last executing test programs: 3m11.342526895s ago: executing program 4 (id=34): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x541b, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r0, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = openat$cgroup_ro(r0, &(0x7f0000000640)='blkio.bfq.time_recursive\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000880)={r0, 0x20, &(0x7f0000000840)={&(0x7f0000000700)=""/82, 0x52, 0x0, &(0x7f0000000780)=""/158, 0x9e}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000940)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x0, 0xd, 0x1, 0x7, 0x0, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f00000003c0)='syzkaller\x00', 0x9, 0x8a, &(0x7f0000000500)=""/138, 0x41100, 0x41, '\x00', r1, 0x1b, r2, 0x8, &(0x7f0000000680)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000006c0)={0x0, 0x10, 0x2, 0x9}, 0x10, r3, 0x0, 0x3, &(0x7f00000008c0)=[r0, r0, r4, r0, r0], &(0x7f0000000900)=[{0x4, 0x4, 0x0, 0x8}, {0x2, 0x1}, {0x3, 0x5, 0xb, 0xc}], 0x10, 0x7, @void, @value}, 0x94) close(r0) r5 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="93430000520033d087277b9b108b4ab51c"], 0xfe33) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="1c00000018"], 0xfe33) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r6, &(0x7f0000000140)="dfcfdf9b1fbb49e7472ae97686526aeda7d652c8cb260449d897b4d4bdf8dffbc044594fef5e2bde515350a07de397c4c72bda8d2e26279e74d9ad2195c4ad7a79d961ead58d6f7589f3ce98d014f100777073fda6ccf705c9c86152ab216d76676be4cd0c4ff5863eebf5d93a23ab7f0608543cdc2dfc9debe07535145a0dcb8fed5177ea16f9fb45f8daddc049bb909484f2ea411f1be2c4516d22b782917b988aeeba36301ef3c0c2d0bb4d3d9447aa18040b3c63", &(0x7f0000000200)=""/238, 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0xb2}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x8e8b18e0215fd6c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000ac0)={{r2}, &(0x7f0000000a40), &(0x7f0000000a80)='%pB \x00'}, 0x20) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8b05, &(0x7f0000000040)={'wlan1\x00'}) 3m11.142207218s ago: executing program 4 (id=37): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003f000b05d25a806c8c6394f90324fc60100002000a000000053582c137153e3704020180fc0b09000c00", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r2}, &(0x7f0000000280), &(0x7f00000002c0)=r1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) ioctl$SIOCSIFHWADDR(r3, 0x541b, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r8, &(0x7f00000000c0), 0x12) write$cgroup_pid(r6, &(0x7f0000000040), 0x12) socket$kcm(0x2, 0x3, 0x2) socket$kcm(0x2, 0x3, 0x2) 3m10.238718721s ago: executing program 4 (id=44): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003f000b05d25a806c8c6394f90324fc60100002000a000000053582c137153e3704020180fc0b09000c00", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r2}, &(0x7f0000000280), &(0x7f00000002c0)=r1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) ioctl$SIOCSIFHWADDR(r3, 0x541b, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r8, &(0x7f00000000c0), 0x12) write$cgroup_pid(r6, &(0x7f0000000040), 0x12) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) socket$kcm(0x2, 0x3, 0x2) 3m9.374927043s ago: executing program 4 (id=49): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) r3 = socket$kcm(0x10, 0x2, 0x2) close(r3) socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) socket$kcm(0x28, 0x5, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x104101, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='/proc/1/\x00\x82q\xee\xe5\xa0\xbd\xc2\x98#YP\xee\x9c2G\xf0\x81x\x97'}, 0x30) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080), 0x10) r6 = socket$kcm(0x2, 0x200000000000001, 0x0) r7 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r7, 0x6, 0x21, &(0x7f0000000200), 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r6, 0x0, 0x408c4) 3m8.963357519s ago: executing program 4 (id=53): bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xe, 0x4, 0x8, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r1}, 0xc) 3m8.784358002s ago: executing program 4 (id=55): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x12, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x75}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x8}, 0x1e042, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f0000002800)=[{&(0x7f0000000c00)="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", 0x1ec}, {&(0x7f0000001680)="fae0835ee82c20abb86f7c287ffb04a52a0b2339a4efc8216bada6fb7f4385ead471969bdf9b82994c10898db8b0fd9a6068b87f4547eff53d6cb7b37534e44d27c79042f5c405c0ff3eaf643001000000000000008263d71ee0e5b2cb31215ded6df9c76d150aa52a4eecb94fe48e79205c96a0aab13eaa4681860576d2e32f6873b200d669e65d56bd8a4703cbea6b8c610ec158fe5f8683f7", 0x9a}], 0x2, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x10}, @multicast1}}}, @ip_retopts={{0x34, 0x0, 0x7, {[@noop, @noop, @rr={0x7, 0x17, 0x22, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @multicast2, @rand_addr, @dev]}, @generic={0x0, 0xb, "3a047e2aae56e4b9ea"}]}}}], 0x58}, 0x0) recvmsg$kcm(r2, &(0x7f0000000740)={&(0x7f0000000100)=@isdn, 0x80, &(0x7f0000000200)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1, &(0x7f0000000640)=""/206, 0xce}, 0x10002) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 2m53.721627781s ago: executing program 32 (id=55): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x12, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_fd={0x18, 0x1, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x75}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x8}, 0x1e042, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f0000002800)=[{&(0x7f0000000c00)="b107c09a5026de51ce3e8640af1a8b2d1e67f16405c3458fe41dc04ef234718d683aa3a998fa99431a9c7c6d7505b0cec633f763303666604cbb6aa4c0f995a9454dc81b079dc93b0162ac3d1a8a1b72ce18d493594b3b24bad58801007a7b1d8ab9b50c5dbef8311b2502a124913259abadf354fea31d1ce0fed5c7ac577690164d1a72748723d3eb92e3e73e3a2b7cdfaa442f9e9f8e1a711d5b988215f0f80a2eeade5a078256a41973b0b029278c20a2818628dc256a0742896c3def6e825fdf64fd33d5f584ca908c272dc04d0693decdad028feec7f76221378c185027e8695c9b07506ed46d4f8bb90883c08e85e058ece62cd797d2c01e6285c77430eec435ac9df6256e121859d8aea507ff8a9dd0694681649d44fbb937398edecbe06096df2e443af0c3f0950301e1128727ba88a063e88f90206dd5f099a1c333114b97e0e1b55106a9755e208651a8f281173d1ed31e62433a766a28c8496f00ad108672a1f6079c10588a7ffb658dd61a6efa4bfa379945659c0ebbeca3f56215413802975d89f0c0131c71169084851cddd8b367738f069955b2d3fcdeba878b6bec8240227ddb9fac4706eb62bc6540a91014cce6987ee604c5f398ae4fef3f501ebad02ba122d7769b603eaddb5f9b101f1b42a931ac50c27feb4b0c703d1b3f9e88eb569db5082957fe", 0x1ec}, {&(0x7f0000001680)="fae0835ee82c20abb86f7c287ffb04a52a0b2339a4efc8216bada6fb7f4385ead471969bdf9b82994c10898db8b0fd9a6068b87f4547eff53d6cb7b37534e44d27c79042f5c405c0ff3eaf643001000000000000008263d71ee0e5b2cb31215ded6df9c76d150aa52a4eecb94fe48e79205c96a0aab13eaa4681860576d2e32f6873b200d669e65d56bd8a4703cbea6b8c610ec158fe5f8683f7", 0x9a}], 0x2, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x10}, @multicast1}}}, @ip_retopts={{0x34, 0x0, 0x7, {[@noop, @noop, @rr={0x7, 0x17, 0x22, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @multicast2, @rand_addr, @dev]}, @generic={0x0, 0xb, "3a047e2aae56e4b9ea"}]}}}], 0x58}, 0x0) recvmsg$kcm(r2, &(0x7f0000000740)={&(0x7f0000000100)=@isdn, 0x80, &(0x7f0000000200)=[{&(0x7f0000002840)=""/4096, 0x1000}], 0x1, &(0x7f0000000640)=""/206, 0xce}, 0x10002) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 2m26.934727059s ago: executing program 5 (id=538): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="d8000000100081044e81f782db010000001d080b01008100e8fe55a1010115000600142603600e120800040000001101a80012000500014006000d30514d3afab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef6aa98516277ce06bbace8017cbec040000000000000000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4688df216265e5dbf66f282ac027812cfbd3f1aeb4edbb57a7025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40d", 0xd8}], 0x1}, 0xc000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x10, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0xf242, 0xfffffffffffffff8}, 0x0, 0xffffffffffdfffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r1, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0xe900) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b73, 0x7, @perf_config_ext={0x407fff, 0xaea}, 0x14b3d, 0x32, 0xfffffbff, 0x3, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$kcm(0x10, 0x2, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0xfffffffffffffffe, 0x9}, 0x14185, 0x20032, 0x8, 0x3, 0x2, 0x0, 0xfffa, 0x0, 0x0, 0x0, 0x2007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000001ec0)=ANY=[@ANYBLOB="004000003a00913a74067388481f9c0e0a"], 0xfe33) recvmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/111, 0x6f}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x4) close(r3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000380)={0x0, 0x0}) close(r4) 2m26.461732386s ago: executing program 5 (id=545): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001b80)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21ca0000cf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9b24be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6eab1aa7d55545a34effa077faa56d59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e59a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d0faab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0480f94306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad9433269af3be5fa6a9a5c24e392955f4e979ea13201bafe4f0f6ea508000000a0c548552b571bed5647223c78a992810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ede62fc28839b5301160ecec37e83efceefd7ca2533659edc8be05cc85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d35a142a9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b262341c5e093fd66a2946501559335781092cf8ce3c7c56cd31121624d76517fd3666276c3c0e812b28e2f30d035cee5d0e77a3c70008ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856cf24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31651e0ecea5ece8fb11a4ee288eb149f1fa33669cc8d901fa8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463baf28345bde0c195bc9f021da8f3025ee9c8e3168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262fa3f1dabeb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a4601adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cc50feeb7bfad9b7be3283b6450d014e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5671820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff2418a18217747ae442e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427a7f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d17eb0000000000000000000000fa08ad0731c4b839688b22c4da2a6b00008a1949a6ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282bffff2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae05334d5a44a020000001c0d882a564d74a7c72bf9a2152b261e58fea6d2f93589cfe261dc0410b5ccc92a5a0eab327a33431d62d2b7c75ce654d556c9e1817c1abca762ab53d40da51560351b673363652e1ecb56cfe4a746a45ab13c6014e9f361ab687d1cd1795ce9e05c817b83d76046bdb3709de5df7499a02d2f636a454b85b987580ada025d83bd7b8df28a540d5ec5537942e79f2f1ab25ea5f563bc77e4f9468bd309469880c7e34150ca886d1f9ac2f7e82dbe296c877d925c38c54cc8137b29028854b6bd57ca893927c331300e16aba792289e135589d93302fc37c73c303e383cdf8ef3f6d6265fe5ee01759d24027475c8901039a898582022bc95992b86dce0710887c8a625d9cbb897bdbfaf49a3f642a169827a9bae4fcfa5212461db000000000000e6ed75ca8fcda7ef3ee336189fef3b3ffb9f38fefc5ff39c4e69e3fa1f8b10ee97123e99b61eba065b1ad67530e7c4f11f9da7ae000002000000610101ad7f79cb9bbf64a0fc109f49fe8799fe266e2ccac80fefe750151f5ddfe51833ec65ece70e07ce8ab5d97db47da8f80000664dc0b86ae2b3ff9d4e220752a6b2f3ea9f793612386496dca5af7b8952aafa796ea7b156d19612297c63bb20e1e0469f7615f67a9218cbace38f5236821314f76302b98afa93044b83989339ca10e6ae30e70e17a82f03e915b8425e8e7a91614306d2ae0bc3550d856f2d7293672b5673d264fc886b0c8bdf436a0fcd21bf9da7bdca98e34cd6e59b0a7ce4ba1b466561aaa35448dff47bb1d7df23d467689a66"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x1001) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) 2m26.150314271s ago: executing program 5 (id=548): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x161f, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0xc8, 0x0, 0x6, 0xbe20}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) recvmsg$unix(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f00000007c0)=""/202, 0xca}, {&(0x7f00000008c0)=""/164, 0xa4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/68, 0x44}, {&(0x7f0000000b00)=""/155, 0x9b}], 0x5, &(0x7f00000006c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}, 0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080), 0x4) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r5 = openat$cgroup_devices(r4, &(0x7f0000000200)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f0000000000)={'c', ' *:* ', 'w\x00'}, 0x8) r6 = openat$cgroup_devices(r4, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f0000000140)={'b', ' *:* ', 'm\x00'}, 0x8) write$cgroup_devices(r6, &(0x7f00000000c0)={'c', ' *:* ', 'rwm\x00'}, 0xa) write$cgroup_subtree(r2, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc200b2c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa3a200007"], 0xfdef) socket$kcm(0x2, 0x5, 0x84) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000e40)={r3, &(0x7f0000000c80)="22c65779ddc66703b335b0e907cf2eb8468d4f03e00ab23df5dcea90248e60205baf43a2c007dd1e0afae2e934eb93c72e61e049f3e757e4e00b7e96ff54892ea5aaa9c61a5c5e2b6ae33603a7401f7da67cb66436ff4fe629bb00907aeb53c1d28d9e09f59e4cf4ab0d1bd1f137504c1c9d582e437bc89207d6b39bfa37f3947b585dc46051905e4157637e2c002ba53c7529304dac28bdb5906cddceb7d3bec8269eae9deb3370234d907bbab1bfc942ef492ba7698d2cdee86485c6faf67a60802b9287a5d8a2a6efb4086a248353d371d90365a590a4fd76ca2c12cec46c083be8e09c755ad2", &(0x7f0000000d80)=""/173}, 0x20) socket$kcm(0x29, 0x5, 0x0) r7 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e27, 0x0, @mcast1}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x5c8, 0x29, 0x3, "43b6a6b2aa6470440cf5fbb80cf0ed8b009f0ee0d2f9bcbd77341a94eb9b137867dc3118c2beb60753ecbadb15787b9dd2231417c3c69737aa81d63253a0c33dc0766143b9fc47150f7d3a4d06ef892c1ee3f5fa7950fe76848b97eda3a7ffabb77742d15d76eb3ebdc71d453765271c713a8cd60467930969dd45ec07fcbe0094ed6e2345bf991ccb50168d088cda1216c05fdaec64f788e6722e66e05f3256460763696ac643da6b889503566ca73b719a1045fccd8c03cc206b36137dce4e9ba7f3a5e05a2e8ce050366357e710a6b6055475dd82b2bd74c403e4de4155ba454253a4adf5559ab468e2edbea964ec4669fb486d8c5b18472fa072dea946009053b1e15140e82cc5948cf930014a87c4db296dbe76bcf37ce44cb546aad0d7653720f98f3e5a0d06081b728f62ea070b8441f86ad2c45e085e0f1f24121c1784d222f9fd41ec92e3d5a7a7e881212cfca3236b2e31855c96cf07b0b51afe3bfa61e7fae1cc7d16d15ecdc0cc80ab9442dd8e7c2ac8e74cd7045899e58f9cdd16ece2469bb37ef8ddc79a766611d067cdfb50cdc6672d707160cde9a1bc20b9c4839c2efc93c289cf58b66c7e45d66ffdab0ad89abfbd5d3781b39fd306a2d1158475aae10156688f0b41e966822dc028afd2d0f3016f967046d1077ac43e5165da2a3454a2a2e67c58f0d2c68e696c81050b7c75418527e64530e4c27ad335fc3c12701f35ae234304813649c986f11839962bbbdce29fb79fe7bce6463a28bf29d32d6db48ef4bfff8effce17d83c1bf31f7a36a1c7ea344fcf2deec357be1dc5a297e99ff0997c313b67b968fe7ecf971a109fb6e7c662ddcce04e98aa65e3a256cdd09e769251928813a1a3a6fedb0841baf49e89f44becf2b85bdff9127174f6503be0cf3b3892df6e12612c6f002b04a60c33eb297ab3f9ee16294e90dd2f3e09ca0d7d3cedabaed4d82be93f9cba7e157ffb0a4715664659147df18de6407c684e85fe7b2454c6ea05fa23140ba15a7a11750bbf45d5f848e62582c2ad96d218908d1e3ae686d3d99355d65411c4b516984b2b8859aabed132f8e5b074e46e7543b81cf1af7b48865169b644cf0c810f3eac387b43ae3b94b3171722980cdf7685e969c3f0ed033fa4f7edf12e149fb0b0207203b8c2e46d4023d21e7e6e98cc6f8c3b7b53163d8ed652b09d27180d0f2444b738c81da4191000698fd280786c5188e3ac5aefd7fce299206e410d1015448c92f3769d48cebe717a0b36fb01d1f94fac90fd665e821b45e70497b36d6123003fd89948b204802e78b141232402e7f9c5cefe215ae26f38564b34009b6d3a5069130cf45c63efd666e3a184b560e2fc12dca5e22612dabf12336b75bda73035d2d67f7deeab7aa1d73901eee8f62e906de887e04b5e59b68c50bdfe64987fbdfd8f9ab4707596b40e9bd8adf3b2aa5bd5fae10f173c160868e35c7ebc083501155372631b1c8df43accc945b663109414c8878498a216e1d840d26bddd278f47fd909c1f57e03e24852cc5849f3535206ee5ba895aafcaa90532389eb0d0ef5b321c183fbff08aa87acda39892d44d267fa3c4a53ede397f182c868ac334833279b4c42acbd431dc2df97143a7dc9d28151f2059d16e697ae95ff55753873c039e0e0cc944c46720404c9394b56001499bb09d4b06b6d7ead47485c34c4b9cfbf28accb02a97a199e39ee8bce6b0bb1e2bba69508fe0795d541ece33ea9ff6cf15ec9979b82f2d3d284a761c6f88800710b685feb000ca711d8650695f42919bae79b81ce6288a847697ffc072ea6fdfaea3b488849a080f3ab5657c372aeb5a2ea6127692bba08964f23d9e70a8e337c3aa7384e2016b008466e24c0c8d81b535a9e7fcd7ec799a486d6a4836d60972f6660dc9b88d3da365917826fe13f7fdb60991a79c7a2e25b043792ff2ec62ae6639d0a0a4d68bfee56b85b49c8d97d4daaa978de0705fbba8a8fa8df311db2f718894f8150b5300ef0f437c5eb9e3bd53a13d672dd3ab8b52c039722e5c5ae3c8cf71e5a6b9ef6102b1d"}], 0x5c8}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f91a24fc602f020f000a740100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="021300267423cc2c013510000171d619a02848c6c91dfabaa80544366210462f8dcb", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) r9 = socket$kcm(0x2, 0xf, 0x2) ioctl$SIOCSIFHWADDR(r9, 0x8916, &(0x7f0000000000)={'wlan1\x00', @random="0200ff7fffff"}) 2m25.800344566s ago: executing program 5 (id=552): socket$kcm(0xa, 0x5, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x8, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xa, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7030000070000008500000021000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2m25.424462511s ago: executing program 5 (id=559): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d080006007c09e8fe55a10a0015000500142603600e1208000f0000000401a80016002000014001000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe10000000001001000730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{}, &(0x7f0000000100), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x7, [@const={0xf, 0x0, 0x0, 0xa, 0x5}, @fwd={0x5}, @volatile={0x3, 0x0, 0x0, 0x9, 0x4}, @ptr={0xd, 0x0, 0x0, 0x2, 0x1}, @decl_tag={0x5, 0x0, 0x0, 0x11, 0x2, 0x7}]}, {0x0, [0x30, 0x71, 0x30, 0x30, 0x0]}}, &(0x7f00000004c0)=""/12, 0x5f, 0xc, 0x0, 0x432, 0x0, @void, @value}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)=@generic={&(0x7f00000005c0)='./file0\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x8, 0x8, &(0x7f0000000340)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x1}, @ringbuf_query], &(0x7f0000000900)='syzkaller\x00', 0x4, 0xc, &(0x7f00000002c0)=""/12, 0x41100, 0x1, '\x00', 0x0, @fallback=0x20, r1, 0x8, &(0x7f0000000a80)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{r2}, &(0x7f0000000700), &(0x7f0000000740)=r3, 0x2}, 0x20) 2m25.279542143s ago: executing program 5 (id=563): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x8, 0x0, 0x210e, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={&(0x7f0000000100), 0x8}, 0x14705, 0x495, 0x10, 0x5, 0x2, 0x0, 0xfffa, 0x0, 0x1, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000013850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="d2ff03076003008cb89e08f086dd", 0x0, 0xd5b2, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x2018, 0x0, 0x0, 0x8, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x200048cc) socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x90000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf54, 0x3}, 0x8224, 0x2, 0x4, 0x2, 0x2, 0x200000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{r3, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r4}, 0x4) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="5c00000010006bcd9e3fe3dc6e48aa3108000000000000000000000000000000040014000d0013000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000400008500000061000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x3, &(0x7f0000000380)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000001000000b7040000000000008500000033000000850000000800000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48c8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2m10.179917402s ago: executing program 33 (id=563): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x8, 0x0, 0x210e, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={&(0x7f0000000100), 0x8}, 0x14705, 0x495, 0x10, 0x5, 0x2, 0x0, 0xfffa, 0x0, 0x1, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000013850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="d2ff03076003008cb89e08f086dd", 0x0, 0xd5b2, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x2018, 0x0, 0x0, 0x8, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x200048cc) socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x90000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf54, 0x3}, 0x8224, 0x2, 0x4, 0x2, 0x2, 0x200000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{r3, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f00000004c0)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r4}, 0x4) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="5c00000010006bcd9e3fe3dc6e48aa3108000000000000000000000000000000040014000d0013000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000400008500000061000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x3, &(0x7f0000000380)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000001000000b7040000000000008500000033000000850000000800000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48c8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.415225365s ago: executing program 0 (id=2599): close(0x3) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x805}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffa}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000980), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) 2.308306726s ago: executing program 2 (id=2601): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)='cpu.pressure\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800, 0x8, 0x3, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) socketpair(0x2, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000380), 0x12) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@ip_ttl={{0x14}}, @ip_ttl={{0xfffffffffffffe7b}}, @ip_retopts={{0x10}}, @ip_tos_u8={{0x11, 0x2}}], 0x58}, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) 2.08648509s ago: executing program 0 (id=2603): r0 = perf_event_open(&(0x7f0000000900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x5, &(0x7f0000000040)=@framed={{0xc6, 0xa, 0x0, 0x0, 0x0, 0x63, 0x11, 0xc}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x2e) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={@fallback=r0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0, 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000480)={@ifindex=r1, r2, 0x3b, 0x20, 0x0, @void, @void, @void, @value=0xffffffffffffffff, r3}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0)={0x0, r0}, 0x8) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@o_path={&(0x7f00000001c0)='./file0\x00', 0x0, 0x4030, r0}, 0x18) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x32, '\x00', r1, @fallback=0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x10, 0x40000000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003b000b05d25a80258c6394f90424fc60100005", 0x17}], 0x1}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000001280)="b9354b27b553aeeee8ae0b0000a4df", 0x0, 0x603, 0x60000009, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.005252551s ago: executing program 3 (id=2604): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x161f, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0xc8, 0x0, 0x6, 0xbe20}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) recvmsg$unix(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000bc0)=[{0x0}, {&(0x7f00000008c0)=""/164, 0xa4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/68, 0x44}, {&(0x7f0000000b00)=""/155, 0x9b}], 0x5, &(0x7f00000006c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}, 0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080), 0x4) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r5 = openat$cgroup_devices(r4, &(0x7f0000000200)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f0000000000)={'c', ' *:* ', 'w\x00'}, 0x8) openat$cgroup_devices(r4, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f0000000140)={'b', ' *:* ', 'm\x00'}, 0x8) write$cgroup_subtree(r2, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc200b2c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa3a200007"], 0xfdef) socket$kcm(0x2, 0x5, 0x84) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000e40)={r3, &(0x7f0000000c80)="22c65779ddc66703b335b0e907cf2eb8468d4f03e00ab23df5dcea90248e60205baf43a2c007dd1e0afae2e934eb93c72e61e049f3e757e4e00b7e96ff54892ea5aaa9c61a5c5e2b6ae33603a7401f7da67cb66436ff4fe629bb00907aeb53c1d28d9e09f59e4cf4ab0d1bd1f137504c1c9d582e437bc89207d6b39bfa37f3947b585dc46051905e4157637e2c002ba53c7529304dac28bdb5906cddceb7d3bec8269eae9deb3370234d907bbab1bfc942ef492ba7698d2cdee86485c6faf67a60802b9287a5d8a2a6efb4086a248353d371d90365a590a4fd76ca2c12cec46c083be8e09c755ad2", &(0x7f0000000d80)=""/173}, 0x20) socket$kcm(0x29, 0x5, 0x0) r6 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e27, 0x0, @mcast1}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x5c8, 0x29, 0x3, "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"}], 0x5c8}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f91a24fc602f020f000a740100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="021300267423cc2c013510000171d619a02848c6c91dfabaa80544366210462f8dcb", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) r8 = socket$kcm(0x2, 0xf, 0x2) ioctl$SIOCSIFHWADDR(r8, 0x8916, &(0x7f0000000000)={'wlan1\x00', @random="0200ff7fffff"}) 1.837013303s ago: executing program 3 (id=2606): socket$kcm(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x14869}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x80, 0x0, 0x0, 0x5d34, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x4}, 0x100108, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xc, r0, 0x0) socket$kcm(0x10, 0x2, 0x10) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='task_newtask\x00'}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) close(r2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000200081054e81f782db4cb904021d080006007c09e8fe04a1180008800a00142603600e1208000f0000000406a80016c0080002400400027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0x12b}], 0x1}, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x9}, 0x21600, 0x3, 0x0, 0x0, 0x0, 0x1616}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100", @ANYRES32=0x0], 0x27) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x10}}], 0xa8}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) 1.768122514s ago: executing program 0 (id=2608): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x8000000000, 0xda}, 0x101000, 0x7, 0xfffffffb, 0x0, 0x0, 0x7, 0x200, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x1ff) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x10, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f375ffff86dd6317ce62070000000000000000431ccaf57b00000000000000000104"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="851000000000000018100000", @ANYRES32, @ANYBLOB="f0f605748aed0000000000000c00000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x804) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) (fail_nth: 5) 1.755050754s ago: executing program 2 (id=2609): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x210e, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x32, 0xfffffbff, 0x3, 0x2, 0x0, 0xfffa, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5ff, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x9006, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2f, 0xffffff99, &(0x7f0000000100)="b9ff03316844268cb89e14f086dd65e0ffff00122c00631177fbac14030a44079f03fe8000ff80000000000000000008ffff3a050b038da1880b251810a59d943be3f4aed50ea5a6b8686731cb89ef77523c899b699eeaa0eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f7ff4000000000000000000", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000380)="b101000000353b", &(0x7f0000000000), 0x0, 0x700}, 0x2c) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x6, 0x9, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x4, 0xa3, 0xb8, 0x9, 0x0, 0x0, 0x8a8, 0x6, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f00000002c0), 0xc}, 0x80, 0x200, 0x3, 0x9, 0x0, 0x3, 0x5a84, 0x0, 0xb}, r1, 0xa, r0, 0x9) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000640)=ANY=[@ANYBLOB="030000000000000000000000000000000000000084ca0dd3cb9625b33d79a467c6636fd05998aa5cac87e9fb1440d5d93f8b2bcf71fa7e107019fba4e4468df497a9ef66bd2771e99fa276daae44acebd57a174854d439d141bbb6b0725e9b7095c424197f16a28deaedc928ec415fbc6031bf6eb5e0a49fb9b039c66fecf1878e927d8c9fb97db0f012c226a575e32c781667871ccf093b086a8c3ac6f13570bb24c62e84fac00d9d8621024c15c125af32d4905bc999227f54d0415e97ec6a258f781890d85fb36285874ed1fb45e0b3ff668b15751a"]) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x400000, 0x0) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x11123, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x32, 0xfffffbff, 0x3, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$kcm(0x2, 0x200000000000001, 0x106) socket$kcm(0x10, 0xf, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000001340)=@caif=@dgm={0x25, 0x8, 0x9}, 0x80, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000300)='syz1\x00', 0x1ff) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)='%pS \x00'}, 0x20) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) r6 = openat$cgroup(r5, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r6, &(0x7f0000000340)='syz0\x00', 0x1ff) 1.149170404s ago: executing program 1 (id=2610): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001ec0)=ANY=[@ANYBLOB='\x00@\x00\x00:\x00'], 0xfe33) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="d8000000580081d34e81f782db44b904e417434509000300e8fe55a1180015000600142603600e120900210000000401a8001600a40001", 0x37}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfe33) close(r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) close(0xffffffffffffffff) socket$kcm(0x10, 0x400000002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10e, 0xb, &(0x7f0000000180), 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x1c680, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8922, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 1.125791564s ago: executing program 6 (id=2611): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="d8000000100081044e81f782db010000001d080b01008100e8fe55a1010115000600142603600e120800040000001101a80012000500014006000d30514d3afab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef6aa98516277ce06bbace8017cbec040000000000000000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4688df216265e5dbf66f282ac027812cfbd3f1aeb4edbb57a7025ccca9e00360db70100000040fad95667e006dcdf63951f", 0xbd}], 0x1}, 0xc000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x10, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0xf242, 0xfffffffffffffff8}, 0x0, 0xffffffffffdfffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r1, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0xe900) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b73, 0x7, @perf_config_ext={0x407fff, 0xaea}, 0x14b3d, 0x32, 0xfffffbff, 0x3, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$kcm(0x10, 0x2, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0xfffffffffffffffe, 0x9}, 0x14185, 0x20032, 0x8, 0x3, 0x2, 0x0, 0xfffa, 0x0, 0x0, 0x0, 0x2007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x6) r2 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000001ec0)=ANY=[@ANYBLOB="004000003a00913a74067388481f9c0e0a"], 0xfe33) recvmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/111, 0x6f}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x4) close(r3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000380)={0x0, 0x0}) close(r4) 1.024106865s ago: executing program 0 (id=2612): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x8000000000, 0xda}, 0x101000, 0x7, 0xfffffffb, 0x0, 0x0, 0x7, 0x200, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x1ff) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000a00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f0000000040)=@framed={{0x18, 0x8}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x1a) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000001c0)="b15dd7cf1c000004000000000000", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffdba}, 0x184, 0x200000000000000, 0x0, 0x9, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x10, r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], 0x0, 0xf4, &(0x7f0000000380)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x95, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', r4, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f375ffff86dd6317ce62070000000000000000431ccaf57b00000000000000000104"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="851000000000000018100000", @ANYRES32, @ANYBLOB="f0f605748aed0000000000000c00000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x804) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) 1.022190135s ago: executing program 2 (id=2613): close(0x3) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x805}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffa}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000980), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) 973.866526ms ago: executing program 1 (id=2614): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003f000b05d25a806c8c6394f90324fc60100002000a000000053582c137153e3704020180fc0b09000c00", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r2}, &(0x7f0000000280), &(0x7f00000002c0)=r1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) ioctl$SIOCSIFHWADDR(r3, 0x541b, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r7, &(0x7f00000000c0), 0x12) write$cgroup_pid(r5, &(0x7f0000000040), 0x12) socket$kcm(0x2, 0x3, 0x2) socket$kcm(0x2, 0x3, 0x2) 876.767117ms ago: executing program 6 (id=2615): socket$kcm(0x2, 0x2, 0x0) (async) r0 = socket$kcm(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x9, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x9, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@cgroup=r1, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@cgroup=r1, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280), 0x0, 0xb47}, 0x38) setsockopt$sock_attach_bpf(r0, 0x0, 0xa, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000640)={&(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="28000000000000000004"], 0x28}, 0x24040080) socket$kcm(0x10, 0x2, 0x0) (async) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x18, &(0x7f0000000180)=[{&(0x7f0000000040)="d80000001e0081054e81f782db4cb904021d080006007c09e8fe04a1190008800d00000003600e1208000f0000000406a80016c0080009400400027c035c0461c1d67f6f00a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42abbcbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a9410000000000000000", 0xd8}], 0x1}, 0x0) 768.046429ms ago: executing program 3 (id=2616): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x161f, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0xc8, 0x0, 0x6, 0xbe20}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) recvmsg$unix(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000bc0)=[{0x0}, {&(0x7f00000008c0)=""/164, 0xa4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/68, 0x44}, {&(0x7f0000000b00)=""/155, 0x9b}], 0x5, &(0x7f00000006c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}, 0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080), 0x4) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r5 = openat$cgroup_devices(r4, &(0x7f0000000200)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f0000000000)={'c', ' *:* ', 'w\x00'}, 0x8) openat$cgroup_devices(r4, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f0000000140)={'b', ' *:* ', 'm\x00'}, 0x8) write$cgroup_subtree(r2, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc200b2c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa3a200007"], 0xfdef) socket$kcm(0x2, 0x5, 0x84) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000e40)={r3, &(0x7f0000000c80)="22c65779ddc66703b335b0e907cf2eb8468d4f03e00ab23df5dcea90248e60205baf43a2c007dd1e0afae2e934eb93c72e61e049f3e757e4e00b7e96ff54892ea5aaa9c61a5c5e2b6ae33603a7401f7da67cb66436ff4fe629bb00907aeb53c1d28d9e09f59e4cf4ab0d1bd1f137504c1c9d582e437bc89207d6b39bfa37f3947b585dc46051905e4157637e2c002ba53c7529304dac28bdb5906cddceb7d3bec8269eae9deb3370234d907bbab1bfc942ef492ba7698d2cdee86485c6faf67a60802b9287a5d8a2a6efb4086a248353d371d90365a590a4fd76ca2c12cec46c083be8e09c755ad2", &(0x7f0000000d80)=""/173}, 0x20) socket$kcm(0x29, 0x5, 0x0) r6 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e27, 0x0, @mcast1}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x5c8, 0x29, 0x3, "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"}], 0x5c8}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f91a24fc602f020f000a740100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="021300267423cc2c013510000171d619a02848c6c91dfabaa80544366210462f8dcb", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) r8 = socket$kcm(0x2, 0xf, 0x2) ioctl$SIOCSIFHWADDR(r8, 0x8916, &(0x7f0000000000)={'wlan1\x00', @random="0200ff7fffff"}) 767.683639ms ago: executing program 2 (id=2617): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3270}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5411, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x541b, 0x0) 596.092861ms ago: executing program 6 (id=2618): r0 = perf_event_open(&(0x7f0000000900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x2c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x5, &(0x7f0000000040)=@framed={{0xc6, 0xa, 0x0, 0x0, 0x0, 0x63, 0x11, 0xc}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x2e) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={@fallback=r0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0, 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000480)={@ifindex=r1, r2, 0x3b, 0x20, 0x0, @void, @void, @void, @value=0xffffffffffffffff, r3}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0)={0x0, r0}, 0x8) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@o_path={&(0x7f00000001c0)='./file0\x00', 0x0, 0x4030, r0}, 0x18) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x32, '\x00', r1, @fallback=0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x10, 0x40000000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003b000b05d25a80258c6394f90424fc60100005000a000200053582c137153e", 0x23}], 0x1}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000001280)="b9354b27b553aeeee8ae0b0000a4df", 0x0, 0x603, 0x60000009, 0x0, 0x0, 0x0, 0x0}, 0x50) 595.632981ms ago: executing program 2 (id=2619): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x7, 0x10000}, 0x494f, 0x9, 0xfffffbff, 0x6, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x9e0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x5, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x10, 0x10, &(0x7f0000000080)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x17, &(0x7f0000000600)=ANY=[@ANYBLOB="180000001300000000000000000000001811000071beb24414ecdb70306ed3e0ee541f1ebb4dff273118", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055090100000000009500000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000bf91000000000000b7020000000000008500000005000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x7b) socket$kcm(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$inet(r3, &(0x7f0000000540)={&(0x7f00000002c0)={0x2, 0x4e20, @broadcast}, 0x10, 0x0, 0x0, &(0x7f00000003c0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x3, [{0x7, 0x2}]}]}}}], 0x18}, 0x0) socket$kcm(0x2c, 0x3, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000580)="6700000011008188040f56ecdb4cb9cca7480ef434000000e3bd6efb440009000e000a0010000000ba80010000005a8c3774fa0af3dc59a933c1e7a6d3361d83b20000319cdf5656826edaaa11032701c61ec666d482078ccebcb9a4f187f7a4e98f09cdc2649f", 0x67}], 0x1}, 0x0) 593.588891ms ago: executing program 3 (id=2620): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1000000004eea32ad0a701490c0337fed1ae8f82a8000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200), 0x6e, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/214, 0xd6}], 0x3}, 0x12120) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001740)=ANY=[@ANYBLOB="b4050000000000007910790000000000070000000000000095000000000000006edd155b4ebeec788b69647d69662ca0fa9868c08dde810dd24d15607bd7a21c3a2836d5440d656d60c57e46905a75a7e67fae2dcd8ccce7925577ce9ad3395dc39aa398addb9f95e1d3fa7753d3612ed8eb7c328bb4a786e7d58a31af32f91625d02347a5bb78ff6dca807db89197ff08f0d35e650fab"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0xf0, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14905, 0x2e, 0x6e2b, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1c00, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x3) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b7050052d6cbcae2f54c9e00000000001d0a0000000000009500000000000000"], &(0x7f00000002c0)='GPL\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2a) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='mm_shrink_slab_end\x00', r0, 0x0, 0x3}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)=@o_path={0x0, r1, 0x4000, r1}, 0x18) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc4e48aa31086b8703340000001f00000000000000040014000d000a00140000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x0) 555.022392ms ago: executing program 1 (id=2621): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x58, &(0x7f0000000200)}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}, 0x40001) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x0, &(0x7f0000000780), &(0x7f0000000100)='GPL\x00', 0x4, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) socket$kcm(0x11, 0x20000000000000a, 0x300) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x146, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 515.976972ms ago: executing program 0 (id=2622): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)='cpu.pressure\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800, 0x8, 0x3, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) socketpair(0x2, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000380), 0x12) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@ip_ttl={{0x14}}, @ip_ttl={{0xfffffffffffffe7b}}, @ip_retopts={{0x10}}, @ip_tos_u8={{0x11, 0x2}}], 0x58}, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) 427.275794ms ago: executing program 6 (id=2623): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020030000b02d25a806f8c2d94f90524fc602f1a00560a740100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x4000}, 0x0) 405.285254ms ago: executing program 1 (id=2624): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = getpid() perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1c00, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x3) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x5, 0x4, 0x2003, 0xc, 0x0, 0xffffffffffffffff, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000006c0)={r1, &(0x7f0000000600), 0x0}, 0x20) (async) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x4, [@fwd={0x3}, @enum64={0xf, 0x4, 0x0, 0x13, 0x0, 0x1, [{0x8, 0xd, 0xff}, {0xe, 0x8, 0x9}, {0x10, 0x5, 0x2}, {0x4, 0xcb, 0x6}]}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000000200)=""/111, 0x64, 0x6f, 0x0, 0xfffffffd, 0x0, @void, @value}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r3, 0x20, &(0x7f0000000400)={&(0x7f00000002c0)=""/155, 0x9b, 0x0, &(0x7f0000000380)=""/79, 0x4f}}, 0x10) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0xb) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@bloom_filter={0x1e, 0x7, 0x800, 0x4a, 0x2800, 0xffffffffffffffff, 0x8, '\x00', 0x0, r3, 0x3, 0x4, 0x2, 0x4, @void, @value, @void, @value}, 0x50) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="b400000000000000791048000000000071003100000000009500000000000000db74589d4b38cc306ac390649f72dea0e50e2317db042855d6c74ff3493c7e31e3f6c643155a8e2e01d50bc3347475750472719cc516fa14b769e7f385ba72c60242263c05ddab05e37efe81b8bffc35cdf2ac0d93263ff755d611c4cca1684b1470af6a83366aa430ad2d700b186da622d6fba70000000000000000000000000200"/173], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 296.617206ms ago: executing program 0 (id=2625): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="d8000000100081044e81f782db010000001d080b01008100e8fe55a1010115000600142603600e120800040000001101a80012000500014006000d30514d3afab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef6aa98516277ce06bbace8017cbec040000000000000000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4688df216265e5dbf66f282ac027812cfbd3f1aeb4edbb57a7025ccca9e00360db70100000040fad95667e006dcdf63951f", 0xbd}], 0x1}, 0xc000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x10, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0xf242, 0xfffffffffffffff8}, 0x0, 0xffffffffffdfffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r1, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0xe900) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b73, 0x7, @perf_config_ext={0x407fff, 0xaea}, 0x14b3d, 0x32, 0xfffffbff, 0x3, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$kcm(0x10, 0x2, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0xfffffffffffffffe, 0x9}, 0x14185, 0x20032, 0x8, 0x3, 0x2, 0x0, 0xfffa, 0x0, 0x0, 0x0, 0x2007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x6) r2 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000001ec0)=ANY=[@ANYBLOB="004000003a00913a74067388481f9c0e0a"], 0xfe33) recvmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/111, 0x6f}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x4) close(r3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000380)={0x0, 0x0}) close(r4) 224.230986ms ago: executing program 6 (id=2626): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3270}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r1, 0x0, 0x41, 0x0, 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x5411, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x5760, 0x0) 223.766357ms ago: executing program 1 (id=2627): bpf$MAP_CREATE(0x1800, &(0x7f0000001240)=@base={0xf, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x37) 199.194837ms ago: executing program 3 (id=2628): close(0x3) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x805}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffa}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) 156.898298ms ago: executing program 1 (id=2629): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x13, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x3, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@map=r3, 0x26, 0x0, 0x0, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000180)=[0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) r4 = gettid() syz_clone(0x800, &(0x7f0000000500)="2599c35eaf9e75adf3340fdfe22b4ef16eed85c3965af33cebf5e084fd0475ad491e98a5896599bc7e4ba4d835eb235f3afeea8b76e8c0e7a8d48e67383e391a77800e644f9ea156b9789095c05e698097f0aa6d02a8ff5db8f2cc78daeb3fc81b83638f2231b22e080e5807e6b2f95585d0b21ee1d5c15b73a74d86159c47db1353c7e26efca295425225dc8d11883e9e3a72bdc1060aab4282", 0x9a, &(0x7f0000000380), &(0x7f0000000440), &(0x7f00000005c0)="262a64e0ed934156814cc4af0d7189f63a61480d79bac3958759e71234406e970435585152f2d6aee817bb50f2c8a9f4da65894d6b0b87cb317e3aeadb731cdf05d852aedc0f7b97e104da4ea5e6b8f1cc651fa49801fcebab4f98905823230eb47f27dff2afca076755e11a83cb6ad50710522062067bc301b0b3fa26e26c02e7813200aab95883d023a54d87026c1a314a4ea7572727d56f20b346f6a6776129434073829b2fb5") write$cgroup_pid(r1, &(0x7f00000001c0)=r4, 0x12) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000001580)="d80000001a0081044e81f782db4cb9040a1d0800fe007c05e8fe55a115000100ff00142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e", 0xd8}], 0x1}, 0x0) syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_ro(r6, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) syz_open_procfs$namespace(r2, &(0x7f0000000100)='ns/mnt\x00') syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 48.874959ms ago: executing program 2 (id=2630): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001100)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x18000000000002a0, 0xe, 0x2f, &(0x7f0000000540)="d2ffdd934517f3e145fa02e086dd", 0x0, 0xd5b4, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 47.282499ms ago: executing program 6 (id=2631): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x161f, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0xc8, 0x0, 0x6, 0xbe20}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) recvmsg$unix(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000bc0)=[{0x0}, {&(0x7f00000008c0)=""/164, 0xa4}, {&(0x7f0000000980)=""/206, 0xce}, {&(0x7f0000000a80)=""/68, 0x44}, {&(0x7f0000000b00)=""/155, 0x9b}], 0x5, &(0x7f00000006c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}, 0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080), 0x4) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r5 = openat$cgroup_devices(r4, &(0x7f0000000200)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f0000000000)={'c', ' *:* ', 'w\x00'}, 0x8) openat$cgroup_devices(r4, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f0000000140)={'b', ' *:* ', 'm\x00'}, 0x8) write$cgroup_subtree(r2, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc200b2c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa3a200007"], 0xfdef) socket$kcm(0x2, 0x5, 0x84) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000e40)={r3, &(0x7f0000000c80)="22c65779ddc66703b335b0e907cf2eb8468d4f03e00ab23df5dcea90248e60205baf43a2c007dd1e0afae2e934eb93c72e61e049f3e757e4e00b7e96ff54892ea5aaa9c61a5c5e2b6ae33603a7401f7da67cb66436ff4fe629bb00907aeb53c1d28d9e09f59e4cf4ab0d1bd1f137504c1c9d582e437bc89207d6b39bfa37f3947b585dc46051905e4157637e2c002ba53c7529304dac28bdb5906cddceb7d3bec8269eae9deb3370234d907bbab1bfc942ef492ba7698d2cdee86485c6faf67a60802b9287a5d8a2a6efb4086a248353d371d90365a590a4fd76ca2c12cec46c083be8e09c755ad2", &(0x7f0000000d80)=""/173}, 0x20) socket$kcm(0x29, 0x5, 0x0) r6 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e27, 0x0, @mcast1}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x5c8, 0x29, 0x3, "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"}], 0x5c8}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f91a24fc602f020f000a740100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="021300267423cc2c013510000171d619a02848c6c91dfabaa80544366210462f8dcb", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) r8 = socket$kcm(0x2, 0xf, 0x2) ioctl$SIOCSIFHWADDR(r8, 0x8916, &(0x7f0000000000)={'wlan1\x00', @random="0200ff7fffff"}) 0s ago: executing program 3 (id=2632): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003f000b05d25a806c8c6394f90324fc60100002000a000000053582c137153e3704020180fc0b09000c00", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r2}, &(0x7f0000000280), &(0x7f00000002c0)=r1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) ioctl$SIOCSIFHWADDR(r3, 0x541b, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r7, &(0x7f00000000c0), 0x12) write$cgroup_pid(r5, &(0x7f0000000040), 0x12) socket$kcm(0x2, 0x3, 0x2) socket$kcm(0x2, 0x3, 0x2) kernel console output (not intermixed with test programs): 478 [ 188.622437][ T8959] [ 188.623318][ T8959] Mem-Info: [ 188.623363][ T8959] active_anon:289 inactive_anon:16131 isolated_anon:0 [ 188.623363][ T8959] active_file:5038 inactive_file:47457 isolated_file:0 [ 188.623363][ T8959] unevictable:768 dirty:269 writeback:0 [ 188.623363][ T8959] slab_reclaimable:20534 slab_unreclaimable:97144 [ 188.623363][ T8959] mapped:38790 shmem:12364 pagetables:756 bounce:0 [ 188.623363][ T8959] kernel_misc_reclaimable:0 [ 188.623363][ T8959] free:1377700 free_pcp:5305 free_cma:0 [ 188.623431][ T8959] Node 0 active_anon:1124kB inactive_anon:64016kB active_file:19956kB inactive_file:189828kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:155160kB dirty:1072kB writeback:0kB shmem:47380kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:10684kB pagetables:3024kB all_unreclaimable? no [ 188.623508][ T8959] Node 1 active_anon:32kB inactive_anon:508kB active_file:196kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:2076kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB all_unreclaimable? no [ 188.623571][ T8959] Node 0 DMA free:15360kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 188.623641][ T8959] lowmem_reserve[]: 0 2541 2542 2542 2542 [ 188.623773][ T8959] Node 0 DMA32 free:1580064kB min:34800kB low:43500kB high:52200kB reserved_highatomic:0KB active_anon:1124kB inactive_anon:64016kB active_file:19956kB inactive_file:189828kB unevictable:1536kB writepending:1072kB present:3129332kB managed:2609060kB mlocked:0kB bounce:0kB free_pcp:14748kB local_pcp:8008kB free_cma:0kB [ 188.623868][ T8959] lowmem_reserve[]: 0 0 0 0 0 [ 188.624033][ T8959] Node 0 Normal free:0kB min:12kB low:12kB high:12kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:916kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 188.624118][ T8959] lowmem_reserve[]: 0 0 0 0 0 [ 188.624246][ T8959] Node 1 Normal free:3915376kB min:55088kB low:68860kB high:82632kB reserved_highatomic:0KB active_anon:32kB inactive_anon:508kB active_file:196kB inactive_file:0kB unevictable:1536kB writepending:4kB present:4194304kB managed:4119672kB mlocked:0kB bounce:0kB free_pcp:6472kB local_pcp:4704kB free_cma:0kB [ 188.624335][ T8959] lowmem_reserve[]: 0 0 0 0 0 [ 188.624488][ T8959] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 188.624985][ T8959] Node 0 DMA32: 180*4kB (UE) 314*8kB (UME) 92*16kB (U) 176*32kB (UM) 307*64kB (UM) 48*128kB (UM) 23*256kB (UME) 6*512kB (U) 5*1024kB (UM) 3*2048kB (UME) 372*4096kB (M) = 1580064kB [ 188.625655][ T8959] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 188.626085][ T8959] Node 1 Normal: 70*4kB (UME) 29*8kB (UME) 25*16kB (UME) 171*32kB (UE) 66*64kB (UME) 22*128kB (UME) 4*256kB (UM) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 951*4096kB (ME) = 3915376kB [ 188.626773][ T8959] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 188.626824][ T8959] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 188.626894][ T8959] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 188.626943][ T8959] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 188.627015][ T8959] 64859 total pagecache pages [ 188.627041][ T8959] 0 pages in swap cache [ 188.627086][ T8959] Swap cache stats: add 0, delete 0, find 0/0 [ 188.627134][ T8959] Free swap = 124996kB [ 188.627161][ T8959] Total swap = 124996kB [ 188.627206][ T8959] 2097051 pages RAM [ 188.627232][ T8959] 0 pages HighMem/MovableOnly [ 188.627276][ T8959] 410799 pages reserved [ 188.627301][ T8959] 0 pages cma reserved [ 189.463999][ T8963] netlink: 55 bytes leftover after parsing attributes in process `syz.3.1756'. [ 189.599567][ T8971] netlink: 'syz.6.1758': attribute type 2 has an invalid length. [ 189.812310][ T8980] netlink: 14719 bytes leftover after parsing attributes in process `syz.1.1763'. [ 189.998890][ T8988] FAULT_INJECTION: forcing a failure. [ 189.998890][ T8988] name failslab, interval 1, probability 0, space 0, times 0 [ 190.031865][ T8988] CPU: 0 PID: 8988 Comm: syz.2.1769 Not tainted 5.15.182-syzkaller #0 [ 190.040048][ T8988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 190.050098][ T8988] Call Trace: [ 190.053372][ T8988] [ 190.056294][ T8988] dump_stack_lvl+0x168/0x230 [ 190.060975][ T8988] ? show_regs_print_info+0x20/0x20 [ 190.066171][ T8988] ? load_image+0x3b0/0x3b0 [ 190.070670][ T8988] ? __might_sleep+0xf0/0xf0 [ 190.075252][ T8988] ? __lock_acquire+0x7c60/0x7c60 [ 190.080267][ T8988] ? netlink_insert+0xe7c/0x11d0 [ 190.085195][ T8988] should_fail+0x38c/0x4c0 [ 190.089606][ T8988] should_failslab+0x5/0x20 [ 190.094097][ T8988] slab_pre_alloc_hook+0x51/0xc0 [ 190.099027][ T8988] kmem_cache_alloc_node+0x47/0x2d0 [ 190.104215][ T8988] ? __alloc_skb+0xf4/0x750 [ 190.109063][ T8988] __alloc_skb+0xf4/0x750 [ 190.113391][ T8988] netlink_sendmsg+0x645/0xbc0 [ 190.118151][ T8988] ? netlink_getsockopt+0x560/0x560 [ 190.123336][ T8988] ? aa_sock_msg_perm+0x94/0x150 [ 190.128271][ T8988] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 190.133548][ T8988] ? security_socket_sendmsg+0x7c/0xa0 [ 190.139006][ T8988] ? netlink_getsockopt+0x560/0x560 [ 190.144197][ T8988] ____sys_sendmsg+0x5a2/0x8c0 [ 190.148956][ T8988] ? memset+0x1e/0x40 [ 190.152933][ T8988] ? __sys_sendmsg_sock+0x30/0x30 [ 190.157950][ T8988] ? import_iovec+0x6f/0xa0 [ 190.162446][ T8988] ___sys_sendmsg+0x1f0/0x260 [ 190.167115][ T8988] ? __sys_sendmsg+0x250/0x250 [ 190.171876][ T8988] ? vfs_write+0x84d/0xd00 [ 190.176293][ T8988] ? __fdget+0x18b/0x210 [ 190.180524][ T8988] __se_sys_sendmsg+0x190/0x250 [ 190.185370][ T8988] ? __x64_sys_sendmsg+0x80/0x80 [ 190.190303][ T8988] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 190.196287][ T8988] ? trace_sys_enter+0x1f/0x80 [ 190.201038][ T8988] do_syscall_64+0x4c/0xa0 [ 190.205443][ T8988] ? clear_bhb_loop+0x15/0x70 [ 190.210106][ T8988] ? clear_bhb_loop+0x15/0x70 [ 190.214772][ T8988] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 190.220657][ T8988] RIP: 0033:0x7f3ae6f18969 [ 190.225075][ T8988] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 190.244676][ T8988] RSP: 002b:00007f3ae4d80038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 190.253080][ T8988] RAX: ffffffffffffffda RBX: 00007f3ae713ffa0 RCX: 00007f3ae6f18969 [ 190.261038][ T8988] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 190.268996][ T8988] RBP: 00007f3ae4d80090 R08: 0000000000000000 R09: 0000000000000000 [ 190.276953][ T8988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 190.284915][ T8988] R13: 0000000000000000 R14: 00007f3ae713ffa0 R15: 00007fff7ebcee58 [ 190.292880][ T8988] [ 190.878755][ T9013] netlink: 44 bytes leftover after parsing attributes in process `syz.3.1775'. [ 190.888984][ T9013] netlink: 'syz.3.1775': attribute type 3 has an invalid length. [ 191.014626][ T9019] pim6reg: tun_chr_ioctl cmd 1074025677 [ 191.052640][ T9019] pim6reg: linktype set to 778 [ 191.098839][ T9001] netlink: 55 bytes leftover after parsing attributes in process `syz.6.1771'. [ 191.420124][ T9042] netlink: 44 bytes leftover after parsing attributes in process `syz.6.1787'. [ 191.641308][ T9052] netlink: 212408 bytes leftover after parsing attributes in process `syz.6.1790'. [ 191.802782][ T9056] FAULT_INJECTION: forcing a failure. [ 191.802782][ T9056] name failslab, interval 1, probability 0, space 0, times 0 [ 191.815646][ T9056] CPU: 1 PID: 9056 Comm: syz.0.1792 Not tainted 5.15.182-syzkaller #0 [ 191.823809][ T9056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 191.833868][ T9056] Call Trace: [ 191.837144][ T9056] [ 191.840074][ T9056] dump_stack_lvl+0x168/0x230 [ 191.844747][ T9056] ? rcu_lock_release+0x5/0x20 [ 191.849516][ T9056] ? show_regs_print_info+0x20/0x20 [ 191.854734][ T9056] ? load_image+0x3b0/0x3b0 [ 191.859228][ T9056] ? rcu_lock_release+0x5/0x20 [ 191.863986][ T9056] should_fail+0x38c/0x4c0 [ 191.868404][ T9056] should_failslab+0x5/0x20 [ 191.872900][ T9056] slab_pre_alloc_hook+0x51/0xc0 [ 191.877824][ T9056] ? batadv_tt_local_add+0x455/0x1a60 [ 191.883182][ T9056] kmem_cache_alloc+0x3d/0x290 [ 191.887958][ T9056] batadv_tt_local_add+0x455/0x1a60 [ 191.893151][ T9056] ? batadv_claim_put+0x1d0/0x1d0 [ 191.898171][ T9056] ? batadv_tt_global_entry_put+0x140/0x140 [ 191.904055][ T9056] ? batadv_get_vid+0x14c/0x250 [ 191.908895][ T9056] batadv_interface_tx+0x681/0x1410 [ 191.914089][ T9056] ? batadv_softif_is_valid+0x60/0x60 [ 191.919451][ T9056] ? netif_skb_features+0x833/0xbc0 [ 191.924645][ T9056] dev_hard_start_xmit+0x2a5/0x7e0 [ 191.929751][ T9056] __dev_queue_xmit+0x19df/0x2ed0 [ 191.934858][ T9056] ? dev_queue_xmit+0x20/0x20 [ 191.939526][ T9056] ? skb_release_data+0x1b7/0x850 [ 191.944573][ T9056] __bpf_redirect+0xa46/0xee0 [ 191.949250][ T9056] bpf_clone_redirect+0x241/0x390 [ 191.954273][ T9056] bpf_prog_e97454e6a39c6b06+0x59/0xa10 [ 191.959807][ T9056] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 191.965777][ T9056] ? lock_chain_count+0x20/0x20 [ 191.970618][ T9056] ? seqcount_lockdep_reader_access+0x120/0x1c0 [ 191.976846][ T9056] ? lockdep_hardirqs_on+0x94/0x140 [ 191.982033][ T9056] ? ktime_get+0x7b/0x270 [ 191.986355][ T9056] ? seqcount_lockdep_reader_access+0x172/0x1c0 [ 191.992585][ T9056] ? ktime_get_real_ts64+0x420/0x420 [ 191.997856][ T9056] ? read_lock_is_recursive+0x10/0x10 [ 192.003218][ T9056] ? __cant_sleep+0x210/0x210 [ 192.007881][ T9056] ? ktime_get+0x247/0x270 [ 192.012304][ T9056] bpf_test_run+0x317/0x870 [ 192.016819][ T9056] ? convert___skb_to_skb+0x4c0/0x4c0 [ 192.022182][ T9056] ? eth_get_headlen+0x1f0/0x1f0 [ 192.027121][ T9056] ? __build_skb+0x1e2/0x2e0 [ 192.031702][ T9056] ? convert___skb_to_skb+0x3d/0x4c0 [ 192.036989][ T9056] bpf_prog_test_run_skb+0x9cc/0x1180 [ 192.042375][ T9056] ? cpu_online+0x60/0x60 [ 192.046698][ T9056] bpf_prog_test_run+0x31e/0x390 [ 192.051629][ T9056] __sys_bpf+0x535/0x670 [ 192.055867][ T9056] ? bpf_link_show_fdinfo+0x310/0x310 [ 192.061241][ T9056] ? vtime_user_exit+0x2dc/0x400 [ 192.066178][ T9056] __x64_sys_bpf+0x78/0x90 [ 192.070588][ T9056] do_syscall_64+0x4c/0xa0 [ 192.074995][ T9056] ? clear_bhb_loop+0x15/0x70 [ 192.079662][ T9056] ? clear_bhb_loop+0x15/0x70 [ 192.084323][ T9056] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 192.090206][ T9056] RIP: 0033:0x7fe8af925969 [ 192.094608][ T9056] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 192.114198][ T9056] RSP: 002b:00007fe8ad78d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 192.122598][ T9056] RAX: ffffffffffffffda RBX: 00007fe8afb4cfa0 RCX: 00007fe8af925969 [ 192.130555][ T9056] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 192.138510][ T9056] RBP: 00007fe8ad78d090 R08: 0000000000000000 R09: 0000000000000000 [ 192.146471][ T9056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 192.154425][ T9056] R13: 0000000000000000 R14: 00007fe8afb4cfa0 R15: 00007ffcb2db4478 [ 192.162400][ T9056] [ 192.190150][ T9061] validate_nla: 9 callbacks suppressed [ 192.190162][ T9061] netlink: 'syz.6.1793': attribute type 10 has an invalid length. [ 192.219780][ T9060] netlink: 'syz.6.1793': attribute type 10 has an invalid length. [ 192.406179][ T9063] netlink: 'syz.3.1794': attribute type 10 has an invalid length. [ 192.453539][ T9063] netlink: 55 bytes leftover after parsing attributes in process `syz.3.1794'. [ 192.633815][ T9085] netlink: 'syz.6.1800': attribute type 2 has an invalid length. [ 192.785412][ T9091] netlink: 'syz.0.1804': attribute type 2 has an invalid length. [ 192.824830][ T9091] netlink: 212408 bytes leftover after parsing attributes in process `syz.0.1804'. [ 193.387456][ T9113] FAULT_INJECTION: forcing a failure. [ 193.387456][ T9113] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 193.401070][ T9113] CPU: 0 PID: 9113 Comm: syz.6.1815 Not tainted 5.15.182-syzkaller #0 [ 193.409273][ T9113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 193.419332][ T9113] Call Trace: [ 193.422602][ T9113] [ 193.425523][ T9113] dump_stack_lvl+0x168/0x230 [ 193.430200][ T9113] ? show_regs_print_info+0x20/0x20 [ 193.435389][ T9113] ? load_image+0x3b0/0x3b0 [ 193.439884][ T9113] ? __lock_acquire+0x7c60/0x7c60 [ 193.444904][ T9113] ? bpf_test_run+0x81d/0x870 [ 193.449577][ T9113] should_fail+0x38c/0x4c0 [ 193.453994][ T9113] _copy_to_user+0x2e/0x130 [ 193.458495][ T9113] bpf_test_finish+0x1db/0x2d0 [ 193.463260][ T9113] ? convert_skb_to___skb+0x360/0x360 [ 193.468623][ T9113] ? _copy_from_user+0x111/0x170 [ 193.473552][ T9113] ? bpf_test_init+0x171/0x1b0 [ 193.478306][ T9113] ? xdp_convert_buff_to_md+0x154/0x1e0 [ 193.483843][ T9113] bpf_prog_test_run_xdp+0x640/0x930 [ 193.489127][ T9113] ? dev_put+0x70/0x70 [ 193.493199][ T9113] ? dev_put+0x70/0x70 [ 193.497258][ T9113] bpf_prog_test_run+0x31e/0x390 [ 193.502194][ T9113] __sys_bpf+0x535/0x670 [ 193.506440][ T9113] ? bpf_link_show_fdinfo+0x310/0x310 [ 193.511814][ T9113] ? vtime_user_exit+0x2dc/0x400 [ 193.516752][ T9113] __x64_sys_bpf+0x78/0x90 [ 193.521180][ T9113] do_syscall_64+0x4c/0xa0 [ 193.525681][ T9113] ? clear_bhb_loop+0x15/0x70 [ 193.530359][ T9113] ? clear_bhb_loop+0x15/0x70 [ 193.535024][ T9113] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 193.540910][ T9113] RIP: 0033:0x7feeeff30969 [ 193.545317][ T9113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 193.564908][ T9113] RSP: 002b:00007feeedd98038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 193.573305][ T9113] RAX: ffffffffffffffda RBX: 00007feef0157fa0 RCX: 00007feeeff30969 [ 193.581273][ T9113] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 000000000000000a [ 193.589250][ T9113] RBP: 00007feeedd98090 R08: 0000000000000000 R09: 0000000000000000 [ 193.597206][ T9113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 193.605163][ T9113] R13: 0000000000000000 R14: 00007feef0157fa0 R15: 00007ffd05e10008 [ 193.613130][ T9113] [ 193.630734][ T9111] netlink: 'syz.1.1813': attribute type 10 has an invalid length. [ 193.672532][ T9111] netlink: 55 bytes leftover after parsing attributes in process `syz.1.1813'. [ 193.693446][ T9122] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1816'. [ 193.775289][ T9111] batman_adv: batadv0: Interface deactivated: virt_wifi0 [ 193.831665][ T9130] netlink: 'syz.0.1820': attribute type 2 has an invalid length. [ 193.856898][ T9130] netlink: 212408 bytes leftover after parsing attributes in process `syz.0.1820'. [ 193.986057][ T1423] ieee802154 phy0 wpan0: encryption failed: -22 [ 193.992453][ T1423] ieee802154 phy1 wpan1: encryption failed: -22 [ 194.029548][ T9111] batman_adv: batadv0: Removing interface: virt_wifi0 [ 194.064726][ T9136] netlink: 'syz.6.1821': attribute type 2 has an invalid length. [ 194.299327][ T9141] device syzkaller0 entered promiscuous mode [ 194.446975][ T9146] device pim6reg1 entered promiscuous mode [ 194.506223][ T9150] netlink: 'syz.2.1826': attribute type 2 has an invalid length. [ 194.772091][ T9166] netlink: 'syz.6.1835': attribute type 2 has an invalid length. [ 194.871696][ T9171] __nla_validate_parse: 3 callbacks suppressed [ 194.871713][ T9171] netlink: 55 bytes leftover after parsing attributes in process `syz.1.1834'. [ 195.671423][ T9194] FAULT_INJECTION: forcing a failure. [ 195.671423][ T9194] name failslab, interval 1, probability 0, space 0, times 0 [ 195.699288][ T9194] CPU: 0 PID: 9194 Comm: syz.6.1845 Not tainted 5.15.182-syzkaller #0 [ 195.707465][ T9194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 195.717516][ T9194] Call Trace: [ 195.720800][ T9194] [ 195.723735][ T9194] dump_stack_lvl+0x168/0x230 [ 195.728428][ T9194] ? show_regs_print_info+0x20/0x20 [ 195.733630][ T9194] ? load_image+0x3b0/0x3b0 [ 195.738136][ T9194] ? __might_sleep+0xf0/0xf0 [ 195.742728][ T9194] ? __lock_acquire+0x7c60/0x7c60 [ 195.747751][ T9194] ? mark_lock+0x94/0x320 [ 195.752100][ T9194] should_fail+0x38c/0x4c0 [ 195.756537][ T9194] should_failslab+0x5/0x20 [ 195.761043][ T9194] slab_pre_alloc_hook+0x51/0xc0 [ 195.765986][ T9194] __kmalloc+0x6b/0x330 [ 195.770141][ T9194] ? tomoyo_realpath_from_path+0x118/0x610 [ 195.775951][ T9194] tomoyo_realpath_from_path+0x118/0x610 [ 195.781609][ T9194] tomoyo_path_number_perm+0x1d5/0x5d0 [ 195.787087][ T9194] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 195.792545][ T9194] ? perf_trace_lock+0xdf/0x370 [ 195.797449][ T9194] security_file_ioctl+0x6c/0xa0 [ 195.802414][ T9194] __se_sys_ioctl+0x48/0x170 [ 195.807005][ T9194] do_syscall_64+0x4c/0xa0 [ 195.811427][ T9194] ? clear_bhb_loop+0x15/0x70 [ 195.816107][ T9194] ? clear_bhb_loop+0x15/0x70 [ 195.820773][ T9194] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 195.826802][ T9194] RIP: 0033:0x7feeeff30969 [ 195.831229][ T9194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 195.850859][ T9194] RSP: 002b:00007feeedd98038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 195.859286][ T9194] RAX: ffffffffffffffda RBX: 00007feef0157fa0 RCX: 00007feeeff30969 [ 195.867263][ T9194] RDX: 0000200000000080 RSI: 0000000000008924 RDI: 0000000000000006 [ 195.875239][ T9194] RBP: 00007feeedd98090 R08: 0000000000000000 R09: 0000000000000000 [ 195.883212][ T9194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 195.891199][ T9194] R13: 0000000000000000 R14: 00007feef0157fa0 R15: 00007ffd05e10008 [ 195.899210][ T9194] [ 195.946528][ T9194] ERROR: Out of memory at tomoyo_realpath_from_path. [ 196.124686][ T9200] netlink: 212408 bytes leftover after parsing attributes in process `syz.2.1847'. [ 196.430192][ T9204] netlink: 55 bytes leftover after parsing attributes in process `syz.3.1848'. [ 196.632344][ T9222] syz.0.1857[9222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.634952][ T9222] syz.0.1857[9222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.919466][ T9242] netlink: 212408 bytes leftover after parsing attributes in process `syz.6.1863'. [ 196.964084][ T9239] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1862'. [ 197.118428][ T9254] FAULT_INJECTION: forcing a failure. [ 197.118428][ T9254] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 197.154766][ T9254] CPU: 1 PID: 9254 Comm: syz.6.1867 Not tainted 5.15.182-syzkaller #0 [ 197.162949][ T9254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 197.173004][ T9254] Call Trace: [ 197.176271][ T9254] [ 197.179189][ T9254] dump_stack_lvl+0x168/0x230 [ 197.183861][ T9254] ? show_regs_print_info+0x20/0x20 [ 197.189048][ T9254] ? load_image+0x3b0/0x3b0 [ 197.193537][ T9254] ? __lock_acquire+0x7c60/0x7c60 [ 197.198547][ T9254] ? __might_sleep+0xf0/0xf0 [ 197.203138][ T9254] should_fail+0x38c/0x4c0 [ 197.207551][ T9254] _copy_from_user+0x2e/0x170 [ 197.212221][ T9254] generic_map_update_batch+0x4d4/0x7c0 [ 197.217766][ T9254] ? rcu_read_unlock+0x90/0x90 [ 197.222517][ T9254] ? __fdget+0x18b/0x210 [ 197.226759][ T9254] ? rcu_read_unlock+0x90/0x90 [ 197.231507][ T9254] bpf_map_do_batch+0x466/0x600 [ 197.236353][ T9254] __sys_bpf+0x601/0x670 [ 197.240585][ T9254] ? bpf_link_show_fdinfo+0x310/0x310 [ 197.245951][ T9254] ? vtime_user_exit+0x2dc/0x400 [ 197.250879][ T9254] __x64_sys_bpf+0x78/0x90 [ 197.255282][ T9254] do_syscall_64+0x4c/0xa0 [ 197.259686][ T9254] ? clear_bhb_loop+0x15/0x70 [ 197.264347][ T9254] ? clear_bhb_loop+0x15/0x70 [ 197.269010][ T9254] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 197.274889][ T9254] RIP: 0033:0x7feeeff30969 [ 197.279291][ T9254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 197.298887][ T9254] RSP: 002b:00007feeedd98038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 197.307296][ T9254] RAX: ffffffffffffffda RBX: 00007feef0157fa0 RCX: 00007feeeff30969 [ 197.315255][ T9254] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 197.323218][ T9254] RBP: 00007feeedd98090 R08: 0000000000000000 R09: 0000000000000000 [ 197.331180][ T9254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 197.339141][ T9254] R13: 0000000000000000 R14: 00007feef0157fa0 R15: 00007ffd05e10008 [ 197.347122][ T9254] [ 197.513525][ T9258] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.522330][ T9258] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.617937][ T9261] device bridge_slave_1 left promiscuous mode [ 197.652252][ T9261] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.729154][ T9261] device bridge_slave_0 left promiscuous mode [ 197.762822][ T9261] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.813870][ T9269] sctp: [Deprecated]: syz.1.1873 (pid 9269) Use of int in max_burst socket option deprecated. [ 197.813870][ T9269] Use struct sctp_assoc_value instead [ 197.855513][ T9257] validate_nla: 6 callbacks suppressed [ 197.855554][ T9257] netlink: 'syz.0.1869': attribute type 10 has an invalid length. [ 197.883697][ T9257] netlink: 55 bytes leftover after parsing attributes in process `syz.0.1869'. [ 198.689136][ T9305] device syzkaller0 entered promiscuous mode [ 199.020816][ T9314] netlink: 'syz.1.1887': attribute type 10 has an invalid length. [ 199.060057][ T9314] netlink: 55 bytes leftover after parsing attributes in process `syz.1.1887'. [ 199.188425][ T9312] device syzkaller0 entered promiscuous mode [ 199.445259][ T9331] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1892'. [ 200.004503][ T9360] FAULT_INJECTION: forcing a failure. [ 200.004503][ T9360] name failslab, interval 1, probability 0, space 0, times 0 [ 200.069891][ T9360] CPU: 1 PID: 9360 Comm: syz.0.1902 Not tainted 5.15.182-syzkaller #0 [ 200.078082][ T9360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 200.088141][ T9360] Call Trace: [ 200.091424][ T9360] [ 200.094351][ T9360] dump_stack_lvl+0x168/0x230 [ 200.099033][ T9360] ? show_regs_print_info+0x20/0x20 [ 200.104225][ T9360] ? load_image+0x3b0/0x3b0 [ 200.108730][ T9360] ? perf_trace_lock+0xdf/0x370 [ 200.113581][ T9360] ? perf_trace_lock+0xdf/0x370 [ 200.118427][ T9360] should_fail+0x38c/0x4c0 [ 200.122842][ T9360] should_failslab+0x5/0x20 [ 200.127332][ T9360] slab_pre_alloc_hook+0x51/0xc0 [ 200.132258][ T9360] ? skb_clone+0x1bd/0x350 [ 200.136673][ T9360] kmem_cache_alloc+0x3d/0x290 [ 200.141431][ T9360] skb_clone+0x1bd/0x350 [ 200.145674][ T9360] __netlink_deliver_tap+0x3cd/0x7c0 [ 200.150960][ T9360] netlink_deliver_tap+0x16c/0x180 [ 200.156060][ T9360] netlink_unicast+0x757/0x920 [ 200.160822][ T9360] netlink_sendmsg+0x8ab/0xbc0 [ 200.165584][ T9360] ? netlink_getsockopt+0x560/0x560 [ 200.170776][ T9360] ? aa_sock_msg_perm+0x94/0x150 [ 200.175712][ T9360] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 200.180986][ T9360] ? security_socket_sendmsg+0x7c/0xa0 [ 200.186434][ T9360] ? netlink_getsockopt+0x560/0x560 [ 200.191621][ T9360] ____sys_sendmsg+0x5a2/0x8c0 [ 200.196390][ T9360] ? memset+0x1e/0x40 [ 200.200375][ T9360] ? __sys_sendmsg_sock+0x30/0x30 [ 200.205393][ T9360] ? import_iovec+0x6f/0xa0 [ 200.209887][ T9360] ___sys_sendmsg+0x1f0/0x260 [ 200.214558][ T9360] ? __sys_sendmsg+0x250/0x250 [ 200.219318][ T9360] ? trace_event_raw_event_lock+0x250/0x250 [ 200.225200][ T9360] ? vfs_write+0x84d/0xd00 [ 200.229619][ T9360] ? __fdget+0x18b/0x210 [ 200.233848][ T9360] __se_sys_sendmsg+0x190/0x250 [ 200.238692][ T9360] ? __x64_sys_sendmsg+0x80/0x80 [ 200.243627][ T9360] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 200.249607][ T9360] ? trace_sys_enter+0x1f/0x80 [ 200.254365][ T9360] do_syscall_64+0x4c/0xa0 [ 200.258775][ T9360] ? clear_bhb_loop+0x15/0x70 [ 200.263438][ T9360] ? clear_bhb_loop+0x15/0x70 [ 200.268102][ T9360] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 200.273988][ T9360] RIP: 0033:0x7fe8af925969 [ 200.278391][ T9360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 200.297980][ T9360] RSP: 002b:00007fe8ad76c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 200.306386][ T9360] RAX: ffffffffffffffda RBX: 00007fe8afb4d080 RCX: 00007fe8af925969 [ 200.314365][ T9360] RDX: 0000000000000000 RSI: 0000200000000940 RDI: 0000000000000006 [ 200.322325][ T9360] RBP: 00007fe8ad76c090 R08: 0000000000000000 R09: 0000000000000000 [ 200.330300][ T9360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 200.338256][ T9360] R13: 0000000000000000 R14: 00007fe8afb4d080 R15: 00007ffcb2db4478 [ 200.346235][ T9360] [ 200.466938][ T9363] netlink: 'syz.3.1903': attribute type 10 has an invalid length. [ 200.486110][ T9363] netlink: 55 bytes leftover after parsing attributes in process `syz.3.1903'. [ 200.601635][ T9366] device syzkaller0 entered promiscuous mode [ 200.645848][ T9369] FAULT_INJECTION: forcing a failure. [ 200.645848][ T9369] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 200.697724][ T9369] CPU: 1 PID: 9369 Comm: syz.6.1904 Not tainted 5.15.182-syzkaller #0 [ 200.697750][ T9373] FAULT_INJECTION: forcing a failure. [ 200.697750][ T9373] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 200.705895][ T9369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 200.705945][ T9369] Call Trace: [ 200.705953][ T9369] [ 200.705962][ T9369] dump_stack_lvl+0x168/0x230 [ 200.705995][ T9369] ? show_regs_print_info+0x20/0x20 [ 200.706021][ T9369] ? load_image+0x3b0/0x3b0 [ 200.706047][ T9369] ? __lock_acquire+0x7c60/0x7c60 [ 200.706078][ T9369] should_fail+0x38c/0x4c0 [ 200.706108][ T9369] _copy_from_iter+0x22a/0x1150 [ 200.706137][ T9369] ? rcu_is_watching+0x11/0xa0 [ 200.706163][ T9369] ? copy_mc_pipe_to_iter+0x7d0/0x7d0 [ 200.706186][ T9369] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 200.706215][ T9369] ? __check_object_size+0x30c/0x410 [ 200.706246][ T9369] skb_copy_datagram_from_iter+0xf2/0x6a0 [ 200.706281][ T9369] tun_get_user+0x1279/0x38d0 [ 200.706321][ T9369] ? tun_ring_recv+0xc30/0xc30 [ 200.706352][ T9369] ? rcu_lock_release+0x5/0x20 [ 200.706375][ T9369] ? __lock_acquire+0x7c60/0x7c60 [ 200.706403][ T9369] ? tun_get+0x1bf/0x2a0 [ 200.706433][ T9369] tun_chr_write_iter+0x112/0x1e0 [ 200.706456][ T9369] vfs_write+0x712/0xd00 [ 200.706483][ T9369] ? file_end_write+0x250/0x250 [ 200.706512][ T9369] ? __fget_files+0x40f/0x480 [ 200.706543][ T9369] ? __fdget_pos+0x1e2/0x370 [ 200.706562][ T9369] ? ksys_write+0x71/0x250 [ 200.706585][ T9369] ksys_write+0x14d/0x250 [ 200.706609][ T9369] ? __ia32_sys_read+0x80/0x80 [ 200.706635][ T9369] ? trace_sys_enter+0x1f/0x80 [ 200.706661][ T9369] do_syscall_64+0x4c/0xa0 [ 200.706681][ T9369] ? clear_bhb_loop+0x15/0x70 [ 200.706700][ T9369] ? clear_bhb_loop+0x15/0x70 [ 200.706727][ T9369] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 200.706753][ T9369] RIP: 0033:0x7feeeff30969 [ 200.706771][ T9369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 200.706789][ T9369] RSP: 002b:00007feeedd77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 200.706823][ T9369] RAX: ffffffffffffffda RBX: 00007feef0158080 RCX: 00007feeeff30969 [ 200.706838][ T9369] RDX: 000000000000fdef RSI: 0000200000000180 RDI: 0000000000000005 [ 200.706851][ T9369] RBP: 00007feeedd77090 R08: 0000000000000000 R09: 0000000000000000 [ 200.706864][ T9369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 200.706876][ T9369] R13: 0000000000000000 R14: 00007feef0158080 R15: 00007ffd05e10008 [ 200.706904][ T9369] [ 201.016637][ T9373] CPU: 0 PID: 9373 Comm: syz.2.1907 Not tainted 5.15.182-syzkaller #0 [ 201.024812][ T9373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 201.034866][ T9373] Call Trace: [ 201.038143][ T9373] [ 201.041065][ T9373] dump_stack_lvl+0x168/0x230 [ 201.045756][ T9373] ? show_regs_print_info+0x20/0x20 [ 201.050965][ T9373] ? load_image+0x3b0/0x3b0 [ 201.055472][ T9373] ? __lock_acquire+0x7c60/0x7c60 [ 201.060504][ T9373] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 201.066663][ T9373] should_fail+0x38c/0x4c0 [ 201.071102][ T9373] _copy_from_user+0x2e/0x170 [ 201.075820][ T9373] ethtool_get_strings+0x94/0x750 [ 201.080856][ T9373] ? _raw_spin_unlock_irqrestore+0xaa/0x100 [ 201.086760][ T9373] ? _raw_spin_unlock+0x40/0x40 [ 201.091619][ T9373] ? ethtool_self_test+0x390/0x390 [ 201.096731][ T9373] dev_ethtool+0x666/0xef0 [ 201.101164][ T9373] ? ethtool_get_module_eeprom_call+0x170/0x170 [ 201.107419][ T9373] ? mutex_lock_io_nested+0x60/0x60 [ 201.112618][ T9373] ? full_name_hash+0x8e/0xe0 [ 201.117308][ T9373] dev_ioctl+0x471/0xe50 [ 201.121569][ T9373] ? _copy_from_user+0x111/0x170 [ 201.126497][ T9373] sock_do_ioctl+0x222/0x2f0 [ 201.131078][ T9373] ? sock_show_fdinfo+0xb0/0xb0 [ 201.135930][ T9373] ? rcu_is_watching+0x11/0xa0 [ 201.140700][ T9373] ? lockdep_hardirqs_on+0x94/0x140 [ 201.145913][ T9373] sock_ioctl+0x4ed/0x6e0 [ 201.150249][ T9373] ? sock_poll+0x3f0/0x3f0 [ 201.154674][ T9373] ? tomoyo_path_number_perm+0x531/0x5d0 [ 201.160323][ T9373] ? bpf_lsm_file_ioctl+0x5/0x10 [ 201.165266][ T9373] ? security_file_ioctl+0x7c/0xa0 [ 201.170387][ T9373] ? sock_poll+0x3f0/0x3f0 [ 201.174812][ T9373] __se_sys_ioctl+0xfa/0x170 [ 201.179408][ T9373] do_syscall_64+0x4c/0xa0 [ 201.183835][ T9373] ? clear_bhb_loop+0x15/0x70 [ 201.188626][ T9373] ? clear_bhb_loop+0x15/0x70 [ 201.193306][ T9373] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 201.199201][ T9373] RIP: 0033:0x7f3ae6f18969 [ 201.203618][ T9373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 201.223223][ T9373] RSP: 002b:00007f3ae4d80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 201.231641][ T9373] RAX: ffffffffffffffda RBX: 00007f3ae713ffa0 RCX: 00007f3ae6f18969 [ 201.239612][ T9373] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 000000000000001c [ 201.247588][ T9373] RBP: 00007f3ae4d80090 R08: 0000000000000000 R09: 0000000000000000 [ 201.255544][ T9373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 201.263504][ T9373] R13: 0000000000000000 R14: 00007f3ae713ffa0 R15: 00007fff7ebcee58 [ 201.271500][ T9373] [ 201.402724][ T9384] netlink: 'syz.3.1909': attribute type 2 has an invalid length. [ 201.431126][ T9387] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.438388][ T9387] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.502744][ T9386] device bridge_slave_1 left promiscuous mode [ 201.555479][ T9386] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.688271][ T9400] netlink: 192440 bytes leftover after parsing attributes in process `syz.6.1914'. [ 201.706134][ T9386] device bridge_slave_0 left promiscuous mode [ 201.733388][ T9400] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 201.743184][ T9386] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.939517][ T9415] netlink: 'syz.0.1920': attribute type 10 has an invalid length. [ 201.958284][ T9415] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1920'. [ 201.990066][ T9413] netlink: 'syz.6.1919': attribute type 2 has an invalid length. [ 202.086261][ T9425] netlink: 156 bytes leftover after parsing attributes in process `syz.0.1924'. [ 202.421420][ T9440] netlink: 192440 bytes leftover after parsing attributes in process `syz.6.1930'. [ 202.443452][ T9440] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 202.663713][ T9452] netlink: 'syz.3.1933': attribute type 10 has an invalid length. [ 202.695662][ T9452] netlink: 55 bytes leftover after parsing attributes in process `syz.3.1933'. [ 202.735029][ T9451] netlink: 'syz.6.1934': attribute type 10 has an invalid length. [ 202.749222][ T9451] netlink: 40 bytes leftover after parsing attributes in process `syz.6.1934'. [ 202.850758][ T9457] netlink: 'syz.2.1936': attribute type 2 has an invalid length. [ 203.108685][ T9469] netlink: 'syz.0.1939': attribute type 2 has an invalid length. [ 203.142890][ T9471] netlink: 156 bytes leftover after parsing attributes in process `syz.6.1942'. [ 203.394985][ T9479] netlink: 192440 bytes leftover after parsing attributes in process `syz.3.1945'. [ 203.437763][ T9479] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 203.656028][ T9488] netlink: 'syz.6.1947': attribute type 10 has an invalid length. [ 203.684898][ T9488] netlink: 40 bytes leftover after parsing attributes in process `syz.6.1947'. [ 203.980297][ T9499] netlink: 'syz.1.1953': attribute type 2 has an invalid length. [ 204.286312][ T9496] netlink: 'syz.2.1952': attribute type 10 has an invalid length. [ 204.619991][ T9516] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 204.780209][ T9532] netlink: 'syz.2.1966': attribute type 21 has an invalid length. [ 204.839242][ T9531] netlink: 'syz.0.1965': attribute type 10 has an invalid length. [ 205.510006][ T9560] __nla_validate_parse: 5 callbacks suppressed [ 205.510024][ T9560] netlink: 156 bytes leftover after parsing attributes in process `syz.0.1977'. [ 205.616459][ T9554] netlink: 'syz.6.1974': attribute type 10 has an invalid length. [ 205.653613][ T9554] netlink: 55 bytes leftover after parsing attributes in process `syz.6.1974'. [ 205.759155][ T9569] netlink: 192440 bytes leftover after parsing attributes in process `syz.2.1979'. [ 205.813295][ T9569] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 205.947341][ T9578] netlink: 'syz.3.1984': attribute type 10 has an invalid length. [ 205.982748][ T9578] netlink: 40 bytes leftover after parsing attributes in process `syz.3.1984'. [ 206.419591][ T9603] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1992'. [ 206.507544][ T9606] netlink: 'syz.6.1993': attribute type 10 has an invalid length. [ 206.532083][ T9606] netlink: 55 bytes leftover after parsing attributes in process `syz.6.1993'. [ 206.580295][ T9612] netlink: 192440 bytes leftover after parsing attributes in process `syz.2.1994'. [ 206.608269][ T9612] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 206.818914][ T9624] netlink: 'syz.0.1999': attribute type 10 has an invalid length. [ 206.867362][ T9624] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1999'. [ 207.060793][ T9621] netlink: 199824 bytes leftover after parsing attributes in process `syz.6.1997'. [ 207.223838][ T9635] FAULT_INJECTION: forcing a failure. [ 207.223838][ T9635] name failslab, interval 1, probability 0, space 0, times 0 [ 207.264963][ T9635] CPU: 0 PID: 9635 Comm: syz.3.2002 Not tainted 5.15.182-syzkaller #0 [ 207.273149][ T9635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 207.283210][ T9635] Call Trace: [ 207.286490][ T9635] [ 207.289422][ T9635] dump_stack_lvl+0x168/0x230 [ 207.294117][ T9635] ? show_regs_print_info+0x20/0x20 [ 207.299324][ T9635] ? load_image+0x3b0/0x3b0 [ 207.303839][ T9635] ? __might_sleep+0xf0/0xf0 [ 207.308436][ T9635] ? __lock_acquire+0x7c60/0x7c60 [ 207.313472][ T9635] should_fail+0x38c/0x4c0 [ 207.317901][ T9635] should_failslab+0x5/0x20 [ 207.322416][ T9635] slab_pre_alloc_hook+0x51/0xc0 [ 207.327361][ T9635] kmem_cache_alloc_node_trace+0x4a/0x300 [ 207.333086][ T9635] ? __get_vm_area_node+0x119/0x2d0 [ 207.338297][ T9635] __get_vm_area_node+0x119/0x2d0 [ 207.343331][ T9635] __vmalloc_node_range+0xef/0x8b0 [ 207.348450][ T9635] ? bpf_prog_alloc_no_stats+0x36/0x2c0 [ 207.354008][ T9635] ? end_current_label_crit_section+0x170/0x170 [ 207.360259][ T9635] ? __lock_acquire+0x7c60/0x7c60 [ 207.365303][ T9635] ? bpf_prog_alloc_no_stats+0x36/0x2c0 [ 207.370857][ T9635] __vmalloc+0x76/0x80 [ 207.374939][ T9635] ? bpf_prog_alloc_no_stats+0x36/0x2c0 [ 207.380497][ T9635] bpf_prog_alloc_no_stats+0x36/0x2c0 [ 207.385884][ T9635] bpf_prog_alloc+0x1a/0x1e0 [ 207.390489][ T9635] bpf_prog_load+0x7b3/0x1550 [ 207.395191][ T9635] ? map_freeze+0x350/0x350 [ 207.399701][ T9635] ? __might_fault+0xb7/0x110 [ 207.404406][ T9635] ? __might_fault+0xb3/0x110 [ 207.409111][ T9635] ? bpf_lsm_bpf+0x5/0x10 [ 207.413454][ T9635] ? security_bpf+0x7a/0xa0 [ 207.417965][ T9635] __sys_bpf+0x4c2/0x670 [ 207.422224][ T9635] ? bpf_link_show_fdinfo+0x310/0x310 [ 207.427610][ T9635] ? bpf_trace_run2+0x1df/0x2d0 [ 207.432493][ T9635] __x64_sys_bpf+0x78/0x90 [ 207.436919][ T9635] do_syscall_64+0x4c/0xa0 [ 207.441345][ T9635] ? clear_bhb_loop+0x15/0x70 [ 207.446027][ T9635] ? clear_bhb_loop+0x15/0x70 [ 207.450700][ T9635] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 207.456600][ T9635] RIP: 0033:0x7f2221884969 [ 207.461008][ T9635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 207.480607][ T9635] RSP: 002b:00007f221f6ec038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 207.489012][ T9635] RAX: ffffffffffffffda RBX: 00007f2221aabfa0 RCX: 00007f2221884969 [ 207.496982][ T9635] RDX: 0000000000000048 RSI: 000020000000e000 RDI: 0000000000000005 [ 207.504946][ T9635] RBP: 00007f221f6ec090 R08: 0000000000000000 R09: 0000000000000000 [ 207.512912][ T9635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 207.520865][ T9635] R13: 0000000000000000 R14: 00007f2221aabfa0 R15: 00007fff2e5307e8 [ 207.528845][ T9635] [ 207.599127][ T9643] FAULT_INJECTION: forcing a failure. [ 207.599127][ T9643] name failslab, interval 1, probability 0, space 0, times 0 [ 207.652636][ T9635] syz.3.2002: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz3,mems_allowed=0-1 [ 207.699664][ T9643] CPU: 0 PID: 9643 Comm: syz.1.2005 Not tainted 5.15.182-syzkaller #0 [ 207.707958][ T9643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 207.718020][ T9643] Call Trace: [ 207.721300][ T9643] [ 207.724240][ T9643] dump_stack_lvl+0x168/0x230 [ 207.728937][ T9643] ? show_regs_print_info+0x20/0x20 [ 207.734142][ T9643] ? load_image+0x3b0/0x3b0 [ 207.738649][ T9643] ? __might_sleep+0xf0/0xf0 [ 207.743240][ T9643] ? __lock_acquire+0x7c60/0x7c60 [ 207.748272][ T9643] should_fail+0x38c/0x4c0 [ 207.752701][ T9643] should_failslab+0x5/0x20 [ 207.757209][ T9643] slab_pre_alloc_hook+0x51/0xc0 [ 207.762159][ T9643] kmem_cache_alloc_node+0x47/0x2d0 [ 207.767370][ T9643] ? __alloc_skb+0xf4/0x750 [ 207.771886][ T9643] __alloc_skb+0xf4/0x750 [ 207.776231][ T9643] netlink_ack+0x3a6/0xb60 [ 207.780651][ T9643] ? mutex_unlock+0x10/0x10 [ 207.785161][ T9643] ? dev_queue_xmit+0x20/0x20 [ 207.789849][ T9643] ? sock_diag_rcv+0x17/0x40 [ 207.794456][ T9643] ? netlink_dump+0xcb0/0xcb0 [ 207.799142][ T9643] ? inet_diag_unregister+0xb0/0xb0 [ 207.804341][ T9643] ? sock_diag_rcv_msg+0x18a/0x3e0 [ 207.809457][ T9643] netlink_rcv_skb+0x265/0x430 [ 207.814224][ T9643] ? sock_diag_bind+0xa0/0xa0 [ 207.818913][ T9643] ? netlink_ack+0xb60/0xb60 [ 207.823508][ T9643] ? __lock_acquire+0x7c60/0x7c60 [ 207.828549][ T9643] sock_diag_rcv+0x26/0x40 [ 207.832968][ T9643] netlink_unicast+0x77c/0x920 [ 207.837748][ T9643] netlink_sendmsg+0x8ab/0xbc0 [ 207.842534][ T9643] ? netlink_getsockopt+0x560/0x560 [ 207.847748][ T9643] ? aa_sock_msg_perm+0x94/0x150 [ 207.852721][ T9643] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 207.858021][ T9643] ? security_socket_sendmsg+0x7c/0xa0 [ 207.863483][ T9643] ? netlink_getsockopt+0x560/0x560 [ 207.868684][ T9643] ____sys_sendmsg+0x5a2/0x8c0 [ 207.873458][ T9643] ? memset+0x1e/0x40 [ 207.877438][ T9643] ? __sys_sendmsg_sock+0x30/0x30 [ 207.882469][ T9643] ? import_iovec+0x6f/0xa0 [ 207.886980][ T9643] ___sys_sendmsg+0x1f0/0x260 [ 207.891687][ T9643] ? __sys_sendmsg+0x250/0x250 [ 207.896494][ T9643] ? __fdget+0x18b/0x210 [ 207.900742][ T9643] __se_sys_sendmsg+0x190/0x250 [ 207.905599][ T9643] ? __x64_sys_sendmsg+0x80/0x80 [ 207.910537][ T9643] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 207.916542][ T9643] ? trace_sys_enter+0x1f/0x80 [ 207.921472][ T9643] do_syscall_64+0x4c/0xa0 [ 207.925908][ T9643] ? clear_bhb_loop+0x15/0x70 [ 207.930583][ T9643] ? clear_bhb_loop+0x15/0x70 [ 207.935262][ T9643] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 207.941186][ T9643] RIP: 0033:0x7fd99c40f969 [ 207.945610][ T9643] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 207.965213][ T9643] RSP: 002b:00007fd99a277038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 207.973666][ T9643] RAX: ffffffffffffffda RBX: 00007fd99c636fa0 RCX: 00007fd99c40f969 [ 207.981650][ T9643] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000003 [ 207.989627][ T9643] RBP: 00007fd99a277090 R08: 0000000000000000 R09: 0000000000000000 [ 207.997599][ T9643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 208.005572][ T9643] R13: 0000000000000000 R14: 00007fd99c636fa0 R15: 00007ffdf1839e38 [ 208.013567][ T9643] [ 208.068217][ T9647] netlink: 192440 bytes leftover after parsing attributes in process `syz.6.2007'. [ 208.119080][ T9647] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 208.128615][ T9635] CPU: 0 PID: 9635 Comm: syz.3.2002 Not tainted 5.15.182-syzkaller #0 [ 208.136793][ T9635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 208.146857][ T9635] Call Trace: [ 208.150135][ T9635] [ 208.153068][ T9635] dump_stack_lvl+0x168/0x230 [ 208.157756][ T9635] ? rcu_lock_release+0x5/0x20 [ 208.162529][ T9635] ? show_regs_print_info+0x20/0x20 [ 208.167739][ T9635] ? load_image+0x3b0/0x3b0 [ 208.172271][ T9635] warn_alloc+0x20e/0x2f0 [ 208.176624][ T9635] ? zone_watermark_ok_safe+0x240/0x240 [ 208.182193][ T9635] ? __get_vm_area_node+0x2b5/0x2d0 [ 208.187411][ T9635] __vmalloc_node_range+0x2b1/0x8b0 [ 208.192621][ T9635] ? end_current_label_crit_section+0x170/0x170 [ 208.198859][ T9635] ? __lock_acquire+0x7c60/0x7c60 [ 208.203877][ T9635] ? bpf_prog_alloc_no_stats+0x36/0x2c0 [ 208.209409][ T9635] __vmalloc+0x76/0x80 [ 208.213498][ T9635] ? bpf_prog_alloc_no_stats+0x36/0x2c0 [ 208.219031][ T9635] bpf_prog_alloc_no_stats+0x36/0x2c0 [ 208.224392][ T9635] bpf_prog_alloc+0x1a/0x1e0 [ 208.228972][ T9635] bpf_prog_load+0x7b3/0x1550 [ 208.233645][ T9635] ? map_freeze+0x350/0x350 [ 208.238139][ T9635] ? __might_fault+0xb7/0x110 [ 208.242820][ T9635] ? __might_fault+0xb3/0x110 [ 208.247493][ T9635] ? bpf_lsm_bpf+0x5/0x10 [ 208.251814][ T9635] ? security_bpf+0x7a/0xa0 [ 208.256319][ T9635] __sys_bpf+0x4c2/0x670 [ 208.260555][ T9635] ? bpf_link_show_fdinfo+0x310/0x310 [ 208.265916][ T9635] ? bpf_trace_run2+0x1df/0x2d0 [ 208.270772][ T9635] __x64_sys_bpf+0x78/0x90 [ 208.275181][ T9635] do_syscall_64+0x4c/0xa0 [ 208.279586][ T9635] ? clear_bhb_loop+0x15/0x70 [ 208.284248][ T9635] ? clear_bhb_loop+0x15/0x70 [ 208.288914][ T9635] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 208.294798][ T9635] RIP: 0033:0x7f2221884969 [ 208.299206][ T9635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 208.318796][ T9635] RSP: 002b:00007f221f6ec038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 208.327197][ T9635] RAX: ffffffffffffffda RBX: 00007f2221aabfa0 RCX: 00007f2221884969 [ 208.335169][ T9635] RDX: 0000000000000048 RSI: 000020000000e000 RDI: 0000000000000005 [ 208.343132][ T9635] RBP: 00007f221f6ec090 R08: 0000000000000000 R09: 0000000000000000 [ 208.351094][ T9635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 208.359057][ T9635] R13: 0000000000000000 R14: 00007f2221aabfa0 R15: 00007fff2e5307e8 [ 208.367031][ T9635] [ 208.388043][ T9635] Mem-Info: [ 208.391187][ T9635] active_anon:289 inactive_anon:12722 isolated_anon:0 [ 208.391187][ T9635] active_file:13112 inactive_file:40431 isolated_file:0 [ 208.391187][ T9635] unevictable:768 dirty:125 writeback:0 [ 208.391187][ T9635] slab_reclaimable:20612 slab_unreclaimable:96714 [ 208.391187][ T9635] mapped:36917 shmem:8875 pagetables:772 bounce:0 [ 208.391187][ T9635] kernel_misc_reclaimable:0 [ 208.391187][ T9635] free:1378720 free_pcp:6756 free_cma:0 [ 208.442933][ T9635] Node 0 active_anon:1124kB inactive_anon:50380kB active_file:52252kB inactive_file:161724kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:147768kB dirty:500kB writeback:0kB shmem:33524kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:10764kB pagetables:3088kB all_unreclaimable? no [ 208.588169][ T9635] Node 1 active_anon:32kB inactive_anon:508kB active_file:196kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:2076kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB all_unreclaimable? no [ 208.694925][ T9660] validate_nla: 1 callbacks suppressed [ 208.694941][ T9660] netlink: 'syz.2.2010': attribute type 10 has an invalid length. [ 208.783010][ T9635] Node 0 DMA free:15360kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 208.810231][ T9662] netlink: 'syz.0.2012': attribute type 10 has an invalid length. [ 208.870681][ T9635] lowmem_reserve[]: 0 2541 2542 2542 2542 [ 208.894926][ T9635] Node 0 DMA32 free:1577844kB min:34800kB low:43500kB high:52200kB reserved_highatomic:0KB active_anon:1124kB inactive_anon:55660kB active_file:52252kB inactive_file:163324kB unevictable:1536kB writepending:504kB present:3129332kB managed:2609060kB mlocked:0kB bounce:0kB free_pcp:20016kB local_pcp:10164kB free_cma:0kB [ 208.964886][ T9635] lowmem_reserve[]: 0 0 0 0 0 [ 208.984659][ T9635] Node 0 Normal free:0kB min:12kB low:12kB high:12kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:916kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 209.130814][ T9635] lowmem_reserve[]: 0 0 0 0 0 [ 209.151095][ T9635] Node 1 Normal free:3915632kB min:55088kB low:68860kB high:82632kB reserved_highatomic:0KB active_anon:32kB inactive_anon:508kB active_file:196kB inactive_file:0kB unevictable:1536kB writepending:0kB present:4194304kB managed:4119672kB mlocked:0kB bounce:0kB free_pcp:6248kB local_pcp:1544kB free_cma:0kB [ 209.199975][ T9635] lowmem_reserve[]: 0 0 0 0 0 [ 209.205165][ T9635] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 209.224831][ T9635] Node 0 DMA32: 2*4kB (UE) 107*8kB (UME) 193*16kB (UM) 444*32kB (UME) 233*64kB (UME) 63*128kB (UME) 22*256kB (UM) 8*512kB (UM) 4*1024kB (UM) 4*2048kB (UME) 369*4096kB (M) = 1574576kB [ 209.249176][ T9635] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 209.322571][ T9635] Node 1 Normal: 70*4kB (UME) 29*8kB (UME) 25*16kB (UME) 175*32kB (UE) 66*64kB (UME) 23*128kB (UME) 4*256kB (UM) 1*512kB (U) 1*1024kB (U) 2*2048kB (UM) 951*4096kB (ME) = 3915632kB [ 209.376360][ T9685] FAULT_INJECTION: forcing a failure. [ 209.376360][ T9685] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 209.389712][ T9635] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 209.400589][ T9685] CPU: 1 PID: 9685 Comm: syz.0.2019 Not tainted 5.15.182-syzkaller #0 [ 209.408768][ T9685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 209.418827][ T9685] Call Trace: [ 209.422112][ T9685] [ 209.425052][ T9685] dump_stack_lvl+0x168/0x230 [ 209.429749][ T9685] ? show_regs_print_info+0x20/0x20 [ 209.434967][ T9685] ? load_image+0x3b0/0x3b0 [ 209.439486][ T9685] ? __lock_acquire+0x7c60/0x7c60 [ 209.444521][ T9685] ? __lock_acquire+0x13ad/0x7c60 [ 209.449554][ T9685] should_fail+0x38c/0x4c0 [ 209.453985][ T9685] _copy_from_iter+0x22a/0x1150 [ 209.458859][ T9685] ? copy_mc_pipe_to_iter+0x7d0/0x7d0 [ 209.464239][ T9685] ? release_sock+0x2b/0x1b0 [ 209.468834][ T9685] ? reacquire_held_locks+0x2f9/0x590 [ 209.474207][ T9685] ? release_sock+0x2b/0x1b0 [ 209.478809][ T9685] ? __check_object_size+0x87/0x410 [ 209.484021][ T9685] ? ping_common_sendmsg+0x93/0x2a0 [ 209.489231][ T9685] ping_common_sendmsg+0xb8/0x2a0 [ 209.494270][ T9685] ping_v6_sendmsg+0x1c0/0xef0 [ 209.499047][ T9685] ? tcpv6_net_exit_batch+0x20/0x20 [ 209.504273][ T9685] ? lock_chain_count+0x20/0x20 [ 209.509136][ T9685] ? __local_bh_enable_ip+0x12a/0x1b0 [ 209.514509][ T9685] ? lockdep_hardirqs_on+0x94/0x140 [ 209.519716][ T9685] ? __local_bh_enable_ip+0x12a/0x1b0 [ 209.525088][ T9685] ? _local_bh_enable+0xa0/0xa0 [ 209.529952][ T9685] ? inet_sendmsg+0x147/0x2f0 [ 209.534644][ T9685] ? inet_sendmsg+0x147/0x2f0 [ 209.539332][ T9685] ? inet_send_prepare+0x260/0x260 [ 209.544454][ T9685] ____sys_sendmsg+0x5a2/0x8c0 [ 209.549229][ T9685] ? memset+0x1e/0x40 [ 209.553212][ T9685] ? __sys_sendmsg_sock+0x30/0x30 [ 209.558245][ T9685] ? import_iovec+0x6f/0xa0 [ 209.562752][ T9685] ___sys_sendmsg+0x1f0/0x260 [ 209.567442][ T9685] ? __sys_sendmsg+0x250/0x250 [ 209.572230][ T9685] ? trace_event_raw_event_lock+0x250/0x250 [ 209.578133][ T9685] ? vfs_write+0x84d/0xd00 [ 209.582583][ T9685] ? __fdget+0x18b/0x210 [ 209.586830][ T9685] __se_sys_sendmsg+0x190/0x250 [ 209.591689][ T9685] ? __x64_sys_sendmsg+0x80/0x80 [ 209.596635][ T9685] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 209.602633][ T9685] ? trace_sys_enter+0x1f/0x80 [ 209.607405][ T9685] do_syscall_64+0x4c/0xa0 [ 209.611822][ T9685] ? clear_bhb_loop+0x15/0x70 [ 209.616505][ T9685] ? clear_bhb_loop+0x15/0x70 [ 209.621199][ T9685] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 209.627100][ T9685] RIP: 0033:0x7fe8af925969 [ 209.631522][ T9685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 209.651137][ T9685] RSP: 002b:00007fe8ad78d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 209.659578][ T9685] RAX: ffffffffffffffda RBX: 00007fe8afb4cfa0 RCX: 00007fe8af925969 [ 209.667561][ T9685] RDX: 0000000000000000 RSI: 0000200000000440 RDI: 0000000000000003 [ 209.675534][ T9685] RBP: 00007fe8ad78d090 R08: 0000000000000000 R09: 0000000000000000 [ 209.683502][ T9685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 209.691475][ T9685] R13: 0000000000000000 R14: 00007fe8afb4cfa0 R15: 00007ffcb2db4478 [ 209.699468][ T9685] [ 209.713566][ T9635] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 209.723254][ T9635] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 209.735284][ T9635] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 209.807830][ T9635] 66446 total pagecache pages [ 209.833839][ T9635] 0 pages in swap cache [ 209.838013][ T9635] Swap cache stats: add 0, delete 0, find 0/0 [ 209.892574][ T9635] Free swap = 124996kB [ 209.896836][ T9635] Total swap = 124996kB [ 209.910899][ T9691] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 209.913031][ T9635] 2097051 pages RAM [ 209.937522][ T9635] 0 pages HighMem/MovableOnly [ 209.945404][ T9635] 410799 pages reserved [ 209.949640][ T9635] 0 pages cma reserved [ 210.728842][ T9712] netlink: 'syz.2.2026': attribute type 10 has an invalid length. [ 210.759911][ T9712] __nla_validate_parse: 6 callbacks suppressed [ 210.759958][ T9712] netlink: 40 bytes leftover after parsing attributes in process `syz.2.2026'. [ 210.872436][ T9711] netlink: 'syz.6.2029': attribute type 10 has an invalid length. [ 210.887262][ T9711] netlink: 55 bytes leftover after parsing attributes in process `syz.6.2029'. [ 211.274726][ T9729] netlink: 156 bytes leftover after parsing attributes in process `syz.6.2036'. [ 211.363039][ T9730] netlink: 'syz.1.2035': attribute type 10 has an invalid length. [ 211.397468][ T9730] device hsr_slave_0 left promiscuous mode [ 211.431154][ T9730] device hsr_slave_1 left promiscuous mode [ 211.507717][ T9738] netlink: 192440 bytes leftover after parsing attributes in process `syz.2.2039'. [ 211.563743][ T9738] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 211.870251][ T9747] netlink: 'syz.2.2042': attribute type 10 has an invalid length. [ 211.883624][ T9747] netlink: 40 bytes leftover after parsing attributes in process `syz.2.2042'. [ 212.299727][ T9759] netlink: 'syz.2.2047': attribute type 10 has an invalid length. [ 212.309562][ T9759] netlink: 55 bytes leftover after parsing attributes in process `syz.2.2047'. [ 212.835778][ T9775] netlink: 156 bytes leftover after parsing attributes in process `syz.6.2053'. [ 212.979446][ T9782] netlink: 'syz.2.2055': attribute type 10 has an invalid length. [ 212.998351][ T9781] netlink: 192440 bytes leftover after parsing attributes in process `syz.1.2054'. [ 213.000896][ T9782] device hsr_slave_0 left promiscuous mode [ 213.026389][ T9781] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 213.050008][ T9782] device hsr_slave_1 left promiscuous mode [ 213.120916][ T9786] netlink: 'syz.0.2057': attribute type 10 has an invalid length. [ 213.147324][ T9786] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2057'. [ 213.282371][ T9793] netlink: 'syz.3.2059': attribute type 1 has an invalid length. [ 213.422701][ T9793] netlink: 180900 bytes leftover after parsing attributes in process `syz.3.2059'. [ 213.667211][ T9813] mac80211_hwsim hwsim6 »»»»»»: renamed from wlan0 [ 213.994789][ T9825] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 214.116743][ T9831] validate_nla: 2 callbacks suppressed [ 214.116797][ T9831] netlink: 'syz.3.2074': attribute type 10 has an invalid length. [ 214.382725][ T9844] netlink: 'syz.2.2075': attribute type 10 has an invalid length. [ 214.573259][ T9851] FAULT_INJECTION: forcing a failure. [ 214.573259][ T9851] name failslab, interval 1, probability 0, space 0, times 0 [ 214.771887][ T9851] CPU: 1 PID: 9851 Comm: syz.0.2081 Not tainted 5.15.182-syzkaller #0 [ 214.780085][ T9851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 214.790138][ T9851] Call Trace: [ 214.793411][ T9851] [ 214.796343][ T9851] dump_stack_lvl+0x168/0x230 [ 214.801035][ T9851] ? show_regs_print_info+0x20/0x20 [ 214.806224][ T9851] ? load_image+0x3b0/0x3b0 [ 214.810717][ T9851] ? __might_sleep+0xf0/0xf0 [ 214.815297][ T9851] ? __lock_acquire+0x7c60/0x7c60 [ 214.820311][ T9851] ? __local_bh_enable_ip+0x12a/0x1b0 [ 214.825673][ T9851] should_fail+0x38c/0x4c0 [ 214.830102][ T9851] should_failslab+0x5/0x20 [ 214.834609][ T9851] slab_pre_alloc_hook+0x51/0xc0 [ 214.839551][ T9851] kmem_cache_alloc_node_trace+0x4a/0x300 [ 214.845261][ T9851] ? __get_vm_area_node+0x119/0x2d0 [ 214.850454][ T9851] __get_vm_area_node+0x119/0x2d0 [ 214.855474][ T9851] __vmalloc_node_range+0xef/0x8b0 [ 214.860574][ T9851] ? netlink_sendmsg+0x5dd/0xbc0 [ 214.865502][ T9851] ? netlink_data_ready+0x10/0x10 [ 214.870524][ T9851] ? netlink_sendmsg+0x5dd/0xbc0 [ 214.875460][ T9851] vmalloc+0x75/0x80 [ 214.879359][ T9851] ? netlink_sendmsg+0x5dd/0xbc0 [ 214.884289][ T9851] netlink_sendmsg+0x5dd/0xbc0 [ 214.889059][ T9851] ? netlink_getsockopt+0x560/0x560 [ 214.894250][ T9851] ? aa_sock_msg_perm+0x94/0x150 [ 214.899186][ T9851] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 214.904459][ T9851] ? security_socket_sendmsg+0x7c/0xa0 [ 214.909921][ T9851] ? netlink_getsockopt+0x560/0x560 [ 214.915119][ T9851] ____sys_sendmsg+0x5a2/0x8c0 [ 214.919884][ T9851] ? memset+0x1e/0x40 [ 214.923852][ T9851] ? __sys_sendmsg_sock+0x30/0x30 [ 214.928888][ T9851] ? import_iovec+0x6f/0xa0 [ 214.933389][ T9851] ___sys_sendmsg+0x1f0/0x260 [ 214.938068][ T9851] ? __sys_sendmsg+0x250/0x250 [ 214.942835][ T9851] ? vfs_write+0x84d/0xd00 [ 214.947269][ T9851] ? __fdget+0x18b/0x210 [ 214.951506][ T9851] __se_sys_sendmsg+0x190/0x250 [ 214.956370][ T9851] ? __x64_sys_sendmsg+0x80/0x80 [ 214.961322][ T9851] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 214.967311][ T9851] ? trace_sys_enter+0x1f/0x80 [ 214.972083][ T9851] do_syscall_64+0x4c/0xa0 [ 214.976512][ T9851] ? clear_bhb_loop+0x15/0x70 [ 214.981189][ T9851] ? clear_bhb_loop+0x15/0x70 [ 214.985894][ T9851] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 214.991794][ T9851] RIP: 0033:0x7fe8af925969 [ 214.996206][ T9851] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 215.015908][ T9851] RSP: 002b:00007fe8ad78d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 215.024328][ T9851] RAX: ffffffffffffffda RBX: 00007fe8afb4cfa0 RCX: 00007fe8af925969 [ 215.032291][ T9851] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000005 [ 215.040256][ T9851] RBP: 00007fe8ad78d090 R08: 0000000000000000 R09: 0000000000000000 [ 215.048216][ T9851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 215.056173][ T9851] R13: 0000000000000000 R14: 00007fe8afb4cfa0 R15: 00007ffcb2db4478 [ 215.064152][ T9851] [ 215.092758][ T9859] IPv6: Can't replace route, no match found [ 215.364577][ T9870] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 215.377540][ T9872] netlink: 'syz.0.2089': attribute type 10 has an invalid length. [ 215.759387][ T9883] netlink: 'syz.2.2093': attribute type 10 has an invalid length. [ 215.805830][ T9883] __nla_validate_parse: 11 callbacks suppressed [ 215.805846][ T9883] netlink: 55 bytes leftover after parsing attributes in process `syz.2.2093'. [ 216.007731][ T9900] netlink: 'syz.3.2098': attribute type 29 has an invalid length. [ 216.027903][ T9900] netlink: 'syz.3.2098': attribute type 29 has an invalid length. [ 216.040485][ T9900] netlink: 'syz.3.2098': attribute type 29 has an invalid length. [ 216.110994][ T9897] netlink: 'syz.3.2098': attribute type 29 has an invalid length. [ 216.141232][ T9897] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2098'. [ 216.165165][ T9907] netlink: 'syz.2.2101': attribute type 6 has an invalid length. [ 216.181379][ T9897] netlink: 202920 bytes leftover after parsing attributes in process `syz.3.2098'. [ 216.203155][ T9907] netlink: 168 bytes leftover after parsing attributes in process `syz.2.2101'. [ 216.243432][ T9906] netlink: 'syz.2.2101': attribute type 6 has an invalid length. [ 216.251194][ T9906] netlink: 168 bytes leftover after parsing attributes in process `syz.2.2101'. [ 216.347808][ T9914] netlink: 40 bytes leftover after parsing attributes in process `syz.1.2105'. [ 216.362793][ T9912] netlink: 192440 bytes leftover after parsing attributes in process `syz.6.2104'. [ 216.398461][ T9912] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 216.429911][ T9922] netlink: 156 bytes leftover after parsing attributes in process `syz.2.2108'. [ 216.892213][ T9936] netlink: 164 bytes leftover after parsing attributes in process `syz.6.2112'. [ 217.536454][ T9958] netlink: 40 bytes leftover after parsing attributes in process `syz.2.2121'. [ 217.550749][ T9961] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 218.039313][ T9985] FAULT_INJECTION: forcing a failure. [ 218.039313][ T9985] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 218.169640][ T9985] CPU: 0 PID: 9985 Comm: syz.6.2131 Not tainted 5.15.182-syzkaller #0 [ 218.177846][ T9985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 218.187911][ T9985] Call Trace: [ 218.191211][ T9985] [ 218.194153][ T9985] dump_stack_lvl+0x168/0x230 [ 218.198857][ T9985] ? show_regs_print_info+0x20/0x20 [ 218.204069][ T9985] ? load_image+0x3b0/0x3b0 [ 218.208599][ T9985] ? __lock_acquire+0x7c60/0x7c60 [ 218.213650][ T9985] should_fail+0x38c/0x4c0 [ 218.218093][ T9985] _copy_from_iter+0x22a/0x1150 [ 218.222972][ T9985] ? __lock_acquire+0x7c60/0x7c60 [ 218.228028][ T9985] ? copy_mc_pipe_to_iter+0x7d0/0x7d0 [ 218.233406][ T9985] ? __virt_addr_valid+0x3c6/0x470 [ 218.238509][ T9985] ? __phys_addr+0xb6/0x170 [ 218.243003][ T9985] ? __phys_addr_symbol+0x2b/0x70 [ 218.248018][ T9985] ? __check_object_size+0x30c/0x410 [ 218.253386][ T9985] netlink_sendmsg+0x749/0xbc0 [ 218.258155][ T9985] ? netlink_getsockopt+0x560/0x560 [ 218.263366][ T9985] ? aa_sock_msg_perm+0x94/0x150 [ 218.268309][ T9985] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 218.273615][ T9985] ? security_socket_sendmsg+0x7c/0xa0 [ 218.279073][ T9985] ? netlink_getsockopt+0x560/0x560 [ 218.284277][ T9985] ____sys_sendmsg+0x5a2/0x8c0 [ 218.289051][ T9985] ? memset+0x1e/0x40 [ 218.293031][ T9985] ? __sys_sendmsg_sock+0x30/0x30 [ 218.298066][ T9985] ? import_iovec+0x6f/0xa0 [ 218.302577][ T9985] ___sys_sendmsg+0x1f0/0x260 [ 218.307261][ T9985] ? __sys_sendmsg+0x250/0x250 [ 218.312043][ T9985] ? trace_event_raw_event_lock+0x250/0x250 [ 218.317933][ T9985] ? vfs_write+0x84d/0xd00 [ 218.322386][ T9985] ? __fdget+0x18b/0x210 [ 218.326630][ T9985] __se_sys_sendmsg+0x190/0x250 [ 218.331483][ T9985] ? __x64_sys_sendmsg+0x80/0x80 [ 218.336523][ T9985] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 218.342513][ T9985] ? trace_sys_enter+0x1f/0x80 [ 218.347280][ T9985] do_syscall_64+0x4c/0xa0 [ 218.351694][ T9985] ? clear_bhb_loop+0x15/0x70 [ 218.356366][ T9985] ? clear_bhb_loop+0x15/0x70 [ 218.361036][ T9985] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 218.366924][ T9985] RIP: 0033:0x7feeeff30969 [ 218.371350][ T9985] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 218.390949][ T9985] RSP: 002b:00007feeedd98038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 218.399353][ T9985] RAX: ffffffffffffffda RBX: 00007feef0157fa0 RCX: 00007feeeff30969 [ 218.407314][ T9985] RDX: 0000000000000000 RSI: 0000200000000600 RDI: 0000000000000007 [ 218.415272][ T9985] RBP: 00007feeedd98090 R08: 0000000000000000 R09: 0000000000000000 [ 218.423230][ T9985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 218.431205][ T9985] R13: 0000000000000000 R14: 00007feef0157fa0 R15: 00007ffd05e10008 [ 218.439194][ T9985] [ 218.613168][ T9996] FAULT_INJECTION: forcing a failure. [ 218.613168][ T9996] name failslab, interval 1, probability 0, space 0, times 0 [ 218.685465][ T9996] CPU: 1 PID: 9996 Comm: syz.1.2136 Not tainted 5.15.182-syzkaller #0 [ 218.693655][ T9996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 218.703725][ T9996] Call Trace: [ 218.707018][ T9996] [ 218.709969][ T9996] dump_stack_lvl+0x168/0x230 [ 218.714677][ T9996] ? show_regs_print_info+0x20/0x20 [ 218.719905][ T9996] ? load_image+0x3b0/0x3b0 [ 218.724436][ T9996] ? __might_sleep+0xf0/0xf0 [ 218.729045][ T9996] ? __lock_acquire+0x7c60/0x7c60 [ 218.734197][ T9996] should_fail+0x38c/0x4c0 [ 218.738654][ T9996] should_failslab+0x5/0x20 [ 218.743175][ T9996] slab_pre_alloc_hook+0x51/0xc0 [ 218.748141][ T9996] kmem_cache_alloc_trace+0x47/0x2a0 [ 218.753443][ T9996] ? ip_setup_cork+0x52c/0x890 [ 218.758241][ T9996] ip_setup_cork+0x52c/0x890 [ 218.762874][ T9996] ip_append_data+0x15a/0x1a0 [ 218.765109][ T9994] team0: Port device team_slave_0 removed [ 218.767564][ T9996] ? lock_sock_nested+0x68/0x100 [ 218.767599][ T9996] ? raw_send_hdrinc+0x11e0/0x11e0 [ 218.783352][ T9996] raw_sendmsg+0x131a/0x1890 [ 218.788013][ T9996] ? compat_raw_ioctl+0x60/0x60 [ 218.792945][ T9996] ? aa_sk_perm+0x7b4/0x8f0 [ 218.797493][ T9996] ? tomoyo_socket_sendmsg_permission+0x212/0x2f0 [ 218.803943][ T9996] ? sock_rps_record_flow+0x17/0x3b0 [ 218.809250][ T9996] ? inet_send_prepare+0x260/0x260 [ 218.814382][ T9996] ? inet_sendmsg+0x78/0x2f0 [ 218.818984][ T9996] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 218.824348][ T9996] ? security_socket_sendmsg+0x7c/0xa0 [ 218.829824][ T9996] ? inet_send_prepare+0x260/0x260 [ 218.834956][ T9996] ____sys_sendmsg+0x5a2/0x8c0 [ 218.839761][ T9996] ? __sys_sendmsg_sock+0x30/0x30 [ 218.844831][ T9996] ? import_iovec+0x6f/0xa0 [ 218.849359][ T9996] ___sys_sendmsg+0x1f0/0x260 [ 218.854096][ T9996] ? __sys_sendmsg+0x250/0x250 [ 218.858959][ T9996] ? vfs_write+0x84d/0xd00 [ 218.863460][ T9996] ? __fdget+0x18b/0x210 [ 218.867739][ T9996] __se_sys_sendmsg+0x190/0x250 [ 218.872626][ T9996] ? __x64_sys_sendmsg+0x80/0x80 [ 218.877575][ T9996] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 218.883615][ T9996] ? trace_sys_enter+0x1f/0x80 [ 218.888413][ T9996] do_syscall_64+0x4c/0xa0 [ 218.892853][ T9996] ? clear_bhb_loop+0x15/0x70 [ 218.897541][ T9996] ? clear_bhb_loop+0x15/0x70 [ 218.902243][ T9996] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 218.908177][ T9996] RIP: 0033:0x7fd99c40f969 [ 218.912620][ T9996] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 218.932398][ T9996] RSP: 002b:00007fd99a277038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 218.940853][ T9996] RAX: ffffffffffffffda RBX: 00007fd99c636fa0 RCX: 00007fd99c40f969 [ 218.948851][ T9996] RDX: 0000000000000000 RSI: 0000200000001640 RDI: 0000000000000003 [ 218.956829][ T9996] RBP: 00007fd99a277090 R08: 0000000000000000 R09: 0000000000000000 [ 218.964805][ T9996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 218.972809][ T9996] R13: 0000000000000000 R14: 00007fd99c636fa0 R15: 00007ffdf1839e38 [ 218.980851][ T9996] [ 218.995959][ T9994] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 219.047082][ T9999] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 219.467063][T10017] validate_nla: 4 callbacks suppressed [ 219.467078][T10017] netlink: 'syz.3.2144': attribute type 10 has an invalid length. [ 219.668020][T10026] netlink: 'syz.1.2148': attribute type 10 has an invalid length. [ 219.824321][T10041] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 220.334818][T10067] netlink: 'syz.0.2164': attribute type 10 has an invalid length. [ 220.385021][T10064] netlink: 'syz.2.2162': attribute type 10 has an invalid length. [ 220.610952][T10091] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 220.957106][T10109] netlink: 'syz.2.2179': attribute type 10 has an invalid length. [ 220.978485][T10109] __nla_validate_parse: 15 callbacks suppressed [ 220.978550][T10109] netlink: 40 bytes leftover after parsing attributes in process `syz.2.2179'. [ 221.006240][T10110] netlink: 'syz.1.2178': attribute type 29 has an invalid length. [ 221.023724][T10110] netlink: 'syz.1.2178': attribute type 29 has an invalid length. [ 221.167933][T10112] netlink: 'syz.0.2181': attribute type 10 has an invalid length. [ 221.193969][T10112] netlink: 55 bytes leftover after parsing attributes in process `syz.0.2181'. [ 221.590107][T10130] netlink: 192440 bytes leftover after parsing attributes in process `syz.2.2187'. [ 221.653111][T10130] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 221.669908][T10138] FAULT_INJECTION: forcing a failure. [ 221.669908][T10138] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 221.756461][T10138] CPU: 0 PID: 10138 Comm: syz.6.2189 Not tainted 5.15.182-syzkaller #0 [ 221.764841][T10138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 221.774900][T10138] Call Trace: [ 221.778181][T10138] [ 221.781111][T10138] dump_stack_lvl+0x168/0x230 [ 221.785842][T10138] ? show_regs_print_info+0x20/0x20 [ 221.791049][T10138] ? load_image+0x3b0/0x3b0 [ 221.795566][T10138] ? __lock_acquire+0x7c60/0x7c60 [ 221.800604][T10138] should_fail+0x38c/0x4c0 [ 221.805039][T10138] _copy_to_user+0x2e/0x130 [ 221.809695][T10138] simple_read_from_buffer+0xe3/0x150 [ 221.815090][T10138] proc_fail_nth_read+0x19a/0x210 [ 221.820127][T10138] ? proc_fault_inject_write+0x2f0/0x2f0 [ 221.825778][T10138] ? fsnotify_perm+0x254/0x560 [ 221.830557][T10138] ? proc_fault_inject_write+0x2f0/0x2f0 [ 221.836200][T10138] vfs_read+0x2f6/0xcf0 [ 221.839622][T10144] tun0: tun_chr_ioctl cmd 1074025677 [ 221.840452][T10138] ? kernel_read+0x1e0/0x1e0 [ 221.846014][T10144] tun0: linktype set to 804 [ 221.850312][T10138] ? __fget_files+0x40f/0x480 [ 221.850342][T10138] ? mutex_lock_nested+0x17/0x20 [ 221.859036][T10145] netlink: 156 bytes leftover after parsing attributes in process `syz.3.2191'. [ 221.859483][T10138] ? __fdget_pos+0x2bf/0x370 [ 221.877962][T10138] ? ksys_read+0x71/0x250 [ 221.882312][T10138] ksys_read+0x14d/0x250 [ 221.886584][T10138] ? vfs_write+0xd00/0xd00 [ 221.891026][T10138] ? trace_sys_enter+0x1f/0x80 [ 221.895801][T10138] do_syscall_64+0x4c/0xa0 [ 221.900213][T10138] ? clear_bhb_loop+0x15/0x70 [ 221.904886][T10138] ? clear_bhb_loop+0x15/0x70 [ 221.909573][T10138] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 221.915476][T10138] RIP: 0033:0x7feeeff2f37c [ 221.919900][T10138] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 221.939507][T10138] RSP: 002b:00007feeedd98030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 221.948010][T10138] RAX: ffffffffffffffda RBX: 00007feef0157fa0 RCX: 00007feeeff2f37c [ 221.955978][T10138] RDX: 000000000000000f RSI: 00007feeedd980a0 RDI: 0000000000000004 [ 221.963955][T10138] RBP: 00007feeedd98090 R08: 0000000000000000 R09: 0000000000000000 [ 221.971924][T10138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 221.979896][T10138] R13: 0000000000000000 R14: 00007feef0157fa0 R15: 00007ffd05e10008 [ 221.987887][T10138] [ 222.246902][T10155] netlink: 'syz.6.2194': attribute type 10 has an invalid length. [ 222.282722][T10155] netlink: 40 bytes leftover after parsing attributes in process `syz.6.2194'. [ 222.334272][T10160] netlink: 'syz.0.2196': attribute type 21 has an invalid length. [ 222.465351][T10164] netlink: 55 bytes leftover after parsing attributes in process `syz.1.2199'. [ 222.902238][T10184] netlink: 192440 bytes leftover after parsing attributes in process `syz.6.2204'. [ 222.940524][T10184] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 223.121091][T10191] netlink: 156 bytes leftover after parsing attributes in process `syz.2.2208'. [ 223.204564][T10196] netlink: 40 bytes leftover after parsing attributes in process `syz.1.2210'. [ 223.422087][T10207] netlink: 55 bytes leftover after parsing attributes in process `syz.6.2212'. [ 223.648312][T10216] FAULT_INJECTION: forcing a failure. [ 223.648312][T10216] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 223.680006][T10216] CPU: 1 PID: 10216 Comm: syz.2.2217 Not tainted 5.15.182-syzkaller #0 [ 223.688268][T10216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 223.698327][T10216] Call Trace: [ 223.701609][T10216] [ 223.704549][T10216] dump_stack_lvl+0x168/0x230 [ 223.709238][T10216] ? show_regs_print_info+0x20/0x20 [ 223.709844][T10218] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 223.714440][T10216] ? load_image+0x3b0/0x3b0 [ 223.714463][T10216] ? __lock_acquire+0x7c60/0x7c60 [ 223.714486][T10216] ? bpf_test_run+0x81d/0x870 [ 223.714509][T10216] should_fail+0x38c/0x4c0 [ 223.714536][T10216] _copy_to_user+0x2e/0x130 [ 223.745396][T10216] bpf_test_finish+0x158/0x2d0 [ 223.750153][T10216] ? convert_skb_to___skb+0x360/0x360 [ 223.755514][T10216] ? __build_skb+0x1e2/0x2e0 [ 223.760094][T10216] ? convert_skb_to___skb+0x1ff/0x360 [ 223.765452][T10216] bpf_prog_test_run_skb+0xb8f/0x1180 [ 223.770828][T10216] ? cpu_online+0x60/0x60 [ 223.775151][T10216] bpf_prog_test_run+0x31e/0x390 [ 223.780079][T10216] __sys_bpf+0x535/0x670 [ 223.784313][T10216] ? bpf_link_show_fdinfo+0x310/0x310 [ 223.789686][T10216] ? vtime_user_exit+0x2dc/0x400 [ 223.794621][T10216] __x64_sys_bpf+0x78/0x90 [ 223.799027][T10216] do_syscall_64+0x4c/0xa0 [ 223.803430][T10216] ? clear_bhb_loop+0x15/0x70 [ 223.808091][T10216] ? clear_bhb_loop+0x15/0x70 [ 223.812755][T10216] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 223.818637][T10216] RIP: 0033:0x7f3ae6f18969 [ 223.823042][T10216] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 223.842635][T10216] RSP: 002b:00007f3ae4d80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 223.851046][T10216] RAX: ffffffffffffffda RBX: 00007f3ae713ffa0 RCX: 00007f3ae6f18969 [ 223.859023][T10216] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 223.866989][T10216] RBP: 00007f3ae4d80090 R08: 0000000000000000 R09: 0000000000000000 [ 223.874948][T10216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 223.882911][T10216] R13: 0000000000000000 R14: 00007f3ae713ffa0 R15: 00007fff7ebcee58 [ 223.890878][T10216] [ 224.525653][T10249] validate_nla: 4 callbacks suppressed [ 224.525672][T10249] netlink: 'syz.0.2229': attribute type 21 has an invalid length. [ 224.557417][T10249] netlink: 'syz.0.2229': attribute type 4 has an invalid length. [ 224.574511][T10249] netlink: 'syz.0.2229': attribute type 5 has an invalid length. [ 224.764514][T10256] netlink: 'syz.3.2230': attribute type 10 has an invalid length. [ 224.940390][T10263] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 225.425567][T10284] netlink: 'syz.0.2242': attribute type 10 has an invalid length. [ 225.673583][T10298] netlink: 'syz.2.2247': attribute type 10 has an invalid length. [ 225.790035][T10309] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 226.301646][T10332] netlink: 'syz.6.2259': attribute type 10 has an invalid length. [ 226.312847][T10332] __nla_validate_parse: 11 callbacks suppressed [ 226.312877][T10332] netlink: 40 bytes leftover after parsing attributes in process `syz.6.2259'. [ 226.608385][T10345] netlink: 192440 bytes leftover after parsing attributes in process `syz.3.2265'. [ 226.640251][T10345] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 226.690816][T10343] netlink: 'syz.0.2264': attribute type 10 has an invalid length. [ 226.698898][T10343] netlink: 55 bytes leftover after parsing attributes in process `syz.0.2264'. [ 227.289566][T10369] netlink: 'syz.1.2274': attribute type 10 has an invalid length. [ 227.319036][T10369] netlink: 40 bytes leftover after parsing attributes in process `syz.1.2274'. [ 227.514575][T10384] netlink: 192440 bytes leftover after parsing attributes in process `syz.2.2279'. [ 227.552468][T10384] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 227.905298][T10387] netlink: 'syz.1.2278': attribute type 10 has an invalid length. [ 227.958120][T10387] netlink: 55 bytes leftover after parsing attributes in process `syz.1.2278'. [ 228.208765][T10410] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2288'. [ 228.606335][T10421] netlink: 192440 bytes leftover after parsing attributes in process `syz.2.2292'. [ 228.632554][T10421] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 229.252444][T10438] netlink: 55 bytes leftover after parsing attributes in process `syz.3.2298'. [ 229.458684][T10448] netlink: 40 bytes leftover after parsing attributes in process `syz.2.2302'. [ 229.480766][T10446] FAULT_INJECTION: forcing a failure. [ 229.480766][T10446] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 229.495763][T10446] CPU: 0 PID: 10446 Comm: syz.0.2301 Not tainted 5.15.182-syzkaller #0 [ 229.504030][T10446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 229.514090][T10446] Call Trace: [ 229.517372][T10446] [ 229.520314][T10446] dump_stack_lvl+0x168/0x230 [ 229.525015][T10446] ? show_regs_print_info+0x20/0x20 [ 229.530233][T10446] ? load_image+0x3b0/0x3b0 [ 229.534744][T10446] ? __lock_acquire+0x7c60/0x7c60 [ 229.539791][T10446] should_fail+0x38c/0x4c0 [ 229.544244][T10446] _copy_from_user+0x2e/0x170 [ 229.548935][T10446] dev_ethtool+0xd7/0xef0 [ 229.553271][T10446] ? lock_chain_count+0x20/0x20 [ 229.558131][T10446] ? ethtool_get_module_eeprom_call+0x170/0x170 [ 229.564379][T10446] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 229.570536][T10446] ? lockdep_hardirqs_on+0x94/0x140 [ 229.575738][T10446] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 229.581932][T10446] dev_ioctl+0x471/0xe50 [ 229.586189][T10446] ? _copy_from_user+0x111/0x170 [ 229.591137][T10446] sock_do_ioctl+0x222/0x2f0 [ 229.595754][T10446] ? sock_show_fdinfo+0xb0/0xb0 [ 229.600633][T10446] sock_ioctl+0x4ed/0x6e0 [ 229.604966][T10446] ? sock_poll+0x3f0/0x3f0 [ 229.609419][T10446] ? bpf_lsm_file_ioctl+0x5/0x10 [ 229.614368][T10446] ? security_file_ioctl+0x7c/0xa0 [ 229.619503][T10446] ? sock_poll+0x3f0/0x3f0 [ 229.623927][T10446] __se_sys_ioctl+0xfa/0x170 [ 229.628548][T10446] do_syscall_64+0x4c/0xa0 [ 229.632965][T10446] ? clear_bhb_loop+0x15/0x70 [ 229.637640][T10446] ? clear_bhb_loop+0x15/0x70 [ 229.642324][T10446] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 229.648238][T10446] RIP: 0033:0x7fe8af925969 [ 229.652655][T10446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 229.672267][T10446] RSP: 002b:00007fe8ad78d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 229.680716][T10446] RAX: ffffffffffffffda RBX: 00007fe8afb4cfa0 RCX: 00007fe8af925969 [ 229.688688][T10446] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 000000000000001e [ 229.696659][T10446] RBP: 00007fe8ad78d090 R08: 0000000000000000 R09: 0000000000000000 [ 229.704629][T10446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 229.712628][T10446] R13: 0000000000000000 R14: 00007fe8afb4cfa0 R15: 00007ffcb2db4478 [ 229.720628][T10446] [ 229.889697][T10457] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 230.562482][T10481] validate_nla: 3 callbacks suppressed [ 230.562533][T10481] netlink: 'syz.3.2316': attribute type 10 has an invalid length. [ 230.611079][T10484] netlink: 'syz.2.2314': attribute type 10 has an invalid length. [ 230.904381][T10486] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 231.134059][T10496] delete_channel: no stack [ 231.299784][T10508] FAULT_INJECTION: forcing a failure. [ 231.299784][T10508] name failslab, interval 1, probability 0, space 0, times 0 [ 231.337182][T10508] CPU: 1 PID: 10508 Comm: syz.0.2325 Not tainted 5.15.182-syzkaller #0 [ 231.345448][T10508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 231.355503][T10508] Call Trace: [ 231.358774][T10508] [ 231.361703][T10508] dump_stack_lvl+0x168/0x230 [ 231.366407][T10508] ? show_regs_print_info+0x20/0x20 [ 231.371628][T10508] ? load_image+0x3b0/0x3b0 [ 231.376150][T10508] ? __might_sleep+0xf0/0xf0 [ 231.380750][T10508] ? __lock_acquire+0x7c60/0x7c60 [ 231.385790][T10508] should_fail+0x38c/0x4c0 [ 231.390222][T10508] should_failslab+0x5/0x20 [ 231.394735][T10508] slab_pre_alloc_hook+0x51/0xc0 [ 231.399669][T10508] kmem_cache_alloc_trace+0x47/0x2a0 [ 231.404947][T10508] ? bpf_raw_tracepoint_open+0x3ae/0x780 [ 231.410576][T10508] bpf_raw_tracepoint_open+0x3ae/0x780 [ 231.416023][T10508] ? ksys_write+0x1c7/0x250 [ 231.420514][T10508] ? bpf_obj_get_info_by_fd+0x2a80/0x2a80 [ 231.426227][T10508] ? __might_fault+0xb3/0x110 [ 231.430892][T10508] ? bpf_lsm_bpf+0x5/0x10 [ 231.435207][T10508] ? security_bpf+0x7a/0xa0 [ 231.439697][T10508] __sys_bpf+0x48b/0x670 [ 231.443924][T10508] ? bpf_link_show_fdinfo+0x310/0x310 [ 231.449288][T10508] ? vtime_user_exit+0x2dc/0x400 [ 231.454222][T10508] __x64_sys_bpf+0x78/0x90 [ 231.458631][T10508] do_syscall_64+0x4c/0xa0 [ 231.463035][T10508] ? clear_bhb_loop+0x15/0x70 [ 231.467695][T10508] ? clear_bhb_loop+0x15/0x70 [ 231.472372][T10508] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 231.478263][T10508] RIP: 0033:0x7fe8af925969 [ 231.482673][T10508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 231.502269][T10508] RSP: 002b:00007fe8ad78d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 231.510675][T10508] RAX: ffffffffffffffda RBX: 00007fe8afb4cfa0 RCX: 00007fe8af925969 [ 231.518637][T10508] RDX: 0000000000000010 RSI: 0000200000000040 RDI: 0000000000000011 [ 231.526597][T10508] RBP: 00007fe8ad78d090 R08: 0000000000000000 R09: 0000000000000000 [ 231.534551][T10508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 231.542505][T10508] R13: 0000000000000000 R14: 00007fe8afb4cfa0 R15: 00007ffcb2db4478 [ 231.550473][T10508] [ 231.756051][T10520] netlink: 'syz.3.2331': attribute type 10 has an invalid length. [ 231.765796][T10520] __nla_validate_parse: 5 callbacks suppressed [ 231.765856][T10520] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2331'. [ 231.931621][T10525] netlink: 192440 bytes leftover after parsing attributes in process `syz.1.2334'. [ 231.993301][T10525] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 232.045472][T10522] netlink: 'syz.2.2332': attribute type 10 has an invalid length. [ 232.062553][T10522] netlink: 55 bytes leftover after parsing attributes in process `syz.2.2332'. [ 232.534294][T10548] FAULT_INJECTION: forcing a failure. [ 232.534294][T10548] name failslab, interval 1, probability 0, space 0, times 0 [ 232.643286][T10548] CPU: 1 PID: 10548 Comm: syz.1.2341 Not tainted 5.15.182-syzkaller #0 [ 232.651578][T10548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 232.661662][T10548] Call Trace: [ 232.664964][T10548] [ 232.667908][T10548] dump_stack_lvl+0x168/0x230 [ 232.672621][T10548] ? show_regs_print_info+0x20/0x20 [ 232.677850][T10548] ? load_image+0x3b0/0x3b0 [ 232.682388][T10548] ? __might_sleep+0xf0/0xf0 [ 232.687019][T10548] ? __lock_acquire+0x7c60/0x7c60 [ 232.692103][T10548] should_fail+0x38c/0x4c0 [ 232.696578][T10548] should_failslab+0x5/0x20 [ 232.701097][T10548] slab_pre_alloc_hook+0x51/0xc0 [ 232.706080][T10548] kmem_cache_alloc_node+0x47/0x2d0 [ 232.711297][T10548] ? __alloc_skb+0xf4/0x750 [ 232.715852][T10548] __alloc_skb+0xf4/0x750 [ 232.720216][T10548] netlink_dump+0x22a/0xcb0 [ 232.724754][T10548] ? bpf_lsm_capable+0x5/0x10 [ 232.729450][T10548] ? netlink_lookup+0x1d0/0x1d0 [ 232.734343][T10548] ? __inet_diag_dump_start+0x805/0x970 [ 232.739934][T10548] __netlink_dump_start+0x523/0x700 [ 232.745182][T10548] inet_diag_rcv_msg_compat+0x1e9/0x3c0 [ 232.750763][T10548] ? inet_diag_unregister+0xb0/0xb0 [ 232.755999][T10548] ? mutex_lock_io_nested+0x60/0x60 [ 232.761240][T10548] ? __inet_diag_dump+0x380/0x380 [ 232.766298][T10548] ? inet_diag_dump_start_compat+0x20/0x20 [ 232.772122][T10548] ? inet_diag_dump+0x50/0x50 [ 232.776816][T10548] ? dev_queue_xmit+0x20/0x20 [ 232.781501][T10548] ? memcpy+0x3c/0x60 [ 232.785490][T10548] ? sock_diag_rcv+0x17/0x40 [ 232.790079][T10548] ? sock_diag_rcv+0x17/0x40 [ 232.794669][T10548] ? inet_diag_unregister+0xb0/0xb0 [ 232.799867][T10548] sock_diag_rcv_msg+0x164/0x3e0 [ 232.804818][T10548] netlink_rcv_skb+0x1e0/0x430 [ 232.809658][T10548] ? sock_diag_bind+0xa0/0xa0 [ 232.814356][T10548] ? netlink_ack+0xb60/0xb60 [ 232.818956][T10548] ? __lock_acquire+0x7c60/0x7c60 [ 232.824008][T10548] sock_diag_rcv+0x26/0x40 [ 232.828435][T10548] netlink_unicast+0x77c/0x920 [ 232.833220][T10548] netlink_sendmsg+0x8ab/0xbc0 [ 232.838001][T10548] ? netlink_getsockopt+0x560/0x560 [ 232.843201][T10548] ? aa_sock_msg_perm+0x94/0x150 [ 232.848144][T10548] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 232.853450][T10548] ? security_socket_sendmsg+0x7c/0xa0 [ 232.858911][T10548] ? netlink_getsockopt+0x560/0x560 [ 232.864109][T10548] ____sys_sendmsg+0x5a2/0x8c0 [ 232.868897][T10548] ? memset+0x1e/0x40 [ 232.872885][T10548] ? __sys_sendmsg_sock+0x30/0x30 [ 232.877939][T10548] ? import_iovec+0x6f/0xa0 [ 232.882470][T10548] ___sys_sendmsg+0x1f0/0x260 [ 232.887174][T10548] ? __sys_sendmsg+0x250/0x250 [ 232.891974][T10548] ? vfs_write+0x84d/0xd00 [ 232.896437][T10548] ? __fdget+0x18b/0x210 [ 232.900693][T10548] __se_sys_sendmsg+0x190/0x250 [ 232.905557][T10548] ? __x64_sys_sendmsg+0x80/0x80 [ 232.910503][T10548] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 232.916517][T10548] ? trace_sys_enter+0x1f/0x80 [ 232.921295][T10548] do_syscall_64+0x4c/0xa0 [ 232.925714][T10548] ? clear_bhb_loop+0x15/0x70 [ 232.930383][T10548] ? clear_bhb_loop+0x15/0x70 [ 232.935058][T10548] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 232.940952][T10548] RIP: 0033:0x7fd99c40f969 [ 232.945378][T10548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 232.964985][T10548] RSP: 002b:00007fd99a277038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 232.973411][T10548] RAX: ffffffffffffffda RBX: 00007fd99c636fa0 RCX: 00007fd99c40f969 [ 232.981380][T10548] RDX: 0000000000000000 RSI: 0000200000000380 RDI: 0000000000000005 [ 232.989353][T10548] RBP: 00007fd99a277090 R08: 0000000000000000 R09: 0000000000000000 [ 232.997317][T10548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 233.005283][T10548] R13: 0000000000000000 R14: 00007fd99c636fa0 R15: 00007ffdf1839e38 [ 233.013284][T10548] [ 233.519278][T10560] netlink: 192440 bytes leftover after parsing attributes in process `syz.2.2346'. [ 233.553250][T10560] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 233.669450][T10566] netlink: 'syz.3.2347': attribute type 10 has an invalid length. [ 233.716445][T10566] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2347'. [ 233.831530][T10565] netlink: 'syz.0.2348': attribute type 10 has an invalid length. [ 233.860420][T10565] netlink: 55 bytes leftover after parsing attributes in process `syz.0.2348'. [ 234.048326][T10579] FAULT_INJECTION: forcing a failure. [ 234.048326][T10579] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 234.061681][T10579] CPU: 1 PID: 10579 Comm: syz.0.2353 Not tainted 5.15.182-syzkaller #0 [ 234.069940][T10579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 234.079998][T10579] Call Trace: [ 234.083282][T10579] [ 234.086218][T10579] dump_stack_lvl+0x168/0x230 [ 234.090915][T10579] ? show_regs_print_info+0x20/0x20 [ 234.096134][T10579] ? load_image+0x3b0/0x3b0 [ 234.100645][T10579] ? __lock_acquire+0x7c60/0x7c60 [ 234.105673][T10579] ? perf_trace_lock_acquire+0xe3/0x3c0 [ 234.111232][T10579] should_fail+0x38c/0x4c0 [ 234.115668][T10579] _copy_from_user+0x2e/0x170 [ 234.120351][T10579] __copy_msghdr_from_user+0xaf/0x5e0 [ 234.125734][T10579] ? verify_lock_unused+0x140/0x140 [ 234.130935][T10579] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 234.136229][T10579] ? trace_event_raw_event_lock+0x250/0x250 [ 234.142130][T10579] ___sys_sendmsg+0x156/0x260 [ 234.146823][T10579] ? __sys_sendmsg+0x250/0x250 [ 234.151607][T10579] ? trace_event_raw_event_lock+0x250/0x250 [ 234.157510][T10579] ? vfs_write+0x84d/0xd00 [ 234.161941][T10579] ? __fdget+0x18b/0x210 [ 234.166194][T10579] __se_sys_sendmsg+0x190/0x250 [ 234.171059][T10579] ? __x64_sys_sendmsg+0x80/0x80 [ 234.176000][T10579] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 234.182001][T10579] ? trace_sys_enter+0x1f/0x80 [ 234.186777][T10579] do_syscall_64+0x4c/0xa0 [ 234.191215][T10579] ? clear_bhb_loop+0x15/0x70 [ 234.195900][T10579] ? clear_bhb_loop+0x15/0x70 [ 234.200582][T10579] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 234.206495][T10579] RIP: 0033:0x7fe8af925969 [ 234.210913][T10579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 234.230516][T10579] RSP: 002b:00007fe8ad78d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 234.238930][T10579] RAX: ffffffffffffffda RBX: 00007fe8afb4cfa0 RCX: 00007fe8af925969 [ 234.246901][T10579] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000003 [ 234.254865][T10579] RBP: 00007fe8ad78d090 R08: 0000000000000000 R09: 0000000000000000 [ 234.262833][T10579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 234.270797][T10579] R13: 0000000000000000 R14: 00007fe8afb4cfa0 R15: 00007ffcb2db4478 [ 234.278783][T10579] [ 234.527853][T10584] netlink: 16186 bytes leftover after parsing attributes in process `syz.0.2354'. [ 234.739781][T10588] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2356'. [ 234.762707][T10596] netlink: 60 bytes leftover after parsing attributes in process `syz.2.2359'. [ 234.773949][T10596] netlink: 60 bytes leftover after parsing attributes in process `syz.2.2359'. [ 234.861366][T10598] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 235.028724][T10603] netlink: 'syz.3.2362': attribute type 10 has an invalid length. [ 235.182562][T10605] netlink: 'syz.0.2363': attribute type 10 has an invalid length. [ 235.345551][T10612] netlink: 'syz.2.2366': attribute type 10 has an invalid length. [ 236.208434][T10631] netlink: 'syz.0.2369': attribute type 2 has an invalid length. [ 236.644619][T10640] netlink: 'syz.1.2372': attribute type 20 has an invalid length. [ 236.837236][T10645] netlink: 'syz.0.2377': attribute type 10 has an invalid length. [ 236.893466][T10645] __nla_validate_parse: 8 callbacks suppressed [ 236.893482][T10645] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2377'. [ 237.010185][T10650] netlink: 'syz.2.2378': attribute type 10 has an invalid length. [ 237.020098][T10650] netlink: 55 bytes leftover after parsing attributes in process `syz.2.2378'. [ 237.653313][T10657] FAULT_INJECTION: forcing a failure. [ 237.653313][T10657] name failslab, interval 1, probability 0, space 0, times 0 [ 237.714281][T10657] CPU: 1 PID: 10657 Comm: syz.2.2381 Not tainted 5.15.182-syzkaller #0 [ 237.722558][T10657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 237.732626][T10657] Call Trace: [ 237.735912][T10657] [ 237.738950][T10657] dump_stack_lvl+0x168/0x230 [ 237.743654][T10657] ? show_regs_print_info+0x20/0x20 [ 237.748881][T10657] ? load_image+0x3b0/0x3b0 [ 237.753395][T10657] ? __might_sleep+0xf0/0xf0 [ 237.757994][T10657] ? __lock_acquire+0x7c60/0x7c60 [ 237.763028][T10657] ? mark_lock+0x94/0x320 [ 237.767375][T10657] should_fail+0x38c/0x4c0 [ 237.771811][T10657] should_failslab+0x5/0x20 [ 237.776327][T10657] slab_pre_alloc_hook+0x51/0xc0 [ 237.781285][T10657] __kmalloc+0x6b/0x330 [ 237.785452][T10657] ? tomoyo_realpath_from_path+0x118/0x610 [ 237.791275][T10657] tomoyo_realpath_from_path+0x118/0x610 [ 237.796941][T10657] tomoyo_path_number_perm+0x1d5/0x5d0 [ 237.802414][T10657] ? verify_lock_unused+0x140/0x140 [ 237.807632][T10657] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 237.813099][T10657] ? ksys_write+0x1c7/0x250 [ 237.817659][T10657] security_file_ioctl+0x6c/0xa0 [ 237.822604][T10657] __se_sys_ioctl+0x48/0x170 [ 237.827202][T10657] do_syscall_64+0x4c/0xa0 [ 237.831629][T10657] ? clear_bhb_loop+0x15/0x70 [ 237.836317][T10657] ? clear_bhb_loop+0x15/0x70 [ 237.841002][T10657] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 237.846913][T10657] RIP: 0033:0x7f3ae6f18969 [ 237.851337][T10657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 237.870949][T10657] RSP: 002b:00007f3ae4d80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 237.879365][T10657] RAX: ffffffffffffffda RBX: 00007f3ae713ffa0 RCX: 00007f3ae6f18969 [ 237.887336][T10657] RDX: 0000200000000040 RSI: 0000000000008b04 RDI: 0000000000000004 [ 237.895305][T10657] RBP: 00007f3ae4d80090 R08: 0000000000000000 R09: 0000000000000000 [ 237.903278][T10657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 237.911268][T10657] R13: 0000000000000000 R14: 00007f3ae713ffa0 R15: 00007fff7ebcee58 [ 237.919243][T10657] [ 238.042747][T10657] ERROR: Out of memory at tomoyo_realpath_from_path. [ 238.180532][T10671] netlink: 'syz.6.2387': attribute type 2 has an invalid length. [ 238.209647][T10671] netlink: 212408 bytes leftover after parsing attributes in process `syz.6.2387'. [ 238.260239][T10674] netlink: 'syz.2.2390': attribute type 10 has an invalid length. [ 238.281619][T10674] netlink: 40 bytes leftover after parsing attributes in process `syz.2.2390'. [ 238.490856][T10684] netlink: 'syz.2.2393': attribute type 21 has an invalid length. [ 238.542333][T10683] netlink: 'syz.0.2392': attribute type 10 has an invalid length. [ 238.592598][T10683] netlink: 55 bytes leftover after parsing attributes in process `syz.0.2392'. [ 238.630762][T10691] FAULT_INJECTION: forcing a failure. [ 238.630762][T10691] name failslab, interval 1, probability 0, space 0, times 0 [ 238.647507][T10691] CPU: 0 PID: 10691 Comm: syz.6.2396 Not tainted 5.15.182-syzkaller #0 [ 238.655764][T10691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 238.665817][T10691] Call Trace: [ 238.669099][T10691] [ 238.672033][T10691] dump_stack_lvl+0x168/0x230 [ 238.676728][T10691] ? show_regs_print_info+0x20/0x20 [ 238.681933][T10691] ? load_image+0x3b0/0x3b0 [ 238.686443][T10691] ? __might_sleep+0xf0/0xf0 [ 238.691028][T10691] ? __lock_acquire+0x7c60/0x7c60 [ 238.696056][T10691] should_fail+0x38c/0x4c0 [ 238.700478][T10691] should_failslab+0x5/0x20 [ 238.704981][T10691] slab_pre_alloc_hook+0x51/0xc0 [ 238.709928][T10691] kmem_cache_alloc_trace+0x47/0x2a0 [ 238.715229][T10691] ? ip_setup_cork+0x52c/0x890 [ 238.719995][T10691] ip_setup_cork+0x52c/0x890 [ 238.724590][T10691] ip_append_data+0x15a/0x1a0 [ 238.729262][T10691] ? lock_sock_nested+0x68/0x100 [ 238.734194][T10691] ? raw_send_hdrinc+0x11e0/0x11e0 [ 238.739313][T10691] raw_sendmsg+0x131a/0x1890 [ 238.743938][T10691] ? compat_raw_ioctl+0x60/0x60 [ 238.748814][T10691] ? aa_sk_perm+0x7b4/0x8f0 [ 238.753323][T10691] ? tomoyo_socket_sendmsg_permission+0x212/0x2f0 [ 238.759737][T10691] ? sock_rps_record_flow+0x17/0x3b0 [ 238.765019][T10691] ? inet_send_prepare+0x260/0x260 [ 238.770132][T10691] ? inet_sendmsg+0x78/0x2f0 [ 238.774719][T10691] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 238.779998][T10691] ? security_socket_sendmsg+0x7c/0xa0 [ 238.785450][T10691] ? inet_send_prepare+0x260/0x260 [ 238.790562][T10691] ____sys_sendmsg+0x5a2/0x8c0 [ 238.795365][T10691] ? __sys_sendmsg_sock+0x30/0x30 [ 238.800410][T10691] ? import_iovec+0x6f/0xa0 [ 238.804918][T10691] ___sys_sendmsg+0x1f0/0x260 [ 238.809603][T10691] ? __sys_sendmsg+0x250/0x250 [ 238.814373][T10691] ? trace_event_raw_event_lock+0x250/0x250 [ 238.820263][T10691] ? vfs_write+0x84d/0xd00 [ 238.824692][T10691] ? __fdget+0x18b/0x210 [ 238.828942][T10691] __se_sys_sendmsg+0x190/0x250 [ 238.833802][T10691] ? __x64_sys_sendmsg+0x80/0x80 [ 238.838738][T10691] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 238.844727][T10691] ? trace_sys_enter+0x1f/0x80 [ 238.849494][T10691] do_syscall_64+0x4c/0xa0 [ 238.853905][T10691] ? clear_bhb_loop+0x15/0x70 [ 238.858578][T10691] ? clear_bhb_loop+0x15/0x70 [ 238.863250][T10691] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 238.869139][T10691] RIP: 0033:0x7feeeff30969 [ 238.873552][T10691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 238.893150][T10691] RSP: 002b:00007feeedd98038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 238.901571][T10691] RAX: ffffffffffffffda RBX: 00007feef0157fa0 RCX: 00007feeeff30969 [ 238.909548][T10691] RDX: 0000000000000000 RSI: 0000200000001640 RDI: 0000000000000003 [ 238.917517][T10691] RBP: 00007feeedd98090 R08: 0000000000000000 R09: 0000000000000000 [ 238.925485][T10691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 238.933453][T10691] R13: 0000000000000000 R14: 00007feef0157fa0 R15: 00007ffd05e10008 [ 238.941445][T10691] [ 239.353968][T10711] netlink: 60 bytes leftover after parsing attributes in process `syz.2.2403'. [ 239.427934][T10713] netlink: 830 bytes leftover after parsing attributes in process `syz.6.2405'. [ 239.459275][T10714] netlink: 'syz.3.2404': attribute type 10 has an invalid length. [ 239.491428][T10714] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2404'. [ 239.636095][T10726] netlink: 'syz.6.2408': attribute type 2 has an invalid length. [ 239.657255][T10726] netlink: 212408 bytes leftover after parsing attributes in process `syz.6.2408'. [ 240.290720][T10742] device syzkaller0 entered promiscuous mode [ 240.354348][T10751] netlink: 55 bytes leftover after parsing attributes in process `syz.0.2412'. [ 241.120149][T10779] FAULT_INJECTION: forcing a failure. [ 241.120149][T10779] name failslab, interval 1, probability 0, space 0, times 0 [ 241.167050][T10779] CPU: 0 PID: 10779 Comm: syz.6.2429 Not tainted 5.15.182-syzkaller #0 [ 241.175326][T10779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 241.185380][T10779] Call Trace: [ 241.188658][T10779] [ 241.191589][T10779] dump_stack_lvl+0x168/0x230 [ 241.196284][T10779] ? show_regs_print_info+0x20/0x20 [ 241.201490][T10779] ? load_image+0x3b0/0x3b0 [ 241.206006][T10779] ? __might_sleep+0xf0/0xf0 [ 241.210602][T10779] ? __lock_acquire+0x7c60/0x7c60 [ 241.215635][T10779] should_fail+0x38c/0x4c0 [ 241.220056][T10779] should_failslab+0x5/0x20 [ 241.224558][T10779] slab_pre_alloc_hook+0x51/0xc0 [ 241.229517][T10779] kmem_cache_alloc_trace+0x47/0x2a0 [ 241.234804][T10779] ? ip_setup_cork+0x52c/0x890 [ 241.239576][T10779] ip_setup_cork+0x52c/0x890 [ 241.244184][T10779] ip_append_data+0x15a/0x1a0 [ 241.248876][T10779] ? lock_sock_nested+0x68/0x100 [ 241.253824][T10779] ? raw_send_hdrinc+0x11e0/0x11e0 [ 241.258945][T10779] raw_sendmsg+0x131a/0x1890 [ 241.263585][T10779] ? compat_raw_ioctl+0x60/0x60 [ 241.268466][T10779] ? aa_sk_perm+0x7b4/0x8f0 [ 241.272990][T10779] ? tomoyo_socket_sendmsg_permission+0x212/0x2f0 [ 241.279419][T10779] ? sock_rps_record_flow+0x17/0x3b0 [ 241.284718][T10779] ? inet_send_prepare+0x260/0x260 [ 241.289856][T10779] ? inet_sendmsg+0x78/0x2f0 [ 241.294455][T10779] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 241.299748][T10779] ? security_socket_sendmsg+0x7c/0xa0 [ 241.305220][T10779] ? inet_send_prepare+0x260/0x260 [ 241.310346][T10779] ____sys_sendmsg+0x5a2/0x8c0 [ 241.315137][T10779] ? __sys_sendmsg_sock+0x30/0x30 [ 241.320183][T10779] ? import_iovec+0x6f/0xa0 [ 241.324710][T10779] ___sys_sendmsg+0x1f0/0x260 [ 241.329409][T10779] ? __sys_sendmsg+0x250/0x250 [ 241.334190][T10779] ? trace_event_raw_event_lock+0x250/0x250 [ 241.340110][T10779] ? __fdget+0x18b/0x210 [ 241.344358][T10779] __se_sys_sendmsg+0x190/0x250 [ 241.349217][T10779] ? __x64_sys_sendmsg+0x80/0x80 [ 241.354157][T10779] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 241.360156][T10779] ? trace_sys_enter+0x1f/0x80 [ 241.364931][T10779] do_syscall_64+0x4c/0xa0 [ 241.369358][T10779] ? clear_bhb_loop+0x15/0x70 [ 241.374036][T10779] ? clear_bhb_loop+0x15/0x70 [ 241.378721][T10779] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 241.384633][T10779] RIP: 0033:0x7feeeff30969 [ 241.389062][T10779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 241.408669][T10779] RSP: 002b:00007feeedd98038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 241.417087][T10779] RAX: ffffffffffffffda RBX: 00007feef0157fa0 RCX: 00007feeeff30969 [ 241.425061][T10779] RDX: 0000000000000000 RSI: 0000200000001640 RDI: 0000000000000003 [ 241.433035][T10779] RBP: 00007feeedd98090 R08: 0000000000000000 R09: 0000000000000000 [ 241.441015][T10779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 241.448999][T10779] R13: 0000000000000000 R14: 00007feef0157fa0 R15: 00007ffd05e10008 [ 241.456995][T10779] [ 241.869991][T10788] validate_nla: 3 callbacks suppressed [ 241.870112][T10788] netlink: 'syz.1.2433': attribute type 10 has an invalid length. [ 242.148399][T10792] netlink: 'syz.0.2434': attribute type 10 has an invalid length. [ 242.212837][T10792] __nla_validate_parse: 3 callbacks suppressed [ 242.212853][T10792] netlink: 55 bytes leftover after parsing attributes in process `syz.0.2434'. [ 242.470717][T10806] netlink: 'syz.6.2439': attribute type 2 has an invalid length. [ 242.535083][T10806] netlink: 212408 bytes leftover after parsing attributes in process `syz.6.2439'. [ 243.071699][T10826] netlink: 'syz.0.2447': attribute type 10 has an invalid length. [ 243.108639][T10826] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2447'. [ 243.588188][T10835] device veth0_vlan left promiscuous mode [ 243.597960][T10835] device veth0_vlan entered promiscuous mode [ 243.634699][T10843] netlink: 'syz.3.2451': attribute type 10 has an invalid length. [ 243.653901][T10843] netlink: 55 bytes leftover after parsing attributes in process `syz.3.2451'. [ 243.683531][T10849] netlink: 'syz.1.2454': attribute type 2 has an invalid length. [ 243.691289][T10849] netlink: 212408 bytes leftover after parsing attributes in process `syz.1.2454'. [ 243.692914][ T4267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.738101][ T4267] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.747578][ T4267] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.769839][T10851] netlink: 'syz.2.2455': attribute type 21 has an invalid length. [ 243.979305][T10858] netlink: 156 bytes leftover after parsing attributes in process `syz.3.2457'. [ 244.397716][T10871] netlink: 'syz.2.2462': attribute type 10 has an invalid length. [ 244.436558][T10871] netlink: 40 bytes leftover after parsing attributes in process `syz.2.2462'. [ 244.700089][T10886] FAULT_INJECTION: forcing a failure. [ 244.700089][T10886] name failslab, interval 1, probability 0, space 0, times 0 [ 244.791210][T10886] CPU: 0 PID: 10886 Comm: syz.3.2468 Not tainted 5.15.182-syzkaller #0 [ 244.799495][T10886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 244.806182][T10896] netlink: 'syz.1.2467': attribute type 10 has an invalid length. [ 244.809551][T10886] Call Trace: [ 244.820619][T10886] [ 244.823553][T10886] dump_stack_lvl+0x168/0x230 [ 244.828248][T10886] ? show_regs_print_info+0x20/0x20 [ 244.833463][T10886] ? load_image+0x3b0/0x3b0 [ 244.835632][T10896] netlink: 55 bytes leftover after parsing attributes in process `syz.1.2467'. [ 244.837981][T10886] should_fail+0x38c/0x4c0 [ 244.838015][T10886] should_failslab+0x5/0x20 [ 244.855822][T10886] slab_pre_alloc_hook+0x51/0xc0 [ 244.860766][T10886] ? nf_ct_ext_add+0x42e/0x660 [ 244.865541][T10886] __kmalloc_track_caller+0x69/0x330 [ 244.870835][T10886] ? nf_ct_ext_add+0x42e/0x660 [ 244.875617][T10886] krealloc+0x5a/0xf0 [ 244.879611][T10886] nf_ct_ext_add+0x42e/0x660 [ 244.884219][T10886] init_conntrack+0x751/0x14b0 [ 244.888987][T10886] ? __nf_conntrack_find_get+0x54c/0x620 [ 244.894615][T10886] ? early_drop+0x810/0x810 [ 244.899108][T10886] ? nf_conntrack_find_get+0x600/0x600 [ 244.904571][T10886] ? __siphash_unaligned+0x25c/0x3a0 [ 244.909874][T10886] nf_conntrack_in+0xce9/0x16f0 [ 244.914738][T10886] ? nf_ct_pernet+0x240/0x240 [ 244.919435][T10886] ? ip6t_alloc_initial_table+0x640/0x640 [ 244.925143][T10886] ? trace_event_raw_event_lock+0x250/0x250 [ 244.931031][T10886] ? ipv6_defrag+0x2d2/0x3a0 [ 244.935615][T10886] ? ipv6_conntrack_in+0x20/0x20 [ 244.940543][T10886] nf_hook_slow+0xb9/0x200 [ 244.945041][T10886] nf_hook+0x1f2/0x350 [ 244.949100][T10886] ? ip6_make_skb+0x4c0/0x4c0 [ 244.953761][T10886] ? rcu_read_unlock+0xa0/0xa0 [ 244.958514][T10886] ip6_xmit+0xf7e/0x1670 [ 244.962740][T10886] ? rcu_read_unlock+0xa0/0xa0 [ 244.967514][T10886] ? ip6_autoflowlabel+0xd0/0xd0 [ 244.972531][T10886] ? inet6_csk_route_socket+0x5ee/0xe50 [ 244.978075][T10886] ? read_lock_is_recursive+0x10/0x10 [ 244.983456][T10886] inet6_csk_xmit+0x444/0x6d0 [ 244.988159][T10886] ? inet6_csk_addr2sockaddr+0x1d0/0x1d0 [ 244.993794][T10886] ? tcp_v6_send_check+0x195/0x410 [ 244.998906][T10886] __tcp_transmit_skb+0x1d2a/0x3410 [ 245.004103][T10886] ? tcp_get_metrics+0x67f/0xaf0 [ 245.009041][T10886] ? __tcp_send_ack+0x5d0/0x5d0 [ 245.013882][T10886] ? rcu_lock_release+0x5/0x20 [ 245.018639][T10886] ? __lock_acquire+0x7c60/0x7c60 [ 245.023666][T10886] ? tcp_fastopen_cookie_check+0x269/0x3c0 [ 245.029463][T10886] tcp_connect+0x2b07/0x4520 [ 245.034071][T10886] tcp_v6_connect+0x1136/0x1920 [ 245.038918][T10886] ? tcp_v6_pre_connect+0x1a0/0x1a0 [ 245.044101][T10886] ? perf_trace_lock+0xdf/0x370 [ 245.048944][T10886] ? tcp_sendmsg_fastopen+0x1d5/0x600 [ 245.054296][T10886] ? tcp_sendmsg_locked+0x3097/0x3590 [ 245.059658][T10886] ? tcp_sendmsg+0x2b/0x40 [ 245.064055][T10886] ? ____sys_sendmsg+0x5a2/0x8c0 [ 245.068976][T10886] ? ___sys_sendmsg+0x1f0/0x260 [ 245.073811][T10886] ? do_syscall_64+0x4c/0xa0 [ 245.078383][T10886] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 245.084452][T10886] __inet_stream_connect+0x2a2/0xe90 [ 245.089731][T10886] ? inet_dgram_connect+0x430/0x430 [ 245.094928][T10886] tcp_sendmsg_fastopen+0x38f/0x600 [ 245.100115][T10886] tcp_sendmsg_locked+0x3097/0x3590 [ 245.105299][T10886] ? aa_sk_perm+0x8f0/0x8f0 [ 245.109793][T10886] ? perf_trace_lock+0xdf/0x370 [ 245.114637][T10886] ? trace_event_raw_event_lock+0x250/0x250 [ 245.120515][T10886] ? mark_lock+0x94/0x320 [ 245.124833][T10886] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 245.130802][T10886] ? lock_chain_count+0x20/0x20 [ 245.135640][T10886] ? lockdep_hardirqs_on_prepare+0x760/0x760 [ 245.141615][T10886] ? tcp_free_fastopen_req+0x70/0x70 [ 245.146897][T10886] ? lock_sock_nested+0x68/0x100 [ 245.151822][T10886] ? inet6_compat_ioctl+0x380/0x380 [ 245.157013][T10886] ? inet6_compat_ioctl+0x380/0x380 [ 245.162204][T10886] tcp_sendmsg+0x2b/0x40 [ 245.166439][T10886] ____sys_sendmsg+0x5a2/0x8c0 [ 245.171209][T10886] ? memset+0x1e/0x40 [ 245.175182][T10886] ? __sys_sendmsg_sock+0x30/0x30 [ 245.180202][T10886] ? import_iovec+0x6f/0xa0 [ 245.184706][T10886] ___sys_sendmsg+0x1f0/0x260 [ 245.189388][T10886] ? __sys_sendmsg+0x250/0x250 [ 245.194162][T10886] ? trace_event_raw_event_lock+0x250/0x250 [ 245.200046][T10886] ? vfs_write+0x84d/0xd00 [ 245.204471][T10886] ? __fdget+0x18b/0x210 [ 245.208710][T10886] __se_sys_sendmsg+0x190/0x250 [ 245.213556][T10886] ? __x64_sys_sendmsg+0x80/0x80 [ 245.218488][T10886] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 245.224485][T10886] ? trace_sys_enter+0x1f/0x80 [ 245.229250][T10886] do_syscall_64+0x4c/0xa0 [ 245.233660][T10886] ? clear_bhb_loop+0x15/0x70 [ 245.238326][T10886] ? clear_bhb_loop+0x15/0x70 [ 245.242990][T10886] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 245.248868][T10886] RIP: 0033:0x7f2221884969 [ 245.253272][T10886] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 245.272860][T10886] RSP: 002b:00007f221f6ec038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 245.281259][T10886] RAX: ffffffffffffffda RBX: 00007f2221aabfa0 RCX: 00007f2221884969 [ 245.289226][T10886] RDX: 0000000020000041 RSI: 0000200000000000 RDI: 0000000000000004 [ 245.297185][T10886] RBP: 00007f221f6ec090 R08: 0000000000000000 R09: 0000000000000000 [ 245.305138][T10886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 245.313089][T10886] R13: 0000000000000000 R14: 00007f2221aabfa0 R15: 00007fff2e5307e8 [ 245.321057][T10886] [ 245.588702][T10901] netlink: 'syz.0.2470': attribute type 1 has an invalid length. [ 245.648636][T10901] netlink: 181400 bytes leftover after parsing attributes in process `syz.0.2470'. [ 245.683731][T10906] netlink: 212408 bytes leftover after parsing attributes in process `syz.3.2471'. [ 246.874377][T10951] validate_nla: 6 callbacks suppressed [ 246.874391][T10951] netlink: 'syz.1.2489': attribute type 2 has an invalid length. [ 247.046041][T10958] netlink: 'syz.0.2491': attribute type 10 has an invalid length. [ 247.211965][T10968] netlink: 'syz.6.2496': attribute type 21 has an invalid length. [ 247.301057][T10970] netlink: 'syz.1.2498': attribute type 13 has an invalid length. [ 247.329452][T10970] device macvtap0 entered promiscuous mode [ 247.370415][T10970] macvtap0: refused to change device tx_queue_len [ 247.391860][T10974] __nla_validate_parse: 7 callbacks suppressed [ 247.391892][T10974] netlink: 63503 bytes leftover after parsing attributes in process `syz.2.2499'. [ 247.429125][T10974] netlink: 156 bytes leftover after parsing attributes in process `syz.2.2499'. [ 247.702118][T10977] netlink: 'syz.3.2500': attribute type 10 has an invalid length. [ 247.721147][T10977] netlink: 55 bytes leftover after parsing attributes in process `syz.3.2500'. [ 247.789536][T10988] netlink: 'syz.6.2504': attribute type 2 has an invalid length. [ 247.837668][T10988] netlink: 212408 bytes leftover after parsing attributes in process `syz.6.2504'. [ 248.220303][T11000] netlink: 'syz.0.2508': attribute type 10 has an invalid length. [ 248.236361][T11000] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2508'. [ 248.714788][T11021] FAULT_INJECTION: forcing a failure. [ 248.714788][T11021] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 248.744492][T11019] netlink: 'syz.1.2517': attribute type 10 has an invalid length. [ 248.752367][T11019] netlink: 55 bytes leftover after parsing attributes in process `syz.1.2517'. [ 248.762850][T11021] CPU: 0 PID: 11021 Comm: syz.6.2516 Not tainted 5.15.182-syzkaller #0 [ 248.771113][T11021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 248.781191][T11021] Call Trace: [ 248.784487][T11021] [ 248.787404][T11021] dump_stack_lvl+0x168/0x230 [ 248.792083][T11021] ? show_regs_print_info+0x20/0x20 [ 248.797279][T11021] ? load_image+0x3b0/0x3b0 [ 248.801779][T11021] ? __lock_acquire+0x7c60/0x7c60 [ 248.806797][T11021] ? perf_trace_lock+0xdf/0x370 [ 248.811651][T11021] should_fail+0x38c/0x4c0 [ 248.816078][T11021] _copy_from_user+0x2e/0x170 [ 248.820743][T11021] ___sys_recvmsg+0x129/0x4f0 [ 248.825598][T11021] ? __sys_recvmsg+0x250/0x250 [ 248.830356][T11021] ? trace_event_raw_event_lock+0x250/0x250 [ 248.836262][T11021] ? __fdget+0x18b/0x210 [ 248.840509][T11021] __x64_sys_recvmsg+0x1dd/0x2a0 [ 248.845437][T11021] ? ___sys_recvmsg+0x4f0/0x4f0 [ 248.850274][T11021] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 248.856260][T11021] ? trace_sys_enter+0x1f/0x80 [ 248.861020][T11021] do_syscall_64+0x4c/0xa0 [ 248.865421][T11021] ? clear_bhb_loop+0x15/0x70 [ 248.870084][T11021] ? clear_bhb_loop+0x15/0x70 [ 248.874746][T11021] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 248.880628][T11021] RIP: 0033:0x7feeeff30969 [ 248.885035][T11021] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 248.904629][T11021] RSP: 002b:00007feeedd77038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 248.913027][T11021] RAX: ffffffffffffffda RBX: 00007feef0158080 RCX: 00007feeeff30969 [ 248.920986][T11021] RDX: 0000000000010003 RSI: 00002000000038c0 RDI: 000000000000000a [ 248.928943][T11021] RBP: 00007feeedd77090 R08: 0000000000000000 R09: 0000000000000000 [ 248.936900][T11021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 248.944872][T11021] R13: 0000000000000000 R14: 00007feef0158080 R15: 00007ffd05e10008 [ 248.952863][T11021] [ 249.184294][T11030] netlink: 'syz.3.2521': attribute type 10 has an invalid length. [ 249.192315][T11030] netlink: 55 bytes leftover after parsing attributes in process `syz.3.2521'. [ 249.245654][T11030] netlink: 156 bytes leftover after parsing attributes in process `syz.3.2521'. [ 249.261047][T11032] netlink: 'syz.2.2522': attribute type 2 has an invalid length. [ 249.303764][T11032] netlink: 212408 bytes leftover after parsing attributes in process `syz.2.2522'. [ 249.588288][T11039] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2524'. [ 251.954922][T11152] validate_nla: 9 callbacks suppressed [ 251.954937][T11152] netlink: 'syz.2.2558': attribute type 10 has an invalid length. [ 252.014431][T11163] netlink: 'syz.6.2566': attribute type 2 has an invalid length. [ 252.052692][T11161] netlink: 'syz.0.2565': attribute type 10 has an invalid length. [ 252.115172][T11159] device syzkaller0 entered promiscuous mode [ 252.352676][ T7] Bluetooth: hci3: command 0x0406 tx timeout [ 252.819290][T11167] netlink: 'syz.0.2567': attribute type 14 has an invalid length. [ 252.842555][T11167] __nla_validate_parse: 12 callbacks suppressed [ 252.842572][T11167] netlink: 156 bytes leftover after parsing attributes in process `syz.0.2567'. [ 252.955095][T11173] netlink: 16186 bytes leftover after parsing attributes in process `syz.6.2569'. [ 253.210909][T11182] FAULT_INJECTION: forcing a failure. [ 253.210909][T11182] name failslab, interval 1, probability 0, space 0, times 0 [ 253.273385][T11178] netlink: 4079 bytes leftover after parsing attributes in process `syz.0.2571'. [ 253.342802][T11182] CPU: 0 PID: 11182 Comm: syz.2.2572 Not tainted 5.15.182-syzkaller #0 [ 253.351215][T11182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 253.361381][T11182] Call Trace: [ 253.364668][T11182] [ 253.367595][T11182] dump_stack_lvl+0x168/0x230 [ 253.372286][T11182] ? show_regs_print_info+0x20/0x20 [ 253.377608][T11182] ? load_image+0x3b0/0x3b0 [ 253.382134][T11182] ? __might_sleep+0xf0/0xf0 [ 253.386738][T11182] ? __lock_acquire+0x7c60/0x7c60 [ 253.391780][T11182] should_fail+0x38c/0x4c0 [ 253.396222][T11182] should_failslab+0x5/0x20 [ 253.400731][T11182] slab_pre_alloc_hook+0x51/0xc0 [ 253.405685][T11182] kmem_cache_alloc_trace+0x47/0x2a0 [ 253.410977][T11182] ? apparmor_sk_alloc_security+0x74/0x100 [ 253.416801][T11182] apparmor_sk_alloc_security+0x74/0x100 [ 253.422464][T11182] security_sk_alloc+0x6a/0xa0 [ 253.427245][T11182] sk_prot_alloc+0x101/0x210 [ 253.431845][T11182] ? sk_alloc+0x1d/0x310 [ 253.436111][T11182] sk_alloc+0x2f/0x310 [ 253.440194][T11182] bpf_prog_test_run_skb+0x240/0x1180 [ 253.445583][T11182] ? __fget_files+0x40f/0x480 [ 253.450277][T11182] ? cpu_online+0x60/0x60 [ 253.454619][T11182] bpf_prog_test_run+0x31e/0x390 [ 253.459571][T11182] __sys_bpf+0x535/0x670 [ 253.463828][T11182] ? bpf_link_show_fdinfo+0x310/0x310 [ 253.469220][T11182] ? vtime_user_exit+0x2dc/0x400 [ 253.474171][T11182] __x64_sys_bpf+0x78/0x90 [ 253.478591][T11182] do_syscall_64+0x4c/0xa0 [ 253.483011][T11182] ? clear_bhb_loop+0x15/0x70 [ 253.487689][T11182] ? clear_bhb_loop+0x15/0x70 [ 253.492379][T11182] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 253.498289][T11182] RIP: 0033:0x7f3ae6f18969 [ 253.502708][T11182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 253.522406][T11182] RSP: 002b:00007f3ae4d80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 253.530834][T11182] RAX: ffffffffffffffda RBX: 00007f3ae713ffa0 RCX: 00007f3ae6f18969 [ 253.538809][T11182] RDX: 0000000000000050 RSI: 00002000000004c0 RDI: 000000000000000a [ 253.546786][T11182] RBP: 00007f3ae4d80090 R08: 0000000000000000 R09: 0000000000000000 [ 253.554762][T11182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 253.562742][T11182] R13: 0000000000000000 R14: 00007f3ae713ffa0 R15: 00007fff7ebcee58 [ 253.570738][T11182] [ 254.035472][T11201] netlink: 'syz.6.2578': attribute type 10 has an invalid length. [ 254.058746][T11201] netlink: 40 bytes leftover after parsing attributes in process `syz.6.2578'. [ 254.283094][T11206] netlink: 'syz.3.2580': attribute type 2 has an invalid length. [ 254.291054][T11206] netlink: 212408 bytes leftover after parsing attributes in process `syz.3.2580'. [ 254.398877][T11204] netlink: 'syz.2.2579': attribute type 10 has an invalid length. [ 254.443127][T11204] netlink: 55 bytes leftover after parsing attributes in process `syz.2.2579'. [ 254.468106][T11215] FAULT_INJECTION: forcing a failure. [ 254.468106][T11215] name failslab, interval 1, probability 0, space 0, times 0 [ 254.542524][T11215] CPU: 1 PID: 11215 Comm: syz.1.2583 Not tainted 5.15.182-syzkaller #0 [ 254.550907][T11215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 254.560978][T11215] Call Trace: [ 254.564265][T11215] [ 254.567201][T11215] dump_stack_lvl+0x168/0x230 [ 254.571901][T11215] ? show_regs_print_info+0x20/0x20 [ 254.577111][T11215] ? load_image+0x3b0/0x3b0 [ 254.581622][T11215] ? __might_sleep+0xf0/0xf0 [ 254.586221][T11215] ? __lock_acquire+0x7c60/0x7c60 [ 254.591261][T11215] should_fail+0x38c/0x4c0 [ 254.595695][T11215] should_failslab+0x5/0x20 [ 254.600205][T11215] slab_pre_alloc_hook+0x51/0xc0 [ 254.605144][T11215] __kmalloc_node+0x6e/0x3b0 [ 254.609737][T11215] ? memcg_alloc_page_obj_cgroups+0x81/0x120 [ 254.615731][T11215] memcg_alloc_page_obj_cgroups+0x81/0x120 [ 254.621546][T11215] slab_post_alloc_hook+0xba/0x380 [ 254.626677][T11215] kmem_cache_alloc_node+0x12d/0x2d0 [ 254.631967][T11215] ? __alloc_skb+0xf4/0x750 [ 254.636486][T11215] __alloc_skb+0xf4/0x750 [ 254.640821][T11215] alloc_skb_with_frags+0xa7/0x730 [ 254.645950][T11215] ? trace_event_raw_event_lock+0x250/0x250 [ 254.651851][T11215] sock_alloc_send_pskb+0x853/0x980 [ 254.657085][T11215] ? sock_kzfree_s+0x50/0x50 [ 254.661696][T11215] ? do_raw_spin_lock+0x11d/0x280 [ 254.666731][T11215] ? __rwlock_init+0x140/0x140 [ 254.671500][T11215] ? do_raw_spin_unlock+0x11d/0x230 [ 254.676709][T11215] unix_dgram_sendmsg+0x5ef/0x1890 [ 254.681840][T11215] ? aa_sk_perm+0x7b4/0x8f0 [ 254.686356][T11215] ? unix_dgram_poll+0x660/0x660 [ 254.691298][T11215] ? tomoyo_socket_sendmsg_permission+0x1dd/0x2f0 [ 254.697907][T11215] ? aa_sock_msg_perm+0x94/0x150 [ 254.702854][T11215] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 254.708152][T11215] ? security_socket_sendmsg+0x7c/0xa0 [ 254.713612][T11215] ? unix_dgram_poll+0x660/0x660 [ 254.718564][T11215] ____sys_sendmsg+0x5a2/0x8c0 [ 254.723342][T11215] ? memset+0x1e/0x40 [ 254.727327][T11215] ? __sys_sendmsg_sock+0x30/0x30 [ 254.732391][T11215] ? import_iovec+0x6f/0xa0 [ 254.736913][T11215] ___sys_sendmsg+0x1f0/0x260 [ 254.741606][T11215] ? __sys_sendmsg+0x250/0x250 [ 254.746395][T11215] ? trace_event_raw_event_lock+0x250/0x250 [ 254.752296][T11215] ? vfs_write+0x84d/0xd00 [ 254.756765][T11215] ? __fdget+0x18b/0x210 [ 254.761013][T11215] __se_sys_sendmsg+0x190/0x250 [ 254.765869][T11215] ? __x64_sys_sendmsg+0x80/0x80 [ 254.770813][T11215] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 254.776811][T11215] ? trace_sys_enter+0x1f/0x80 [ 254.781590][T11215] do_syscall_64+0x4c/0xa0 [ 254.786019][T11215] ? clear_bhb_loop+0x15/0x70 [ 254.790702][T11215] ? clear_bhb_loop+0x15/0x70 [ 254.795379][T11215] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 254.801278][T11215] RIP: 0033:0x7fd99c40f969 [ 254.805701][T11215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 254.825307][T11215] RSP: 002b:00007fd99a277038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 254.833723][T11215] RAX: ffffffffffffffda RBX: 00007fd99c636fa0 RCX: 00007fd99c40f969 [ 254.841704][T11215] RDX: 0000000020000000 RSI: 0000200000000100 RDI: 0000000000000007 [ 254.849691][T11215] RBP: 00007fd99a277090 R08: 0000000000000000 R09: 0000000000000000 [ 254.857660][T11215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 254.865634][T11215] R13: 0000000000000000 R14: 00007fd99c636fa0 R15: 00007ffdf1839e38 [ 254.873625][T11215] [ 255.415315][ T1423] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.421725][ T1423] ieee802154 phy1 wpan1: encryption failed: -22 [ 255.606705][T11241] netlink: 'syz.3.2591': attribute type 10 has an invalid length. [ 255.693391][T11241] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2591'. [ 255.848544][T11245] netlink: 830 bytes leftover after parsing attributes in process `syz.6.2594'. [ 255.929522][T11245] device bond_slave_0 entered promiscuous mode [ 255.936103][T11245] device bond_slave_1 entered promiscuous mode [ 256.224365][T11254] netlink: 'syz.3.2597': attribute type 2 has an invalid length. [ 256.232248][T11254] netlink: 212408 bytes leftover after parsing attributes in process `syz.3.2597'. [ 256.643191][T11266] netlink: 'syz.6.2602': attribute type 10 has an invalid length. [ 256.663431][T11266] netlink: 55 bytes leftover after parsing attributes in process `syz.6.2602'. [ 256.923470][T11284] FAULT_INJECTION: forcing a failure. [ 256.923470][T11284] name failslab, interval 1, probability 0, space 0, times 0 [ 256.944379][T11284] CPU: 1 PID: 11284 Comm: syz.0.2608 Not tainted 5.15.182-syzkaller #0 [ 256.952662][T11284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 256.962752][T11284] Call Trace: [ 256.966066][T11284] [ 256.969029][T11284] dump_stack_lvl+0x168/0x230 [ 256.973759][T11284] ? show_regs_print_info+0x20/0x20 [ 256.978982][T11284] ? load_image+0x3b0/0x3b0 [ 256.983520][T11284] ? __might_sleep+0xf0/0xf0 [ 256.988131][T11284] ? __lock_acquire+0x7c60/0x7c60 [ 256.993192][T11284] should_fail+0x38c/0x4c0 [ 256.997651][T11284] should_failslab+0x5/0x20 [ 257.002170][T11284] slab_pre_alloc_hook+0x51/0xc0 [ 257.007143][T11284] __kmalloc_node+0x6e/0x3b0 [ 257.011751][T11284] ? kvmalloc_node+0x84/0x130 [ 257.016482][T11284] kvmalloc_node+0x84/0x130 [ 257.021010][T11284] alloc_netdev_mqs+0x84/0xc40 [ 257.025783][T11284] ? udp_tunnel_nic_device_sync_work+0x890/0x890 [ 257.032136][T11284] ? strlcpy+0x83/0xc0 [ 257.036240][T11284] __ip_tunnel_create+0x206/0x380 [ 257.041295][T11284] ? ip_tunnel_init_net+0x6b0/0x6b0 [ 257.046516][T11284] ? security_capable+0x85/0xb0 [ 257.051428][T11284] ip_tunnel_ctl+0xad3/0x1910 [ 257.056172][T11284] vti_tunnel_ctl+0x1f5/0x380 [ 257.060883][T11284] ip_tunnel_siocdevprivate+0x119/0x1c0 [ 257.066461][T11284] ? ip_tunnel_update+0xad0/0xad0 [ 257.071533][T11284] ? __mutex_lock_common+0x431/0x2390 [ 257.076927][T11284] ? full_name_hash+0x8e/0xe0 [ 257.081661][T11284] dev_ifsioc+0xaf5/0xe70 [ 257.086033][T11284] ? dev_ioctl+0xe50/0xe50 [ 257.090480][T11284] ? full_name_hash+0x8e/0xe0 [ 257.095223][T11284] dev_ioctl+0x5f9/0xe50 [ 257.099481][T11284] ? get_user_ifreq+0xc7/0x170 [ 257.104288][T11284] sock_ioctl+0x67b/0x6e0 [ 257.108667][T11284] ? sock_poll+0x3f0/0x3f0 [ 257.113147][T11284] ? bpf_lsm_file_ioctl+0x5/0x10 [ 257.118097][T11284] ? security_file_ioctl+0x7c/0xa0 [ 257.123226][T11284] ? sock_poll+0x3f0/0x3f0 [ 257.127669][T11284] __se_sys_ioctl+0xfa/0x170 [ 257.132299][T11284] do_syscall_64+0x4c/0xa0 [ 257.136731][T11284] ? clear_bhb_loop+0x15/0x70 [ 257.141420][T11284] ? clear_bhb_loop+0x15/0x70 [ 257.146123][T11284] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 257.152029][T11284] RIP: 0033:0x7fe8af925969 [ 257.156468][T11284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 257.176093][T11284] RSP: 002b:00007fe8ad78d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 257.184536][T11284] RAX: ffffffffffffffda RBX: 00007fe8afb4cfa0 RCX: 00007fe8af925969 [ 257.192528][T11284] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 000000000000000f [ 257.200528][T11284] RBP: 00007fe8ad78d090 R08: 0000000000000000 R09: 0000000000000000 [ 257.208505][T11284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 257.216481][T11284] R13: 0000000000000000 R14: 00007fe8afb4cfa0 R15: 00007ffcb2db4478 [ 257.224532][T11284] [ 257.537520][T11293] validate_nla: 1 callbacks suppressed [ 257.537553][T11293] netlink: 'syz.1.2610': attribute type 3 has an invalid length. [ 257.562497][T11293] netlink: 'syz.1.2610': attribute type 1 has an invalid length. [ 257.699559][T11301] netlink: 'syz.1.2614': attribute type 2 has an invalid length. [ 257.833986][T11304] netlink: 'syz.6.2615': attribute type 8 has an invalid length. [ 257.862705][T11304] __nla_validate_parse: 3 callbacks suppressed [ 257.862970][T11304] netlink: 156 bytes leftover after parsing attributes in process `syz.6.2615'. [ 258.229036][T11324] netlink: 128124 bytes leftover after parsing attributes in process `syz.6.2623'. [ 258.247142][T11318] netlink: 'syz.3.2620': attribute type 10 has an invalid length. [ 258.290441][T11318] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2620'. [ 258.360182][T11315] netlink: 'syz.2.2619': attribute type 10 has an invalid length. [ 258.385508][T11315] netlink: 55 bytes leftover after parsing attributes in process `syz.2.2619'. [ 258.539732][T11339] netlink: 'syz.1.2629': attribute type 3 has an invalid length. [ 258.561834][T11339] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2629'. [ 258.582714][ T27] INFO: task syz.5.563:5908 blocked for more than 143 seconds. [ 258.590405][ T27] Not tainted 5.15.182-syzkaller #0 [ 258.624352][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 258.641159][ T27] task:syz.5.563 state:D stack:23488 pid: 5908 ppid: 4793 flags:0x00004002 [ 258.650804][ T27] Call Trace: [ 258.661011][ T27] [ 258.670118][ T27] __schedule+0x11b8/0x43b0 [ 258.685085][ T27] ? __mutex_trylock_common+0x14f/0x250 [ 258.691579][ T27] ? perf_event_release_kernel+0x1ff/0x8c0 [ 258.701741][ T27] ? __lock_acquire+0x7c60/0x7c60 [ 258.735709][T11351] netlink: 'syz.3.2632': attribute type 2 has an invalid length. [ 258.753230][ T27] ? release_firmware_map_entry+0x190/0x190 [ 258.766074][ T27] ? perf_adjust_period+0x4e0/0x4e0 [ 258.771316][ T27] schedule+0x11b/0x1e0 [ 258.778663][T11351] netlink: 212408 bytes leftover after parsing attributes in process `syz.3.2632'. [ 258.793799][ T27] perf_pending_task_sync+0x13c/0x1c0 [ 258.804294][ T27] ? perf_mmap+0x13e0/0x13e0 [ 258.816191][ T27] _free_event+0x34/0xe60 [ 258.825411][ T27] ? perf_remove_from_context+0x10c/0x250 [ 258.837709][ T27] ? perf_mmap+0x13e0/0x13e0 [ 258.842475][ T27] perf_event_release_kernel+0x832/0x8c0 [ 258.848261][ T27] ? __might_sleep+0xf0/0xf0 [ 258.853243][ T27] ? calc_timer_values+0x410/0x410 [ 258.858557][ T27] ? perf_mmap+0x13e0/0x13e0 [ 258.863467][ T27] perf_release+0x37/0x40 [ 258.867846][ T27] __fput+0x234/0x930 [ 258.871952][ T27] task_work_run+0x125/0x1a0 [ 258.876681][ T27] do_exit+0x616/0x20a0 [ 258.880908][ T27] ? put_task_struct+0x80/0x80 [ 258.887312][ T27] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 258.893475][ T27] ? lock_chain_count+0x20/0x20 [ 258.898448][ T27] ? _raw_spin_lock_irq+0xab/0xe0 [ 258.903642][ T27] do_group_exit+0x12e/0x300 [ 258.908296][ T27] ? lockdep_hardirqs_on+0x94/0x140 [ 258.913685][ T27] get_signal+0x6ca/0x12c0 [ 258.918178][ T27] arch_do_signal_or_restart+0xc1/0x1300 [ 258.924247][ T27] ? futex_exit_release+0x1c0/0x1c0 [ 258.929517][ T27] ? get_sigframe_size+0x10/0x10 [ 258.934657][ T27] ? exit_to_user_mode_loop+0x3b/0x130 [ 258.940188][ T27] exit_to_user_mode_loop+0x9e/0x130 [ 258.945736][ T27] exit_to_user_mode_prepare+0xb1/0x140 [ 258.951369][ T27] syscall_exit_to_user_mode+0x16/0x40 [ 258.957034][ T27] do_syscall_64+0x58/0xa0 [ 258.961530][ T27] ? clear_bhb_loop+0x15/0x70 [ 258.966425][ T27] ? clear_bhb_loop+0x15/0x70 [ 258.971267][ T27] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 258.977262][ T27] RIP: 0033:0x7f6404948969 [ 258.981805][ T27] RSP: 002b:00007f64027b00e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 258.990488][ T27] RAX: fffffffffffffe00 RBX: 00007f6404b6ffa8 RCX: 00007f6404948969 [ 258.999538][ T27] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f6404b6ffa8 [ 259.007657][ T27] RBP: 00007f6404b6ffa0 R08: 0000000000000000 R09: 0000000000000000 [ 259.015811][ T27] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6404b6ffac [ 259.024203][ T27] R13: 0000000000000000 R14: 00007fff61aaf6b0 R15: 00007fff61aaf798 [ 259.032326][ T27] [ 259.035581][ T27] [ 259.035581][ T27] Showing all locks held in the system: [ 259.043720][ T27] 1 lock held by khungtaskd/27: [ 259.048670][ T27] #0: ffffffff8c11bea0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 259.060930][ T27] 2 locks held by kworker/u4:3/807: [ 259.067766][ T27] 2 locks held by getty/3932: [ 259.072650][ T27] #0: ffff88814d42b098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 259.082700][ T27] #1: ffffc900026362e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x5ba/0x1a30 [ 259.093004][ T27] 2 locks held by kworker/1:16/11082: [ 259.098376][ T27] #0: ffff888016872138 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x760/0x1000 [ 259.109841][ T27] #1: ffffc90003717d00 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x7a3/0x1000 [ 259.121295][ T27] 2 locks held by syz.0.2625/11330: [ 259.126929][ T27] #0: ffffffff8c1697c8 (event_mutex){+.+.}-{3:3}, at: perf_trace_destroy+0x2a/0x140 [ 259.136588][ T27] #1: ffffffff8c120928 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x347/0x6b0 [ 259.147751][ T27] 2 locks held by syz.6.2631/11346: [ 259.153119][ T27] #0: ffffffff960f1ab8 (&pmus_srcu){....}-{0:0}, at: rcu_lock_acquire+0x9/0x30 [ 259.162200][ T27] #1: ffffffff8c1697c8 (event_mutex){+.+.}-{3:3}, at: perf_trace_init+0x4c/0x2d0 [ 259.171661][ T27] 2 locks held by syz.3.2632/11349: [ 259.176970][ T27] #0: ffffffff960f1ab8 (&pmus_srcu){....}-{0:0}, at: rcu_lock_acquire+0x9/0x30 [ 259.186813][ T27] #1: ffffffff8c1697c8 (event_mutex){+.+.}-{3:3}, at: perf_trace_init+0x4c/0x2d0 [ 259.196243][ T27] 1 lock held by syz.1.2629/11348: [ 259.201358][ T27] #0: ffffffff8c1697c8 (event_mutex){+.+.}-{3:3}, at: perf_trace_destroy+0x2a/0x140 [ 259.211645][ T27] [ 259.215342][ T27] ============================================= [ 259.215342][ T27] [ 259.224899][ T27] NMI backtrace for cpu 1 [ 259.229229][ T27] CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.15.182-syzkaller #0 [ 259.237198][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 259.247240][ T27] Call Trace: [ 259.250516][ T27] [ 259.253437][ T27] dump_stack_lvl+0x168/0x230 [ 259.258128][ T27] ? show_regs_print_info+0x20/0x20 [ 259.263320][ T27] ? load_image+0x3b0/0x3b0 [ 259.267818][ T27] ? tick_nohz_tick_stopped+0x7b/0xb0 [ 259.273189][ T27] ? nmi_cpu_backtrace+0x1b6/0x3d0 [ 259.278296][ T27] nmi_cpu_backtrace+0x397/0x3d0 [ 259.283225][ T27] ? nmi_trigger_cpumask_backtrace+0x280/0x280 [ 259.289393][ T27] ? _printk+0xcc/0x110 [ 259.293533][ T27] ? load_image+0x3b0/0x3b0 [ 259.298025][ T27] ? load_image+0x3b0/0x3b0 [ 259.302518][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 259.308579][ T27] nmi_trigger_cpumask_backtrace+0x163/0x280 [ 259.314547][ T27] watchdog+0xe0f/0xe50 [ 259.318695][ T27] kthread+0x436/0x520 [ 259.322749][ T27] ? hungtask_pm_notify+0x40/0x40 [ 259.327765][ T27] ? kthread_blkcg+0xd0/0xd0 [ 259.332357][ T27] ret_from_fork+0x1f/0x30 [ 259.336805][ T27] [ 259.340562][ T27] Sending NMI from CPU 1 to CPUs 0: [ 259.345848][ C0] NMI backtrace for cpu 0 skipped: idling at default_idle+0xb/0x10 [ 259.360719][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 259.367583][ T27] CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.182-syzkaller #0 [ 259.375567][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 259.385621][ T27] Call Trace: [ 259.388887][ T27] [ 259.391805][ T27] dump_stack_lvl+0x168/0x230 [ 259.396491][ T27] ? show_regs_print_info+0x20/0x20 [ 259.401694][ T27] ? load_image+0x3b0/0x3b0 [ 259.406197][ T27] panic+0x2c9/0x7f0 [ 259.410187][ T27] ? schedule_preempt_disabled+0x20/0x20 [ 259.415820][ T27] ? bpf_jit_dump+0xd0/0xd0 [ 259.420325][ T27] ? __irq_work_queue_local+0x12c/0x190 [ 259.425864][ T27] ? nmi_trigger_cpumask_backtrace+0x260/0x280 [ 259.432019][ T27] watchdog+0xe4e/0xe50 [ 259.436179][ T27] kthread+0x436/0x520 [ 259.440237][ T27] ? hungtask_pm_notify+0x40/0x40 [ 259.445258][ T27] ? kthread_blkcg+0xd0/0xd0 [ 259.449838][ T27] ret_from_fork+0x1f/0x30 [ 259.454258][ T27] [ 259.457564][ T27] Kernel Offset: disabled [ 259.461894][ T27] Rebooting in 86400 seconds..