last executing test programs: 30m45.468959035s ago: executing program 4 (id=5): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x81}, 0x100c, 0x0, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x1, 0x9, 0x5, 0x3, 0x0, 0x10000, 0x20018, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x4, @perf_bp={&(0x7f0000000040)}, 0x1020c4, 0x7, 0x5, 0x4, 0x1, 0x0, 0xfffb, 0x0, 0x101, 0x0, 0xd12}, 0x0, 0xe, r0, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1, 0xf, &(0x7f0000000140)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x19, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$kcm(0x2, 0x5, 0x84) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004180)={r3, 0xe0, &(0x7f0000004080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000880)=[0x0, 0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0], 0x0, 0xc6, &(0x7f0000000940)=[{}], 0x8, 0x10, &(0x7f0000003fc0), &(0x7f0000004000), 0x8, 0xe7, 0x8, 0x8, &(0x7f0000004040)}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000004240)=@base={0x20, 0x8, 0x9, 0x7fff, 0x2, r2, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000004380)={0x15, 0x1e, &(0x7f0000003ec0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x4c}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@call={0x85, 0x0, 0x0, 0x4a}, @ldst={0x1, 0x3, 0x6, 0x4, 0xb, 0xffffffffffffffc0, 0xfffffffffffffff0}, @generic={0x0, 0x4, 0x2, 0x9, 0x2df0}, @exit, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffc}, @alu={0x4, 0x0, 0xb, 0xa, 0x8, 0x0, 0xfffffffffffffffc}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xc}, @exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000007c0)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x48, '\x00', r5, @fallback=0x15, 0xffffffffffffffff, 0x8, &(0x7f00000041c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000004200)={0x5, 0xa, 0xe, 0x8}, 0x10, 0x0, r3, 0x6, &(0x7f00000042c0)=[r6, r2, r2, r2, r2, 0x1, r2], &(0x7f0000004300)=[{0x3, 0x5, 0x1, 0xa}, {0x4, 0x2, 0x4, 0x7}, {0x4, 0x1, 0xd, 0x1}, {0x2, 0x3, 0xf, 0x4}, {0x3, 0x5, 0xd, 0x6}, {0x3, 0x2, 0x10, 0x4}], 0x10, 0x1}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{}, {0x2, 0x0, 0xfffffffc, 0x8}]}, 0x94) close(0xffffffffffffffff) r7 = syz_clone(0x10400, &(0x7f0000000580)="8555451985e93ae51af05b6faec3bc8aa826dc25ea7622f4b639d1aec6e11b4509d48399a1eccb34f145a531180e02dae7b3b76502d3429b5311c8aeda564a0304188c520b9116aba382e63fad54ba2a4357bc3c54decb76be04b191009485f9eb3ccc97333eca2879d8ac", 0x6b, 0x0, 0x0, &(0x7f0000000700)="04d978da36bb2c23a54ea29983340e62175bf3fbb155019f2d08f30d06") syz_open_procfs$namespace(r7, &(0x7f0000000840)='ns/mnt\x00') ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x8}}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r8, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg(r4, &(0x7f00000006c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000003e00)=[{&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000740)=""/80, 0x50}, {&(0x7f0000000000)=""/15, 0xf}, {&(0x7f0000001a40)=""/220, 0xdc}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/248, 0xf8}, {&(0x7f0000002c40)=""/164, 0xa4}, {&(0x7f0000002d00)=""/4096, 0x1000}, {&(0x7f0000003d00)=""/207, 0xcf}], 0x9, &(0x7f0000000240)=""/56, 0x38}, 0x2040) 30m44.011268123s ago: executing program 4 (id=13): close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x9, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000280)='devices.allow\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28e9, 0x0, @perf_bp={0x0, 0x5}, 0x4110, 0x2, 0x0, 0x5, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r2, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="d8000000100081044e81f782db44b904021d080c48000000e8fe55a1180015000600142603600e120900210000000401a80016000a0001", 0x37}], 0x1}, 0x4840) socket$kcm(0x10, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x4) close(r4) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="5c00000013006bcd9e3fe3dc6e48aa31086b876c0c0000007ea60264160af3653c001c000d0000008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r5 = socket$kcm(0xa, 0x2, 0x3a) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x2, 0x0, 0x0) sendmsg$kcm(r5, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @mcast2, 0x1a}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000780)="80005b020eaa4da2", 0xfdef}], 0x1, 0x0, 0x0, 0x900}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000071007224a4fb712a654c23db8ecc5acd6081ae177fead6b7bb5fed918c07214741213437020469a59852b791b05bcb81f1b164f257eba925257c17aab49baa7aba50a1319df39227139a09e8166cc773f2be0622fd582773bd8c1a4e29848ccf7a7c03032ba54ea9e06235eaa837f88502d1d5af2c970eef8a51c9bd760d6bcd3222fe9b8593907474a7c4ce7dda0a20968fff4f2e6b19e3"], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r6, 0x1, 0x21, &(0x7f0000000380), 0x4) 30m33.082247356s ago: executing program 4 (id=21): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0xc2ba, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0f00000004000000040000001600000000", @ANYRES32=0x0, @ANYBLOB], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r2, 0x58, &(0x7f0000000780)}, 0x10) sendmsg$sock(0xffffffffffffffff, 0x0, 0x8800) socket$kcm(0x10, 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) 30m30.607648944s ago: executing program 4 (id=25): perf_event_open$cgroup(&(0x7f0000000040)={0x4, 0x80, 0xb2, 0xe0, 0x3, 0xb, 0x0, 0x9, 0x1c440, 0x9, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x405, 0x2, @perf_config_ext={0x1000, 0x6ba3b737}, 0x100708, 0x8, 0x2, 0x8, 0x10001, 0x6, 0xdb7d, 0x0, 0x7, 0x0, 0x8000}, 0xffffffffffffffff, 0x400000000004, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x58c8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x8001000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000000)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x80, &(0x7f0000000080)}, 0x0) 30m18.747422329s ago: executing program 1 (id=34): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x15, 0x5, 0x0) socket$kcm(0xa, 0x5, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x24, &(0x7f0000000200), 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000021c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="043900002000ef029dd2b97576b11d210a"], 0x33fe0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'macsec0\x00', @local}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f00000001c0)=@l2tp={0x2, 0x0, @local}, 0x80, 0x0, 0x0, &(0x7f00000005c0)=""/57, 0x39}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x12, 0x4, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x0, 0x0, 0x0, 0x1, 0x99, &(0x7f0000000240)=""/153}, 0x94) r2 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x49, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0500000008000000e27f00000100000041000000", @ANYRES32, @ANYBLOB], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1200000001000000048000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x10, &(0x7f0000000040), 0x4) sendmsg$unix(r4, &(0x7f0000000640)={&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000001280)='\\', 0xffffffe3}], 0x1}, 0x24004044) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 30m14.169625752s ago: executing program 32 (id=25): perf_event_open$cgroup(&(0x7f0000000040)={0x4, 0x80, 0xb2, 0xe0, 0x3, 0xb, 0x0, 0x9, 0x1c440, 0x9, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x405, 0x2, @perf_config_ext={0x1000, 0x6ba3b737}, 0x100708, 0x8, 0x2, 0x8, 0x10001, 0x6, 0xdb7d, 0x0, 0x7, 0x0, 0x8000}, 0xffffffffffffffff, 0x400000000004, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x58c8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x8001000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r2, &(0x7f0000000000)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x80, &(0x7f0000000080)}, 0x0) 30m13.666977256s ago: executing program 1 (id=37): r0 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x4}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) r4 = socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x64, &(0x7f0000000000)=r7, 0x10) 30m13.133289584s ago: executing program 1 (id=39): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff2, 0x8}, 0x11c002, 0xac5d, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0xf, 0x7, 0x99, 0x3, 0x0, 0x5, 0x4000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x6, 0xfffffffffffffff9}, 0x42, 0xc, 0xff, 0x5, 0x7, 0x7ff, 0x3, 0x0, 0x7, 0x0, 0x1}, r1, 0x2, 0xffffffffffffffff, 0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0xbe9bac6d2d0f4e0b) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) unlink(&(0x7f0000000080)='./file0/file0\x00') r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r2, 0x8008743f, 0xf0ff1f00000000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x5000) r3 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x11, &(0x7f0000000000)=r5, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x3, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYRES64=r0], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) 30m9.176230242s ago: executing program 1 (id=42): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x81}, 0x100c, 0x0, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x1, 0x9, 0x5, 0x3, 0x0, 0x10000, 0x20018, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x4, @perf_bp={&(0x7f0000000040)}, 0x1020c4, 0x7, 0x5, 0x4, 0x1, 0x0, 0xfffb, 0x0, 0x101, 0x0, 0xd12}, 0x0, 0xe, r0, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1, 0xf, &(0x7f0000000140)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x19, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$kcm(0x2, 0x5, 0x84) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004180)={r3, 0xe0, &(0x7f0000004080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000880)=[0x0, 0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0], 0x0, 0xc6, &(0x7f0000000940)=[{}], 0x8, 0x10, &(0x7f0000003fc0), &(0x7f0000004000), 0x8, 0xe7, 0x8, 0x8, &(0x7f0000004040)}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000004240)=@base={0x20, 0x8, 0x9, 0x7fff, 0x2, r2, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000004380)={0x15, 0x1e, &(0x7f0000003ec0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x4c}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@call={0x85, 0x0, 0x0, 0x4a}, @ldst={0x1, 0x3, 0x6, 0x4, 0xb, 0xffffffffffffffc0, 0xfffffffffffffff0}, @generic={0x0, 0x4, 0x2, 0x9, 0x2df0}, @exit, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffc}, @alu={0x4, 0x0, 0xb, 0xa, 0x8, 0x0, 0xfffffffffffffffc}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xc}, @exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000007c0)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x48, '\x00', r5, @fallback=0x15, 0xffffffffffffffff, 0x8, &(0x7f00000041c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000004200)={0x5, 0xa, 0xe, 0x8}, 0x10, 0x0, r3, 0x6, &(0x7f00000042c0)=[r6, r2, r2, r2, r2, 0x1, r2], &(0x7f0000004300)=[{0x3, 0x5, 0x1, 0xa}, {0x4, 0x2, 0x4, 0x7}, {0x4, 0x1, 0xd, 0x1}, {0x2, 0x3, 0xf, 0x4}, {0x3, 0x5, 0xd, 0x6}, {0x3, 0x2, 0x10, 0x4}], 0x10, 0x1}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{}, {0x2, 0x0, 0xfffffffc, 0x8}]}, 0x94) close(0xffffffffffffffff) r7 = syz_clone(0x10400, &(0x7f0000000580)="8555451985e93ae51af05b6faec3bc8aa826dc25ea7622f4b639d1aec6e11b4509d48399a1eccb34f145a531180e02dae7b3b76502d3429b5311c8aeda564a0304188c520b9116aba382e63fad54ba2a4357bc3c54decb76be04b191009485f9eb3ccc97333eca2879d8ac", 0x6b, 0x0, 0x0, &(0x7f0000000700)="04d978da36bb2c23a54ea29983340e62175bf3fbb155019f2d08f30d06") syz_open_procfs$namespace(r7, &(0x7f0000000840)='ns/mnt\x00') ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x8}}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r8}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) recvmsg(r4, &(0x7f00000006c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000003e00)=[{&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000000740)=""/80, 0x50}, {&(0x7f0000000000)=""/15, 0xf}, {&(0x7f0000001a40)=""/220, 0xdc}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/248, 0xf8}, {&(0x7f0000002c40)=""/164, 0xa4}, {&(0x7f0000002d00)=""/4096, 0x1000}, {&(0x7f0000003d00)=""/207, 0xcf}], 0x9, &(0x7f0000000240)=""/56, 0x38}, 0x2040) 30m7.628388338s ago: executing program 1 (id=46): close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x9, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000280)='devices.allow\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28e9, 0x0, @perf_bp={0x0, 0x5}, 0x4110, 0x2, 0x0, 0x5, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r2, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x9) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="d8000000100081044e81f782db44b904021d080c48000000e8fe55a1180015000600142603600e120900210000000401a80016000a0001", 0x37}], 0x1}, 0x4840) socket$kcm(0x10, 0x2, 0x0) close(0xffffffffffffffff) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="5c00000013006bcd9e3fe3dc6e48aa31086b876c0c0000007ea60264160af3653c001c000d0000008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r4 = socket$kcm(0xa, 0x2, 0x3a) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x2, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @mcast2, 0x1a}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000780)="80005b020eaa4da2", 0xfdef}], 0x1, 0x0, 0x0, 0x900}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r5, 0x1, 0x21, &(0x7f0000000380), 0x4) 30m4.20354486s ago: executing program 1 (id=49): perf_event_open$cgroup(&(0x7f0000000040)={0x4, 0x80, 0xb2, 0xe0, 0x3, 0xb, 0x0, 0x9, 0x1c440, 0x9, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x405, 0x2, @perf_config_ext={0x1000, 0x6ba3b737}, 0x100708, 0x8, 0x2, 0x8, 0x10001, 0x6, 0xdb7d, 0x0, 0x7, 0x0, 0x8000}, 0xffffffffffffffff, 0x400000000004, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x58c8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x8001000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21bef5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9b24be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6eab1aa7d55545a34effa077faa56d59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e59a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d0faab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0480f94306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad9433269af3be5fa6a9a5c24e392955f4e979ea13201bafe4f0f6ea508000000a0c548552b571bed5647223c78a992810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ede62fc28839b5301160ecec37e83efceefd7ca2533659edc8be05cc85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d35a142a9ec9a7a3755e0f209150a07682c4e14e3a835701bea8240399c56ce8f58df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b262341c5e093fd66a2946501559335781092cf8ce3c7c56cd31121624d76517fd3666276c3c0e812b28e2f30d035cee5d0e77a3c70008ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856cf24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31651e0ecea5ece8fb11a4ee288eb149f1fa33669cc8d901fa8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463baf28345bde0c195bc9f021da8f3025ee9c8e3168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262fa3f1dabeb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a4601adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cc50feeb7bfad9b7be3283b6450d014e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5671820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff2418a18217747ae442e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427a7f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d17eb0000000000000000000000fa08ad0731c4b839688b22c4da2a6b00008a1949a6ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282bffff2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae05334d5a44a020000001c0d882a564d74a7c72bf9a2152b261e58fea6d2f93589cfe261dc0410b5cc"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000780)="f4000900062b8825fe80000000000000dc8b850f238466cc00007a000000ad6e911b51818462b400", 0x28}], 0x1}, 0x0) 29m48.407361532s ago: executing program 33 (id=49): perf_event_open$cgroup(&(0x7f0000000040)={0x4, 0x80, 0xb2, 0xe0, 0x3, 0xb, 0x0, 0x9, 0x1c440, 0x9, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x405, 0x2, @perf_config_ext={0x1000, 0x6ba3b737}, 0x100708, 0x8, 0x2, 0x8, 0x10001, 0x6, 0xdb7d, 0x0, 0x7, 0x0, 0x8000}, 0xffffffffffffffff, 0x400000000004, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x58c8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x8001000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000780)="f4000900062b8825fe80000000000000dc8b850f238466cc00007a000000ad6e911b51818462b400", 0x28}], 0x1}, 0x0) 26m54.181937552s ago: executing program 5 (id=418): socket$kcm(0x2, 0x5, 0x84) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x6200, 0x3ffffe, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x8, 0x0, 0x4000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r2) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r3, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000200), 0x8) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={0xffffffffffffffff, r3, 0x0, r2}, 0x10) 26m53.621765931s ago: executing program 5 (id=420): r0 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r1 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f00000008c0), 0x43) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x604, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000300000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000011c0)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r4 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x4}, 0x0, 0x0, 0x0, 0x8, 0x2, 0xfffffffc}, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002f000b08d25a80648c7494f90424fc600b0002", 0x17}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[@ANYBLOB="934300005a"], 0xfe33) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x1}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001bc0)={r3, 0x0, 0x9c, 0x0, &(0x7f0000001cc0)="633268f83ca3000000a2029e3815bb2fa117d8326687688b2c969fd7267d546214af00d1ca2524d00f9e4d9555f3ab381b5d44fd6bda8c509e66101d296f10c805252e7c5d48d9814f46db8f07441878734b13270fe47fba418b7358984b9a61c2bbf964a520459fd0d90590b46cf1677d580a26933b6e35aee75996b73a15a25aa8ae2f1f9bc9699a505c0dc4050ab2255fc35f508ccc52f10ac12f", 0x0, 0x4000, 0x0, 0x47, 0x4f, &(0x7f0000001ac0)="9c01bd6f9a6028c80d7364240fd78867d9d62eca43c565f2c5ac65dd4a0fadceb6c65dcb07f2421e69087e0f17b4eb709e4805f2722709c46bef17c4cb9aed9fb1c342179ea349", &(0x7f0000001a40)="408fd0050dc7945b483103067eca9bd26ffbe35abf0f88a103f6893dc2b1d1cdc2195d4ae89abc04ff5fe5d2466892c81015df835a7d47be4f852161bc4015e7564b08584290fe1762f943a653008a", 0x1, 0x0, 0x13}, 0x50) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffe76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x7, 0x40, 0x7, 0x0, 0x3, 0x2005e, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0}, 0x118183, 0x6, 0x7, 0x0, 0x81, 0x2, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{0x1}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{0x0, 0x4, 0x5}, {0x0, 0x1000, 0x3}, {0x0, 0x4}]}, 0x94) 26m52.994655087s ago: executing program 5 (id=423): r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) r4 = socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x64, &(0x7f0000000000)=r7, 0x10) 26m52.762942247s ago: executing program 5 (id=426): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="d8000000100081044e81f782db44b904021d006a0f000000e8fe55a1290015000600142603600e120900040044000000a80016000a0003402e60000000000000b94dcf5c0461c1d67f6f94007134cf6ee08021a0e408e8d8ef52a985162f7ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d3220a7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x60044084) (fail_nth: 2) 26m51.884618545s ago: executing program 5 (id=429): close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000280)='devices.allow\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28e9, 0x0, @perf_bp={0x0, 0x5}, 0x4110, 0x2, 0x0, 0x5, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="d8000000100081044e81f782db44b904021d080c48000000e8fe55a1180015000600142603600e120900210000000401a80016000a0001", 0x37}], 0x1}, 0x4840) socket$kcm(0x10, 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x4) close(r3) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="5c00000013006bcd9e3fe3dc6e48aa31086b876c0c0000007ea60264160af3653c001c000d0000008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r4 = socket$kcm(0xa, 0x2, 0x3a) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x2, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @mcast2, 0x1a}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000780)="80005b020eaa4da2", 0xfdef}], 0x1, 0x0, 0x0, 0x900}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r5, 0x1, 0x21, &(0x7f0000000380), 0x4) 26m50.728918587s ago: executing program 5 (id=432): bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x2, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="12000000060000000400000002"], 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x100, 0xfd, 0x9, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0xcff5, r1}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000500), &(0x7f0000000280), 0x4, r1}, 0x38) r2 = socket$kcm(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000080)=0x1000000, &(0x7f0000000180)=r2}, 0x20) recvmsg$kcm(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x40000140) socket$kcm(0x29, 0x2, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='blkio.throttle.read_iops_device\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x26e1, 0x0) close(r5) r6 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f00000004c0)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x4, 0x0, 0x1, 0x40000003, {0xa, 0x4e20, 0xffff, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7}}}, 0x80, 0x0}, 0x886f5cad098fbc1) ioctl$SIOCSIFHWADDR(r5, 0x8b32, &(0x7f0000000000)={'virt_wifi0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2b}}) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f00000000c0)) write$cgroup_int(r4, &(0x7f0000000040), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x6, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="180800e3ff000000f5cf9dc1", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000035090100000000009500000000070000b7020000000000007b9a00fe0000000066090000ffffffffdbaaf0ff50000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffd50000000800000018220000", @ANYRES32=r3, @ANYRESHEX=r2], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x53, '\x00', 0x0, @fallback=0x9, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 26m35.37075543s ago: executing program 34 (id=432): bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x2, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="12000000060000000400000002"], 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x100, 0xfd, 0x9, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0xcff5, r1}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000500), &(0x7f0000000280), 0x4, r1}, 0x38) r2 = socket$kcm(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000080)=0x1000000, &(0x7f0000000180)=r2}, 0x20) recvmsg$kcm(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x40000140) socket$kcm(0x29, 0x2, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='blkio.throttle.read_iops_device\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x26e1, 0x0) close(r5) r6 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f00000004c0)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x4, 0x0, 0x1, 0x40000003, {0xa, 0x4e20, 0xffff, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7}}}, 0x80, 0x0}, 0x886f5cad098fbc1) ioctl$SIOCSIFHWADDR(r5, 0x8b32, &(0x7f0000000000)={'virt_wifi0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2b}}) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f00000000c0)) write$cgroup_int(r4, &(0x7f0000000040), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x6, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="180800e3ff000000f5cf9dc1", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000035090100000000009500000000070000b7020000000000007b9a00fe0000000066090000ffffffffdbaaf0ff50000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffd50000000800000018220000", @ANYRES32=r3, @ANYRESHEX=r2], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x53, '\x00', 0x0, @fallback=0x9, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 23m41.345884403s ago: executing program 2 (id=1059): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x15, 0x5, 0x0) socket$kcm(0xa, 0x5, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x24, &(0x7f0000000200), 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000021c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, 0x0, 0x0, 0x0, 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="043900002000ef029dd2b97576b11d210a"], 0x33fe0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'macsec0\x00', @local}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f00000001c0)=@l2tp={0x2, 0x0, @local}, 0x80, 0x0, 0x0, &(0x7f00000005c0)=""/57, 0x39}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x12, 0x4, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x0, 0x0, 0x0, 0x1, 0x99, &(0x7f0000000240)=""/153}, 0x94) r2 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x49, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0500000008000000e27f00000100000041000000", @ANYRES32], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1200000001000000048000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x10, &(0x7f0000000040), 0x4) sendmsg$unix(r4, &(0x7f0000000640)={&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000001280)='\\', 0xffffffe3}], 0x1}, 0x24004044) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 23m40.852285506s ago: executing program 2 (id=1062): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x2, 0x2, 0x4}, 0x50) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, 0x0, 0x10122) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x2a, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="bb204ce418bce1d51ccf970aea9d6c48c7e652", 0x13}], 0x1}, 0x44) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x32, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'\x00', 0x202}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000002"], 0x0}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netdevsim0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_subtree(r2, &(0x7f00000004c0)=ANY=[], 0xfdef) openat$cgroup_netprio_ifpriomap(r2, &(0x7f00000001c0), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) 23m40.13400777s ago: executing program 2 (id=1063): sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002f000b08d25a80648c7494f90424fc600b0002", 0x17}], 0x1}, 0x0) r0 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="934300"], 0xfe33) 23m39.854277484s ago: executing program 2 (id=1065): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000ff070000000002000000000000000000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000720000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000020080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00ffffffc0000000000200"/28], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x13, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32=r3, @ANYBLOB="0002000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000000000008500000086000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000500)=ANY=[@ANYBLOB="86a37cb63e015f1a19aed2432dc9f1a75c00361edd09462a8a3c7baea56fdf80f7bda71bcaeb2e4699083d9610252458282796a009fff1bf47aa203de85e66f9ffd007ea027f02428f6dd5c6eea8db840df5c5e90f94968faf1246721a608ca3576790b1f2723f52a6f9c4818f2b69b39ccca96c58fe5be4d10a759db98e27f0ebb0fa1ad7349c0afc627abc379eb874158669a6a9bc1b0518c902332a42127a48c9ed3b14865edca31cd41208caffbac46e62458afa180d59533a27950f7c48230e90c37467dacddbd43be54f71c86ebabcd7ff184a074cfce5a33c3f8dc5"]) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) openat$cgroup_pressure(r5, &(0x7f0000000080)='memory.pressure\x00', 0x2, 0x0) 23m39.253806937s ago: executing program 2 (id=1069): close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x9, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000280)='devices.allow\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28e9, 0x0, @perf_bp={0x0, 0x5}, 0x4110, 0x2, 0x0, 0x5, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r2, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x9) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="d8000000100081044e81f782db44b904021d080c48000000e8fe55a1180015000600142603600e120900210000000401a80016000a0001", 0x37}], 0x1}, 0x4840) socket$kcm(0x10, 0x2, 0x0) r4 = socket$kcm(0x10, 0x2, 0x4) close(r4) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="5c00000013006bcd9e3fe3dc6e48aa31086b876c0c0000007ea60264160af3653c001c000d0000008bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r5 = socket$kcm(0xa, 0x2, 0x3a) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x2, 0x0, 0x0) sendmsg$kcm(r5, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @mcast2, 0x1a}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000780)="80005b020eaa4da2", 0xfdef}], 0x1, 0x0, 0x0, 0x900}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000071007224a4fb712a654c23db8ecc5acd6081ae177fead6b7bb5fed918c07214741213437020469a59852b791b05bcb81f1b164f257eba925257c17aab49baa7aba50a1319df39227139a09e8166cc773f2be0622fd582773bd8c1a4e29848ccf7a7c03032ba54ea9e06235eaa837f88502d1d5af2c970eef8a51c9bd760d6bcd3222fe9b8593907474a7c4ce7dda0a20968fff4f2e6b19e3"], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r6, 0x1, 0x21, &(0x7f0000000380), 0x4) 23m37.762841209s ago: executing program 2 (id=1073): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000300)=r5) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 23m22.480555085s ago: executing program 35 (id=1073): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000300)=r5) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 36.455656286s ago: executing program 6 (id=6096): r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001900)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, 0x0, 0x26}, 0x28) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081054e81f782db4cb904021d080006007c09e8fe55a10a0015000500142603600e12b0000f0000000401a8000900080008400400027c9c000461c1d67f6f94001600cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0x12b}], 0x1}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0xd, &(0x7f0000001b00)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000950000000000000018400000ffffffff000000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000001850000000000000200000000000000018400000f8ffffff000000000000000095"], &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940)={0x0, 0xfffffffc}, 0x10}, 0x94) socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r3, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@generic={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x18) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r6 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f00000008c0), 0x43) sendmsg$kcm(r6, &(0x7f0000000100)={&(0x7f0000001540)=@tipc=@name={0x1e, 0x2, 0x3, {{0x40, 0x1d}, 0x1}}, 0x80, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000005000000fd0900008500000041000000649f0e88d01cef50a8bfc531847409894966d2d10ea5e68dd2a765cf2b7f3aec407d0a67c54157861531bbe3e220d86ea033395df883f80ae79ed194a91aff620234973318cb757cd92c68e3a581693073cf59bca4e438c75383dc5ab76ee3af9117cb23b0aeb3644fd0da6ba0e56060da0aeac09b7c81de504f49e3b8ec02cdd7a388360479cb43a3936e062aafc496d8530954a958dd", @ANYRES32, @ANYBLOB="fcffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000800100"/28], 0x50) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x746f2f51, &(0x7f0000000080)=[{&(0x7f0000000040)="3f0400001d00810ce00f80ecdb4cb9f207c804a01f000000030006fb0a0002000a0ada1b40d80300000000000000", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 35.572911903s ago: executing program 6 (id=6099): bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x10c002, 0x89, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001f80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0xe40, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) socket$kcm(0xa, 0x1, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000035c0)="5c00000013006bcd9e3fe3dc4e48aa31086b8703340000001f00000000000000040014000d000a00140000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x240000c0) 35.194006177s ago: executing program 6 (id=6102): r0 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0007000042009103"], 0xfe33) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f00000000c0)='%-010d \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r1, r1}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x16, 0x10, &(0x7f0000000e00)=ANY=[@ANYBLOB="18000000bfffffff0000000000000000b7080000000000007b8af8ff00000000b7080000ffffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000100000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0xccee5849be245758, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r3, 0x0, 0xe, 0x0, &(0x7f0000000040)="f4b84de4115d64244a0e839e9900", 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000004700)=""/4130, 0x1022}, {&(0x7f0000000740)=""/183, 0xb7}, {&(0x7f0000000cc0)=""/241, 0xf1}], 0x3}, 0x40002120) 34.867927685s ago: executing program 6 (id=6103): bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0), 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bc00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008001000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r5, 0x5, 0xe, 0x0, &(0x7f0000000440)="6121eed4cd50bb2b01e841acde1a", 0x0, 0x29d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0x34000}], 0x1}, 0x80d1) 20.539812621s ago: executing program 8 (id=6153): socket$kcm(0x11, 0x0, 0x0) r0 = socket$kcm(0xa, 0x3, 0x73) sendmsg$inet(r0, &(0x7f0000001180)={&(0x7f0000000000)={0xa, 0x0, @multicast2}, 0x10, &(0x7f0000001080)=[{0x0}, {&(0x7f0000001040)}], 0x2, &(0x7f00000010c0)=[@ip_tos_int={{0x14, 0x29, 0x43}}, @ip_tos_u8={{0x11, 0x29, 0x36}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @remote}}}], 0x50}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x58c8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$kcm(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x0, 0x0, 0x84, 0x4, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x100000}, 0x48) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1c00000033000b12c25aa9cb8c2194f90124fc60100c034006000000", 0x1c}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, &(0x7f0000000040), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000a0000000000000a07000000080000000000000b0400000009000000010000130c0000000740"], 0x0, 0x4a, 0x0, 0x1, 0x800, 0x10000}, 0x28) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d80000001a0081044e81f782db4cb904021d08007b490d4f1e81f8d81500010000e0000103600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6", 0xcb}], 0x1}, 0x4000000) ioctl$SIOCSIFHWADDR(r3, 0x8b04, &(0x7f0000000080)={'wlan1\x00', @broadcast}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041800"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 19.465861115s ago: executing program 8 (id=6156): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}]}, 0x94) r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bc00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008001000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0x34000}], 0x1}, 0x80d1) 18.464891952s ago: executing program 8 (id=6168): bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0), 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0x34000}], 0x1}, 0x80d1) 17.590689128s ago: executing program 8 (id=6164): socket$kcm(0xa, 0x2, 0x0) socket$kcm(0x2, 0x5, 0x84) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$kcm(0x2, 0x5, 0x84) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpid() perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)) gettid() r0 = getpid() perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001a40)=ANY=[@ANYBLOB="02f1ff044d4ee5e9a17e739dff030000f9080029000100000080000000c05fb38ee07db7e64e863adfb0ace67df6409d53068350763c7bb016f63a6936911069d7e353f194de1ee2940019caddbcd4896ebb36857f09339cb712ba3cf79d6e45b8ce2d1e24aba4b3cf151025d0bfef25122bada0073bc45aac38a973736fa84a33b8c4bbb2219abd6cdd7d7bb0cad3440b413127c4daab1bfd1aab1f92ff5c76bc0b56f159d44b51eb47b0bc34b00433b9c28d3b99ffa59378d1e7a69b0aedac19d728c48fbe9140582145d16760b41dcc904ee02ec5f4", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1, 0x18, &(0x7f0000001980)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000fe27008500000008000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES64=r0, @ANYBLOB="0000000000000000b705000008000000850000007300000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0xe, 0xfe, &(0x7f0000000740)="000000000000c000ee6e3e20630c", 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB="0900000018000000080000004000000042000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000000179c26b9d3c872c2404626bf0b12ead2b9a11126c759c397d8ace2b3bfc674f8a818e1968875448d4e955f2f1e781e1a36e384c0e6b530e282d72fb17e208e237428d4509eb968f70ee8b192af8fa030af982968ef8b01f91a30060ef22ecce494d710ea8135f6e8d32ff3c422c109b12ed2ce4f0f25125"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r2}, 0x38) 16.270186214s ago: executing program 8 (id=6169): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}]}, 0x94) r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bc00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008001000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0x34000}], 0x1}, 0x80d1) 15.917589015s ago: executing program 8 (id=6172): r0 = getpid() r1 = perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x2, 0x3cd, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, r0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x1c, 0xf, &(0x7f0000000340)=@ringbuf, &(0x7f0000000200)='syzkaller\x00', 0x2, 0xf7, &(0x7f0000001e40)=""/4093}, 0x21) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xcb, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x50) r2 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x64, &(0x7f0000000000)=r4, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) close(r1) 11.864959931s ago: executing program 0 (id=6181): socket$kcm(0xa, 0x2, 0x0) socket$kcm(0x2, 0x5, 0x84) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$kcm(0x2, 0x5, 0x84) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpid() perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)) gettid() r0 = getpid() perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001a40)=ANY=[@ANYBLOB="02f1ff044d4ee5e9a17e739dff030000f9080029000100000080000000c05fb38ee07db7e64e863adfb0ace67df6409d53068350763c7bb016f63a6936911069d7e353f194de1ee2940019caddbcd4896ebb36857f09339cb712ba3cf79d6e45b8ce2d1e24aba4b3cf151025d0bfef25122bada0073bc45aac38a973736fa84a33b8c4bbb2219abd6cdd7d7bb0cad3440b413127c4daab1bfd1aab1f92ff5c76bc0b56f159d44b51eb47b0bc34b00433b9c28d3b99ffa59378d1e7a69b0aedac19d728c48fbe9140582145d16760b41dcc904ee02ec5f4", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1, 0x18, &(0x7f0000001980)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000fe27008500000008000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES64=r0, @ANYBLOB="0000000000000000b705000008000000850000007300000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0xe, 0xfe, &(0x7f0000000740)="000000000000c000ee6e3e20630c", 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB="0900000018000000080000004000000042000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000000179c26b9d3c872c2404626bf0b12ead2b9a11126c759c397d8ace2b3bfc674f8a818e1968875448d4e955f2f1e781e1a36e384c0e6b530e282d72fb17e208e237428d4509eb968f70ee8b192af8fa030af982968ef8b01f91a30060ef22ecce494d710ea8135f6e8d32ff3c422c109b12ed2ce4f0f25125"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r2}, 0x38) 10.782086585s ago: executing program 0 (id=6182): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x2}, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x22250, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc89ee2ccd10f8b7b, 0x7, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r2, 0x0, 0x0) r3 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r3, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="020b0700fc67", 0x6}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f91d24fc60040011000a7403004700000037153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80400, 0x0) ioctl$TUNSETIFF(r5, 0x400454da, &(0x7f00000002c0)={'bond0\x00', 0x4000}) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'dvmrp1\x00', 0x5433}) socketpair(0x2a, 0x6, 0x2, &(0x7f0000000080)) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000008}, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 8.172286244s ago: executing program 7 (id=6187): bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0), 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bc00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008001000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r5, 0x5, 0xe, 0x0, &(0x7f0000000440)="6121eed4cd50bb2b01e841acde1a", 0x0, 0x29d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0x34000}], 0x1}, 0x80d1) 7.820143155s ago: executing program 7 (id=6188): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000000000ee000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="240000002d006bcd9e3f17aa04001b0000010000ffffffff000000000000ff7f00000002", 0x24}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0xfca804a0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x560b0007, &(0x7f0000000000)="259a53f260006d2688a84c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000000), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x96, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000600), 0x0, 0x0, 0x1b, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 4.614925015s ago: executing program 7 (id=6190): r0 = socket$kcm(0x2, 0x5, 0x84) socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r1, 0x0, 0x0}, 0x20) r2 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r2, 0x0, 0x24004010) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYBLOB="2d6e20cff340874ebc91887db33396dbd1"], 0xa) r3 = socket$kcm(0x11, 0x200000000000002, 0x300) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x2000002, 0x51, 0x0, &(0x7f00000001c0)="df12c9f7b9a6000f0000000000009e7d4c44215f7533fef2a1a5698e510399cc6d3e3f3905d7c70a2602e064a4e969fbffffffffffffff01347e539d115f2d2f337cd27ff63b03a4591afb9b0a0505f207", 0x0, 0x80000084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000003c0)=r4, 0x4) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0xfe80000000000000, 0xac14140c}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)}], 0x1, 0x0, 0x0, 0x900}, 0x60) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000013c0)}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003567d25a806f8c6394f96724fc60050011000a7403004700000037153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x6200, 0x3ffffe, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f0000000380)={&(0x7f0000000080)=@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000140)='\a', 0x1}], 0x1}, 0x4004010) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="d2dea9138f958bd1164e3ec08403ab56e3e29564987246d222c01a8e61e8583ed054a309f1a3bfad4524c31ded22add3817d8950eef3b522882930c144e7fe8e8de77f7de3fbd23e5e38ee7d147301eef4a7b18c2598fa2da6856d02f0ce94fd6078a805ebc0ee1b3934d3f85bca7edb", 0x70}, {&(0x7f0000000200)="f0109fe4258faa884d206d66cd0745140cd3800a7eeb3263af4a297e9b7f9e61b243bc71426839113167c23473920d77203d0e82232f9f8194576d8daa150edb26da77d0a550cb4c8d9b9c98063100065164173c614b5783a7ed7bf5dceb6c9f19965ba4132f409a2d3bb9bcaf3e05e0", 0x70}, {&(0x7f0000000280)="977f1a1022bb7f6ff1edb9c99a0f84c2db08e6a6f979f29874314a26ea96ecb5228e8a0a2a58cd5a77ece6aca8fc7ac907727e0db845459129218663d0c0398134a686b904b2fd7f5f44701d5eff24e562601404b04c9805248997909ddc312c", 0x60}, {&(0x7f0000000040)="0b00b15abf9f21280793bf4d8aec91699b9775", 0x13}, {&(0x7f0000000100)="54df06aba9e56522273ff1932f0ae893db3d16edb6e6b8", 0x17}, {&(0x7f0000000300)="b004b41afaf2ffa4855537c8ff686d841e65fd687a10c1f871dd68dee7e67a9602719f69360c07cda67f0950bb5d27671e67cc0d02dd", 0x36}], 0x6, &(0x7f00000007c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_retopts={{0x1c, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0xfd, [@initdev={0xac, 0x1e, 0x1, 0x0}]}, @lsrr={0x83, 0x3, 0x8f}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @private=0xa010100}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xe}}, @ip_retopts={{0x74, 0x0, 0x7, {[@generic={0x89, 0x6, "eac211f4"}, @rr={0x7, 0x7, 0x6c, [@broadcast]}, @generic={0x0, 0xf, "a121a6170fc3953dac07b5a2c6"}, @ssrr={0x89, 0xf, 0x5b, [@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1]}, @timestamp_prespec={0x44, 0x24, 0x9e, 0x3, 0xc, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2d}, 0x8}, {@local, 0x5}, {@broadcast, 0x8}]}, @ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4}, @generic={0x83, 0xd, "f2d7c8cd737d2ed5432b7d"}]}}}], 0xe8}, 0x1) 4.035060236s ago: executing program 3 (id=6192): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x4}, 0x100000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/18, @ANYRES32=0x0], 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x4, 0x3, 0x6, 0x5, 0x0, 0x64, 0x20}]}, &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080), 0x10}, 0x94) r3 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x12, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3250}, 0x0, 0x0, 0x4, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, r3, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000002700)={0x7, 0x21, &(0x7f0000002400)=ANY=[], &(0x7f00000012c0)='syzkaller\x00', 0x5, 0xbf, &(0x7f0000001300)=""/191, 0x41100, 0x4d, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000026c0)={0x0, 0xc, 0x80000001, 0xf978}, 0x10, 0x0, r2, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x10, &(0x7f0000000000), 0x4) sendmsg$inet(r4, &(0x7f0000002d40)={0x0, 0x0, 0x0}, 0x0) r5 = socket$kcm(0x10, 0x100000000002, 0x4) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)="39000000140081ae00002c000500015601618575e285af0180007a1b31d569d9ae527048ffffffffffffffff56fabcb3b2aa9be3da9212d744", 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x40800) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xb, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000200), 0x0}, 0x20) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000003000), 0x201, 0x0) openat$cgroup_int(r7, 0x0, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8910, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, 0x0, 0x98) unlink(&(0x7f0000001400)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 2.588275123s ago: executing program 0 (id=6193): socket$kcm(0x11, 0x0, 0x0) r0 = socket$kcm(0xa, 0x3, 0x73) sendmsg$inet(r0, &(0x7f0000001180)={&(0x7f0000000000)={0xa, 0x0, @multicast2}, 0x10, &(0x7f0000001080)=[{0x0}, {&(0x7f0000001040)}], 0x2, &(0x7f00000010c0)=[@ip_tos_int={{0x14, 0x29, 0x43}}, @ip_tos_u8={{0x11, 0x29, 0x36}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @remote}}}], 0x50}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x58c8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$kcm(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x0, 0x0, 0x84, 0x4, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x100000}, 0x48) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1c00000033000b12c25aa9cb8c2194f90124fc60100c034006000000", 0x1c}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, &(0x7f0000000040), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000a0000000000000a07000000080000000000000b0400000009000000010000130c0000000740"], 0x0, 0x4a, 0x0, 0x1, 0x800, 0x10000}, 0x28) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d80000001a0081044e81f782db4cb904021d08007b490d4f1e81f8d81500010000e0000103600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6", 0xcb}], 0x1}, 0x4000000) ioctl$SIOCSIFHWADDR(r3, 0x8b04, &(0x7f0000000080)={'wlan1\x00', @broadcast}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041800"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 2.516293849s ago: executing program 3 (id=6194): bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0), 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001540)=ANY=[], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0x34000}], 0x1}, 0x80d1) 2.50677177s ago: executing program 7 (id=6195): socket$kcm(0xa, 0x2, 0x0) socket$kcm(0x2, 0x5, 0x84) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$kcm(0x2, 0x5, 0x84) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpid() perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)) gettid() r0 = getpid() perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001a40)=ANY=[@ANYBLOB="02f1ff044d4ee5e9a17e739dff030000f9080029000100000080000000c05fb38ee07db7e64e863adfb0ace67df6409d53068350763c7bb016f63a6936911069d7e353f194de1ee2940019caddbcd4896ebb36857f09339cb712ba3cf79d6e45b8ce2d1e24aba4b3cf151025d0bfef25122bada0073bc45aac38a973736fa84a33b8c4bbb2219abd6cdd7d7bb0cad3440b413127c4daab1bfd1aab1f92ff5c76bc0b56f159d44b51eb47b0bc34b00433b9c28d3b99ffa59378d1e7a69b0aedac19d728c48fbe9140582145d16760b41dcc904ee02ec5f4", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1, 0x18, &(0x7f0000001980)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000fe27008500000008000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES64=r0, @ANYBLOB="0000000000000000b705000008000000850000007300000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0xe, 0xfe, &(0x7f0000000740)="000000000000c000ee6e3e20630c", 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB="0900000018000000080000004000000042000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000000179c26b9d3c872c2404626bf0b12ead2b9a11126c759c397d8ace2b3bfc674f8a818e1968875448d4e955f2f1e781e1a36e384c0e6b530e282d72fb17e208e237428d4509eb968f70ee8b192af8fa030af982968ef8b01f91a30060ef22ecce494d710ea8135f6e8d32ff3c422c109b12ed2ce4f0f25125"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r2}, 0x38) 1.551856674s ago: executing program 0 (id=6196): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) r0 = socket$kcm(0x2, 0x5, 0x84) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r1, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bc00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008001000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0x34000}], 0x1}, 0x80d1) 1.550668394s ago: executing program 3 (id=6197): bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0), 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bc00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008001000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r5, 0x5, 0xe, 0x0, &(0x7f0000000440)="6121eed4cd50bb2b01e841acde1a", 0x0, 0x29d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0x34000}], 0x1}, 0x80d1) 1.340852552s ago: executing program 7 (id=6198): socket$kcm(0x2, 0x200000000000001, 0x106) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xcfa4) r0 = socket$kcm(0x11, 0x200000000000002, 0x300) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'wlan1\x00', @random="0200ff7fffff"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r0, r2}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r1, &(0x7f00000016c0)={&(0x7f0000000100)=@nl=@unspec, 0x80, &(0x7f0000001640)=[{&(0x7f00000012c0)="fe7465", 0x3}, {0x0}, {&(0x7f0000001440)}, {&(0x7f0000001480)="e07012cc0dffe90af470932a988957f91d490b982039b2d72fb6ac0fc11156fcbe7ecca856945e549fb2c8fa7ba5a7190caf8ddbe331b18c37df91219f6facececb1703887648b4093da8a33fb71c15705c7260af5d0df4c9177afc75a4ac47405d68ae9", 0x64}, {&(0x7f0000001580)}], 0x5, &(0x7f0000002a00)=ANY=[@ANYBLOB="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"], 0x958}, 0x8000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{r3, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000000)='%pS \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r4}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000400008500000061000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x24, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$SIOCSIFHWADDR(r2, 0x8924, 0x0) r5 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x4040) 1.226592612s ago: executing program 0 (id=6199): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000000000ee000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="240000002d006bcd9e3f17aa04001b0000010000ffffffff000000000000ff7f00000002", 0x24}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0xfca804a0, 0x8, 0x0, &(0x7f0000000000)="9b352e98d1dc0621", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x560b0007, &(0x7f0000000000)="259a53f260006d2688a84c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000000), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x96, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000600), 0x0, 0x0, 0x1b, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 779.334712ms ago: executing program 36 (id=6172): r0 = getpid() r1 = perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x2, 0x3cd, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, r0, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x1c, 0xf, &(0x7f0000000340)=@ringbuf, &(0x7f0000000200)='syzkaller\x00', 0x2, 0xf7, &(0x7f0000001e40)=""/4093}, 0x21) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xcb, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3}, 0x50) r2 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x64, &(0x7f0000000000)=r4, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) close(r1) 738.914855ms ago: executing program 3 (id=6201): sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002f000b08d25a80648c7494f90424fc600b0002", 0x17}], 0x1}, 0x0) r0 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="934300005a"], 0xfe33) 490.614547ms ago: executing program 3 (id=6202): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="14000000000000000000100000000000180b0000", @ANYRES32, @ANYBLOB="00000000001ed8a4df080000000001007b8af8ff00000000bfa20000000000ffff020800f8ffffffb703000002000000b704000000000000850c00005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="6000000068007f089e", 0x9}, {&(0x7f0000000280)="68cabf2dfb58fc021d6b689866f05dc800028088a8ffff0200258f2e4409b8f9e6aaeb88bea123dc2c6726e8060000000000000052dcd7298d39093c510293bca0b646a3ce904f6e6b788b3204c233e60ddc36024aa400", 0x57}], 0x2}, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r3, &(0x7f0000000000)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000780)="f4000900062b8825b7b1000000000000dc8b850f238466cc00007a000000ad6e911b51818462b400", 0x28}], 0x1}, 0x0) sendmsg$sock(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000340)="d6f88011e569eac2278cc592ac551318561f0f7df002ea9b4c226627cb2a20e586471102e814bd923e31b299f7e11ffb35ec8f49508b9bdfa59a354ca60be1de21f8e7d1b0b814aefefa3ef068610649bc801fdf5decf5c3a5149c677d2bd622ee6da9b8d22f8d6009c06a44a067a6ac01d12949c07ffb68f5e2b268deddc1239b5f5290c6f24d148ea8f8cfd80e16b3cc5850f2e447b03224d60be15d9180c35265d9eb2d3aee750fd5d224e3cbb39576cd32e4b95cf0f8bdc269c671f5f3a1a2ae74d6ea53448a8c834d1431854a6953c63e55761c5ec27ea28974bc65d3413f8e8a61e2d40882f5caf5d60e26f36f59c73dbc5cf3f2", 0xf7}, {&(0x7f00000004c0)="f38ef0e4871031d117e186de7a58f1b67f2bdb748eba5835b937b408bc9af25250ebcc64b7369fb060f16318d3f2db69cd077c0f1260310649898498952e4c61afcc85679bc6d2e818fab7b15b7139ba998f6002b48874fb470153cbb413d3ef8ea6dcbf3c94ad47069f64b2ca733d6f0a88d0c65b12275067006c1124a2be8812a30973cb9f94e59aa23397d7abd6c5df8f0093d4aa7406afb39f476773dc8455fb1e1e72fedc80a32eeb1717af68f043399721a62e32bcdc6c876ca52ce66fcbc705b712f824512feb81fc520f7054da10f863b26483677c9c8e0c00a8bca766e9b23982087e2d276613668696953ab132", 0xf2}, {&(0x7f0000000780)="3286ed273a84c1e1d4e3381e28b3514d10260afdbb2c0a176d8136d9ad0a23a0cc6c2df5227443605ffe2e1607be5d2f74228976bcb5027e6872be81d013708f31483ad2b8f29d177b7997bb2f9ba1d2294adda19d8e738524a366485246e3f16d75dfd49f178a79166cf10e8c5fa2fa8b80f50d2d6a3e8edb9f98823afcefd892b3bcc5f6a24f4d1795a396d5b3f0abe1593852501429a362d371220a85296f008b242feb2ece777d460b11869ae172f6a25cd75f6bb4f6656e1b74bd5c25682f7ffb5f01", 0xc5}, {&(0x7f0000000880)="bcc40557c1656e43959bdc75af9c15ccaeed51b36c2eac6414c94e9bf06b7d6448f222bdb8eeb9864dc3d6f8428edb208e50b5763ff8c9ed4f61cf200baec498aa6da11c0fc49d6917985fd854757237f0aab55c01f367e7c4de59efb6171c02d42feafd4ba3fdc5427be104e076b8cdece24c42488d09c6823a61deecd913c4fd0afb333d35e6b2cfc0d39cb58dfb200d456e6eca568f112bf18899fe9080d3dd1796f53936cdf3233e8cc05a7e92e36acdeb1de900ed5c52c0392cc13527d8802eef844e9fb326774313ae280f7541298063ab12e4c551dce7", 0xda}, {&(0x7f0000000b00)="e8aa57efc4823da87220f041e9a41fe69c8a3fb037e09b72884f69e7f1ea5d2b2b20c7c954fcc1507d99b91577859bc4b4e554172bce8e2887c0806be503dce1c0c1b78b3700f4bddff94cf9fa64f1ce8842293a0dd1b2be4cc364fb5472899789f54ffc12a6b0955e6ac7c9cf05fd0b22c574019bb1dbb3306acb9cd474cc60c11a9f1d60767c62b9055f0c160d4471b26a2c73290afaf5ae556148aaf77d92ec77608a944936f481101245b061c7f2525faa5a37bc2e50e3fb1939bce70e20766fd003456497221ba49f3736ee43c609a7ed5413f144", 0xd7}, {&(0x7f0000000c00)="9a605134af349edff1e198e3f3dc472f627fdb36f6e1c3b48f4b3fafbf97bf2fe46eb216cca1c627f1bbc03c9246b4b7ef9cba893f504a6dcffb560dd5838b648d6520bd44367115a0aca2456cfa1483daeadcfe17c86abafc6662d637be40552b6cd23c7c3d1301fce9bbc2a4411932a1daa43854f00b64248afc590b79e64efad81d294f1f9cffc06f451f574da0bfb907572bd2f54b805bbd1787630dbac69a47c52f0718ecfd813806f272402174006778492369758ec88d6e14e2ab0e1e19295ab1fdafef17b21e95e6c3e8af35a3251ea2390c", 0xd6}, {&(0x7f0000000000)="b13f0a892e", 0x5}, {&(0x7f0000000040)="7414d06d75b6eb0a17fb53cbf2ee4d13b199953c8392ad607bb8a2668a8902687d9026a45be20b7c1d3e103ce7fc22191541551426ec6bccd42eda2b81e50db29de0ba23cff488b19a4772edf57e71fea4424ecb5a9ce634362a2f06e8d5c5", 0x5f}, {&(0x7f0000000180)="5487d0d01d4be6924b470c517f87ccf2e018c2c954806e97bf2f6ce871d59b2409c04def", 0x24}], 0x9, &(0x7f0000000980)=[@mark={{0x14, 0x1, 0x24, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x78}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x261}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x90}, 0x8001) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) 327.387361ms ago: executing program 6 (id=6110): bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d00000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000140)="5c00000015006b0300224ed86e6c1d0002117ea6e070d6064e22000300000001250002000f00000017d34460bc24eab556a705251e6182949a00003d3b48dfd8cdbf9767b4fa51f62a64c9f4060046d88037e786a6d0a5d700000017", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 213.265151ms ago: executing program 3 (id=6203): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000080)="6c21c7981fc8b6bb372ecb8eb04157c22c6cc5b22d66b01ffbe717090e4b19d0fb1196f99309a21461263d2228b47aaca94767f5461feeee917af736b8b1869367fded83e281bab21c9ca0f9937a42c3b3e524250886fdb69a75506f36d5a479cc734fea4669ded4ec62f1c4291e2bd39817ef79d0d80e4a0d5e64edc630774c89e57d39c7ee7a82a2ce9ef1dc9f9fbbd864e5f33eb109cb83b5c69e7e2281b010", 0xa1}, {&(0x7f0000000180)="d8000000300009116144f782db44b904021d080005000700e8fe55a1180015000600142603600e120900210000000401a8001600a400014006000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5d00040000d6e4edef3d93452a92954b43370e9701", 0xd8}, {&(0x7f0000000000)="b030e28b4305a4b4f24812d00f5d4559021966dabe743f1863028142a97b6be33e609c8cf0316a95a8a87704f4e41ca5f5e71316de77300c8759cb8567e8e75a24b3e2e3afead766d07b0056e6d88435b9d88e4aae051391e98f7e8d8c538fd8160313c60c819a3726d54aa3bdf84f00", 0x70}, {&(0x7f00000002c0)="8d64cb8d6f7704c78e2d130c915c0ac521d8c06cdfac9db91039bb03db79a048706eb7e76a8e9b1dc827ad05f7354c2b26cf405115344b7aa0c7628b4f3742fd84cad377b9ef26772e38fddc1c7f1a7055457fd0accf3a7de8a1c882f64c59ff640a918768b3b340e7a08f93951db2ebcc8852a9d0186444139983cca458e7a36248944f3148ce8fe0c85691ea2e2ce7b23447795bcd4caa0e0b1ca85c3ffd1381ed8f738426ba9b88ee1af7e65c4f44587ae1baf5deadb267cc136f34bd50f8c7c9dacf95dcabbc9f02717ab075a1726d8cbb0a12a5df6c8f9e390f5b3881f4db9c46dc61cef7822da2db5c", 0xec}, {&(0x7f00000003c0)="dfa21c89a6085107dab8eedebfa7839f54c34a846f2fae62b7c6b8d69644f8224f7b289b873df310d20b1053b87e6e6a13fe3e59574b505dcd9b9b7dc0a7906be95b417e", 0x44}, {&(0x7f0000000440)="90b484a2e6224410984fad6979bcbcf973ac172cb793f5e4dfea7589beb8945ee50e8a4417740d2906733cdbad68b707f3ee5fcb50b2595c1cd500bbf06a0b9e6d8bcf324f95a6260642695915a538a82e6857daa50466db7fbcee06058c9e32179f314de91e290af7e3a3e96313070c0fa46c3b77e25b8aa5ae337cd4a77c9372d46b8400b1f17965f259baa11fdc1e93275f11147a657bdd3ee75943d2064d8e324f06005ffe93f65b2489285c04a520223042835e3563bf7eab7512974c97a49bfbfa", 0xc4}, {&(0x7f0000000540)="525923b38f7f7b6b316f32ad5005cd38785bad9fd0a8e95cf5ded9044f9e53cf0ce69dd11df639781993b08de37538acbd2073de81f320f5ca73df7eacbb0f15707b12b41f0a9e", 0x47}, {&(0x7f00000005c0)="bc18dc3a9c16b12508a556ce4c6242ce5339204fcd7c06d06c4f41172d2f9825733b9e51a8d117ee284cfd488d1455c004271bce2c2cfaa48d43b7a35bf8a6bc35b37c3746cbf3512d12aaab2ad98423cf2fb965f43ca8d80387c17ebf7cc5a946d72f2a069d437a4d2922ba10e24289f74634bd6d2eb5890ab8c4043d5a30d45975fb1795cea364317aab6471384162a7c1e2ddb8d34c1e3f867ca8751bd4dd6ffaa697eb8e2b7aa9906c03842a514f2e2d4debe09d3376406b3be897be07322c8a16f2fb879697b29e9449755a18e3d7ffc0c03a8b897122777aa03ec508b27edc76", 0xe3}, {&(0x7f00000006c0)="717e542a8d2808df5885224fc6f3d0712db1fb10255d54efed4ca0815909c8ff594f1d2f3ec512ef9c559baaf79be11fb606e9522ac5fefac5fa940c0fb694c69f554c94eac85421406a31838f57d0163b2bec67a55493de72225ca0a4dc75bc97e4ffcfc2ccd020885b40d8999e7c566442fe968c6667244d313bfce74d5bd91b934d8c457a121d62d4348befa4372fa4b7b728d78b7117d630e8c396e717ca4b8a89c5a92f0fdbc7bca48cc490bdbcd5e6ce8b8f509d1a66aaba8166e6439352090c468c0847a732", 0xc9}, {&(0x7f00000007c0)="e3c4c1f5860f1d93f47f0a9039f5bc6aa52f466a43e1a9bd40e2642b30db9eb08ac7e374ec89f06c3fb42593ed3f43e8133b25b568c8587bbb4ca68b533a0184dcd6c8e2c0cda2de53e92cae007ab664d225293330ac5c7123bcaaec9388489b9784501a597d02acaeb930435fcf02ebb0c5d3597a63a5b9fb1322f4d99effe3aa6386a0ac3d276a8b24416db4f1f815f9c8038d37af096d5ac54a5d5151a1085bb4f1e638aa981fd960614b0345741c1236b52d7c6ce85565d8c9aa", 0xbc}], 0xa}, 0x0) 212.292711ms ago: executing program 0 (id=6204): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x4}, 0x100000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/18, @ANYRES32=0x0], 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x4, 0x3, 0x6, 0x5, 0x0, 0x64, 0x20}]}, &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080), 0x10}, 0x94) r3 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x12, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3250}, 0x0, 0x0, 0x4, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, r3, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000002700)={0x7, 0x21, &(0x7f0000002400)=ANY=[], &(0x7f00000012c0)='syzkaller\x00', 0x5, 0xbf, &(0x7f0000001300)=""/191, 0x41100, 0x4d, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000026c0)={0x0, 0xc, 0x80000001, 0xf978}, 0x10, 0x0, r2, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x10, &(0x7f0000000000), 0x4) sendmsg$inet(r4, &(0x7f0000002d40)={0x0, 0x0, 0x0}, 0x0) r5 = socket$kcm(0x10, 0x100000000002, 0x4) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)="39000000140081ae00002c000500015601618575e285af0180007a1b31d569d9ae527048ffffffffffffffff56fabcb3b2aa9be3da9212d744", 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x40800) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xb, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000200), 0x0}, 0x20) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000003000), 0x201, 0x0) openat$cgroup_int(r7, 0x0, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8910, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, 0x0, 0x98) unlink(&(0x7f0000001400)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 110.49955ms ago: executing program 7 (id=6205): socket$kcm(0x11, 0x0, 0x0) r0 = socket$kcm(0xa, 0x3, 0x73) sendmsg$inet(r0, &(0x7f0000001180)={&(0x7f0000000000)={0xa, 0x0, @multicast2}, 0x10, &(0x7f0000001080)=[{0x0}, {&(0x7f0000001040)}], 0x2, &(0x7f00000010c0)=[@ip_tos_int={{0x14, 0x29, 0x43}}, @ip_tos_u8={{0x11, 0x29, 0x36}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @remote}}}], 0x50}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x58c8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$kcm(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x0, 0x0, 0x84, 0x4, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x100000}, 0x48) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1c00000033000b12c25aa9cb8c2194f90124fc60100c034006000000", 0x1c}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, &(0x7f0000000040), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000a0000000000000a07000000080000000000000b0400000009000000010000130c0000000740"], 0x0, 0x4a, 0x0, 0x1, 0x800, 0x10000}, 0x28) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d80000001a0081044e81f782db4cb904021d08007b490d4f1e81f8d81500010000e0000103600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9ee5350db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6", 0xcb}], 0x1}, 0x4000000) ioctl$SIOCSIFHWADDR(r3, 0x8b04, &(0x7f0000000080)={'wlan1\x00', @broadcast}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041800"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 0s ago: executing program 6 (id=6206): r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x4040) setsockopt$sock_attach_bpf(r0, 0x110, 0x2, 0x0, 0x0) kernel console output (not intermixed with test programs): g_sock+0x30/0x30 [ 1385.046724][T19149] ? __import_iovec+0x315/0x500 [ 1385.051618][T19149] ? import_iovec+0x6f/0xa0 [ 1385.056157][T19149] ___sys_sendmsg+0x2a2/0x360 [ 1385.060872][T19149] ? __sys_sendmsg+0x290/0x290 [ 1385.065686][T19149] ? __lock_acquire+0x7d10/0x7d10 [ 1385.070755][T19149] __se_sys_sendmsg+0x1bb/0x2a0 [ 1385.075643][T19149] ? __x64_sys_sendmsg+0x80/0x80 [ 1385.080632][T19149] ? lockdep_hardirqs_on+0x94/0x140 [ 1385.085861][T19149] do_syscall_64+0x4c/0xa0 [ 1385.090312][T19149] ? clear_bhb_loop+0x60/0xb0 [ 1385.095197][T19149] ? clear_bhb_loop+0x60/0xb0 [ 1385.099926][T19149] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1385.105849][T19149] RIP: 0033:0x7f42f4b9c629 [ 1385.110288][T19149] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1385.129948][T19149] RSP: 002b:00007f42f5b3c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1385.138434][T19149] RAX: ffffffffffffffda RBX: 00007f42f4e15fa0 RCX: 00007f42f4b9c629 [ 1385.146448][T19149] RDX: 0000000000000000 RSI: 0000200000000540 RDI: 0000000000000003 [ 1385.154461][T19149] RBP: 00007f42f5b3c090 R08: 0000000000000000 R09: 0000000000000000 [ 1385.162497][T19149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1385.170516][T19149] R13: 00007f42f4e16038 R14: 00007f42f4e15fa0 R15: 00007ffeed9111c8 [ 1385.178561][T19149] [ 1386.029311][ T9403] team0: Port device syz_tun removed [ 1386.190419][ T29] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1386.327140][T19178] netlink: 'syz.0.4205': attribute type 33 has an invalid length. [ 1386.355529][T19178] netlink: 152 bytes leftover after parsing attributes in process `syz.0.4205'. [ 1386.372201][ T4281] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 1386.409611][ T4281] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 1386.420210][ T4281] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 1386.430581][ T4281] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 1386.439852][ T4281] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 1386.447478][ T4281] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 1386.458173][ T29] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1386.689606][ T29] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1386.805512][T19188] netlink: 'syz.3.4208': attribute type 10 has an invalid length. [ 1387.689411][T19179] chnl_net:caif_netlink_parms(): no params data found [ 1387.954610][T19179] bridge0: port 1(bridge_slave_0) entered blocking state [ 1387.961804][T19179] bridge0: port 1(bridge_slave_0) entered disabled state [ 1388.039477][T19179] device bridge_slave_0 entered promiscuous mode [ 1388.260287][T19210] FAULT_INJECTION: forcing a failure. [ 1388.260287][T19210] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1388.279799][T19179] bridge0: port 2(bridge_slave_1) entered blocking state [ 1388.294822][T19210] CPU: 0 PID: 19210 Comm: syz.6.4215 Not tainted syzkaller #0 [ 1388.302372][T19210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1388.312647][T19210] Call Trace: [ 1388.315968][T19210] [ 1388.318944][T19210] dump_stack_lvl+0x188/0x24e [ 1388.323683][T19210] ? show_regs_print_info+0x12/0x12 [ 1388.328937][T19210] ? load_image+0x400/0x400 [ 1388.333484][T19210] ? __lock_acquire+0x7d10/0x7d10 [ 1388.338563][T19210] should_fail_ex+0x399/0x4d0 [ 1388.343392][T19210] _copy_from_user+0x2c/0x170 [ 1388.348213][T19210] __sys_bpf+0x2ea/0x780 [ 1388.351268][T19179] bridge0: port 2(bridge_slave_1) entered disabled state [ 1388.352493][T19210] ? bpf_link_show_fdinfo+0x380/0x380 [ 1388.364983][T19210] ? lock_chain_count+0x20/0x20 [ 1388.369917][T19210] __x64_sys_bpf+0x78/0x90 [ 1388.374392][T19210] do_syscall_64+0x4c/0xa0 [ 1388.378865][T19210] ? clear_bhb_loop+0x60/0xb0 [ 1388.383591][T19210] ? clear_bhb_loop+0x60/0xb0 [ 1388.388319][T19210] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1388.394257][T19210] RIP: 0033:0x7f626ed9c629 [ 1388.398717][T19210] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1388.418544][T19210] RSP: 002b:00007f626cff6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1388.426997][T19210] RAX: ffffffffffffffda RBX: 00007f626f015fa0 RCX: 00007f626ed9c629 [ 1388.435091][T19210] RDX: 0000000000000048 RSI: 000020000000e000 RDI: 0000000000000005 [ 1388.443350][T19210] RBP: 00007f626cff6090 R08: 0000000000000000 R09: 0000000000000000 [ 1388.451349][T19210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1388.459349][T19210] R13: 00007f626f016038 R14: 00007f626f015fa0 R15: 00007ffcd13ee2d8 [ 1388.467379][T19210] [ 1388.484955][T19179] device bridge_slave_1 entered promiscuous mode [ 1388.495231][ T4281] Bluetooth: hci0: command 0x0409 tx timeout [ 1388.595464][T19179] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1388.715219][T19179] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1388.911632][T19179] team0: Port device team_slave_0 added [ 1389.158905][T19223] netlink: 'syz.6.4218': attribute type 10 has an invalid length. [ 1389.176518][T19179] team0: Port device team_slave_1 added [ 1389.254297][T19179] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1389.262748][T19179] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1389.410818][T19179] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1389.495226][T19179] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1389.555700][T19179] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1389.720908][T19179] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1390.562794][ T4281] Bluetooth: hci0: command 0x041b tx timeout [ 1390.600995][T19179] device hsr_slave_0 entered promiscuous mode [ 1390.633415][T19179] device hsr_slave_1 entered promiscuous mode [ 1390.643548][T19179] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1390.672296][T19179] Cannot create hsr debugfs directory [ 1392.675220][ T4281] Bluetooth: hci0: command 0x040f tx timeout [ 1393.630654][ T29] team0: Port device wlan1 removed [ 1393.949963][T19179] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 1394.057263][T19179] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 1394.079364][T19302] netlink: 'syz.0.4242': attribute type 10 has an invalid length. [ 1394.138635][T19179] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 1394.208361][T19308] netlink: 154788 bytes leftover after parsing attributes in process `syz.8.4244'. [ 1394.234326][T19308] openvswitch: netlink: Message has 48126 unknown bytes. [ 1394.367593][T19179] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 1394.418135][ T29] device hsr_slave_0 left promiscuous mode [ 1394.442477][ T29] device hsr_slave_1 left promiscuous mode [ 1394.484017][ T29] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1394.503966][ T29] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1394.536449][ T29] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1394.558539][ T29] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1394.650128][ T29] device veth1_macvtap left promiscuous mode [ 1394.660017][ T29] device veth0_macvtap left promiscuous mode [ 1394.670936][ T29] device veth0_vlan left promiscuous mode [ 1394.723188][ T4281] Bluetooth: hci0: command 0x0419 tx timeout [ 1395.731689][ T29] team0 (unregistering): Port device team_slave_1 removed [ 1395.779332][ T29] team0 (unregistering): Port device team_slave_0 removed [ 1395.827971][ T29] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1395.874676][ T29] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1396.222250][ T29] bond0 (unregistering): Released all slaves [ 1396.275358][T19324] netlink: 'syz.0.4246': attribute type 10 has an invalid length. [ 1396.492449][T19179] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1396.554656][ T7200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1396.563853][ T7200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1396.587320][T19179] 8021q: adding VLAN 0 to HW filter on device team0 [ 1396.633933][ T7200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1396.651920][ T7200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1396.718697][ T7200] bridge0: port 1(bridge_slave_0) entered blocking state [ 1396.725972][ T7200] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1396.787668][ T7200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1396.811385][ T7200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1396.855616][ T7200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1396.867259][ T7200] bridge0: port 2(bridge_slave_1) entered blocking state [ 1396.874566][ T7200] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1396.927689][ T7200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1397.072853][ T7200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1397.114503][ T7200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1397.166766][ T7200] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1397.210225][ T7200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1397.226939][ T7200] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1397.240523][ T7200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1397.252529][ T7200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1397.282106][ T7200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1397.367360][ T7200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1397.463577][T19179] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1397.710128][ T7200] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1398.082520][T19369] netlink: 'syz.6.4256': attribute type 10 has an invalid length. [ 1398.874880][T19383] netlink: 'syz.3.4262': attribute type 29 has an invalid length. [ 1399.023087][T19383] netlink: 'syz.3.4262': attribute type 29 has an invalid length. [ 1399.084821][T19384] FAULT_INJECTION: forcing a failure. [ 1399.084821][T19384] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1399.223259][T19384] CPU: 1 PID: 19384 Comm: syz.3.4262 Not tainted syzkaller #0 [ 1399.230906][T19384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1399.241278][T19384] Call Trace: [ 1399.244691][T19384] [ 1399.247657][T19384] dump_stack_lvl+0x188/0x24e [ 1399.252415][T19384] ? show_regs_print_info+0x12/0x12 [ 1399.257766][T19384] ? load_image+0x400/0x400 [ 1399.262329][T19384] ? __lock_acquire+0x7d10/0x7d10 [ 1399.267446][T19384] should_fail_ex+0x399/0x4d0 [ 1399.272275][T19384] _copy_from_user+0x2c/0x170 [ 1399.277012][T19384] ___sys_recvmsg+0x172/0x590 [ 1399.281762][T19384] ? __sys_recvmsg+0x290/0x290 [ 1399.286605][T19384] ? common_file_perm+0x171/0x1c0 [ 1399.291684][T19384] ? __fget_files+0x43d/0x4b0 [ 1399.296526][T19384] __x64_sys_recvmsg+0x205/0x2e0 [ 1399.301533][T19384] ? ___sys_recvmsg+0x590/0x590 [ 1399.306540][T19384] ? lockdep_hardirqs_on+0x94/0x140 [ 1399.311796][T19384] do_syscall_64+0x4c/0xa0 [ 1399.316272][T19384] ? clear_bhb_loop+0x60/0xb0 [ 1399.321001][T19384] ? clear_bhb_loop+0x60/0xb0 [ 1399.325733][T19384] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1399.331715][T19384] RIP: 0033:0x7f98d4f9c629 [ 1399.336192][T19384] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1399.355949][T19384] RSP: 002b:00007f98d5f28028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1399.364503][T19384] RAX: ffffffffffffffda RBX: 00007f98d5216090 RCX: 00007f98d4f9c629 [ 1399.372539][T19384] RDX: 0000000000000000 RSI: 0000200000000cc0 RDI: 0000000000000003 [ 1399.380644][T19384] RBP: 00007f98d5f28090 R08: 0000000000000000 R09: 0000000000000000 [ 1399.388675][T19384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1399.396702][T19384] R13: 00007f98d5216128 R14: 00007f98d5216090 R15: 00007fff9fddd108 [ 1399.404736][T19384] [ 1399.823221][T13107] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1399.830803][T13107] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1399.865921][T19179] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1401.045936][T19413] netlink: 'syz.0.4270': attribute type 10 has an invalid length. [ 1401.260957][T19420] netlink: 154788 bytes leftover after parsing attributes in process `syz.3.4271'. [ 1401.288396][T19420] openvswitch: netlink: Message has 48126 unknown bytes. [ 1401.328457][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1401.353710][ T75] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1401.441235][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1401.455414][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1401.471520][T19179] device veth0_vlan entered promiscuous mode [ 1401.484742][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1401.498962][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1401.526141][T19179] device veth1_vlan entered promiscuous mode [ 1401.558358][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1401.567758][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1401.579591][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1401.595014][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1401.630285][T19179] device veth0_macvtap entered promiscuous mode [ 1401.651744][T19179] device veth1_macvtap entered promiscuous mode [ 1401.700951][T19179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1401.720605][T19179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1401.741752][T19179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1401.783828][T19179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1401.804738][T19179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1401.830840][T19179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1401.851233][T19179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1401.869185][T19179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1401.889681][T19179] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1401.910238][T19430] netlink: 763 bytes leftover after parsing attributes in process `syz.3.4276'. [ 1401.960053][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1402.019752][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1402.055992][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1402.103305][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1402.158181][T19179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1402.220861][T19179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1402.270269][T19179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1402.311352][T19179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1402.351821][T19179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1402.381905][T19179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1402.477397][T19179] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1402.529149][T19179] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1402.589536][T19179] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1402.666841][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1402.695251][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1402.756306][T19179] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1402.785559][T19179] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1402.839504][T19179] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1402.884477][T19179] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1403.236270][ T4320] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1403.250450][ T4320] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1403.309478][ T4320] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1403.376433][ T4320] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1403.441921][ T4320] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1403.519540][ T4320] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1403.841173][T19462] netlink: 168864 bytes leftover after parsing attributes in process `syz.0.4284'. [ 1403.887255][T19462] netlink: zone id is out of range [ 1403.967764][T19462] netlink: zone id is out of range [ 1403.994541][T19462] netlink: zone id is out of range [ 1403.999761][T19462] netlink: zone id is out of range [ 1404.045014][T19462] netlink: del zone limit has 4 unknown bytes [ 1404.358330][T19472] netlink: 763 bytes leftover after parsing attributes in process `syz.6.4289'. [ 1404.429630][T19472] FAULT_INJECTION: forcing a failure. [ 1404.429630][T19472] name failslab, interval 1, probability 0, space 0, times 0 [ 1404.494608][T19472] CPU: 1 PID: 19472 Comm: syz.6.4289 Not tainted syzkaller #0 [ 1404.502177][T19472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1404.512377][T19472] Call Trace: [ 1404.515702][T19472] [ 1404.518766][T19472] dump_stack_lvl+0x188/0x24e [ 1404.523518][T19472] ? show_regs_print_info+0x12/0x12 [ 1404.528828][T19472] ? load_image+0x400/0x400 [ 1404.533466][T19472] ? __might_sleep+0xd0/0xd0 [ 1404.538102][T19472] ? __lock_acquire+0x7d10/0x7d10 [ 1404.543266][T19472] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 1404.549306][T19472] should_fail_ex+0x399/0x4d0 [ 1404.554052][T19472] should_failslab+0x5/0x20 [ 1404.558620][T19472] slab_pre_alloc_hook+0x59/0x310 [ 1404.563705][T19472] ? lockdep_hardirqs_on+0x94/0x140 [ 1404.568971][T19472] kmem_cache_alloc+0x56/0x2f0 [ 1404.573811][T19472] ? __alloc_file+0x25/0x230 [ 1404.578455][T19472] __alloc_file+0x25/0x230 [ 1404.582968][T19472] alloc_empty_file+0x90/0x180 [ 1404.587793][T19472] alloc_file+0x5c/0x5f0 [ 1404.592081][T19472] alloc_file_pseudo+0x180/0x200 [ 1404.597074][T19472] ? alloc_empty_file_noaccount+0x80/0x80 [ 1404.602839][T19472] ? _raw_spin_unlock+0x24/0x40 [ 1404.607751][T19472] anon_inode_getfd+0xc6/0x1c0 [ 1404.612572][T19472] map_create+0xbe8/0x1000 [ 1404.617054][T19472] __sys_bpf+0x38b/0x780 [ 1404.621362][T19472] ? bpf_link_show_fdinfo+0x380/0x380 [ 1404.626799][T19472] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 1404.633017][T19472] __x64_sys_bpf+0x78/0x90 [ 1404.637495][T19472] do_syscall_64+0x4c/0xa0 [ 1404.641974][T19472] ? clear_bhb_loop+0x60/0xb0 [ 1404.646712][T19472] ? clear_bhb_loop+0x60/0xb0 [ 1404.651443][T19472] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1404.657388][T19472] RIP: 0033:0x7f626ed9c629 [ 1404.661865][T19472] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1404.681681][T19472] RSP: 002b:00007f626cff6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1404.690170][T19472] RAX: ffffffffffffffda RBX: 00007f626f015fa0 RCX: 00007f626ed9c629 [ 1404.698198][T19472] RDX: 0000000000000048 RSI: 00002000000008c0 RDI: 0000000000000000 [ 1404.706232][T19472] RBP: 00007f626cff6090 R08: 0000000000000000 R09: 0000000000000000 [ 1404.714262][T19472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1404.722475][T19472] R13: 00007f626f016038 R14: 00007f626f015fa0 R15: 00007ffcd13ee2d8 [ 1404.730524][T19472] [ 1407.280537][T19491] FAULT_INJECTION: forcing a failure. [ 1407.280537][T19491] name failslab, interval 1, probability 0, space 0, times 0 [ 1407.309594][T19491] CPU: 1 PID: 19491 Comm: syz.6.4293 Not tainted syzkaller #0 [ 1407.317155][T19491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1407.327352][T19491] Call Trace: [ 1407.330673][T19491] [ 1407.333646][T19491] dump_stack_lvl+0x188/0x24e [ 1407.338385][T19491] ? show_regs_print_info+0x12/0x12 [ 1407.343664][T19491] ? load_image+0x400/0x400 [ 1407.348221][T19491] ? __might_sleep+0xd0/0xd0 [ 1407.352915][T19491] ? __lock_acquire+0x7d10/0x7d10 [ 1407.358003][T19491] should_fail_ex+0x399/0x4d0 [ 1407.362749][T19491] should_failslab+0x5/0x20 [ 1407.367307][T19491] slab_pre_alloc_hook+0x59/0x310 [ 1407.372388][T19491] kmem_cache_alloc+0x56/0x2f0 [ 1407.377208][T19491] ? __pmd_alloc+0x116/0x760 [ 1407.381852][T19491] __pmd_alloc+0x116/0x760 [ 1407.386327][T19491] ? __lock_acquire+0x7d10/0x7d10 [ 1407.391383][T19491] ? do_raw_spin_lock+0x128/0x2f0 [ 1407.396439][T19491] ? __pud_alloc+0x150/0x150 [ 1407.401065][T19491] ? __rwlock_init+0x140/0x140 [ 1407.405876][T19491] ? hugepage_vma_check+0x466/0x540 [ 1407.411114][T19491] handle_mm_fault+0xa03/0x3ee0 [ 1407.415993][T19491] ? mt_find+0x157/0x830 [ 1407.420279][T19491] ? numa_migrate_prep+0x250/0x250 [ 1407.425432][T19491] ? lock_chain_count+0x20/0x20 [ 1407.430325][T19491] ? lock_mm_and_find_vma+0xae/0x2f0 [ 1407.435643][T19491] do_user_addr_fault+0x51f/0xb10 [ 1407.440726][T19491] exc_page_fault+0x60/0x100 [ 1407.445354][T19491] asm_exc_page_fault+0x22/0x30 [ 1407.450242][T19491] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 1407.456084][T19491] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 90 90 90 90 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 90 90 90 90 90 90 48 bb f9 ef ff ff ff 7f [ 1407.475722][T19491] RSP: 0018:ffffc9000521fe80 EFLAGS: 00050293 [ 1407.481906][T19491] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 0000200000000040 [ 1407.489932][T19491] RDX: 0000000000000000 RSI: ffffffff8a8c23a0 RDI: ffffffff8adf0de0 [ 1407.497930][T19491] RBP: 0000000000000004 R08: ffffffff8e1fcd2f R09: 1ffffffff1c3f9a5 [ 1407.505927][T19491] R10: dffffc0000000000 R11: fffffbfff1c3f9a6 R12: 0000000000000800 [ 1407.513933][T19491] R13: 0000200000000040 R14: 0000000000000003 R15: 0000000000000803 [ 1407.521960][T19491] __sys_socketpair+0xb4/0x540 [ 1407.526766][T19491] __x64_sys_socketpair+0x97/0xb0 [ 1407.531860][T19491] do_syscall_64+0x4c/0xa0 [ 1407.536396][T19491] ? clear_bhb_loop+0x60/0xb0 [ 1407.541099][T19491] ? clear_bhb_loop+0x60/0xb0 [ 1407.545806][T19491] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1407.551730][T19491] RIP: 0033:0x7f626ed9c629 [ 1407.556168][T19491] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1407.575801][T19491] RSP: 002b:00007f626cff6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1407.584248][T19491] RAX: ffffffffffffffda RBX: 00007f626f015fa0 RCX: 00007f626ed9c629 [ 1407.592250][T19491] RDX: 0000000000000011 RSI: 0000000000000803 RDI: 0000000000000003 [ 1407.600243][T19491] RBP: 00007f626cff6090 R08: 0000000000000000 R09: 0000000000000000 [ 1407.608253][T19491] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 1407.616259][T19491] R13: 00007f626f016038 R14: 00007f626f015fa0 R15: 00007ffcd13ee2d8 [ 1407.624278][T19491] [ 1408.893367][T19525] FAULT_INJECTION: forcing a failure. [ 1408.893367][T19525] name failslab, interval 1, probability 0, space 0, times 0 [ 1408.950991][T19525] CPU: 0 PID: 19525 Comm: syz.8.4302 Not tainted syzkaller #0 [ 1408.958568][T19525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1408.968685][T19525] Call Trace: [ 1408.972015][T19525] [ 1408.975002][T19525] dump_stack_lvl+0x188/0x24e [ 1408.979757][T19525] ? show_regs_print_info+0x12/0x12 [ 1408.985026][T19525] ? load_image+0x400/0x400 [ 1408.989604][T19525] ? __might_sleep+0xd0/0xd0 [ 1408.994252][T19525] ? __lock_acquire+0x7d10/0x7d10 [ 1408.999349][T19525] ? perf_trace_buf_alloc+0x300/0x300 [ 1409.004786][T19525] should_fail_ex+0x399/0x4d0 [ 1409.009551][T19525] should_failslab+0x5/0x20 [ 1409.014126][T19525] slab_pre_alloc_hook+0x59/0x310 [ 1409.019229][T19525] kmem_cache_alloc_node+0x5a/0x320 [ 1409.024495][T19525] ? __alloc_skb+0xfc/0x7e0 [ 1409.029095][T19525] __alloc_skb+0xfc/0x7e0 [ 1409.033516][T19525] alloc_skb_with_frags+0xa7/0x710 [ 1409.038721][T19525] sock_alloc_send_pskb+0x87f/0x9a0 [ 1409.044002][T19525] ? aa_sk_perm+0x950/0x950 [ 1409.048595][T19525] ? sock_kzfree_s+0x50/0x50 [ 1409.053246][T19525] ? __might_sleep+0xd0/0xd0 [ 1409.057904][T19525] ? apparmor_socket_getpeersec_dgram+0x5/0x10 [ 1409.064120][T19525] ? security_socket_getpeersec_dgram+0x9d/0xc0 [ 1409.070449][T19525] unix_stream_sendmsg+0x431/0xa70 [ 1409.075653][T19525] ? unix_show_fdinfo+0x2c0/0x2c0 [ 1409.080764][T19525] ? tomoyo_socket_sendmsg_permission+0x1dd/0x2f0 [ 1409.087273][T19525] ? verify_lock_unused+0x140/0x140 [ 1409.092553][T19525] ? aa_file_perm+0x112/0xf00 [ 1409.097302][T19525] ? aa_sock_msg_perm+0x94/0x150 [ 1409.102311][T19525] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1409.107658][T19525] ? security_socket_sendmsg+0x7c/0xa0 [ 1409.113198][T19525] sock_write_iter+0x2d9/0x3e0 [ 1409.118035][T19525] ? sock_read_iter+0x3a0/0x3a0 [ 1409.122970][T19525] ? common_file_perm+0x171/0x1c0 [ 1409.128077][T19525] vfs_write+0x4b1/0xa30 [ 1409.132419][T19525] ? file_end_write+0x250/0x250 [ 1409.137363][T19525] ? __fget_files+0x43d/0x4b0 [ 1409.142143][T19525] ? __fdget_pos+0x1d4/0x360 [ 1409.146860][T19525] ? ksys_write+0x71/0x250 [ 1409.151395][T19525] ksys_write+0x14c/0x250 [ 1409.155809][T19525] ? __ia32_sys_read+0x80/0x80 [ 1409.160669][T19525] ? lockdep_hardirqs_on+0x94/0x140 [ 1409.165942][T19525] do_syscall_64+0x4c/0xa0 [ 1409.170423][T19525] ? clear_bhb_loop+0x60/0xb0 [ 1409.175168][T19525] ? clear_bhb_loop+0x60/0xb0 [ 1409.179920][T19525] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1409.185876][T19525] RIP: 0033:0x7fca9c39c629 [ 1409.190360][T19525] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1409.210200][T19525] RSP: 002b:00007fca9d238028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1409.218694][T19525] RAX: ffffffffffffffda RBX: 00007fca9c615fa0 RCX: 00007fca9c39c629 [ 1409.226924][T19525] RDX: 00000000fffffeff RSI: 00002000000005c0 RDI: 0000000000000003 [ 1409.235047][T19525] RBP: 00007fca9d238090 R08: 0000000000000000 R09: 0000000000000000 [ 1409.243170][T19525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1409.251288][T19525] R13: 00007fca9c616038 R14: 00007fca9c615fa0 R15: 00007fffacc671f8 [ 1409.259359][T19525] [ 1409.359643][T19534] netlink: 'syz.7.4304': attribute type 3 has an invalid length. [ 1409.397100][T19534] netlink: 'syz.7.4304': attribute type 1 has an invalid length. [ 1409.406375][T19534] netlink: 60387 bytes leftover after parsing attributes in process `syz.7.4304'. [ 1413.397316][T19578] FAULT_INJECTION: forcing a failure. [ 1413.397316][T19578] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1413.422870][T19578] CPU: 1 PID: 19578 Comm: syz.6.4321 Not tainted syzkaller #0 [ 1413.430499][T19578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1413.440590][T19578] Call Trace: [ 1413.443910][T19578] [ 1413.446877][T19578] dump_stack_lvl+0x188/0x24e [ 1413.451617][T19578] ? show_regs_print_info+0x12/0x12 [ 1413.456878][T19578] ? load_image+0x400/0x400 [ 1413.461438][T19578] ? __lock_acquire+0x7d10/0x7d10 [ 1413.466546][T19578] should_fail_ex+0x399/0x4d0 [ 1413.471288][T19578] _copy_from_user+0x2c/0x170 [ 1413.476021][T19578] ___sys_sendmsg+0x1c3/0x360 [ 1413.480765][T19578] ? __sys_sendmsg+0x290/0x290 [ 1413.485609][T19578] ? __lock_acquire+0x7d10/0x7d10 [ 1413.490728][T19578] __se_sys_sendmsg+0x1bb/0x2a0 [ 1413.495644][T19578] ? __x64_sys_sendmsg+0x80/0x80 [ 1413.500655][T19578] ? lockdep_hardirqs_on+0x94/0x140 [ 1413.505905][T19578] do_syscall_64+0x4c/0xa0 [ 1413.510442][T19578] ? clear_bhb_loop+0x60/0xb0 [ 1413.515704][T19578] ? clear_bhb_loop+0x60/0xb0 [ 1413.520438][T19578] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1413.526397][T19578] RIP: 0033:0x7f626ed9c629 [ 1413.530860][T19578] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1413.550530][T19578] RSP: 002b:00007f626cff6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1413.559091][T19578] RAX: ffffffffffffffda RBX: 00007f626f015fa0 RCX: 00007f626ed9c629 [ 1413.567114][T19578] RDX: 0000000000000014 RSI: 0000200000000000 RDI: 0000000000000005 [ 1413.575136][T19578] RBP: 00007f626cff6090 R08: 0000000000000000 R09: 0000000000000000 [ 1413.583158][T19578] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1413.591175][T19578] R13: 00007f626f016038 R14: 00007f626f015fa0 R15: 00007ffcd13ee2d8 [ 1413.599215][T19578] [ 1417.601052][T19648] FAULT_INJECTION: forcing a failure. [ 1417.601052][T19648] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1417.689985][T19648] CPU: 1 PID: 19648 Comm: syz.6.4348 Not tainted syzkaller #0 [ 1417.697555][T19648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1417.707667][T19648] Call Trace: [ 1417.711060][T19648] [ 1417.714047][T19648] dump_stack_lvl+0x188/0x24e [ 1417.715869][T19651] netlink: 'syz.3.4350': attribute type 10 has an invalid length. [ 1417.718771][T19648] ? show_regs_print_info+0x12/0x12 [ 1417.731851][T19648] ? load_image+0x400/0x400 [ 1417.736407][T19648] ? __lock_acquire+0x7d10/0x7d10 [ 1417.741489][T19648] should_fail_ex+0x399/0x4d0 [ 1417.746242][T19648] _copy_from_user+0x2c/0x170 [ 1417.748844][T19651] netlink: 55 bytes leftover after parsing attributes in process `syz.3.4350'. [ 1417.750964][T19648] __copy_msghdr+0x3b7/0x580 [ 1417.764636][T19648] ___sys_sendmsg+0x210/0x360 [ 1417.769388][T19648] ? __sys_sendmsg+0x290/0x290 [ 1417.774236][T19648] ? __lock_acquire+0x7d10/0x7d10 [ 1417.779347][T19648] __se_sys_sendmsg+0x1bb/0x2a0 [ 1417.784269][T19648] ? __x64_sys_sendmsg+0x80/0x80 [ 1417.789282][T19648] ? lockdep_hardirqs_on+0x94/0x140 [ 1417.794620][T19648] do_syscall_64+0x4c/0xa0 [ 1417.799095][T19648] ? clear_bhb_loop+0x60/0xb0 [ 1417.803824][T19648] ? clear_bhb_loop+0x60/0xb0 [ 1417.808555][T19648] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1417.814499][T19648] RIP: 0033:0x7f626ed9c629 [ 1417.818966][T19648] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1417.838630][T19648] RSP: 002b:00007f626cff6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1417.847109][T19648] RAX: ffffffffffffffda RBX: 00007f626f015fa0 RCX: 00007f626ed9c629 [ 1417.855167][T19648] RDX: 0000000020000000 RSI: 0000200000002ec0 RDI: 0000000000000003 [ 1417.863214][T19648] RBP: 00007f626cff6090 R08: 0000000000000000 R09: 0000000000000000 [ 1417.871241][T19648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1417.879389][T19648] R13: 00007f626f016038 R14: 00007f626f015fa0 R15: 00007ffcd13ee2d8 [ 1417.887568][T19648] [ 1420.522131][T19702] netlink: 'syz.7.4369': attribute type 10 has an invalid length. [ 1421.416312][T19702] team0: Port device wlan1 added [ 1423.143234][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 1423.149748][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 1424.419540][T19752] netlink: 'syz.0.4385': attribute type 10 has an invalid length. [ 1428.424902][T19802] netlink: 'syz.8.4404': attribute type 10 has an invalid length. [ 1429.368386][T19802] team0: Port device wlan1 added [ 1430.174215][T19830] netlink: 132 bytes leftover after parsing attributes in process `syz.0.4411'. [ 1432.813868][T19880] netlink: 'syz.0.4432': attribute type 10 has an invalid length. [ 1435.063042][T19925] netlink: 'syz.3.4448': attribute type 10 has an invalid length. [ 1437.252403][T19974] FAULT_INJECTION: forcing a failure. [ 1437.252403][T19974] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1437.277289][T19974] CPU: 0 PID: 19974 Comm: syz.6.4467 Not tainted syzkaller #0 [ 1437.284842][T19974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1437.295041][T19974] Call Trace: [ 1437.298373][T19974] [ 1437.301355][T19974] dump_stack_lvl+0x188/0x24e [ 1437.306104][T19974] ? show_regs_print_info+0x12/0x12 [ 1437.311358][T19974] ? load_image+0x400/0x400 [ 1437.315917][T19974] ? __lock_acquire+0x7d10/0x7d10 [ 1437.321003][T19974] should_fail_ex+0x399/0x4d0 [ 1437.325758][T19974] _copy_from_user+0x2c/0x170 [ 1437.330503][T19974] __copy_msghdr+0x3b7/0x580 [ 1437.335164][T19974] ___sys_sendmsg+0x210/0x360 [ 1437.339908][T19974] ? __sys_sendmsg+0x290/0x290 [ 1437.344755][T19974] ? __lock_acquire+0x7d10/0x7d10 [ 1437.349886][T19974] __se_sys_sendmsg+0x1bb/0x2a0 [ 1437.354833][T19974] ? __x64_sys_sendmsg+0x80/0x80 [ 1437.359892][T19974] ? lockdep_hardirqs_on+0x94/0x140 [ 1437.365150][T19974] do_syscall_64+0x4c/0xa0 [ 1437.369625][T19974] ? clear_bhb_loop+0x60/0xb0 [ 1437.374356][T19974] ? clear_bhb_loop+0x60/0xb0 [ 1437.379091][T19974] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1437.385652][T19974] RIP: 0033:0x7f626ed9c629 [ 1437.390125][T19974] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1437.409787][T19974] RSP: 002b:00007f626cff6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1437.418270][T19974] RAX: ffffffffffffffda RBX: 00007f626f015fa0 RCX: 00007f626ed9c629 [ 1437.426297][T19974] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000003 [ 1437.434330][T19974] RBP: 00007f626cff6090 R08: 0000000000000000 R09: 0000000000000000 [ 1437.442359][T19974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1437.450559][T19974] R13: 00007f626f016038 R14: 00007f626f015fa0 R15: 00007ffcd13ee2d8 [ 1437.458603][T19974] [ 1438.398962][T19991] netlink: 180 bytes leftover after parsing attributes in process `syz.0.4473'. [ 1438.496520][T19993] netlink: 'syz.0.4473': attribute type 10 has an invalid length. [ 1438.658196][T19993] 8021q: adding VLAN 0 to HW filter on device team0 [ 1438.745222][T19993] bond0: (slave team0): Enslaving as an active interface with an up link [ 1439.855393][T20013] netlink: 'syz.7.4481': attribute type 7 has an invalid length. [ 1440.708896][T20028] netlink: 'syz.3.4486': attribute type 10 has an invalid length. [ 1442.061657][T20044] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4492'. [ 1444.235253][T20060] device syzkaller0 entered promiscuous mode [ 1447.726938][T20093] netlink: 'syz.8.4509': attribute type 3 has an invalid length. [ 1447.743223][T20093] netlink: 199836 bytes leftover after parsing attributes in process `syz.8.4509'. [ 1448.297790][T20110] FAULT_INJECTION: forcing a failure. [ 1448.297790][T20110] name failslab, interval 1, probability 0, space 0, times 0 [ 1448.372018][T20110] CPU: 0 PID: 20110 Comm: syz.0.4516 Not tainted syzkaller #0 [ 1448.379584][T20110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1448.389686][T20110] Call Trace: [ 1448.393016][T20110] [ 1448.395981][T20110] dump_stack_lvl+0x188/0x24e [ 1448.400721][T20110] ? show_regs_print_info+0x12/0x12 [ 1448.405982][T20110] ? load_image+0x400/0x400 [ 1448.410641][T20110] ? __might_sleep+0xd0/0xd0 [ 1448.415288][T20110] ? __lock_acquire+0x7d10/0x7d10 [ 1448.420505][T20110] should_fail_ex+0x399/0x4d0 [ 1448.425298][T20110] should_failslab+0x5/0x20 [ 1448.429868][T20110] slab_pre_alloc_hook+0x59/0x310 [ 1448.434931][T20110] kmem_cache_alloc_node+0x5a/0x320 [ 1448.440164][T20110] ? __alloc_skb+0xfc/0x7e0 [ 1448.444705][T20110] __alloc_skb+0xfc/0x7e0 [ 1448.449074][T20110] alloc_skb_with_frags+0xa7/0x710 [ 1448.454222][T20110] ? verify_lock_unused+0x140/0x140 [ 1448.459457][T20110] sock_alloc_send_pskb+0x87f/0x9a0 [ 1448.464702][T20110] ? sock_kzfree_s+0x50/0x50 [ 1448.469319][T20110] ? do_raw_spin_lock+0x128/0x2f0 [ 1448.474367][T20110] ? __rwlock_init+0x140/0x140 [ 1448.479161][T20110] ? do_raw_spin_unlock+0x11d/0x230 [ 1448.484391][T20110] unix_dgram_sendmsg+0x539/0x16e0 [ 1448.489535][T20110] ? is_dynamic_key+0x260/0x260 [ 1448.494420][T20110] ? aa_sk_perm+0x81f/0x950 [ 1448.498956][T20110] ? unix_dgram_poll+0x680/0x680 [ 1448.503935][T20110] ? tomoyo_socket_sendmsg_permission+0x1dd/0x2f0 [ 1448.510390][T20110] ? aa_sock_msg_perm+0x94/0x150 [ 1448.515356][T20110] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1448.520671][T20110] ? security_socket_sendmsg+0x7c/0xa0 [ 1448.526165][T20110] ? unix_dgram_poll+0x680/0x680 [ 1448.531133][T20110] ____sys_sendmsg+0x5be/0x970 [ 1448.535954][T20110] ? __sys_sendmsg_sock+0x30/0x30 [ 1448.541012][T20110] ? __import_iovec+0x315/0x500 [ 1448.545901][T20110] ? import_iovec+0x6f/0xa0 [ 1448.550439][T20110] ___sys_sendmsg+0x2a2/0x360 [ 1448.555155][T20110] ? __sys_sendmsg+0x290/0x290 [ 1448.559974][T20110] ? __lock_acquire+0x7d10/0x7d10 [ 1448.565056][T20110] __se_sys_sendmsg+0x1bb/0x2a0 [ 1448.569977][T20110] ? __x64_sys_sendmsg+0x80/0x80 [ 1448.575219][T20110] ? lockdep_hardirqs_on+0x94/0x140 [ 1448.580445][T20110] do_syscall_64+0x4c/0xa0 [ 1448.584899][T20110] ? clear_bhb_loop+0x60/0xb0 [ 1448.589610][T20110] ? clear_bhb_loop+0x60/0xb0 [ 1448.594317][T20110] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1448.600240][T20110] RIP: 0033:0x7f42f4b9c629 [ 1448.604679][T20110] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1448.624327][T20110] RSP: 002b:00007f42f5b3c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1448.632947][T20110] RAX: ffffffffffffffda RBX: 00007f42f4e15fa0 RCX: 00007f42f4b9c629 [ 1448.640945][T20110] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000006 [ 1448.648956][T20110] RBP: 00007f42f5b3c090 R08: 0000000000000000 R09: 0000000000000000 [ 1448.656950][T20110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1448.664949][T20110] R13: 00007f42f4e16038 R14: 00007f42f4e15fa0 R15: 00007ffeed9111c8 [ 1448.672963][T20110] [ 1453.277543][T20191] FAULT_INJECTION: forcing a failure. [ 1453.277543][T20191] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1453.327197][T20191] CPU: 1 PID: 20191 Comm: syz.3.4546 Not tainted syzkaller #0 [ 1453.334758][T20191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1453.344875][T20191] Call Trace: [ 1453.348211][T20191] [ 1453.351181][T20191] dump_stack_lvl+0x188/0x24e [ 1453.355916][T20191] ? show_regs_print_info+0x12/0x12 [ 1453.361176][T20191] ? load_image+0x400/0x400 [ 1453.365741][T20191] ? __lock_acquire+0x7d10/0x7d10 [ 1453.370830][T20191] ? __virt_addr_valid+0x188/0x540 [ 1453.375989][T20191] should_fail_ex+0x399/0x4d0 [ 1453.380712][T20191] _copy_from_user+0x2c/0x170 [ 1453.385423][T20191] sctp_setsockopt+0x19a/0xf90 [ 1453.390226][T20191] ? sock_common_recvmsg+0x190/0x190 [ 1453.395550][T20191] __sys_setsockopt+0x2bf/0x3d0 [ 1453.400436][T20191] __x64_sys_setsockopt+0xb1/0xc0 [ 1453.405505][T20191] do_syscall_64+0x4c/0xa0 [ 1453.409958][T20191] ? clear_bhb_loop+0x60/0xb0 [ 1453.414670][T20191] ? clear_bhb_loop+0x60/0xb0 [ 1453.419381][T20191] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1453.425304][T20191] RIP: 0033:0x7f98d4f9c629 [ 1453.429749][T20191] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1453.449396][T20191] RSP: 002b:00007f98d5f28028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1453.457873][T20191] RAX: ffffffffffffffda RBX: 00007f98d5216090 RCX: 00007f98d4f9c629 [ 1453.465933][T20191] RDX: 000000000000001f RSI: 0000000000000084 RDI: 0000000000000003 [ 1453.473943][T20191] RBP: 00007f98d5f28090 R08: 0000000000000120 R09: 0000000000000000 [ 1453.481948][T20191] R10: 0000200000000100 R11: 0000000000000246 R12: 0000000000000001 [ 1453.489970][T20191] R13: 00007f98d5216128 R14: 00007f98d5216090 R15: 00007fff9fddd108 [ 1453.498029][T20191] [ 1457.563553][T20218] netlink: 'syz.0.4555': attribute type 3 has an invalid length. [ 1457.632419][T20218] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.4555'. [ 1458.863276][T20242] tipc: Started in network mode [ 1458.868236][T20242] tipc: Node identity 9215a268, cluster identity 4711 [ 1458.881762][T20242] tipc: Node number set to 2450891368 [ 1459.607942][T20259] netlink: 'syz.7.4568': attribute type 27 has an invalid length. [ 1459.649276][T20259] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 1459.889596][T20268] netlink: 'syz.3.4571': attribute type 3 has an invalid length. [ 1459.897864][T20268] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.4571'. [ 1460.774936][T20289] netlink: 144 bytes leftover after parsing attributes in process `syz.7.4580'. [ 1461.003856][T20289] team0: Port device team_slave_0 removed [ 1461.016074][T20289] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 1463.686122][T20337] FAULT_INJECTION: forcing a failure. [ 1463.686122][T20337] name failslab, interval 1, probability 0, space 0, times 0 [ 1463.699344][T20337] CPU: 1 PID: 20337 Comm: syz.7.4595 Not tainted syzkaller #0 [ 1463.706851][T20337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1463.717027][T20337] Call Trace: [ 1463.720515][T20337] [ 1463.723477][T20337] dump_stack_lvl+0x188/0x24e [ 1463.728197][T20337] ? show_regs_print_info+0x12/0x12 [ 1463.733518][T20337] ? load_image+0x400/0x400 [ 1463.738065][T20337] should_fail_ex+0x399/0x4d0 [ 1463.742792][T20337] should_failslab+0x5/0x20 [ 1463.747343][T20337] slab_pre_alloc_hook+0x59/0x310 [ 1463.752404][T20337] kmem_cache_alloc+0x56/0x2f0 [ 1463.757199][T20337] ? sctp_get_port_local+0x6d7/0x1510 [ 1463.762615][T20337] sctp_get_port_local+0x6d7/0x1510 [ 1463.767868][T20337] ? sctp_do_bind+0x990/0x990 [ 1463.772579][T20337] ? sctp_bind_addr_match+0x2c/0x2a0 [ 1463.777910][T20337] sctp_do_bind+0x555/0x990 [ 1463.782454][T20337] sctp_connect_new_asoc+0x266/0x6a0 [ 1463.787777][T20337] ? __sctp_connect+0xd80/0xd80 [ 1463.792661][T20337] ? __local_bh_enable_ip+0x136/0x1c0 [ 1463.798100][T20337] ? bpf_lsm_sctp_bind_connect+0x5/0x10 [ 1463.803670][T20337] ? security_sctp_bind_connect+0x85/0xb0 [ 1463.809423][T20337] sctp_sendmsg+0x15b0/0x2940 [ 1463.814140][T20337] ? aa_sk_perm+0x811/0x950 [ 1463.818679][T20337] ? sctp_getsockopt+0x8a0/0x8a0 [ 1463.823655][T20337] ? __might_fault+0xa6/0x120 [ 1463.828359][T20337] ? aa_af_perm+0x340/0x340 [ 1463.832890][T20337] ? tomoyo_socket_sendmsg_permission+0x1dd/0x2f0 [ 1463.839340][T20337] ? inet_sendmsg+0xe5/0x2f0 [ 1463.843968][T20337] ? inet_send_prepare+0x260/0x260 [ 1463.849120][T20337] ____sys_sendmsg+0x5be/0x970 [ 1463.853928][T20337] ? __sys_sendmsg_sock+0x30/0x30 [ 1463.858988][T20337] ? __import_iovec+0x315/0x500 [ 1463.863874][T20337] ? import_iovec+0x6f/0xa0 [ 1463.868410][T20337] ___sys_sendmsg+0x2a2/0x360 [ 1463.873126][T20337] ? __sys_sendmsg+0x290/0x290 [ 1463.877936][T20337] ? __lock_acquire+0x7d10/0x7d10 [ 1463.883053][T20337] __se_sys_sendmsg+0x1bb/0x2a0 [ 1463.887949][T20337] ? __x64_sys_sendmsg+0x80/0x80 [ 1463.892928][T20337] ? lockdep_hardirqs_on+0x94/0x140 [ 1463.898165][T20337] do_syscall_64+0x4c/0xa0 [ 1463.902633][T20337] ? clear_bhb_loop+0x60/0xb0 [ 1463.907338][T20337] ? clear_bhb_loop+0x60/0xb0 [ 1463.912066][T20337] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1463.917996][T20337] RIP: 0033:0x7f7496f9c629 [ 1463.922463][T20337] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1463.942398][T20337] RSP: 002b:00007f7497ec9028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1463.950869][T20337] RAX: ffffffffffffffda RBX: 00007f7497216180 RCX: 00007f7496f9c629 [ 1463.958883][T20337] RDX: 0000000000040844 RSI: 00002000000000c0 RDI: 0000000000000009 [ 1463.966972][T20337] RBP: 00007f7497ec9090 R08: 0000000000000000 R09: 0000000000000000 [ 1463.975142][T20337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1463.983219][T20337] R13: 00007f7497216218 R14: 00007f7497216180 R15: 00007ffe0e142d28 [ 1463.991244][T20337] [ 1464.235968][T20340] netlink: 'syz.7.4597': attribute type 17 has an invalid length. [ 1464.265917][T20340] netlink: 'syz.7.4597': attribute type 41 has an invalid length. [ 1464.322019][T20340] netlink: 152 bytes leftover after parsing attributes in process `syz.7.4597'. [ 1464.479803][T20342] netlink: 144 bytes leftover after parsing attributes in process `syz.0.4598'. [ 1464.636908][T20342] team0: Port device team_slave_0 removed [ 1464.652413][T20342] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 1464.689274][T20348] netlink: 'syz.3.4601': attribute type 13 has an invalid length. [ 1464.708136][T20348] netlink: 152 bytes leftover after parsing attributes in process `syz.3.4601'. [ 1469.231613][T20386] FAULT_INJECTION: forcing a failure. [ 1469.231613][T20386] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1469.319340][T20386] CPU: 1 PID: 20386 Comm: syz.3.4614 Not tainted syzkaller #0 [ 1469.326916][T20386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1469.337055][T20386] Call Trace: [ 1469.340372][T20386] [ 1469.343339][T20386] dump_stack_lvl+0x188/0x24e [ 1469.348074][T20386] ? show_regs_print_info+0x12/0x12 [ 1469.353314][T20386] ? load_image+0x400/0x400 [ 1469.357879][T20386] ? __lock_acquire+0x7d10/0x7d10 [ 1469.362963][T20386] should_fail_ex+0x399/0x4d0 [ 1469.367716][T20386] _copy_from_user+0x2c/0x170 [ 1469.372451][T20386] __sys_bpf+0x2ea/0x780 [ 1469.376759][T20386] ? bpf_link_show_fdinfo+0x380/0x380 [ 1469.382214][T20386] ? lock_chain_count+0x20/0x20 [ 1469.387141][T20386] __x64_sys_bpf+0x78/0x90 [ 1469.391623][T20386] do_syscall_64+0x4c/0xa0 [ 1469.396098][T20386] ? clear_bhb_loop+0x60/0xb0 [ 1469.400835][T20386] ? clear_bhb_loop+0x60/0xb0 [ 1469.405573][T20386] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1469.411519][T20386] RIP: 0033:0x7f98d4f9c629 [ 1469.415992][T20386] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1469.435668][T20386] RSP: 002b:00007f98d5f49028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1469.444148][T20386] RAX: ffffffffffffffda RBX: 00007f98d5215fa0 RCX: 00007f98d4f9c629 [ 1469.452186][T20386] RDX: 0000000000000050 RSI: 0000200000000880 RDI: 0000000000000000 [ 1469.460222][T20386] RBP: 00007f98d5f49090 R08: 0000000000000000 R09: 0000000000000000 [ 1469.468342][T20386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1469.476370][T20386] R13: 00007f98d5216038 R14: 00007f98d5215fa0 R15: 00007fff9fddd108 [ 1469.484427][T20386] [ 1469.558634][T20384] netlink: 'syz.6.4612': attribute type 11 has an invalid length. [ 1473.205009][T20449] netlink: 'syz.7.4636': attribute type 11 has an invalid length. [ 1478.398219][T20504] netlink: 'syz.3.4653': attribute type 11 has an invalid length. [ 1481.953445][T20532] netlink: 87536 bytes leftover after parsing attributes in process `syz.3.4661'. [ 1484.573020][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 1484.579455][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 1486.254834][T20569] netlink: 'syz.6.4675': attribute type 2 has an invalid length. [ 1486.349014][T20569] netlink: 17267 bytes leftover after parsing attributes in process `syz.6.4675'. [ 1486.643784][ T4281] Bluetooth: hci4: command 0x0406 tx timeout [ 1490.887489][T20620] FAULT_INJECTION: forcing a failure. [ 1490.887489][T20620] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1490.972926][T20620] CPU: 1 PID: 20620 Comm: syz.6.4692 Not tainted syzkaller #0 [ 1490.980494][T20620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1490.990604][T20620] Call Trace: [ 1490.993929][T20620] [ 1490.996898][T20620] dump_stack_lvl+0x188/0x24e [ 1491.001642][T20620] ? show_regs_print_info+0x12/0x12 [ 1491.006897][T20620] ? load_image+0x400/0x400 [ 1491.011457][T20620] ? __lock_acquire+0x7d10/0x7d10 [ 1491.016562][T20620] ? snprintf+0xe5/0x140 [ 1491.021073][T20620] should_fail_ex+0x399/0x4d0 [ 1491.025815][T20620] _copy_to_user+0x2c/0x130 [ 1491.030364][T20620] simple_read_from_buffer+0xe3/0x150 [ 1491.035788][T20620] proc_fail_nth_read+0x1a6/0x220 [ 1491.040852][T20620] ? proc_fault_inject_write+0x310/0x310 [ 1491.046523][T20620] ? fsnotify_perm+0x248/0x550 [ 1491.051329][T20620] ? proc_fault_inject_write+0x310/0x310 [ 1491.057011][T20620] vfs_read+0x2de/0xa00 [ 1491.061239][T20620] ? kernel_read+0x1e0/0x1e0 [ 1491.065875][T20620] ? __fget_files+0x28/0x4b0 [ 1491.070498][T20620] ? __fget_files+0x28/0x4b0 [ 1491.075130][T20620] ? __fget_files+0x43d/0x4b0 [ 1491.079869][T20620] ? __fdget_pos+0x2ae/0x360 [ 1491.084540][T20620] ? ksys_read+0x71/0x250 [ 1491.088914][T20620] ksys_read+0x14c/0x250 [ 1491.093194][T20620] ? vfs_write+0xa30/0xa30 [ 1491.097653][T20620] ? lockdep_hardirqs_on+0x94/0x140 [ 1491.102887][T20620] do_syscall_64+0x4c/0xa0 [ 1491.107336][T20620] ? clear_bhb_loop+0x60/0xb0 [ 1491.112048][T20620] ? clear_bhb_loop+0x60/0xb0 [ 1491.116773][T20620] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1491.122807][T20620] RIP: 0033:0x7f626ed5cece [ 1491.127256][T20620] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1491.146900][T20620] RSP: 002b:00007f626cff5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1491.155350][T20620] RAX: ffffffffffffffda RBX: 00007f626cff66c0 RCX: 00007f626ed5cece [ 1491.163351][T20620] RDX: 000000000000000f RSI: 00007f626cff60a0 RDI: 0000000000000004 [ 1491.171376][T20620] RBP: 00007f626cff6090 R08: 0000000000000000 R09: 0000000000000000 [ 1491.179472][T20620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1491.187500][T20620] R13: 00007f626f016038 R14: 00007f626f015fa0 R15: 00007ffcd13ee2d8 [ 1491.195519][T20620] [ 1496.737846][T20664] netlink: 'syz.6.4706': attribute type 21 has an invalid length. [ 1496.937562][T20666] FAULT_INJECTION: forcing a failure. [ 1496.937562][T20666] name failslab, interval 1, probability 0, space 0, times 0 [ 1496.962712][T20666] CPU: 1 PID: 20666 Comm: syz.6.4707 Not tainted syzkaller #0 [ 1496.970269][T20666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1496.980375][T20666] Call Trace: [ 1496.983699][T20666] [ 1496.986666][T20666] dump_stack_lvl+0x188/0x24e [ 1496.991389][T20666] ? show_regs_print_info+0x12/0x12 [ 1496.996806][T20666] ? load_image+0x400/0x400 [ 1497.001345][T20666] ? __might_sleep+0xd0/0xd0 [ 1497.006052][T20666] ? __lock_acquire+0x7d10/0x7d10 [ 1497.011189][T20666] should_fail_ex+0x399/0x4d0 [ 1497.015938][T20666] should_failslab+0x5/0x20 [ 1497.020500][T20666] slab_pre_alloc_hook+0x59/0x310 [ 1497.025583][T20666] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 1497.031351][T20666] __kmem_cache_alloc_node+0x4f/0x260 [ 1497.036798][T20666] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 1497.042567][T20666] __kmalloc+0xa0/0x240 [ 1497.046770][T20666] tomoyo_realpath_from_path+0xdf/0x5d0 [ 1497.052360][T20666] ? tomoyo_path_number_perm+0x205/0x650 [ 1497.058023][T20666] tomoyo_path_number_perm+0x22f/0x650 [ 1497.063524][T20666] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 1497.069026][T20666] ? trace_call_bpf+0xbf/0x6b0 [ 1497.073834][T20666] ? trace_call_bpf+0xbf/0x6b0 [ 1497.078626][T20666] ? trace_call_bpf+0x5d6/0x6b0 [ 1497.083540][T20666] ? __fget_files+0x28/0x4b0 [ 1497.088168][T20666] ? __fget_files+0x28/0x4b0 [ 1497.092804][T20666] security_file_ioctl+0x6c/0xa0 [ 1497.097781][T20666] __se_sys_ioctl+0x48/0x170 [ 1497.102404][T20666] do_syscall_64+0x4c/0xa0 [ 1497.106855][T20666] ? clear_bhb_loop+0x60/0xb0 [ 1497.111561][T20666] ? clear_bhb_loop+0x60/0xb0 [ 1497.116267][T20666] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1497.122188][T20666] RIP: 0033:0x7f626ed9c629 [ 1497.126633][T20666] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1497.146274][T20666] RSP: 002b:00007f626cff6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1497.154715][T20666] RAX: ffffffffffffffda RBX: 00007f626f015fa0 RCX: 00007f626ed9c629 [ 1497.162716][T20666] RDX: 0000200000000100 RSI: 000000000000890b RDI: 0000000000000003 [ 1497.170712][T20666] RBP: 00007f626cff6090 R08: 0000000000000000 R09: 0000000000000000 [ 1497.178732][T20666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1497.186732][T20666] R13: 00007f626f016038 R14: 00007f626f015fa0 R15: 00007ffcd13ee2d8 [ 1497.194835][T20666] [ 1497.203746][T20666] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1506.212131][T20769] netlink: 48 bytes leftover after parsing attributes in process `syz.7.4741'. [ 1506.263585][T20769] netlink: 'syz.7.4741': attribute type 10 has an invalid length. [ 1506.278824][T20769] netlink: 40 bytes leftover after parsing attributes in process `syz.7.4741'. [ 1506.346483][T20769] batman_adv: batadv0: Adding interface: virt_wifi0 [ 1506.385647][T20769] batman_adv: batadv0: The MTU of interface virt_wifi0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1506.552956][T20769] batman_adv: batadv0: Interface activated: virt_wifi0 [ 1512.242813][ T4281] Bluetooth: hci0: command 0x0406 tx timeout [ 1515.875393][T20864] FAULT_INJECTION: forcing a failure. [ 1515.875393][T20864] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1515.897247][T20864] CPU: 0 PID: 20864 Comm: syz.6.4774 Not tainted syzkaller #0 [ 1515.904793][T20864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1515.914896][T20864] Call Trace: [ 1515.918229][T20864] [ 1515.921201][T20864] dump_stack_lvl+0x188/0x24e [ 1515.925946][T20864] ? show_regs_print_info+0x12/0x12 [ 1515.931210][T20864] ? load_image+0x400/0x400 [ 1515.935773][T20864] ? __lock_acquire+0x7d10/0x7d10 [ 1515.940854][T20864] ? snprintf+0xe5/0x140 [ 1515.945155][T20864] should_fail_ex+0x399/0x4d0 [ 1515.949898][T20864] _copy_to_user+0x2c/0x130 [ 1515.954467][T20864] simple_read_from_buffer+0xe3/0x150 [ 1515.959905][T20864] proc_fail_nth_read+0x1a6/0x220 [ 1515.964987][T20864] ? proc_fault_inject_write+0x310/0x310 [ 1515.970679][T20864] ? fsnotify_perm+0x248/0x550 [ 1515.975501][T20864] ? proc_fault_inject_write+0x310/0x310 [ 1515.981189][T20864] vfs_read+0x2de/0xa00 [ 1515.985407][T20864] ? kernel_read+0x1e0/0x1e0 [ 1515.990051][T20864] ? __fget_files+0x28/0x4b0 [ 1515.994695][T20864] ? __fget_files+0x28/0x4b0 [ 1515.999386][T20864] ? __fget_files+0x43d/0x4b0 [ 1516.004131][T20864] ? __fdget_pos+0x2ae/0x360 [ 1516.008772][T20864] ? ksys_read+0x71/0x250 [ 1516.013164][T20864] ksys_read+0x14c/0x250 [ 1516.017483][T20864] ? vfs_write+0xa30/0xa30 [ 1516.021962][T20864] ? lockdep_hardirqs_on+0x94/0x140 [ 1516.027218][T20864] do_syscall_64+0x4c/0xa0 [ 1516.031689][T20864] ? clear_bhb_loop+0x60/0xb0 [ 1516.036417][T20864] ? clear_bhb_loop+0x60/0xb0 [ 1516.041147][T20864] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1516.047094][T20864] RIP: 0033:0x7f626ed5cece [ 1516.051560][T20864] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1516.071232][T20864] RSP: 002b:00007f626cff5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1516.079736][T20864] RAX: ffffffffffffffda RBX: 00007f626cff66c0 RCX: 00007f626ed5cece [ 1516.087761][T20864] RDX: 000000000000000f RSI: 00007f626cff60a0 RDI: 0000000000000009 [ 1516.095888][T20864] RBP: 00007f626cff6090 R08: 0000000000000000 R09: 0000000000000000 [ 1516.103931][T20864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1516.111959][T20864] R13: 00007f626f016038 R14: 00007f626f015fa0 R15: 00007ffcd13ee2d8 [ 1516.120006][T20864] [ 1516.322321][T20866] netlink: 48 bytes leftover after parsing attributes in process `syz.6.4775'. [ 1516.345539][T20866] netlink: 'syz.6.4775': attribute type 10 has an invalid length. [ 1516.360379][T20866] netlink: 40 bytes leftover after parsing attributes in process `syz.6.4775'. [ 1516.435686][T20866] batman_adv: batadv0: Adding interface: virt_wifi0 [ 1516.450277][T20866] batman_adv: batadv0: The MTU of interface virt_wifi0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1516.492097][T20866] batman_adv: batadv0: Interface activated: virt_wifi0 [ 1517.896950][T20874] netlink: 'syz.7.4777': attribute type 7 has an invalid length. [ 1517.925298][T20874] netlink: 'syz.7.4777': attribute type 1 has an invalid length. [ 1517.955875][T20874] netlink: 'syz.7.4777': attribute type 1 has an invalid length. [ 1517.986175][T20874] netlink: 'syz.7.4777': attribute type 2 has an invalid length. [ 1518.022678][T20874] netlink: 'syz.7.4777': attribute type 14 has an invalid length. [ 1518.051206][T20874] netlink: 'syz.7.4777': attribute type 3 has an invalid length. [ 1518.103781][T20874] netlink: 'syz.7.4777': attribute type 4 has an invalid length. [ 1518.118898][T20874] netlink: 'syz.7.4777': attribute type 6 has an invalid length. [ 1518.140560][T20874] netlink: 'syz.7.4777': attribute type 7 has an invalid length. [ 1518.156829][T20874] netlink: 207236 bytes leftover after parsing attributes in process `syz.7.4777'. [ 1520.778493][T20906] netlink: 48 bytes leftover after parsing attributes in process `syz.3.4790'. [ 1520.799077][T20906] netlink: 40 bytes leftover after parsing attributes in process `syz.3.4790'. [ 1520.822444][T20906] batman_adv: batadv0: Adding interface: virt_wifi0 [ 1520.830526][T20906] batman_adv: batadv0: The MTU of interface virt_wifi0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1520.862353][T20906] batman_adv: batadv0: Interface activated: virt_wifi0 [ 1521.892898][T20930] netlink: 14556 bytes leftover after parsing attributes in process `syz.6.4798'. [ 1530.885329][T21011] validate_nla: 5 callbacks suppressed [ 1530.885353][T21011] netlink: 'syz.8.4827': attribute type 29 has an invalid length. [ 1530.963175][T21011] netlink: 'syz.8.4827': attribute type 29 has an invalid length. [ 1531.010867][T21012] netlink: 'syz.8.4827': attribute type 29 has an invalid length. [ 1531.382343][T21019] netlink: 'syz.0.4829': attribute type 29 has an invalid length. [ 1531.410210][T21019] netlink: 'syz.0.4829': attribute type 29 has an invalid length. [ 1531.433053][T21019] netlink: 'syz.0.4829': attribute type 29 has an invalid length. [ 1531.568949][T21023] netlink: 132 bytes leftover after parsing attributes in process `syz.6.4832'. [ 1535.435669][T21064] netlink: 61967 bytes leftover after parsing attributes in process `syz.6.4843'. [ 1537.117434][T21082] FAULT_INJECTION: forcing a failure. [ 1537.117434][T21082] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1537.165213][T21082] CPU: 0 PID: 21082 Comm: syz.6.4850 Not tainted syzkaller #0 [ 1537.172896][T21082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1537.183034][T21082] Call Trace: [ 1537.186384][T21082] [ 1537.189381][T21082] dump_stack_lvl+0x188/0x24e [ 1537.194171][T21082] ? show_regs_print_info+0x12/0x12 [ 1537.199480][T21082] ? load_image+0x400/0x400 [ 1537.204175][T21082] ? __lock_acquire+0x7d10/0x7d10 [ 1537.209419][T21082] should_fail_ex+0x399/0x4d0 [ 1537.214479][T21082] _copy_from_user+0x2c/0x170 [ 1537.219255][T21082] __sys_bpf+0x2ea/0x780 [ 1537.223678][T21082] ? bpf_link_show_fdinfo+0x380/0x380 [ 1537.229200][T21082] ? lock_chain_count+0x20/0x20 [ 1537.234203][T21082] __x64_sys_bpf+0x78/0x90 [ 1537.238713][T21082] do_syscall_64+0x4c/0xa0 [ 1537.243211][T21082] ? clear_bhb_loop+0x60/0xb0 [ 1537.248164][T21082] ? clear_bhb_loop+0x60/0xb0 [ 1537.252936][T21082] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1537.259003][T21082] RIP: 0033:0x7f626ed9c629 [ 1537.263511][T21082] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1537.283285][T21082] RSP: 002b:00007f626cff6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1537.291794][T21082] RAX: ffffffffffffffda RBX: 00007f626f015fa0 RCX: 00007f626ed9c629 [ 1537.299866][T21082] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 1537.307917][T21082] RBP: 00007f626cff6090 R08: 0000000000000000 R09: 0000000000000000 [ 1537.316044][T21082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1537.324101][T21082] R13: 00007f626f016038 R14: 00007f626f015fa0 R15: 00007ffcd13ee2d8 [ 1537.332294][T21082] [ 1540.283829][T21112] netlink: 'syz.0.4858': attribute type 10 has an invalid length. [ 1540.291764][T21112] netlink: 40 bytes leftover after parsing attributes in process `syz.0.4858'. [ 1540.450108][T21112] batman_adv: batadv0: Adding interface: virt_wifi0 [ 1540.498590][T21112] batman_adv: batadv0: The MTU of interface virt_wifi0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1540.673482][T21112] batman_adv: batadv0: Interface activated: virt_wifi0 [ 1544.775127][T21153] netlink: 132 bytes leftover after parsing attributes in process `syz.0.4874'. [ 1544.975428][T21163] FAULT_INJECTION: forcing a failure. [ 1544.975428][T21163] name failslab, interval 1, probability 0, space 0, times 0 [ 1545.032958][T21163] CPU: 1 PID: 21163 Comm: syz.6.4876 Not tainted syzkaller #0 [ 1545.040544][T21163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1545.050774][T21163] Call Trace: [ 1545.054224][T21163] [ 1545.057235][T21163] dump_stack_lvl+0x188/0x24e [ 1545.062020][T21163] ? show_regs_print_info+0x12/0x12 [ 1545.067328][T21163] ? load_image+0x400/0x400 [ 1545.072046][T21163] ? __might_sleep+0xd0/0xd0 [ 1545.076735][T21163] ? __lock_acquire+0x7d10/0x7d10 [ 1545.081891][T21163] should_fail_ex+0x399/0x4d0 [ 1545.086685][T21163] should_failslab+0x5/0x20 [ 1545.091378][T21163] slab_pre_alloc_hook+0x59/0x310 [ 1545.096521][T21163] kmem_cache_alloc_node+0x5a/0x320 [ 1545.101810][T21163] ? perf_event_alloc+0x154/0x21b0 [ 1545.107039][T21163] perf_event_alloc+0x154/0x21b0 [ 1545.112194][T21163] ? find_lively_task_by_vpid+0x19/0x290 [ 1545.117923][T21163] ? find_lively_task_by_vpid+0x19/0x290 [ 1545.123665][T21163] __se_sys_perf_event_open+0x6fd/0x1ec0 [ 1545.129397][T21163] ? __fget_files+0x43d/0x4b0 [ 1545.134195][T21163] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 1545.139991][T21163] ? lockdep_hardirqs_on+0x94/0x140 [ 1545.145449][T21163] ? __x64_sys_perf_event_open+0x1c/0xc0 [ 1545.151198][T21163] do_syscall_64+0x4c/0xa0 [ 1545.155698][T21163] ? clear_bhb_loop+0x60/0xb0 [ 1545.160456][T21163] ? clear_bhb_loop+0x60/0xb0 [ 1545.165216][T21163] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1545.171198][T21163] RIP: 0033:0x7f626ed9c629 [ 1545.175691][T21163] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1545.195398][T21163] RSP: 002b:00007f626cff6028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1545.203900][T21163] RAX: ffffffffffffffda RBX: 00007f626f015fa0 RCX: 00007f626ed9c629 [ 1545.211953][T21163] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000001480 [ 1545.220006][T21163] RBP: 00007f626cff6090 R08: 0000000000000000 R09: 0000000000000000 [ 1545.228060][T21163] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 1545.236201][T21163] R13: 00007f626f016038 R14: 00007f626f015fa0 R15: 00007ffcd13ee2d8 [ 1545.244292][T21163] [ 1546.007328][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 1546.013876][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 1549.409222][T21197] netlink: 132 bytes leftover after parsing attributes in process `syz.3.4888'. [ 1552.278166][T21225] FAULT_INJECTION: forcing a failure. [ 1552.278166][T21225] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1552.372661][T21225] CPU: 0 PID: 21225 Comm: syz.3.4897 Not tainted syzkaller #0 [ 1552.380238][T21225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1552.390368][T21225] Call Trace: [ 1552.393772][T21225] [ 1552.396781][T21225] dump_stack_lvl+0x188/0x24e [ 1552.401558][T21225] ? show_regs_print_info+0x12/0x12 [ 1552.406964][T21225] ? load_image+0x400/0x400 [ 1552.411563][T21225] ? __lock_acquire+0x7d10/0x7d10 [ 1552.416686][T21225] ? snprintf+0xe5/0x140 [ 1552.421018][T21225] should_fail_ex+0x399/0x4d0 [ 1552.425805][T21225] _copy_to_user+0x2c/0x130 [ 1552.430406][T21225] simple_read_from_buffer+0xe3/0x150 [ 1552.435929][T21225] proc_fail_nth_read+0x1a6/0x220 [ 1552.441079][T21225] ? proc_fault_inject_write+0x310/0x310 [ 1552.446811][T21225] ? fsnotify_perm+0x248/0x550 [ 1552.451660][T21225] ? proc_fault_inject_write+0x310/0x310 [ 1552.457389][T21225] vfs_read+0x2de/0xa00 [ 1552.461653][T21225] ? kernel_read+0x1e0/0x1e0 [ 1552.466348][T21225] ? __fget_files+0x28/0x4b0 [ 1552.471009][T21225] ? __fget_files+0x28/0x4b0 [ 1552.475715][T21225] ? __fget_files+0x43d/0x4b0 [ 1552.480485][T21225] ? __fdget_pos+0x2ae/0x360 [ 1552.485125][T21225] ? ksys_read+0x71/0x250 [ 1552.489520][T21225] ksys_read+0x14c/0x250 [ 1552.493860][T21225] ? vfs_write+0xa30/0xa30 [ 1552.498339][T21225] ? lockdep_hardirqs_on+0x94/0x140 [ 1552.503597][T21225] do_syscall_64+0x4c/0xa0 [ 1552.508065][T21225] ? clear_bhb_loop+0x60/0xb0 [ 1552.512800][T21225] ? clear_bhb_loop+0x60/0xb0 [ 1552.517547][T21225] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1552.523487][T21225] RIP: 0033:0x7f98d4f5cece [ 1552.528048][T21225] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1552.548314][T21225] RSP: 002b:00007f98d5f27fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1552.556784][T21225] RAX: ffffffffffffffda RBX: 00007f98d5f286c0 RCX: 00007f98d4f5cece [ 1552.564799][T21225] RDX: 000000000000000f RSI: 00007f98d5f280a0 RDI: 0000000000000005 [ 1552.572873][T21225] RBP: 00007f98d5f28090 R08: 0000000000000000 R09: 0000000000000000 [ 1552.580894][T21225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1552.588913][T21225] R13: 00007f98d5216128 R14: 00007f98d5216090 R15: 00007fff9fddd108 [ 1552.596976][T21225] [ 1553.014712][T21231] netlink: 'syz.6.4901': attribute type 10 has an invalid length. [ 1553.094378][T21231] netlink: 40 bytes leftover after parsing attributes in process `syz.6.4901'. [ 1559.106340][T21282] netlink: 'syz.3.4913': attribute type 10 has an invalid length. [ 1559.183038][T21282] netlink: 40 bytes leftover after parsing attributes in process `syz.3.4913'. [ 1562.245230][T21315] netlink: 'syz.0.4924': attribute type 10 has an invalid length. [ 1562.296847][T21315] netlink: 156 bytes leftover after parsing attributes in process `syz.0.4924'. [ 1563.348619][T21322] netlink: 'syz.6.4925': attribute type 10 has an invalid length. [ 1563.387954][T21322] netlink: 156 bytes leftover after parsing attributes in process `syz.6.4925'. [ 1576.340797][T21411] FAULT_INJECTION: forcing a failure. [ 1576.340797][T21411] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1576.365425][T21411] CPU: 0 PID: 21411 Comm: syz.7.4955 Not tainted syzkaller #0 [ 1576.372981][T21411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1576.383083][T21411] Call Trace: [ 1576.386433][T21411] [ 1576.389411][T21411] dump_stack_lvl+0x188/0x24e [ 1576.394149][T21411] ? show_regs_print_info+0x12/0x12 [ 1576.399400][T21411] ? load_image+0x400/0x400 [ 1576.403955][T21411] ? __lock_acquire+0x7d10/0x7d10 [ 1576.409123][T21411] should_fail_ex+0x399/0x4d0 [ 1576.413860][T21411] _copy_from_user+0x2c/0x170 [ 1576.418586][T21411] ___sys_sendmsg+0x1c3/0x360 [ 1576.423320][T21411] ? __sys_sendmsg+0x290/0x290 [ 1576.428163][T21411] ? __lock_acquire+0x7d10/0x7d10 [ 1576.433265][T21411] __se_sys_sendmsg+0x1bb/0x2a0 [ 1576.438175][T21411] ? __x64_sys_sendmsg+0x80/0x80 [ 1576.443180][T21411] ? lockdep_hardirqs_on+0x94/0x140 [ 1576.448434][T21411] do_syscall_64+0x4c/0xa0 [ 1576.452904][T21411] ? clear_bhb_loop+0x60/0xb0 [ 1576.457639][T21411] ? clear_bhb_loop+0x60/0xb0 [ 1576.462371][T21411] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1576.468313][T21411] RIP: 0033:0x7f7496f9c629 [ 1576.472779][T21411] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1576.492443][T21411] RSP: 002b:00007f7497f0b028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1576.500906][T21411] RAX: ffffffffffffffda RBX: 00007f7497215fa0 RCX: 00007f7496f9c629 [ 1576.508919][T21411] RDX: 0000000004040000 RSI: 0000200000004440 RDI: 0000000000000006 [ 1576.516935][T21411] RBP: 00007f7497f0b090 R08: 0000000000000000 R09: 0000000000000000 [ 1576.524951][T21411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1576.533054][T21411] R13: 00007f7497216038 R14: 00007f7497215fa0 R15: 00007ffe0e142d28 [ 1576.541126][T21411] [ 1578.292167][T21441] __sock_release: fasync list not empty! [ 1580.337276][T21468] FAULT_INJECTION: forcing a failure. [ 1580.337276][T21468] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1580.381494][T21468] CPU: 0 PID: 21468 Comm: syz.8.4976 Not tainted syzkaller #0 [ 1580.389324][T21468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1580.399521][T21468] Call Trace: [ 1580.402852][T21468] [ 1580.405930][T21468] dump_stack_lvl+0x188/0x24e [ 1580.410762][T21468] ? show_regs_print_info+0x12/0x12 [ 1580.416019][T21468] ? load_image+0x400/0x400 [ 1580.420777][T21468] ? __lock_acquire+0x7d10/0x7d10 [ 1580.425865][T21468] ? snprintf+0xe5/0x140 [ 1580.430163][T21468] should_fail_ex+0x399/0x4d0 [ 1580.434924][T21468] _copy_to_user+0x2c/0x130 [ 1580.439549][T21468] simple_read_from_buffer+0xe3/0x150 [ 1580.445243][T21468] proc_fail_nth_read+0x1a6/0x220 [ 1580.450370][T21468] ? proc_fault_inject_write+0x310/0x310 [ 1580.456069][T21468] ? fsnotify_perm+0x248/0x550 [ 1580.460898][T21468] ? proc_fault_inject_write+0x310/0x310 [ 1580.466596][T21468] vfs_read+0x2de/0xa00 [ 1580.470853][T21468] ? kernel_read+0x1e0/0x1e0 [ 1580.475518][T21468] ? __fget_files+0x28/0x4b0 [ 1580.480171][T21468] ? __fget_files+0x28/0x4b0 [ 1580.484827][T21468] ? __fget_files+0x43d/0x4b0 [ 1580.489564][T21468] ? __fdget_pos+0x2ae/0x360 [ 1580.494206][T21468] ? ksys_read+0x71/0x250 [ 1580.498772][T21468] ksys_read+0x14c/0x250 [ 1580.503181][T21468] ? vfs_write+0xa30/0xa30 [ 1580.507689][T21468] ? lockdep_hardirqs_on+0x94/0x140 [ 1580.513202][T21468] do_syscall_64+0x4c/0xa0 [ 1580.517671][T21468] ? clear_bhb_loop+0x60/0xb0 [ 1580.522443][T21468] ? clear_bhb_loop+0x60/0xb0 [ 1580.527196][T21468] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1580.533154][T21468] RIP: 0033:0x7fca9c35cece [ 1580.537632][T21468] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1580.557791][T21468] RSP: 002b:00007fca9d237fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1580.566267][T21468] RAX: ffffffffffffffda RBX: 00007fca9d2386c0 RCX: 00007fca9c35cece [ 1580.574297][T21468] RDX: 000000000000000f RSI: 00007fca9d2380a0 RDI: 0000000000000004 [ 1580.582326][T21468] RBP: 00007fca9d238090 R08: 0000000000000000 R09: 0000000000000000 [ 1580.590347][T21468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1580.598363][T21468] R13: 00007fca9c616038 R14: 00007fca9c615fa0 R15: 00007fffacc671f8 [ 1580.606397][T21468] [ 1581.035752][T21480] netlink: 'syz.8.4980': attribute type 5 has an invalid length. [ 1581.061621][T21480] netlink: 176 bytes leftover after parsing attributes in process `syz.8.4980'. [ 1585.070141][T21522] netlink: 'syz.7.4994': attribute type 27 has an invalid length. [ 1586.600934][T21522] bond0: (slave bond_slave_0): Releasing backup interface [ 1589.190273][T21566] FAULT_INJECTION: forcing a failure. [ 1589.190273][T21566] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1589.232012][T21567] netlink: 'syz.3.5012': attribute type 10 has an invalid length. [ 1589.248039][T21566] CPU: 1 PID: 21566 Comm: syz.0.5011 Not tainted syzkaller #0 [ 1589.255587][T21566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1589.265698][T21566] Call Trace: [ 1589.269067][T21566] [ 1589.272037][T21566] dump_stack_lvl+0x188/0x24e [ 1589.276773][T21566] ? show_regs_print_info+0x12/0x12 [ 1589.282028][T21566] ? load_image+0x400/0x400 [ 1589.286591][T21566] ? __lock_acquire+0x7d10/0x7d10 [ 1589.291681][T21566] should_fail_ex+0x399/0x4d0 [ 1589.296430][T21566] _copy_from_user+0x2c/0x170 [ 1589.301167][T21566] __copy_msghdr+0x3b7/0x580 [ 1589.305861][T21566] ___sys_sendmsg+0x210/0x360 [ 1589.310606][T21566] ? __sys_sendmsg+0x290/0x290 [ 1589.315450][T21566] ? __lock_acquire+0x7d10/0x7d10 [ 1589.320566][T21566] __se_sys_sendmsg+0x1bb/0x2a0 [ 1589.325487][T21566] ? __x64_sys_sendmsg+0x80/0x80 [ 1589.330681][T21566] ? lockdep_hardirqs_on+0x94/0x140 [ 1589.335941][T21566] do_syscall_64+0x4c/0xa0 [ 1589.340419][T21566] ? clear_bhb_loop+0x60/0xb0 [ 1589.345150][T21566] ? clear_bhb_loop+0x60/0xb0 [ 1589.349929][T21566] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1589.355884][T21566] RIP: 0033:0x7f42f4b9c629 [ 1589.360365][T21566] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1589.380037][T21566] RSP: 002b:00007f42f5b3c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1589.388541][T21566] RAX: ffffffffffffffda RBX: 00007f42f4e15fa0 RCX: 00007f42f4b9c629 [ 1589.396549][T21566] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000003 [ 1589.404571][T21566] RBP: 00007f42f5b3c090 R08: 0000000000000000 R09: 0000000000000000 [ 1589.412572][T21566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1589.420590][T21566] R13: 00007f42f4e16038 R14: 00007f42f4e15fa0 R15: 00007ffeed9111c8 [ 1589.428651][T21566] [ 1589.463410][T21567] netlink: 40 bytes leftover after parsing attributes in process `syz.3.5012'. [ 1589.491975][T21567] device ipvlan1 entered promiscuous mode [ 1589.544872][T21567] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 1589.615597][T21569] netlink: 10 bytes leftover after parsing attributes in process `syz.3.5012'. [ 1593.122879][T21601] netlink: 'syz.7.5024': attribute type 10 has an invalid length. [ 1593.132473][T21601] netlink: 40 bytes leftover after parsing attributes in process `syz.7.5024'. [ 1595.018479][T21640] netlink: 'syz.8.5036': attribute type 3 has an invalid length. [ 1595.042807][T21640] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.5036'. [ 1596.848639][T21661] FAULT_INJECTION: forcing a failure. [ 1596.848639][T21661] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1596.902700][T21661] CPU: 0 PID: 21661 Comm: syz.7.5043 Not tainted syzkaller #0 [ 1596.910259][T21661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1596.920441][T21661] Call Trace: [ 1596.923763][T21661] [ 1596.926731][T21661] dump_stack_lvl+0x188/0x24e [ 1596.931476][T21661] ? show_regs_print_info+0x12/0x12 [ 1596.936730][T21661] ? load_image+0x400/0x400 [ 1596.941287][T21661] ? __lock_acquire+0x7d10/0x7d10 [ 1596.946373][T21661] ? snprintf+0xe5/0x140 [ 1596.950668][T21661] should_fail_ex+0x399/0x4d0 [ 1596.955422][T21661] _copy_to_user+0x2c/0x130 [ 1596.959977][T21661] simple_read_from_buffer+0xe3/0x150 [ 1596.965413][T21661] proc_fail_nth_read+0x1a6/0x220 [ 1596.970484][T21661] ? proc_fault_inject_write+0x310/0x310 [ 1596.976167][T21661] ? fsnotify_perm+0x248/0x550 [ 1596.980983][T21661] ? proc_fault_inject_write+0x310/0x310 [ 1596.986661][T21661] vfs_read+0x2de/0xa00 [ 1596.990975][T21661] ? kernel_read+0x1e0/0x1e0 [ 1596.995701][T21661] ? __fget_files+0x28/0x4b0 [ 1597.000357][T21661] ? __fget_files+0x28/0x4b0 [ 1597.004998][T21661] ? __fget_files+0x43d/0x4b0 [ 1597.009735][T21661] ? __fdget_pos+0x2ae/0x360 [ 1597.014463][T21661] ? ksys_read+0x71/0x250 [ 1597.018849][T21661] ksys_read+0x14c/0x250 [ 1597.023146][T21661] ? vfs_write+0xa30/0xa30 [ 1597.027622][T21661] ? lockdep_hardirqs_on+0x94/0x140 [ 1597.032865][T21661] do_syscall_64+0x4c/0xa0 [ 1597.037354][T21661] ? clear_bhb_loop+0x60/0xb0 [ 1597.042106][T21661] ? clear_bhb_loop+0x60/0xb0 [ 1597.046845][T21661] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1597.052805][T21661] RIP: 0033:0x7f7496f5cece [ 1597.057270][T21661] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1597.077075][T21661] RSP: 002b:00007f7497f0afe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1597.085536][T21661] RAX: ffffffffffffffda RBX: 00007f7497f0b6c0 RCX: 00007f7496f5cece [ 1597.093558][T21661] RDX: 000000000000000f RSI: 00007f7497f0b0a0 RDI: 0000000000000004 [ 1597.101591][T21661] RBP: 00007f7497f0b090 R08: 0000000000000000 R09: 0000000000000000 [ 1597.109618][T21661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1597.117645][T21661] R13: 00007f7497216038 R14: 00007f7497215fa0 R15: 00007ffe0e142d28 [ 1597.125697][T21661] [ 1599.395633][T21685] FAULT_INJECTION: forcing a failure. [ 1599.395633][T21685] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1599.465236][T21685] CPU: 1 PID: 21685 Comm: syz.0.5051 Not tainted syzkaller #0 [ 1599.472801][T21685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1599.482915][T21685] Call Trace: [ 1599.486234][T21685] [ 1599.489219][T21685] dump_stack_lvl+0x188/0x24e [ 1599.493956][T21685] ? show_regs_print_info+0x12/0x12 [ 1599.499212][T21685] ? load_image+0x400/0x400 [ 1599.503784][T21685] ? __lock_acquire+0x7d10/0x7d10 [ 1599.508870][T21685] should_fail_ex+0x399/0x4d0 [ 1599.513582][T21685] _copy_from_user+0x2c/0x170 [ 1599.518287][T21685] iovec_from_user+0x143/0x360 [ 1599.523090][T21685] __import_iovec+0x6d/0x500 [ 1599.527754][T21685] import_iovec+0x6f/0xa0 [ 1599.532138][T21685] ___sys_sendmsg+0x252/0x360 [ 1599.536948][T21685] ? __sys_sendmsg+0x290/0x290 [ 1599.541796][T21685] ? __lock_acquire+0x7d10/0x7d10 [ 1599.546908][T21685] __se_sys_sendmsg+0x1bb/0x2a0 [ 1599.551861][T21685] ? __x64_sys_sendmsg+0x80/0x80 [ 1599.556880][T21685] ? lockdep_hardirqs_on+0x94/0x140 [ 1599.562134][T21685] do_syscall_64+0x4c/0xa0 [ 1599.566580][T21685] ? clear_bhb_loop+0x60/0xb0 [ 1599.571539][T21685] ? clear_bhb_loop+0x60/0xb0 [ 1599.576350][T21685] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1599.582305][T21685] RIP: 0033:0x7f42f4b9c629 [ 1599.586773][T21685] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1599.606447][T21685] RSP: 002b:00007f42f5b3c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1599.614961][T21685] RAX: ffffffffffffffda RBX: 00007f42f4e15fa0 RCX: 00007f42f4b9c629 [ 1599.622993][T21685] RDX: 0000000000000000 RSI: 00002000000002c0 RDI: 0000000000000003 [ 1599.631013][T21685] RBP: 00007f42f5b3c090 R08: 0000000000000000 R09: 0000000000000000 [ 1599.639035][T21685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1599.647061][T21685] R13: 00007f42f4e16038 R14: 00007f42f4e15fa0 R15: 00007ffeed9111c8 [ 1599.655104][T21685] [ 1604.137174][T21727] FAULT_INJECTION: forcing a failure. [ 1604.137174][T21727] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1604.245154][T21727] CPU: 1 PID: 21727 Comm: syz.0.5064 Not tainted syzkaller #0 [ 1604.252707][T21727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1604.262836][T21727] Call Trace: [ 1604.266170][T21727] [ 1604.269143][T21727] dump_stack_lvl+0x188/0x24e [ 1604.273885][T21727] ? show_regs_print_info+0x12/0x12 [ 1604.279146][T21727] ? load_image+0x400/0x400 [ 1604.283745][T21727] ? __lock_acquire+0x7d10/0x7d10 [ 1604.288834][T21727] ? __fget_files+0x28/0x4b0 [ 1604.293488][T21727] should_fail_ex+0x399/0x4d0 [ 1604.298232][T21727] _copy_from_user+0x2c/0x170 [ 1604.302968][T21727] netlink_setsockopt+0x18f/0x710 [ 1604.308056][T21727] ? aa_af_perm+0x340/0x340 [ 1604.312615][T21727] ? netlink_ioctl+0x10/0x10 [ 1604.317257][T21727] ? aa_sock_opt_perm+0x74/0x100 [ 1604.322244][T21727] ? bpf_lsm_socket_setsockopt+0x5/0x10 [ 1604.327826][T21727] ? security_socket_setsockopt+0x7a/0xa0 [ 1604.333583][T21727] ? netlink_ioctl+0x10/0x10 [ 1604.338214][T21727] __sys_setsockopt+0x2bf/0x3d0 [ 1604.343110][T21727] __x64_sys_setsockopt+0xb1/0xc0 [ 1604.348178][T21727] do_syscall_64+0x4c/0xa0 [ 1604.352632][T21727] ? clear_bhb_loop+0x60/0xb0 [ 1604.357348][T21727] ? clear_bhb_loop+0x60/0xb0 [ 1604.362055][T21727] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1604.367978][T21727] RIP: 0033:0x7f42f4b9c629 [ 1604.372429][T21727] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1604.392063][T21727] RSP: 002b:00007f42f5b3c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1604.400507][T21727] RAX: ffffffffffffffda RBX: 00007f42f4e15fa0 RCX: 00007f42f4b9c629 [ 1604.408507][T21727] RDX: 0000000000000002 RSI: 000000000000010e RDI: 0000000000000003 [ 1604.416507][T21727] RBP: 00007f42f5b3c090 R08: 0000000000000004 R09: 0000000000000000 [ 1604.424514][T21727] R10: 0000200000000300 R11: 0000000000000246 R12: 0000000000000001 [ 1604.432512][T21727] R13: 00007f42f4e16038 R14: 00007f42f4e15fa0 R15: 00007ffeed9111c8 [ 1604.440531][T21727] [ 1604.797400][T21735] netlink: 'syz.6.5067': attribute type 21 has an invalid length. [ 1604.820519][T21735] netlink: 14548 bytes leftover after parsing attributes in process `syz.6.5067'. [ 1605.933202][T21759] FAULT_INJECTION: forcing a failure. [ 1605.933202][T21759] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1606.069923][T21759] CPU: 0 PID: 21759 Comm: syz.0.5078 Not tainted syzkaller #0 [ 1606.077484][T21759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1606.087596][T21759] Call Trace: [ 1606.090944][T21759] [ 1606.093917][T21759] dump_stack_lvl+0x188/0x24e [ 1606.098656][T21759] ? show_regs_print_info+0x12/0x12 [ 1606.103911][T21759] ? load_image+0x400/0x400 [ 1606.108550][T21759] ? __lock_acquire+0x7d10/0x7d10 [ 1606.113643][T21759] should_fail_ex+0x399/0x4d0 [ 1606.118444][T21759] _copy_from_user+0x2c/0x170 [ 1606.123185][T21759] __sys_bpf+0x2ea/0x780 [ 1606.127489][T21759] ? bpf_link_show_fdinfo+0x380/0x380 [ 1606.132944][T21759] ? lock_chain_count+0x20/0x20 [ 1606.137874][T21759] __x64_sys_bpf+0x78/0x90 [ 1606.142433][T21759] do_syscall_64+0x4c/0xa0 [ 1606.146906][T21759] ? clear_bhb_loop+0x60/0xb0 [ 1606.151634][T21759] ? clear_bhb_loop+0x60/0xb0 [ 1606.156371][T21759] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1606.162320][T21759] RIP: 0033:0x7f42f4b9c629 [ 1606.166784][T21759] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1606.186502][T21759] RSP: 002b:00007f42f5b3c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1606.194973][T21759] RAX: ffffffffffffffda RBX: 00007f42f4e15fa0 RCX: 00007f42f4b9c629 [ 1606.202999][T21759] RDX: 0000000000000010 RSI: 0000200000000640 RDI: 000000000000000f [ 1606.211021][T21759] RBP: 00007f42f5b3c090 R08: 0000000000000000 R09: 0000000000000000 [ 1606.219043][T21759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1606.227072][T21759] R13: 00007f42f4e16038 R14: 00007f42f4e15fa0 R15: 00007ffeed9111c8 [ 1606.235109][T21759] [ 1607.446352][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 1607.452954][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 1625.253410][T21952] netlink: 'syz.8.5142': attribute type 10 has an invalid length. [ 1625.268019][T21952] netlink: 2 bytes leftover after parsing attributes in process `syz.8.5142'. [ 1625.288780][T21952] device bond0 entered promiscuous mode [ 1625.309958][T21952] device bond_slave_0 entered promiscuous mode [ 1625.324694][T21952] device bond_slave_1 entered promiscuous mode [ 1625.357393][T21952] bridge0: port 3(bond0) entered blocking state [ 1625.370665][T21952] bridge0: port 3(bond0) entered disabled state [ 1625.409223][T21952] bridge0: port 3(bond0) entered blocking state [ 1625.415740][T21952] bridge0: port 3(bond0) entered forwarding state [ 1625.660610][T21959] netlink: 'syz.0.5145': attribute type 3 has an invalid length. [ 1625.699830][T21959] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.5145'. [ 1635.707064][T22046] netlink: 'syz.7.5176': attribute type 3 has an invalid length. [ 1635.785007][T22046] netlink: 199836 bytes leftover after parsing attributes in process `syz.7.5176'. [ 1646.794064][T22120] netlink: 20 bytes leftover after parsing attributes in process `syz.6.5205'. [ 1648.939204][T22150] netlink: 'syz.6.5215': attribute type 2 has an invalid length. [ 1648.988726][T22150] netlink: 10 bytes leftover after parsing attributes in process `syz.6.5215'. [ 1653.268653][T22181] FAULT_INJECTION: forcing a failure. [ 1653.268653][T22181] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1653.332924][T22181] CPU: 0 PID: 22181 Comm: syz.0.5223 Not tainted syzkaller #0 [ 1653.340468][T22181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1653.350606][T22181] Call Trace: [ 1653.353924][T22181] [ 1653.356883][T22181] dump_stack_lvl+0x188/0x24e [ 1653.361615][T22181] ? show_regs_print_info+0x12/0x12 [ 1653.366976][T22181] ? load_image+0x400/0x400 [ 1653.371528][T22181] ? __lock_acquire+0x7d10/0x7d10 [ 1653.376605][T22181] should_fail_ex+0x399/0x4d0 [ 1653.381333][T22181] _copy_from_user+0x2c/0x170 [ 1653.386057][T22181] ip6_tnl_siocdevprivate+0x3a9/0xaf0 [ 1653.391470][T22181] ? ip6_tnl_start_xmit+0x1200/0x1200 [ 1653.396887][T22181] ? trace_raw_output_contention_end+0xd0/0xd0 [ 1653.403084][T22181] ? full_name_hash+0x8e/0xe0 [ 1653.407801][T22181] dev_ifsioc+0xa4a/0xd40 [ 1653.412163][T22181] ? dev_ioctl+0xe80/0xe80 [ 1653.416608][T22181] ? __lock_acquire+0x7d10/0x7d10 [ 1653.421673][T22181] ? full_name_hash+0x8e/0xe0 [ 1653.426374][T22181] ? dev_load+0x1d/0x1e0 [ 1653.430643][T22181] ? dev_load+0x1d/0x1e0 [ 1653.434915][T22181] dev_ioctl+0x5f8/0xe80 [ 1653.439193][T22181] ? get_user_ifreq+0xc7/0x170 [ 1653.444003][T22181] sock_ioctl+0x691/0x710 [ 1653.448370][T22181] ? sock_poll+0x410/0x410 [ 1653.452826][T22181] ? bpf_lsm_file_ioctl+0x5/0x10 [ 1653.457805][T22181] ? security_file_ioctl+0x7c/0xa0 [ 1653.462946][T22181] ? sock_poll+0x410/0x410 [ 1653.467399][T22181] __se_sys_ioctl+0xfa/0x170 [ 1653.472025][T22181] do_syscall_64+0x4c/0xa0 [ 1653.476480][T22181] ? clear_bhb_loop+0x60/0xb0 [ 1653.481187][T22181] ? clear_bhb_loop+0x60/0xb0 [ 1653.485897][T22181] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1653.491825][T22181] RIP: 0033:0x7f42f4b9c629 [ 1653.496274][T22181] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1653.515909][T22181] RSP: 002b:00007f42f5b3c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1653.524357][T22181] RAX: ffffffffffffffda RBX: 00007f42f4e15fa0 RCX: 00007f42f4b9c629 [ 1653.532370][T22181] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000007 [ 1653.540371][T22181] RBP: 00007f42f5b3c090 R08: 0000000000000000 R09: 0000000000000000 [ 1653.548364][T22181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1653.556358][T22181] R13: 00007f42f4e16038 R14: 00007f42f4e15fa0 R15: 00007ffeed9111c8 [ 1653.564373][T22181] [ 1653.607114][T22185] FAULT_INJECTION: forcing a failure. [ 1653.607114][T22185] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1653.626812][T22185] CPU: 1 PID: 22185 Comm: syz.8.5226 Not tainted syzkaller #0 [ 1653.634347][T22185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1653.644448][T22185] Call Trace: [ 1653.647772][T22185] [ 1653.650740][T22185] dump_stack_lvl+0x188/0x24e [ 1653.655477][T22185] ? show_regs_print_info+0x12/0x12 [ 1653.660737][T22185] ? load_image+0x400/0x400 [ 1653.665289][T22185] ? __lock_acquire+0x7d10/0x7d10 [ 1653.670371][T22185] should_fail_ex+0x399/0x4d0 [ 1653.675553][T22185] _copy_from_user+0x2c/0x170 [ 1653.680288][T22185] iovec_from_user+0x143/0x360 [ 1653.685100][T22185] __import_iovec+0x6d/0x500 [ 1653.689745][T22185] import_iovec+0x6f/0xa0 [ 1653.694129][T22185] ___sys_sendmsg+0x252/0x360 [ 1653.698878][T22185] ? __sys_sendmsg+0x290/0x290 [ 1653.703788][T22185] ? __lock_acquire+0x7d10/0x7d10 [ 1653.708886][T22185] __se_sys_sendmsg+0x1bb/0x2a0 [ 1653.713918][T22185] ? __x64_sys_sendmsg+0x80/0x80 [ 1653.718958][T22185] ? lockdep_hardirqs_on+0x94/0x140 [ 1653.724214][T22185] do_syscall_64+0x4c/0xa0 [ 1653.728776][T22185] ? clear_bhb_loop+0x60/0xb0 [ 1653.733592][T22185] ? clear_bhb_loop+0x60/0xb0 [ 1653.738324][T22185] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1653.744277][T22185] RIP: 0033:0x7fca9c39c629 [ 1653.748746][T22185] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1653.768409][T22185] RSP: 002b:00007fca9d238028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1653.776884][T22185] RAX: ffffffffffffffda RBX: 00007fca9c615fa0 RCX: 00007fca9c39c629 [ 1653.784910][T22185] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 1653.792942][T22185] RBP: 00007fca9d238090 R08: 0000000000000000 R09: 0000000000000000 [ 1653.800967][T22185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1653.808975][T22185] R13: 00007fca9c616038 R14: 00007fca9c615fa0 R15: 00007fffacc671f8 [ 1653.809012][T22185] [ 1656.780016][T22232] netlink: 'syz.0.5241': attribute type 10 has an invalid length. [ 1658.569117][T22232] device veth0_macvtap left promiscuous mode [ 1663.726714][T22284] netlink: 60 bytes leftover after parsing attributes in process `syz.0.5257'. [ 1663.752663][T22284] netlink: 60 bytes leftover after parsing attributes in process `syz.0.5257'. [ 1668.901941][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 1668.908418][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 1674.240313][T22385] mac80211_hwsim hwsim28 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1706.421180][T22726] netlink: 'syz.3.5405': attribute type 21 has an invalid length. [ 1706.480424][T22726] netlink: 132 bytes leftover after parsing attributes in process `syz.3.5405'. [ 1706.626187][T22729] netlink: 'syz.3.5405': attribute type 3 has an invalid length. [ 1706.732965][T22729] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.5405'. [ 1711.341834][T22767] netlink: 'syz.0.5421': attribute type 21 has an invalid length. [ 1711.428005][T22768] netlink: 'syz.0.5421': attribute type 3 has an invalid length. [ 1711.481234][T22768] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.5421'. [ 1711.536213][T22767] netlink: 132 bytes leftover after parsing attributes in process `syz.0.5421'. [ 1716.398578][T22805] netlink: 'syz.8.5436': attribute type 21 has an invalid length. [ 1716.449561][T22805] netlink: 132 bytes leftover after parsing attributes in process `syz.8.5436'. [ 1716.810743][T22812] netlink: 'syz.8.5436': attribute type 3 has an invalid length. [ 1716.847127][T22812] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.5436'. [ 1721.821657][T22844] netlink: 'syz.7.5448': attribute type 21 has an invalid length. [ 1721.841624][T22844] netlink: 132 bytes leftover after parsing attributes in process `syz.7.5448'. [ 1722.248438][T22844] netlink: 'syz.7.5448': attribute type 3 has an invalid length. [ 1722.323392][T22844] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.5448'. [ 1730.349331][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 1730.355957][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 1774.215815][T23394] device syzkaller0 entered promiscuous mode [ 1791.878822][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 1791.885474][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 1799.309958][T23658] netlink: 'syz.8.5719': attribute type 1 has an invalid length. [ 1799.332707][T23658] netlink: 112860 bytes leftover after parsing attributes in process `syz.8.5719'. [ 1799.351172][T23658] netlink: 'syz.8.5719': attribute type 10 has an invalid length. [ 1799.362253][T23658] device veth0_macvtap left promiscuous mode [ 1810.513184][T23777] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 1810.524101][T23777] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 1810.539308][T23777] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 1810.548863][T23777] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 1810.558048][T23777] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 1810.565638][T23777] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 1810.689292][T13107] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1811.015247][T13107] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1811.232154][T13107] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1811.376668][T13107] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1811.808132][T13107] device 0 left promiscuous mode [ 1811.939128][T23775] chnl_net:caif_netlink_parms(): no params data found [ 1812.642767][ T4282] Bluetooth: hci3: command 0x0409 tx timeout [ 1812.950477][T23775] bridge0: port 1(bridge_slave_0) entered blocking state [ 1813.027511][T23775] bridge0: port 1(bridge_slave_0) entered disabled state [ 1813.054434][T23775] device bridge_slave_0 entered promiscuous mode [ 1813.242943][T23775] bridge0: port 2(bridge_slave_1) entered blocking state [ 1813.250245][T23775] bridge0: port 2(bridge_slave_1) entered disabled state [ 1813.329975][T23775] device bridge_slave_1 entered promiscuous mode [ 1813.603676][T23775] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1814.390978][T23775] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1814.677732][T23775] team0: Port device team_slave_0 added [ 1814.728190][T23775] team0: Port device team_slave_1 added [ 1814.733866][ T4282] Bluetooth: hci3: command 0x041b tx timeout [ 1815.037657][T23775] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1815.058109][T23775] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1815.202951][T23775] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1815.302296][T23775] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1815.338953][T23775] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1815.523525][T23775] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1815.704744][T23775] device hsr_slave_0 entered promiscuous mode [ 1815.720905][T23775] device hsr_slave_1 entered promiscuous mode [ 1816.802685][T23777] Bluetooth: hci3: command 0x040f tx timeout [ 1817.959031][T23775] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1817.990520][T23775] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1818.033031][T23775] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1818.882657][T23777] Bluetooth: hci3: command 0x0419 tx timeout [ 1819.000928][T23875] netlink: 'syz.0.5784': attribute type 1 has an invalid length. [ 1819.046706][T23875] netlink: 112860 bytes leftover after parsing attributes in process `syz.0.5784'. [ 1819.170129][T23775] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1819.241727][T23875] netlink: 'syz.0.5784': attribute type 10 has an invalid length. [ 1820.181969][T23775] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1820.289828][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1820.300843][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1820.354412][T23775] 8021q: adding VLAN 0 to HW filter on device team0 [ 1820.419261][T18905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1820.462904][T18905] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1820.500697][T18905] bridge0: port 1(bridge_slave_0) entered blocking state [ 1820.507932][T18905] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1820.589330][T18905] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1820.641424][T18905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1820.681438][T18905] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1820.766543][T18905] bridge0: port 2(bridge_slave_1) entered blocking state [ 1820.773779][T18905] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1820.878458][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1820.963971][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1821.080235][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1821.099492][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1821.139330][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1821.187395][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1821.275439][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1821.307552][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1821.351251][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1821.373784][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1821.403473][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1821.437337][T23775] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1822.066615][T13107] team0: Port device wlan1 removed [ 1822.757114][T13107] device hsr_slave_0 left promiscuous mode [ 1822.861133][T13107] device hsr_slave_1 left promiscuous mode [ 1822.881591][T13107] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1822.932699][T13107] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1822.967038][T13107] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1823.002633][T13107] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1823.063413][T13107] batman_adv: batadv0: Interface deactivated: virt_wifi0 [ 1823.070584][T13107] batman_adv: batadv0: Removing interface: virt_wifi0 [ 1823.315799][T13107] device veth1_macvtap left promiscuous mode [ 1823.346173][T13107] device veth0_macvtap left promiscuous mode [ 1823.352428][T13107] device veth1_vlan left promiscuous mode [ 1823.401821][T13107] device veth0_vlan left promiscuous mode [ 1825.406976][T13107] team0 (unregistering): Port device team_slave_1 removed [ 1825.493913][T13107] team0 (unregistering): Port device team_slave_0 removed [ 1825.576580][T13107] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1825.636932][T13107] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1827.620096][T13107] bond0 (unregistering): Released all slaves [ 1827.702951][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1827.711322][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1827.747830][T23775] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1827.856338][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1827.871283][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1827.937817][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1827.970350][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1827.989239][T23775] device veth0_vlan entered promiscuous mode [ 1827.998339][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1828.008791][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1828.042156][T23775] device veth1_vlan entered promiscuous mode [ 1828.150423][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1828.169876][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1828.220176][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1828.283960][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1828.332024][T23775] device veth0_macvtap entered promiscuous mode [ 1828.394532][T23775] device veth1_macvtap entered promiscuous mode [ 1828.496102][T23775] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1828.609706][T23775] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1828.643015][T23775] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1828.701578][T23775] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1828.792718][T23775] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1828.832496][T23775] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1828.844404][T23775] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1828.855067][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1828.891916][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1828.931404][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1828.964189][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1828.989274][T23775] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1829.040470][T23775] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1829.085874][T23775] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1829.173235][T23775] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1829.227551][T23775] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1829.292780][T23775] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1829.337654][T23775] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1829.402622][T23775] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1829.473726][T23775] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1829.483485][T20658] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1829.498463][T20658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1829.575374][T23775] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1829.604297][T23775] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1829.654292][T23775] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1829.694998][T23775] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1830.159991][T13107] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1830.183490][T13107] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1830.297219][T13107] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1830.358541][T22450] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1830.386567][T22450] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1830.409311][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1844.866317][T24196] device wlan1 entered promiscuous mode [ 1844.947889][T24197] mac80211_hwsim hwsim73 wlan1: refused to change device tx_queue_len [ 1853.206236][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 1853.212801][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 1855.296264][T24314] FAULT_INJECTION: forcing a failure. [ 1855.296264][T24314] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1855.353487][T24314] CPU: 0 PID: 24314 Comm: syz.6.5940 Not tainted syzkaller #0 [ 1855.361074][T24314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1855.371175][T24314] Call Trace: [ 1855.374537][T24314] [ 1855.377501][T24314] dump_stack_lvl+0x188/0x24e [ 1855.382221][T24314] ? show_regs_print_info+0x12/0x12 [ 1855.387458][T24314] ? load_image+0x400/0x400 [ 1855.391996][T24314] ? __lock_acquire+0x7d10/0x7d10 [ 1855.397331][T24314] should_fail_ex+0x399/0x4d0 [ 1855.402050][T24314] _copy_from_user+0x2c/0x170 [ 1855.406757][T24314] __sys_bpf+0x2ea/0x780 [ 1855.411037][T24314] ? bpf_link_show_fdinfo+0x380/0x380 [ 1855.416455][T24314] ? lock_chain_count+0x20/0x20 [ 1855.421348][T24314] __x64_sys_bpf+0x78/0x90 [ 1855.425975][T24314] do_syscall_64+0x4c/0xa0 [ 1855.430428][T24314] ? clear_bhb_loop+0x60/0xb0 [ 1855.435178][T24314] ? clear_bhb_loop+0x60/0xb0 [ 1855.439895][T24314] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1855.445823][T24314] RIP: 0033:0x7f626ed9c629 [ 1855.450274][T24314] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1855.469947][T24314] RSP: 002b:00007f626cff6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1855.478418][T24314] RAX: ffffffffffffffda RBX: 00007f626f015fa0 RCX: 00007f626ed9c629 [ 1855.486417][T24314] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 1855.494411][T24314] RBP: 00007f626cff6090 R08: 0000000000000000 R09: 0000000000000000 [ 1855.502409][T24314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1855.510407][T24314] R13: 00007f626f016038 R14: 00007f626f015fa0 R15: 00007ffcd13ee2d8 [ 1855.518594][T24314] [ 1863.606548][T24426] netlink: 'syz.0.5983': attribute type 3 has an invalid length. [ 1863.620922][T24426] netlink: 132 bytes leftover after parsing attributes in process `syz.0.5983'. [ 1863.702991][T24430] netlink: 'syz.0.5983': attribute type 15 has an invalid length. [ 1863.736813][T24431] FAULT_INJECTION: forcing a failure. [ 1863.736813][T24431] name failslab, interval 1, probability 0, space 0, times 0 [ 1863.779635][T24431] CPU: 0 PID: 24431 Comm: syz.6.5984 Not tainted syzkaller #0 [ 1863.787183][T24431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1863.797293][T24431] Call Trace: [ 1863.800702][T24431] [ 1863.803679][T24431] dump_stack_lvl+0x188/0x24e [ 1863.808411][T24431] ? fib_rules_lookup+0x98/0xb40 [ 1863.813399][T24431] ? show_regs_print_info+0x12/0x12 [ 1863.818644][T24431] ? load_image+0x400/0x400 [ 1863.823174][T24431] ? fib_rules_lookup+0x98/0xb40 [ 1863.828149][T24431] ? fib_rules_unregister+0x340/0x340 [ 1863.833621][T24431] should_fail_ex+0x399/0x4d0 [ 1863.838375][T24431] should_failslab+0x5/0x20 [ 1863.842945][T24431] slab_pre_alloc_hook+0x59/0x310 [ 1863.848005][T24431] ? find_exception+0x171/0xa30 [ 1863.852912][T24431] kmem_cache_alloc+0x56/0x2f0 [ 1863.857710][T24431] ? dst_alloc+0x101/0x160 [ 1863.862181][T24431] dst_alloc+0x101/0x160 [ 1863.866463][T24431] ip_route_output_key_hash_rcu+0x14a4/0x23f0 [ 1863.872573][T24431] ? ip_route_output_key_hash+0x139/0x330 [ 1863.878327][T24431] ip_route_output_key_hash+0x1ef/0x330 [ 1863.883910][T24431] ? unwind_get_return_address+0x49/0x80 [ 1863.889582][T24431] ? ip_route_input_rcu+0x3160/0x3160 [ 1863.895081][T24431] tcp_v4_connect+0x6d9/0x18e0 [ 1863.899900][T24431] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1863.906040][T24431] ? tcp_twsk_unique+0x990/0x990 [ 1863.911021][T24431] __inet_stream_connect+0x242/0xe10 [ 1863.916398][T24431] ? inet_dgram_connect+0x360/0x360 [ 1863.921664][T24431] tcp_sendmsg_fastopen+0x38f/0x600 [ 1863.927002][T24431] tcp_sendmsg_locked+0x39dd/0x3f50 [ 1863.932233][T24431] ? verify_lock_unused+0x140/0x140 [ 1863.937500][T24431] ? smc_switch_to_fallback+0x9da/0xca0 [ 1863.943094][T24431] ? mark_lock+0x94/0x320 [ 1863.947458][T24431] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 1863.953473][T24431] ? lock_chain_count+0x20/0x20 [ 1863.958386][T24431] ? tcp_set_state+0x520/0x520 [ 1863.963278][T24431] ? do_raw_spin_unlock+0x11d/0x230 [ 1863.968512][T24431] tcp_sendmsg+0x2b/0x40 [ 1863.972782][T24431] smc_sendmsg+0x247/0x470 [ 1863.977239][T24431] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1863.982644][T24431] ? security_socket_sendmsg+0x7c/0xa0 [ 1863.988156][T24431] ? smc_getsockopt+0x3a0/0x3a0 [ 1863.993071][T24431] ____sys_sendmsg+0x5be/0x970 [ 1863.997886][T24431] ? __sys_sendmsg_sock+0x30/0x30 [ 1864.002946][T24431] ? __import_iovec+0x315/0x500 [ 1864.007838][T24431] ? import_iovec+0x6f/0xa0 [ 1864.012380][T24431] ___sys_sendmsg+0x2a2/0x360 [ 1864.017205][T24431] ? __sys_sendmsg+0x290/0x290 [ 1864.022039][T24431] __se_sys_sendmsg+0x1bb/0x2a0 [ 1864.026942][T24431] ? __x64_sys_sendmsg+0x80/0x80 [ 1864.031928][T24431] ? lockdep_hardirqs_on+0x94/0x140 [ 1864.037162][T24431] do_syscall_64+0x4c/0xa0 [ 1864.041614][T24431] ? clear_bhb_loop+0x60/0xb0 [ 1864.046414][T24431] ? clear_bhb_loop+0x60/0xb0 [ 1864.051123][T24431] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1864.057046][T24431] RIP: 0033:0x7f626ed9c629 [ 1864.061492][T24431] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1864.081226][T24431] RSP: 002b:00007f626cfb4028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1864.089703][T24431] RAX: ffffffffffffffda RBX: 00007f626f016180 RCX: 00007f626ed9c629 [ 1864.097766][T24431] RDX: 00000000200048cc RSI: 0000200000000240 RDI: 0000000000000006 [ 1864.105774][T24431] RBP: 00007f626cfb4090 R08: 0000000000000000 R09: 0000000000000000 [ 1864.113829][T24431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1864.121843][T24431] R13: 00007f626f016218 R14: 00007f626f016180 R15: 00007ffcd13ee2d8 [ 1864.129884][T24431] [ 1868.506100][T24501] netlink: 16178 bytes leftover after parsing attributes in process `syz.3.6011'. [ 1869.127476][T24511] netlink: 16178 bytes leftover after parsing attributes in process `syz.0.6025'. [ 1869.198916][T24511] netlink: 14 bytes leftover after parsing attributes in process `syz.0.6025'. [ 1869.234806][T24511] device hsr_slave_0 left promiscuous mode [ 1869.245024][T24511] device hsr_slave_1 left promiscuous mode [ 1869.507951][T24519] openvswitch: netlink: Flow set message rejected, Key attribute missing. [ 1871.440517][T23777] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 1871.463518][T23777] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 1871.472271][T23777] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 1871.480746][T23777] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 1871.488612][T23777] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 1871.496507][T23777] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 1872.131057][T20658] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1872.362196][T20658] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1872.471586][T20658] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1872.760117][T20658] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1872.989980][T24539] chnl_net:caif_netlink_parms(): no params data found [ 1873.523015][T23777] Bluetooth: hci1: command 0x0409 tx timeout [ 1873.645371][T24539] bridge0: port 1(bridge_slave_0) entered blocking state [ 1873.695485][T24539] bridge0: port 1(bridge_slave_0) entered disabled state [ 1873.771037][T24539] device bridge_slave_0 entered promiscuous mode [ 1873.817351][T20658] device 0 left promiscuous mode [ 1873.983084][T24539] bridge0: port 2(bridge_slave_1) entered blocking state [ 1873.990404][T24539] bridge0: port 2(bridge_slave_1) entered disabled state [ 1874.064063][T24539] device bridge_slave_1 entered promiscuous mode [ 1874.218706][T24539] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1875.045284][T24539] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1875.602653][ T4282] Bluetooth: hci1: command 0x041b tx timeout [ 1876.038141][T24539] team0: Port device team_slave_0 added [ 1876.099455][T24539] team0: Port device team_slave_1 added [ 1877.260210][T24539] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1877.284303][T24539] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1877.356603][T24539] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1877.466406][T24539] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1877.485009][T24539] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1877.558581][T24539] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1877.682780][ T4282] Bluetooth: hci1: command 0x040f tx timeout [ 1878.085511][T24539] device hsr_slave_0 entered promiscuous mode [ 1878.111192][T24539] device hsr_slave_1 entered promiscuous mode [ 1878.156365][T24539] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1878.207415][T24539] Cannot create hsr debugfs directory [ 1879.762841][ T4282] Bluetooth: hci1: command 0x0419 tx timeout [ 1880.906109][T24539] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1880.946300][T24539] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1881.069300][T24539] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1881.443164][T24539] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1882.014782][T24539] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1882.202849][T24539] 8021q: adding VLAN 0 to HW filter on device team0 [ 1882.238816][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1882.268128][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1883.041984][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1883.066468][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1883.121334][T22450] bridge0: port 1(bridge_slave_0) entered blocking state [ 1883.128581][T22450] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1883.179760][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1883.239627][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1883.312796][T22450] bridge0: port 2(bridge_slave_1) entered blocking state [ 1883.319997][T22450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1883.694001][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1883.702388][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1883.721853][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1883.774159][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1883.798792][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1884.247650][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1884.264593][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1884.307163][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1884.354420][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1884.392115][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1884.445665][T24539] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1884.486164][T24539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1885.887696][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1885.930716][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1887.237171][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1887.262747][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1887.287122][T24539] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1887.496022][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1887.520546][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1888.201235][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1888.231398][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1888.279019][T24539] device veth0_vlan entered promiscuous mode [ 1888.330506][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1888.368158][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1888.493960][T24539] device veth1_vlan entered promiscuous mode [ 1888.634370][T24539] device veth0_macvtap entered promiscuous mode [ 1888.670718][ T4320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1888.693766][ T4320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1888.730314][T24539] device veth1_macvtap entered promiscuous mode [ 1888.765577][ T4320] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1888.802760][ T4320] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1891.741705][T20658] team0: Port device wlan1 removed [ 1891.851569][T24539] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1891.869276][T24539] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1891.880080][T24539] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1891.890939][T24539] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1891.901561][T24539] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1891.913581][T24539] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1891.924017][T24539] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1891.952874][T24539] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1891.988777][T24539] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1892.389265][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1892.409543][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1892.452171][T24539] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1892.504188][T24539] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1892.557980][T24539] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1892.585352][T24539] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1892.612136][T24539] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1892.638932][T24539] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1892.665266][T24539] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1892.696575][T24539] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1892.750577][T24539] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1892.769429][T24539] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1892.799632][T24539] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1893.131159][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1893.155464][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1893.631810][T20658] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1893.653920][T20658] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1893.707073][T20658] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1893.725618][T20658] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1893.746988][T20658] batman_adv: batadv0: Interface deactivated: virt_wifi0 [ 1893.800044][T20658] batman_adv: batadv0: Removing interface: virt_wifi0 [ 1893.880466][T20658] device veth1_macvtap left promiscuous mode [ 1897.961522][T20658] team0 (unregistering): Port device team_slave_1 removed [ 1898.118065][T20658] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1898.191696][T20658] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1898.708313][T20658] bond0 (unregistering): (slave team0): Releasing backup interface [ 1898.747427][T20658] bond0 (unregistering): Released all slaves [ 1898.801419][T24845] netlink: 'syz.6.6096': attribute type 21 has an invalid length. [ 1898.819956][T24845] netlink: 'syz.6.6096': attribute type 15 has an invalid length. [ 1898.831292][T24846] netlink: 1047 bytes leftover after parsing attributes in process `syz.6.6096'. [ 1898.852277][T24846] bridge_slave_1: default FDB implementation only supports local addresses [ 1898.892700][T24539] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1898.917752][T24539] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1898.938001][T24539] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1898.955331][T24539] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1899.437298][ T29] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1899.462816][ T29] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1899.530807][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1899.634276][T22450] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1899.647327][T22450] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1899.687156][T22450] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1900.474940][T24871] FAULT_INJECTION: forcing a failure. [ 1900.474940][T24871] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1900.612248][T24871] CPU: 0 PID: 24871 Comm: syz.0.6106 Not tainted syzkaller #0 [ 1900.619804][T24871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1900.629913][T24871] Call Trace: [ 1900.633235][T24871] [ 1900.636206][T24871] dump_stack_lvl+0x188/0x24e [ 1900.640947][T24871] ? show_regs_print_info+0x12/0x12 [ 1900.646202][T24871] ? load_image+0x400/0x400 [ 1900.650772][T24871] ? __lock_acquire+0x7d10/0x7d10 [ 1900.655854][T24871] ? __virt_addr_valid+0x188/0x540 [ 1900.661032][T24871] should_fail_ex+0x399/0x4d0 [ 1900.665778][T24871] _copy_from_user+0x2c/0x170 [ 1900.670508][T24871] sctp_setsockopt+0x19a/0xf90 [ 1900.675330][T24871] ? sock_common_recvmsg+0x190/0x190 [ 1900.680659][T24871] __sys_setsockopt+0x2bf/0x3d0 [ 1900.685560][T24871] __x64_sys_setsockopt+0xb1/0xc0 [ 1900.690632][T24871] do_syscall_64+0x4c/0xa0 [ 1900.695089][T24871] ? clear_bhb_loop+0x60/0xb0 [ 1900.699807][T24871] ? clear_bhb_loop+0x60/0xb0 [ 1900.704699][T24871] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1900.710644][T24871] RIP: 0033:0x7f2e6759c629 [ 1900.715099][T24871] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1900.734835][T24871] RSP: 002b:00007f2e683d7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1900.743298][T24871] RAX: ffffffffffffffda RBX: 00007f2e67815fa0 RCX: 00007f2e6759c629 [ 1900.751514][T24871] RDX: 0000000000000064 RSI: 0000000000000084 RDI: 0000000000000005 [ 1900.759518][T24871] RBP: 00007f2e683d7090 R08: 0000000000000010 R09: 0000000000000000 [ 1900.767522][T24871] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1900.775525][T24871] R13: 00007f2e67816038 R14: 00007f2e67815fa0 R15: 00007ffcbdf9a338 [ 1900.783542][T24871] [ 1900.884564][T24873] netlink: 'syz.3.6107': attribute type 3 has an invalid length. [ 1900.895098][T24873] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.6107'. [ 1901.223538][T24880] device syzkaller0 entered promiscuous mode [ 1901.662255][T23777] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 1901.720609][T23777] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 1901.753965][T23777] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 1901.769721][T23777] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 1901.777970][T23777] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 1901.787308][T23777] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 1903.854226][T23777] Bluetooth: hci2: command 0x0409 tx timeout [ 1904.454699][ T4320] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1904.590515][ T4320] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1905.456905][ T4320] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1905.631142][ T4320] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1905.923063][T23777] Bluetooth: hci2: command 0x041b tx timeout [ 1906.368594][T24892] chnl_net:caif_netlink_parms(): no params data found [ 1906.963460][T24892] bridge0: port 1(bridge_slave_0) entered blocking state [ 1906.971022][T24892] bridge0: port 1(bridge_slave_0) entered disabled state [ 1906.980881][T24892] device bridge_slave_0 entered promiscuous mode [ 1907.042027][T24892] bridge0: port 2(bridge_slave_1) entered blocking state [ 1907.051070][T24892] bridge0: port 2(bridge_slave_1) entered disabled state [ 1907.059956][T24892] device bridge_slave_1 entered promiscuous mode [ 1907.404144][T24892] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1907.461348][T24892] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1907.985473][T24892] team0: Port device team_slave_0 added [ 1908.012910][T23777] Bluetooth: hci2: command 0x040f tx timeout [ 1908.907605][T24892] team0: Port device team_slave_1 added [ 1909.513896][T24892] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1909.520933][T24892] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1909.587361][T24892] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1910.092592][T23777] Bluetooth: hci2: command 0x0419 tx timeout [ 1911.728996][T24892] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1911.769818][T24892] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1911.799165][T24892] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1912.077404][T24892] device hsr_slave_0 entered promiscuous mode [ 1912.105779][T24892] device hsr_slave_1 entered promiscuous mode [ 1912.155026][T24892] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1912.194860][T24892] Cannot create hsr debugfs directory [ 1914.273994][T24892] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 1914.383091][T24892] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 1914.446961][T24892] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 1914.645931][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 1914.652313][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 1914.791790][T24892] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 1915.609912][T24892] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1915.858185][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1915.888648][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1915.920958][T24892] 8021q: adding VLAN 0 to HW filter on device team0 [ 1916.001996][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1916.023743][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1916.075521][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 1916.082874][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1916.156977][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1916.200528][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1916.273599][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1916.299855][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 1916.307160][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1916.342892][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1916.423714][T18905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1916.437948][T18905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1916.528833][T18905] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1916.563588][T18905] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1916.597455][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1916.665463][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1916.749581][T18905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1916.794562][T18905] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1916.851686][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1916.914916][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1916.995052][T25060] netlink: 'syz.0.6162': attribute type 10 has an invalid length. [ 1917.031860][T25060] device veth0_macvtap left promiscuous mode [ 1917.415852][T24892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1918.887916][T24892] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1918.919862][T18905] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1918.938323][T18905] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1919.951610][ T4320] team0: Port device wlan1 removed [ 1922.902539][ T4320] device hsr_slave_0 left promiscuous mode [ 1922.940119][ T4320] device hsr_slave_1 left promiscuous mode [ 1922.950047][ T4320] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1923.003918][ T4320] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1923.034024][ T4320] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1923.062017][ T4320] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1923.147498][ T4320] batman_adv: batadv0: Interface deactivated: virt_wifi0 [ 1923.179639][ T4320] batman_adv: batadv0: Removing interface: virt_wifi0 [ 1923.286303][ T4320] device veth1_macvtap left promiscuous mode [ 1923.313067][ T4320] device veth0_macvtap left promiscuous mode [ 1923.319275][ T4320] device veth1_vlan left promiscuous mode [ 1923.346050][ T4320] device veth0_vlan left promiscuous mode [ 1924.154071][T25154] netlink: 'syz.0.6182': attribute type 3 has an invalid length. [ 1924.173085][T25154] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.6182'. [ 1924.858004][ T4320] team0 (unregistering): Port device team_slave_1 removed [ 1924.944067][ T4320] team0 (unregistering): Port device team_slave_0 removed [ 1925.006142][ T4320] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1925.071173][ T4320] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1925.577760][ T4320] bond0 (unregistering): Released all slaves [ 1925.644725][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1925.665497][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1925.760297][T25161] device syzkaller0 entered promiscuous mode [ 1925.831104][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1925.877668][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1925.899148][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1925.927306][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1925.946146][T24892] device veth0_vlan entered promiscuous mode [ 1926.108186][T24892] device veth1_vlan entered promiscuous mode [ 1932.077414][T16614] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1932.087866][T16614] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1932.155125][T24892] device veth0_macvtap entered promiscuous mode [ 1932.186719][T24892] device veth1_macvtap entered promiscuous mode [ 1932.214042][T16614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1932.223854][T16614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1932.233159][T16614] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1932.243438][T16614] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1932.347513][T24892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1932.361078][T24892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1932.371718][T24892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1932.382773][T24892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1932.453130][T24892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1932.500824][T24892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1932.561849][T24892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1932.608627][T24892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1932.698945][T24892] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1932.735397][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1932.759834][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1932.814684][T24892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1932.863975][T24892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1932.915627][T24892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1932.975716][T24892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1933.037238][T24892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1933.068207][T24892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1933.114579][T24892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1933.136076][T24892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1933.165039][T24892] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1933.235236][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1933.281852][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1933.301259][T24892] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1933.340235][T24892] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1933.413378][T24892] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1933.422213][T24892] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1933.895220][ T46] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1933.913432][ T46] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1933.991005][ T29] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1934.048887][ T29] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1934.058250][ T29] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1934.058745][T25226] netlink: 'syz.3.6201': attribute type 2 has an invalid length. [ 1934.085133][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1934.110561][T25226] netlink: 17267 bytes leftover after parsing attributes in process `syz.3.6201'. [ 1934.347420][T25229] netlink: 72 bytes leftover after parsing attributes in process `syz.3.6202'. [ 1934.640264][T23777] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 1934.672070][T23777] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 1934.681765][T23777] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 1934.703966][T23777] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 1934.713404][T23777] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 1934.721273][T23777] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 1935.857757][ T29] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1935.943713][T25255] netlink: 9275 bytes leftover after parsing attributes in process `syz.7.6211'. [ 1936.085521][ T29] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1936.533780][T25236] chnl_net:caif_netlink_parms(): no params data found [ 1936.686581][ T29] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1936.802712][ T4282] Bluetooth: hci5: command 0x0409 tx timeout [ 1936.817211][ T29] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1936.869737][T25236] bridge0: port 1(bridge_slave_0) entered blocking state [ 1936.881205][T25236] bridge0: port 1(bridge_slave_0) entered disabled state [ 1936.892266][T25236] device bridge_slave_0 entered promiscuous mode [ 1936.913490][T25236] bridge0: port 2(bridge_slave_1) entered blocking state [ 1936.920748][T25236] bridge0: port 2(bridge_slave_1) entered disabled state [ 1936.929531][T25236] device bridge_slave_1 entered promiscuous mode [ 1936.957703][T25236] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1936.970433][T25236] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1937.003781][T25236] team0: Port device team_slave_0 added [ 1937.040968][T25236] team0: Port device team_slave_1 added [ 1937.121688][T25236] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1937.128849][T25236] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1937.156091][T25236] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1937.175185][T25236] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1937.183995][T25236] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1937.210989][ T4282] Bluetooth: hci3: command 0x0406 tx timeout [ 1937.218321][T25236] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1937.347430][T25236] device hsr_slave_0 entered promiscuous mode [ 1937.355866][T25236] device hsr_slave_1 entered promiscuous mode [ 1937.373721][T25236] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1937.381360][T25236] Cannot create hsr debugfs directory [ 1937.771748][T25236] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 1937.795681][T25236] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 1937.810083][T25236] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 1937.861056][T25236] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 1937.991817][T25236] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1938.050091][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1938.058974][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1938.070944][T25236] 8021q: adding VLAN 0 to HW filter on device team0 [ 1938.087282][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1938.097574][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1938.107760][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 1938.115070][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1938.153240][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1938.162104][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1938.171810][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1938.181487][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 1938.188691][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1938.201257][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1938.210525][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1938.248322][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1938.258351][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1938.268873][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1938.278952][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1938.288856][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1938.298257][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1938.309287][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1938.318172][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1938.329956][T25236] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1938.362027][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1938.865817][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1938.873615][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1938.882909][T23777] Bluetooth: hci5: command 0x041b tx timeout [ 1938.910504][T25236] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1939.739657][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1939.763520][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1939.862240][T18905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1939.883818][T18905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1939.893294][T18905] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1939.913203][T18905] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1939.936546][T25236] device veth0_vlan entered promiscuous mode [ 1939.977863][T25236] device veth1_vlan entered promiscuous mode [ 1940.040442][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1940.049716][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1940.060463][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1940.073656][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1940.087192][T25236] device veth0_macvtap entered promiscuous mode [ 1940.127462][T25236] device veth1_macvtap entered promiscuous mode [ 1940.158928][T25236] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1940.171344][T25236] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1940.181740][T25236] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1940.192662][T25236] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1940.203096][T25236] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1940.213965][T25236] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1940.224150][T25236] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1940.239467][T25236] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1940.259720][T25236] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1940.271684][T25236] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1940.294230][T25236] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1940.309165][T16614] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1940.317804][T16614] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1940.327799][T16614] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1940.337377][T16614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1940.359974][T25236] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1940.381572][T25236] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1940.393615][T25236] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1940.412524][T25236] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1940.429182][T25236] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1940.440373][T25236] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1940.450467][T25236] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1940.467118][T25236] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1940.478572][T25236] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1940.495555][T25236] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1940.510895][T25236] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1940.524518][T16614] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1940.546721][T16614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1940.560578][T25236] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1940.570381][T25236] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1940.580662][T25236] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1940.590985][T25236] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1940.738250][ T46] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1940.764736][ T46] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1940.776828][ T4320] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1940.877572][ T29] team0: Port device wlan1 removed [ 1940.898356][T16614] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1940.907725][T16614] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1940.918112][T18905] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1940.962915][ T4282] Bluetooth: hci5: command 0x040f tx timeout [ 1941.199468][ T29] device hsr_slave_0 left promiscuous mode [ 1941.211063][ T29] device hsr_slave_1 left promiscuous mode [ 1941.221325][ T29] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1941.234275][ T29] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1941.247993][ T29] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1941.262129][ T29] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1941.277911][ T29] bridge0: port 3(bond0) entered disabled state [ 1941.291877][ T29] device bridge_slave_1 left promiscuous mode [ 1941.311010][ T29] bridge0: port 2(bridge_slave_1) entered disabled state [ 1943.042548][T23777] Bluetooth: hci5: command 0x0419 tx timeout [ 1944.149890][ T29] device bridge_slave_0 left promiscuous mode [ 1944.172780][ T29] bridge0: port 1(bridge_slave_0) entered disabled state [ 1944.264979][ T29] device veth1_macvtap left promiscuous mode [ 1944.271183][ T29] device veth1_vlan left promiscuous mode [ 1944.288740][ T29] device veth0_vlan left promiscuous mode [ 1944.872995][ T29] team0 (unregistering): Port device team_slave_1 removed [ 1944.918433][ T29] team0 (unregistering): Port device team_slave_0 removed [ 1944.961284][ T29] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1944.970988][ T29] device bond_slave_1 left promiscuous mode [ 1945.017117][ T29] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1945.027122][ T29] device bond_slave_0 left promiscuous mode [ 1945.346449][ T29] bond0 (unregistering): Released all slaves [ 1976.085786][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 1976.092178][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 1998.652592][ T4282] Bluetooth: hci1: command 0x0406 tx timeout [ 2024.242708][T23777] Bluetooth: hci2: command 0x0406 tx timeout [ 2037.526772][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 2037.533338][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 2060.082630][ T4282] Bluetooth: hci5: command 0x0406 tx timeout [ 2098.966197][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 2098.972653][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 2160.406052][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 2160.412585][ T1267] ieee802154 phy1 wpan1: encryption failed: -22 [ 2221.845821][ T1267] ieee802154 phy0 wpan0: encryption failed: -22 [ 2221.852180][ T1267] ieee802154 phy1 wpan1: encryption failed: -22