &(0x7f0000000000), 0x36}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffca8, 0x10, &(0x7f0000000000), 0x36}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="15000000060000000f0000000800000041000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="10003d39fcffffff0000000000000000000000000000000000000000d2ec87f6e3de160774583cca1ae91c187408b081631a71890cd214f24a8d2aa4911517a7d59d2af0df277f49b42807e845d7a6c4"], 0x50) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r2, 0x29, 0x2c, 0x0, 0x108) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000181100002e9b72ffd1744eb82dbd2278bc9c6da2395c45258632cc9e1f674e295ce21fe42c82190203af7dab948b1f51661ad54c3b67540d7e210d40afe0894c637ddd99b668505d49d5", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe5}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x11, &(0x7f0000000580)=ANY=[@ANYBLOB="180000004a00000000000000020b000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018510000040000000000000000000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x65b2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x7, 0x3ff, 0x4}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000280)=[r1, r1], &(0x7f00000003c0)=[{0x2, 0x4, 0xb, 0xc}, {0x2, 0x4, 0x8, 0x1}, {0x5, 0x4, 0x8, 0x9}, {0x5, 0x4, 0xd, 0xa}, {0x3, 0x1, 0xa, 0x1}, {0x0, 0x3, 0xd, 0x5}, {0x5, 0x4, 0xe, 0x4}, {0x5, 0x3, 0x6, 0xa}], 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="12000000040000000800000044"], 0x50) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="12000000040000000800000044"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0xe, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000003000000b70400000000000085000000030000001800000000000000000000000000000095"], &(0x7f0000000200)='syzkaller\x00', 0xa}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0xfffffffc}, 0x28) (async) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0xfffffffc}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0xfffffcef, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x9}, 0x1}, 0x6d) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8b04, &(0x7f0000000040)={'wlan1\x00', @random="01f8ffffff8d"}) (async) ioctl$SIOCSIFHWADDR(r7, 0x8b04, &(0x7f0000000040)={'wlan1\x00', @random="01f8ffffff8d"}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001200)={r4, 0x58, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1e00000008000000070000000708000010000000", @ANYRES32=r1, @ANYBLOB='O\x00'/20, @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB="0200000001000000000000000e00"/28], 0x50) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1e00000008000000070000000708000010000000", @ANYRES32=r1, @ANYBLOB='O\x00'/20, @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB="0200000001000000000000000e00"/28], 0x50) socket$kcm(0x10, 0x2, 0x0) (async) r10 = socket$kcm(0x10, 0x2, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000900)=r3) sendmsg$kcm(r10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73f72cc9f0ba1f848360000005e140602000000000e000a00100000000a8000001294", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0xf, &(0x7f0000001280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f0000000540)='syzkaller\x00', 0x8, 0x0, 0x0, 0x40f00, 0x0, '\x00', r8, 0x25, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f00000013c0)={0x2, 0x9, 0x200102, 0x3}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000480)=[r1, r4, r6, r7, 0xffffffffffffffff, r9], &(0x7f00000014c0)=[{0x5, 0x2, 0xc, 0x4}, {0x1f3, 0x2, 0x5}, {0x2, 0x1, 0x4, 0xa}], 0x10, 0x6}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0xf, &(0x7f0000001280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, &(0x7f0000000540)='syzkaller\x00', 0x8, 0x0, 0x0, 0x40f00, 0x0, '\x00', r8, 0x25, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f00000013c0)={0x2, 0x9, 0x200102, 0x3}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000480)=[r1, r4, r6, r7, 0xffffffffffffffff, r9], &(0x7f00000014c0)=[{0x5, 0x2, 0xc, 0x4}, {0x1f3, 0x2, 0x5}, {0x2, 0x1, 0x4, 0xa}], 0x10, 0x6}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0xf9b, 0x8, 0x9, 0x8, r0, 0xf, '\x00', r8, 0xffffffffffffffff, 0x4, 0x3, 0x5, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000001700bcb4289793dfa1e900"/28], 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000001700bcb4289793dfa1e900"/28], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) 6.090679828s ago: executing program 1 (id=1018): r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x4, 0xd, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32=r1, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002280)={r2, 0x0, 0xe, 0x0, &(0x7f0000000040)="e827312c5600da3be3ef72341b9b", 0x0, 0x57af, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 6.018780632s ago: executing program 4 (id=1019): r0 = syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0xd682, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x8509, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) socket$kcm(0x21, 0x2, 0xa) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000c40), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=0xffffffffffffffff, 0x4) close(0x3) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001980)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3, 0xffffffffffffffff}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff0000", @ANYRES32=r4, @ANYBLOB="0000000000000000b704000008000000850000004900000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="7638300c000000000000e900feff", 0x0, 0x2f000000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 6.017505982s ago: executing program 5 (id=1027): r0 = syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0xd682, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x8509, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) socket$kcm(0x21, 0x2, 0xa) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000c40), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=0xffffffffffffffff, 0x4) close(0x3) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001980)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3, 0xffffffffffffffff}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0x10, &(0x7f0000000740)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b704000008000000850000004900000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="7638300c000000000000e900feff", 0x0, 0x2f000000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 5.931227838s ago: executing program 1 (id=1020): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x1}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) r4 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x1a, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7020000140000007bf3031e8e5a58594dbcdb7891a75cddb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000185600000c00000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300"], 0x0, 0xfb7, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xd3}, 0x94) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x72, &(0x7f0000000000)=r5, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x11, 0x17, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1ff}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x6}, {0x66, 0x0, 0x0, 0x80ffffff}}, [@printk={@p, {0x3, 0x3, 0x3, 0xa, 0x9, 0xfe00}, {0x6, 0x1, 0x5, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x56}}], {{0x4, 0x1, 0x2, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000000040)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x4a, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x29, 0x46, &(0x7f0000000040), 0xcf) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x28, 0x98, 0x9, 0x0, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000280)="89000000120081ae08060cdc030ec0007f03e3f70000000000e272f750375ed08a56331dbf9ed7a15e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec08120800020004000000bdad446b9bbc7ace5b0dd385dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff00"/137, 0x89}], 0x1}, 0x0) recvmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x40012100) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x4, 0x4, 0x12, 0x20d0}, 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000980)=ANY=[@ANYRES32=r11, @ANYRES32=r10, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r11}, &(0x7f0000000000), &(0x7f0000000080)=r8}, 0x20) sendmsg$inet(r9, &(0x7f0000000500)={0x0, 0x4000000, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 3.996704529s ago: executing program 2 (id=1024): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x1}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) r4 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x1a, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7020000140000007bf3031e8e5a58594dbcdb7891a75cddb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000185600000c00000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300"], 0x0, 0xfb7, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xd3}, 0x94) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x72, &(0x7f0000000000)=r5, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x11, 0x17, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1ff}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x6}, {0x66, 0x0, 0x0, 0x80ffffff}}, [@printk={@p, {0x3, 0x3, 0x3, 0xa, 0x9, 0xfe00}, {0x6, 0x1, 0x5, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x56}}], {{0x4, 0x1, 0x2, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000000040)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x4a, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x29, 0x46, &(0x7f0000000040), 0xcf) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x28, 0x98, 0x9, 0x0, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000280)="89000000120081ae08060cdc030ec0007f03e3f70000000000e272f750375ed08a56331dbf9ed7a15e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec08120800020004000000bdad446b9bbc7ace5b0dd385dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff00"/137, 0x89}], 0x1}, 0x0) recvmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x40012100) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x4, 0x4, 0x12, 0x20d0}, 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000980)=ANY=[@ANYRES32=r11, @ANYRES32=r10, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r11}, &(0x7f0000000000), &(0x7f0000000080)=r8}, 0x20) sendmsg$inet(r9, &(0x7f0000000500)={0x0, 0x4000000, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 3.991986819s ago: executing program 1 (id=1033): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0a000000050000000200000007000000020000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="feffffda12f17f82a86ad9101d8a1f4767000000000000000000006d5a0b81bdf43c9d3b1a1d75d8a4f0603831ff6cbebc7daf0ca8b1950155223d739a385ff41e0cf4c7eedb6cdc5a99fe759a7e79ae25be3efec1d471881a101217ef92fcc98c6f49e01ac26f7f4951edd9dc5a9999dad8ad469098dbf930d248b0f5460757d766e9d6bbd6a4275ab489f433f5ce0029b877e9507e268aa7fabfb2f607a1b92782222665be10195a7172effaf61e9b7509a74828119b32d555b68aee7658961ccfa10940e85b548c4c222700bf278e8b4d7c7f3340ed20856ca9b3175be019cc5677a3c2ed696edf91b81159"], 0x50) r1 = syz_clone(0x45004400, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x3, 0x20000000000002ee, &(0x7f00000001c0)=ANY=[@ANYRESDEC], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xf}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$kcm(0x2, 0x2, 0x0) sendmsg$inet(r2, 0x0, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x20000001) socketpair(0x1e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x5, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_config_ext={0x7, 0x3}, 0x404, 0x10000, 0x9e4, 0x1, 0x9, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[], 0x0}, 0x94) r4 = socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40a10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0xffffffffffffec23, 0x0, 0x7, 0x1c3b0979, 0x0, 0x10, 0x0, 0x0, 0x0, 0x959}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) sendmsg$inet(r4, &(0x7f0000000100)={0x0, 0x11, &(0x7f0000000080)=[{&(0x7f0000000140)="600000002c000d190a762d7f089e", 0xfca2}, {&(0x7f0000000280)="68cabf2dfb58fc0a1d6b689866f05d490d010088a8ffff0200258f2e4409b8f9e6aaeb88bea123dc2c6726e89b1ae2f6e8bcb5ee52dcd7298d39093c510293bca0b646a3ce904f6e6b788b3204c233e60ddc", 0x52}], 0x2}, 0x0) 3.008972236s ago: executing program 2 (id=1025): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xa}, 0x828, 0x0, 0x0, 0x0, 0x10000, 0x800000, 0x9, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='cpu<00||!') r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000ff0100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000004000000b704000000000000850000001500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x2f, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000500", 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = perf_event_open(&(0x7f0000000280)={0x7, 0x80, 0x4, 0x88, 0x2, 0x0, 0x0, 0x7, 0x1913, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe, 0x0, @perf_bp={&(0x7f0000000200), 0x3}, 0x1008, 0x36a, 0x5, 0x7, 0x0, 0x1, 0xf3c5, 0x0, 0x81, 0x0, 0x101}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000300)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x2}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000005080000000000008200000018010000", @ANYRES32, @ANYBLOB="0000000000000000b7080000048000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000a6000000850000005000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x35}, 0x94) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000001140)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7fff, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x3f1f}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [], {{0x6, 0x1, 0x6, 0x8}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x3, 0x80100, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x90c, 0x401, 0x1, 0x4, 0x1, 0x200, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0), 0xc) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40500000000000071101b000000000006000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd96, &(0x7f0000000080)=""/201, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffd56, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x10000000}, 0x10}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)) 2.749908961s ago: executing program 5 (id=1026): sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x0, 0x23, 0x0, 0x0) r1 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r1, 0x84, 0x9, &(0x7f0000000380), 0x98) socket$kcm(0xa, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1f00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000006d008e1598dd304f9da97cd36dc5e848cf53d132d4bcdfff0000000000000000000000000000000000c80a36cd03e0205a26ff4a752d10e9b413e97877d90bb811ed56fe6865dcf9cf43874cb6e8df9b09e1f80fdef0b78a53a4ca53acb1be952326f6146d6b68d5836be358e668b75fa38049bf5f8531d36e2c35a8869ca2d69cda2b"], 0x50) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x4) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000ec0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func_proto]}, {0x0, [0x61]}}, &(0x7f0000000340)=""/81, 0x27, 0x51, 0x1, 0x5}, 0x28) openat$cgroup_int(r2, &(0x7f0000000480)='cpu.max\x00', 0x2, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000000000791008e4ffffffff1da0000000f5ff2ec1a392228a1bae71"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r3}, &(0x7f0000000040), &(0x7f0000000580)=r4}, 0x20) r5 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r5, &(0x7f00000000c0)={0x0, 0xfe, &(0x7f0000000000)=[{&(0x7f0000000040)="0207000902000000e4a17c45c8d260c9", 0x10}], 0x1}, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0xa2, 0xfd, 0x6, 0xf8, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x8}, 0x86bf2056334f3ae6, 0x0, 0x1, 0x0, 0x10, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x40000000000}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0xb) socket$kcm(0xa, 0x1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r7 = socket$kcm(0xa, 0x8, 0x88) sendmsg$kcm(r7, &(0x7f0000000340)={&(0x7f00000002c0)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000240)="0ea415", 0x3}, {&(0x7f0000000740)="8b0a751c7aead06880515a5d", 0xc}, {&(0x7f0000000800)="c8ea972e8fbc5218c56e7b9c7ef9c62f186d531c8a26c50e09e4267c68eedb106c2f9d33ca75", 0x26}], 0x3}, 0x200ce0c0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000fc007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.613475769s ago: executing program 2 (id=1028): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYRESOCT=0x0], &(0x7f0000003ff6)='GPL\x00', 0x6, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x48, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x8020) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x3}, 0x0, 0x8, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x1ad, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={0x0, &(0x7f0000000f40)=""/4089, 0x0, 0xff9, 0x1}, 0x28) socket$kcm(0xa, 0x922000000003, 0x11) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4080, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 2.58340575s ago: executing program 4 (id=1029): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r1, 0x0, 0x0, 0x0}, 0x30) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="d800000018007bf6e00212ba0d8105040a600000000f040b067c55a1bc0009003e0006990600000015000500fe", 0x2d}], 0x1, 0x0, 0x0, 0x2663}, 0x4000004) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x29}, 0x48) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = socket$kcm(0x10, 0x400000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x10e, 0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(r4, 0x10e, 0x2, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfe33) socketpair(0x25, 0x6, 0x3, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r5, &(0x7f00000002c0)={&(0x7f0000000080)=@nfc, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/36, 0x24}, {&(0x7f0000000140)=""/94, 0x5e}, {&(0x7f00000001c0)=""/96, 0x60}, {&(0x7f0000000340)=""/199, 0xc7}], 0x4, &(0x7f0000000280)=""/15, 0xf}, 0x3) 2.404719741s ago: executing program 4 (id=1030): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) close(r0) socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x2400c094) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x3406c096) (fail_nth: 8) 1.705675601s ago: executing program 2 (id=1031): perf_event_open(0x0, 0x0, 0x100000001, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x73) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000c00)={r0}, 0x4) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_bp={0x0}, 0x4800, 0x1, 0x9e4, 0x3, 0x10000000008, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x200000000000003, 0x300) socket$kcm(0x29, 0x5, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030033000b35d25a806c8c6f94f91424fc60100005000a000200053582c137153e37000c0680040006000a00", 0x33fe0}], 0x1}, 0x0) 1.704458061s ago: executing program 5 (id=1032): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETCARRIER(r0, 0x541b, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{0x0}, {&(0x7f0000000180)="83d2ff5f0000319fd2898a0cc6d6703b87eb29037b09bc7e64", 0x19}], 0x2, 0x0, 0x0, 0x1f00c00e}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114815, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x200, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_clone(0x2020200, 0x0, 0x0, &(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)="b9c0313ad970b26b51") r4 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0xfffffffffffffffb, 0x43a1bd76, 0x7, 0x9, 0x5, 0x2, 0x0, 0x0, 0x0, 0x2109}, r3, 0x7, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYRES64], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x74, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x14, 0x0, &(0x7f00000001c0), &(0x7f0000000300)='syzkaller\x00', 0x40, 0x6d, &(0x7f00000003c0)=""/109, 0x41000, 0x4, '\x00', 0x0, @lirc_mode2=0x10, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440)={0x5, 0xd, 0x5}, 0x10, 0x0, r5, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x8}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = socket$kcm(0x10, 0x3, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$kcm(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) recvmsg$kcm(r6, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x120) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r7, 0xffffffffffffffff}, &(0x7f0000000280), 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r8, &(0x7f00000001c0), 0x0}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r9) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8982, &(0x7f0000000080)) socket$kcm(0x21, 0x2, 0x2) r11 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="1b0000001a007f029e", 0x9}, {&(0x7f0000000200)="68cabf2dfb58fc0a01008888ffff0200258f", 0x12}], 0x2}, 0x4000000) close(r11) 1.462275795s ago: executing program 2 (id=1034): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x1, 0xa, 0x5, 0x7, 0xc1}, 0x50) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000a80), 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x1f, 0x10, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000005000000000000008000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018010000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000a600000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x11}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x12, 0x28, &(0x7f0000000e40)=ANY=[@ANYBLOB="1800000003000000000000000100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000404200000800000018110000", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x2, 0x58, &(0x7f0000000380)=""/88, 0x41100, 0x9a, '\x00', 0x0, @cgroup_sock_addr=0x8, r2, 0x8, &(0x7f0000000c00)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000c40)={0x5, 0xd, 0xe, 0x3}, 0x10, 0xffffffffffffffff, r0, 0x9, &(0x7f0000000c80)=[r1, r3, r1, r1, 0x1, r1, r1], &(0x7f0000000cc0)=[{0x1, 0x2, 0x9}, {0x5, 0x4, 0x10, 0xb}, {0x5, 0x4, 0x4, 0x1}, {0x0, 0x2, 0x6, 0x6}, {0x3, 0x1, 0x6, 0x6}, {0x4, 0x3, 0x6, 0xc}, {0x1, 0x5, 0x9, 0x1}, {0x5, 0x5, 0x8, 0x9}, {0x1, 0x1, 0x3, 0x5}], 0x10, 0xf0000000}, 0x94) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r1, &(0x7f0000000100), 0x0}, 0x20) r4 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={&(0x7f0000000100)=@hci={0x1f, 0x0, 0x4}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ac0)={0x6, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000051000000000000000800a0018010000756c6c25006c6aa7b109bf45c99b37ea000000002020207b1af8ff002b0000bfa100000000000007010000f8ffffffb702000008000000b70300000000080085000000c80000009500000000000000"], &(0x7f00000005c0)='GPL\x00', 0x7, 0x78, &(0x7f0000000b80)=""/120, 0x40f00, 0x8}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x40200, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x5}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0xfffffffffffffff9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xa0}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x17}}]}, 0x0, 0x9, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0xe, 0x0, &(0x7f00000001c0)="0101000871a7832e6b7303c3cd59", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r6 = socket$kcm(0x21, 0x2, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$sock(r7, &(0x7f0000000580)={&(0x7f0000000240)=@nl=@unspec, 0x80, &(0x7f0000000400)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}, 0x20008001) sendmsg$kcm(r6, 0x0, 0x106) recvmsg$kcm(r6, 0x0, 0x100) r8 = socket$kcm(0xa, 0x3, 0x3a) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0x2b, 0x1, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x7}, 0x8) recvmsg$kcm(r8, 0x0, 0x100) sendmsg$inet(r9, &(0x7f0000001700)={0x0, 0x0, 0x0}, 0x20000010) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000002"], 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r9, 0x890b, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMATTACH(r9, 0x890c, &(0x7f0000000100)={0xffffffffffffffff, r0}) 1.356449732s ago: executing program 4 (id=1035): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018"], 0x0, 0x34, 0x0, 0xa}, 0x28) r0 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000001540)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/5, 0x63}], 0x1, 0xfffffffffffffffe, 0x19}, 0x0) sendmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="ff", 0x25}], 0x1, &(0x7f00000015c0)=ANY=[], 0x11f0}, 0x10008014) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000300)=ANY=[@ANYBLOB="0500000000000000b1ff7af669114b00000000ee8410000002000000850000000500000095000000000000009500a50600000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) r1 = socket$kcm(0x15, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f0000000080)=@l2tp={0x2, 0x0, @empty}, 0x80, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB="0000000000000094e10800"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001700)={0x11, 0x8, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000000000000ee09e29e06000063b3df8269633e799e05f8e847859e6ab9274627ecc83693a30426b6f6e2d4fec986104180b45cb0197579523ebfdc65374fb8fbed4548fa36ca36e90859a34f53692e879ca877f688b9de701675e37f6b08b1a01a8f7c42e2d08b32818a907aeddba978a70b07341877ed8e5e791b22a311c2a5b24c6b3629f511413afe108ac47c6478c3c0a158916ead7e0dbedfad9574ad58b8ac8539cbb015d06f2f7f7f6488344c698c217faf77be1be3402c1806dd09804721734ffd9f321ca77883ab7aabf583", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r3}, 0xc) r4 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r4, &(0x7f0000000000)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x10000009, @remote, 0x9, 0x3}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)="f4000900062b2c05fe80000000000000dc8b850f693c66ccfe808100000000000000613a2eb0094401e0728f1dcb09b7", 0x30}], 0x1}, 0x20000884) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x3, 0xb, &(0x7f0000000200)=@framed={{0x18, 0x2, 0x0, 0x0, 0xeb6, 0x0, 0x0, 0x0, 0xfffdfffd}, [@printk={@lld, {}, {}, {}, {0x7, 0x0, 0xb, 0x2, 0x0, 0xd0}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x97}, {0x85, 0x0, 0x0, 0x70}}]}, &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) close(r5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000580)="d8000000140081044e81f782db44b9040a1d08020a000000040000a118000900fec0ffff00000e1208000f0100810401a80016ea1f0001", 0x37}], 0x1, 0x0, 0x0, 0x7400}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000580)="d8000000140081054e81f782db44b904021d080225000000040000a1180002", 0x1f}], 0x1, 0x0, 0x0, 0x7400}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000580)="d8000000140081054e81f782db44b9040a", 0x11}], 0x1, 0x0, 0x0, 0x7400}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[], 0xfe33) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) 1.21005405s ago: executing program 1 (id=1036): r0 = socket$kcm(0x22, 0x2, 0x21) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x80044943, 0x0) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b2200d80000008b00000015bb254a0000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) syz_open_procfs$namespace(0x0, &(0x7f0000000540)='ns/cgroup\x00') r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r2}, 0xc) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)={r0, r2}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0f000000040000"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r3}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpu.stat\x00', 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000440)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x5, '\x00', 0x0, r6, 0x2, 0x5, 0x1}, 0x50) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x3, '\x00', r5, r7, 0x4, 0x5, 0x1}, 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000c"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b708000000bc7a007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r9}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xf, &(0x7f0000001540)=ANY=[@ANYBLOB="180300004000000000000000000000f618110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b5020000000000008500000083000000bc0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) 1.042305729s ago: executing program 2 (id=1037): r0 = syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0xd682, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x8509, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) socket$kcm(0x21, 0x2, 0xa) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000c40), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=0xffffffffffffffff, 0x4) close(0x3) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001980)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3, 0xffffffffffffffff}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0x10, &(0x7f0000000740)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b704000008000000850000004900000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="7638300c000000000000e900feff", 0x0, 0x2f000000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 942.735475ms ago: executing program 1 (id=1038): r0 = syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0xd682, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x8509, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) socket$kcm(0x21, 0x2, 0xa) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000c40), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=0xffffffffffffffff, 0x4) close(0x3) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001980)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3, 0xffffffffffffffff}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000027000000f8ffffffbfa4000000", @ANYRES32=r4, @ANYBLOB="0000000000000000b704000008000000850000004900000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="7638300c000000000000e900feff", 0x0, 0x2f000000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 823.853732ms ago: executing program 4 (id=1039): r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) r1 = getpid() r2 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a394830f2539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323478a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526894aa7fe5e68949a3b304723177d356c4604bca492ecec37e83efceefd78a2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bd43b5b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebcef5af469abe753314fae31a09c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d34264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5a71e0d7696caba172745c7dd919ffb631820420b75b6522c0e21c882c66f4f25ffb6d95e07e068000000000000eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6f0100000000000000f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e09d24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868db06fd892d68a547477f8ef686ff0dba7b8c18c94d5a89b0567a851750a35d9cc2217db890d89385fcaa00f0f2e524672e6f4c8bedfd5da5b157709b8265cf511dc5846ab1d85916c4a6b2d1b408575982e11230cbac0a9c6eaa03c945645581f678403c2a936c53ae72940aa92bcf22b82c6bc028e0acdddf9fef595f0f7a9f80c0e4c659ced769ec463d26a81e468846761a8e1efd6a031ab7adc8665e267be0065cc315aa23012423ec8b8492d9b50fa4d8c5891959b761eec6dc988532782fda13239c948e27853606e26225c796b79cc04f3d1a5a13000000001e301d82a27010d3ac6119d2b12caf282413672d20c852c50084d7b2d50754775ed63bc18023c31351af76e24788d96103455693b34e09a163a9f613a7e5530222cebd7fa0fbff32dc98088f9fab33648cc38e87dd2dd6ee157f5f018702696915661715c979b7796d4f101a257688af7c148e8615c938c4ca8a69f6fc585ec1dd1857a501f90b161eff23181a11a2b0da4c58d459cbf9db"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r1, r2, 0x0, 0x1, &(0x7f0000000280)='\\{\x00'}, 0x12) syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/mnt\x00') r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r4, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000200)={0x0, 0x0}, 0x8) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0)=r5, 0x4) bpf$LINK_DETACH(0x22, &(0x7f0000000340)=r6, 0x4) r7 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r5, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r7, r4, 0x4, r4}, 0x10) 543.125098ms ago: executing program 5 (id=1040): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) close(r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe2, 0xe2, 0x2, [@volatile={0x8, 0x0, 0x0, 0x9, 0x1}, @datasec={0xa, 0x8, 0x0, 0xf, 0x3, [{0x4, 0x6, 0x7ff}, {0x2, 0x8001, 0x7fff}, {0x2, 0x3}, {0x2, 0x3, 0x1}, {0x3, 0x7fff, 0x9}, {0x5, 0xd, 0x200}, {0x1, 0x1, 0x4}, {0x1, 0x1000, 0x1}], "ba0094"}, @enum={0x5, 0x2, 0x0, 0x6, 0x4, [{0xe, 0x2d7f8c77}, {0x7, 0x9}]}, @volatile={0x6, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x2, 0x259ea84e}}, @datasec={0x8, 0x2, 0x0, 0xf, 0x3, [{0x3, 0x7ff, 0x7ff}, {0x4, 0x7, 0x40}], "53b2e7"}]}}, &(0x7f0000000100)=""/54, 0xfe, 0x36, 0x1, 0x401, 0x10000, @value=r0}, 0x28) socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x2400c094) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000040)=0xffffffffffff3654) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r8, 0x4004743d, 0x110e22fff6) close(r7) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x80ffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff58}, 0x48) 0s ago: executing program 4 (id=1041): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x6, 0xf, 0x8, 0x41}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001580)={{r0}, &(0x7f0000001500), &(0x7f0000001540)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe5}, 0x94) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x4044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x15, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1f, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@map_idx={0x18, 0x7, 0x5, 0x0, 0x10}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x72, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200), &(0x7f0000000240)=[{0x3, 0x5, 0xc}], 0x10, 0x10000}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0500000004473e01027f89a4f656000000040000000400000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x0, 0x0}, 0x8) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x11, &(0x7f0000001080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, [@call={0x85, 0x0, 0x0, 0x50}, @snprintf={{}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}, {}, {0x85, 0x0, 0x0, 0xa7}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r7}, 0xc) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000580)=r5, 0x4) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000280)=r5, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x13, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0x7d}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r8, 0x0, 0x27, 0x3b, &(0x7f0000000000)="9bae5ae684296ce452d4004de8806526581ff9f14c0dbef249760eaae0958f880f48390f088c90", &(0x7f0000000080)=""/59, 0x1, 0x0, 0xa0, 0xc2, &(0x7f00000000c0)="c5dac62d285609c8063941c6076d50a774138bbced2aa0c6240a2e480aaeb0af0b81e8874aa78ce0f2d2ce09c5724a05767257ea486a66a8a23d071f31a126587a2099f3f004e7fe6b6d4093c76d204d61481d7854732d90733bf342d3c6c7d4c8b436ea488f651fee85d86712ceee48f9e836b45fc7d6dd7aaad118f7bdcc7ee3515e40f7b8b259322bdeec18ccf48b2d19a8857b6402af67281135ca56220f", &(0x7f0000000180)="da5e854967fb47e76b7370a1cedfefd6e5c77fa43b8547a20ad3a365b343dd42507083adf939f0652d300c5c4ff569d84ecdc324fb795607591b282adb74d0ae1a3a496cb5b347b3c2dab98be4754f435e35cb8f6ab919d8a3fe7cd7d9ad69404c99846b24bb6fe466e95e851758c83a8bdb865b5ac8e6aff6f1b5759b020347df2f4f7d0ef9351636991b4370483009e30eaa9b518f2e7bf44a4dcc07094c08811181e679efad9639008dc4b63abe24d04f3b660f397d25dc6f31f05df74351f18b", 0x0, 0x0, 0x8}, 0x50) kernel console output (not intermixed with test programs): copy_from_user+0x2f/0xe0 [ 251.004905][ T8024] bpf_test_init+0xde/0x140 [ 251.009538][ T8024] bpf_prog_test_run_xdp+0x4d1/0x10e0 [ 251.015140][ T8024] ? dev_put+0x80/0x80 [ 251.019347][ T8024] ? dev_put+0x80/0x80 [ 251.023632][ T8024] bpf_prog_test_run+0x321/0x390 [ 251.029216][ T8024] __sys_bpf+0x49d/0x890 [ 251.033589][ T8024] ? bpf_link_show_fdinfo+0x390/0x390 [ 251.039452][ T8024] ? lock_chain_count+0x20/0x20 [ 251.044333][ T8024] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 251.050355][ T8024] __x64_sys_bpf+0x7c/0x90 [ 251.054808][ T8024] do_syscall_64+0x55/0xa0 [ 251.059391][ T8024] ? clear_bhb_loop+0x40/0x90 [ 251.064107][ T8024] ? clear_bhb_loop+0x40/0x90 [ 251.068907][ T8024] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 251.074831][ T8024] RIP: 0033:0x7f01ebb9bf79 [ 251.079313][ T8024] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 251.099473][ T8024] RSP: 002b:00007f01ec999028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 251.107918][ T8024] RAX: ffffffffffffffda RBX: 00007f01ebe15fa0 RCX: 00007f01ebb9bf79 [ 251.116397][ T8024] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 251.124563][ T8024] RBP: 00007f01ec999090 R08: 0000000000000000 R09: 0000000000000000 [ 251.132641][ T8024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 251.140798][ T8024] R13: 00007f01ebe16038 R14: 00007f01ebe15fa0 R15: 00007ffd4bbd04f8 [ 251.148888][ T8024] [ 252.717915][ T8059] netlink: 60 bytes leftover after parsing attributes in process `syz.5.338'. [ 253.528152][ T8068] netlink: 65051 bytes leftover after parsing attributes in process `syz.2.343'. [ 256.116084][ T1279] ieee802154 phy0 wpan0: encryption failed: -22 [ 256.122749][ T1279] ieee802154 phy1 wpan1: encryption failed: -22 [ 262.771584][ T8154] netlink: 60 bytes leftover after parsing attributes in process `syz.2.356'. [ 263.184117][ T8165] netlink: 'syz.5.359': attribute type 10 has an invalid length. [ 263.209667][ T8165] netlink: 55 bytes leftover after parsing attributes in process `syz.5.359'. [ 263.866504][ T8179] FAULT_INJECTION: forcing a failure. [ 263.866504][ T8179] name failslab, interval 1, probability 0, space 0, times 0 [ 263.907977][ T8179] CPU: 0 PID: 8179 Comm: syz.1.363 Not tainted syzkaller #0 [ 263.915455][ T8179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 263.925922][ T8179] Call Trace: [ 263.929207][ T8179] [ 263.932137][ T8179] dump_stack_lvl+0x18c/0x250 [ 263.936826][ T8179] ? show_regs_print_info+0x20/0x20 [ 263.942314][ T8179] ? load_image+0x400/0x400 [ 263.946836][ T8179] ? __might_sleep+0xe0/0xe0 [ 263.951452][ T8179] ? __lock_acquire+0x7d40/0x7d40 [ 263.956581][ T8179] should_fail_ex+0x39d/0x4d0 [ 263.961350][ T8179] should_failslab+0x9/0x20 [ 263.965871][ T8179] slab_pre_alloc_hook+0x59/0x310 [ 263.971047][ T8179] kmem_cache_alloc+0x5a/0x2d0 [ 263.975871][ T8179] ? ptlock_alloc+0x20/0x70 [ 263.980425][ T8179] ptlock_alloc+0x20/0x70 [ 263.984886][ T8179] pte_alloc_one+0xcc/0x530 [ 263.989464][ T8179] ? pfn_modify_allowed+0x560/0x560 [ 263.994810][ T8179] ? hugepage_vma_check+0x488/0x5a0 [ 264.000116][ T8179] handle_mm_fault+0x31b3/0x4c00 [ 264.005062][ T8179] ? handle_mm_fault+0xe7/0x4c00 [ 264.010120][ T8179] ? numa_migrate_prep+0x350/0x350 [ 264.015365][ T8179] ? lock_mm_and_find_vma+0x9c/0x2f0 [ 264.020775][ T8179] do_user_addr_fault+0x730/0x12c0 [ 264.026424][ T8179] exc_page_fault+0x64/0x100 [ 264.031058][ T8179] asm_exc_page_fault+0x26/0x30 [ 264.036046][ T8179] RIP: 0010:__get_user_4+0x11/0x20 [ 264.041617][ T8179] Code: 48 c1 fa 3f 48 09 d0 0f 01 cb 0f b7 10 31 c0 0f 01 ca c3 90 90 90 90 90 90 f3 0f 1e fa 48 89 c2 48 c1 fa 3f 48 09 d0 0f 01 cb <8b> 10 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 f3 0f 1e fa 48 89 c2 [ 264.061621][ T8179] RSP: 0018:ffffc900037b7ab8 EFLAGS: 00050206 [ 264.068165][ T8179] RAX: 000000110e22ffff RBX: 0000000000005421 RCX: 5eb9d95c98f81900 [ 264.076504][ T8179] RDX: 0000000000000000 RSI: ffffffff8acada80 RDI: ffffffff8b1c81e0 [ 264.084596][ T8179] RBP: ffffc900037b7ed8 R08: ffffffff8e8addaf R09: 1ffffffff1d15bb5 [ 264.092606][ T8179] R10: dffffc0000000000 R11: fffffbfff1d15bb6 R12: ffff888022336670 [ 264.100703][ T8179] R13: 0000000000005421 R14: fffff520006f6f5c R15: 0000000000000003 [ 264.108959][ T8179] do_vfs_ioctl+0x6e8/0x1cc0 [ 264.113843][ T8179] ? __ia32_compat_sys_ioctl+0x8a0/0x8a0 [ 264.119790][ T8179] ? tomoyo_path_number_perm+0x217/0x620 [ 264.125830][ T8179] ? __lock_acquire+0x7d40/0x7d40 [ 264.130998][ T8179] ? slab_free_freelist_hook+0x130/0x1a0 [ 264.137073][ T8179] ? tomoyo_path_number_perm+0x500/0x620 [ 264.143104][ T8179] ? __kmem_cache_free+0xba/0x1e0 [ 264.148265][ T8179] ? tomoyo_path_number_perm+0x5b4/0x620 [ 264.155350][ T8179] ? tomoyo_path_number_perm+0x217/0x620 [ 264.161045][ T8179] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 264.167012][ T8179] ? __fget_files+0x28/0x4b0 [ 264.171833][ T8179] ? __fget_files+0x28/0x4b0 [ 264.176458][ T8179] ? bpf_lsm_file_ioctl+0x9/0x10 [ 264.181510][ T8179] ? security_file_ioctl+0x80/0xa0 [ 264.186649][ T8179] __se_sys_ioctl+0x83/0x170 [ 264.191324][ T8179] do_syscall_64+0x55/0xa0 [ 264.195934][ T8179] ? clear_bhb_loop+0x40/0x90 [ 264.200902][ T8179] ? clear_bhb_loop+0x40/0x90 [ 264.205585][ T8179] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 264.211945][ T8179] RIP: 0033:0x7f6fb879bf79 [ 264.216754][ T8179] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 264.236565][ T8179] RSP: 002b:00007f6fb9715028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 264.245178][ T8179] RAX: ffffffffffffffda RBX: 00007f6fb8a15fa0 RCX: 00007f6fb879bf79 [ 264.253254][ T8179] RDX: 000000110e22ffff RSI: 0000000000005421 RDI: 0000000000000003 [ 264.261338][ T8179] RBP: 00007f6fb9715090 R08: 0000000000000000 R09: 0000000000000000 [ 264.269599][ T8179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 264.277761][ T8179] R13: 00007f6fb8a16038 R14: 00007f6fb8a15fa0 R15: 00007ffe5e8932c8 [ 264.286042][ T8179] [ 264.948654][ T8190] pimreg: tun_chr_ioctl cmd 1074025677 [ 264.964687][ T8190] pimreg: linktype set to 1 [ 264.977124][ T8194] netlink: 'syz.4.368': attribute type 33 has an invalid length. [ 264.985048][ T8194] netlink: 36 bytes leftover after parsing attributes in process `syz.4.368'. [ 265.687176][ T8213] netlink: 60 bytes leftover after parsing attributes in process `syz.1.369'. [ 267.493848][ T8231] syz.1.381 uses obsolete (PF_INET,SOCK_PACKET) [ 268.298295][ T8228] netlink: 'syz.1.381': attribute type 10 has an invalid length. [ 270.839340][ T8259] netlink: 'syz.4.380': attribute type 29 has an invalid length. [ 270.882431][ T8259] netlink: 'syz.4.380': attribute type 29 has an invalid length. [ 270.958308][ T8262] netlink: 60 bytes leftover after parsing attributes in process `syz.1.382'. [ 271.081758][ T8261] netlink: 'syz.4.380': attribute type 29 has an invalid length. [ 271.101307][ T8259] netlink: 'syz.4.380': attribute type 29 has an invalid length. [ 271.364493][ T8266] FAULT_INJECTION: forcing a failure. [ 271.364493][ T8266] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 271.481281][ T8266] CPU: 1 PID: 8266 Comm: syz.4.383 Not tainted syzkaller #0 [ 271.488987][ T8266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 271.499308][ T8266] Call Trace: [ 271.502631][ T8266] [ 271.505684][ T8266] dump_stack_lvl+0x18c/0x250 [ 271.510780][ T8266] ? show_regs_print_info+0x20/0x20 [ 271.516376][ T8266] ? load_image+0x400/0x400 [ 271.521015][ T8266] ? __lock_acquire+0x7d40/0x7d40 [ 271.526172][ T8266] ? mark_lock+0x94/0x320 [ 271.530766][ T8266] should_fail_ex+0x39d/0x4d0 [ 271.535502][ T8266] prepare_alloc_pages+0x1e2/0x5f0 [ 271.540932][ T8266] __alloc_pages+0x134/0x460 [ 271.545655][ T8266] ? zone_statistics+0x170/0x170 [ 271.550834][ T8266] ? do_wp_page+0x7ca/0x35f0 [ 271.555557][ T8266] ? do_wp_page+0xfc5/0x35f0 [ 271.560279][ T8266] __folio_alloc+0x10/0x20 [ 271.564816][ T8266] vma_alloc_folio+0x47a/0x8f0 [ 271.569607][ T8266] do_wp_page+0x1243/0x35f0 [ 271.574220][ T8266] ? folio_put+0xd0/0xd0 [ 271.578650][ T8266] ? do_raw_spin_lock+0x11f/0x2c0 [ 271.583695][ T8266] ? __rwlock_init+0x150/0x150 [ 271.588484][ T8266] handle_mm_fault+0x135d/0x4c00 [ 271.593437][ T8266] ? handle_mm_fault+0xe7/0x4c00 [ 271.598400][ T8266] ? numa_migrate_prep+0x350/0x350 [ 271.603542][ T8266] ? lock_mm_and_find_vma+0x9c/0x2f0 [ 271.608944][ T8266] do_user_addr_fault+0x730/0x12c0 [ 271.614092][ T8266] exc_page_fault+0x64/0x100 [ 271.618789][ T8266] asm_exc_page_fault+0x26/0x30 [ 271.623738][ T8266] RIP: 0010:rep_movs_alternative+0x4a/0x90 [ 271.629571][ T8266] Code: 75 f1 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 df 83 f9 08 73 e8 eb c9 a4 c3 48 8b 06 48 89 07 48 8d 47 08 48 83 e0 f8 48 29 f8 48 01 [ 271.649391][ T8266] RSP: 0018:ffffc900045ef718 EFLAGS: 00050206 [ 271.655575][ T8266] RAX: ffffffff8426f901 RBX: 1ffff920008bdfc7 RCX: 00000000000045d0 [ 271.663734][ T8266] RDX: 0000000000000000 RSI: ffff88805b24bce8 RDI: 000020000000c000 [ 271.671802][ T8266] RBP: ffffc900045ef878 R08: ffff88805b2502b7 R09: 1ffff1100b64a056 [ 271.679959][ T8266] R10: dffffc0000000000 R11: ffffed100b64a057 R12: ffff88805b2400e8 [ 271.688033][ T8266] R13: 00000000000101d0 R14: 00000000000101d0 R15: ffffc900045efe48 [ 271.696027][ T8266] ? _copy_to_iter+0x171/0x1120 [ 271.701080][ T8266] _copy_to_iter+0x24f/0x1120 [ 271.705780][ T8266] ? _raw_spin_unlock_irqrestore+0xc5/0x120 [ 271.711780][ T8266] ? iov_iter_init+0x1e0/0x1e0 [ 271.716731][ T8266] ? __virt_addr_valid+0x18c/0x540 [ 271.722036][ T8266] ? __virt_addr_valid+0x469/0x540 [ 271.727352][ T8266] ? __phys_addr_symbol+0x2f/0x70 [ 271.732488][ T8266] ? __check_object_size+0x506/0xa20 [ 271.738060][ T8266] __skb_datagram_iter+0xdb/0x780 [ 271.743374][ T8266] ? tsk_importance+0x150/0x150 [ 271.748286][ T8266] ? skb_copy_datagram_iter+0x200/0x200 [ 271.754116][ T8266] skb_copy_datagram_iter+0xb1/0x200 [ 271.759427][ T8266] tipc_recvstream+0x72b/0xe70 [ 271.764410][ T8266] ? tipc_sendstream+0x70/0x70 [ 271.769187][ T8266] ____sys_recvmsg+0x2ce/0x5e0 [ 271.774058][ T8266] ? __sys_recvmsg_sock+0x50/0x50 [ 271.779119][ T8266] ? import_iovec+0x73/0xa0 [ 271.783744][ T8266] ___sys_recvmsg+0x216/0x590 [ 271.788449][ T8266] ? __sys_recvmsg+0x2a0/0x2a0 [ 271.793228][ T8266] ? ksys_write+0x1c4/0x260 [ 271.797758][ T8266] ? __fget_files+0x43d/0x4b0 [ 271.802722][ T8266] __x64_sys_recvmsg+0x20c/0x2e0 [ 271.808110][ T8266] ? ___sys_recvmsg+0x590/0x590 [ 271.812993][ T8266] ? lockdep_hardirqs_on+0x98/0x150 [ 271.818313][ T8266] do_syscall_64+0x55/0xa0 [ 271.822948][ T8266] ? clear_bhb_loop+0x40/0x90 [ 271.828004][ T8266] ? clear_bhb_loop+0x40/0x90 [ 271.832787][ T8266] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 271.838692][ T8266] RIP: 0033:0x7f01ebb9bf79 [ 271.843294][ T8266] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 271.863780][ T8266] RSP: 002b:00007f01ec999028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 271.872204][ T8266] RAX: ffffffffffffffda RBX: 00007f01ebe15fa0 RCX: 00007f01ebb9bf79 [ 271.880188][ T8266] RDX: 0000000000001f00 RSI: 0000200000000500 RDI: 0000000000000003 [ 271.888172][ T8266] RBP: 00007f01ec999090 R08: 0000000000000000 R09: 0000000000000000 [ 271.896156][ T8266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 271.904219][ T8266] R13: 00007f01ebe16038 R14: 00007f01ebe15fa0 R15: 00007ffd4bbd04f8 [ 271.912216][ T8266] [ 272.001191][ T8271] netlink: 209716 bytes leftover after parsing attributes in process `syz.5.384'. [ 272.650493][ T8283] netlink: 60 bytes leftover after parsing attributes in process `syz.1.394'. [ 274.909838][ T8318] netlink: 566 bytes leftover after parsing attributes in process `syz.5.397'. [ 275.090799][ T8328] netlink: 'syz.1.396': attribute type 29 has an invalid length. [ 275.136232][ T8328] netlink: 'syz.1.396': attribute type 29 has an invalid length. [ 275.562719][ T8334] netlink: 'syz.2.398': attribute type 10 has an invalid length. [ 276.400832][ T8337] netlink: 209716 bytes leftover after parsing attributes in process `syz.1.399'. [ 276.454711][ T8339] FAULT_INJECTION: forcing a failure. [ 276.454711][ T8339] name failslab, interval 1, probability 0, space 0, times 0 [ 276.496441][ T8339] CPU: 0 PID: 8339 Comm: syz.5.407 Not tainted syzkaller #0 [ 276.503890][ T8339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 276.514493][ T8339] Call Trace: [ 276.517882][ T8339] [ 276.520832][ T8339] dump_stack_lvl+0x18c/0x250 [ 276.525708][ T8339] ? show_regs_print_info+0x20/0x20 [ 276.531259][ T8339] ? load_image+0x400/0x400 [ 276.535783][ T8339] ? __might_sleep+0xe0/0xe0 [ 276.540392][ T8339] ? __lock_acquire+0x7d40/0x7d40 [ 276.545524][ T8339] should_fail_ex+0x39d/0x4d0 [ 276.550277][ T8339] should_failslab+0x9/0x20 [ 276.554898][ T8339] slab_pre_alloc_hook+0x59/0x310 [ 276.560038][ T8339] ? apparmor_sk_alloc_security+0x77/0x100 [ 276.565951][ T8339] __kmem_cache_alloc_node+0x53/0x250 [ 276.571354][ T8339] ? apparmor_sk_alloc_security+0x77/0x100 [ 276.577228][ T8339] kmalloc_trace+0x2a/0xe0 [ 276.581669][ T8339] apparmor_sk_alloc_security+0x77/0x100 [ 276.587402][ T8339] security_sk_alloc+0x6e/0xa0 [ 276.592358][ T8339] sk_prot_alloc+0x101/0x210 [ 276.597052][ T8339] ? sk_alloc+0x24/0x360 [ 276.601313][ T8339] sk_alloc+0x3a/0x360 [ 276.605701][ T8339] ? bpf_ctx_init+0x163/0x1a0 [ 276.610448][ T8339] ? bpf_prog_test_run_skb+0x273/0x12b0 [ 276.616020][ T8339] bpf_prog_test_run_skb+0x3a5/0x12b0 [ 276.621404][ T8339] ? __fget_files+0x28/0x4b0 [ 276.626022][ T8339] ? __fget_files+0x28/0x4b0 [ 276.630628][ T8339] ? __fget_files+0x43d/0x4b0 [ 276.635524][ T8339] ? cpu_online+0x60/0x60 [ 276.639895][ T8339] bpf_prog_test_run+0x321/0x390 [ 276.644872][ T8339] __sys_bpf+0x49d/0x890 [ 276.649344][ T8339] ? bpf_link_show_fdinfo+0x390/0x390 [ 276.654774][ T8339] ? lock_chain_count+0x20/0x20 [ 276.659650][ T8339] __x64_sys_bpf+0x7c/0x90 [ 276.664087][ T8339] do_syscall_64+0x55/0xa0 [ 276.668524][ T8339] ? clear_bhb_loop+0x40/0x90 [ 276.673214][ T8339] ? clear_bhb_loop+0x40/0x90 [ 276.677996][ T8339] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 276.684025][ T8339] RIP: 0033:0x7f914499bf79 [ 276.688506][ T8339] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 276.708672][ T8339] RSP: 002b:00007f91458f9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 276.717664][ T8339] RAX: ffffffffffffffda RBX: 00007f9144c15fa0 RCX: 00007f914499bf79 [ 276.725822][ T8339] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 276.734073][ T8339] RBP: 00007f91458f9090 R08: 0000000000000000 R09: 0000000000000000 [ 276.742071][ T8339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 276.750418][ T8339] R13: 00007f9144c16038 R14: 00007f9144c15fa0 R15: 00007fff6ca96498 [ 276.758721][ T8339] [ 277.667394][ T8346] netlink: 60 bytes leftover after parsing attributes in process `syz.5.400'. [ 277.767006][ T8337] debugfs: Directory '!!ô' with parent 'ieee80211' already present! [ 279.870719][ T8366] netlink: 'syz.5.405': attribute type 10 has an invalid length. [ 279.879720][ T8366] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.887079][ T8366] FAULT_INJECTION: forcing a failure. [ 279.887079][ T8366] name failslab, interval 1, probability 0, space 0, times 0 [ 279.900430][ T8366] CPU: 0 PID: 8366 Comm: syz.5.405 Not tainted syzkaller #0 [ 279.907837][ T8366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 279.918103][ T8366] Call Trace: [ 279.921589][ T8366] [ 279.924547][ T8366] dump_stack_lvl+0x18c/0x250 [ 279.929506][ T8366] ? show_regs_print_info+0x20/0x20 [ 279.934727][ T8366] ? load_image+0x400/0x400 [ 279.939441][ T8366] ? br_get_link_af_size_filtered+0x92/0xc30 [ 279.945601][ T8366] ? __lock_acquire+0x7d40/0x7d40 [ 279.950673][ T8366] should_fail_ex+0x39d/0x4d0 [ 279.955416][ T8366] should_failslab+0x9/0x20 [ 279.959963][ T8366] slab_pre_alloc_hook+0x59/0x310 [ 279.965195][ T8366] kmem_cache_alloc_node+0x60/0x320 [ 279.970535][ T8366] ? __alloc_skb+0x103/0x2c0 [ 279.975440][ T8366] __alloc_skb+0x103/0x2c0 [ 279.979899][ T8366] br_info_notify+0x105/0x240 [ 279.984691][ T8366] br_stp_disable_port+0xbf/0x1c0 [ 279.989741][ T8366] br_stp_disable_bridge+0x81/0x150 [ 279.995318][ T8366] br_dev_stop+0x2d/0x180 [ 279.999930][ T8366] ? br_dev_open+0x140/0x140 [ 280.004542][ T8366] __dev_close_many+0x1d5/0x2b0 [ 280.009669][ T8366] ? dev_close_many+0x410/0x410 [ 280.014539][ T8366] __dev_change_flags+0x2dc/0x6a0 [ 280.019680][ T8366] ? vprintk_emit+0x53d/0x610 [ 280.024466][ T8366] ? dev_get_flags+0x1c0/0x1c0 [ 280.029339][ T8366] ? printk_sprint+0x460/0x460 [ 280.034118][ T8366] ? _raw_spin_unlock_irqrestore+0xc5/0x120 [ 280.040210][ T8366] ? _raw_spin_unlock+0x40/0x40 [ 280.045211][ T8366] dev_change_flags+0x88/0x1a0 [ 280.050524][ T8366] do_setlink+0xc58/0x4130 [ 280.054950][ T8366] ? arch_stack_walk+0x160/0x190 [ 280.060008][ T8366] ? load_image+0x400/0x400 [ 280.064705][ T8366] ? nlmsg_parse_deprecated_strict+0x110/0x110 [ 280.070873][ T8366] ? stack_trace_save+0xaa/0x100 [ 280.075830][ T8366] ? __nla_validate_parse+0x2522/0x2ea0 [ 280.081517][ T8366] ? __nla_validate+0x50/0x50 [ 280.086254][ T8366] ? validate_linkmsg+0x719/0x910 [ 280.091389][ T8366] rtnl_newlink+0x17da/0x20a0 [ 280.096094][ T8366] ? rtnl_newlink+0x501/0x20a0 [ 280.100892][ T8366] ? rtnl_setlink+0x4e0/0x4e0 [ 280.105671][ T8366] ? trace_raw_output_contention_end+0xd0/0xd0 [ 280.111872][ T8366] ? rcu_is_watching+0x15/0xb0 [ 280.116850][ T8366] ? trace_contention_end+0x39/0xe0 [ 280.122460][ T8366] ? __mutex_lock+0x315/0xcc0 [ 280.127180][ T8366] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 280.132400][ T8366] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 280.137541][ T8366] ? rtnl_setlink+0x4e0/0x4e0 [ 280.142274][ T8366] rtnetlink_rcv_msg+0x869/0xfa0 [ 280.147350][ T8366] ? lockdep_hardirqs_on+0x98/0x150 [ 280.152654][ T8366] ? rtnetlink_bind+0x80/0x80 [ 280.157544][ T8366] ? perf_trace_preemptirq_template+0xac/0x330 [ 280.164087][ T8366] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 280.170278][ T8366] ? lock_chain_count+0x20/0x20 [ 280.175266][ T8366] ? __local_bh_enable_ip+0x13a/0x1c0 [ 280.180679][ T8366] ? lockdep_hardirqs_on+0x98/0x150 [ 280.185910][ T8366] ? __local_bh_enable_ip+0x13a/0x1c0 [ 280.191384][ T8366] ? _local_bh_enable+0xa0/0xa0 [ 280.196352][ T8366] ? __dev_queue_xmit+0x26b/0x36b0 [ 280.201673][ T8366] ? __dev_queue_xmit+0x26b/0x36b0 [ 280.207247][ T8366] ? __dev_queue_xmit+0x124f/0x36b0 [ 280.212548][ T8366] ? __dev_queue_xmit+0x26b/0x36b0 [ 280.217792][ T8366] ? ref_tracker_free+0x690/0x840 [ 280.222842][ T8366] netlink_rcv_skb+0x241/0x4d0 [ 280.227627][ T8366] ? rtnetlink_bind+0x80/0x80 [ 280.232494][ T8366] ? netlink_ack+0x1180/0x1180 [ 280.237287][ T8366] ? __lock_acquire+0x7d40/0x7d40 [ 280.242426][ T8366] ? netlink_deliver_tap+0x2e/0x1b0 [ 280.247731][ T8366] netlink_unicast+0x751/0x8d0 [ 280.252692][ T8366] netlink_sendmsg+0x8d0/0xbf0 [ 280.257665][ T8366] ? netlink_getsockopt+0x590/0x590 [ 280.262970][ T8366] ? aa_sock_msg_perm+0x94/0x150 [ 280.267929][ T8366] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 280.273511][ T8366] ? security_socket_sendmsg+0x80/0xa0 [ 280.279246][ T8366] ? netlink_getsockopt+0x590/0x590 [ 280.284546][ T8366] ____sys_sendmsg+0x5ba/0x960 [ 280.289541][ T8366] ? __asan_memset+0x22/0x40 [ 280.294157][ T8366] ? __sys_sendmsg_sock+0x30/0x30 [ 280.299200][ T8366] ? __import_iovec+0x5f2/0x850 [ 280.304081][ T8366] ? import_iovec+0x73/0xa0 [ 280.308708][ T8366] ___sys_sendmsg+0x2a6/0x360 [ 280.313718][ T8366] ? get_pid_task+0x20/0x1e0 [ 280.318326][ T8366] ? __sys_sendmsg+0x2a0/0x2a0 [ 280.323147][ T8366] ? __lock_acquire+0x7d40/0x7d40 [ 280.328308][ T8366] __se_sys_sendmsg+0x1c2/0x2b0 [ 280.333184][ T8366] ? __x64_sys_sendmsg+0x80/0x80 [ 280.338158][ T8366] ? lockdep_hardirqs_on+0x98/0x150 [ 280.343379][ T8366] do_syscall_64+0x55/0xa0 [ 280.347809][ T8366] ? clear_bhb_loop+0x40/0x90 [ 280.352493][ T8366] ? clear_bhb_loop+0x40/0x90 [ 280.357272][ T8366] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 280.363272][ T8366] RIP: 0033:0x7f914499bf79 [ 280.367710][ T8366] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 280.387986][ T8366] RSP: 002b:00007f91458f9028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 280.396445][ T8366] RAX: ffffffffffffffda RBX: 00007f9144c15fa0 RCX: 00007f914499bf79 [ 280.404713][ T8366] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000009 [ 280.412966][ T8366] RBP: 00007f91458f9090 R08: 0000000000000000 R09: 0000000000000000 [ 280.420951][ T8366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 280.429376][ T8366] R13: 00007f9144c16038 R14: 00007f9144c15fa0 R15: 00007fff6ca96498 [ 280.437553][ T8366] [ 280.442170][ T8366] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.486912][ T8366] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.494196][ T8366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.501946][ T8366] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.509341][ T8366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.525285][ T8366] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 280.908688][ T8379] netlink: 209716 bytes leftover after parsing attributes in process `syz.2.411'. [ 281.089782][ T8379] debugfs: Directory '!!ô' with parent 'ieee80211' already present! [ 281.609950][ T8379] syz.2.411 (8379) used greatest stack depth: 19816 bytes left [ 284.896295][ T8399] FAULT_INJECTION: forcing a failure. [ 284.896295][ T8399] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 284.909695][ T8399] CPU: 0 PID: 8399 Comm: syz.4.418 Not tainted syzkaller #0 [ 284.917028][ T8399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 284.927420][ T8399] Call Trace: [ 284.930818][ T8399] [ 284.933862][ T8399] dump_stack_lvl+0x18c/0x250 [ 284.938698][ T8399] ? show_regs_print_info+0x20/0x20 [ 284.944136][ T8399] ? load_image+0x400/0x400 [ 284.948663][ T8399] ? __might_fault+0xaa/0x120 [ 284.953388][ T8399] ? __lock_acquire+0x7d40/0x7d40 [ 284.958464][ T8399] should_fail_ex+0x39d/0x4d0 [ 284.963197][ T8399] _copy_to_user+0x2f/0xa0 [ 284.967660][ T8399] bpf_verifier_vlog+0x2fa/0x870 [ 284.972746][ T8399] btf_verifier_log+0x11e/0x1a0 [ 284.977817][ T8399] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 284.984183][ T8399] ? btf_parse_graph_root+0xa90/0xa90 [ 284.989584][ T8399] ? mark_lock+0x94/0x320 [ 284.994294][ T8399] __btf_verifier_log_type+0x455/0x690 [ 284.999867][ T8399] ? sort_r+0x17d0/0x17f0 [ 285.004306][ T8399] ? btf_int_show+0x2890/0x2890 [ 285.009277][ T8399] btf_datasec_check_meta+0x46e/0xb50 [ 285.014856][ T8399] btf_check_all_metas+0x373/0xb00 [ 285.020076][ T8399] ? sort_r+0x17f0/0x17f0 [ 285.024536][ T8399] btf_parse_type_sec+0xf9/0x1930 [ 285.029756][ T8399] ? btf_check_sec_info+0x29f/0x350 [ 285.034980][ T8399] ? btf_verifier_log+0x1a0/0x1a0 [ 285.040312][ T8399] ? btf_parse_str_sec+0x20d/0x2a0 [ 285.045789][ T8399] btf_new_fd+0x440/0x9f0 [ 285.050141][ T8399] ? bpf_btf_show_fdinfo+0x80/0x80 [ 285.055442][ T8399] ? capable+0x88/0xe0 [ 285.059538][ T8399] __sys_bpf+0x670/0x890 [ 285.063801][ T8399] ? bpf_link_show_fdinfo+0x390/0x390 [ 285.069289][ T8399] ? lock_chain_count+0x20/0x20 [ 285.074174][ T8399] __x64_sys_bpf+0x7c/0x90 [ 285.078610][ T8399] do_syscall_64+0x55/0xa0 [ 285.083049][ T8399] ? clear_bhb_loop+0x40/0x90 [ 285.087781][ T8399] ? clear_bhb_loop+0x40/0x90 [ 285.092471][ T8399] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 285.098468][ T8399] RIP: 0033:0x7f01ebb9bf79 [ 285.103007][ T8399] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 285.123199][ T8399] RSP: 002b:00007f01ec999028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 285.132235][ T8399] RAX: ffffffffffffffda RBX: 00007f01ebe15fa0 RCX: 00007f01ebb9bf79 [ 285.140422][ T8399] RDX: 0000000000000028 RSI: 0000200000000000 RDI: 0000000000000012 [ 285.148501][ T8399] RBP: 00007f01ec999090 R08: 0000000000000000 R09: 0000000000000000 [ 285.156748][ T8399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 285.164815][ T8399] R13: 00007f01ebe16038 R14: 00007f01ebe15fa0 R15: 00007ffd4bbd04f8 [ 285.172826][ T8399] [ 286.047772][ T8421] netlink: 'syz.1.422': attribute type 10 has an invalid length. [ 286.064857][ T8421] netlink: 40 bytes leftover after parsing attributes in process `syz.1.422'. [ 286.078766][ T8421] bridge0: port 3(ipvlan1) entered blocking state [ 286.085695][ T8421] bridge0: port 3(ipvlan1) entered disabled state [ 286.092454][ T8421] ipvlan1: entered allmulticast mode [ 286.098426][ T8421] veth0_vlan: entered allmulticast mode [ 286.112593][ T8421] ipvlan1: left allmulticast mode [ 286.118021][ T8421] veth0_vlan: left allmulticast mode [ 286.124198][ T8421] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 286.818940][ T8434] netlink: 'syz.1.429': attribute type 33 has an invalid length. [ 286.887292][ T8434] netlink: 152 bytes leftover after parsing attributes in process `syz.1.429'. [ 289.677899][ T8447] FAULT_INJECTION: forcing a failure. [ 289.677899][ T8447] name failslab, interval 1, probability 0, space 0, times 0 [ 289.714101][ T8447] CPU: 1 PID: 8447 Comm: syz.4.433 Not tainted syzkaller #0 [ 289.721650][ T8447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 289.731748][ T8447] Call Trace: [ 289.735049][ T8447] [ 289.738088][ T8447] dump_stack_lvl+0x18c/0x250 [ 289.742796][ T8447] ? show_regs_print_info+0x20/0x20 [ 289.748010][ T8447] ? load_image+0x400/0x400 [ 289.752532][ T8447] ? __might_sleep+0xe0/0xe0 [ 289.757138][ T8447] ? __lock_acquire+0x7d40/0x7d40 [ 289.762176][ T8447] ? prepend_path+0x4b/0x960 [ 289.766779][ T8447] should_fail_ex+0x39d/0x4d0 [ 289.771574][ T8447] should_failslab+0x9/0x20 [ 289.776091][ T8447] slab_pre_alloc_hook+0x59/0x310 [ 289.781131][ T8447] ? __asan_memcpy+0x40/0x70 [ 289.785744][ T8447] ? tomoyo_encode+0x28b/0x540 [ 289.790524][ T8447] ? tomoyo_encode+0x28b/0x540 [ 289.795495][ T8447] __kmem_cache_alloc_node+0x53/0x250 [ 289.801063][ T8447] ? prepend_path+0x4b/0x960 [ 289.805850][ T8447] ? tomoyo_encode+0x28b/0x540 [ 289.810632][ T8447] __kmalloc+0xa4/0x230 [ 289.814983][ T8447] tomoyo_encode+0x28b/0x540 [ 289.819608][ T8447] tomoyo_realpath_from_path+0x592/0x5d0 [ 289.825486][ T8447] tomoyo_path_number_perm+0x248/0x620 [ 289.831181][ T8447] ? tomoyo_path_number_perm+0x217/0x620 [ 289.836842][ T8447] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 289.842330][ T8447] ? ksys_write+0x1c4/0x260 [ 289.846876][ T8447] ? __fget_files+0x28/0x4b0 [ 289.851476][ T8447] ? __fget_files+0x28/0x4b0 [ 289.856701][ T8447] security_file_ioctl+0x70/0xa0 [ 289.861833][ T8447] __se_sys_ioctl+0x48/0x170 [ 289.866439][ T8447] do_syscall_64+0x55/0xa0 [ 289.870875][ T8447] ? clear_bhb_loop+0x40/0x90 [ 289.875563][ T8447] ? clear_bhb_loop+0x40/0x90 [ 289.880253][ T8447] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 289.886164][ T8447] RIP: 0033:0x7f01ebb9bf79 [ 289.890603][ T8447] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 289.910748][ T8447] RSP: 002b:00007f01ec999028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 289.919436][ T8447] RAX: ffffffffffffffda RBX: 00007f01ebe15fa0 RCX: 00007f01ebb9bf79 [ 289.927417][ T8447] RDX: 00002000000000c0 RSI: 00000000400454ca RDI: 0000000000000004 [ 289.935410][ T8447] RBP: 00007f01ec999090 R08: 0000000000000000 R09: 0000000000000000 [ 289.943651][ T8447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 289.951722][ T8447] R13: 00007f01ebe16038 R14: 00007f01ebe15fa0 R15: 00007ffd4bbd04f8 [ 289.959719][ T8447] [ 290.003712][ T8447] ERROR: Out of memory at tomoyo_realpath_from_path. [ 291.081096][ T8477] netlink: 'syz.2.444': attribute type 10 has an invalid length. [ 291.145733][ T8477] netlink: 40 bytes leftover after parsing attributes in process `syz.2.444'. [ 292.097722][ T8502] netlink: 'syz.5.449': attribute type 10 has an invalid length. [ 292.437969][ T8508] netlink: 60 bytes leftover after parsing attributes in process `syz.4.451'. [ 292.552413][ T8502] bond0: (slave netdevsim0): Enslaving as an active interface with an up link [ 292.648716][ T8510] netlink: 'syz.2.453': attribute type 10 has an invalid length. [ 292.662935][ T8510] bridge0: port 3(bond0) entered disabled state [ 292.670167][ T8510] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.678248][ T8510] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.730417][ T8510] bridge0: port 3(bond0) entered blocking state [ 292.737111][ T8510] bridge0: port 3(bond0) entered forwarding state [ 292.744115][ T8510] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.751620][ T8510] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.760045][ T8510] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.767417][ T8510] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.813050][ T8510] bridge0: port 3(bond0) entered disabled state [ 292.819678][ T8510] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.827077][ T8510] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.106800][ T8515] netlink: 'syz.5.454': attribute type 19 has an invalid length. [ 293.114802][ T8515] netlink: 40 bytes leftover after parsing attributes in process `syz.5.454'. [ 294.808568][ T8549] netlink: 'syz.4.462': attribute type 27 has an invalid length. [ 294.843448][ T8549] netlink: 164 bytes leftover after parsing attributes in process `syz.4.462'. [ 294.960549][ T8548] netlink: 'syz.4.462': attribute type 33 has an invalid length. [ 294.985795][ T8548] netlink: 36 bytes leftover after parsing attributes in process `syz.4.462'. [ 295.049852][ T8553] netlink: 203516 bytes leftover after parsing attributes in process `syz.1.464'. [ 295.094158][ T8553] netlink: 6332 bytes leftover after parsing attributes in process `syz.1.464'. [ 295.606346][ T8562] netlink: 'syz.1.467': attribute type 19 has an invalid length. [ 295.634922][ T8562] netlink: 40 bytes leftover after parsing attributes in process `syz.1.467'. [ 295.871136][ T8570] netlink: 60 bytes leftover after parsing attributes in process `syz.2.465'. [ 296.745895][ T8577] netlink: 60 bytes leftover after parsing attributes in process `syz.5.470'. [ 296.782259][ T8577] netlink: 60 bytes leftover after parsing attributes in process `syz.5.470'. [ 299.217884][ T8615] netlink: 'syz.1.477': attribute type 19 has an invalid length. [ 299.252973][ T8615] netlink: 40 bytes leftover after parsing attributes in process `syz.1.477'. [ 299.931047][ T8611] delete_channel: no stack [ 300.952682][ T8648] netlink: 60 bytes leftover after parsing attributes in process `syz.5.483'. [ 303.059690][ T8659] netlink: 'syz.5.486': attribute type 29 has an invalid length. [ 303.317222][ T8659] netlink: 'syz.5.486': attribute type 3 has an invalid length. [ 303.522505][ T8659] netlink: 132 bytes leftover after parsing attributes in process `syz.5.486'. [ 303.610573][ T8667] netlink: 'syz.2.487': attribute type 19 has an invalid length. [ 303.643136][ T8667] netlink: 40 bytes leftover after parsing attributes in process `syz.2.487'. [ 305.339131][ T8680] netlink: 'syz.4.491': attribute type 3 has an invalid length. [ 305.425662][ T8680] netlink: 130984 bytes leftover after parsing attributes in process `syz.4.491'. [ 306.404550][ T8692] netlink: 60 bytes leftover after parsing attributes in process `syz.4.494'. [ 306.997703][ T8706] FAULT_INJECTION: forcing a failure. [ 306.997703][ T8706] name failslab, interval 1, probability 0, space 0, times 0 [ 307.026739][ T8706] CPU: 0 PID: 8706 Comm: syz.4.499 Not tainted syzkaller #0 [ 307.034338][ T8706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 307.044698][ T8706] Call Trace: [ 307.048285][ T8706] [ 307.051354][ T8706] dump_stack_lvl+0x18c/0x250 [ 307.056268][ T8706] ? show_regs_print_info+0x20/0x20 [ 307.061529][ T8706] ? load_image+0x400/0x400 [ 307.066116][ T8706] ? __might_sleep+0xe0/0xe0 [ 307.070760][ T8706] ? __lock_acquire+0x7d40/0x7d40 [ 307.075926][ T8706] should_fail_ex+0x39d/0x4d0 [ 307.080658][ T8706] should_failslab+0x9/0x20 [ 307.085217][ T8706] slab_pre_alloc_hook+0x59/0x310 [ 307.090473][ T8706] ? apparmor_sk_alloc_security+0x77/0x100 [ 307.096429][ T8706] __kmem_cache_alloc_node+0x53/0x250 [ 307.101846][ T8706] ? apparmor_sk_alloc_security+0x77/0x100 [ 307.107882][ T8706] kmalloc_trace+0x2a/0xe0 [ 307.112349][ T8706] apparmor_sk_alloc_security+0x77/0x100 [ 307.118236][ T8706] security_sk_alloc+0x6e/0xa0 [ 307.123503][ T8706] sk_prot_alloc+0x101/0x210 [ 307.128238][ T8706] ? sk_alloc+0x24/0x360 [ 307.132793][ T8706] sk_alloc+0x3a/0x360 [ 307.137434][ T8706] ? bpf_ctx_init+0x163/0x1a0 [ 307.142321][ T8706] ? bpf_prog_test_run_skb+0x273/0x12b0 [ 307.147945][ T8706] bpf_prog_test_run_skb+0x3a5/0x12b0 [ 307.153484][ T8706] ? __fget_files+0x28/0x4b0 [ 307.158213][ T8706] ? __fget_files+0x28/0x4b0 [ 307.162950][ T8706] ? __fget_files+0x43d/0x4b0 [ 307.167882][ T8706] ? cpu_online+0x60/0x60 [ 307.172335][ T8706] bpf_prog_test_run+0x321/0x390 [ 307.177411][ T8706] __sys_bpf+0x49d/0x890 [ 307.181694][ T8706] ? bpf_link_show_fdinfo+0x390/0x390 [ 307.187217][ T8706] ? lock_chain_count+0x20/0x20 [ 307.192169][ T8706] __x64_sys_bpf+0x7c/0x90 [ 307.196986][ T8706] do_syscall_64+0x55/0xa0 [ 307.201521][ T8706] ? clear_bhb_loop+0x40/0x90 [ 307.206401][ T8706] ? clear_bhb_loop+0x40/0x90 [ 307.211151][ T8706] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 307.217079][ T8706] RIP: 0033:0x7f01ebb9bf79 [ 307.221534][ T8706] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 307.241606][ T8706] RSP: 002b:00007f01ec999028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 307.250405][ T8706] RAX: ffffffffffffffda RBX: 00007f01ebe15fa0 RCX: 00007f01ebb9bf79 [ 307.259188][ T8706] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 307.267276][ T8706] RBP: 00007f01ec999090 R08: 0000000000000000 R09: 0000000000000000 [ 307.275618][ T8706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 307.283614][ T8706] R13: 00007f01ebe16038 R14: 00007f01ebe15fa0 R15: 00007ffd4bbd04f8 [ 307.292337][ T8706] [ 307.444015][ T8715] netlink: 'syz.2.498': attribute type 19 has an invalid length. [ 307.506999][ T8715] netlink: 40 bytes leftover after parsing attributes in process `syz.2.498'. [ 309.503338][ T8756] netlink: 'syz.2.510': attribute type 19 has an invalid length. [ 309.529240][ T8756] netlink: 40 bytes leftover after parsing attributes in process `syz.2.510'. [ 310.974301][ T8782] netlink: 'syz.1.515': attribute type 33 has an invalid length. [ 310.983647][ T8782] netlink: 153952 bytes leftover after parsing attributes in process `syz.1.515'. [ 311.314007][ T8794] netlink: 'syz.5.520': attribute type 19 has an invalid length. [ 311.343485][ T8794] netlink: 40 bytes leftover after parsing attributes in process `syz.5.520'. [ 311.396554][ T8801] FAULT_INJECTION: forcing a failure. [ 311.396554][ T8801] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 311.457874][ T8801] CPU: 0 PID: 8801 Comm: syz.2.522 Not tainted syzkaller #0 [ 311.465397][ T8801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 311.475666][ T8801] Call Trace: [ 311.478979][ T8801] [ 311.481949][ T8801] dump_stack_lvl+0x18c/0x250 [ 311.486675][ T8801] ? show_regs_print_info+0x20/0x20 [ 311.491910][ T8801] ? load_image+0x400/0x400 [ 311.496626][ T8801] ? __might_fault+0xaa/0x120 [ 311.501345][ T8801] ? __lock_acquire+0x7d40/0x7d40 [ 311.506500][ T8801] should_fail_ex+0x39d/0x4d0 [ 311.511227][ T8801] _copy_from_user+0x2f/0xe0 [ 311.515955][ T8801] csum_and_copy_from_iter+0x1f3/0x14a0 [ 311.521552][ T8801] ? __next_zones_zonelist+0x9d/0x130 [ 311.527006][ T8801] ? iov_iter_get_pages_alloc2+0xc0/0xc0 [ 311.533391][ T8801] ? __alloc_pages+0x27a/0x460 [ 311.538468][ T8801] ? zone_statistics+0x170/0x170 [ 311.543803][ T8801] ? rcu_is_watching+0x15/0xb0 [ 311.548716][ T8801] ip_generic_getfrag+0x163/0x2f0 [ 311.553885][ T8801] ? ip_skb_dst_mtu+0x9c0/0x9c0 [ 311.559042][ T8801] ? skb_page_frag_refill+0x199/0x310 [ 311.564463][ T8801] __ip_append_data+0x1f30/0x3d40 [ 311.569741][ T8801] ? raw_send_hdrinc+0x1170/0x1170 [ 311.574977][ T8801] ? ip_setup_cork+0x860/0x860 [ 311.579765][ T8801] ? ip_setup_cork+0x530/0x860 [ 311.584990][ T8801] ip_append_data+0x10d/0x180 [ 311.589867][ T8801] ? raw_send_hdrinc+0x1170/0x1170 [ 311.595081][ T8801] raw_sendmsg+0x15c1/0x1c00 [ 311.599788][ T8801] ? compat_raw_ioctl+0x70/0x70 [ 311.604747][ T8801] ? __lock_acquire+0x1273/0x7d40 [ 311.609803][ T8801] ? tomoyo_socket_sendmsg_permission+0x216/0x2f0 [ 311.616323][ T8801] ? sock_rps_record_flow+0x19/0x3f0 [ 311.621623][ T8801] ? inet_sendmsg+0x7c/0x2f0 [ 311.626399][ T8801] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 311.631696][ T8801] ? security_socket_sendmsg+0x80/0xa0 [ 311.637165][ T8801] ? inet_send_prepare+0x260/0x260 [ 311.642291][ T8801] ____sys_sendmsg+0x5ba/0x960 [ 311.647155][ T8801] ? __lock_acquire+0x7d40/0x7d40 [ 311.652194][ T8801] ? __asan_memset+0x22/0x40 [ 311.656821][ T8801] ? __sys_sendmsg_sock+0x30/0x30 [ 311.661864][ T8801] ? __import_iovec+0x5f2/0x850 [ 311.666828][ T8801] ? import_iovec+0x73/0xa0 [ 311.671539][ T8801] ___sys_sendmsg+0x2a6/0x360 [ 311.676252][ T8801] ? get_pid_task+0x20/0x1e0 [ 311.680928][ T8801] ? __sys_sendmsg+0x2a0/0x2a0 [ 311.686156][ T8801] ? __lock_acquire+0x7d40/0x7d40 [ 311.691212][ T8801] __se_sys_sendmsg+0x1c2/0x2b0 [ 311.696163][ T8801] ? __x64_sys_sendmsg+0x80/0x80 [ 311.701227][ T8801] ? lockdep_hardirqs_on+0x98/0x150 [ 311.706623][ T8801] do_syscall_64+0x55/0xa0 [ 311.711056][ T8801] ? clear_bhb_loop+0x40/0x90 [ 311.715746][ T8801] ? clear_bhb_loop+0x40/0x90 [ 311.720534][ T8801] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 311.726612][ T8801] RIP: 0033:0x7f77ec19bf79 [ 311.731131][ T8801] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 311.751910][ T8801] RSP: 002b:00007f77ed0d0028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 311.760343][ T8801] RAX: ffffffffffffffda RBX: 00007f77ec415fa0 RCX: 00007f77ec19bf79 [ 311.768328][ T8801] RDX: 0000000000000000 RSI: 0000200000001580 RDI: 0000000000000003 [ 311.776512][ T8801] RBP: 00007f77ed0d0090 R08: 0000000000000000 R09: 0000000000000000 [ 311.784521][ T8801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 311.792504][ T8801] R13: 00007f77ec416038 R14: 00007f77ec415fa0 R15: 00007ffd960b6078 [ 311.800538][ T8801] [ 311.915706][ T8803] netlink: 60 bytes leftover after parsing attributes in process `syz.1.521'. [ 315.605590][ T8840] netlink: 'syz.2.531': attribute type 19 has an invalid length. [ 315.702603][ T8840] netlink: 40 bytes leftover after parsing attributes in process `syz.2.531'. [ 316.014472][ T8841] netlink: 'syz.1.529': attribute type 2 has an invalid length. [ 316.076060][ T8841] netlink: 154876 bytes leftover after parsing attributes in process `syz.1.529'. [ 316.904979][ T8850] netlink: 20 bytes leftover after parsing attributes in process `syz.1.533'. [ 317.396759][ T8868] netlink: 60 bytes leftover after parsing attributes in process `syz.4.537'. [ 319.266078][ T1279] ieee802154 phy0 wpan0: encryption failed: -22 [ 319.272450][ T1279] ieee802154 phy1 wpan1: encryption failed: -22 [ 319.782598][ T8872] netlink: 'syz.2.540': attribute type 19 has an invalid length. [ 319.795465][ T8872] netlink: 40 bytes leftover after parsing attributes in process `syz.2.540'. [ 321.077267][ T8903] FAULT_INJECTION: forcing a failure. [ 321.077267][ T8903] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 321.108115][ T8903] CPU: 1 PID: 8903 Comm: syz.5.548 Not tainted syzkaller #0 [ 321.115649][ T8903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 321.125759][ T8903] Call Trace: [ 321.129073][ T8903] [ 321.132042][ T8903] dump_stack_lvl+0x18c/0x250 [ 321.136866][ T8903] ? show_regs_print_info+0x20/0x20 [ 321.142102][ T8903] ? load_image+0x400/0x400 [ 321.146650][ T8903] ? __lock_acquire+0x7d40/0x7d40 [ 321.151723][ T8903] ? snprintf+0xe9/0x140 [ 321.156024][ T8903] should_fail_ex+0x39d/0x4d0 [ 321.160854][ T8903] _copy_to_user+0x2f/0xa0 [ 321.165424][ T8903] simple_read_from_buffer+0xe7/0x150 [ 321.170860][ T8903] proc_fail_nth_read+0x1e8/0x260 [ 321.175956][ T8903] ? proc_fault_inject_write+0x360/0x360 [ 321.181745][ T8903] ? fsnotify_perm+0x271/0x5e0 [ 321.186654][ T8903] ? proc_fault_inject_write+0x360/0x360 [ 321.192424][ T8903] vfs_read+0x28b/0x970 [ 321.196636][ T8903] ? kernel_read+0x1e0/0x1e0 [ 321.201285][ T8903] ? __fget_files+0x28/0x4b0 [ 321.205916][ T8903] ? __fget_files+0x28/0x4b0 [ 321.210723][ T8903] ? __fget_files+0x43d/0x4b0 [ 321.215543][ T8903] ? __fdget_pos+0x2a3/0x330 [ 321.220163][ T8903] ? ksys_read+0x75/0x260 [ 321.224618][ T8903] ksys_read+0x150/0x260 [ 321.228911][ T8903] ? vfs_write+0x990/0x990 [ 321.233463][ T8903] ? lockdep_hardirqs_on+0x98/0x150 [ 321.238702][ T8903] do_syscall_64+0x55/0xa0 [ 321.243172][ T8903] ? clear_bhb_loop+0x40/0x90 [ 321.248058][ T8903] ? clear_bhb_loop+0x40/0x90 [ 321.252863][ T8903] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 321.258793][ T8903] RIP: 0033:0x7f914495c84e [ 321.263270][ T8903] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 321.283453][ T8903] RSP: 002b:00007f91458f8fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 321.291953][ T8903] RAX: ffffffffffffffda RBX: 00007f91458f96c0 RCX: 00007f914495c84e [ 321.300069][ T8903] RDX: 000000000000000f RSI: 00007f91458f90a0 RDI: 0000000000000004 [ 321.308079][ T8903] RBP: 00007f91458f9090 R08: 0000000000000000 R09: 0000000000000000 [ 321.316085][ T8903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 321.324091][ T8903] R13: 00007f9144c16038 R14: 00007f9144c15fa0 R15: 00007fff6ca96498 [ 321.332237][ T8903] [ 321.406267][ T8908] netlink: 'syz.4.547': attribute type 29 has an invalid length. [ 321.414337][ T8908] netlink: 'syz.4.547': attribute type 3 has an invalid length. [ 321.440475][ T8906] netlink: 'syz.2.549': attribute type 19 has an invalid length. [ 321.505611][ T8908] netlink: 132 bytes leftover after parsing attributes in process `syz.4.547'. [ 321.515224][ T8906] netlink: 40 bytes leftover after parsing attributes in process `syz.2.549'. [ 322.477063][ T8924] netlink: 60 bytes leftover after parsing attributes in process `syz.2.552'. [ 324.175401][ T8967] netlink: 'syz.4.560': attribute type 19 has an invalid length. [ 324.195483][ T8967] netlink: 40 bytes leftover after parsing attributes in process `syz.4.560'. [ 324.375081][ T8974] syzkaller0: entered promiscuous mode [ 324.380775][ T8974] syzkaller0: entered allmulticast mode [ 324.946781][ T8989] netlink: 60 bytes leftover after parsing attributes in process `syz.2.565'. [ 325.611048][ T9012] netlink: 'syz.5.572': attribute type 19 has an invalid length. [ 325.641450][ T9012] netlink: 40 bytes leftover after parsing attributes in process `syz.5.572'. [ 325.930236][ T9020] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.038794][ T9041] FAULT_INJECTION: forcing a failure. [ 327.038794][ T9041] name failslab, interval 1, probability 0, space 0, times 0 [ 327.341125][ T9041] CPU: 1 PID: 9041 Comm: syz.2.580 Not tainted syzkaller #0 [ 327.348986][ T9041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 327.359284][ T9041] Call Trace: [ 327.362879][ T9041] [ 327.365867][ T9041] dump_stack_lvl+0x18c/0x250 [ 327.370687][ T9041] ? show_regs_print_info+0x20/0x20 [ 327.376072][ T9041] ? load_image+0x400/0x400 [ 327.380898][ T9041] ? __might_sleep+0xe0/0xe0 [ 327.385709][ T9041] ? __lock_acquire+0x7d40/0x7d40 [ 327.390777][ T9041] ? prepend_path+0x4b/0x960 [ 327.395504][ T9041] should_fail_ex+0x39d/0x4d0 [ 327.400332][ T9041] should_failslab+0x9/0x20 [ 327.405055][ T9041] slab_pre_alloc_hook+0x59/0x310 [ 327.410124][ T9041] ? __asan_memcpy+0x40/0x70 [ 327.414882][ T9041] ? tomoyo_encode+0x28b/0x540 [ 327.419904][ T9041] ? tomoyo_encode+0x28b/0x540 [ 327.425082][ T9041] __kmem_cache_alloc_node+0x53/0x250 [ 327.430513][ T9041] ? prepend_path+0x4b/0x960 [ 327.435338][ T9041] ? tomoyo_encode+0x28b/0x540 [ 327.440153][ T9041] __kmalloc+0xa4/0x230 [ 327.444369][ T9041] tomoyo_encode+0x28b/0x540 [ 327.449196][ T9041] tomoyo_realpath_from_path+0x592/0x5d0 [ 327.455076][ T9041] tomoyo_check_open_permission+0x224/0x460 [ 327.461286][ T9041] ? tomoyo_check_open_permission+0x1cf/0x460 [ 327.467664][ T9041] ? tomoyo_check_path_number_acl+0x280/0x280 [ 327.474114][ T9041] ? __asan_memset+0x22/0x40 [ 327.478833][ T9041] ? __rwlock_init+0x150/0x150 [ 327.483672][ T9041] ? tomoyo_file_open+0xed/0x180 [ 327.488852][ T9041] security_file_open+0x62/0xa0 [ 327.494279][ T9041] do_dentry_open+0x380/0x1500 [ 327.500214][ T9041] path_openat+0x27f1/0x3230 [ 327.505383][ T9041] ? do_filp_open+0x430/0x430 [ 327.510150][ T9041] ? trace_event_raw_event_lock+0x250/0x250 [ 327.516219][ T9041] do_filp_open+0x1f5/0x430 [ 327.520861][ T9041] ? alloc_fd+0x58f/0x630 [ 327.525251][ T9041] ? vfs_tmpfile+0x490/0x490 [ 327.529958][ T9041] ? _raw_spin_unlock+0x28/0x40 [ 327.534998][ T9041] ? alloc_fd+0x58f/0x630 [ 327.539483][ T9041] do_sys_openat2+0x134/0x1d0 [ 327.544398][ T9041] ? do_sys_open+0xe0/0xe0 [ 327.549131][ T9041] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 327.555165][ T9041] ? lock_chain_count+0x20/0x20 [ 327.560122][ T9041] __x64_sys_openat+0x139/0x160 [ 327.565029][ T9041] do_syscall_64+0x55/0xa0 [ 327.569498][ T9041] ? clear_bhb_loop+0x40/0x90 [ 327.574223][ T9041] ? clear_bhb_loop+0x40/0x90 [ 327.578969][ T9041] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 327.584899][ T9041] RIP: 0033:0x7f77ec19bf79 [ 327.589353][ T9041] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 327.609105][ T9041] RSP: 002b:00007f77ed0d0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 327.617691][ T9041] RAX: ffffffffffffffda RBX: 00007f77ec415fa0 RCX: 00007f77ec19bf79 [ 327.625806][ T9041] RDX: 000000000000275a RSI: 00002000000001c0 RDI: ffffffffffffff9c [ 327.633912][ T9041] RBP: 00007f77ed0d0090 R08: 0000000000000000 R09: 0000000000000000 [ 327.642275][ T9041] R10: 0000000000000406 R11: 0000000000000246 R12: 0000000000000001 [ 327.650285][ T9041] R13: 00007f77ec416038 R14: 00007f77ec415fa0 R15: 00007ffd960b6078 [ 327.658532][ T9041] [ 327.776041][ T9041] ERROR: Out of memory at tomoyo_realpath_from_path. [ 328.363519][ T9060] netlink: 60 bytes leftover after parsing attributes in process `syz.5.583'. [ 329.363724][ T9061] netlink: 'syz.2.584': attribute type 19 has an invalid length. [ 329.388316][ T9061] netlink: 40 bytes leftover after parsing attributes in process `syz.2.584'. [ 331.891981][ T9087] FAULT_INJECTION: forcing a failure. [ 331.891981][ T9087] name failslab, interval 1, probability 0, space 0, times 0 [ 331.939771][ T9087] CPU: 0 PID: 9087 Comm: syz.1.591 Not tainted syzkaller #0 [ 331.947228][ T9087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 331.957590][ T9087] Call Trace: [ 331.961028][ T9087] [ 331.964076][ T9087] dump_stack_lvl+0x18c/0x250 [ 331.968809][ T9087] ? trace_event_raw_event_lock+0x250/0x250 [ 331.974739][ T9087] ? show_regs_print_info+0x20/0x20 [ 331.980067][ T9087] ? load_image+0x400/0x400 [ 331.984647][ T9087] should_fail_ex+0x39d/0x4d0 [ 331.989476][ T9087] should_failslab+0x9/0x20 [ 331.994029][ T9087] slab_pre_alloc_hook+0x59/0x310 [ 331.999204][ T9087] kmem_cache_alloc+0x5a/0x2d0 [ 332.004022][ T9087] ? __nf_conntrack_alloc+0x99/0x380 [ 332.009622][ T9087] __nf_conntrack_alloc+0x99/0x380 [ 332.014768][ T9087] init_conntrack+0x177/0xf10 [ 332.019453][ T9087] ? early_drop+0x7f0/0x7f0 [ 332.024042][ T9087] ? nf_conntrack_find_get+0x650/0x650 [ 332.029586][ T9087] ? __local_bh_enable_ip+0x13a/0x1c0 [ 332.034992][ T9087] ? __siphash_unaligned+0x22e/0x3a0 [ 332.040306][ T9087] nf_conntrack_in+0xc06/0x15c0 [ 332.045439][ T9087] ? kasan_set_track+0x4e/0x70 [ 332.050259][ T9087] ? nf_ct_pernet+0x270/0x270 [ 332.054941][ T9087] ? ipt_do_table+0x2c1/0x15e0 [ 332.059715][ T9087] ? ipv4_conntrack_defrag+0x29d/0x5a0 [ 332.065175][ T9087] ? ipv4_conntrack_local+0x123/0x200 [ 332.070635][ T9087] ? ipv4_conntrack_in+0x20/0x20 [ 332.075572][ T9087] nf_hook_slow+0xbd/0x200 [ 332.080095][ T9087] ? nf_hook+0x390/0x390 [ 332.084530][ T9087] nf_hook+0x228/0x390 [ 332.088692][ T9087] ? nf_hook+0xa2/0x390 [ 332.092854][ T9087] ? __ip_local_out+0x5f0/0x5f0 [ 332.097736][ T9087] ? nf_hook+0x390/0x390 [ 332.102171][ T9087] ? ip_fast_csum+0x1ee/0x2b0 [ 332.106848][ T9087] __ip_local_out+0x4db/0x5f0 [ 332.111526][ T9087] ? nf_hook+0x390/0x390 [ 332.115960][ T9087] ip_send_skb+0x4c/0x1d0 [ 332.120309][ T9087] raw_sendmsg+0x163e/0x1c00 [ 332.125018][ T9087] ? compat_raw_ioctl+0x70/0x70 [ 332.129957][ T9087] ? tomoyo_socket_sendmsg_permission+0x216/0x2f0 [ 332.136467][ T9087] ? sock_rps_record_flow+0x19/0x3f0 [ 332.141930][ T9087] ? inet_sendmsg+0x7c/0x2f0 [ 332.146707][ T9087] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 332.151996][ T9087] ? security_socket_sendmsg+0x80/0xa0 [ 332.157468][ T9087] ? inet_send_prepare+0x260/0x260 [ 332.162666][ T9087] ____sys_sendmsg+0x5ba/0x960 [ 332.167431][ T9087] ? __lock_acquire+0x7d40/0x7d40 [ 332.172738][ T9087] ? __sys_sendmsg_sock+0x30/0x30 [ 332.177763][ T9087] ? __import_iovec+0x3fa/0x850 [ 332.182624][ T9087] ? import_iovec+0x73/0xa0 [ 332.187235][ T9087] ___sys_sendmsg+0x2a6/0x360 [ 332.192174][ T9087] ? __sys_sendmsg+0x2a0/0x2a0 [ 332.197082][ T9087] ? __lock_acquire+0x7d40/0x7d40 [ 332.202192][ T9087] __se_sys_sendmsg+0x1c2/0x2b0 [ 332.207107][ T9087] ? __x64_sys_sendmsg+0x80/0x80 [ 332.212108][ T9087] ? lockdep_hardirqs_on+0x98/0x150 [ 332.217374][ T9087] do_syscall_64+0x55/0xa0 [ 332.221933][ T9087] ? clear_bhb_loop+0x40/0x90 [ 332.226749][ T9087] ? clear_bhb_loop+0x40/0x90 [ 332.231475][ T9087] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 332.237775][ T9087] RIP: 0033:0x7f6fb879bf79 [ 332.242230][ T9087] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 332.262013][ T9087] RSP: 002b:00007f6fb9715028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 332.270431][ T9087] RAX: ffffffffffffffda RBX: 00007f6fb8a15fa0 RCX: 00007f6fb879bf79 [ 332.278421][ T9087] RDX: 0000000000000000 RSI: 0000200000001640 RDI: 0000000000000003 [ 332.286414][ T9087] RBP: 00007f6fb9715090 R08: 0000000000000000 R09: 0000000000000000 [ 332.294516][ T9087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 332.302782][ T9087] R13: 00007f6fb8a16038 R14: 00007f6fb8a15fa0 R15: 00007ffe5e8932c8 [ 332.310991][ T9087] [ 332.495375][ T9093] netlink: 'syz.4.594': attribute type 19 has an invalid length. [ 332.507637][ T9093] netlink: 40 bytes leftover after parsing attributes in process `syz.4.594'. [ 334.193592][ T9133] netlink: 'syz.5.605': attribute type 19 has an invalid length. [ 334.279532][ T9133] netlink: 40 bytes leftover after parsing attributes in process `syz.5.605'. [ 334.372118][ T9138] IPv6: Can't replace route, no match found [ 334.666549][ T9145] netlink: 203516 bytes leftover after parsing attributes in process `syz.4.609'. [ 334.712023][ T9145] netlink: 6332 bytes leftover after parsing attributes in process `syz.4.609'. [ 334.753350][ T9148] netlink: 60 bytes leftover after parsing attributes in process `syz.5.608'. [ 334.789777][ T9150] FAULT_INJECTION: forcing a failure. [ 334.789777][ T9150] name failslab, interval 1, probability 0, space 0, times 0 [ 334.808243][ T9150] CPU: 1 PID: 9150 Comm: syz.2.610 Not tainted syzkaller #0 [ 334.815955][ T9150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 334.826045][ T9150] Call Trace: [ 334.829341][ T9150] [ 334.832368][ T9150] dump_stack_lvl+0x18c/0x250 [ 334.837075][ T9150] ? show_regs_print_info+0x20/0x20 [ 334.842301][ T9150] ? load_image+0x400/0x400 [ 334.847015][ T9150] ? __might_sleep+0xe0/0xe0 [ 334.851628][ T9150] ? __lock_acquire+0x7d40/0x7d40 [ 334.856684][ T9150] should_fail_ex+0x39d/0x4d0 [ 334.861387][ T9150] should_failslab+0x9/0x20 [ 334.865996][ T9150] slab_pre_alloc_hook+0x59/0x310 [ 334.871134][ T9150] kmem_cache_alloc_node+0x60/0x320 [ 334.876351][ T9150] ? __alloc_skb+0x103/0x2c0 [ 334.881043][ T9150] __alloc_skb+0x103/0x2c0 [ 334.885669][ T9150] netlink_dump+0x1ec/0xe50 [ 334.890288][ T9150] ? __mutex_lock+0x315/0xcc0 [ 334.895158][ T9150] ? netlink_lookup+0x200/0x200 [ 334.900058][ T9150] ? netlink_autobind+0x300/0x300 [ 334.905107][ T9150] ? netlink_lookup+0x30/0x200 [ 334.909888][ T9150] ? netlink_lookup+0x30/0x200 [ 334.914764][ T9150] __netlink_dump_start+0x5f1/0x810 [ 334.919984][ T9150] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 334.925115][ T9150] rtnetlink_rcv_msg+0xe1d/0xfa0 [ 334.930183][ T9150] ? inet6_netconf_get_devconf+0x900/0x900 [ 334.936137][ T9150] ? rtnetlink_bind+0x80/0x80 [ 334.941006][ T9150] ? perf_trace_preemptirq_template+0xac/0x330 [ 334.947228][ T9150] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 334.953245][ T9150] ? lock_chain_count+0x20/0x20 [ 334.958302][ T9150] ? __local_bh_enable_ip+0x13a/0x1c0 [ 334.963785][ T9150] ? lockdep_hardirqs_on+0x98/0x150 [ 334.969175][ T9150] ? __local_bh_enable_ip+0x13a/0x1c0 [ 334.974649][ T9150] ? _local_bh_enable+0xa0/0xa0 [ 334.979634][ T9150] ? __dev_queue_xmit+0x26b/0x36b0 [ 334.984797][ T9150] ? __dev_queue_xmit+0x26b/0x36b0 [ 334.990048][ T9150] ? __dev_queue_xmit+0x124f/0x36b0 [ 334.995301][ T9150] ? __dev_queue_xmit+0x26b/0x36b0 [ 335.000644][ T9150] ? inet6_netconf_get_devconf+0x900/0x900 [ 335.006475][ T9150] ? perf_trace_lock+0xfc/0x3b0 [ 335.011362][ T9150] netlink_rcv_skb+0x241/0x4d0 [ 335.016332][ T9150] ? rtnetlink_bind+0x80/0x80 [ 335.021112][ T9150] ? netlink_ack+0x1180/0x1180 [ 335.025906][ T9150] ? __lock_acquire+0x7d40/0x7d40 [ 335.031014][ T9150] ? netlink_deliver_tap+0x2e/0x1b0 [ 335.036244][ T9150] netlink_unicast+0x751/0x8d0 [ 335.041126][ T9150] netlink_sendmsg+0x8d0/0xbf0 [ 335.045931][ T9150] ? netlink_getsockopt+0x590/0x590 [ 335.051155][ T9150] ? aa_sock_msg_perm+0x94/0x150 [ 335.056116][ T9150] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 335.061454][ T9150] ? security_socket_sendmsg+0x80/0xa0 [ 335.067049][ T9150] ? netlink_getsockopt+0x590/0x590 [ 335.072370][ T9150] ____sys_sendmsg+0x5ba/0x960 [ 335.077155][ T9150] ? __asan_memset+0x22/0x40 [ 335.081767][ T9150] ? __sys_sendmsg_sock+0x30/0x30 [ 335.086971][ T9150] ? __import_iovec+0x5f2/0x850 [ 335.091853][ T9150] ? import_iovec+0x73/0xa0 [ 335.096379][ T9150] ___sys_sendmsg+0x2a6/0x360 [ 335.101074][ T9150] ? __sys_sendmsg+0x2a0/0x2a0 [ 335.106046][ T9150] ? __lock_acquire+0x7d40/0x7d40 [ 335.111543][ T9150] __se_sys_sendmsg+0x1c2/0x2b0 [ 335.116497][ T9150] ? __x64_sys_sendmsg+0x80/0x80 [ 335.121586][ T9150] ? lockdep_hardirqs_on+0x98/0x150 [ 335.126976][ T9150] do_syscall_64+0x55/0xa0 [ 335.131409][ T9150] ? clear_bhb_loop+0x40/0x90 [ 335.136374][ T9150] ? clear_bhb_loop+0x40/0x90 [ 335.141064][ T9150] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 335.146972][ T9150] RIP: 0033:0x7f77ec19bf79 [ 335.151400][ T9150] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 335.171300][ T9150] RSP: 002b:00007f77ed0d0028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 335.179905][ T9150] RAX: ffffffffffffffda RBX: 00007f77ec415fa0 RCX: 00007f77ec19bf79 [ 335.188035][ T9150] RDX: 0000000000000010 RSI: 00002000000003c0 RDI: 0000000000000003 [ 335.196323][ T9150] RBP: 00007f77ed0d0090 R08: 0000000000000000 R09: 0000000000000000 [ 335.204498][ T9150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 335.212572][ T9150] R13: 00007f77ec416038 R14: 00007f77ec415fa0 R15: 00007ffd960b6078 [ 335.220780][ T9150] [ 335.384255][ T9155] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 335.393857][ T9155] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 335.403361][ T9155] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 335.411035][ T9155] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 336.068778][ T9161] netlink: 'syz.5.613': attribute type 10 has an invalid length. [ 336.505105][ T9161] 8021q: adding VLAN 0 to HW filter on device bond0 [ 336.516912][ T9161] team0: Port device bond0 added [ 336.539052][ T9170] netlink: 'syz.2.616': attribute type 19 has an invalid length. [ 336.557799][ T9170] netlink: 40 bytes leftover after parsing attributes in process `syz.2.616'. [ 336.843937][ T9191] netlink: 'syz.1.620': attribute type 33 has an invalid length. [ 336.853587][ T9191] netlink: 36 bytes leftover after parsing attributes in process `syz.1.620'. [ 336.884717][ T9193] netlink: 'syz.5.618': attribute type 7 has an invalid length. [ 336.917558][ T9193] Illegal XDP return value 204 on prog (id 538) dev N/A, expect packet loss! [ 337.074336][ T9196] FAULT_INJECTION: forcing a failure. [ 337.074336][ T9196] name failslab, interval 1, probability 0, space 0, times 0 [ 337.118818][ T9196] CPU: 0 PID: 9196 Comm: syz.4.621 Not tainted syzkaller #0 [ 337.126269][ T9196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 337.136625][ T9196] Call Trace: [ 337.140029][ T9196] [ 337.143103][ T9196] dump_stack_lvl+0x18c/0x250 [ 337.147847][ T9196] ? show_regs_print_info+0x20/0x20 [ 337.153537][ T9196] ? load_image+0x400/0x400 [ 337.158270][ T9196] ? __might_sleep+0xe0/0xe0 [ 337.162907][ T9196] ? __lock_acquire+0x7d40/0x7d40 [ 337.168084][ T9196] should_fail_ex+0x39d/0x4d0 [ 337.172927][ T9196] should_failslab+0x9/0x20 [ 337.177662][ T9196] slab_pre_alloc_hook+0x59/0x310 [ 337.182925][ T9196] ? subflow_ulp_init+0x95/0x530 [ 337.187912][ T9196] __kmem_cache_alloc_node+0x53/0x250 [ 337.193431][ T9196] ? tcp_set_ulp+0xb1/0x5f0 [ 337.198067][ T9196] ? subflow_ulp_init+0x95/0x530 [ 337.203210][ T9196] kmalloc_trace+0x2a/0xe0 [ 337.207659][ T9196] subflow_ulp_init+0x95/0x530 [ 337.212471][ T9196] ? tcp_set_ulp+0xb1/0x5f0 [ 337.217005][ T9196] tcp_set_ulp+0x536/0x5f0 [ 337.221619][ T9196] mptcp_subflow_create_socket+0x60e/0xac0 [ 337.227531][ T9196] ? mark_lock+0x94/0x320 [ 337.232018][ T9196] ? __mptcp_subflow_connect+0x1450/0x1450 [ 337.237890][ T9196] ? lock_chain_count+0x20/0x20 [ 337.242794][ T9196] __mptcp_nmpc_sk+0x157/0x740 [ 337.247699][ T9196] ? __local_bh_enable_ip+0x13a/0x1c0 [ 337.253114][ T9196] ? __bpf_trace_subflow_check_data_avail+0x160/0x160 [ 337.259902][ T9196] mptcp_setsockopt+0xe7a/0x3390 [ 337.264861][ T9196] ? __fget_files+0x28/0x4b0 [ 337.269473][ T9196] ? pm_nl_exit_net+0x230/0x230 [ 337.274430][ T9196] ? aa_af_perm+0x330/0x330 [ 337.278952][ T9196] ? __fget_files+0x28/0x4b0 [ 337.283641][ T9196] ? __fget_files+0x28/0x4b0 [ 337.288245][ T9196] ? aa_sock_opt_perm+0x74/0x100 [ 337.293245][ T9196] ? sock_common_setsockopt+0x36/0xc0 [ 337.298723][ T9196] ? sock_common_recvmsg+0x190/0x190 [ 337.304038][ T9196] do_sock_setsockopt+0x175/0x1a0 [ 337.309087][ T9196] ? __fdget+0x180/0x210 [ 337.313817][ T9196] __x64_sys_setsockopt+0x182/0x200 [ 337.319137][ T9196] do_syscall_64+0x55/0xa0 [ 337.323578][ T9196] ? clear_bhb_loop+0x40/0x90 [ 337.328449][ T9196] ? clear_bhb_loop+0x40/0x90 [ 337.333160][ T9196] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 337.339088][ T9196] RIP: 0033:0x7f01ebb9bf79 [ 337.343621][ T9196] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 337.363774][ T9196] RSP: 002b:00007f01ec999028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 337.372386][ T9196] RAX: ffffffffffffffda RBX: 00007f01ebe15fa0 RCX: 00007f01ebb9bf79 [ 337.380381][ T9196] RDX: 000000000000004b RSI: 0000000000000029 RDI: 0000000000000003 [ 337.388360][ T9196] RBP: 00007f01ec999090 R08: 0000000000004000 R09: 0000000000000000 [ 337.396427][ T9196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 337.404438][ T9196] R13: 00007f01ebe16038 R14: 00007f01ebe15fa0 R15: 00007ffd4bbd04f8 [ 337.412639][ T9196] [ 337.933117][ T9208] netlink: 60 bytes leftover after parsing attributes in process `syz.2.623'. [ 338.116539][ T9207] netlink: 44 bytes leftover after parsing attributes in process `syz.4.624'. [ 338.821307][ T9222] FAULT_INJECTION: forcing a failure. [ 338.821307][ T9222] name failslab, interval 1, probability 0, space 0, times 0 [ 338.834250][ T9222] CPU: 0 PID: 9222 Comm: syz.2.626 Not tainted syzkaller #0 [ 338.841724][ T9222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 338.852012][ T9222] Call Trace: [ 338.855421][ T9222] [ 338.858383][ T9222] dump_stack_lvl+0x18c/0x250 [ 338.863281][ T9222] ? show_regs_print_info+0x20/0x20 [ 338.868626][ T9222] ? load_image+0x400/0x400 [ 338.873187][ T9222] ? netdev_core_pick_tx+0x340/0x340 [ 338.878528][ T9222] should_fail_ex+0x39d/0x4d0 [ 338.883275][ T9222] should_failslab+0x9/0x20 [ 338.887927][ T9222] slab_pre_alloc_hook+0x59/0x310 [ 338.893283][ T9222] kmem_cache_alloc+0x5a/0x2d0 [ 338.898188][ T9222] ? skb_clone+0x1eb/0x370 [ 338.902642][ T9222] skb_clone+0x1eb/0x370 [ 338.906993][ T9222] bpf_clone_redirect+0x167/0x4a0 [ 338.912306][ T9222] bpf_prog_b960c4b57b3b3b2a+0x5e/0x63 [ 338.918303][ T9222] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 338.924561][ T9222] ? lock_chain_count+0x20/0x20 [ 338.929437][ T9222] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 338.935436][ T9222] ? lockdep_softirqs_on+0x580/0x580 [ 338.940919][ T9222] ? lock_chain_count+0x20/0x20 [ 338.945871][ T9222] ? seqcount_lockdep_reader_access+0x191/0x1d0 [ 338.952222][ T9222] ? __local_bh_disable_ip+0x108/0x1a0 [ 338.957715][ T9222] ? __cant_sleep+0x220/0x220 [ 338.962491][ T9222] ? __local_bh_enable_ip+0x13a/0x1c0 [ 338.968051][ T9222] ? _local_bh_enable+0xa0/0xa0 [ 338.973012][ T9222] ? bpf_test_timer_continue+0x135/0x380 [ 338.978666][ T9222] ? bpf_test_run+0x174/0x870 [ 338.983354][ T9222] bpf_test_run+0x2df/0x870 [ 338.987877][ T9222] ? bpf_test_run+0x174/0x870 [ 338.992562][ T9222] ? convert___skb_to_skb+0x590/0x590 [ 338.997947][ T9222] ? eth_get_headlen+0x210/0x210 [ 339.002907][ T9222] ? slab_build_skb+0x25f/0x3f0 [ 339.008013][ T9222] ? convert___skb_to_skb+0x3d/0x590 [ 339.013409][ T9222] bpf_prog_test_run_skb+0xad2/0x12b0 [ 339.018893][ T9222] ? cpu_online+0x60/0x60 [ 339.023319][ T9222] bpf_prog_test_run+0x321/0x390 [ 339.028459][ T9222] __sys_bpf+0x49d/0x890 [ 339.032965][ T9222] ? bpf_link_show_fdinfo+0x390/0x390 [ 339.038884][ T9222] ? lock_chain_count+0x20/0x20 [ 339.044107][ T9222] __x64_sys_bpf+0x7c/0x90 [ 339.048543][ T9222] do_syscall_64+0x55/0xa0 [ 339.053065][ T9222] ? clear_bhb_loop+0x40/0x90 [ 339.057840][ T9222] ? clear_bhb_loop+0x40/0x90 [ 339.062531][ T9222] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 339.068521][ T9222] RIP: 0033:0x7f77ec19bf79 [ 339.072987][ T9222] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 339.093149][ T9222] RSP: 002b:00007f77ed0d0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 339.101761][ T9222] RAX: ffffffffffffffda RBX: 00007f77ec415fa0 RCX: 00007f77ec19bf79 [ 339.109921][ T9222] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 339.118098][ T9222] RBP: 00007f77ed0d0090 R08: 0000000000000000 R09: 0000000000000000 [ 339.126078][ T9222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 339.134228][ T9222] R13: 00007f77ec416038 R14: 00007f77ec415fa0 R15: 00007ffd960b6078 [ 339.142408][ T9222] [ 339.303759][ T9226] netlink: 'syz.5.628': attribute type 19 has an invalid length. [ 339.355348][ T9226] netlink: 40 bytes leftover after parsing attributes in process `syz.5.628'. [ 340.680725][ T9269] netlink: 60 bytes leftover after parsing attributes in process `syz.1.637'. [ 341.705922][ T9272] netlink: 'syz.2.639': attribute type 19 has an invalid length. [ 341.726060][ T9272] netlink: 40 bytes leftover after parsing attributes in process `syz.2.639'. [ 341.961371][ T9278] netlink: 'syz.2.640': attribute type 7 has an invalid length. [ 341.972703][ T9278] netlink: 'syz.2.640': attribute type 1 has an invalid length. [ 341.986568][ T9278] netlink: 209836 bytes leftover after parsing attributes in process `syz.2.640'. [ 343.417664][ T9309] FAULT_INJECTION: forcing a failure. [ 343.417664][ T9309] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 343.459283][ T9309] CPU: 1 PID: 9309 Comm: syz.2.647 Not tainted syzkaller #0 [ 343.466741][ T9309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 343.477281][ T9309] Call Trace: [ 343.480599][ T9309] [ 343.483563][ T9309] dump_stack_lvl+0x18c/0x250 [ 343.488378][ T9309] ? show_regs_print_info+0x20/0x20 [ 343.493633][ T9309] ? load_image+0x400/0x400 [ 343.498183][ T9309] ? __might_fault+0xaa/0x120 [ 343.502907][ T9309] ? __lock_acquire+0x7d40/0x7d40 [ 343.508247][ T9309] ? tomoyo_path_number_perm+0x5b4/0x620 [ 343.514033][ T9309] should_fail_ex+0x39d/0x4d0 [ 343.519037][ T9309] _copy_from_user+0x2f/0xe0 [ 343.523933][ T9309] wext_handle_ioctl+0xc8/0x1d0 [ 343.529025][ T9309] ? call_commit_handler+0xf0/0xf0 [ 343.534203][ T9309] sock_ioctl+0x15d/0x7e0 [ 343.538582][ T9309] ? sock_poll+0x3e0/0x3e0 [ 343.543053][ T9309] ? bpf_lsm_file_ioctl+0x9/0x10 [ 343.548107][ T9309] ? security_file_ioctl+0x80/0xa0 [ 343.553245][ T9309] ? sock_poll+0x3e0/0x3e0 [ 343.557677][ T9309] __se_sys_ioctl+0xfd/0x170 [ 343.562469][ T9309] do_syscall_64+0x55/0xa0 [ 343.567047][ T9309] ? clear_bhb_loop+0x40/0x90 [ 343.571741][ T9309] ? clear_bhb_loop+0x40/0x90 [ 343.576441][ T9309] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 343.582345][ T9309] RIP: 0033:0x7f77ec19bf79 [ 343.586776][ T9309] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 343.606784][ T9309] RSP: 002b:00007f77ed0d0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 343.615323][ T9309] RAX: ffffffffffffffda RBX: 00007f77ec415fa0 RCX: 00007f77ec19bf79 [ 343.623592][ T9309] RDX: 0000200000000000 RSI: 0000000000008b04 RDI: 0000000000000004 [ 343.631754][ T9309] RBP: 00007f77ed0d0090 R08: 0000000000000000 R09: 0000000000000000 [ 343.639941][ T9309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 343.647936][ T9309] R13: 00007f77ec416038 R14: 00007f77ec415fa0 R15: 00007ffd960b6078 [ 343.656125][ T9309] [ 343.706089][ T9312] netlink: 'syz.5.648': attribute type 19 has an invalid length. [ 343.714002][ T9312] netlink: 40 bytes leftover after parsing attributes in process `syz.5.648'. [ 344.445033][ T9324] netlink: 'syz.2.650': attribute type 29 has an invalid length. [ 344.568921][ T9325] netlink: 763 bytes leftover after parsing attributes in process `syz.4.651'. [ 344.579034][ T9324] netlink: 'syz.2.650': attribute type 29 has an invalid length. [ 345.200721][ T9338] netlink: 60 bytes leftover after parsing attributes in process `syz.5.654'. [ 347.616856][ T9356] FAULT_INJECTION: forcing a failure. [ 347.616856][ T9356] name failslab, interval 1, probability 0, space 0, times 0 [ 347.648795][ T9356] CPU: 1 PID: 9356 Comm: syz.2.658 Not tainted syzkaller #0 [ 347.656335][ T9356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 347.666517][ T9356] Call Trace: [ 347.669824][ T9356] [ 347.672960][ T9356] dump_stack_lvl+0x18c/0x250 [ 347.677778][ T9356] ? show_regs_print_info+0x20/0x20 [ 347.683109][ T9356] ? load_image+0x400/0x400 [ 347.687652][ T9356] ? __might_sleep+0xe0/0xe0 [ 347.692286][ T9356] ? __lock_acquire+0x7d40/0x7d40 [ 347.697525][ T9356] should_fail_ex+0x39d/0x4d0 [ 347.702313][ T9356] should_failslab+0x9/0x20 [ 347.707009][ T9356] slab_pre_alloc_hook+0x59/0x310 [ 347.712157][ T9356] ? tomoyo_encode+0x28b/0x540 [ 347.716987][ T9356] ? tomoyo_encode+0x28b/0x540 [ 347.721823][ T9356] __kmem_cache_alloc_node+0x53/0x250 [ 347.727507][ T9356] ? tomoyo_encode+0x28b/0x540 [ 347.732373][ T9356] __kmalloc+0xa4/0x230 [ 347.736555][ T9356] tomoyo_encode+0x28b/0x540 [ 347.741171][ T9356] tomoyo_realpath_from_path+0x592/0x5d0 [ 347.747011][ T9356] tomoyo_path_number_perm+0x248/0x620 [ 347.752620][ T9356] ? tomoyo_path_number_perm+0x217/0x620 [ 347.758364][ T9356] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 347.763935][ T9356] ? trace_call_bpf+0xc3/0x6c0 [ 347.768720][ T9356] ? trace_call_bpf+0xc3/0x6c0 [ 347.773501][ T9356] ? trace_call_bpf+0x5e9/0x6c0 [ 347.778394][ T9356] ? __fget_files+0x28/0x4b0 [ 347.783008][ T9356] ? __fget_files+0x28/0x4b0 [ 347.787634][ T9356] security_file_ioctl+0x70/0xa0 [ 347.792616][ T9356] __se_sys_ioctl+0x48/0x170 [ 347.797319][ T9356] do_syscall_64+0x55/0xa0 [ 347.801753][ T9356] ? clear_bhb_loop+0x40/0x90 [ 347.806627][ T9356] ? clear_bhb_loop+0x40/0x90 [ 347.811411][ T9356] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 347.817503][ T9356] RIP: 0033:0x7f77ec19bf79 [ 347.821934][ T9356] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 347.841723][ T9356] RSP: 002b:00007f77ed0d0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 347.850364][ T9356] RAX: ffffffffffffffda RBX: 00007f77ec415fa0 RCX: 00007f77ec19bf79 [ 347.858349][ T9356] RDX: 0000000000000000 RSI: 00000000000089e2 RDI: 0000000000000005 [ 347.866427][ T9356] RBP: 00007f77ed0d0090 R08: 0000000000000000 R09: 0000000000000000 [ 347.874877][ T9356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 347.883086][ T9356] R13: 00007f77ec416038 R14: 00007f77ec415fa0 R15: 00007ffd960b6078 [ 347.891154][ T9356] [ 347.921577][ T9356] ERROR: Out of memory at tomoyo_realpath_from_path. [ 349.237489][ T9379] netlink: 'syz.5.665': attribute type 3 has an invalid length. [ 349.260441][ T9379] netlink: 130984 bytes leftover after parsing attributes in process `syz.5.665'. [ 349.472170][ T9377] FAULT_INJECTION: forcing a failure. [ 349.472170][ T9377] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 349.555593][ T9377] CPU: 0 PID: 9377 Comm: syz.1.663 Not tainted syzkaller #0 [ 349.563049][ T9377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 349.573302][ T9377] Call Trace: [ 349.576593][ T9377] [ 349.579549][ T9377] dump_stack_lvl+0x18c/0x250 [ 349.584268][ T9377] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 349.590439][ T9377] ? show_regs_print_info+0x20/0x20 [ 349.595664][ T9377] ? load_image+0x400/0x400 [ 349.600191][ T9377] should_fail_ex+0x39d/0x4d0 [ 349.604890][ T9377] _copy_from_user+0x2f/0xe0 [ 349.609496][ T9377] btf_new_fd+0x366/0x9f0 [ 349.613938][ T9377] ? bpf_btf_show_fdinfo+0x80/0x80 [ 349.619072][ T9377] ? capable+0x88/0xe0 [ 349.623161][ T9377] __sys_bpf+0x670/0x890 [ 349.627418][ T9377] ? bpf_link_show_fdinfo+0x390/0x390 [ 349.632813][ T9377] ? lock_chain_count+0x20/0x20 [ 349.637679][ T9377] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 349.643678][ T9377] __x64_sys_bpf+0x7c/0x90 [ 349.648105][ T9377] do_syscall_64+0x55/0xa0 [ 349.652532][ T9377] ? clear_bhb_loop+0x40/0x90 [ 349.657221][ T9377] ? clear_bhb_loop+0x40/0x90 [ 349.661906][ T9377] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 349.667815][ T9377] RIP: 0033:0x7f6fb879bf79 [ 349.672326][ T9377] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 349.691948][ T9377] RSP: 002b:00007f6fb9715028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 349.700663][ T9377] RAX: ffffffffffffffda RBX: 00007f6fb8a15fa0 RCX: 00007f6fb879bf79 [ 349.708654][ T9377] RDX: 0000000000000028 RSI: 0000200000002b40 RDI: 0000000000000012 [ 349.716898][ T9377] RBP: 00007f6fb9715090 R08: 0000000000000000 R09: 0000000000000000 [ 349.724997][ T9377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 349.732981][ T9377] R13: 00007f6fb8a16038 R14: 00007f6fb8a15fa0 R15: 00007ffe5e8932c8 [ 349.741073][ T9377] [ 349.818857][ T9381] netlink: 'syz.2.666': attribute type 10 has an invalid length. [ 350.111093][ T9380] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 350.209111][ T9381] team0: Port device wlan1 added [ 351.845918][ T9416] FAULT_INJECTION: forcing a failure. [ 351.845918][ T9416] name failslab, interval 1, probability 0, space 0, times 0 [ 351.864572][ T9416] CPU: 1 PID: 9416 Comm: syz.5.675 Not tainted syzkaller #0 [ 351.872532][ T9416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 351.882722][ T9416] Call Trace: [ 351.886059][ T9416] [ 351.889276][ T9416] dump_stack_lvl+0x18c/0x250 [ 351.894186][ T9416] ? show_regs_print_info+0x20/0x20 [ 351.899423][ T9416] ? load_image+0x400/0x400 [ 351.903970][ T9416] ? __might_sleep+0xe0/0xe0 [ 351.908783][ T9416] ? __lock_acquire+0x7d40/0x7d40 [ 351.913942][ T9416] should_fail_ex+0x39d/0x4d0 [ 351.918831][ T9416] should_failslab+0x9/0x20 [ 351.923606][ T9416] slab_pre_alloc_hook+0x59/0x310 [ 351.928675][ T9416] ? bpf_prog_test_run_skb+0x238/0x12b0 [ 351.934250][ T9416] ? bpf_prog_test_run_skb+0x238/0x12b0 [ 351.939919][ T9416] __kmem_cache_alloc_node+0x53/0x250 [ 351.945489][ T9416] ? bpf_prog_test_run_skb+0x238/0x12b0 [ 351.951140][ T9416] __kmalloc+0xa4/0x230 [ 351.955322][ T9416] bpf_prog_test_run_skb+0x238/0x12b0 [ 351.960713][ T9416] ? lockdep_hardirqs_on+0x98/0x150 [ 351.966103][ T9416] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 351.972359][ T9416] ? cpu_online+0x60/0x60 [ 351.976702][ T9416] ? cpu_online+0x60/0x60 [ 351.981046][ T9416] bpf_prog_test_run+0x321/0x390 [ 351.986010][ T9416] __sys_bpf+0x49d/0x890 [ 351.990264][ T9416] ? bpf_link_show_fdinfo+0x390/0x390 [ 351.995750][ T9416] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 352.001935][ T9416] __x64_sys_bpf+0x7c/0x90 [ 352.006383][ T9416] do_syscall_64+0x55/0xa0 [ 352.010879][ T9416] ? clear_bhb_loop+0x40/0x90 [ 352.015655][ T9416] ? clear_bhb_loop+0x40/0x90 [ 352.020435][ T9416] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 352.026605][ T9416] RIP: 0033:0x7f914499bf79 [ 352.031035][ T9416] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 352.050765][ T9416] RSP: 002b:00007f91458f9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 352.059218][ T9416] RAX: ffffffffffffffda RBX: 00007f9144c15fa0 RCX: 00007f914499bf79 [ 352.067294][ T9416] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 352.075571][ T9416] RBP: 00007f91458f9090 R08: 0000000000000000 R09: 0000000000000000 [ 352.083670][ T9416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 352.091763][ T9416] R13: 00007f9144c16038 R14: 00007f9144c15fa0 R15: 00007fff6ca96498 [ 352.099779][ T9416] [ 352.126632][ T9422] netlink: 60 bytes leftover after parsing attributes in process `syz.1.673'. [ 352.875183][ T9436] netlink: 'syz.4.677': attribute type 10 has an invalid length. [ 354.364587][ T9436] veth0_vlan: left promiscuous mode [ 354.390097][ T9436] veth0_vlan: entered promiscuous mode [ 354.404833][ T9436] team0: Device veth0_vlan failed to register rx_handler [ 357.413815][ T9485] netlink: 60 bytes leftover after parsing attributes in process `syz.5.688'. [ 357.753118][ T9481] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 358.150648][ T9504] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 358.181035][ T9504] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 358.206558][ T9504] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 358.221037][ T9504] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 358.454745][ T9508] netlink: 'syz.5.694': attribute type 3 has an invalid length. [ 358.501127][ T9508] netlink: 201336 bytes leftover after parsing attributes in process `syz.5.694'. [ 359.323978][ T9517] delete_channel: no stack [ 359.362792][ T9517] delete_channel: no stack [ 359.921987][ T9531] netlink: 'syz.1.700': attribute type 3 has an invalid length. [ 360.010100][ T9531] netlink: 'syz.1.700': attribute type 16 has an invalid length. [ 360.073439][ T9531] netlink: 132 bytes leftover after parsing attributes in process `syz.1.700'. [ 360.148136][ T9532] netlink: 'syz.1.700': attribute type 3 has an invalid length. [ 360.199782][ T9532] netlink: 201336 bytes leftover after parsing attributes in process `syz.1.700'. [ 360.360696][ T9529] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 360.419660][ T9529] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 360.652594][ T9529] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 360.669416][ T9529] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 361.585532][ T9547] netlink: 60 bytes leftover after parsing attributes in process `syz.4.703'. [ 364.660514][ T9591] netlink: 60 bytes leftover after parsing attributes in process `syz.2.713'. [ 364.706126][ T9590] mac80211_hwsim hwsim14 O3ãc¤±: renamed from wlan1 (while UP) [ 364.912060][ T9587] netlink: 830 bytes leftover after parsing attributes in process `syz.1.714'. [ 365.098245][ T9603] netlink: 'syz.1.719': attribute type 9 has an invalid length. [ 365.106760][ T9603] netlink: 399 bytes leftover after parsing attributes in process `syz.1.719'. [ 366.029432][ T9616] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 366.986918][ T9617] syzkaller0: entered promiscuous mode [ 367.033952][ T9617] syzkaller0: entered allmulticast mode [ 370.216625][ T9652] netlink: 60 bytes leftover after parsing attributes in process `syz.1.729'. [ 374.456378][ T9692] netlink: 60 bytes leftover after parsing attributes in process `syz.2.737'. [ 374.495645][ T9692] netlink: 60 bytes leftover after parsing attributes in process `syz.2.737'. [ 374.626517][ T9692] netlink: 60 bytes leftover after parsing attributes in process `syz.2.737'. [ 374.648519][ T9697] netlink: 60 bytes leftover after parsing attributes in process `syz.2.737'. [ 374.818001][ T9704] netlink: 'syz.1.742': attribute type 29 has an invalid length. [ 374.834178][ T9704] netlink: 'syz.1.742': attribute type 29 has an invalid length. [ 375.097127][ T9714] netlink: 60 bytes leftover after parsing attributes in process `syz.4.744'. [ 378.806225][ T9771] netlink: 60 bytes leftover after parsing attributes in process `syz.1.757'. [ 378.818646][ T9767] FAULT_INJECTION: forcing a failure. [ 378.818646][ T9767] name failslab, interval 1, probability 0, space 0, times 0 [ 378.869037][ T9767] CPU: 1 PID: 9767 Comm: syz.2.758 Not tainted syzkaller #0 [ 378.876755][ T9767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 378.887292][ T9767] Call Trace: [ 378.890708][ T9767] [ 378.893763][ T9767] dump_stack_lvl+0x18c/0x250 [ 378.898505][ T9767] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 378.904797][ T9767] ? show_regs_print_info+0x20/0x20 [ 378.910053][ T9767] ? load_image+0x400/0x400 [ 378.914619][ T9767] ? kasan_check_range+0x55/0x290 [ 378.919856][ T9767] should_fail_ex+0x39d/0x4d0 [ 378.924860][ T9767] should_failslab+0x9/0x20 [ 378.929504][ T9767] slab_pre_alloc_hook+0x59/0x310 [ 378.934677][ T9767] kmem_cache_alloc_node+0x60/0x320 [ 378.940012][ T9767] ? perf_event_alloc+0x15a/0x21b0 [ 378.945194][ T9767] perf_event_alloc+0x15a/0x21b0 [ 378.950477][ T9767] ? __se_sys_perf_event_open+0x719/0x1c50 [ 378.956433][ T9767] __se_sys_perf_event_open+0x740/0x1c50 [ 378.962123][ T9767] ? perf_trace_preemptirq_template+0x269/0x330 [ 378.968531][ T9767] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 378.974333][ T9767] ? __x64_sys_perf_event_open+0x20/0xc0 [ 378.978245][ T1279] ieee802154 phy0 wpan0: encryption failed: -22 [ 378.979999][ T9767] do_syscall_64+0x55/0xa0 [ 378.986322][ T1279] ieee802154 phy1 wpan1: encryption failed: -22 [ 378.990645][ T9767] ? clear_bhb_loop+0x40/0x90 [ 379.001615][ T9767] ? clear_bhb_loop+0x40/0x90 [ 379.006370][ T9767] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 379.012304][ T9767] RIP: 0033:0x7f77ec19bf79 [ 379.016840][ T9767] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 379.036838][ T9767] RSP: 002b:00007f77ed0d0028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 379.045355][ T9767] RAX: ffffffffffffffda RBX: 00007f77ec415fa0 RCX: 00007f77ec19bf79 [ 379.053820][ T9767] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000200000000540 [ 379.062116][ T9767] RBP: 00007f77ed0d0090 R08: 000000000000000b R09: 0000000000000000 [ 379.070304][ T9767] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 379.078477][ T9767] R13: 00007f77ec416038 R14: 00007f77ec415fa0 R15: 00007ffd960b6078 [ 379.086568][ T9767] [ 382.990745][ T9801] syzkaller0: entered promiscuous mode [ 383.023282][ T9801] syzkaller0: entered allmulticast mode [ 383.839841][ T9815] netlink: 60 bytes leftover after parsing attributes in process `syz.2.769'. [ 388.233721][ T9877] netlink: 60 bytes leftover after parsing attributes in process `syz.1.782'. [ 388.944669][ T9894] netlink: 'syz.2.786': attribute type 2 has an invalid length. [ 388.955045][ T9894] netlink: 212408 bytes leftover after parsing attributes in process `syz.2.786'. [ 388.974150][ T9895] netlink: 'syz.2.786': attribute type 2 has an invalid length. [ 388.999606][ T9895] netlink: 212408 bytes leftover after parsing attributes in process `syz.2.786'. [ 391.737943][ T9910] FAULT_INJECTION: forcing a failure. [ 391.737943][ T9910] name failslab, interval 1, probability 0, space 0, times 0 [ 391.751573][ T9910] CPU: 0 PID: 9910 Comm: syz.5.789 Not tainted syzkaller #0 [ 391.759091][ T9910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 391.769559][ T9910] Call Trace: [ 391.773134][ T9910] [ 391.776180][ T9910] dump_stack_lvl+0x18c/0x250 [ 391.781156][ T9910] ? show_regs_print_info+0x20/0x20 [ 391.786484][ T9910] ? load_image+0x400/0x400 [ 391.791103][ T9910] ? __might_sleep+0xe0/0xe0 [ 391.795743][ T9910] ? __lock_acquire+0x7d40/0x7d40 [ 391.800887][ T9910] should_fail_ex+0x39d/0x4d0 [ 391.805767][ T9910] should_failslab+0x9/0x20 [ 391.810473][ T9910] slab_pre_alloc_hook+0x59/0x310 [ 391.815546][ T9910] kmem_cache_alloc_node+0x60/0x320 [ 391.820888][ T9910] ? __alloc_skb+0x103/0x2c0 [ 391.825520][ T9910] __alloc_skb+0x103/0x2c0 [ 391.829967][ T9910] tcp_stream_alloc_skb+0x3d/0x330 [ 391.835101][ T9910] tcp_sendmsg_locked+0xea4/0x4ba0 [ 391.840338][ T9910] ? verify_lock_unused+0x140/0x140 [ 391.845783][ T9910] ? verify_lock_unused+0x140/0x140 [ 391.851203][ T9910] ? tcp_set_state+0x680/0x680 [ 391.856431][ T9910] tcp_sendmsg+0x2f/0x50 [ 391.860781][ T9910] ? inet_send_prepare+0x260/0x260 [ 391.866001][ T9910] ____sys_sendmsg+0x5ba/0x960 [ 391.870957][ T9910] ? __asan_memset+0x22/0x40 [ 391.875800][ T9910] ? __sys_sendmsg_sock+0x30/0x30 [ 391.881268][ T9910] ? __import_iovec+0x5f2/0x850 [ 391.886144][ T9910] ? import_iovec+0x73/0xa0 [ 391.890774][ T9910] ___sys_sendmsg+0x2a6/0x360 [ 391.895553][ T9910] ? get_pid_task+0x20/0x1e0 [ 391.900177][ T9910] ? __sys_sendmsg+0x2a0/0x2a0 [ 391.904984][ T9910] ? __lock_acquire+0x7d40/0x7d40 [ 391.910041][ T9910] __se_sys_sendmsg+0x1c2/0x2b0 [ 391.914902][ T9910] ? __x64_sys_sendmsg+0x80/0x80 [ 391.919950][ T9910] ? lockdep_hardirqs_on+0x98/0x150 [ 391.925180][ T9910] do_syscall_64+0x55/0xa0 [ 391.929671][ T9910] ? clear_bhb_loop+0x40/0x90 [ 391.934362][ T9910] ? clear_bhb_loop+0x40/0x90 [ 391.939049][ T9910] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 391.945046][ T9910] RIP: 0033:0x7f914499bf79 [ 391.949475][ T9910] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 391.969107][ T9910] RSP: 002b:00007f91458f9028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 391.977542][ T9910] RAX: ffffffffffffffda RBX: 00007f9144c15fa0 RCX: 00007f914499bf79 [ 391.985536][ T9910] RDX: 0000000004000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 391.994251][ T9910] RBP: 00007f91458f9090 R08: 0000000000000000 R09: 0000000000000000 [ 392.002245][ T9910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 392.010411][ T9910] R13: 00007f9144c16038 R14: 00007f9144c15fa0 R15: 00007fff6ca96498 [ 392.020109][ T9910] [ 393.014492][ T9932] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.795'. [ 393.269697][ T9935] FAULT_INJECTION: forcing a failure. [ 393.269697][ T9935] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 393.305722][ T9935] CPU: 1 PID: 9935 Comm: syz.1.796 Not tainted syzkaller #0 [ 393.313266][ T9935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 393.323627][ T9935] Call Trace: [ 393.327049][ T9935] [ 393.330115][ T9935] dump_stack_lvl+0x18c/0x250 [ 393.335216][ T9935] ? show_regs_print_info+0x20/0x20 [ 393.340473][ T9935] ? load_image+0x400/0x400 [ 393.345119][ T9935] ? __might_fault+0xaa/0x120 [ 393.349838][ T9935] ? __lock_acquire+0x7d40/0x7d40 [ 393.355013][ T9935] should_fail_ex+0x39d/0x4d0 [ 393.359840][ T9935] _copy_from_user+0x2f/0xe0 [ 393.364666][ T9935] ___sys_sendmsg+0x1c7/0x360 [ 393.369402][ T9935] ? __sys_sendmsg+0x2a0/0x2a0 [ 393.374246][ T9935] ? __lock_acquire+0x7d40/0x7d40 [ 393.379447][ T9935] __se_sys_sendmsg+0x1c2/0x2b0 [ 393.384376][ T9935] ? __x64_sys_sendmsg+0x80/0x80 [ 393.389563][ T9935] do_syscall_64+0x55/0xa0 [ 393.394034][ T9935] ? clear_bhb_loop+0x40/0x90 [ 393.398788][ T9935] ? clear_bhb_loop+0x40/0x90 [ 393.403608][ T9935] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 393.409685][ T9935] RIP: 0033:0x7f6fb879bf79 [ 393.414322][ T9935] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 393.434585][ T9935] RSP: 002b:00007f6fb9715028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 393.443305][ T9935] RAX: ffffffffffffffda RBX: 00007f6fb8a15fa0 RCX: 00007f6fb879bf79 [ 393.451310][ T9935] RDX: 0000000000000000 RSI: 0000200000001b00 RDI: 000000000000000e [ 393.459732][ T9935] RBP: 00007f6fb9715090 R08: 0000000000000000 R09: 0000000000000000 [ 393.467808][ T9935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 393.475807][ T9935] R13: 00007f6fb8a16038 R14: 00007f6fb8a15fa0 R15: 00007ffe5e8932c8 [ 393.483984][ T9935] [ 394.668235][ T9964] netlink: 16178 bytes leftover after parsing attributes in process `syz.1.803'. [ 394.905003][ T9972] FAULT_INJECTION: forcing a failure. [ 394.905003][ T9972] name failslab, interval 1, probability 0, space 0, times 0 [ 394.937822][ T9972] CPU: 0 PID: 9972 Comm: syz.5.806 Not tainted syzkaller #0 [ 394.945457][ T9972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 394.955790][ T9972] Call Trace: [ 394.959099][ T9972] [ 394.962099][ T9972] dump_stack_lvl+0x18c/0x250 [ 394.967024][ T9972] ? show_regs_print_info+0x20/0x20 [ 394.972259][ T9972] ? load_image+0x400/0x400 [ 394.976815][ T9972] ? __might_sleep+0xe0/0xe0 [ 394.981513][ T9972] ? __lock_acquire+0x7d40/0x7d40 [ 394.986562][ T9972] should_fail_ex+0x39d/0x4d0 [ 394.991282][ T9972] should_failslab+0x9/0x20 [ 394.995809][ T9972] slab_pre_alloc_hook+0x59/0x310 [ 395.000942][ T9972] ? __lock_acquire+0x7d40/0x7d40 [ 395.005994][ T9972] kmem_cache_alloc_node+0x60/0x320 [ 395.011386][ T9972] ? __alloc_skb+0x103/0x2c0 [ 395.016001][ T9972] __alloc_skb+0x103/0x2c0 [ 395.020526][ T9972] netlink_sendmsg+0x66a/0xbf0 [ 395.025512][ T9972] ? netlink_getsockopt+0x590/0x590 [ 395.031098][ T9972] ? aa_sock_msg_perm+0x94/0x150 [ 395.036209][ T9972] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 395.041784][ T9972] ? security_socket_sendmsg+0x80/0xa0 [ 395.047354][ T9972] ? netlink_getsockopt+0x590/0x590 [ 395.052845][ T9972] ____sys_sendmsg+0x5ba/0x960 [ 395.057757][ T9972] ? __asan_memset+0x22/0x40 [ 395.062403][ T9972] ? __sys_sendmsg_sock+0x30/0x30 [ 395.067791][ T9972] ? __import_iovec+0x5f2/0x850 [ 395.072675][ T9972] ? import_iovec+0x73/0xa0 [ 395.077223][ T9972] ___sys_sendmsg+0x2a6/0x360 [ 395.081942][ T9972] ? get_pid_task+0x20/0x1e0 [ 395.086655][ T9972] ? __sys_sendmsg+0x2a0/0x2a0 [ 395.091462][ T9972] ? __lock_acquire+0x7d40/0x7d40 [ 395.096554][ T9972] __se_sys_sendmsg+0x1c2/0x2b0 [ 395.101630][ T9972] ? __x64_sys_sendmsg+0x80/0x80 [ 395.107047][ T9972] ? lockdep_hardirqs_on+0x98/0x150 [ 395.112443][ T9972] do_syscall_64+0x55/0xa0 [ 395.117432][ T9972] ? clear_bhb_loop+0x40/0x90 [ 395.122243][ T9972] ? clear_bhb_loop+0x40/0x90 [ 395.127064][ T9972] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 395.133103][ T9972] RIP: 0033:0x7f914499bf79 [ 395.137916][ T9972] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 395.158092][ T9972] RSP: 002b:00007f91458f9028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 395.166951][ T9972] RAX: ffffffffffffffda RBX: 00007f9144c15fa0 RCX: 00007f914499bf79 [ 395.175050][ T9972] RDX: 00000000000480d0 RSI: 00002000000003c0 RDI: 0000000000000003 [ 395.183071][ T9972] RBP: 00007f91458f9090 R08: 0000000000000000 R09: 0000000000000000 [ 395.191096][ T9972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 395.199426][ T9972] R13: 00007f9144c16038 R14: 00007f9144c15fa0 R15: 00007fff6ca96498 [ 395.207615][ T9972] [ 395.280639][ T9978] netlink: 60 bytes leftover after parsing attributes in process `syz.4.805'. [ 398.366427][T10034] netlink: 763 bytes leftover after parsing attributes in process `syz.4.819'. [ 399.298448][T10057] netlink: 60 bytes leftover after parsing attributes in process `syz.4.822'. [ 399.457545][T10062] FAULT_INJECTION: forcing a failure. [ 399.457545][T10062] name failslab, interval 1, probability 0, space 0, times 0 [ 399.475104][T10062] CPU: 0 PID: 10062 Comm: syz.2.825 Not tainted syzkaller #0 [ 399.482996][T10062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 399.493379][T10062] Call Trace: [ 399.496678][T10062] [ 399.499609][T10062] dump_stack_lvl+0x18c/0x250 [ 399.504311][T10062] ? show_regs_print_info+0x20/0x20 [ 399.509556][T10062] ? load_image+0x400/0x400 [ 399.514221][T10062] ? __might_sleep+0xe0/0xe0 [ 399.519098][T10062] ? __lock_acquire+0x7d40/0x7d40 [ 399.524254][T10062] should_fail_ex+0x39d/0x4d0 [ 399.529173][T10062] should_failslab+0x9/0x20 [ 399.533821][T10062] slab_pre_alloc_hook+0x59/0x310 [ 399.538991][T10062] ? allocate_cgrp_cset_links+0xc9/0x320 [ 399.544756][T10062] __kmem_cache_alloc_node+0x53/0x250 [ 399.550163][T10062] ? allocate_cgrp_cset_links+0xc9/0x320 [ 399.555993][T10062] kmalloc_trace+0x2a/0xe0 [ 399.560441][T10062] allocate_cgrp_cset_links+0xc9/0x320 [ 399.566193][T10062] find_css_set+0xa1e/0x15d0 [ 399.570821][T10062] ? cgroup_migrate_prepare_dst+0x6f0/0x6f0 [ 399.576839][T10062] ? mark_lock+0x94/0x320 [ 399.581203][T10062] cgroup_migrate_prepare_dst+0x130/0x6f0 [ 399.587296][T10062] cgroup_attach_task+0x5a6/0x8e0 [ 399.592508][T10062] ? proc_nr_inodes+0x230/0x230 [ 399.597468][T10062] ? cgroup_attach_task+0x25d/0x8e0 [ 399.602694][T10062] ? cgroup_migrate_execute+0xf30/0xf30 [ 399.608439][T10062] ? cgroup_attach_permissions+0x4eb/0x9d0 [ 399.614268][T10062] ? revert_creds+0xae/0xc0 [ 399.619674][T10062] __cgroup_procs_write+0x23a/0x350 [ 399.625068][T10062] cgroup_procs_write+0x27/0x50 [ 399.629935][T10062] ? cgroup_procs_next+0xa0/0xa0 [ 399.634885][T10062] cgroup_file_write+0x2c9/0x690 [ 399.639839][T10062] ? read_lock_is_recursive+0x20/0x20 [ 399.645266][T10062] ? cgroup_seqfile_stop+0xd0/0xd0 [ 399.650570][T10062] ? cgroup_seqfile_stop+0xd0/0xd0 [ 399.655915][T10062] kernfs_fop_write_iter+0x3b6/0x520 [ 399.661254][T10062] vfs_write+0x46c/0x990 [ 399.665627][T10062] ? file_end_write+0x250/0x250 [ 399.670618][T10062] ? __fget_files+0x43d/0x4b0 [ 399.675421][T10062] ? __fdget_pos+0x2a3/0x330 [ 399.680238][T10062] ? ksys_write+0x75/0x260 [ 399.684687][T10062] ksys_write+0x150/0x260 [ 399.689044][T10062] ? __ia32_sys_read+0x90/0x90 [ 399.693930][T10062] ? lockdep_hardirqs_on+0x98/0x150 [ 399.699190][T10062] do_syscall_64+0x55/0xa0 [ 399.703626][T10062] ? clear_bhb_loop+0x40/0x90 [ 399.708408][T10062] ? clear_bhb_loop+0x40/0x90 [ 399.713386][T10062] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 399.719839][T10062] RIP: 0033:0x7f77ec19bf79 [ 399.724382][T10062] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 399.744745][T10062] RSP: 002b:00007f77ed0af028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 399.753359][T10062] RAX: ffffffffffffffda RBX: 00007f77ec416090 RCX: 00007f77ec19bf79 [ 399.761459][T10062] RDX: 0000000000000012 RSI: 00002000000001c0 RDI: 0000000000000004 [ 399.769448][T10062] RBP: 00007f77ed0af090 R08: 0000000000000000 R09: 0000000000000000 [ 399.777871][T10062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 399.785873][T10062] R13: 00007f77ec416128 R14: 00007f77ec416090 R15: 00007ffd960b6078 [ 399.793991][T10062] [ 400.203216][T10075] netlink: 'syz.2.829': attribute type 21 has an invalid length. [ 400.215642][T10075] netlink: 168 bytes leftover after parsing attributes in process `syz.2.829'. [ 401.756084][T10107] netlink: 60 bytes leftover after parsing attributes in process `syz.5.836'. [ 401.767287][T10107] netlink: 60 bytes leftover after parsing attributes in process `syz.5.836'. [ 401.788394][T10107] netlink: 60 bytes leftover after parsing attributes in process `syz.5.836'. [ 401.802899][T10107] netlink: 60 bytes leftover after parsing attributes in process `syz.5.836'. [ 402.095510][T10112] netlink: 60 bytes leftover after parsing attributes in process `syz.4.837'. [ 402.756041][T10116] netlink: 'syz.5.838': attribute type 10 has an invalid length. [ 403.116355][T10130] netlink: 'syz.2.840': attribute type 10 has an invalid length. [ 403.212767][T10130] netlink: 129384 bytes leftover after parsing attributes in process `syz.2.840'. [ 403.290873][T10134] FAULT_INJECTION: forcing a failure. [ 403.290873][T10134] name failslab, interval 1, probability 0, space 0, times 0 [ 403.316402][T10134] CPU: 0 PID: 10134 Comm: syz.1.842 Not tainted syzkaller #0 [ 403.324351][T10134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 403.334727][T10134] Call Trace: [ 403.338231][T10134] [ 403.341204][T10134] dump_stack_lvl+0x18c/0x250 [ 403.346472][T10134] ? show_regs_print_info+0x20/0x20 [ 403.351856][T10134] ? load_image+0x400/0x400 [ 403.356539][T10134] ? __might_sleep+0xe0/0xe0 [ 403.361265][T10134] ? __lock_acquire+0x7d40/0x7d40 [ 403.366432][T10134] should_fail_ex+0x39d/0x4d0 [ 403.371364][T10134] should_failslab+0x9/0x20 [ 403.376010][T10134] slab_pre_alloc_hook+0x59/0x310 [ 403.381265][T10134] ? rtnl_newlink+0x10d/0x20a0 [ 403.386273][T10134] __kmem_cache_alloc_node+0x53/0x250 [ 403.391787][T10134] ? rtnl_newlink+0x10d/0x20a0 [ 403.396971][T10134] kmalloc_trace+0x2a/0xe0 [ 403.401625][T10134] ? rtnl_setlink+0x4e0/0x4e0 [ 403.406444][T10134] rtnl_newlink+0x10d/0x20a0 [ 403.411417][T10134] ? __mutex_trylock_common+0x159/0x260 [ 403.417482][T10134] ? rtnl_setlink+0x4e0/0x4e0 [ 403.422501][T10134] ? trace_raw_output_contention_end+0xd0/0xd0 [ 403.428720][T10134] ? rcu_is_watching+0x15/0xb0 [ 403.433525][T10134] ? trace_contention_end+0x39/0xe0 [ 403.438943][T10134] ? __mutex_lock+0x315/0xcc0 [ 403.444181][T10134] ? rtnetlink_rcv_msg+0x811/0xfa0 [ 403.449442][T10134] ? mutex_lock_nested+0x20/0x20 [ 403.454941][T10134] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 403.460548][T10134] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 403.465704][T10134] ? rtnl_setlink+0x4e0/0x4e0 [ 403.471058][T10134] rtnetlink_rcv_msg+0x869/0xfa0 [ 403.476117][T10134] ? lockdep_hardirqs_on+0x98/0x150 [ 403.481484][T10134] ? rtnetlink_bind+0x80/0x80 [ 403.486399][T10134] ? perf_trace_preemptirq_template+0xac/0x330 [ 403.493253][T10134] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 403.499807][T10134] ? lock_chain_count+0x20/0x20 [ 403.505512][T10134] ? __local_bh_enable_ip+0x13a/0x1c0 [ 403.510969][T10134] ? lockdep_hardirqs_on+0x98/0x150 [ 403.516317][T10134] ? __local_bh_enable_ip+0x13a/0x1c0 [ 403.522378][T10134] ? _local_bh_enable+0xa0/0xa0 [ 403.528024][T10134] ? __dev_queue_xmit+0x26b/0x36b0 [ 403.533572][T10134] ? __dev_queue_xmit+0x26b/0x36b0 [ 403.538837][T10134] ? __dev_queue_xmit+0x124f/0x36b0 [ 403.544165][T10134] ? __dev_queue_xmit+0x26b/0x36b0 [ 403.549640][T10134] ? ref_tracker_free+0x690/0x840 [ 403.555021][T10134] netlink_rcv_skb+0x241/0x4d0 [ 403.560040][T10134] ? rtnetlink_bind+0x80/0x80 [ 403.564867][T10134] ? netlink_ack+0x1180/0x1180 [ 403.569782][T10134] ? __lock_acquire+0x7d40/0x7d40 [ 403.575075][T10134] ? netlink_deliver_tap+0x2e/0x1b0 [ 403.580332][T10134] netlink_unicast+0x751/0x8d0 [ 403.585256][T10134] netlink_sendmsg+0x8d0/0xbf0 [ 403.590114][T10134] ? netlink_getsockopt+0x590/0x590 [ 403.595543][T10134] ? aa_sock_msg_perm+0x94/0x150 [ 403.600544][T10134] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 403.606038][T10134] ? security_socket_sendmsg+0x80/0xa0 [ 403.611569][T10134] ? netlink_getsockopt+0x590/0x590 [ 403.616862][T10134] ____sys_sendmsg+0x5ba/0x960 [ 403.621703][T10134] ? __asan_memset+0x22/0x40 [ 403.626519][T10134] ? __sys_sendmsg_sock+0x30/0x30 [ 403.631569][T10134] ? __import_iovec+0x5f2/0x850 [ 403.636593][T10134] ? import_iovec+0x73/0xa0 [ 403.641408][T10134] ___sys_sendmsg+0x2a6/0x360 [ 403.646210][T10134] ? get_pid_task+0x20/0x1e0 [ 403.650855][T10134] ? __sys_sendmsg+0x2a0/0x2a0 [ 403.655800][T10134] ? __lock_acquire+0x7d40/0x7d40 [ 403.661018][T10134] __se_sys_sendmsg+0x1c2/0x2b0 [ 403.666026][T10134] ? __x64_sys_sendmsg+0x80/0x80 [ 403.671150][T10134] ? lockdep_hardirqs_on+0x98/0x150 [ 403.676747][T10134] do_syscall_64+0x55/0xa0 [ 403.681374][T10134] ? clear_bhb_loop+0x40/0x90 [ 403.686172][T10134] ? clear_bhb_loop+0x40/0x90 [ 403.690892][T10134] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 403.696821][T10134] RIP: 0033:0x7f6fb879bf79 [ 403.701272][T10134] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 403.722240][T10134] RSP: 002b:00007f6fb9715028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 403.731051][T10134] RAX: ffffffffffffffda RBX: 00007f6fb8a15fa0 RCX: 00007f6fb879bf79 [ 403.739085][T10134] RDX: 0000000000000000 RSI: 0000200000000600 RDI: 0000000000000005 [ 403.747284][T10134] RBP: 00007f6fb9715090 R08: 0000000000000000 R09: 0000000000000000 [ 403.755558][T10134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 403.763832][T10134] R13: 00007f6fb8a16038 R14: 00007f6fb8a15fa0 R15: 00007ffe5e8932c8 [ 403.771977][T10134] [ 404.616341][T10153] FAULT_INJECTION: forcing a failure. [ 404.616341][T10153] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 404.635423][T10153] CPU: 1 PID: 10153 Comm: syz.2.847 Not tainted syzkaller #0 [ 404.642970][T10153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 404.653174][T10153] Call Trace: [ 404.656552][T10153] [ 404.659523][T10153] dump_stack_lvl+0x18c/0x250 [ 404.664359][T10153] ? show_regs_print_info+0x20/0x20 [ 404.669779][T10153] ? load_image+0x400/0x400 [ 404.674324][T10153] ? __might_fault+0xaa/0x120 [ 404.679037][T10153] ? __lock_acquire+0x7d40/0x7d40 [ 404.684103][T10153] should_fail_ex+0x39d/0x4d0 [ 404.689266][T10153] _copy_from_user+0x2f/0xe0 [ 404.693901][T10153] bpf_prog_test_run_xdp+0xd77/0x10e0 [ 404.699406][T10153] ? dev_put+0x80/0x80 [ 404.703500][T10153] ? dev_put+0x80/0x80 [ 404.707755][T10153] bpf_prog_test_run+0x321/0x390 [ 404.712825][T10153] __sys_bpf+0x49d/0x890 [ 404.717398][T10153] ? bpf_link_show_fdinfo+0x390/0x390 [ 404.723001][T10153] ? lock_chain_count+0x20/0x20 [ 404.727881][T10153] __x64_sys_bpf+0x7c/0x90 [ 404.732412][T10153] do_syscall_64+0x55/0xa0 [ 404.737016][T10153] ? clear_bhb_loop+0x40/0x90 [ 404.741723][T10153] ? clear_bhb_loop+0x40/0x90 [ 404.746504][T10153] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 404.752728][T10153] RIP: 0033:0x7f77ec19bf79 [ 404.757356][T10153] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 404.777436][T10153] RSP: 002b:00007f77ed0d0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 404.785980][T10153] RAX: ffffffffffffffda RBX: 00007f77ec415fa0 RCX: 00007f77ec19bf79 [ 404.794232][T10153] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 404.802318][T10153] RBP: 00007f77ed0d0090 R08: 0000000000000000 R09: 0000000000000000 [ 404.810478][T10153] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 404.818815][T10153] R13: 00007f77ec416038 R14: 00007f77ec415fa0 R15: 00007ffd960b6078 [ 404.827091][T10153] [ 405.581646][T10169] netlink: 60 bytes leftover after parsing attributes in process `syz.1.849'. [ 405.813898][T10180] FAULT_INJECTION: forcing a failure. [ 405.813898][T10180] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 405.834948][T10180] CPU: 1 PID: 10180 Comm: syz.5.853 Not tainted syzkaller #0 [ 405.842526][T10180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 405.852727][T10180] Call Trace: [ 405.856055][T10180] [ 405.859291][T10180] dump_stack_lvl+0x18c/0x250 [ 405.864090][T10180] ? show_regs_print_info+0x20/0x20 [ 405.869316][T10180] ? load_image+0x400/0x400 [ 405.873954][T10180] ? __might_fault+0xaa/0x120 [ 405.878673][T10180] ? __lock_acquire+0x7d40/0x7d40 [ 405.883842][T10180] should_fail_ex+0x39d/0x4d0 [ 405.888845][T10180] _copy_from_user+0x2f/0xe0 [ 405.893488][T10180] __sys_bpf+0x23e/0x890 [ 405.898021][T10180] ? bpf_link_show_fdinfo+0x390/0x390 [ 405.903418][T10180] ? lock_chain_count+0x20/0x20 [ 405.908288][T10180] __x64_sys_bpf+0x7c/0x90 [ 405.912904][T10180] do_syscall_64+0x55/0xa0 [ 405.917451][T10180] ? clear_bhb_loop+0x40/0x90 [ 405.922273][T10180] ? clear_bhb_loop+0x40/0x90 [ 405.927138][T10180] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 405.933237][T10180] RIP: 0033:0x7f914499bf79 [ 405.937839][T10180] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 405.957825][T10180] RSP: 002b:00007f91458f9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 405.966707][T10180] RAX: ffffffffffffffda RBX: 00007f9144c15fa0 RCX: 00007f914499bf79 [ 405.974740][T10180] RDX: 0000000000000028 RSI: 0000200000000580 RDI: 0000000000000012 [ 405.982993][T10180] RBP: 00007f91458f9090 R08: 0000000000000000 R09: 0000000000000000 [ 405.992001][T10180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 406.001651][T10180] R13: 00007f9144c16038 R14: 00007f9144c15fa0 R15: 00007fff6ca96498 [ 406.009802][T10180] [ 406.263600][T10183] delete_channel: no stack [ 407.292408][T10211] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 407.315462][T10211] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 407.333247][T10211] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 407.349335][T10211] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 407.373843][T10214] netlink: 209844 bytes leftover after parsing attributes in process `syz.2.862'. [ 407.653437][T10222] netlink: 60 bytes leftover after parsing attributes in process `syz.1.864'. [ 407.998504][T10228] netlink: 209844 bytes leftover after parsing attributes in process `syz.5.866'. [ 408.427311][T10241] FAULT_INJECTION: forcing a failure. [ 408.427311][T10241] name failslab, interval 1, probability 0, space 0, times 0 [ 408.485992][T10241] CPU: 1 PID: 10241 Comm: syz.4.870 Not tainted syzkaller #0 [ 408.493578][T10241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 408.504213][T10241] Call Trace: [ 408.507614][T10241] [ 408.510704][T10241] dump_stack_lvl+0x18c/0x250 [ 408.515427][T10241] ? show_regs_print_info+0x20/0x20 [ 408.520830][T10241] ? load_image+0x400/0x400 [ 408.525359][T10241] ? __might_sleep+0xe0/0xe0 [ 408.530061][T10241] ? __lock_acquire+0x7d40/0x7d40 [ 408.535281][T10241] should_fail_ex+0x39d/0x4d0 [ 408.540163][T10241] should_failslab+0x9/0x20 [ 408.544969][T10241] slab_pre_alloc_hook+0x59/0x310 [ 408.550138][T10241] ? __xdp_reg_mem_model+0x1e4/0x5c0 [ 408.555804][T10241] __kmem_cache_alloc_node+0x53/0x250 [ 408.561373][T10241] ? __asan_memset+0x22/0x40 [ 408.566441][T10241] ? __xdp_reg_mem_model+0x1e4/0x5c0 [ 408.572189][T10241] kmalloc_trace+0x2a/0xe0 [ 408.576647][T10241] __xdp_reg_mem_model+0x1e4/0x5c0 [ 408.581795][T10241] ? kvmalloc_node+0x70/0x180 [ 408.586496][T10241] ? kvmalloc_node+0x70/0x180 [ 408.591197][T10241] ? xdp_reg_mem_model+0x40/0x40 [ 408.596250][T10241] xdp_reg_mem_model+0x22/0x40 [ 408.601035][T10241] bpf_test_run_xdp_live+0x262/0x1b20 [ 408.606452][T10241] ? 0xffffffffa0004740 [ 408.610736][T10241] ? 0xffffffffa0004740 [ 408.615004][T10241] ? bpf_dispatcher_change_prog+0xcbf/0xf10 [ 408.620912][T10241] ? 0xffffffffa0004740 [ 408.625096][T10241] ? xdp_convert_md_to_buff+0x330/0x330 [ 408.630861][T10241] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 408.637382][T10241] ? _copy_from_user+0xa5/0xe0 [ 408.642374][T10241] ? bpf_test_init+0x119/0x140 [ 408.647265][T10241] ? xdp_convert_md_to_buff+0x5b/0x330 [ 408.652873][T10241] bpf_prog_test_run_xdp+0x7ca/0x10e0 [ 408.658401][T10241] ? dev_put+0x80/0x80 [ 408.662661][T10241] ? dev_put+0x80/0x80 [ 408.667021][T10241] bpf_prog_test_run+0x321/0x390 [ 408.672063][T10241] __sys_bpf+0x49d/0x890 [ 408.676337][T10241] ? bpf_link_show_fdinfo+0x390/0x390 [ 408.681770][T10241] ? lock_chain_count+0x20/0x20 [ 408.686842][T10241] __x64_sys_bpf+0x7c/0x90 [ 408.691371][T10241] do_syscall_64+0x55/0xa0 [ 408.695881][T10241] ? clear_bhb_loop+0x40/0x90 [ 408.700766][T10241] ? clear_bhb_loop+0x40/0x90 [ 408.705548][T10241] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 408.711456][T10241] RIP: 0033:0x7f01ebb9bf79 [ 408.715885][T10241] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 408.736110][T10241] RSP: 002b:00007f01ec999028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 408.744643][T10241] RAX: ffffffffffffffda RBX: 00007f01ebe15fa0 RCX: 00007f01ebb9bf79 [ 408.752722][T10241] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 408.761771][T10241] RBP: 00007f01ec999090 R08: 0000000000000000 R09: 0000000000000000 [ 408.769843][T10241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 408.777911][T10241] R13: 00007f01ebe16038 R14: 00007f01ebe15fa0 R15: 00007ffd4bbd04f8 [ 408.786090][T10241] [ 409.892095][T10269] netlink: 180 bytes leftover after parsing attributes in process `syz.2.875'. [ 409.993331][T10269] netlink: 208064 bytes leftover after parsing attributes in process `syz.2.875'. [ 410.155924][T10274] netlink: 60 bytes leftover after parsing attributes in process `syz.2.875'. [ 410.178107][T10274] netlink: 60 bytes leftover after parsing attributes in process `syz.2.875'. [ 410.223011][T10269] netlink: 60 bytes leftover after parsing attributes in process `syz.2.875'. [ 410.534354][T10290] syzkaller0: entered promiscuous mode [ 410.541689][T10290] syzkaller0: entered allmulticast mode [ 410.856338][T10291] netlink: 60 bytes leftover after parsing attributes in process `syz.2.878'. [ 411.138256][T10303] netlink: 4083 bytes leftover after parsing attributes in process `syz.1.882'. [ 411.937542][T10322] netlink: 'syz.4.885': attribute type 10 has an invalid length. [ 411.966717][T10322] veth0_vlan: left promiscuous mode [ 411.973070][T10322] veth0_vlan: entered promiscuous mode [ 412.015022][T10322] team0: Device veth0_vlan failed to register rx_handler [ 412.267569][T10333] netlink: 4083 bytes leftover after parsing attributes in process `syz.2.888'. [ 412.772064][T10350] netlink: 60 bytes leftover after parsing attributes in process `syz.2.891'. [ 412.917261][T10356] TCP: TCP_TX_DELAY enabled [ 415.356316][T10382] FAULT_INJECTION: forcing a failure. [ 415.356316][T10382] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 415.387893][T10382] CPU: 1 PID: 10382 Comm: syz.1.901 Not tainted syzkaller #0 [ 415.395451][T10382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 415.405996][T10382] Call Trace: [ 415.409396][T10382] [ 415.412439][T10382] dump_stack_lvl+0x18c/0x250 [ 415.417334][T10382] ? show_regs_print_info+0x20/0x20 [ 415.422782][T10382] ? load_image+0x400/0x400 [ 415.427329][T10382] ? __might_fault+0xaa/0x120 [ 415.432247][T10382] ? __lock_acquire+0x7d40/0x7d40 [ 415.437397][T10382] should_fail_ex+0x39d/0x4d0 [ 415.442598][T10382] _copy_to_user+0x2f/0xa0 [ 415.447136][T10382] bpf_test_finish+0x25a/0x650 [ 415.452366][T10382] ? convert___skb_to_skb+0x590/0x590 [ 415.457950][T10382] ? convert_skb_to___skb+0x420/0x420 [ 415.463461][T10382] ? slab_build_skb+0x25f/0x3f0 [ 415.468381][T10382] bpf_prog_test_run_skb+0xcc3/0x12b0 [ 415.474018][T10382] ? cpu_online+0x60/0x60 [ 415.478670][T10382] bpf_prog_test_run+0x321/0x390 [ 415.483737][T10382] __sys_bpf+0x49d/0x890 [ 415.488463][T10382] ? bpf_link_show_fdinfo+0x390/0x390 [ 415.494164][T10382] ? lock_chain_count+0x20/0x20 [ 415.499315][T10382] __x64_sys_bpf+0x7c/0x90 [ 415.503780][T10382] do_syscall_64+0x55/0xa0 [ 415.508229][T10382] ? clear_bhb_loop+0x40/0x90 [ 415.513027][T10382] ? clear_bhb_loop+0x40/0x90 [ 415.517861][T10382] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 415.523878][T10382] RIP: 0033:0x7f6fb879bf79 [ 415.528322][T10382] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 415.548424][T10382] RSP: 002b:00007f6fb9715028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 415.557397][T10382] RAX: ffffffffffffffda RBX: 00007f6fb8a15fa0 RCX: 00007f6fb879bf79 [ 415.565721][T10382] RDX: 0000000000000050 RSI: 0000200000002280 RDI: 000000000000000a [ 415.573813][T10382] RBP: 00007f6fb9715090 R08: 0000000000000000 R09: 0000000000000000 [ 415.581909][T10382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 415.589991][T10382] R13: 00007f6fb8a16038 R14: 00007f6fb8a15fa0 R15: 00007ffe5e8932c8 [ 415.598100][T10382] [ 416.369393][T10391] veth0_vlan: entered allmulticast mode [ 416.571985][T10391] veth0_vlan: left promiscuous mode [ 416.603628][T10391] veth0_vlan: entered promiscuous mode [ 417.201851][T10411] netlink: 60 bytes leftover after parsing attributes in process `syz.1.908'. [ 419.688395][T10470] netlink: 60 bytes leftover after parsing attributes in process `syz.1.918'. [ 420.601802][T10482] netlink: 60 bytes leftover after parsing attributes in process `syz.5.919'. [ 422.738495][T10536] netlink: 60 bytes leftover after parsing attributes in process `syz.5.931'. [ 423.119590][T10544] netlink: 60 bytes leftover after parsing attributes in process `syz.1.935'. [ 424.031819][T10551] netlink: 60 bytes leftover after parsing attributes in process `syz.5.946'. [ 424.251095][T10560] netlink: 'syz.4.938': attribute type 10 has an invalid length. [ 424.431966][T10558] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 426.457369][T10602] netlink: 60 bytes leftover after parsing attributes in process `syz.1.951'. [ 427.653560][T10630] netlink: 'syz.5.956': attribute type 10 has an invalid length. [ 428.046679][T10630] team0: Port device O3ãc¤± added [ 428.279975][T10629] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 432.019201][T10664] netlink: 60 bytes leftover after parsing attributes in process `syz.2.966'. [ 432.963865][T10683] netlink: 'syz.4.971': attribute type 7 has an invalid length. [ 433.690867][T10696] netlink: 209852 bytes leftover after parsing attributes in process `syz.5.974'. [ 434.964550][T10717] netlink: 60 bytes leftover after parsing attributes in process `syz.1.975'. [ 435.496976][T10722] netlink: 'syz.4.978': attribute type 10 has an invalid length. [ 435.504968][T10722] netlink: 40 bytes leftover after parsing attributes in process `syz.4.978'. [ 435.728274][T10722] bridge0: port 3(ipvlan1) entered blocking state [ 435.735679][T10722] bridge0: port 3(ipvlan1) entered disabled state [ 435.742338][T10722] ipvlan1: entered allmulticast mode [ 435.776387][T10722] veth0_vlan: entered allmulticast mode [ 435.806887][T10722] ipvlan1: left allmulticast mode [ 435.812170][T10722] veth0_vlan: left allmulticast mode [ 435.877749][T10722] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 436.066008][T10737] netlink: 60 bytes leftover after parsing attributes in process `syz.5.979'. [ 437.192185][T10762] netlink: 60 bytes leftover after parsing attributes in process `syz.5.983'. [ 437.417059][T10769] netlink: 'syz.2.984': attribute type 7 has an invalid length. [ 438.214889][T10777] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.988'. [ 439.858038][T10810] netlink: 60 bytes leftover after parsing attributes in process `syz.5.992'. [ 440.403040][ T1279] ieee802154 phy0 wpan0: encryption failed: -22 [ 440.410184][ T1279] ieee802154 phy1 wpan1: encryption failed: -22 [ 442.629016][T10825] netlink: 'syz.2.996': attribute type 10 has an invalid length. [ 444.251847][T10839] netlink: 209852 bytes leftover after parsing attributes in process `syz.2.1002'. [ 444.295187][T10843] netlink: 209844 bytes leftover after parsing attributes in process `syz.4.1003'. [ 445.776744][T10862] netlink: 'syz.4.1007': attribute type 21 has an invalid length. [ 445.788614][T10862] netlink: 156 bytes leftover after parsing attributes in process `syz.4.1007'. [ 446.085670][T10871] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1006'. [ 446.707200][T10875] netlink: 60 bytes leftover after parsing attributes in process `syz.4.1008'. [ 447.474549][T10880] FAULT_INJECTION: forcing a failure. [ 447.474549][T10880] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 447.491535][T10880] CPU: 0 PID: 10880 Comm: syz.1.1011 Not tainted syzkaller #0 [ 447.499143][T10880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 447.509547][T10880] Call Trace: [ 447.512959][T10880] [ 447.515919][T10880] dump_stack_lvl+0x18c/0x250 [ 447.520790][T10880] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 447.527121][T10880] ? show_regs_print_info+0x20/0x20 [ 447.532346][T10880] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 447.538709][T10880] should_fail_ex+0x39d/0x4d0 [ 447.543395][T10880] _copy_from_user+0x2f/0xe0 [ 447.548168][T10880] sock_do_ioctl+0x190/0x310 [ 447.552899][T10880] ? sock_show_fdinfo+0xb0/0xb0 [ 447.557966][T10880] sock_ioctl+0x5ba/0x7e0 [ 447.562329][T10880] ? sock_poll+0x3e0/0x3e0 [ 447.566770][T10880] ? bpf_lsm_file_ioctl+0x9/0x10 [ 447.571892][T10880] ? security_file_ioctl+0x80/0xa0 [ 447.577114][T10880] ? sock_poll+0x3e0/0x3e0 [ 447.581538][T10880] __se_sys_ioctl+0xfd/0x170 [ 447.586350][T10880] do_syscall_64+0x55/0xa0 [ 447.590797][T10880] ? clear_bhb_loop+0x40/0x90 [ 447.595837][T10880] ? clear_bhb_loop+0x40/0x90 [ 447.600535][T10880] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 447.606443][T10880] RIP: 0033:0x7f6fb879bf79 [ 447.610871][T10880] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 447.630587][T10880] RSP: 002b:00007f6fb9715028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 447.639297][T10880] RAX: ffffffffffffffda RBX: 00007f6fb8a15fa0 RCX: 00007f6fb879bf79 [ 447.647651][T10880] RDX: 0000200000000000 RSI: 0000000000008914 RDI: 0000000000000008 [ 447.655817][T10880] RBP: 00007f6fb9715090 R08: 0000000000000000 R09: 0000000000000000 [ 447.663888][T10880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 447.672058][T10880] R13: 00007f6fb8a16038 R14: 00007f6fb8a15fa0 R15: 00007ffe5e8932c8 [ 447.680057][T10880] [ 447.752148][T10882] netlink: 209852 bytes leftover after parsing attributes in process `syz.1.1012'. [ 448.510735][T10905] FAULT_INJECTION: forcing a failure. [ 448.510735][T10905] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 448.518021][T10899] netlink: 'syz.5.1016': attribute type 10 has an invalid length. [ 448.525525][T10905] CPU: 0 PID: 10905 Comm: syz.4.1017 Not tainted syzkaller #0 [ 448.540250][T10905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 448.550445][T10905] Call Trace: [ 448.553784][T10905] [ 448.556858][T10905] dump_stack_lvl+0x18c/0x250 [ 448.561777][T10905] ? show_regs_print_info+0x20/0x20 [ 448.567049][T10905] ? load_image+0x400/0x400 [ 448.571637][T10905] ? __might_fault+0xaa/0x120 [ 448.576364][T10905] ? __lock_acquire+0x7d40/0x7d40 [ 448.581717][T10905] should_fail_ex+0x39d/0x4d0 [ 448.586560][T10905] _copy_from_user+0x2f/0xe0 [ 448.591194][T10905] ____sys_sendmsg+0x2fd/0x960 [ 448.595995][T10905] ? __sys_sendmsg_sock+0x30/0x30 [ 448.601213][T10905] ? __import_iovec+0x3fa/0x850 [ 448.606104][T10905] ? import_iovec+0x73/0xa0 [ 448.610680][T10905] ___sys_sendmsg+0x2a6/0x360 [ 448.615402][T10905] ? __sys_sendmsg+0x2a0/0x2a0 [ 448.620206][T10905] ? trace_call_bpf+0xc3/0x6c0 [ 448.625037][T10905] __se_sys_sendmsg+0x1c2/0x2b0 [ 448.630564][T10905] ? __x64_sys_sendmsg+0x80/0x80 [ 448.635748][T10905] ? lockdep_hardirqs_on+0x98/0x150 [ 448.641075][T10905] do_syscall_64+0x55/0xa0 [ 448.645807][T10905] ? clear_bhb_loop+0x40/0x90 [ 448.650893][T10905] ? clear_bhb_loop+0x40/0x90 [ 448.655617][T10905] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 448.661576][T10905] RIP: 0033:0x7f01ebb9bf79 [ 448.666048][T10905] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 448.685797][T10905] RSP: 002b:00007f01ec999028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 448.694326][T10905] RAX: ffffffffffffffda RBX: 00007f01ebe15fa0 RCX: 00007f01ebb9bf79 [ 448.702401][T10905] RDX: 0000000000044004 RSI: 0000200000000280 RDI: 0000000000000003 [ 448.710676][T10905] RBP: 00007f01ec999090 R08: 0000000000000000 R09: 0000000000000000 [ 448.718826][T10905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 448.726985][T10905] R13: 00007f01ebe16038 R14: 00007f01ebe15fa0 R15: 00007ffd4bbd04f8 [ 448.735189][T10905] [ 449.057348][T10920] netlink: 209852 bytes leftover after parsing attributes in process `syz.2.1021'. [ 450.510488][T10931] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1023'. [ 451.425826][T10942] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1033'. [ 452.596539][T10966] FAULT_INJECTION: forcing a failure. [ 452.596539][T10966] name failslab, interval 1, probability 0, space 0, times 0 [ 452.611205][T10966] CPU: 0 PID: 10966 Comm: syz.4.1030 Not tainted syzkaller #0 [ 452.619102][T10966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 452.629399][T10966] Call Trace: [ 452.632884][T10966] [ 452.635862][T10966] dump_stack_lvl+0x18c/0x250 [ 452.641132][T10966] ? show_regs_print_info+0x20/0x20 [ 452.648140][T10966] ? load_image+0x400/0x400 [ 452.652809][T10966] should_fail_ex+0x39d/0x4d0 [ 452.657663][T10966] should_failslab+0x9/0x20 [ 452.662461][T10966] slab_pre_alloc_hook+0x59/0x310 [ 452.667627][T10966] kmem_cache_alloc+0x5a/0x2d0 [ 452.672531][T10966] ? __nf_conntrack_alloc+0x99/0x380 [ 452.678455][T10966] __nf_conntrack_alloc+0x99/0x380 [ 452.683627][T10966] init_conntrack+0x177/0xf10 [ 452.688386][T10966] ? early_drop+0x7f0/0x7f0 [ 452.692931][T10966] ? nf_conntrack_find_get+0x650/0x650 [ 452.698625][T10966] ? __local_bh_enable_ip+0x13a/0x1c0 [ 452.704483][T10966] ? __siphash_unaligned+0x22e/0x3a0 [ 452.709909][T10966] nf_conntrack_in+0xc06/0x15c0 [ 452.714824][T10966] ? nf_ct_pernet+0x270/0x270 [ 452.719721][T10966] ? ipt_do_table+0x2c1/0x15e0 [ 452.724516][T10966] ? ipv4_conntrack_defrag+0x29d/0x5a0 [ 452.730428][T10966] ? ipv4_conntrack_local+0x123/0x200 [ 452.736027][T10966] ? ipv4_conntrack_in+0x20/0x20 [ 452.740978][T10966] nf_hook_slow+0xbd/0x200 [ 452.745646][T10966] ? nf_hook+0x390/0x390 [ 452.750105][T10966] nf_hook+0x228/0x390 [ 452.754771][T10966] ? nf_hook+0xa2/0x390 [ 452.759041][T10966] ? __ip_local_out+0x5f0/0x5f0 [ 452.764225][T10966] ? nf_hook+0x390/0x390 [ 452.768744][T10966] ? __lock_acquire+0x7d40/0x7d40 [ 452.773824][T10966] __ip_local_out+0x4db/0x5f0 [ 452.778625][T10966] ? nf_hook+0x390/0x390 [ 452.782894][T10966] ? __ip_queue_xmit+0x5d/0x1950 [ 452.787967][T10966] __ip_queue_xmit+0xf7c/0x1950 [ 452.792886][T10966] ? __ip_queue_xmit+0x5d/0x1950 [ 452.797966][T10966] __tcp_transmit_skb+0x1cbd/0x32f0 [ 452.803221][T10966] ? __tcp_send_ack+0x5a0/0x5a0 [ 452.808573][T10966] ? tcp_fastopen_cookie_check+0x26d/0x3c0 [ 452.814689][T10966] tcp_connect+0x327a/0x5190 [ 452.819337][T10966] ? tcp_options_write+0xc70/0xc70 [ 452.824517][T10966] ? get_random_u16+0x16e/0x970 [ 452.829735][T10966] ? get_random_u16+0x513/0x970 [ 452.834700][T10966] ? __asan_memset+0x22/0x40 [ 452.839377][T10966] ? tcp_fastopen_active_should_disable+0x240/0x240 [ 452.846075][T10966] ? sk_setup_caps+0x7dc/0xa10 [ 452.851050][T10966] ? dst_release+0x72/0x1a0 [ 452.855832][T10966] tcp_v4_connect+0xfee/0x18e0 [ 452.860893][T10966] ? tcp_twsk_unique+0x990/0x990 [ 452.865978][T10966] mptcp_connect+0x449/0x640 [ 452.870605][T10966] __inet_stream_connect+0x254/0xdc0 [ 452.876024][T10966] ? inet_dgram_connect+0x360/0x360 [ 452.881346][T10966] tcp_sendmsg_fastopen+0x3a7/0x5d0 [ 452.886928][T10966] mptcp_sendmsg_fastopen+0x138/0x4d0 [ 452.892477][T10966] mptcp_sendmsg+0x14b2/0x16d0 [ 452.897966][T10966] ? __lock_acquire+0x1273/0x7d40 [ 452.903366][T10966] ? verify_lock_unused+0x140/0x140 [ 452.908596][T10966] ? aa_sk_perm+0x83c/0x970 [ 452.913226][T10966] ? aa_af_perm+0x330/0x330 [ 452.917866][T10966] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 452.924300][T10966] ? mptcp_shutdown+0x80/0x80 [ 452.929087][T10966] ? sock_rps_record_flow+0x19/0x3f0 [ 452.934541][T10966] ? inet_sendmsg+0xe9/0x2f0 [ 452.939148][T10966] ? inet_send_prepare+0x260/0x260 [ 452.944369][T10966] ____sys_sendmsg+0x5ba/0x960 [ 452.949269][T10966] ? __lock_acquire+0x7d40/0x7d40 [ 452.954350][T10966] ? __asan_memset+0x22/0x40 [ 452.959063][T10966] ? __sys_sendmsg_sock+0x30/0x30 [ 452.964275][T10966] ? __import_iovec+0x3fa/0x850 [ 452.969361][T10966] ? import_iovec+0x73/0xa0 [ 452.973978][T10966] ___sys_sendmsg+0x2a6/0x360 [ 452.978942][T10966] ? get_pid_task+0x20/0x1e0 [ 452.983671][T10966] ? __sys_sendmsg+0x2a0/0x2a0 [ 452.988510][T10966] ? __lock_acquire+0x7d40/0x7d40 [ 452.993780][T10966] __se_sys_sendmsg+0x1c2/0x2b0 [ 452.998737][T10966] ? __x64_sys_sendmsg+0x80/0x80 [ 453.003800][T10966] ? lockdep_hardirqs_on+0x98/0x150 [ 453.009190][T10966] do_syscall_64+0x55/0xa0 [ 453.013851][T10966] ? clear_bhb_loop+0x40/0x90 [ 453.018767][T10966] ? clear_bhb_loop+0x40/0x90 [ 453.023554][T10966] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 453.029647][T10966] RIP: 0033:0x7f01ebb9bf79 [ 453.034084][T10966] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 453.053991][T10966] RSP: 002b:00007f01ec999028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 453.062811][T10966] RAX: ffffffffffffffda RBX: 00007f01ebe15fa0 RCX: 00007f01ebb9bf79 [ 453.070979][T10966] RDX: 000000003406c096 RSI: 0000200000000240 RDI: 0000000000000003 [ 453.079082][T10966] RBP: 00007f01ec999090 R08: 0000000000000000 R09: 0000000000000000 [ 453.087084][T10966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 453.095265][T10966] R13: 00007f01ebe16038 R14: 00007f01ebe15fa0 R15: 00007ffd4bbd04f8 [ 453.103446][T10966] [ 453.782972][ T11] tipc: Subscription rejected, illegal request [ 453.828820][T10982] delete_channel: no stack [ 453.870046][T10980] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1035'. [ 455.622925][ C1] [ 455.622934][ C1] ================================ [ 455.622940][ C1] WARNING: inconsistent lock state [ 455.622946][ C1] syzkaller #0 Not tainted [ 455.622955][ C1] -------------------------------- [ 455.622960][ C1] inconsistent {INITIAL USE} -> {IN-NMI} usage. [ 455.622967][ C1] syz.4.1041/11000 [HC1[1]:SC0[0]:HE0:SE1] takes: [ 455.622986][ C1] ffff88802f9e58f8 (&htab->lockdep_key){....}-{2:2}, at: htab_lock_bucket+0x17d/0x300 [ 455.623034][ C1] {INITIAL USE} state was registered at: [ 455.623040][ C1] lock_acquire+0x19e/0x420 [ 455.623058][ C1] _raw_spin_lock+0x2e/0x40 [ 455.623073][ C1] htab_lock_bucket+0x17d/0x300 [ 455.623088][ C1] htab_map_update_elem+0x229/0x1040 [ 455.623102][ C1] bpf_map_update_value+0x660/0x720 [ 455.623115][ C1] map_update_elem+0x57b/0x700 [ 455.623129][ C1] __sys_bpf+0x6b5/0x890 [ 455.623143][ C1] __x64_sys_bpf+0x7c/0x90 [ 455.623156][ C1] do_syscall_64+0x55/0xa0 [ 455.623175][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 455.623190][ C1] irq event stamp: 2142 [ 455.623196][ C1] hardirqs last enabled at (2141): [] exc_debug+0xf5/0x140 [ 455.623222][ C1] hardirqs last disabled at (2142): [] exc_debug+0x73/0x140 [ 455.623245][ C1] softirqs last enabled at (1592): [] bpf_prog_load+0x1266/0x1670 [ 455.623265][ C1] softirqs last disabled at (1590): [] bpf_ksym_add+0x2d/0x340 [ 455.623285][ C1] [ 455.623285][ C1] other info that might help us debug this: [ 455.623290][ C1] Possible unsafe locking scenario: [ 455.623290][ C1] [ 455.623294][ C1] CPU0 [ 455.623297][ C1] ---- [ 455.623299][ C1] lock(&htab->lockdep_key); [ 455.623310][ C1] [ 455.623313][ C1] lock(&htab->lockdep_key); [ 455.623333][ C1] [ 455.623333][ C1] *** DEADLOCK *** [ 455.623333][ C1] [ 455.623337][ C1] no locks held by syz.4.1041/11000. [ 455.623344][ C1] [ 455.623344][ C1] stack backtrace: [ 455.623349][ C1] CPU: 1 PID: 11000 Comm: syz.4.1041 Not tainted syzkaller #0 [ 455.623364][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 455.623373][ C1] Call Trace: [ 455.623380][ C1] <#DB> [ 455.623387][ C1] dump_stack_lvl+0x18c/0x250 [ 455.623411][ C1] ? show_regs_print_info+0x20/0x20 [ 455.623437][ C1] ? print_usage_bug+0x475/0x690 [ 455.623456][ C1] ? verify_lock_unused+0x18/0x140 [ 455.623475][ C1] lock_acquire+0x2c2/0x420 [ 455.623495][ C1] ? htab_lock_bucket+0x17d/0x300 [ 455.623514][ C1] ? read_lock_is_recursive+0x20/0x20 [ 455.623530][ C1] ? lock_release+0xb5/0x8c0 [ 455.623550][ C1] ? perf_trace_lock+0xfc/0x3b0 [ 455.623575][ C1] _raw_spin_lock+0x2e/0x40 [ 455.623589][ C1] ? htab_lock_bucket+0x17d/0x300 [ 455.623606][ C1] htab_lock_bucket+0x17d/0x300 [ 455.623625][ C1] ? htab_lru_map_delete_node+0x760/0x760 [ 455.623642][ C1] ? look_up_lock_class+0x75/0x140 [ 455.623659][ C1] ? verify_lock_unused+0x18/0x140 [ 455.623678][ C1] ? jhash+0x2e8/0x740 [ 455.623696][ C1] htab_map_delete_elem+0x1a4/0x650 [ 455.623716][ C1] ? htab_map_update_elem+0x1040/0x1040 [ 455.623733][ C1] ? perf_callchain+0x220/0x220 [ 455.623754][ C1] bpf_prog_2c29ac5cdc6b1842+0x42/0x46 [ 455.623774][ C1] bpf_overflow_handler+0x1fc/0x510 [ 455.623796][ C1] ? perf_prepare_header+0x1e0/0x1e0 [ 455.623814][ C1] ? bpf_overflow_handler+0xde/0x510 [ 455.623835][ C1] ? tp_perf_event_destroy+0x20/0x20 [ 455.623861][ C1] ? __perf_event_account_interrupt+0x187/0x280 [ 455.623881][ C1] __perf_event_overflow+0x447/0x630 [ 455.623904][ C1] perf_swevent_event+0x542/0x630 [ 455.623925][ C1] ? perf_tp_event+0x1450/0x1450 [ 455.623949][ C1] perf_bp_event+0x2a7/0x380 [ 455.623971][ C1] ? perf_event_free_bpf_prog+0x120/0x120 [ 455.624007][ C1] ? lock_acquire+0x2c2/0x420 [ 455.624029][ C1] hw_breakpoint_exceptions_notify+0x23e/0x670 [ 455.624054][ C1] notifier_call_chain+0x197/0x380 [ 455.624076][ C1] ? atomic_notifier_call_chain+0x26/0x180 [ 455.624096][ C1] atomic_notifier_call_chain+0xda/0x180 [ 455.624117][ C1] notify_die+0x145/0x1a0 [ 455.624137][ C1] ? srcu_init_notifier_head+0x90/0x90 [ 455.624161][ C1] ? rcu_is_watching+0x15/0xb0 [ 455.624184][ C1] notify_debug+0x2e/0x50 [ 455.624198][ C1] exc_debug+0xde/0x140 [ 455.624222][ C1] asm_exc_debug+0x1e/0x40 [ 455.624238][ C1] RIP: 0010:rep_movs_alternative+0x4a/0x90 [ 455.624269][ C1] Code: 75 f1 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 df 83 f9 08 73 e8 eb c9 a4 c3 48 8b 06 48 89 07 48 8d 47 08 48 83 e0 f8 48 29 f8 48 01 [ 455.624284][ C1] RSP: 0018:ffffc9000b937cb8 EFLAGS: 00050202 [ 455.624298][ C1] RAX: ffffffff84295f01 RBX: 0000000000000080 RCX: 000000000000003c [ 455.624310][ C1] RDX: 0000000000000001 RSI: 0000200000000304 RDI: ffffc9000b937e24 [ 455.624321][ C1] RBP: 0000000000000008 R08: ffffc9000b937e5f R09: 1ffff92001726fcb [ 455.624339][ C1] R10: dffffc0000000000 R11: fffff52001726fcc R12: 0000200000000340 [ 455.624351][ C1] R13: 00002000000002c4 R14: ffffc9000b937de0 R15: 00002000000002c0 [ 455.624367][ C1] ? rcuref_put_slowpath+0x131/0x150 [ 455.624393][ C1] [ 455.624398][ C1] [ 455.624402][ C1] _copy_from_user+0x8b/0xe0 [ 455.624422][ C1] perf_copy_attr+0x16a/0x840 [ 455.624447][ C1] __se_sys_perf_event_open+0x11b/0x1c50 [ 455.624470][ C1] ? __ia32_sys_get_robust_list+0x110/0x110 [ 455.624489][ C1] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 455.624515][ C1] ? lock_chain_count+0x20/0x20 [ 455.624536][ C1] ? lockdep_hardirqs_on+0x98/0x150 [ 455.624551][ C1] ? __x64_sys_perf_event_open+0x20/0xc0 [ 455.624571][ C1] do_syscall_64+0x55/0xa0 [ 455.624590][ C1] ? clear_bhb_loop+0x40/0x90 [ 455.624606][ C1] ? clear_bhb_loop+0x40/0x90 [ 455.624623][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 455.624640][ C1] RIP: 0033:0x7f01ebb9bf79 [ 455.624652][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 455.624666][ C1] RSP: 002b:00007f01ec999028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 455.624681][ C1] RAX: ffffffffffffffda RBX: 00007f01ebe15fa0 RCX: 00007f01ebb9bf79 [ 455.624692][ C1] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 00002000000002c0 [ 455.624703][ C1] RBP: 00007f01ebc327e0 R08: 0000000000000000 R09: 0000000000000000 [ 455.624713][ C1] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 455.624724][ C1] R13: 00007f01ebe16038 R14: 00007f01ebe15fa0 R15: 00007ffd4bbd04f8 [ 455.624744][ C1]