last executing test programs: 15m55.826969338s ago: executing program 2 (id=278): perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x71, &(0x7f0000000000)=r2, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x94) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf35, 0x2}, 0x1224, 0x0, 0x0, 0x9, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000140)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x2, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="b700000063000000bca30000000000002403000020fef6ff720a00fef8ffffff71a4f0ff000000001f030000000000002e100200000000002604f8ffffff000014010000630000001d130000000000007a0a00fe0000001f0f14000000000000b503f7fff80000009500000000000000093bc065b78111c6dfa041b63af4a3912435f1a864a7aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168e5181554a090f300020000fe275daf51efd601b6bf01c8e8b1b526375ee4dd6fcd82e4fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e65440000000000000000028610643a98dde20358d1148272abd23da767f8c549ec21ead2ed51b104d4d91af25b845b9f7d08d123deda88c658d42ecbf28bf7076c15b463bebc72f526dd70252e79166d858fcd0e06dd31af9612fa402d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff61623604000000000000006a89adaf17b0a6041bdeebdfd1f5089048ddff6da40f9411fe7226a40409d6e37c4f46756d31cb46ffffffffffffff7f1569b33d21dae356e5c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10076443d643649393bf52d2105bd901128c7e0ec82701c8204a1deeed4155617572652d950ad31928b0b036dc2869f478341d22891202d0f5ad94b081fcd507acc9b9c67382f13d000000225d85ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdbb9893a5de817101ab062cd54e67051d355d84ce97bb0c6b6a595e487a2cc47c0efbb2d71cde2c10f0bc6980fe78683ac5c0c31032599dd273863be9261eee52216d009f4c52048ef8c126aeef5f510a8f1aded94a129e4aec6e8d9ab06faffc3a15d91c2ea3e2e04cfe031b287539d0540059fe6c7fe7cd8697502c7596566d674e425da5e7f009602a9f61d3804b3e0a1053abdc31282dfb15eb6841bb64a1b3045024a982f3c48153baae244e7bf573eac34b781337ad5905c6bbf1137548c7f1a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44022a579dfc0229cc0dc98816106dec28eaeb9439901fb39f1d78aa60ead1883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc48899b212c55318294270a1ad10880fef7c24d47afcc829ba0f85da6d888f18ea40ab959f6074ab2a40d85d1501783a7ab51380d7b4ead35a385e0b4a26b702396df7e0c1e02b88c114f244a9bf93f04bf072f0861f5c0b000000000000eedcf2ba1b9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba3401e6a52acb11883ad2a3b1832371fe5bc621426d1ed01b389708165b9cdbae2ed9dc7358f0ebadde0b727f27feeb7464dcd857ab15e355713767c536cbae2f5c7d951680f6f2f9a6a8346962a350845ffa2000000000000000906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010ae20e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d64a532869d701723fedcbada1ee7baa19faf67256b56a41fd355b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ced301efeb6dc5f6a9037d2283c42efc54fa84323afc4c10eff462c8843187f1dd48ef0900000000fbff00ff0f40b1888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538c6ee6ba65893ff1f908ba7554b15dca5f77a08a83431a87881fae6691d1aee1da02ba516467df3e7d1daac43738612e4fee18a22da19fc08001011e32f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f62e3f753b639a924599c1f69219927ea5301fff0a6063d427180d61542c2571f783e96635600000554f327a3535e7c7542799493c31ac05a7b57f03ca91a01ba2a30ca99e969d6fd09dc28ebc15edb4d91675767999d146aef7799738b292fd64bb25b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a794963342aece449a0d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d12096833d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e1661261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ecab5d232f89fe0120f64c62e8e3ed8bcb45202c204bbec8d722824c0ebca8db1ea4a05e41f6016ab5bbe4fe7ff5d785d0128171c90d9900ca2532b0f9d01c4b45294fbba468df3e1b393cb4e62e753b4172ba7ac1f2b51c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bcb0addb7b9aee813df534aac4b3093c91b8068cd849904568916694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a881192292ffff5392ab3d1311b82432662806add87047f601fa888400000000000000000000000000006acc19808d7cf29bc974b0ea92499a41b9b9a7c2bca311a28ee4952f2d325a56397c78f12205db653a536f0100e0eda300a43a13bd1b9f3322405d1efd78e578dc6b3fb84f3738a4b6caa800000087efa51c5d95ecba4e50e529d1e8c89600e809dc3d0a2f65579e23457949a50f2d0455cf79a43737a3926937e84fb478199dc1020f4beb98b8074bf7df8b5e783637da740800000000000000c55a4385e9a617aa6c8e10d4202c5afeb06e2f9115558ea12f92d7ae633d44086b3f03b20d546fa66a72e38207c9d20035abc46271a30f1240de52536941242d23896ab7493c6670fdc49c14f34fc4eadd6db8d80eba439772bf60a1db18c472dafc5569adc282928d2a1ffe29f1a57d3f18f4edaeb5d37918e6fddcd821da67a0785585a44434600e64a6a274000000000088b3e63a000000000000000000000000000009dd14b38f2f4426d7cf5075047c31f6ce6adddfe3ac649c0643c8bfbeb14ba1fd7a485aa893915cf81e29aaf375e904bbe52691a4100260ffcd8f1d04166d291ebcef893e1b9ccb6797d0646fe0e727bf10d6335332f45b8e87383930f1a4724434f28efb43e06e64f0698caca42f4e6018a455736c482a017e2b13dac4a90faa109f0e87cc946acfb3d1a56e9ec13ca74aa6ad4bf50c1acb3928143be1c1023a375e528285544d0064b98646f3109e9a4942ce42c6e7ec84b664f6c2770803f10baa804a707f0a1fcbfc309381aeba191950bae71f37f1eb7ceeffb3c0547ac6571603adbfde4c8b5f8d7f4b854441613633b48865b65bdce1f7ffffffffffffcf4cebf04f4bc1eebf560a26d34d3757b1450fdb0a9a69f432e277f3a0386eb2bd3305c821c64757f786b79fef54dbe64c67d73934bc80b2133fb3c04cc7ea48bf97a6243c9f95dcbddecf45f008f1822c7868e1ff5a3cff5d6b6898335792749df7b1f51e91f8c1c3b1b93b338a59c0c0247bc9412e19204caaa3fab69cef08a9f6f6cf39dea3d878b2ed42545421970cc426e644332bc956d1c6adefdf0ede2c5c94aa632646ae225accdf031f611d01622921f1b922a5ac887cca3136133dce8d9f5f4da7bed2ea5d94362200000000000000000000f296b0c1484e5f781ad26bff696b05ff0a5e2270e07618b04273bd4075ea38ab463bfa6a38e7c537498ba3e4df8dfc9e040000003c3ffad44d2a376def42e41e9fc31678257e040fa7cf32c221aaac08000000000000001a00000000000000000000173570f0c11ae694b0f7a4f9c2f6790044a357e785af6e153d5f1ea460af92c7cbbd6295afe740f5e154346d483e0d641ef02e4d5295d756e110522a7a945b93fb705b95b6aae27a8fb33732ce1da1c0b1af8eb9222a06e984ab1e6984c8bdc12360627137ab67b6b68ab08acb29a74dc36b51209cfbc87f61182bbeb2772e9d5a1ffc477179be481efe46a4ce86be0b1d8eee42a611a3d44ca450b14586ed63dd92005c79e4a8ab8a94f0c6cb4bed8594a39bd76d3ef8a7ab014e787596db796bd93a36c2880423291e3bccc86f66ba792ff4d87b3f80e5908779e51c5e9055fc5b23605cd000c723187ef09dcf4b07b06a9342f3f62ee7acddff292082c1f4d8eb9561f80873a09a1ae0c9af11210200000000000000484502009759264a5729f07c2b218fa36ba2316a99aaad0130df83d0bda1e711290f78c143ea143967b00adcd77e6ad5e48d839ea61aadb83e4d071c54691924a3830d3e7b5c198bb0ed623153590000000000000000004b985ea170ab651a039d7102923e810ed567e3f1979b9ed1a4bf6a10dac825c96a0828b335de445a4880bb6474157efd1a72ca46ae4cbe3ab648c9bc4867a5a4cb87d7d6d55475b34b3cb6aa9e2337d4e04a37e35109752522ac9b187ab8e0d179e6ad0dc758975e9cf77f703e742b77521149d8fdeae4b92d5edc232ca356fb86784b865adda7c921dc475276837b2619922de4d96850172602fac7d165e32419a622bdef7c91385c87c30b8a144d9b01784a8060670455f76b207517f66cf32fa0772975e0963b7373dba424beadf60d5bd08ea73e2b5620a5754455006934679b10e596821e2bd380d472c9096ca4c55d6106d0b88e38f6c54abc952c81617a06f93465241070fea3d9fc786e2625572ff2068ff84361b3883cc2c8b9a0a2f70119db13b47c924c73216bb12d1e68a03a08aa682ede113691db07b50f5e6fde6252f1520c"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10}, 0x94) r4 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) close(r4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r3, 0xffff0000, 0xe, 0x0, &(0x7f0000001a40)="2b206d074843b397737ea49da2aa", 0x0, 0xd000, 0x720e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020}, 0x50) 15m54.856368175s ago: executing program 2 (id=286): socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x40f00}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./file0\x00') r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000001000000b7040000000000008500000033000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x29, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x420}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={0x0}, 0x0, 0x80000000007, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)) 15m53.626576628s ago: executing program 2 (id=292): close(0x3) 15m53.554042959s ago: executing program 2 (id=293): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x1e, 0x5, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) (async) r1 = socket$kcm(0x29, 0x5, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x122}, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ceb71c0010ec90db133c22a690ae7080000000000040875b0089"], 0xfe1b) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=@raw=[@func, @map_fd, @exit, @jmp={0x5, 0x0, 0x4}], 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f3, &(0x7f0000000080)) (async) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r10, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg(r9, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) socket$kcm(0x10, 0x2, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 15m53.264316958s ago: executing program 2 (id=297): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000060000000800000005"], 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000040), 0x4) sendmsg$unix(r1, &(0x7f0000000640)={&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c40)={r2, 0xe0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000480)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, &(0x7f0000000900)=[0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x51, &(0x7f0000000980)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a80), &(0x7f0000000ac0), 0x8, 0x24, 0x8, 0x8, &(0x7f0000000b00)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x14, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2108000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000004a0850000002d000000181100009a4a7fb4993fe79d7f", @ANYRES32=r0, @ANYRESHEX=0x0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r4, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0], 0x0, 0x4d, &(0x7f0000000380)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0xe4, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f0000000080)=@raw=[@generic={0x6, 0xf, 0x0, 0x8001, 0xb7de}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000100)='syzkaller\x00', 0x80000000, 0x80, &(0x7f0000000140)=""/128, 0x41100, 0x0, '\x00', r5, 0x25, r4, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000640)=[{0x3, 0x4, 0x2, 0x1}, {0x1, 0x4, 0xc, 0x5}, {0x5, 0x3, 0x10, 0xa}, {0x2, 0x2, 0xe, 0xb}, {0x5, 0x1, 0x1, 0xa}], 0x10, 0x2}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r4}, 0xc) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x3, '\x00', r5, r2, 0x4, 0x4, 0x5}, 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000008c0)={r6, &(0x7f0000000800)="24e953edc735e78215c38812843660ef5f7abd1f2e246da99f2e0b67f98a1ebca1ffc43c4dc58ef9e6ceb21564a0e6d854508047954317f59b041773f2bcaeed19ec3dc52fc6c1303e526b1f84c8063c1cd45da0b904cb8a98b6fadb1a18e9085df440566b93", &(0x7f0000000880)=""/12}, 0x20) 15m53.053674013s ago: executing program 2 (id=303): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x3, 0xa, &(0x7f0000000980)=ANY=[@ANYBLOB="075204000200000018f6e43b1440aff8150000000000d5a0184df83506173f12af05ad00007f55100010567d62686012000075f2004b8702000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000"], &(0x7f0000000700)='GPL\x00', 0x9, 0xa9, &(0x7f0000000740)=""/169, 0x40f00, 0x44, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000840)={0x4, 0x4, 0x3, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000880)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], 0x0, 0x10, 0x9}, 0x94) close(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000400)='cgroup.freeze\x00', 0x275a, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="1805000000080000000000000064ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f8481f0000005e", 0x19}], 0x1}, 0x20) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f00000006c0)='7\t', 0x2}], 0x1, &(0x7f0000001d00)}, 0x4000000) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="33fe00005e"], 0xfe33) r5 = syz_clone(0x40049200, &(0x7f0000000140)="72aecf027db313368b0af982aacc2960777f9a36d0319722676b05925d", 0x1d, &(0x7f00000002c0), &(0x7f00000003c0), &(0x7f0000000500)="19503235d98e051cb74a597eaeb2d005b86cc5d371cf64b124bc5c2ed27fe259a394f567013e63618530aec794fd36c0c25a05ed9c559a899d1e8a3e1a048c2aa19e3e07d4a80c1bce4a43dbd3c17bf0a54d4a271fa59c5d54c2386966e287483aec5e6cd358961b0810bfa78e41d76d121d1fc7473a47bddc917bc8a431723b8cb6ffe5c59b97fb36752f047355f38e709d6043d83af6459b0531dd3ff96edc") perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x480783, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602, 0x403, 0x6, 0x0, 0x350, 0x4}, r5, 0xb, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r6, 0x6, 0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000640), 0x8}, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)=@generic={&(0x7f0000000440)='./cgroup/../file0/file0\x00', r2}, 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)=""/166, 0xa6}], 0x1, &(0x7f0000000bc0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb0}, 0x0) r8 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x890b, &(0x7f0000000000)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002c80)={&(0x7f0000000180)={0x2, 0x4e22, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000002bc0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x41}, @remote}}}], 0x20}, 0x20000004) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100fd0080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES8=r7, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) 15m36.985425696s ago: executing program 32 (id=303): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x3, 0xa, &(0x7f0000000980)=ANY=[@ANYBLOB="075204000200000018f6e43b1440aff8150000000000d5a0184df83506173f12af05ad00007f55100010567d62686012000075f2004b8702000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000"], &(0x7f0000000700)='GPL\x00', 0x9, 0xa9, &(0x7f0000000740)=""/169, 0x40f00, 0x44, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000840)={0x4, 0x4, 0x3, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000880)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1], 0x0, 0x10, 0x9}, 0x94) close(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000400)='cgroup.freeze\x00', 0x275a, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="1805000000080000000000000064ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f8481f0000005e", 0x19}], 0x1}, 0x20) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f00000006c0)='7\t', 0x2}], 0x1, &(0x7f0000001d00)}, 0x4000000) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="33fe00005e"], 0xfe33) r5 = syz_clone(0x40049200, &(0x7f0000000140)="72aecf027db313368b0af982aacc2960777f9a36d0319722676b05925d", 0x1d, &(0x7f00000002c0), &(0x7f00000003c0), &(0x7f0000000500)="19503235d98e051cb74a597eaeb2d005b86cc5d371cf64b124bc5c2ed27fe259a394f567013e63618530aec794fd36c0c25a05ed9c559a899d1e8a3e1a048c2aa19e3e07d4a80c1bce4a43dbd3c17bf0a54d4a271fa59c5d54c2386966e287483aec5e6cd358961b0810bfa78e41d76d121d1fc7473a47bddc917bc8a431723b8cb6ffe5c59b97fb36752f047355f38e709d6043d83af6459b0531dd3ff96edc") perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x480783, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602, 0x403, 0x6, 0x0, 0x350, 0x4}, r5, 0xb, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r6, 0x6, 0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000640), 0x8}, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)=@generic={&(0x7f0000000440)='./cgroup/../file0/file0\x00', r2}, 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000ac0)=""/166, 0xa6}], 0x1, &(0x7f0000000bc0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb0}, 0x0) r8 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x890b, &(0x7f0000000000)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002c80)={&(0x7f0000000180)={0x2, 0x4e22, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000002bc0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x41}, @remote}}}], 0x20}, 0x20000004) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100fd0080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES8=r7, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) 13m40.994131468s ago: executing program 4 (id=1151): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80720, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="0f0200003a000517d25a80648c63940d0324fc600b020005280008c321d51f000200080000003e37eb248833c33ccf43bf38", 0x32}, {&(0x7f0000000240)="14ea6b09a80fdd9810700f03d15a4c5ed13c5c9768b359f879a6db6ee18a54321484f4f48481dc5f007ccb4e5142a37bb45726fa7e5362f171c9a4ee99949c6e867251ba84edb024a97e8be1ad62727bb4bed90e4a62941a8336517c6f875606f41898dd831b4a7aec1b41c0c135332020604e9c34ccde232d5b9c76f91adf73c72a6cd62933753ec2263f5067bff09d4bcc1c5665c74e9bb7bc525daaffd17491087a5ffd5fd65eb611c415a9c885535e7d8f4c8058ad267e61da6db9585f4b41357e4823de2a70f4399ed933edbc", 0xcf}, {&(0x7f0000000340)="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", 0xfa}, {&(0x7f0000000440)="de19f496ca4908ffcc0049bc7dae9c6a39a13cb6", 0x14}], 0x4, 0x0, 0x0, 0x6c000000}, 0x0) 13m40.700423506s ago: executing program 4 (id=1154): perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x97a4c4e, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000079104800000000007104240000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x1f00, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000010008188040f80ec59acbc0413a181003100000002010000000000000e000a000f000000028002002d1f", 0x2e}], 0x1}, 0x40) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r2 = openat$cgroup_devices(r1, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r2, &(0x7f0000000180)=ANY=[@ANYBLOB='b 0:', @ANYRESDEC], 0x10) recvmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000180)=@ethernet={0x0, @local}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000200)=""/104, 0x68}, {&(0x7f0000000300)=""/15, 0xf}, {&(0x7f0000000340)=""/41, 0x29}, {&(0x7f0000000380)=""/36, 0x24}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)=""/127, 0x7f}], 0x7}, 0x140) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, @perf_config_ext={0x9, 0x711fec55}, 0x86c6}, 0x0, 0x2000000000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x1000000830d}, 0x0, 0x2, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x84) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r3, 0x84, 0x77, &(0x7f0000000000)=r4, 0x62) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1c, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) r7 = perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x9, 0xc, 0x5, 0x0, 0x0, 0x3, 0x400, 0x6, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_bp={0x0}, 0x80, 0x400, 0x10, 0x0, 0x8, 0xa, 0x6, 0x0, 0x9000, 0x0, 0x100000001}, 0xffffffffffffffff, 0x5, r6, 0x0) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x2}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r5, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0], 0x0, 0x94, &(0x7f00000007c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x66, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f0000000a00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14a, 0x14a, 0x2, [@int={0xe, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x22, 0x4}, @datasec={0x1, 0x8, 0x0, 0xf, 0x1, [{0x1, 0x4, 0xfffffff7}, {0x3, 0xff, 0xe157}, {0x3, 0x9, 0xdc}, {0x1, 0x7, 0x5}, {0x5, 0xb3a, 0x6}, {0x4, 0x9, 0x3}, {0x2, 0x2, 0x6}, {0x4, 0x5fc, 0x1}], "93"}, @datasec={0x5, 0x9, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0x5, 0x1dce}, {0x1, 0x73c, 0xffffffff}, {0x3, 0xfffffff7, 0x1}, {0x1, 0x3, 0x1}, {0x2, 0x2, 0x7fffffff}, {0x2, 0x9fa3, 0xffffffff}, {0x2, 0x2, 0xff}, {0x5, 0x6, 0xfff}], '\x00'}, @const={0xc, 0x0, 0x0, 0xa, 0x4}, @type_tag={0xd, 0x0, 0x0, 0x12, 0x4}, @func={0x7, 0x0, 0x0, 0xc, 0x5}, @fwd={0x5}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}, @enum={0xb, 0x1, 0x0, 0x6, 0x4, [{0x1, 0x3}]}]}}, &(0x7f0000000b80)=""/195, 0x166, 0xc3, 0x0, 0x0, 0x10000, @value=r5}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r5, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000000d80)=[0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd6, &(0x7f0000000e00)=[{}], 0x8, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x84, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001040)={0x1b, 0x0, 0x0, 0x2, 0x0, r7, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x0, 0x12, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9a4, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0xc}, @generic={0x0, 0xd, 0xb, 0x1000, 0x3ff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000340)='GPL\x00', 0x0, 0xd9, &(0x7f00000004c0)=""/217, 0x41100, 0x0, '\x00', r9, @fallback=0xf1031c9195c9f5c9, r10, 0x8, &(0x7f0000000cc0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000d00)={0x3, 0x9, 0x10, 0x2}, 0x10, r11, 0xffffffffffffffff, 0x0, &(0x7f00000010c0)=[r12], &(0x7f0000001100), 0x10, 0x2}, 0x94) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x1, 0x4, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002c80)=@bpf_lsm={0x1d, 0x17, &(0x7f00000026c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x30}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @map_fd={0x18, 0x7, 0x1, 0x0, r4}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x40}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x111c}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x6, 0x2, 0x8, 0xea45, 0x3}, @exit]}, &(0x7f0000002780)='GPL\x00', 0x7, 0x7b, &(0x7f00000027c0)=""/123, 0x41000, 0x16, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000002b40)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000002b80)={0x1, 0x1, 0x4, 0x6}, 0x10, r11, 0x0, 0x8, &(0x7f0000002bc0)=[r4, r4, r4, 0xffffffffffffffff, r13, 0xffffffffffffffff, r4, r4, 0x1], &(0x7f0000002c00)=[{0x3, 0x5, 0xb, 0x2}, {0x2, 0x3, 0xc, 0x5}, {0x0, 0x4, 0x3}, {0x0, 0x2, 0x6, 0xc}, {0x0, 0x1, 0xb, 0xb}, {0x3, 0x5, 0x0, 0x1}, {0x5, 0x5, 0x3}, {0x1, 0x5, 0xe, 0xc}], 0x10, 0x9}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002600)={0xffffffffffffffff, 0x58, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002640)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x0, '\x00', r14, 0xffffffffffffffff, 0x0, 0x5, 0x5}, 0x50) 13m39.875185168s ago: executing program 4 (id=1159): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="d80000001e0081054e81f782db4cb904021d080006007c09e8fe04a1190008800d00000003600e1208000f0000000406a80016c0080009400400027c035c0461c1d67f6f00a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42abbcbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a9410000000000000000", 0xd8}], 0x1}, 0x0) r1 = socket$kcm(0x2, 0x922000000001, 0x106) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="050000000000000073117000000000008510000002000000850000000500010095000000000000009500a505000000009e3c5012d001cd60cd367e723983fe12f001bbc74e"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x248, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000, 0x10001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x3, 0x5, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x63, 0x11, 0x9c}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="85000000070000006a0a00ff001800000c00000000000000950000000000000018100000", @ANYRES32, @ANYBLOB="000000000000000005000000000000009500000001000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) r2 = socket$kcm(0x2, 0x922000000001, 0x106) setsockopt$sock_attach_bpf(r2, 0x29, 0x42, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xf, &(0x7f0000000140)=ANY=[@ANYBLOB="180000007f000000000000000400000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000002e000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500"/96], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001d40)=@base={0x12, 0x1, 0x4, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r5}, &(0x7f0000000040), &(0x7f0000000140)=r4}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r5}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r4}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r5, &(0x7f0000000040)}, 0x20) close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r7, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9ff, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0xc}, 0x8000, 0x0, 0x80000, 0x1, 0x0, 0x0, 0x3, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r6, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r9 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r9, 0x1, 0x41, &(0x7f0000000040)=r8, 0x4) sendmsg$kcm(r9, &(0x7f0000000580)={&(0x7f00000001c0)=@in6={0xa, 0x4e21, 0x4, @mcast2, 0x9}, 0x80, 0x0}, 0x4000080) recvmsg$kcm(r9, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x2042) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f00000002c0)=@l2tp={0x2, 0x0, @loopback, 0xfffffffe}, 0x80, &(0x7f0000000180)=[{0x0}], 0x1}, 0x6002040d) 13m39.298195394s ago: executing program 4 (id=1164): bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0a00000005000000020000000400000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000005f421be64f3497976e4f968b02df71fb7407110a8e5cdf4059b61a0d4db9b1f5e834a4d83367c0df07a59ce3e32239e33da10c61f3bdc84d125e50eca16c4bd45d4c6af928e169e74023cd44120d256dc38deaf278aa7cb26aa2d051c3356481abcc04c2ad45c440ff64cfdb"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1b0000000000000000000000008000", @ANYRES32, @ANYBLOB="00000000000000000000000800220000b1d2fd00", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffa23ab4e4, 0x9}, 0x104101, 0x14, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0x40, 0x1, 0x5, 0x0, 0x8, 0x10, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x22d0, 0x2, @perf_config_ext={0x26, 0x5}, 0xa800, 0x0, 0x7ff, 0x5, 0x6, 0x9, 0x7, 0x0, 0x1, 0x0, 0x7}, 0x0, 0x7, r3, 0x3) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="d80000001e0081054e81f782db4cb9040a1d080006007c095dd2086518000a800d00000003600e1208000f0000000406a80016c0080009", 0x37}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x7, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000720000001801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="33fe0000180091c8b14a0778a8123d181d"], 0xfe33) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0200000004000000040000000100000000110000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000100000000000000000"], 0x48) sendmsg$unix(r1, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30028, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000080)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, 0x0, 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r6, 0x27, 0xe, 0x0, &(0x7f0000000000)="f8ad1dcc02db0200000032f08100", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0e0000000400000004"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 13m38.588871523s ago: executing program 4 (id=1170): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d00)={&(0x7f0000000a80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0xc, [@union={0xd, 0x8, 0x0, 0x5, 0x0, 0x269, [{0x1, 0x3, 0x8}, {0xb, 0x2, 0x7}, {0xc, 0x2, 0x80000000}, {0xe, 0x1, 0x2}, {0xd, 0x0, 0x5}, {0xa, 0x4, 0x7}, {0x7, 0x5, 0xfffffffc}, {0x3, 0x4, 0x4}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0x9}}]}, {0x0, [0x2e, 0x7f, 0x5f, 0x61, 0x0, 0x0, 0x30, 0x5f, 0x0, 0x61]}}, &(0x7f0000000b40)=""/194, 0xa8, 0xc2, 0x1, 0x2}, 0x28) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x830d}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x0, 0x0, &(0x7f0000000480)='GPL\x00'}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000a00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f00000002c0)=@l2tp={0x2, 0x0, @remote, 0x4000000}, 0x80, &(0x7f0000000180)=[{&(0x7f0000001040)}, {&(0x7f0000002b40)="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", 0x100}], 0x2}, 0x8400) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x800, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x22, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4e0, 0x0, 0x0, 0x0, 0x564e}, {}, {}, [@btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}, @tail_call, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @generic={0x0, 0xc, 0xe, 0x7, 0x2}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000006c0)='syzkaller\x00', 0x7f, 0x0, 0x0, 0x41000, 0x50, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x8, 0x1c25, 0xffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r3, r1], &(0x7f0000000880), 0x10, 0x9}, 0x94) socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x18, 0x7, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000008510000003003ea50f00000000000000000000000000000095000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x1a) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdfe, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffe55, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r5, 0x0, 0x0}, 0x10) r6 = socket$kcm(0x1e, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x6, 0x7, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r4, 0x58, &(0x7f0000000600)}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x8, 0x4, 0x4, 0x6, 0x0, r0}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7030000070000008500000021000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r8, 0x13, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 13m37.987534949s ago: executing program 4 (id=1174): socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x7, 0x7f}, 0x10000, 0x8, 0x0, 0x3, 0xc2, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4000000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff}, 0x111400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x58, &(0x7f0000000180)}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5}, 0x94) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_tracing={0x1a, 0x1d, &(0x7f0000000980)=ANY=[@ANYBLOB="2b580000f0ffffff183000000300000000000000000000008510000003000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a500000018420000010000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000080000008500000006000000186a00000d000000000000000d000200"], &(0x7f0000000140)='GPL\x00', 0xfffffffa, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0x9, 0x7, 0x95}, 0x10, 0x1d43a, r1, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x400}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r2, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000006c0)=[0x0], 0x0, 0x0, 0x5b, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x85, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) close(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1200000009000000040000000200000000000000"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r5}, &(0x7f00000004c0), &(0x7f0000000400)=r3}, 0x20) r6 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0x800}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @call={0x85, 0x0, 0x0, 0x23}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x53, &(0x7f0000000a80)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f00000003c0), 0x8, 0xb5, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) close(r0) socket$kcm(0x11, 0xa, 0x300) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0xba4ee230eabac5a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3ab, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x5, 0x0, 0x3, 0x80, 0x1, 0x1}, 0x0, 0x1, r0, 0x0) ioctl$TUNGETVNETLE(r0, 0x8955, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) socket$kcm(0xa, 0x2, 0x0) 13m22.802024828s ago: executing program 33 (id=1174): socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x7, 0x7f}, 0x10000, 0x8, 0x0, 0x3, 0xc2, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4000000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff}, 0x111400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0x1, 0x58, &(0x7f0000000180)}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5}, 0x94) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_tracing={0x1a, 0x1d, &(0x7f0000000980)=ANY=[@ANYBLOB="2b580000f0ffffff183000000300000000000000000000008510000003000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a500000018420000010000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000080000008500000006000000186a00000d000000000000000d000200"], &(0x7f0000000140)='GPL\x00', 0xfffffffa, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0x9, 0x7, 0x95}, 0x10, 0x1d43a, r1, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x400}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r2, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000006c0)=[0x0], 0x0, 0x0, 0x5b, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x85, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) close(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1200000009000000040000000200000000000000"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r5}, &(0x7f00000004c0), &(0x7f0000000400)=r3}, 0x20) r6 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0x800}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @call={0x85, 0x0, 0x0, 0x23}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x53, &(0x7f0000000a80)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f00000003c0), 0x8, 0xb5, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) close(r0) socket$kcm(0x11, 0xa, 0x300) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0xba4ee230eabac5a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3ab, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x5, 0x0, 0x3, 0x80, 0x1, 0x1}, 0x0, 0x1, r0, 0x0) ioctl$TUNGETVNETLE(r0, 0x8955, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)) socket$kcm(0xa, 0x2, 0x0) 13m5.64070132s ago: executing program 5 (id=1320): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x4) socket$kcm(0x10, 0x7, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="61106800000000006113740000000000bfa00000000000000700000008ffffffd503010017740040950000000000000069163a0000000000bf67000000000000350607000fff07201706000020190000160300000ee60060bf050000000000007b650000000000006507f9ff01000000070700004d83dde4c375000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f17540faf80250aa20c669a5e12814cb1cea5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369226066812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000400c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20ceddf4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10fd7ed6735154beb4000000000000000000000000004000bc00f6746a9709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c1d926a0f6a5480a55c22fe3a5ac00000000000000000000000500002000000000fb79ea00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e14d90deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b06ff7f0000000000007f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a1f37302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089e0b1c23c0f3cdad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a1a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631d22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0af1cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4c6ea9604faf0453bedf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c29984864961a57ff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a09d8be0fc5beecf153236c19740be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000000000000000000000000000000000001386866b311bd144bc32e059658c9f8342c90c1ade31b78072841b8b5a943d62a44cea6b050c42e3c205fad6a23fb43c93da0f49d911877265e6ee443e37397ecf89021e7f579e8d3a74c12b52938d91e9de07fc8eeeb9505f4a9c26266bf5449484ccc1317c7476"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) 13m4.638489487s ago: executing program 5 (id=1325): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x16, 0xb, &(0x7f00000009c0)=@framed={{0x18, 0x2}, [@printk={@p, {0x3, 0x3, 0x6, 0xa, 0x1, 0xfff8, 0x41}, {0x4, 0x1, 0xb, 0x1, 0xa, 0x0, 0x10000000}, {}, {}, {}, {0x85, 0x0, 0x0, 0x5}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 13m4.402340883s ago: executing program 5 (id=1328): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d00)={&(0x7f0000000a80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0xc, [@union={0xd, 0x8, 0x0, 0x5, 0x0, 0x269, [{0x1, 0x3, 0x8}, {0xb, 0x2, 0x7}, {0xc, 0x2, 0x80000000}, {0xe, 0x1, 0x2}, {0xd, 0x0, 0x5}, {0xa, 0x4, 0x7}, {0x7, 0x5, 0xfffffffc}, {0x3, 0x4, 0x4}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0x9}}]}, {0x0, [0x2e, 0x7f, 0x5f, 0x61, 0x0, 0x0, 0x30, 0x5f, 0x0, 0x61]}}, &(0x7f0000000b40)=""/194, 0xa8, 0xc2, 0x1, 0x2}, 0x28) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x830d}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x0, 0x0, &(0x7f0000000480)='GPL\x00'}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000a00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f00000002c0)=@l2tp={0x2, 0x0, @remote, 0x4000000}, 0x80, &(0x7f0000000180)=[{&(0x7f0000001040)}, {&(0x7f0000002b40)="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", 0x100}], 0x2}, 0x8400) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x800, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) socket$kcm(0x18, 0x7, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdfe, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffe55, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r2, 0x0, 0x0}, 0x10) r3 = socket$kcm(0x1e, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x6, 0x7, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000600)}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x8, 0x4, 0x4, 0x6, 0x0, r0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7030000070000008500000021000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x13, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 13m3.345390471s ago: executing program 5 (id=1331): r0 = socket$kcm(0x10, 0x2, 0x0) r1 = getpid() r2 = perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x4, 0x3, 0x7, 0x9, 0x0, 0x0, 0x8812, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0x9, 0x7}, 0x18104, 0x3, 0x6, 0x6, 0x5, 0x2, 0x0, 0x0, 0x1, 0x0, 0xfaee}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={r1, r2, 0x0, 0x2, &(0x7f0000000580)='-\x00'}, 0x30) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYRESHEX=r0], 0xfe33) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) r5 = perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x64, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x800}, 0x0, 0x0, 0x0, 0x4, 0x6, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000940)={0x0, 0xe, &(0x7f0000000000)=[{&(0x7f00000001c0)="d8000000180081054e81f782db44b904021d005c06007c09e8fe55a10a0015400600142603600e1208000b0000000401a8001600a400014009000200036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360d070100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0xf242, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f00000002c0)=ANY=[@ANYBLOB="da04e427c48d59a7e0dee6deedb3c818000000a00000001800000018000000050000000000000001000085000000000220000000000000000000140000613000"], &(0x7f00000000c0)=""/236, 0x35, 0xec, 0x1}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000030000b02d25a806f8c2d94f90524fc60", 0x14}], 0x1, 0x0, 0x0, 0x4000}, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000300)=':&\x00') r9 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r9, 0x1, 0x21, &(0x7f0000000380), 0x4) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x746f2f51, &(0x7f0000000080)=[{&(0x7f0000000040)="3f0400001c00810ce00f80ecdb4cb9f207c804a01f000000030006fb0a0002000a0ada1b40d80300000000000000", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 13m2.591101502s ago: executing program 5 (id=1337): r0 = perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001880)=ANY=[@ANYBLOB="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", @ANYRESDEC=r0], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x2}, 0x100c, 0x1, 0x0, 0x9, 0xd, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.stat\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) ioctl$SIOCSIFHWADDR(r2, 0x8b32, &(0x7f0000001700)={'wlan1\x00', @random}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8b18, &(0x7f0000000000)={'wlan1\x00', @random="010000000700"}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x3e}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r2, 0xe0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001180)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x20000000) recvmsg(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) close(r4) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={0x0, 0x8, 0x18}, 0xc) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="020000000400000008", @ANYRES32=0x1, @ANYBLOB="0a00000000000000000000ecffffffffffffff00", @ANYRES32=0x0, @ANYRES32], 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="020000000400000008000000010000008000", @ANYBLOB="0200000000000000000000000000000000005b39", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00'], 0x50) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000380)={'veth0_to_bond', 0x32, 0x38}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791090000000000057000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x5, '\x00', 0x0, @flow_dissector}, 0x48) socket$kcm(0x10, 0x7, 0x0) r6 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x29, 0x4c, &(0x7f00000000c0), 0x4) 13m1.947355159s ago: executing program 5 (id=1340): perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="48000000140081fb7059ae08060c040002fff903905800000000000000006fabca3b4e7d06a6bd7c00000000030000068a562ad6e74703c48f93bc06020000004603b886a5e54f8f", 0x48}], 0x1}, 0x4000000) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$LINK_DETACH(0x22, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) sendmsg$inet(r3, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r4 = socket$kcm(0x10, 0x100000000002, 0x4) sendmsg$kcm(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)="39000000140081ae00002c000500015601618575e285af0180000000171300883795c04a31ba377a1b2cc32b38d3740000ffffffffffffffff", 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000280)=ANY=[@ANYBLOB='+cpu'], 0x5) write$cgroup_subtree(r6, &(0x7f0000000180)={[{0x2d, 'rdma'}, {0x2d, 'cpu'}]}, 0xb) syz_clone(0x4b200000, 0x0, 0x0, 0x0, 0x0, 0x0) 12m46.878945845s ago: executing program 34 (id=1340): perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="48000000140081fb7059ae08060c040002fff903905800000000000000006fabca3b4e7d06a6bd7c00000000030000068a562ad6e74703c48f93bc06020000004603b886a5e54f8f", 0x48}], 0x1}, 0x4000000) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$LINK_DETACH(0x22, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) sendmsg$inet(r3, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r4 = socket$kcm(0x10, 0x100000000002, 0x4) sendmsg$kcm(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)="39000000140081ae00002c000500015601618575e285af0180000000171300883795c04a31ba377a1b2cc32b38d3740000ffffffffffffffff", 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000280)=ANY=[@ANYBLOB='+cpu'], 0x5) write$cgroup_subtree(r6, &(0x7f0000000180)={[{0x2d, 'rdma'}, {0x2d, 'cpu'}]}, 0xb) syz_clone(0x4b200000, 0x0, 0x0, 0x0, 0x0, 0x0) 7m38.564615303s ago: executing program 3 (id=4348): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0x1, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xf, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1c, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) perf_event_open$cgroup(&(0x7f0000000380)={0x1, 0x80, 0x9, 0xc, 0x5, 0x0, 0x0, 0x3, 0x400, 0x6, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_bp={0x0}, 0x80, 0x400, 0x10, 0x0, 0x8, 0xa, 0x6, 0x0, 0x9000, 0x0, 0x100000001}, 0xffffffffffffffff, 0x5, r3, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x2}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r2, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0], 0x0, 0x94, &(0x7f00000007c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x66, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c80)={&(0x7f0000000a00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14a, 0x14a, 0x2, [@int={0xe, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, 0x22, 0x4}, @datasec={0x1, 0x8, 0x0, 0xf, 0x1, [{0x1, 0x4, 0xfffffff7}, {0x3, 0xff, 0xe157}, {0x3, 0x9, 0xdc}, {0x1, 0x7, 0x5}, {0x5, 0xb3a, 0x6}, {0x4, 0x9, 0x3}, {0x2, 0x2, 0x6}, {0x4, 0x5fc, 0x1}], "93"}, @datasec={0x5, 0x9, 0x0, 0xf, 0x1, [{0x2, 0x3, 0x4}, {0x1, 0x5, 0x1dce}, {0x1, 0x73c, 0xffffffff}, {0x3, 0xfffffff7, 0x1}, {0x1, 0x3, 0x1}, {0x2, 0x2, 0x7fffffff}, {0x2, 0x9fa3, 0xffffffff}, {0x2, 0x2, 0xff}, {0x5, 0x6, 0xfff}], '\x00'}, @const={0xc, 0x0, 0x0, 0xa, 0x4}, @type_tag={0xd, 0x0, 0x0, 0x12, 0x4}, @func={0x7, 0x0, 0x0, 0xc, 0x5}, @fwd={0x5}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}, @enum={0xb, 0x1, 0x0, 0x6, 0x4, [{0x1, 0x3}]}]}}, &(0x7f0000000b80)=""/195, 0x166, 0xc3, 0x0, 0x0, 0x10000, @value=r2}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r2, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000000d80)=[0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd6, &(0x7f0000000e00)=[{}], 0x8, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x84, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x0, 0x12, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9a4, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0xc}, @generic={0x0, 0xd, 0xb, 0x1000, 0x3ff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000340)='GPL\x00', 0x0, 0xd9, &(0x7f00000004c0)=""/217, 0x41100, 0x0, '\x00', r5, @fallback=0xf1031c9195c9f5c9, r6, 0x8, &(0x7f0000000cc0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000d00)={0x3, 0x9, 0x10, 0x2}, 0x10, r7, r1, 0x0, &(0x7f00000010c0)=[0xffffffffffffffff], &(0x7f0000001100), 0x10, 0x2}, 0x94) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x401, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x13, 0x6, &(0x7f0000000040)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xfc000000}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0xa2}, @call={0x85, 0x0, 0x0, 0xb5}], &(0x7f00000000c0)='GPL\x00', 0x7, 0xa9, &(0x7f0000000100)=""/169, 0x41000, 0x17, '\x00', r0, @fallback=0x27, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0xd, 0x0, 0x1}, 0x10, r7, 0xffffffffffffffff, 0x3, &(0x7f0000000340)=[r8], &(0x7f0000000380)=[{0x0, 0x4, 0xa, 0x3}, {0x1, 0x4, 0xe}, {0x5, 0x3, 0x4, 0x4}], 0x10, 0x6}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000071114200000000008510000002000000850000000500000095000d00000000009500a50000000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) 7m38.266630271s ago: executing program 3 (id=4351): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r2, &(0x7f0000000b40)={&(0x7f0000000080)={0x2, 0x4e20, @multicast1}, 0xa, &(0x7f0000000000)=[{&(0x7f0000000800)="e9", 0x1}, {&(0x7f00000017c0)="ea0189bdebb0c16d420ee9b95082abd6431cc7afc22c4a6b8adecef68f76bd81a86e89f9c80e5c868a12b09e80ba8c01eb3f4b7be71f9fc2355c336cedc15eb778e3a3b35c3f72629ea4d9be42cf4c17255815fb8a47aafd8b8ff0c202b4e09f7c42811261b5e1ff000000b4329ccb799b06ca0b6dcfaf2cf8dbb51946e89c862e9252731f680ec50326fc16386aeefe654bac24", 0x94}], 0x2, &(0x7f0000000100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x10}, @loopback}}}], 0x20}, 0xe900) sendmsg$kcm(r2, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x40050) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x12}, 0x0) r4 = socket$kcm(0x28, 0x5, 0x0) setsockopt$sock_attach_bpf(r4, 0x28, 0x2, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100036c00fc08000000"], 0xfdef) 7m38.197279403s ago: executing program 3 (id=4353): r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x7fff, @local, 0x8}, 0x80, &(0x7f0000000340)=[{&(0x7f00000003c0)='`', 0x1}], 0x1}, 0x41) setsockopt$sock_attach_bpf(r0, 0x84, 0x1e, &(0x7f0000000000), 0x4) setsockopt$sock_attach_bpf(r0, 0x84, 0x1e, &(0x7f0000000040), 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000006dc0)={0xb, 0x8, &(0x7f00000003c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7030000070000008500000021000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 7m37.998668269s ago: executing program 3 (id=4354): mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$kcm(0x2, 0x1, 0x0) socket$kcm(0x21, 0x2, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x21}, 0x50) socket$kcm(0x2, 0x922000000001, 0x106) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.events\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380)}], 0x1, &(0x7f0000007880)}, 0x0) 7m37.837228163s ago: executing program 3 (id=4358): r0 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) sendmsg$inet(r0, 0x0, 0x80d1) recvmsg$kcm(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000580)=""/105, 0x69}, {&(0x7f0000000600)=""/118, 0x76}, {&(0x7f0000000680)=""/75, 0x4b}, {&(0x7f0000000700)=""/105, 0x69}, {&(0x7f0000000780)=""/49, 0x31}, {&(0x7f00000007c0)=""/142, 0x8e}, {&(0x7f0000000880)=""/243, 0xf3}], 0x7, &(0x7f0000000a00)=""/163, 0xa3}, 0x100) 7m37.704809446s ago: executing program 3 (id=4359): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x152, 0x1, 0x0, 0x2, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="d8000000180081064e81f782db4cb90402200800fd007c05e8fe55a10a000b000140020203600e41b0000500ac0006031100000016001500090002000000035c3b61c1d67f6f94007134cf6efb8000a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9000000008af26c8b7b55f4d2a6823a45f28fcb1d", 0xd8}], 0x1}, 0x0) socket$kcm(0x2, 0x200000000000001, 0x106) r1 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000600)={&(0x7f0000000580)=@tipc=@name={0x1e, 0x2, 0x3, {{0x41, 0x1}, 0x1}}, 0x80, 0x0}, 0x48811) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004", @ANYRES32, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) close(0xffffffffffffffff) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x3d, 0x0, 0x1, 0x20}, {0x4d}, {0x6}]}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000100), &(0x7f00000001c0)}, 0x20) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000000c0)=ANY=[], 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.idle_time\x00', 0x275a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000003e0000002400000004000000000000000300000d0000000001000000038e9ebc774b09e51a24283100000003000000030000000d00000004000000"], &(0x7f0000001080)=""/190, 0x40, 0xbe, 0x1}, 0x28) setsockopt$sock_attach_bpf(r6, 0x1, 0x2a, &(0x7f0000000100)=r7, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@fallback, 0x5, 0x1, 0x400, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x40) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xf6, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f008004be0ffff00124000632f77fbacf01416ac141416440c05114d2f87e5940c05ab861813f2325f1a39010702038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff400", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) socket$kcm(0x10, 0x2, 0x0) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x6, 0x4, 0x1, 0x20000008, 0x0, r9}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r10, 0x58, &(0x7f0000000340)}, 0x10) 7m22.636852149s ago: executing program 35 (id=4359): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x152, 0x1, 0x0, 0x2, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="d8000000180081064e81f782db4cb90402200800fd007c05e8fe55a10a000b000140020203600e41b0000500ac0006031100000016001500090002000000035c3b61c1d67f6f94007134cf6efb8000a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9000000008af26c8b7b55f4d2a6823a45f28fcb1d", 0xd8}], 0x1}, 0x0) socket$kcm(0x2, 0x200000000000001, 0x106) r1 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000600)={&(0x7f0000000580)=@tipc=@name={0x1e, 0x2, 0x3, {{0x41, 0x1}, 0x1}}, 0x80, 0x0}, 0x48811) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004", @ANYRES32, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) close(0xffffffffffffffff) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x3d, 0x0, 0x1, 0x20}, {0x4d}, {0x6}]}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000100), &(0x7f00000001c0)}, 0x20) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000000c0)=ANY=[], 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.idle_time\x00', 0x275a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000003e0000002400000004000000000000000300000d0000000001000000038e9ebc774b09e51a24283100000003000000030000000d00000004000000"], &(0x7f0000001080)=""/190, 0x40, 0xbe, 0x1}, 0x28) setsockopt$sock_attach_bpf(r6, 0x1, 0x2a, &(0x7f0000000100)=r7, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@fallback, 0x5, 0x1, 0x400, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)}, 0x40) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xf6, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f008004be0ffff00124000632f77fbacf01416ac141416440c05114d2f87e5940c05ab861813f2325f1a39010702038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff400", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) socket$kcm(0x10, 0x2, 0x0) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x6, 0x4, 0x1, 0x20000008, 0x0, r9}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r10, 0x58, &(0x7f0000000340)}, 0x10) 18.346928387s ago: executing program 0 (id=8690): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x15, 0x5, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0xffff, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8008, 0x4, 0x43a1bd76, 0x7, 0x9, 0x2, 0x2, 0x0, 0xd62, 0x0, 0x2009}, 0x0, 0x10, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32], 0x48) socket$kcm(0x10, 0x2, 0x2) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x10040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x2, 0x20000}, 0x102065, 0x0, 0x0, 0x3, 0x7, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x1e, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x404a) recvmsg$kcm(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/173, 0xad}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000007c0)=ANY=[@ANYRES32=r0, @ANYBLOB="1e000100110000001031bc22486b1ea92c3c4b1d6e576e016ba671b0", @ANYRES32=r0, @ANYBLOB, @ANYBLOB], 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b000000000000000000000000000400000000003d16c436b1a8f058823797ece31c0d036f2dc8963d11714c20c369ef6f8d7d70fe510b01822c0d210c515092258302aac1f64a105e81cc2bcb8c2872ae989b6e0acb98d2461932c69aabc518666f2e9c45397f153ac8ac82d255d5b6f7af0c2031c88990246cc908a265151155e28bb0b348bf84a1fe713319343c36a20d7d0ac5b555c737ac22d01830e73f3270f1275cd63d25d5fbdc7da4377366b04b53c92a9fa4e7d251ad637561b6b44199a1c26c874a07d6f7e12dd8733c16aa8a77c3dc3214876c1ccff6752ed74ab4eea12e8cc4a0ff921eea37000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x5, 0xf, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x8}, {0x4, 0x1, 0xb, 0x9, 0x0, 0x8}}, {{0x6, 0x0, 0xb, 0xa}, {0xf}}, [], {{0x7, 0x1, 0x3, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback=0x2, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x6, 0x5, 0xa, 0x8001, 0x0, 0x0, 0x0, 0x4713}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[@ANYRESOCT=r4], 0x9) syz_clone(0x4001000, 0x0, 0x408, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2ff12ef5, 0x18}, 0xc) close(r2) socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8b18, &(0x7f0000000000)={'wlan1\x00', @random="010000000700"}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) 17.560734649s ago: executing program 0 (id=8695): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0xa, 0x2, 0x73) setsockopt$sock_attach_bpf(r1, 0x29, 0x35, 0x0, 0xfcd8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x12, 0xc, 0x4, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000380)=r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r3, &(0x7f0000000500)="b4767c8ad3", &(0x7f0000000400)=""/198}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) socket$kcm(0xa, 0x2, 0x73) (async) setsockopt$sock_attach_bpf(r1, 0x29, 0x35, 0x0, 0xfcd8) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x12, 0xc, 0x4, 0x2}, 0x50) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r2}, &(0x7f0000000080), &(0x7f0000000380)=r0}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r3, &(0x7f0000000500)="b4767c8ad3", &(0x7f0000000400)=""/198}, 0x20) (async) 17.038054263s ago: executing program 0 (id=8700): r0 = socket$kcm(0x2, 0x5, 0x84) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x25, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000200)}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000001180)={&(0x7f00000006c0)={0x2, 0x4e21, @empty}, 0x10, 0x0, 0x0, &(0x7f0000001040)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @local}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x74}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x2e}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfb1}}], 0xa0}, 0x20000804) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x959, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r4 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x2, &(0x7f0000000000)=r7, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000e5000000000000000018010000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000800)=':\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x1a, 0x21, &(0x7f0000000ec0)=ANY=[@ANYBLOB="1800000000000000000000000c00000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000b7080000000000007b8af8ff00000000b7080000916300007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000cd131000ffffffff183a000004000000000000000000000018140000", @ANYBLOB], &(0x7f0000000b40)='GPL\x00', 0xccf, 0x2f, &(0x7f0000000b80)=""/47, 0x41000, 0x0, '\x00', r1, @tracing=0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r8, 0x8, &(0x7f0000000d40)=[r2, r3, r7, r3], &(0x7f0000000d80)=[{0x5, 0x4, 0x7, 0x1}, {0x3, 0x2, 0x7, 0x4}, {0x0, 0x3, 0x9, 0x4}, {0x5, 0x3, 0x10, 0x2}, {0x3, 0x1, 0x3, 0xb}, {0x4, 0x2, 0x3, 0x5}, {0x0, 0x5, 0x8, 0xc}, {0x1, 0x5, 0xc, 0x1}], 0x10, 0x10000}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, 0xffffffffffffffff) r10 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000840)="5400000037000b63d25a80648c2594f90a24fc601aed7123219afe6b298d4b12e74036397bc5f26e76cf89e67659fc0ed8b5818bfb0047debc8d1c5038b75d8263cc993a20fd1a077994eddcd264498606085c79", 0x54}], 0x1}, 0x24004800) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1f00, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000010008188040f80ec59acbc0413a181003100000002010000000000000e000a000f000000028002002d1f", 0x2e}], 0x1}, 0x40) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xffc0}], 0x1}, 0x80d1) close(r0) 15.469860326s ago: executing program 8 (id=8705): bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x15, 0x5, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0xffff, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8008, 0x4, 0x43a1bd76, 0x7, 0x9, 0x2, 0x2, 0x0, 0xd62, 0x0, 0x2009}, 0x0, 0x10, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32], 0x48) socket$kcm(0x10, 0x2, 0x2) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x10040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x2, 0x20000}, 0x102065, 0x0, 0x0, 0x3, 0x7, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, 0x0}, 0x0) r1 = socket$kcm(0x1e, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x404a) recvmsg$kcm(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/173, 0xad}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000007c0)=ANY=[@ANYRES32=r0, @ANYBLOB="1e000100110000001031bc22486b1ea92c3c4b1d6e576e016ba671b0", @ANYRES32=r0, @ANYBLOB, @ANYBLOB], 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b000000000000000000000000000400000000003d16c436b1a8f058823797ece31c0d036f2dc8963d11714c20c369ef6f8d7d70fe510b01822c0d210c515092258302aac1f64a105e81cc2bcb8c2872ae989b6e0acb98d2461932c69aabc518666f2e9c45397f153ac8ac82d255d5b6f7af0c2031c88990246cc908a265151155e28bb0b348bf84a1fe713319343c36a20d7d0ac5b555c737ac22d01830e73f3270f1275cd63d25d5fbdc7da4377366b04b53c92a9fa4e7d251ad637561b6b44199a1c26c874a07d6f7e12dd8733c16aa8a77c3dc3214876c1ccff6752ed74ab4eea12e8cc4a0ff921eea37000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x5, 0xf, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x8}, {0x4, 0x1, 0xb, 0x9, 0x0, 0x8}}, {{0x6, 0x0, 0xb, 0xa}, {0xf}}, [], {{0x7, 0x1, 0x3, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback=0x2, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x6, 0x5, 0xa, 0x8001, 0x0, 0x0, 0x0, 0x4713}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[@ANYRESOCT=r4], 0x9) syz_clone(0x4001000, 0x0, 0x408, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2ff12ef5, 0x18}, 0xc) close(r2) socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8b18, &(0x7f0000000000)={'wlan1\x00', @random="010000000700"}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) 14.831968144s ago: executing program 8 (id=8706): socket$kcm(0x10, 0x400000002, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000040000000800000001", @ANYRES32, @ANYBLOB="000000000300"/20], 0x20) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5931, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x202, 0x0, 0xffffffff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYRES16=r3, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x11, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 14.528830252s ago: executing program 8 (id=8709): r0 = socket$kcm(0x2, 0x5, 0x84) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000001180)={&(0x7f00000006c0)={0x2, 0x4e21, @empty}, 0x10, 0x0, 0x0, &(0x7f0000001040)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x10}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1000}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @local}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x74}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x2e}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfb1}}], 0xd0}, 0x20000804) recvmsg$unix(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x959, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000), 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x2, &(0x7f0000000000)=r5, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000e50000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e3341858500000073000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000800)=':\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x1a, 0x21, &(0x7f0000000ec0)=ANY=[@ANYBLOB="1800000000000000000000000c00000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000b7080000000000007b8af8ff00000000b7080000916300007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000cd131000ffffffff183a000004000000000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000bf910000000000000800000000000000850000007d6b000000000000009500000000000000a05f7f19b5b5059ba70eb6f36f751f99b3ed9f02c4e8d827930077c69caaa26a0e5bc702d3fdf77877bcb06c03abe1e1"], &(0x7f0000000b40)='GPL\x00', 0xccf, 0x2f, &(0x7f0000000b80)=""/47, 0x41000, 0x0, '\x00', 0x0, @tracing=0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r6, 0x8, &(0x7f0000000d40)=[r1, 0xffffffffffffffff, r5, 0xffffffffffffffff], &(0x7f0000000d80)=[{0x5, 0x4, 0x7, 0x1}, {0x3, 0x2, 0x7, 0x4}, {0x0, 0x3, 0x9, 0x4}, {0x5, 0x3, 0x10, 0x2}, {0x3, 0x1, 0x3, 0xb}, {0x4, 0x2, 0x3, 0x5}, {0x0, 0x5, 0x8, 0xc}, {0x1, 0x5, 0xc, 0x1}], 0x10, 0x10000}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) r8 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000840)="5400000037000b63d25a80648c2594f90a24fc601aed7123219afe6b298d4b12e74036397bc5f26e76cf89e67659fc0ed8b5818bfb0047debc8d1c5038b75d8263cc993a20fd1a077994eddcd264498606085c79", 0x54}], 0x1}, 0x24004800) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1f00, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000010008188040f80ec59acbc0413a181003100000002010000000000000e000a000f000000028002002d1f", 0x2e}], 0x1}, 0x40) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xffc0}], 0x1}, 0x80d1) close(r0) 3.225568121s ago: executing program 6 (id=8752): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd, 0x8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="020000000400000008"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000940)={{r2, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000003c0)='%-010d \x00'}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000001700000000d1000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000001a40)="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", &(0x7f0000000a40)=""/99}, 0x20) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x5f, 0x0, 0x5f, 0x30, 0x30, 0x30, 0x5f]}}, &(0x7f0000000780)=""/119, 0x21, 0x77, 0x1, 0x3, 0x10000}, 0x28) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r2, @ANYBLOB='\t\x00'/20, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="05000000030000000300"/28], 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f0000000440), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x16, 0x10, &(0x7f0000000b00)=ANY=[@ANYBLOB="74f4220a46db30716c1fb032c1eda5f94a8c3957f8964eb790534ca712136b5f58b320ebeab360a3d575b681c23ceb7923313754926b6664056963a8eedce24feeadb2321d7d75da1512e5dd05f2b9ad4d58e4ea4ac503acd66fff9f3782d1f3bd31af4de6817ceb7c5f9c6077d571d77fb5e14e3d1af07691ff2a53d58050ccd0dc8e", @ANYRES16=r5, @ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x59, '\x00', 0x0, @flow_dissector=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x4, @perf_config_ext={0xff, 0x7f}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x8903, &(0x7f00000005c0)) r7 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000980)=ANY=[@ANYBLOB="050000000000000071119100000000008510000002000000020000000500000095000000000000009500a50500000000000d"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="8095ff00"/24], 0x0, 0x2, 0xfff, &(0x7f0000014000)=""/4095, 0x0, 0x0, '\x00', 0x0, @fallback, r7, 0x14, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0xfffffffe}, 0x10}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r8, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0xb4, &(0x7f0000000240)=[{}], 0x8, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0xab, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r9 = socket$kcm(0x2, 0x1, 0x0) r10 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r10, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000c40)='\nZ', 0x2}], 0x1}, 0x20000011) sendmsg$kcm(r10, &(0x7f0000003840)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000003c0)="ed49111b2051", 0x6}], 0x1}, 0x20000010) sendmsg$inet(r9, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x22250, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x0, 0x5, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$kcm(r1, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000880)="1a", 0x100000}], 0x1}, 0x0) 2.774752674s ago: executing program 6 (id=8755): socketpair(0xb, 0xa, 0x1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000001480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x90}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x8, &(0x7f0000000000)=[{&(0x7f0000000140)="d800000019007b29e00212ba0d8105040a601100fe02040b067c55a1bc3f1400090006990600000015000500fe800000000000000300014002000c0901ac04000bd67f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04fb95cae8c9010000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad8ffd5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd601edef3d93452a92307f00000e97031e9f05e9f16e9cb5000000000000", 0xd8}], 0x1, 0x0, 0x0, 0x2663}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000010000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d40)={0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000b00)={0x0, 0xf22fff7f, &(0x7f0000000180)=[{&(0x7f0000000080)="31de76fb398bc62d058b8a96924594f5476a0824be53f7a5949f80614c42391e4b80412938c955d34d37eb96ba7849c3eb823bb36724bd6f6d0219cfe5c884afcd2bdea5acf9c877c03dcdbbb3e47417b6707c27d4c5c1db1924071f6b6f23c7d199c799c9b0c41101e625fcdb7bbfd12a3eeeef4540a5698f058aaf6a141e5d333929b92a7f64e925bf0ef424c3ef29fcd5fd4721c547fde6abe4d47048b64511693624b0d786711abe4a66e250fcbfe95ac9037e58f331b26b6ed0d08e5c73ba4c49", 0xc00e}], 0x9, &(0x7f00000001c0)=ANY=[@ANYBLOB="000026d4f47f000000000000010000000000000000000000140000000000000000000000020000000000000000000000140000000000000000000000020000000000000000010000000000000000000000110000000000000002000000010000000000000000000000000000000000000000000000070000008300000000960000206a77bdd1a004129054e7704a000000"], 0xf}, 0x0) r5 = openat$cgroup(r0, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_type(r0, &(0x7f0000000080), 0x2, 0x0) socketpair(0x1, 0x6, 0x4e, &(0x7f0000000280)={0xffffffffffffffff}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r8, &(0x7f0000000000), 0x2a979d) write$cgroup_pid(r8, &(0x7f0000000300), 0x12) sendmsg(r7, &(0x7f0000000ac0)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, r8, 0x1, 0x3, 0x4, 0x2, {0xa, 0x4e21, 0x85f, @remote, 0x5}}}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="9a03037290911a437f9bcaa017cc763912dbed295fefa703024209153c1ab1ff1efb795b80eae4d2209bbba1e29b0d9e5de05c2512e275ebd06b7235e84fec2ce063ab8ef2799d5e5acbc54989ea03d630f54012133e01e243e0033389c8c772eea5bffdcc41a9026e26fdf2b737bc940ea81c22577d901c28b687b9570bdaa5c182d5fccd27ca627d8be014327a9717cf0c795ea4cb5040f47c600c6edaa73e36f54f8eca2d46e391dfdb1333e3ec5d5de147143f16e704", 0xb8}, {&(0x7f0000000680)="6c71cf4a7a62c53cb8788d0a5059698668e1fe10c0352564da8a6564c3679a3c15bde4ac2cbcbf274213ef9478388e8caf817a717ca33bb57d10042f0ae1a16cf43a41b5553bf298ec3a8b8c52e6234f85b64ecb86234cd6ebdf3211ddb8dfd9f5654409253ddb2971e1f48dc6c21164b98549cef2c284d8295d8c6a55ea293f23ff467f00391ef4b5b0eed42c42c327f6d3bae13db21895dcc9db396aca7290", 0xa0}, {&(0x7f0000000740)="8d2805ceda3dd497cee621c6f0813708c8f7df4c7115aaef98020e13cddf207175ecf249063577ff528d0ae43e746e05675d8ba9509094b34d40d3bb8fddf0d8d405c85637fd6bfe746d73d5c7e5975439c16d9dcf3f77bd653003adcb2d93866e650a435d7572d138", 0x69}, {&(0x7f00000007c0)="6283762efaa7e2434f5c78c89a3cd533b0d8c68186aaa61a82f3054967a1869890c8c87c40a76cc7c4bacea985c01768704caddc39285239952e55ca5638bcc8f97fe17bb48060e44c6a19e7033a07542ab40c9248d7efba61680c7a584417b30508c3e2ec59b98bc34396f9e1121a1bc211564b4ade99d01b0b51c1db68d4f374249c3da20621f4637865055a07743936a26920727b41b68b266de31eb9059513a89042a3a003f2f83a2c7b9ad028", 0xaf}, {&(0x7f0000000880)="9ce808e6f259a8f1008fc1b99dc9b5b07a2d0fd3cd4f6f1918edeb22f97c1a27c35a3148c0363843093111a70b", 0x2d}], 0x5, &(0x7f0000000940)=[{0x80, 0x102, 0x8, "e0b74d770851ad5fc727672c9b9c8120c0d45601a083644f1a7d0d2766b5f203ed601d4368ba8f51d3bc29b8401c83432b18c7b548e3535d9956b71f7827be56895b1ee7a5fea370ba769dbb568ee8158d16a0f27ba32f993a9709994ed5443dcecee45c356a4f2cf617459c9d"}, {0xc8, 0x6, 0x7, "1d527dfd5395ecce713ec0df53c8c2ec6f0fa919e1ced7332b7119a0a7ca448cc8c7ee194f4d2b1080cbbc0940e7af665193def9bae19d03f157402ac3beecf034a695c818a26a587fc1d698df8b78ed9968e07c2d63d92eba425de28de462766bdbca6bcb82067e6be4abe3ddecb4f6fa2d49f1c1041f08ec192de52073eee1a598e4605613011e439bdc1a9c5bd082551cb3d4d5463de20953027e3ef940597657a674d942458b1a23cee724e0c0f5da3c0c"}], 0x148}, 0x8000000) write$cgroup_pid(r6, &(0x7f0000000c40), 0x12) 2.55991951s ago: executing program 1 (id=8756): r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f00000031c0)={&(0x7f00000006c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000b40)="b564", 0x2}], 0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="18"], 0x18}, 0x8080) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000100)=@l2tp6={0xa, 0x0, 0x6000, @remote}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)='S\x00', 0x2}], 0x1, 0x0, 0x0, 0x900}, 0x44000) 2.123437282s ago: executing program 6 (id=8758): r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd, 0x8, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="fbe6bd8dfcdda5a210b8cfefbd66f459c7261b927d25d3cf74d2f7c97735eba47f606a290d184925922333211d168ab0f6e1081fdbd921ed4db0e67c9d5ab1452445a1e0da5ac68b13f4afe2712eeaad35ef06", 0x53}], 0x1, 0x0, 0x3298}, 0x0) close(r3) recvmsg$unix(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0x12, &(0x7f00000008c0)=r4, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r6, &(0x7f0000000080)={0x0, 0xff00, &(0x7f0000000000)=[{&(0x7f00000006c0)="5c00000013006bcd9e3fe3dc6e48aa310b6b8703110000001f03000000000000040014000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 2.122972651s ago: executing program 1 (id=8759): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random="000500000020"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)="c00e020030000b02d25a806f8c2d94f90524fc602f1a04000a740100053582c137153e370248018000f01700d100bb", 0x2f}], 0x1, 0x0, 0x0, 0x4000}, 0x0) socket$kcm(0x10, 0x2, 0x4) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r0, 0x1, 0x8, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r2 = openat$cgroup_devices(r1, &(0x7f0000000380)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='b *:4\tmm'], 0xa) socket$kcm(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x0, 0x45, 0x0, 0xfd, 0x0, 0x9c, 0x10803, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xffff, 0x5, 0x2, 0x2, 0x200000a, 0x48, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x1) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000003640)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003540), 0x0, 0x0, 0x13}, 0x50) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x1d, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59a5a4d33f921921320000005e140602ffffffff0d0013000100000002800000121f", 0x2e}], 0x1}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[], &(0x7f0000000040)='syzkaller\x00'}, 0x94) sendmsg$kcm(r5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="10000000070000000401"], 0x10}, 0x331e5c6805043cda) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x20e, 0x102, 0x0, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={&(0x7f00000000c0)=""/136, 0x88, 0x0, &(0x7f0000000180)=""/212, 0xd4}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r6, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x10) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f92124fc60040011000a7403004700000037153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 1.657237264s ago: executing program 7 (id=8760): r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0x7, 0x4, &(0x7f0000000040)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ldst={0x3, 0x0, 0x0, 0xb, 0x5, 0x40, 0x8}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x2}], &(0x7f0000000080)='GPL\x00', 0x6, 0x1000, &(0x7f00000000c0)=""/4096, 0x40f00, 0x44, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x8, &(0x7f00000010c0)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x7, &(0x7f0000001100)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000001140)=[{0x2, 0x4, 0x8, 0x9}, {0x2, 0x3, 0xd}, {0x0, 0x1, 0x2}, {0x2, 0x5, 0x2, 0x8}, {0x2, 0x1, 0xe, 0x6}, {0x4, 0x2, 0x0, 0xc}, {0x4, 0x1, 0x0, 0x3}], 0x10, 0x83}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001480)={0x18, 0x16, &(0x7f0000001280)=@raw=[@alu={0x4, 0x0, 0x4, 0x0, 0x9, 0xfffffffffffffff0, 0xfffffffffffffff0}, @generic={0x6, 0x8, 0xa, 0x9f, 0x4}, @generic={0x7, 0x0, 0xc, 0x800, 0x4165}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x101}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_fd={0x18, 0x1, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}], &(0x7f0000001340)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x68, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000013c0)={0x2, 0x4, 0x5, 0x9}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001400)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001440)=[{0x4, 0x1, 0x10, 0x1}, {0x3, 0x4, 0x5, 0x1}, {0x3, 0x2, 0x5, 0x2}, {0x0, 0x4, 0x1, 0x7}], 0x10, 0x7}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000001540)={r0, r1, 0x4, r2}, 0x10) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000001540)={r0, r1, 0x4, r2}, 0x10) openat$cgroup(r0, &(0x7f0000001580)='syz0\x00', 0x200002, 0x0) (async) openat$cgroup(r0, &(0x7f0000001580)='syz0\x00', 0x200002, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001680)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001700)={0x200}, 0x8) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001700)={0x200, 0x0}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000001740)=@base={0x0, 0x2, 0x4, 0x9, 0x8, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x4}, 0x50) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=@base={0x0, 0x2, 0x4, 0x9, 0x8, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x4}, 0x50) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000017c0)={0xffffffffffffffff, 0xed47, 0x38}, 0xc) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001800)=@base={0x1b, 0x2, 0x4, 0x3, 0x1591, 0x1, 0x7}, 0x50) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001880)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x12, 0x5, &(0x7f00000015c0)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffd}, @jmp={0x5, 0x1, 0x0, 0x7, 0x3, 0x50}], &(0x7f0000001600)='syzkaller\x00', 0x5, 0x13, &(0x7f0000001640)=""/19, 0x41100, 0x4e, '\x00', 0x0, @cgroup_sock_addr=0x23, r3, 0x8, &(0x7f00000016c0)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, r4, 0xffffffffffffffff, 0x0, &(0x7f0000001900)=[r5, r6, r7, r8], 0x0, 0x10, 0xc}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001a00)=@base={0x11, 0x7ff, 0x8b9, 0x10001, 0x98c8, r6, 0x7, '\x00', 0x0, r3, 0x1, 0x2, 0x0, 0x0, @value=r3}, 0x50) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000001a80)={0x5, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001ac0)=r9, 0x4) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001b00)={0x0, 0x8, 0x18}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001e40)={r2, 0xe0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001b40)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, &(0x7f0000001b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001c00)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x93, &(0x7f0000001c40)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000001c80), &(0x7f0000001cc0), 0x8, 0x17, 0x8, 0x8, &(0x7f0000001d00)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001e80)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0x40, '\x00', r11, r3, 0x2, 0x4}, 0x50) (async) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001e80)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0x40, '\x00', r11, r3, 0x2, 0x4}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002040)={r3, 0x20, &(0x7f0000002000)={&(0x7f0000001f00)=""/19, 0x13, 0x0, &(0x7f0000001f40)=""/165, 0xa5}}, 0x10) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002040)={r3, 0x20, &(0x7f0000002000)={&(0x7f0000001f00)=""/19, 0x13, 0x0, &(0x7f0000001f40)=""/165, 0xa5}}, 0x10) r13 = openat$tun(0xffffffffffffff9c, &(0x7f0000002080), 0x149000, 0x0) ioctl$TUNGETDEVNETNS(r13, 0x54e3, 0x0) r14 = perf_event_open$cgroup(&(0x7f0000002100)={0x4, 0x80, 0x8, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffff6, 0x22, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000020c0), 0x1}, 0x1822, 0x4, 0x4, 0x7, 0x9, 0x401, 0xfff7, 0x0, 0xd, 0x0, 0x9}, r6, 0x3, 0xffffffffffffffff, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000021c0)={0x0, r14, 0x0, 0x4, &(0x7f0000002180)='[-:\x00'}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002200)) bpf$TOKEN_CREATE(0x24, &(0x7f0000002240)={0x0, r1}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000024c0)={0x0, 0xf, &(0x7f0000002280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000002300)='syzkaller\x00', 0xe56, 0x57, &(0x7f0000002340)=""/87, 0x0, 0x8, '\x00', r11, 0x0, r3, 0x8, &(0x7f00000023c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000002400)={0x1, 0x5, 0x2be7d56a, 0x2}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000002440)=[r12], &(0x7f0000002480)=[{0x1, 0x1, 0x1, 0xd}], 0x10, 0x6}, 0x94) (async) r15 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000024c0)={0x0, 0xf, &(0x7f0000002280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffff80}]}, &(0x7f0000002300)='syzkaller\x00', 0xe56, 0x57, &(0x7f0000002340)=""/87, 0x0, 0x8, '\x00', r11, 0x0, r3, 0x8, &(0x7f00000023c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000002400)={0x1, 0x5, 0x2be7d56a, 0x2}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000002440)=[r12], &(0x7f0000002480)=[{0x1, 0x1, 0x1, 0xd}], 0x10, 0x6}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r14, 0x40042408, r15) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r14, 0x40042408, r15) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002700)=@bpf_tracing={0x1a, 0x4, &(0x7f0000002580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x7e603494}, [@exit]}, &(0x7f00000025c0)='syzkaller\x00', 0xe4, 0x0, 0x0, 0x41100, 0x35, '\x00', r11, 0x17, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002600)={0x2, 0xb, 0x1, 0x7}, 0x10, 0xa102, 0xffffffffffffffff, 0x5, &(0x7f0000002640)=[r10], &(0x7f0000002680)=[{0x2, 0x4, 0x3, 0xb}, {0x0, 0x1, 0xf, 0x8}, {0x3, 0x4, 0x4}, {0x2, 0x1, 0x6, 0x9}, {0x3, 0x3, 0x0, 0x5}], 0x10, 0x1}, 0x94) socket$kcm(0x29, 0x7, 0x0) (async) r16 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r16, &(0x7f0000002940)={&(0x7f00000027c0)=@hci={0x1f, 0x1, 0x3}, 0x80, &(0x7f0000002900)=[{&(0x7f0000002840)="60cf039744685e5d316ffcfdedc04844b6416d53009c4d443e79dfccb86fa221603dce97", 0x24}, {&(0x7f0000002880)="ee78abd96dc6249eeb88eda06143189fccd08629bd0c66d19d785d4438911fc678e25d186dacd12cf63bede5cfd789820f6c96cf4043deff8ebc8fb84b99789cc9395fb4360271645ef4b032e3e18a3d5c8abb722c837b2756c7a5b2e711", 0x5e}], 0x2}, 0x4020) (async) sendmsg$kcm(r16, &(0x7f0000002940)={&(0x7f00000027c0)=@hci={0x1f, 0x1, 0x3}, 0x80, &(0x7f0000002900)=[{&(0x7f0000002840)="60cf039744685e5d316ffcfdedc04844b6416d53009c4d443e79dfccb86fa221603dce97", 0x24}, {&(0x7f0000002880)="ee78abd96dc6249eeb88eda06143189fccd08629bd0c66d19d785d4438911fc678e25d186dacd12cf63bede5cfd789820f6c96cf4043deff8ebc8fb84b99789cc9395fb4360271645ef4b032e3e18a3d5c8abb722c837b2756c7a5b2e711", 0x5e}], 0x2}, 0x4020) 1.550472837s ago: executing program 1 (id=8761): r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xbd9ddb11bfb6c30d}, 0x0, 0x86}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf670000000000001507"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000100)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0xf0f, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1313b, 0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0), 0x10, 0x4}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r2, 0x4010744d, &(0x7f0000000180)) 1.418595301s ago: executing program 6 (id=8762): socket$kcm(0xa, 0x2, 0x3a) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x3, 0x80000000}, 0x0, 0x80000000000000c8, 0x7fff, 0x0, 0xa45, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x400000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0xf, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x107a654, 0x0, 0x0, 0x0, 0x1}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb0105", 0x1e}], 0x1, 0x0, 0x0, 0xc9e}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0b00000005000000010001000a00afcb25c4d627079d178e0914050001000000", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xc280, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 1.418298731s ago: executing program 7 (id=8763): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000008040000000000000000000018110000000000009500000000000000d334996e5909958274383834d89d36fde67efa22d827775fe0321fef6ac37deb6d81211f7b51cc696cfa6541e040129eaef6309bb5f2fddfd4d66c5a7051136d28ecb4819bb9b7"], &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="09000000060000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000580)="7534784213210c6e6816b2fcd687c40c39537ad8427cdfa802381bada723082a84acef2aaeb27520a6cebd48dbb10bd12b69b10d38a991b5d13c674387d908f028dec96a0d7958d3e4506594623fefb36d30cb923fff527afe221728e97ae84559c0b30c723304d2c72d2725bb9b8a3fb0c5579fcd5f9a183434cc6d2d9deb14cd8c9255e191340feeaa185f47c1eb1df42802a45ac1b81653b449ca47046e6191dd346a815468e6ee83f4d346aaf2a4084065588bc8d9", 0xb7}, {&(0x7f0000000740)="5c54ffb96dc9ae3cf65e8a2aeb9fedca4a747cb26b8a7d3aec2fb0f32a1b0a2ac29a022960199ab4d4fd9288a3cacc71611ca65fb8c59b5eebbe0b8d18d93b6d6c01ed614425577c99ee0f877cefe500cdd23a76339fd80f841536d3d57c1b81a59d1b4d87a7a2df3dc43fedc12dd24f4db0", 0x72}, {&(0x7f00000007c0)="4575bed7cfe56f6451d09b12fc54cecac3f28a96730e622c1610c1a5e651c5df95de9a", 0x23}], 0x3}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000c80)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r3, @ANYBLOB="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"/284], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r4, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r5}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r4, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffd6, 0x10, 0x8, 0x0, 0x0}}, 0xc) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="0400000000004000"/20, @ANYRES32=r6, @ANYRES32, @ANYBLOB="050000000200"/28], 0x50) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000120000"], &(0x7f0000000c00)='GPL\x00'}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffa, 0x3, 0x0, 0x0, 0x0, 0x0, 0x800}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x8) r8 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r8, &(0x7f0000000100), 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000100)={0x1, 0x0}, 0x8) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="1b00000000000000000000000600000000000000", @ANYRES32=r7, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000004000000020000000000000000000000000000000000100085b84dacd5808fc3dda571fb61857d8a7ad6e27ac22b20106ede4cbcd7f45183f3ad3930d73832a6524056782296c06138b6de112d4ea9a8"], 0x50) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r9, 0x4) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r10, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r10, 0x4030582b, &(0x7f0000000180)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000000000000000020000000000000137e385d42f386f0c3b986032691d851abd04a4938764b495c8c861f8ea3a3f76f212ece826f02000000000000002fccf35bcd361e63e116d4df191cd2c2af9e5e0963c943235c8a0dedd9622ae78a4a44915971d8a2295422f65a7441c97042493759355cdd12b49cce97c81030f3d47c5f1b378ab35a4bab965d2ff00aff9d5d9861bf11857fb766a55f6c283a355259cb4734f708791a0439d168cfc45778197a5b95d657eb2170d9def8eb06787046bec5fa2f859a4e3caefb6a77"], 0x50) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) 1.315080344s ago: executing program 0 (id=8700): r0 = socket$kcm(0x2, 0x5, 0x84) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x25, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000200)}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000001180)={&(0x7f00000006c0)={0x2, 0x4e21, @empty}, 0x10, 0x0, 0x0, &(0x7f0000001040)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @local}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x74}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x2e}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfb1}}], 0xa0}, 0x20000804) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x959, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r4 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x2, &(0x7f0000000000)=r7, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000e5000000000000000018010000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000800)=':\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x1a, 0x21, &(0x7f0000000ec0)=ANY=[@ANYBLOB="1800000000000000000000000c00000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000b7080000000000007b8af8ff00000000b7080000916300007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000cd131000ffffffff183a000004000000000000000000000018140000", @ANYBLOB], &(0x7f0000000b40)='GPL\x00', 0xccf, 0x2f, &(0x7f0000000b80)=""/47, 0x41000, 0x0, '\x00', r1, @tracing=0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r8, 0x8, &(0x7f0000000d40)=[r2, r3, r7, r3], &(0x7f0000000d80)=[{0x5, 0x4, 0x7, 0x1}, {0x3, 0x2, 0x7, 0x4}, {0x0, 0x3, 0x9, 0x4}, {0x5, 0x3, 0x10, 0x2}, {0x3, 0x1, 0x3, 0xb}, {0x4, 0x2, 0x3, 0x5}, {0x0, 0x5, 0x8, 0xc}, {0x1, 0x5, 0xc, 0x1}], 0x10, 0x10000}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, 0xffffffffffffffff) r10 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000840)="5400000037000b63d25a80648c2594f90a24fc601aed7123219afe6b298d4b12e74036397bc5f26e76cf89e67659fc0ed8b5818bfb0047debc8d1c5038b75d8263cc993a20fd1a077994eddcd264498606085c79", 0x54}], 0x1}, 0x24004800) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1f00, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000010008188040f80ec59acbc0413a181003100000002010000000000000e000a000f000000028002002d1f", 0x2e}], 0x1}, 0x40) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xffc0}], 0x1}, 0x80d1) close(r0) 1.291807014s ago: executing program 1 (id=8764): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1d, 0x3, &(0x7f0000000400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}, &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55, 0x0, 0xffffffffffffffff, 0x3}, 0x48) (async) r1 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xe}, 0x1010, 0x0, 0x0, 0x4, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) (async) r2 = bpf$ITER_CREATE(0xb, 0x0, 0x0) (async) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) (async) r3 = perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000005, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x11540}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000200000000000000000818110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x4, 0x4, 0x12, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r6) (async) r7 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001b80)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21ca0000cf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9b24be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6eab1aa7d55545a34effa077faa56d59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e59a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d0faab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0480f94306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad9433269af3be5fa6a9a5c24e392955f4e979ea13201bafe4f0f6ea508000000a0c548552b571bed5647223c78a992810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ede62fc28839b5301160ecec37e83efceefd7ca2533659edc8be05cc85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d35a142a9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b262341c5e093fd66a2946501559335781092cf8ce3c7c56cd31121624d76517fd3666276c3c0e812b28e2f30d035cee5d0e77a3c70008ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856cf24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31651e0ecea5ece8fb11a4ee288eb149f1fa33669cc8d901fa8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463baf28345bde0c195bc9f021da8f3025ee9c8e3168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262fa3f1dabeb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a4601adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cc50feeb7bfad9b7be3283b6450d014e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5671820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff2418a18217747ae442e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427a7f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d17eb0000000000000000000000fa08ad0731c4b839688b22c4da2a6b00008a1949a6ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282bffff2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae05334d5a44a020000001c0d882a564d74a7c72bf9a2152b261e58fea6d2f93589cfe261dc0410b5ccc92a5a0eab327a33431d62d2b7c75ce654d556c9e1817c1abca762ab53d40da51560351b673363652e1ecb56cfe4a746a45ab13c6014e9f361ab687d1cd1795ce9e05c817b83d76046bdb3709de5df7499a02d2f636a454b85b987580ada025d83bd7b8df28a540d5ec5537942e79f2f1ab25ea5f563bc77e4f9468bd309469880c7e34150ca886d1f9ac2f7e82dbe296c877d925c38c54cc8137b29028854b6bd57ca893927c331300e16aba792289e135589d93302fc37c73c303e383cdf8ef3f6d6265fe5ee01759d24027475c8901039a898582022bc95992b86dce0710887c8a625d9cbb897bdbfaf49a3f642a169827a9bae4fcfa5212461db000000000000e6ed75ca8fcda7ef3ee336189fef3b3ffb9f38fefc5ff39c4e69e3fa1f8b10ee97123e99b61eba065b1ad67530e7c4f11f9da7ae000002000000610101ad7f79cb9bbf64a0fc109f49fe8799fe266e2ccac80fefe750151f5ddfe51833ec65ece70e07ce8ab5d97db47da8f80000664dc0b86ae2b3ff9d4e220752a6b2f3ea9f793612386496dca5af7b8952aafa796ea7b156d19612297c63bb20e1e0469f7615f67a9218cbace38f5236821314f76302b98afa93044b83989339ca10e6ae30e70e17a82f03e915b8425e8e7a91614306d2ae0bc3550d856f2d7293672b5673d264fc886b0c8bdf436a0fcd21bf9da7bdca98e34cd6e59b0a7ce4ba1b466561aaa35448dff47bb1d7df23d467689a66"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r9 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4000000800000000, 0x8}, 0x0, 0x0, 0x0, 0x3}) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x20, &(0x7f0000000140)={&(0x7f0000000080)=""/131, 0x83, 0x0, &(0x7f0000000580)=""/4096, 0x1000}}, 0x10) (async) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) openat$cgroup_devices(r10, &(0x7f0000000180)='devices.deny\x00', 0x2, 0x0) 1.290763714s ago: executing program 7 (id=8765): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001900)={0x1d, 0x19, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x433}, [@call={0x85, 0x0, 0x0, 0x80}, @alu={0x4, 0x0, 0x0, 0x7, 0xb, 0x4, 0xffffffffffffffff}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x2}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0xc, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x3}, @alu={0x7, 0x1, 0x3fc4229d86072f8f, 0x4, 0x1, 0xfffffffffffffffe, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f0000000740)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000800)=""/4096, 0x40f00, 0x30, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x8, &(0x7f0000001800)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000001840)={0x5, 0xd, 0x7fff, 0x3ff}, 0x10, 0xffffffffffffffff, r1, 0x2, &(0x7f0000001880)=[0x1, r1], &(0x7f00000018c0)=[{0x5, 0x4, 0xb, 0xc}, {0x3, 0x2, 0x8, 0x9}], 0x10, 0x10001}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001ac0)={@fallback=r0, 0x37, 0x0, 0x7fff, &(0x7f00000019c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000001a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001a80)=[0x0], 0x0}, 0x40) r5 = openat$cgroup_ro(r1, &(0x7f0000001b40)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001b00)={@fallback=r5, r2, 0x26, 0x18, 0x0, @void, @value=r1, @void, @void, r4}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) openat$cgroup_pressure(r1, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r6, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="5c00000013006b04000000d86e6c1d000a887ea6ea65670000000000000090f9c3dc90f8f41f8ecff32c6e020075e300250045586c8da718ad4b4460bc24eab55600000000000000bf9367b4fa51f60a64c9f4d4938037e786a6d0bd", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) r7 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[], 0x48) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0), 0xc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffa, 0x2}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x18, 0x0, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000020c0)={r6, 0xe0, &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000380), &(0x7f0000000180)=[0x0], 0x0, 0x34, &(0x7f0000001ec0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000001f40), 0x8, 0x42, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000002100)=@bloom_filter={0x1e, 0x2, 0x9, 0x6, 0x800, r3, 0xa, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x5, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002200)={0x1f, 0x1d, &(0x7f0000001b80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0x6}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x7}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @alu={0x4, 0x1, 0x7, 0x7, 0x7, 0x50, 0x8}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001c80)='syzkaller\x00', 0x7fffffff, 0xc3, &(0x7f0000001cc0)=""/195, 0x40f00, 0x4a, '\x00', 0x0, @fallback=0x2d, r1, 0x8, &(0x7f0000001dc0)={0x7, 0x4}, 0x8, 0x10, 0x0, 0x0, r8, r6, 0x2, &(0x7f0000002180)=[r7, r3, r3, r7, r7, r9], &(0x7f00000021c0)=[{0x5, 0x4, 0x5, 0x1}, {0x2, 0x4, 0xf, 0xc}], 0x10, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x35}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) 1.068167151s ago: executing program 1 (id=8766): socket$kcm(0x11, 0x200000000000002, 0x300) r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000280)=@caif=@dgm={0x25, 0x9, 0x9}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000580)="62042700590200006000002f1eafbcf706e12b30087f5c582d26116642c47a5f8786ee601e65ab3c06d4b8bf4a81cb3e247345af215542f41ddf82f618438a34f90186cee8441e2305e495d04ad68ab8fef69df82de6456fbb48b63f60c9c9097be968ea872c4801e5d0711b4373c7224ed7a9cbd49d40f82bdb6afc0036824be26fc96e49a70e90797e6caa1b38ddacb3cb2b3eac7c068a185b644582f25edfa3d6a46e2a894ca809a422a6a29bd7145bb6e7992570484d6a710292ea0c3f97b7cbff701684b13c5593262534a7af9eab48f2ca2d74d9a4de33", 0xda}, {&(0x7f0000000c00)="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", 0x113}, {&(0x7f00000003c0)="0a985d7879f1bbff16c7d66e33657e452299fd0ef8c2afda588eb05891b7da030e01452a7986bea19b59c98dc2996c0ea09604d00ea48336d0c813d83025aca8623a5915ddddce2c11c5e374f2e0f387d2398fe0b899ff60dc7a73addcf253cf32aafbe2b9f90799e7fc583bdd9b564697ba988080270bdcea4714219a2d4c4b985418cc8fbcd2935f4e8b229fffb0d86fb286e3553a8b3ac02badc66ada5fceabe5f63c79da96e641a45901128063d6e1e31b11bcfbc3e70bd3c8c6c0bea0", 0xbf}], 0x3}, 0x4008001) 1.007810552s ago: executing program 7 (id=8767): r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x6}, 0x4000, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000400)={0x5, 0x80, 0x9a, 0x8, 0x10, 0x2d, 0x0, 0x3, 0x40, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000300)}, 0x100000, 0x0, 0x5, 0x8, 0x1, 0x9, 0x7f7, 0x0, 0x4, 0x0, 0x401}, 0xffffffffffffffff, 0x6, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000580)=ANY=[@ANYBLOB="080000000000000000000000f9ffffff00000039000000000000000000000000f300c6f4cbbd810000000000000000"]) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x21) r2 = socket$kcm(0xa, 0x2, 0x73) bpf$ENABLE_STATS(0x20, &(0x7f00000010c0), 0x4) sendmsg$inet(r2, &(0x7f0000001180)={&(0x7f0000000000)={0xa, 0x0, @empty}, 0x10, &(0x7f0000001080)=[{0x0}, {&(0x7f0000001040)="9d7fcf3efc63f4a6a555ba8b4726d7ccaf8a207100e69cfac4377876021d7131b838059f96bd206d4776368ed2a92432e5af71", 0x33}], 0x2, &(0x7f0000000700)=ANY=[@ANYBLOB="14000000000000002900000002000000ffffff8d0000000020000000000000150800000007000000fe000c34366567f2000000000000000000000008000000437df138cc11a47a46923ecdd4d7728e5ed36e4367615e55e0", @ANYRES32=0x0, @ANYBLOB="000000007f00000100000000"], 0x58}, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x1, 0x2, &(0x7f0000000140)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x4, 0x8d, &(0x7f0000000240)=""/141}, 0x80) socket$kcm(0x11, 0x200000000000003, 0x300) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000940)={0x0, 0x25, &(0x7f0000000ac0)=[{&(0x7f0000000200)="d8000000210081044e81f782db44b9040a00000000fe0500002015000600142603600e1209000a00000000000001060000b94dcf5c0468c1d67f6f94007134cfeee0800089e408e8d8ef52b40800de00e06bbace8017cbec4c2ee5a7cef4090000001fb79164075ee4ce1b14d6d930dfe1d9db22fe7c9f8775730d16a4683f1aeb4edbb57a5035ccb29e00360db70100000040fad95667e006dcdf969b3ef35ce3bb9ad809d561cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a83954b43370e9701008400002d3bc75dc0bb9dd33e438c", 0xd8}], 0x1}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpu.stat\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000230000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0a00000004000000060000008000000042000000", @ANYRES32=r2, @ANYRES16=r3, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000791f9a879368b7350000200000db90de7b34ce18b729d165605f66668a3d4d3d7e727e39c32f664cdd0b8eb62fe2d00059fadd42e6da57de173e65ab0418c9f71b78be5f3b2ca559cda38015d6db831c166425ecbb2e0c0cd4be78f7133e1687e756532b00b321b0a8bf2c446bfc2180186b"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x5, 0x3, 0x8, 0x9, 0x0, 0x7ff, 0x4008, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4}, 0x3648, 0x5, 0x2, 0x2, 0x9, 0x94, 0x4, 0x0, 0xff, 0x0, 0x4}, 0x0, 0xb, 0xffffffffffffffff, 0x1) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="120000007f00000004000000"], 0x50) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={0x0, 0x0, 0x18}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={r8, &(0x7f00000002c0), 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000500)="e2c5cf426f", &(0x7f0000000080), 0x619, r6}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000540)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x24, r5, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000d}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0xfffd, 0x2, 0x6, 0x6}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000002cf5741000"/19], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x27, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) close(r5) 961.894283ms ago: executing program 8 (id=8709): r0 = socket$kcm(0x2, 0x5, 0x84) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000001180)={&(0x7f00000006c0)={0x2, 0x4e21, @empty}, 0x10, 0x0, 0x0, &(0x7f0000001040)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x10}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1000}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @local}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x74}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x2e}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfb1}}], 0xd0}, 0x20000804) recvmsg$unix(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x959, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000), 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x2, &(0x7f0000000000)=r5, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000e50000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e3341858500000073000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000800)=':\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x1a, 0x21, &(0x7f0000000ec0)=ANY=[@ANYBLOB="1800000000000000000000000c00000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000b7080000000000007b8af8ff00000000b7080000916300007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000cd131000ffffffff183a000004000000000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000bf910000000000000800000000000000850000007d6b000000000000009500000000000000a05f7f19b5b5059ba70eb6f36f751f99b3ed9f02c4e8d827930077c69caaa26a0e5bc702d3fdf77877bcb06c03abe1e1"], &(0x7f0000000b40)='GPL\x00', 0xccf, 0x2f, &(0x7f0000000b80)=""/47, 0x41000, 0x0, '\x00', 0x0, @tracing=0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r6, 0x8, &(0x7f0000000d40)=[r1, 0xffffffffffffffff, r5, 0xffffffffffffffff], &(0x7f0000000d80)=[{0x5, 0x4, 0x7, 0x1}, {0x3, 0x2, 0x7, 0x4}, {0x0, 0x3, 0x9, 0x4}, {0x5, 0x3, 0x10, 0x2}, {0x3, 0x1, 0x3, 0xb}, {0x4, 0x2, 0x3, 0x5}, {0x0, 0x5, 0x8, 0xc}, {0x1, 0x5, 0xc, 0x1}], 0x10, 0x10000}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) r8 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000840)="5400000037000b63d25a80648c2594f90a24fc601aed7123219afe6b298d4b12e74036397bc5f26e76cf89e67659fc0ed8b5818bfb0047debc8d1c5038b75d8263cc993a20fd1a077994eddcd264498606085c79", 0x54}], 0x1}, 0x24004800) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1f00, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000010008188040f80ec59acbc0413a181003100000002010000000000000e000a000f000000028002002d1f", 0x2e}], 0x1}, 0x40) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xffc0}], 0x1}, 0x80d1) close(r0) 862.651046ms ago: executing program 1 (id=8768): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2e, 0x2010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000000c0)="dbaa", 0x2}], 0x1}, 0x41) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x10001) sendmsg(r1, &(0x7f0000000740)={&(0x7f00000003c0)=@generic={0x27, "a40fa4ed9fb067ef910b5f0370a4f8ee0cbc3f7c61bdd1e7e432a0883898b5b8d0441eae03b7640251d7e66bce6e1dc89e84cafbfed586cdf35e34657c4a76478e4120f3051948c06d751edcce91980808a589006c65492fc4a7a8c38b5abee54fd6149d0e137026c9eae35ec8fd35837aafcb1effd1d63261338839a05e"}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000500)="e387cdceda78d556016b0c3c18836c4ea596da75599a6a4f800accf42e9e4d54860939add37166bf7d778791dbe5c6823b315e9cbc01101dfdd6b27996379b185220f5b644aef495de6504fc96010ee8bf", 0x51}], 0x1, &(0x7f00000005c0)=[{0x108, 0x10f, 0x4, "92adaf806eabc3043ea33b337e80c1f60e8c6888b02a81456200cd5113c655c22676b6207baeb780a8d318a3b8a6b96400c1a0d23409f2178ffcc75687bfd7913c62f5307c294b7f2c155b5b51c52b3d3f2ce20891b36d824aa0e6ade4a63807228eeb3df61788d1a8125ca8250485806dec1933dbbecfefc21600c35866863319c9cb9ddeb2dd86dc0fa373b9c9a2eaef0190fdba983bef607dcd71c8b003b7216385311890fc3e51cf63957102bd7fb177c9153830a602a946b69b6a53b5155fdc540adcb5052386469a174e6f2e03d39d14464b578db38e7288a42bcd0adc95fddd55570b1c26f007a02f5836752d07ff"}], 0x108}, 0x40001) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000180)='freezer.self_freezing\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r3, &(0x7f0000000080)="fe09c12d8d24fc5fe4e8e817dfd7af0f27a2ac9c4069bd53b0e3ab0a0342bc330ece3436ca6fc776bc0db4b41e4ba9db32a1", &(0x7f0000000240)=""/186, 0x4}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0x2000000000000019, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f00000001c0)={'bond0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r6}, 0xc) sendmsg$inet(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000880)="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", 0x31}], 0x1}, 0x10000004) recvmsg$unix(r0, &(0x7f0000000100)={0x0, 0x700, 0x0}, 0x61) 703.334051ms ago: executing program 8 (id=8769): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x1e, 0x4, 0x0) socketpair(0x1a, 0x2, 0x2, &(0x7f00000000c0)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r1 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f00000008c0), 0x43) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xfdef) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x1}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x1c, 0xf, &(0x7f0000000340)=@ringbuf, &(0x7f0000000200)='syzkaller\x00', 0x2}, 0x94) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000001500)=""/4098, 0x1002}, {&(0x7f0000000680)=""/240}], 0x221}, 0x1c1) 481.668966ms ago: executing program 6 (id=8771): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random="000500000020"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)="c00e020030000b02d25a806f8c2d94f90524fc602f1a04000a740100053582c137153e370248018000f01700d100bb", 0x2f}], 0x1, 0x0, 0x0, 0x4000}, 0x0) socket$kcm(0x10, 0x2, 0x4) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r0, 0x1, 0x8, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r2 = openat$cgroup_devices(r1, &(0x7f0000000380)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='b *:4\tmm'], 0xa) socket$kcm(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x0, 0x45, 0x0, 0xfd, 0x0, 0x9c, 0x10803, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xffff, 0x5, 0x2, 0x2, 0x200000a, 0x48, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x1) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000003640)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003540), 0x0, 0x0, 0x13}, 0x50) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x1d, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59a5a4d33f921921320000005e140602ffffffff0d0013000100000002800000121f", 0x2e}], 0x1}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[], &(0x7f0000000040)='syzkaller\x00'}, 0x94) sendmsg$kcm(r5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="10000000070000000401"], 0x10}, 0x331e5c6805043cda) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x20e, 0x102, 0x0, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff310000003c0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0ab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0", 0x0, 0x31, 0x6000000000000000}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={&(0x7f00000000c0)=""/136, 0x88, 0x0, &(0x7f0000000180)=""/212, 0xd4}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r6, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x10) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f92124fc60040011000a7403004700000037153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 452.328588ms ago: executing program 8 (id=8772): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) write$cgroup_subtree(r1, &(0x7f0000000300)={[{0x2b, 'blkio'}, {0x2d, 'devices'}, {0x2b, 'net_cls'}, {0x2b, 'cpuacct'}, {0x2b, 'hugetlb'}, {0x2d, 'net_cls'}]}, 0x34) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xad}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x87, &(0x7f0000000480)=""/135}, 0x21) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x746f2f51, &(0x7f0000000080)=[{&(0x7f0000000040)="3f0400001c00810ce00f80ecdb4cb9f207c804a01f000000030006fb0a0002000a0ada1b40d80300000000000000", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x40, 0x1}, 0x2}}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000100)="d4f455e3580adc052f2e43db8e5cc738fa0f7ae4e439907d", 0x18}, {&(0x7f0000000200)="28c9530c971c8e4899b235136ba5291f57b1583dc5553064e8ea3c7e0068e7d619f7334227e5001ad37f3c0487f4e60a9ee272532b155215d0c92e09b66a9a42d559f774fb9061335ed4b5d9ec65453df2e4ab63cd6f5e5be1a0cf22b1601b0900a141c0d9979b80358b77725e30ea8ceac0c5a1116bc76b31408580fa893da53ee3ea6dd1c02cfada719520ed7a231e95525ddf5957c3a36cde7deee301cab980d797709497e70de0d2682ea125a0f226e594d1a67da30cf51373336778e6e4a6f60d84dd923d81d4735bbb71af390dde41074d98d63dd5059e836dbea4d1195ac75a2adcfd8fd9e5", 0xe9}, {&(0x7f0000000300)}], 0x3, &(0x7f0000000380)="01c054b7d45e74f3760cdfa790b5f0ab53cd49858bb140ee3c90a094dc234ee0c3afc12edf8a4bea217db482", 0x2c, 0x40004}, 0x8010) 383.098839ms ago: executing program 0 (id=8773): r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x6c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x2}, 0x20, 0x0, 0x0, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) bpf$OBJ_PIN_PROG(0x11, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="140007002a000b11d25a806c8c6f94f90424fc60", 0x14}], 0x1, 0x0, 0x0, 0x35}, 0x0) 258.584903ms ago: executing program 7 (id=8774): r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xbd9ddb11bfb6c30d}, 0x0, 0x86}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf670000000000001507"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000100)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0xf0f, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1313b, 0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0), 0x10, 0x4}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r2, 0x4010744d, &(0x7f0000000180)) 147.742066ms ago: executing program 6 (id=8775): r0 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x4044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000feffffff0000000000040000851000000200000085000000230000009500000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x80}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000240)={0x0, 0x0}) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000200)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="18"], 0x0, 0x3ff, 0x0, 0x0, 0x41000, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r4}, 0x8) r5 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$kcm(r5, &(0x7f0000000440)={&(0x7f0000000180)=@in6={0xa, 0xffff, 0x0, @mcast1, 0x6}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000780)="80005b020eaa4da2", 0x8}], 0x1, 0x0, 0x0, 0x900}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r6, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="1400000020000b0fd25a806c8c6f94f90124fc60", 0x14}], 0x1}, 0x4000010) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f00000001c0)="2e00000010008188040f46ecdb4cb9cca7480ef40f000000e3bd6efb010509000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 118.517066ms ago: executing program 0 (id=8776): socket$kcm(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000001440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0xa8600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x0, 0x31, 0x0, 0x84) socket$kcm(0x11, 0x2, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) r1 = socket$kcm(0x28, 0x5, 0x0) close(r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000140)='cpuset.effective_mems\x00', 0x0, 0x0) socket$kcm(0x11, 0xa, 0x300) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000010000004000bfaa213ff09ce48ca5d9", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x891a, &(0x7f0000000000)={'wg1\x00', @random="0200e97fffff"}) 0s ago: executing program 7 (id=8777): r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20004, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000001000000000000000000000850000005300000018010000207834b000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000a00ef00850000009b0000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffeb6}, 0x45) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)=r1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r1, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000440)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0], 0x0, 0x83, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x74, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0xfc, 0x7f, 0x81, 0xf3, 0x0, 0x7, 0x201, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xff, 0x0, @perf_bp={&(0x7f0000000a80), 0x1}, 0x100, 0x7, 0x80000000, 0x1, 0x0, 0x4, 0xbc1, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0xb, r0, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x97a4c4e, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000007000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xa4, &(0x7f0000000480)=""/164}, 0x80) bpf$OBJ_PIN_PROG(0x11, &(0x7f0000000240)=@generic={&(0x7f0000002000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r9}, 0x18) sendmsg$kcm(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000001c0)="39000000140081ae0000dc676f97daf01e2357f9ffffffffffffff0521018701546fabca1b4e8a06a6580e88370200c54c1960b89c40ebb373", 0x39}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x3}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000900)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000880), &(0x7f00000008c0)='%pK \x00'}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0xb, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x16c27226}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @map_val={0x18, 0x1, 0x2, 0x0, 0x1}, @jmp={0x5, 0x0, 0x5, 0x1, 0x3, 0xfffffffffffffff0, 0x8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f0000000280)='syzkaller\x00', 0x7, 0xbc, &(0x7f0000000380)=""/188, 0x41000, 0x40, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000007c0)={0x0, 0x1, 0x7, 0x6}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000940)=[0x1, r5, r6, 0x1, r10, r11], &(0x7f0000000980)=[{0x1, 0xdab, 0xd, 0x1}, {0x4, 0x5, 0x7, 0x5}, {0x1, 0x5, 0xb, 0x4}, {0x4, 0x2, 0x3}], 0x10, 0x80000000}, 0x94) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)={0xa67}, 0x8) kernel console output (not intermixed with test programs): '. [ 973.694572][T29336] device bridge_slave_1 entered promiscuous mode [ 973.707201][T29337] netlink: 'syz.6.7905': attribute type 10 has an invalid length. [ 973.725745][T29337] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 973.768102][T29337] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 973.807107][T29337] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 973.844518][T29337] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 974.040301][T29344] netlink: 'syz.8.7908': attribute type 19 has an invalid length. [ 974.102017][T29344] netlink: 'syz.8.7908': attribute type 3 has an invalid length. [ 974.122690][T29346] netlink: 'syz.6.7909': attribute type 19 has an invalid length. [ 974.131134][T29344] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.7908'. [ 974.185473][T29346] netlink: 'syz.6.7909': attribute type 3 has an invalid length. [ 974.193866][T29346] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.7909'. [ 974.762112][T29367] netlink: 'syz.0.7916': attribute type 21 has an invalid length. [ 974.853803][T29372] netlink: 10 bytes leftover after parsing attributes in process `syz.0.7916'. [ 975.131029][T29379] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 975.195488][T29379] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 975.232364][T29379] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 975.312949][T29379] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 975.393693][T29386] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.7922'. [ 975.459008][T29390] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.7923'. [ 975.578365][T29399] netlink: 1047 bytes leftover after parsing attributes in process `syz.8.7926'. [ 975.617913][T29399] bridge_slave_1: default FDB implementation only supports local addresses [ 976.040441][T29419] netlink: 10 bytes leftover after parsing attributes in process `syz.8.7931'. [ 976.245269][T29425] validate_nla: 6 callbacks suppressed [ 976.245353][T29425] netlink: 'syz.7.7935': attribute type 19 has an invalid length. [ 976.272069][T29425] netlink: 'syz.7.7935': attribute type 3 has an invalid length. [ 976.280651][T29425] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.7935'. [ 976.673199][T29433] netlink: 'syz.7.7939': attribute type 19 has an invalid length. [ 976.692284][T29438] netlink: 'syz.8.7941': attribute type 10 has an invalid length. [ 976.703028][T29433] netlink: 'syz.7.7939': attribute type 3 has an invalid length. [ 976.718681][T29438] device dummy0 entered promiscuous mode [ 976.728394][T29438] bridge0: port 3(dummy0) entered blocking state [ 976.752294][T29438] bridge0: port 3(dummy0) entered disabled state [ 976.769840][T29438] bridge0: port 3(dummy0) entered blocking state [ 976.776394][T29438] bridge0: port 3(dummy0) entered forwarding state [ 976.818121][T29438] netlink: 'syz.8.7941': attribute type 21 has an invalid length. [ 977.751072][T29480] netlink: 'syz.1.7956': attribute type 3 has an invalid length. [ 977.768764][T29480] __nla_validate_parse: 3 callbacks suppressed [ 977.768794][T29480] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.7956'. [ 978.122630][T29492] netlink: 'syz.6.7961': attribute type 1 has an invalid length. [ 978.266232][T29492] netlink: 59439 bytes leftover after parsing attributes in process `syz.6.7961'. [ 978.409314][T29506] netlink: 'syz.8.7967': attribute type 10 has an invalid length. [ 978.438121][T29506] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 978.544816][T29506] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 978.616790][T29506] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 978.711805][T29506] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 978.788473][T29513] netlink: 'syz.0.7970': attribute type 3 has an invalid length. [ 978.870221][T29513] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.7970'. [ 978.917149][T29516] netlink: 198692 bytes leftover after parsing attributes in process `syz.7.7971'. [ 979.123667][T29528] netlink: 154788 bytes leftover after parsing attributes in process `syz.7.7978'. [ 979.447749][T29540] netlink: 9286 bytes leftover after parsing attributes in process `syz.0.7981'. [ 979.536213][T29544] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 979.554254][T29544] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 979.592388][T29544] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 979.630113][T29547] netlink: 144 bytes leftover after parsing attributes in process `syz.0.7985'. [ 979.700851][T29547] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.7985'. [ 979.734699][T29544] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 979.876375][T29554] netlink: 59439 bytes leftover after parsing attributes in process `syz.0.7988'. [ 981.061340][T29583] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 981.104898][T29583] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 981.146041][T29583] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 981.193930][T29583] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 981.259275][T29590] FAULT_INJECTION: forcing a failure. [ 981.259275][T29590] name failslab, interval 1, probability 0, space 0, times 0 [ 981.303116][T29590] CPU: 0 PID: 29590 Comm: syz.6.8001 Not tainted syzkaller #0 [ 981.310713][T29590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 981.320795][T29590] Call Trace: [ 981.324115][T29590] [ 981.327067][T29590] dump_stack_lvl+0x188/0x250 [ 981.331775][T29590] ? show_regs_print_info+0x20/0x20 [ 981.337008][T29590] ? load_image+0x400/0x400 [ 981.341534][T29590] ? __might_sleep+0xf0/0xf0 [ 981.346146][T29590] ? __lock_acquire+0x7d10/0x7d10 [ 981.351196][T29590] ? lockdep_init_map_type+0x98/0x900 [ 981.356600][T29590] should_fail+0x38c/0x4c0 [ 981.361050][T29590] should_failslab+0x5/0x20 [ 981.365576][T29590] slab_pre_alloc_hook+0x51/0xc0 [ 981.370539][T29590] ? security_inode_alloc+0x30/0x110 [ 981.375861][T29590] kmem_cache_alloc+0x3d/0x290 [ 981.380660][T29590] security_inode_alloc+0x30/0x110 [ 981.385809][T29590] inode_init_always+0x8f4/0xcb0 [ 981.390784][T29590] ? memset+0x1e/0x40 [ 981.394821][T29590] new_inode_pseudo+0x8e/0x210 [ 981.399633][T29590] new_inode+0x25/0x1c0 [ 981.403875][T29590] ? __lock_acquire+0x7d10/0x7d10 [ 981.408929][T29590] proc_pid_make_inode+0x20/0x1c0 [ 981.413984][T29590] proc_pident_instantiate+0x69/0x2b0 [ 981.419386][T29590] proc_pident_lookup+0x1c6/0x260 [ 981.424440][T29590] __lookup_slow+0x29d/0x410 [ 981.429052][T29590] ? lookup_one_len+0x2d0/0x2d0 [ 981.433937][T29590] ? down_read+0x1aa/0x2e0 [ 981.438377][T29590] lookup_slow+0x53/0x70 [ 981.442639][T29590] walk_component+0x319/0x460 [ 981.447343][T29590] link_path_walk+0x665/0xd70 [ 981.452060][T29590] ? handle_lookup_down+0x130/0x130 [ 981.457291][T29590] ? percpu_counter_add_batch+0x13b/0x160 [ 981.463040][T29590] path_openat+0x28d/0x2fa0 [ 981.467589][T29590] ? verify_lock_unused+0x140/0x140 [ 981.472818][T29590] ? slab_post_alloc_hook+0x4c/0x380 [ 981.478137][T29590] ? do_filp_open+0x410/0x410 [ 981.482879][T29590] do_filp_open+0x1e2/0x410 [ 981.487431][T29590] ? vfs_tmpfile+0x300/0x300 [ 981.492067][T29590] ? noop_direct_IO+0x10/0x10 [ 981.496779][T29590] ? _raw_spin_unlock+0x24/0x40 [ 981.501657][T29590] ? alloc_fd+0x598/0x630 [ 981.506000][T29590] do_sys_openat2+0x150/0x4b0 [ 981.510687][T29590] ? __lock_acquire+0x7d10/0x7d10 [ 981.515732][T29590] ? do_sys_open+0xe0/0xe0 [ 981.520159][T29590] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 981.526174][T29590] ? lock_chain_count+0x20/0x20 [ 981.531035][T29590] ? vtime_user_exit+0x2c8/0x3e0 [ 981.535989][T29590] __x64_sys_openat+0x135/0x160 [ 981.540872][T29590] do_syscall_64+0x4c/0xa0 [ 981.545316][T29590] ? clear_bhb_loop+0x30/0x80 [ 981.550012][T29590] ? clear_bhb_loop+0x30/0x80 [ 981.554707][T29590] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 981.560612][T29590] RIP: 0033:0x7f457263660e [ 981.565052][T29590] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 981.584671][T29590] RSP: 002b:00007f45708ceec8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 981.593104][T29590] RAX: ffffffffffffffda RBX: 00007f45708cf6c0 RCX: 00007f457263660e [ 981.601098][T29590] RDX: 0000000000000002 RSI: 00007f45708cef90 RDI: ffffffffffffff9c [ 981.609081][T29590] RBP: 00007f45708cf090 R08: 0000000000000000 R09: 0000000000000000 [ 981.617077][T29590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 981.625052][T29590] R13: 00007f45728ef038 R14: 00007f45728eefa0 R15: 00007ffddad27a08 [ 981.633048][T29590] [ 982.525024][T29616] validate_nla: 6 callbacks suppressed [ 982.525055][T29616] netlink: 'syz.7.8009': attribute type 3 has an invalid length. [ 982.564775][T29616] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8009'. [ 982.732277][T29632] netlink: 'syz.0.8014': attribute type 10 has an invalid length. [ 982.779025][T29632] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 982.830163][T29632] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 982.868733][T29636] netlink: 144 bytes leftover after parsing attributes in process `syz.1.8016'. [ 982.936285][T29632] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 982.989205][T29636] netlink: 'syz.1.8016': attribute type 3 has an invalid length. [ 982.998385][T29632] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 983.010049][T29636] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.8016'. [ 983.129803][T29643] FAULT_INJECTION: forcing a failure. [ 983.129803][T29643] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 983.148256][T29643] CPU: 0 PID: 29643 Comm: syz.8.8018 Not tainted syzkaller #0 [ 983.155763][T29643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 983.165846][T29643] Call Trace: [ 983.169143][T29643] [ 983.172108][T29643] dump_stack_lvl+0x188/0x250 [ 983.176861][T29643] ? show_regs_print_info+0x20/0x20 [ 983.182095][T29643] ? load_image+0x400/0x400 [ 983.186655][T29643] ? __lock_acquire+0x7d10/0x7d10 [ 983.191725][T29643] should_fail+0x38c/0x4c0 [ 983.196174][T29643] _copy_from_user+0x2e/0x170 [ 983.200892][T29643] bpf_test_init+0x136/0x1b0 [ 983.205523][T29643] bpf_prog_test_run_skb+0x181/0x1180 [ 983.210926][T29643] ? __fget_files+0x40f/0x480 [ 983.215630][T29643] ? cpu_online+0x60/0x60 [ 983.219991][T29643] bpf_prog_test_run+0x31e/0x390 [ 983.224976][T29643] __sys_bpf+0x5a5/0x6f0 [ 983.229255][T29643] ? bpf_link_show_fdinfo+0x380/0x380 [ 983.234666][T29643] ? vtime_user_exit+0x2c8/0x3e0 [ 983.239632][T29643] __x64_sys_bpf+0x78/0x90 [ 983.244264][T29643] do_syscall_64+0x4c/0xa0 [ 983.248712][T29643] ? clear_bhb_loop+0x30/0x80 [ 983.253411][T29643] ? clear_bhb_loop+0x30/0x80 [ 983.258126][T29643] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 983.264051][T29643] RIP: 0033:0x7efcd683add9 [ 983.268483][T29643] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 983.288106][T29643] RSP: 002b:00007efcd4a94028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 983.296557][T29643] RAX: ffffffffffffffda RBX: 00007efcd6ab3fa0 RCX: 00007efcd683add9 [ 983.304549][T29643] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 000000000000000a [ 983.312542][T29643] RBP: 00007efcd4a94090 R08: 0000000000000000 R09: 0000000000000000 [ 983.320547][T29643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 983.328543][T29643] R13: 00007efcd6ab4038 R14: 00007efcd6ab3fa0 R15: 00007ffd879ac2d8 [ 983.336551][T29643] [ 983.675160][T29663] netlink: 'syz.8.8026': attribute type 1 has an invalid length. [ 983.683223][T29663] netlink: 59439 bytes leftover after parsing attributes in process `syz.8.8026'. [ 983.862211][T29675] netlink: 'syz.7.8030': attribute type 1 has an invalid length. [ 983.903891][T29675] netlink: 59439 bytes leftover after parsing attributes in process `syz.7.8030'. [ 983.957147][T29678] netlink: 144 bytes leftover after parsing attributes in process `syz.6.8031'. [ 984.168741][T29678] netlink: 'syz.6.8031': attribute type 3 has an invalid length. [ 984.217747][T29681] netlink: 'syz.0.8032': attribute type 10 has an invalid length. [ 984.306973][T29678] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.8031'. [ 984.354831][T29681] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 984.414039][T29681] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 984.474281][T29681] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 984.522739][T29681] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 984.998537][T29696] netlink: 60 bytes leftover after parsing attributes in process `syz.7.8038'. [ 985.186065][T29698] ÿÿÿÿÿÿ: renamed from vlan1 [ 985.615431][T29712] netlink: 'syz.1.8044': attribute type 1 has an invalid length. [ 985.696839][T29712] netlink: 59439 bytes leftover after parsing attributes in process `syz.1.8044'. [ 985.791553][T29718] device lo entered promiscuous mode [ 985.809333][T29719] netlink: 'syz.8.8046': attribute type 10 has an invalid length. [ 985.901323][T29719] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 986.000351][T29719] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 986.066526][T29719] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 986.138128][T29719] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 986.221757][T29729] netlink: 'syz.6.8049': attribute type 3 has an invalid length. [ 986.236690][T29729] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.8049'. [ 986.270270][T29731] FAULT_INJECTION: forcing a failure. [ 986.270270][T29731] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 986.300462][T29731] CPU: 1 PID: 29731 Comm: syz.1.8050 Not tainted syzkaller #0 [ 986.307979][T29731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 986.318065][T29731] Call Trace: [ 986.321376][T29731] [ 986.324343][T29731] dump_stack_lvl+0x188/0x250 [ 986.329139][T29731] ? asm_common_interrupt+0x22/0x40 [ 986.334403][T29731] ? show_regs_print_info+0x20/0x20 [ 986.339635][T29731] ? asm_common_interrupt+0x22/0x40 [ 986.344906][T29731] should_fail+0x38c/0x4c0 [ 986.349374][T29731] _copy_from_user+0x2e/0x170 [ 986.354098][T29731] __copy_msghdr_from_user+0x48a/0x630 [ 986.359593][T29731] ? verify_lock_unused+0x140/0x140 [ 986.364835][T29731] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 986.370215][T29731] ___sys_sendmsg+0x19a/0x2e0 [ 986.374966][T29731] ? __sys_sendmsg+0x2a0/0x2a0 [ 986.379826][T29731] ? vfs_write+0x8b2/0xd60 [ 986.384347][T29731] __se_sys_sendmsg+0x1af/0x290 [ 986.389236][T29731] ? __x64_sys_sendmsg+0x80/0x80 [ 986.394209][T29731] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 986.400283][T29731] ? lockdep_hardirqs_on+0x94/0x140 [ 986.405542][T29731] do_syscall_64+0x4c/0xa0 [ 986.409996][T29731] ? clear_bhb_loop+0x30/0x80 [ 986.414713][T29731] ? clear_bhb_loop+0x30/0x80 [ 986.419450][T29731] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 986.425374][T29731] RIP: 0033:0x7f0532faedd9 [ 986.429831][T29731] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 986.449471][T29731] RSP: 002b:00007f0531208028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 986.457918][T29731] RAX: ffffffffffffffda RBX: 00007f0533227fa0 RCX: 00007f0532faedd9 [ 986.465938][T29731] RDX: 00000000000003e8 RSI: 00002000000004c0 RDI: 0000000000000005 [ 986.473953][T29731] RBP: 00007f0531208090 R08: 0000000000000000 R09: 0000000000000000 [ 986.481960][T29731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 986.489974][T29731] R13: 00007f0533228038 R14: 00007f0533227fa0 R15: 00007ffe3f1e3128 [ 986.498028][T29731] [ 986.584295][T29737] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.8053'. [ 987.164882][T29758] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 987.274575][T29758] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 987.428757][T29758] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 987.493050][T29758] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 987.714598][T29773] FAULT_INJECTION: forcing a failure. [ 987.714598][T29773] name failslab, interval 1, probability 0, space 0, times 0 [ 987.874615][T29773] CPU: 1 PID: 29773 Comm: syz.7.8066 Not tainted syzkaller #0 [ 987.882132][T29773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 987.892203][T29773] Call Trace: [ 987.895497][T29773] [ 987.898455][T29773] dump_stack_lvl+0x188/0x250 [ 987.903150][T29773] ? show_regs_print_info+0x20/0x20 [ 987.908374][T29773] ? load_image+0x400/0x400 [ 987.912910][T29773] ? __might_sleep+0xf0/0xf0 [ 987.917518][T29773] ? __lock_acquire+0x7d10/0x7d10 [ 987.922572][T29773] should_fail+0x38c/0x4c0 [ 987.927020][T29773] should_failslab+0x5/0x20 [ 987.931549][T29773] slab_pre_alloc_hook+0x51/0xc0 [ 987.936519][T29773] kmem_cache_alloc_trace+0x47/0x2a0 [ 987.941832][T29773] ? sock_hash_alloc+0x19c/0x530 [ 987.946796][T29773] sock_hash_alloc+0x19c/0x530 [ 987.951584][T29773] map_create+0x485/0x2350 [ 987.956035][T29773] __sys_bpf+0x30a/0x6f0 [ 987.960303][T29773] ? bpf_link_show_fdinfo+0x380/0x380 [ 987.965716][T29773] ? vtime_user_exit+0x2c8/0x3e0 [ 987.970687][T29773] __x64_sys_bpf+0x78/0x90 [ 987.975134][T29773] do_syscall_64+0x4c/0xa0 [ 987.979567][T29773] ? clear_bhb_loop+0x30/0x80 [ 987.984272][T29773] ? clear_bhb_loop+0x30/0x80 [ 987.988976][T29773] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 987.994896][T29773] RIP: 0033:0x7f006f34add9 [ 987.999356][T29773] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 988.018986][T29773] RSP: 002b:00007f006d5a4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 988.027448][T29773] RAX: ffffffffffffffda RBX: 00007f006f5c3fa0 RCX: 00007f006f34add9 [ 988.035441][T29773] RDX: 0000000000000048 RSI: 0000200000000180 RDI: 0000000000000000 [ 988.043429][T29773] RBP: 00007f006d5a4090 R08: 0000000000000000 R09: 0000000000000000 [ 988.051416][T29773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 988.059431][T29773] R13: 00007f006f5c4038 R14: 00007f006f5c3fa0 R15: 00007ffd963f3268 [ 988.067446][T29773] [ 988.258073][T29788] FAULT_INJECTION: forcing a failure. [ 988.258073][T29788] name failslab, interval 1, probability 0, space 0, times 0 [ 988.292961][T29787] validate_nla: 6 callbacks suppressed [ 988.293166][T29787] netlink: 'syz.7.8072': attribute type 19 has an invalid length. [ 988.324963][T29788] CPU: 1 PID: 29788 Comm: syz.1.8074 Not tainted syzkaller #0 [ 988.332589][T29788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 988.342661][T29788] Call Trace: [ 988.345964][T29788] [ 988.348910][T29788] dump_stack_lvl+0x188/0x250 [ 988.353613][T29788] ? show_regs_print_info+0x20/0x20 [ 988.358839][T29788] ? load_image+0x400/0x400 [ 988.363367][T29788] ? __lock_acquire+0x7d10/0x7d10 [ 988.368434][T29788] should_fail+0x38c/0x4c0 [ 988.372894][T29788] should_failslab+0x5/0x20 [ 988.377418][T29788] slab_pre_alloc_hook+0x51/0xc0 [ 988.382379][T29788] __kmalloc+0x6b/0x330 [ 988.386574][T29788] ? kernfs_fop_write_iter+0x155/0x4c0 [ 988.392065][T29788] ? end_current_label_crit_section+0x14b/0x170 [ 988.398316][T29788] kernfs_fop_write_iter+0x155/0x4c0 [ 988.403724][T29788] ? iov_iter_init+0xb4/0x170 [ 988.408435][T29788] vfs_write+0x745/0xd60 [ 988.412691][T29788] ? file_end_write+0x250/0x250 [ 988.417552][T29788] ? __fget_files+0x40f/0x480 [ 988.422254][T29788] ? mutex_lock_nested+0x17/0x20 [ 988.427198][T29788] ? __fdget_pos+0x2bf/0x370 [ 988.431927][T29788] ? ksys_write+0x71/0x260 [ 988.436358][T29788] ksys_write+0x152/0x260 [ 988.440703][T29788] ? __ia32_sys_read+0x80/0x80 [ 988.445481][T29788] ? lockdep_hardirqs_on+0x94/0x140 [ 988.450700][T29788] do_syscall_64+0x4c/0xa0 [ 988.455136][T29788] ? clear_bhb_loop+0x30/0x80 [ 988.459828][T29788] ? clear_bhb_loop+0x30/0x80 [ 988.464641][T29788] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 988.470549][T29788] RIP: 0033:0x7f0532faedd9 [ 988.474990][T29788] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 988.494607][T29788] RSP: 002b:00007f0531208028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 988.503053][T29788] RAX: ffffffffffffffda RBX: 00007f0533227fa0 RCX: 00007f0532faedd9 [ 988.511037][T29788] RDX: 0000000000000012 RSI: 00002000000005c0 RDI: 0000000000000004 [ 988.519019][T29788] RBP: 00007f0531208090 R08: 0000000000000000 R09: 0000000000000000 [ 988.527006][T29788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 988.534989][T29788] R13: 00007f0533228038 R14: 00007f0533227fa0 R15: 00007ffe3f1e3128 [ 988.542985][T29788] [ 988.593970][T29787] netlink: 'syz.7.8072': attribute type 3 has an invalid length. [ 988.617074][T29795] __nla_validate_parse: 3 callbacks suppressed [ 988.617107][T29795] netlink: 132 bytes leftover after parsing attributes in process `syz.0.8075'. [ 988.633449][T29786] netlink: 'syz.8.8070': attribute type 3 has an invalid length. [ 988.643817][T29786] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.8070'. [ 988.684907][T29787] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8072'. [ 988.783135][T29797] netlink: 'syz.1.8076': attribute type 1 has an invalid length. [ 988.807291][T29797] netlink: 59439 bytes leftover after parsing attributes in process `syz.1.8076'. [ 988.994188][T29800] device lo entered promiscuous mode [ 989.043480][T29805] netlink: 'syz.7.8079': attribute type 10 has an invalid length. [ 989.072097][T29805] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 989.106918][T29805] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 989.189657][T29805] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 989.214571][T29805] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 989.358982][T29811] netlink: 'syz.1.8091': attribute type 1 has an invalid length. [ 989.403112][T29811] netlink: 59439 bytes leftover after parsing attributes in process `syz.1.8091'. [ 989.526821][T29819] netlink: 164 bytes leftover after parsing attributes in process `syz.6.8084'. [ 989.996715][T29836] netlink: 'syz.6.8087': attribute type 19 has an invalid length. [ 990.020143][T29836] netlink: 'syz.6.8087': attribute type 3 has an invalid length. [ 990.068985][T29836] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.8087'. [ 990.249365][T29840] device lo entered promiscuous mode [ 990.262528][T29840] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 990.573816][T29853] netlink: 'syz.0.8095': attribute type 10 has an invalid length. [ 990.639325][T29853] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 990.747035][T29853] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 990.773743][T29853] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 990.794731][T29853] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 990.959779][T29860] FAULT_INJECTION: forcing a failure. [ 990.959779][T29860] name failslab, interval 1, probability 0, space 0, times 0 [ 991.016135][T29864] netlink: 'syz.0.8100': attribute type 3 has an invalid length. [ 991.024558][T29860] CPU: 0 PID: 29860 Comm: syz.7.8097 Not tainted syzkaller #0 [ 991.032059][T29860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 991.042153][T29860] Call Trace: [ 991.045465][T29860] [ 991.048431][T29860] dump_stack_lvl+0x188/0x250 [ 991.053164][T29860] ? show_regs_print_info+0x20/0x20 [ 991.058531][T29860] ? load_image+0x400/0x400 [ 991.063082][T29860] ? __might_sleep+0xf0/0xf0 [ 991.067701][T29860] ? __lock_acquire+0x7d10/0x7d10 [ 991.072761][T29860] should_fail+0x38c/0x4c0 [ 991.077227][T29860] should_failslab+0x5/0x20 [ 991.081752][T29860] slab_pre_alloc_hook+0x51/0xc0 [ 991.086716][T29860] __kmalloc+0x6b/0x330 [ 991.090904][T29860] ? tomoyo_encode+0x27e/0x540 [ 991.095712][T29860] tomoyo_encode+0x27e/0x540 [ 991.100471][T29860] tomoyo_realpath_from_path+0x5cd/0x610 [ 991.106211][T29860] tomoyo_path_number_perm+0x242/0x660 [ 991.111715][T29860] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 991.117330][T29860] security_file_ioctl+0x6c/0xa0 [ 991.122302][T29860] __se_sys_ioctl+0x48/0x170 [ 991.126917][T29860] do_syscall_64+0x4c/0xa0 [ 991.131355][T29860] ? clear_bhb_loop+0x30/0x80 [ 991.136095][T29860] ? clear_bhb_loop+0x30/0x80 [ 991.140869][T29860] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 991.146809][T29860] RIP: 0033:0x7f006f34add9 [ 991.151250][T29860] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 991.170899][T29860] RSP: 002b:00007f006d5a4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 991.179356][T29860] RAX: ffffffffffffffda RBX: 00007f006f5c3fa0 RCX: 00007f006f34add9 [ 991.187363][T29860] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 000000000000000e [ 991.195351][T29860] RBP: 00007f006d5a4090 R08: 0000000000000000 R09: 0000000000000000 [ 991.203340][T29860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 991.211326][T29860] R13: 00007f006f5c4038 R14: 00007f006f5c3fa0 R15: 00007ffd963f3268 [ 991.219378][T29860] [ 991.225630][T29864] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.8100'. [ 991.404514][T29860] ERROR: Out of memory at tomoyo_realpath_from_path. [ 991.448085][T29869] netlink: 59439 bytes leftover after parsing attributes in process `syz.8.8099'. [ 991.636095][T29875] netlink: 59439 bytes leftover after parsing attributes in process `syz.1.8102'. [ 991.674759][T29873] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 992.804982][T29902] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 993.253300][T29916] mac80211_hwsim hwsim64 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 993.456871][ T1424] ieee802154 phy0 wpan0: encryption failed: -22 [ 993.463201][ T1424] ieee802154 phy1 wpan1: encryption failed: -22 [ 993.590535][T29923] validate_nla: 7 callbacks suppressed [ 993.590552][T29923] netlink: 'syz.6.8122': attribute type 19 has an invalid length. [ 993.641800][T29923] netlink: 'syz.6.8122': attribute type 3 has an invalid length. [ 993.688601][T29923] __nla_validate_parse: 4 callbacks suppressed [ 993.688617][T29923] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.8122'. [ 994.015777][T29945] netlink: 'syz.8.8130': attribute type 1 has an invalid length. [ 994.023570][T29945] netlink: 59439 bytes leftover after parsing attributes in process `syz.8.8130'. [ 994.412112][T29952] netlink: 'syz.6.8131': attribute type 19 has an invalid length. [ 994.450779][T29950] netlink: 'syz.8.8132': attribute type 19 has an invalid length. [ 994.494537][T29952] netlink: 'syz.6.8131': attribute type 3 has an invalid length. [ 994.524929][T29952] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.8131'. [ 994.536439][T29950] netlink: 'syz.8.8132': attribute type 3 has an invalid length. [ 994.571234][T29950] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.8132'. [ 994.678382][T29958] netlink: 'syz.7.8135': attribute type 25 has an invalid length. [ 994.716198][T29958] netlink: 'syz.7.8135': attribute type 1 has an invalid length. [ 994.724008][T29958] bridge0: port 1(bridge_slave_0) entered disabled state [ 994.910104][T29968] netlink: 48 bytes leftover after parsing attributes in process `syz.6.8140'. [ 994.966642][T29969] netlink: 'syz.1.8139': attribute type 19 has an invalid length. [ 994.984040][T29964] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.8139'. [ 994.997879][T29968] device wlan1 entered promiscuous mode [ 995.016649][T29968] team0: Port device wlan1 added [ 995.293056][T29979] netlink: 59439 bytes leftover after parsing attributes in process `syz.6.8143'. [ 995.573318][T29984] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.8147'. [ 995.717001][T29989] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.8148'. [ 996.402741][T30007] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8154'. [ 997.355190][ T4434] wlan1: Trigger new scan to find an IBSS to join [ 998.168429][T30068] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 998.186725][T30068] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 998.244701][T30068] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 998.291482][T30068] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 998.583650][T30081] bridge0: port 1(bridge_slave_0) entered disabled state [ 998.841088][T30092] validate_nla: 22 callbacks suppressed [ 998.841134][T30092] netlink: 'syz.1.8188': attribute type 19 has an invalid length. [ 998.904967][T30097] __nla_validate_parse: 8 callbacks suppressed [ 998.904983][T30097] netlink: 10 bytes leftover after parsing attributes in process `syz.7.8190'. [ 998.947959][T30092] netlink: 'syz.1.8188': attribute type 3 has an invalid length. [ 998.973844][T30092] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.8188'. [ 999.381612][T30111] netlink: 48 bytes leftover after parsing attributes in process `syz.0.8193'. [ 999.412931][T30111] bridge0: port 1(bridge_slave_0) entered blocking state [ 999.420162][T30111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 999.478690][T30112] netlink: 'syz.0.8193': attribute type 10 has an invalid length. [ 999.696516][T30116] netlink: 'syz.0.8195': attribute type 19 has an invalid length. [ 999.759565][T30116] netlink: 'syz.0.8195': attribute type 3 has an invalid length. [ 999.768086][T30116] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.8195'. [ 999.860685][T30121] netlink: 'syz.0.8198': attribute type 1 has an invalid length. [ 999.877507][T30121] netlink: 'syz.0.8198': attribute type 4 has an invalid length. [ 999.890658][T30121] netlink: 9462 bytes leftover after parsing attributes in process `syz.0.8198'. [ 999.987314][T30130] netlink: 'syz.8.8200': attribute type 25 has an invalid length. [ 1000.026876][T30130] netlink: 'syz.8.8200': attribute type 1 has an invalid length. [ 1000.055050][T30130] bridge0: port 1(bridge_slave_0) entered disabled state [ 1000.181459][T30139] netlink: 'syz.7.8203': attribute type 19 has an invalid length. [ 1000.234632][T30144] netlink: 48 bytes leftover after parsing attributes in process `syz.8.8206'. [ 1000.254228][T30144] bridge0: port 1(bridge_slave_0) entered blocking state [ 1000.261385][T30144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1000.275612][T30139] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8203'. [ 1000.288211][T30144] device wlan1 entered promiscuous mode [ 1000.307184][T30144] team0: Port device wlan1 added [ 1000.509263][T30153] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.8208'. [ 1000.521959][T30156] netlink: 59439 bytes leftover after parsing attributes in process `syz.8.8210'. [ 1000.612130][T30162] FAULT_INJECTION: forcing a failure. [ 1000.612130][T30162] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1000.625802][ T4254] Bluetooth: hci3: command 0x0406 tx timeout [ 1000.680882][T30162] CPU: 0 PID: 30162 Comm: syz.1.8212 Not tainted syzkaller #0 [ 1000.688423][T30162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1000.698512][T30162] Call Trace: [ 1000.701825][T30162] [ 1000.704800][T30162] dump_stack_lvl+0x188/0x250 [ 1000.709527][T30162] ? show_regs_print_info+0x20/0x20 [ 1000.714772][T30162] ? load_image+0x400/0x400 [ 1000.719327][T30162] ? __lock_acquire+0x7d10/0x7d10 [ 1000.724420][T30162] should_fail+0x38c/0x4c0 [ 1000.728910][T30162] _copy_from_user+0x2e/0x170 [ 1000.733624][T30162] __copy_msghdr_from_user+0xc9/0x630 [ 1000.739045][T30162] ? verify_lock_unused+0x140/0x140 [ 1000.744319][T30162] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 1000.749700][T30162] ___sys_sendmsg+0x19a/0x2e0 [ 1000.754452][T30162] ? __sys_sendmsg+0x2a0/0x2a0 [ 1000.759285][T30162] ? vfs_write+0x8b2/0xd60 [ 1000.763785][T30162] __se_sys_sendmsg+0x1af/0x290 [ 1000.768678][T30162] ? __x64_sys_sendmsg+0x80/0x80 [ 1000.773647][T30162] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 1000.779703][T30162] ? lockdep_hardirqs_on+0x94/0x140 [ 1000.784967][T30162] do_syscall_64+0x4c/0xa0 [ 1000.789413][T30162] ? clear_bhb_loop+0x30/0x80 [ 1000.794124][T30162] ? clear_bhb_loop+0x30/0x80 [ 1000.798852][T30162] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1000.804769][T30162] RIP: 0033:0x7f0532faedd9 [ 1000.809220][T30162] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1000.828868][T30162] RSP: 002b:00007f0531208028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1000.837324][T30162] RAX: ffffffffffffffda RBX: 00007f0533227fa0 RCX: 00007f0532faedd9 [ 1000.845351][T30162] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000004 [ 1000.853344][T30162] RBP: 00007f0531208090 R08: 0000000000000000 R09: 0000000000000000 [ 1000.861340][T30162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1000.869341][T30162] R13: 00007f0533228038 R14: 00007f0533227fa0 R15: 00007ffe3f1e3128 [ 1000.877543][T30162] [ 1001.251723][T30175] bridge0: port 1(bridge_slave_0) entered disabled state [ 1001.260879][T30177] FAULT_INJECTION: forcing a failure. [ 1001.260879][T30177] name failslab, interval 1, probability 0, space 0, times 0 [ 1001.304428][T30177] CPU: 1 PID: 30177 Comm: syz.8.8217 Not tainted syzkaller #0 [ 1001.312022][T30177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1001.322098][T30177] Call Trace: [ 1001.325399][T30177] [ 1001.328339][T30177] dump_stack_lvl+0x188/0x250 [ 1001.333039][T30177] ? show_regs_print_info+0x20/0x20 [ 1001.338253][T30177] ? load_image+0x400/0x400 [ 1001.342787][T30177] ? perf_trace_lock_acquire+0xed/0x3e0 [ 1001.348362][T30177] should_fail+0x38c/0x4c0 [ 1001.352808][T30177] should_failslab+0x5/0x20 [ 1001.357328][T30177] slab_pre_alloc_hook+0x51/0xc0 [ 1001.362286][T30177] ? skb_clone+0x1bd/0x350 [ 1001.366729][T30177] kmem_cache_alloc+0x3d/0x290 [ 1001.371522][T30177] skb_clone+0x1bd/0x350 [ 1001.375787][T30177] __netlink_deliver_tap+0x3cd/0x7c0 [ 1001.381111][T30177] netlink_deliver_tap+0x16c/0x180 [ 1001.386245][T30177] netlink_unicast+0x74f/0x920 [ 1001.391046][T30177] netlink_sendmsg+0x8ba/0xbe0 [ 1001.395859][T30177] ? netlink_getsockopt+0x570/0x570 [ 1001.401090][T30177] ? aa_sock_msg_perm+0x94/0x150 [ 1001.406095][T30177] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1001.411416][T30177] ? security_socket_sendmsg+0x7c/0xa0 [ 1001.417276][T30177] ? netlink_getsockopt+0x570/0x570 [ 1001.422630][T30177] ____sys_sendmsg+0x5b7/0x8f0 [ 1001.427446][T30177] ? __sys_sendmsg_sock+0x30/0x30 [ 1001.432709][T30177] ? import_iovec+0x6f/0xa0 [ 1001.437278][T30177] ___sys_sendmsg+0x236/0x2e0 [ 1001.442031][T30177] ? __sys_sendmsg+0x2a0/0x2a0 [ 1001.446925][T30177] ? vfs_write+0x8b2/0xd60 [ 1001.451394][T30177] __se_sys_sendmsg+0x1af/0x290 [ 1001.456283][T30177] ? __x64_sys_sendmsg+0x80/0x80 [ 1001.461250][T30177] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 1001.467378][T30177] ? lockdep_hardirqs_on+0x94/0x140 [ 1001.472640][T30177] do_syscall_64+0x4c/0xa0 [ 1001.477089][T30177] ? clear_bhb_loop+0x30/0x80 [ 1001.481794][T30177] ? clear_bhb_loop+0x30/0x80 [ 1001.486499][T30177] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1001.492426][T30177] RIP: 0033:0x7efcd683add9 [ 1001.496866][T30177] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1001.516506][T30177] RSP: 002b:00007efcd4a94028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1001.524959][T30177] RAX: ffffffffffffffda RBX: 00007efcd6ab3fa0 RCX: 00007efcd683add9 [ 1001.532966][T30177] RDX: 0000000024000000 RSI: 0000200000000140 RDI: 0000000000000003 [ 1001.540970][T30177] RBP: 00007efcd4a94090 R08: 0000000000000000 R09: 0000000000000000 [ 1001.548963][T30177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1001.556959][T30177] R13: 00007efcd6ab4038 R14: 00007efcd6ab3fa0 R15: 00007ffd879ac2d8 [ 1001.564970][T30177] [ 1001.795013][T30189] sctp: [Deprecated]: syz.6.8219 (pid 30189) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1001.795013][T30189] Use struct sctp_sack_info instead [ 1001.864370][T30188] FAULT_INJECTION: forcing a failure. [ 1001.864370][T30188] name failslab, interval 1, probability 0, space 0, times 0 [ 1001.910498][T30192] netlink: 48 bytes leftover after parsing attributes in process `syz.0.8221'. [ 1002.003786][T30188] CPU: 1 PID: 30188 Comm: syz.1.8222 Not tainted syzkaller #0 [ 1002.011322][T30188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1002.021417][T30188] Call Trace: [ 1002.024738][T30188] [ 1002.027712][T30188] dump_stack_lvl+0x188/0x250 [ 1002.032481][T30188] ? show_regs_print_info+0x20/0x20 [ 1002.037723][T30188] ? load_image+0x400/0x400 [ 1002.042300][T30188] ? __might_sleep+0xf0/0xf0 [ 1002.046981][T30188] ? __lock_acquire+0x7d10/0x7d10 [ 1002.052082][T30188] should_fail+0x38c/0x4c0 [ 1002.056594][T30188] should_failslab+0x5/0x20 [ 1002.061142][T30188] slab_pre_alloc_hook+0x51/0xc0 [ 1002.066134][T30188] kmem_cache_alloc_node+0x47/0x2d0 [ 1002.071375][T30188] ? __alloc_skb+0xf4/0x750 [ 1002.075926][T30188] ? perf_tp_event+0xa92/0xbf0 [ 1002.080761][T30188] __alloc_skb+0xf4/0x750 [ 1002.085186][T30188] alloc_skb_with_frags+0xa7/0x730 [ 1002.090410][T30188] sock_alloc_send_pskb+0x87f/0x9a0 [ 1002.095716][T30188] ? sock_kzfree_s+0x50/0x50 [ 1002.100373][T30188] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 1002.106180][T30188] tun_get_user+0x7c8/0x3a70 [ 1002.110826][T30188] ? perf_trace_lock+0x301/0x390 [ 1002.115894][T30188] ? tun_ring_recv+0xc40/0xc40 [ 1002.120753][T30188] ? rcu_lock_release+0x5/0x20 [ 1002.125592][T30188] ? __lock_acquire+0x7d10/0x7d10 [ 1002.130677][T30188] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 1002.136500][T30188] tun_chr_write_iter+0x112/0x1e0 [ 1002.141588][T30188] vfs_write+0x745/0xd60 [ 1002.145897][T30188] ? file_end_write+0x250/0x250 [ 1002.150822][T30188] ? __fget_files+0x40f/0x480 [ 1002.155603][T30188] ? __fdget_pos+0x1e2/0x370 [ 1002.160229][T30188] ? ksys_write+0x71/0x260 [ 1002.164706][T30188] ksys_write+0x152/0x260 [ 1002.169086][T30188] ? __ia32_sys_read+0x80/0x80 [ 1002.173899][T30188] ? lockdep_hardirqs_on+0x94/0x140 [ 1002.179153][T30188] do_syscall_64+0x4c/0xa0 [ 1002.183609][T30188] ? clear_bhb_loop+0x30/0x80 [ 1002.188325][T30188] ? clear_bhb_loop+0x30/0x80 [ 1002.193059][T30188] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1002.199004][T30188] RIP: 0033:0x7f0532faedd9 [ 1002.203463][T30188] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1002.223107][T30188] RSP: 002b:00007f0531208028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1002.231581][T30188] RAX: ffffffffffffffda RBX: 00007f0533227fa0 RCX: 00007f0532faedd9 [ 1002.239589][T30188] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 1002.247613][T30188] RBP: 00007f0531208090 R08: 0000000000000000 R09: 0000000000000000 [ 1002.255625][T30188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1002.263625][T30188] R13: 00007f0533228038 R14: 00007f0533227fa0 R15: 00007ffe3f1e3128 [ 1002.271793][T30188] [ 1002.304616][T25735] wlan1: Trigger new scan to find an IBSS to join [ 1002.351642][T30199] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 1002.402285][T30199] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 1002.468024][T30199] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 1002.500868][T30199] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 1002.922268][T30214] bridge0: port 1(bridge_slave_0) entered disabled state [ 1003.269678][T25735] wlan1: Creating new IBSS network, BSSID 22:a7:ae:7c:45:e1 [ 1003.328385][ T4430] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1003.452835][T30226] FAULT_INJECTION: forcing a failure. [ 1003.452835][T30226] name failslab, interval 1, probability 0, space 0, times 0 [ 1003.533735][T30226] CPU: 1 PID: 30226 Comm: syz.8.8233 Not tainted syzkaller #0 [ 1003.541248][T30226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1003.551322][T30226] Call Trace: [ 1003.554675][T30226] [ 1003.557630][T30226] dump_stack_lvl+0x188/0x250 [ 1003.562340][T30226] ? show_regs_print_info+0x20/0x20 [ 1003.567569][T30226] ? load_image+0x400/0x400 [ 1003.572126][T30226] ? __might_sleep+0xf0/0xf0 [ 1003.576732][T30226] ? __lock_acquire+0x7d10/0x7d10 [ 1003.581754][T30226] should_fail+0x38c/0x4c0 [ 1003.586184][T30226] should_failslab+0x5/0x20 [ 1003.590716][T30226] slab_pre_alloc_hook+0x51/0xc0 [ 1003.595672][T30226] kmem_cache_alloc_node+0x47/0x2d0 [ 1003.600878][T30226] ? __alloc_skb+0xf4/0x750 [ 1003.605435][T30226] __alloc_skb+0xf4/0x750 [ 1003.609773][T30226] netlink_ack+0x372/0xb50 [ 1003.614197][T30226] ? __copy_skb_header+0x3ba/0x4f0 [ 1003.619307][T30226] ? netlink_dump+0xcf0/0xcf0 [ 1003.623977][T30226] ? __skb_clone+0x480/0x790 [ 1003.628569][T30226] netlink_rcv_skb+0x27a/0x440 [ 1003.633327][T30226] ? rtnetlink_bind+0x80/0x80 [ 1003.638011][T30226] ? netlink_ack+0xb50/0xb50 [ 1003.642649][T30226] netlink_unicast+0x774/0x920 [ 1003.647452][T30226] netlink_sendmsg+0x8ba/0xbe0 [ 1003.652244][T30226] ? netlink_getsockopt+0x570/0x570 [ 1003.657470][T30226] ? aa_sock_msg_perm+0x94/0x150 [ 1003.662434][T30226] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1003.667748][T30226] ? security_socket_sendmsg+0x7c/0xa0 [ 1003.673243][T30226] ? netlink_getsockopt+0x570/0x570 [ 1003.678460][T30226] ____sys_sendmsg+0x5b7/0x8f0 [ 1003.683242][T30226] ? __sys_sendmsg_sock+0x30/0x30 [ 1003.688285][T30226] ? import_iovec+0x6f/0xa0 [ 1003.692817][T30226] ___sys_sendmsg+0x236/0x2e0 [ 1003.697516][T30226] ? __sys_sendmsg+0x2a0/0x2a0 [ 1003.702327][T30226] __se_sys_sendmsg+0x1af/0x290 [ 1003.707186][T30226] ? __x64_sys_sendmsg+0x80/0x80 [ 1003.712139][T30226] ? syscall_enter_from_user_mode+0x2a/0x70 [ 1003.718049][T30226] do_syscall_64+0x4c/0xa0 [ 1003.722479][T30226] ? clear_bhb_loop+0x30/0x80 [ 1003.727159][T30226] ? clear_bhb_loop+0x30/0x80 [ 1003.731838][T30226] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1003.737742][T30226] RIP: 0033:0x7efcd683add9 [ 1003.742165][T30226] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1003.761781][T30226] RSP: 002b:00007efcd4a94028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1003.770201][T30226] RAX: ffffffffffffffda RBX: 00007efcd6ab3fa0 RCX: 00007efcd683add9 [ 1003.778195][T30226] RDX: 0000000000000000 RSI: 0000200000000940 RDI: 0000000000000005 [ 1003.786209][T30226] RBP: 00007efcd4a94090 R08: 0000000000000000 R09: 0000000000000000 [ 1003.794184][T30226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1003.802153][T30226] R13: 00007efcd6ab4038 R14: 00007efcd6ab3fa0 R15: 00007ffd879ac2d8 [ 1003.810145][T30226] [ 1003.919375][T30233] validate_nla: 16 callbacks suppressed [ 1003.919406][T30233] netlink: 'syz.0.8236': attribute type 19 has an invalid length. [ 1004.033933][T30233] netlink: 'syz.0.8236': attribute type 3 has an invalid length. [ 1004.052578][T30233] __nla_validate_parse: 4 callbacks suppressed [ 1004.052604][T30233] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.8236'. [ 1004.083203][T30241] netlink: 'syz.8.8239': attribute type 1 has an invalid length. [ 1004.091481][T30241] netlink: 59439 bytes leftover after parsing attributes in process `syz.8.8239'. [ 1004.221857][T30243] netlink: 'syz.7.8240': attribute type 19 has an invalid length. [ 1004.326654][T30243] netlink: 'syz.7.8240': attribute type 3 has an invalid length. [ 1004.371196][T30243] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8240'. [ 1005.261531][T30261] netlink: 'syz.7.8257': attribute type 19 has an invalid length. [ 1005.307893][T30261] netlink: 'syz.7.8257': attribute type 3 has an invalid length. [ 1005.316750][T30261] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8257'. [ 1005.682944][T30274] device pim6reg1 entered promiscuous mode [ 1005.830506][T30275] netlink: 'syz.7.8251': attribute type 19 has an invalid length. [ 1005.887446][T30281] netlink: 'syz.7.8251': attribute type 3 has an invalid length. [ 1005.914540][T30281] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8251'. [ 1006.338899][T30292] netlink: 'syz.6.8255': attribute type 1 has an invalid length. [ 1006.389859][T30292] netlink: 59439 bytes leftover after parsing attributes in process `syz.6.8255'. [ 1006.765352][T30304] netlink: 198172 bytes leftover after parsing attributes in process `syz.6.8261'. [ 1007.054340][T30307] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8262'. [ 1007.188024][T30310] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.8265'. [ 1008.504900][T30339] netlink: 59439 bytes leftover after parsing attributes in process `syz.0.8271'. [ 1009.242569][T30354] validate_nla: 6 callbacks suppressed [ 1009.242589][T30354] netlink: 'syz.0.8276': attribute type 19 has an invalid length. [ 1009.326133][T30354] netlink: 'syz.0.8276': attribute type 3 has an invalid length. [ 1009.334807][T30354] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.8276'. [ 1009.539627][T30360] netlink: 'syz.8.8278': attribute type 3 has an invalid length. [ 1009.564677][T30360] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.8278'. [ 1009.959048][T30374] sctp: [Deprecated]: syz.8.8283 (pid 30374) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1009.959048][T30374] Use struct sctp_sack_info instead [ 1010.560484][T30384] netlink: 'syz.6.8286': attribute type 1 has an invalid length. [ 1010.585799][T30384] netlink: 59439 bytes leftover after parsing attributes in process `syz.6.8286'. [ 1011.355749][T30394] netlink: 'syz.6.8290': attribute type 19 has an invalid length. [ 1011.538695][T30394] netlink: 'syz.6.8290': attribute type 3 has an invalid length. [ 1011.557840][T30401] netlink: 'syz.8.8291': attribute type 19 has an invalid length. [ 1011.574950][T30394] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.8290'. [ 1011.646911][T30401] netlink: 'syz.8.8291': attribute type 3 has an invalid length. [ 1011.698932][T30401] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.8291'. [ 1012.267673][T30412] netlink: 'syz.6.8293': attribute type 19 has an invalid length. [ 1012.508358][T30412] netlink: 'syz.6.8293': attribute type 3 has an invalid length. [ 1012.568535][T30412] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.8293'. [ 1012.809874][T30418] netlink: 14 bytes leftover after parsing attributes in process `syz.1.8295'. [ 1012.894711][T30418] device hsr_slave_0 left promiscuous mode [ 1012.951934][T30418] device hsr_slave_1 left promiscuous mode [ 1013.802127][T30441] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.8304'. [ 1014.369686][T30450] netlink: 128 bytes leftover after parsing attributes in process `syz.0.8306'. [ 1014.419995][T30450] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1014.515256][T30450] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1014.940529][T30461] validate_nla: 2 callbacks suppressed [ 1014.940548][T30461] netlink: 'syz.8.8309': attribute type 3 has an invalid length. [ 1015.015939][T30461] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.8309'. [ 1015.074336][T30455] netlink: 61211 bytes leftover after parsing attributes in process `syz.7.8308'. [ 1015.715966][T30474] netlink: 171476 bytes leftover after parsing attributes in process `syz.8.8315'. [ 1015.812079][T30474] debugfs: Directory '!!ô' with parent 'ieee80211' already present! [ 1016.948061][T30487] netlink: 'syz.1.8318': attribute type 39 has an invalid length. [ 1018.663782][T30507] netlink: 'syz.6.8325': attribute type 21 has an invalid length. [ 1019.101509][T30524] netlink: 'syz.6.8331': attribute type 9 has an invalid length. [ 1019.126715][T30524] netlink: 126588 bytes leftover after parsing attributes in process `syz.6.8331'. [ 1021.094976][T30550] netlink: 'syz.8.8338': attribute type 39 has an invalid length. [ 1022.055244][T30563] netlink: 'syz.7.8343': attribute type 19 has an invalid length. [ 1022.258990][T30563] netlink: 'syz.7.8343': attribute type 3 has an invalid length. [ 1022.267843][T30563] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8343'. [ 1022.718868][T30573] netlink: 105120 bytes leftover after parsing attributes in process `syz.8.8356'. [ 1024.301035][T30586] netlink: 171476 bytes leftover after parsing attributes in process `syz.6.8346'. [ 1024.636427][T30586] debugfs: Directory '!!ô' with parent 'ieee80211' already present! [ 1026.393407][T30624] netlink: 'syz.6.8362': attribute type 19 has an invalid length. [ 1026.657956][T30626] netlink: 'syz.6.8362': attribute type 3 has an invalid length. [ 1026.759493][T30626] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.8362'. [ 1028.967361][T30661] netlink: 171476 bytes leftover after parsing attributes in process `syz.0.8368'. [ 1029.311256][T30661] sysfs: cannot create duplicate filename '/class/ieee80211/!!ô' [ 1029.363511][T30661] CPU: 0 PID: 30661 Comm: syz.0.8368 Not tainted syzkaller #0 [ 1029.371418][T30661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1029.385231][T30661] Call Trace: [ 1029.389466][T30661] [ 1029.393131][T30661] dump_stack_lvl+0x188/0x250 [ 1029.398204][T30661] ? show_regs_print_info+0x20/0x20 [ 1029.403885][T30661] ? load_image+0x400/0x400 [ 1029.408568][T30661] sysfs_warn_dup+0x8a/0xa0 [ 1029.413172][T30661] sysfs_do_create_link_sd+0xc0/0x110 [ 1029.419240][T30661] device_add+0x7ed/0xfb0 [ 1029.424058][T30661] wiphy_register+0x1e81/0x2c30 [ 1029.430506][T30661] ? cfg80211_event_work+0x40/0x40 [ 1029.437763][T30661] ? minstrel_ht_alloc+0x808/0x980 [ 1029.443482][T30661] ? ieee80211_init_rate_ctrl_alg+0x55e/0x5e0 [ 1029.450289][T30661] ieee80211_register_hw+0x2aa1/0x3af0 [ 1029.456041][T30661] ? ieee80211_tasklet_handler+0x20/0x20 [ 1029.462302][T30661] ? rcu_is_watching+0x11/0xa0 [ 1029.468883][T30661] ? memset+0x1e/0x40 [ 1029.473071][T30661] ? hrtimer_init+0x10c/0x220 [ 1029.478749][T30661] mac80211_hwsim_new_radio+0x20d3/0x4080 [ 1029.489149][T30661] hwsim_new_radio_nl+0xa6f/0xc40 [ 1029.497658][T30661] genl_rcv_msg+0xcea/0xf90 [ 1029.504849][T30661] ? genl_bind+0x380/0x380 [ 1029.517484][T30661] ? __bpf_trace_bpf_trace_printk+0x20/0x20 [ 1029.529387][T30661] ? __dev_queue_xmit+0x1cbf/0x2f80 [ 1029.539626][T30661] ? verify_lock_unused+0x140/0x140 [ 1029.550889][T30661] ? perf_trace_run_bpf_submit+0x124/0x1c0 [ 1029.569115][T30661] ? perf_trace_lock+0x301/0x390 [ 1029.579709][T30661] ? hwsim_tx_info_frame_received_nl+0x1020/0x1020 [ 1029.597109][T30661] netlink_rcv_skb+0x1f5/0x440 [ 1029.608111][T30661] ? genl_bind+0x380/0x380 [ 1029.623079][T30661] ? netlink_ack+0xb50/0xb50 [ 1029.638403][T30661] ? __lock_acquire+0x7d10/0x7d10 [ 1029.647728][T30661] ? down_read+0x1aa/0x2e0 [ 1029.665414][T30661] genl_rcv+0x24/0x40 [ 1029.680896][T30661] netlink_unicast+0x774/0x920 [ 1029.690479][T30661] netlink_sendmsg+0x8ba/0xbe0 [ 1029.701684][T30661] ? netlink_getsockopt+0x570/0x570 [ 1029.714096][T30661] ? aa_sock_msg_perm+0x94/0x150 [ 1029.723527][T30661] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1029.733739][T30661] ? security_socket_sendmsg+0x7c/0xa0 [ 1029.742748][T30661] ? netlink_getsockopt+0x570/0x570 [ 1029.752452][T30661] ____sys_sendmsg+0x5b7/0x8f0 [ 1029.764400][T30661] ? __sys_sendmsg_sock+0x30/0x30 [ 1029.781012][T30661] ? import_iovec+0x6f/0xa0 [ 1029.788882][T30661] ___sys_sendmsg+0x236/0x2e0 [ 1029.804159][T30661] ? __sys_sendmsg+0x2a0/0x2a0 [ 1029.820920][T30661] ? trace_event_raw_event_lock+0x270/0x270 [ 1029.830961][T30661] __se_sys_sendmsg+0x1af/0x290 [ 1029.839380][T30661] ? __x64_sys_sendmsg+0x80/0x80 [ 1029.845656][T30661] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 1029.859696][T30661] ? lockdep_hardirqs_on+0x94/0x140 [ 1029.867342][T30661] do_syscall_64+0x4c/0xa0 [ 1029.877667][T30661] ? clear_bhb_loop+0x30/0x80 [ 1029.882523][T30661] ? clear_bhb_loop+0x30/0x80 [ 1029.891329][T30661] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1029.902837][T30661] RIP: 0033:0x7f1e0ca6fdd9 [ 1029.909600][T30661] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1029.936818][T30661] RSP: 002b:00007f1e0ac87028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1029.945687][T30661] RAX: ffffffffffffffda RBX: 00007f1e0cce9180 RCX: 00007f1e0ca6fdd9 [ 1029.953784][T30661] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000013 [ 1029.961834][T30661] RBP: 00007f1e0cb05d69 R08: 0000000000000000 R09: 0000000000000000 [ 1029.970179][T30661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1029.978220][T30661] R13: 00007f1e0cce9218 R14: 00007f1e0cce9180 R15: 00007ffd1aa89ff8 [ 1029.986364][T30661] [ 1030.460027][T30682] netlink: 'syz.8.8376': attribute type 3 has an invalid length. [ 1030.534755][T30682] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.8376'. [ 1030.587911][T30680] netlink: 'syz.8.8376': attribute type 19 has an invalid length. [ 1031.006573][T30690] netlink: 134268 bytes leftover after parsing attributes in process `syz.7.8381'. [ 1031.051178][T30691] netlink: 134268 bytes leftover after parsing attributes in process `syz.7.8381'. [ 1031.395805][T30702] netlink: 'syz.6.8382': attribute type 3 has an invalid length. [ 1031.444259][T30702] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.8382'. [ 1032.612637][T30715] device syzkaller0 entered promiscuous mode [ 1032.638012][T30715] FAULT_INJECTION: forcing a failure. [ 1032.638012][T30715] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1032.763763][T30715] CPU: 1 PID: 30715 Comm: syz.6.8387 Not tainted syzkaller #0 [ 1032.771289][T30715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1032.781357][T30715] Call Trace: [ 1032.784653][T30715] [ 1032.787603][T30715] dump_stack_lvl+0x188/0x250 [ 1032.792304][T30715] ? show_regs_print_info+0x20/0x20 [ 1032.797539][T30715] ? load_image+0x400/0x400 [ 1032.802083][T30715] ? __lock_acquire+0x7d10/0x7d10 [ 1032.807158][T30715] should_fail+0x38c/0x4c0 [ 1032.811645][T30715] _copy_from_iter+0x22e/0x1170 [ 1032.816537][T30715] ? copy_mc_pipe_to_iter+0x7d0/0x7d0 [ 1032.821950][T30715] tun_get_user+0x395/0x3a70 [ 1032.826578][T30715] ? tun_ring_recv+0xc40/0xc40 [ 1032.831378][T30715] ? rcu_lock_release+0x5/0x20 [ 1032.836176][T30715] ? __lock_acquire+0x7d10/0x7d10 [ 1032.841273][T30715] tun_chr_write_iter+0x112/0x1e0 [ 1032.846365][T30715] vfs_write+0x745/0xd60 [ 1032.850655][T30715] ? file_end_write+0x250/0x250 [ 1032.855538][T30715] ? __fget_files+0x40f/0x480 [ 1032.860258][T30715] ? __fdget_pos+0x1e2/0x370 [ 1032.864991][T30715] ? ksys_write+0x71/0x260 [ 1032.869466][T30715] ksys_write+0x152/0x260 [ 1032.873829][T30715] ? __ia32_sys_read+0x80/0x80 [ 1032.878627][T30715] ? lockdep_hardirqs_on+0x94/0x140 [ 1032.883860][T30715] do_syscall_64+0x4c/0xa0 [ 1032.888308][T30715] ? clear_bhb_loop+0x30/0x80 [ 1032.893114][T30715] ? clear_bhb_loop+0x30/0x80 [ 1032.897820][T30715] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1032.903744][T30715] RIP: 0033:0x7f4572675dd9 [ 1032.908178][T30715] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1032.927886][T30715] RSP: 002b:00007f45708cf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1032.936450][T30715] RAX: ffffffffffffffda RBX: 00007f45728eefa0 RCX: 00007f4572675dd9 [ 1032.944450][T30715] RDX: 000000000000ffdd RSI: 0000200000000100 RDI: 0000000000000003 [ 1032.952446][T30715] RBP: 00007f45708cf090 R08: 0000000000000000 R09: 0000000000000000 [ 1032.960442][T30715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1032.968438][T30715] R13: 00007f45728ef038 R14: 00007f45728eefa0 R15: 00007ffddad27a08 [ 1032.976531][T30715] [ 1033.162775][T30722] netlink: 'syz.1.8389': attribute type 19 has an invalid length. [ 1033.245405][T30722] netlink: 'syz.1.8389': attribute type 3 has an invalid length. [ 1033.253661][T30722] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.8389'. [ 1033.379478][T30726] netlink: 'syz.7.8390': attribute type 19 has an invalid length. [ 1033.423576][T30726] netlink: 'syz.7.8390': attribute type 3 has an invalid length. [ 1033.447346][T30726] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8390'. [ 1033.923310][T30753] netlink: 14601 bytes leftover after parsing attributes in process `syz.7.8400'. [ 1034.260531][T30763] device syzkaller0 entered promiscuous mode [ 1034.478401][T30768] netlink: 'syz.8.8406': attribute type 19 has an invalid length. [ 1034.682735][T30765] netlink: 'syz.8.8406': attribute type 3 has an invalid length. [ 1034.720925][T30765] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.8406'. [ 1034.888460][T30780] netlink: 'syz.8.8411': attribute type 10 has an invalid length. [ 1034.929206][T30780] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 1034.992825][T30780] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 1035.042438][T30780] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 1035.064193][T30780] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 1035.075591][T30789] netlink: 14601 bytes leftover after parsing attributes in process `syz.0.8413'. [ 1035.313756][T30794] netlink: 'syz.0.8415': attribute type 10 has an invalid length. [ 1035.477805][T30794] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 1035.575498][T30794] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 1035.672180][T30794] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 1035.722889][T30802] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1035.840772][T30794] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 1036.195048][T30816] netlink: 'syz.8.8420': attribute type 3 has an invalid length. [ 1036.208344][T30812] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.8423'. [ 1036.234668][T30816] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.8420'. [ 1036.360008][T30822] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 1036.408995][T30822] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 1036.438697][T30822] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 1036.453098][T30822] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 1036.548843][T30826] netlink: 14601 bytes leftover after parsing attributes in process `syz.8.8428'. [ 1036.568681][T30829] validate_nla: 3 callbacks suppressed [ 1036.568709][T30829] netlink: 'syz.7.8429': attribute type 3 has an invalid length. [ 1036.600916][T30829] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8429'. [ 1036.702620][T30834] netlink: 121460 bytes leftover after parsing attributes in process `syz.0.8430'. [ 1036.729485][T30834] netlink: 21648 bytes leftover after parsing attributes in process `syz.0.8430'. [ 1036.752619][T30834] tipc: Started in network mode [ 1036.765392][T30834] tipc: Node identity 1e, cluster identity 4711 [ 1036.771891][T30834] tipc: Node number set to 30 [ 1036.779045][ T4424] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1036.838489][T30846] netlink: 'syz.8.8434': attribute type 10 has an invalid length. [ 1036.846872][T30846] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 1036.894904][T30846] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 1036.917772][T30846] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 1036.931300][T30846] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 1037.243164][T30854] netlink: 'syz.0.8437': attribute type 19 has an invalid length. [ 1037.417124][T30858] netlink: 'syz.8.8438': attribute type 3 has an invalid length. [ 1037.436126][T30854] netlink: 'syz.0.8437': attribute type 3 has an invalid length. [ 1037.444985][T30858] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.8438'. [ 1037.455971][T30854] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.8437'. [ 1037.803917][T25735] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 1037.862100][T30874] netlink: 'syz.0.8443': attribute type 10 has an invalid length. [ 1037.904241][T30874] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 1037.926625][T30874] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 1038.001229][T30874] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 1038.054223][T30874] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 1038.161766][T30879] netlink: 'syz.8.8444': attribute type 3 has an invalid length. [ 1038.238085][T30891] netlink: 'syz.6.8448': attribute type 10 has an invalid length. [ 1038.274564][T30891] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 1038.356964][T30891] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 1038.398566][T30893] netlink: 'syz.7.8450': attribute type 3 has an invalid length. [ 1038.463001][T30891] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 1038.483231][T30891] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 1038.494946][T30898] netlink: 'syz.0.8451': attribute type 19 has an invalid length. [ 1038.778318][T30902] device syzkaller0 entered promiscuous mode [ 1038.839256][T30908] erspan0: refused to change device tx_queue_len [ 1039.536049][T30938] FAULT_INJECTION: forcing a failure. [ 1039.536049][T30938] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1039.600699][T30938] CPU: 1 PID: 30938 Comm: syz.6.8465 Not tainted syzkaller #0 [ 1039.608228][T30938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1039.618564][T30938] Call Trace: [ 1039.621872][T30938] [ 1039.624806][T30938] dump_stack_lvl+0x188/0x250 [ 1039.629489][T30938] ? show_regs_print_info+0x20/0x20 [ 1039.634686][T30938] ? load_image+0x400/0x400 [ 1039.639202][T30938] ? __lock_acquire+0x7d10/0x7d10 [ 1039.644239][T30938] ? vfs_write+0x8b2/0xd60 [ 1039.648665][T30938] should_fail+0x38c/0x4c0 [ 1039.653100][T30938] _copy_from_user+0x2e/0x170 [ 1039.657792][T30938] __sys_bpf+0x26d/0x6f0 [ 1039.662037][T30938] ? bpf_link_show_fdinfo+0x380/0x380 [ 1039.667425][T30938] ? rcu_nmi_exit+0x6f/0xf0 [ 1039.671940][T30938] ? vtime_user_exit+0x2c8/0x3e0 [ 1039.676897][T30938] __x64_sys_bpf+0x78/0x90 [ 1039.681332][T30938] do_syscall_64+0x4c/0xa0 [ 1039.685749][T30938] ? clear_bhb_loop+0x30/0x80 [ 1039.690447][T30938] ? clear_bhb_loop+0x30/0x80 [ 1039.695144][T30938] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1039.701048][T30938] RIP: 0033:0x7f4572675dd9 [ 1039.705469][T30938] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1039.725078][T30938] RSP: 002b:00007f45708cf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1039.733490][T30938] RAX: ffffffffffffffda RBX: 00007f45728eefa0 RCX: 00007f4572675dd9 [ 1039.741469][T30938] RDX: 0000000000000058 RSI: 0000200000000080 RDI: 0000000000000005 [ 1039.749451][T30938] RBP: 00007f45708cf090 R08: 0000000000000000 R09: 0000000000000000 [ 1039.757425][T30938] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1039.765393][T30938] R13: 00007f45728ef038 R14: 00007f45728eefa0 R15: 00007ffddad27a08 [ 1039.773378][T30938] [ 1039.788624][T30934] __nla_validate_parse: 6 callbacks suppressed [ 1039.788691][T30934] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.8464'. [ 1040.350006][T30953] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8471'. [ 1040.903992][T30964] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.8475'. [ 1040.926152][T30966] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8476'. [ 1041.066984][T30971] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.8478'. [ 1042.557528][T31011] validate_nla: 12 callbacks suppressed [ 1042.557550][T31011] netlink: 'syz.6.8493': attribute type 19 has an invalid length. [ 1043.028512][T31005] netlink: 'syz.1.8491': attribute type 3 has an invalid length. [ 1043.076844][T31005] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.8491'. [ 1043.343940][T31020] netlink: 'syz.1.8496': attribute type 19 has an invalid length. [ 1043.370545][T31023] netlink: 'syz.6.8497': attribute type 27 has an invalid length. [ 1043.454917][T31024] netlink: 'syz.1.8496': attribute type 3 has an invalid length. [ 1043.495458][T31024] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.8496'. [ 1044.764726][T31052] netlink: 'syz.8.8508': attribute type 3 has an invalid length. [ 1044.805198][T31052] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.8508'. [ 1045.132663][T31068] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8514'. [ 1046.172855][T31088] netlink: 'syz.6.8520': attribute type 3 has an invalid length. [ 1046.237469][T31088] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.8520'. [ 1046.710674][ T1348] Bluetooth: hci1: command 0x0406 tx timeout [ 1046.894079][T31103] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8528'. [ 1047.567716][T31110] netlink: 'syz.8.8529': attribute type 19 has an invalid length. [ 1047.598272][T31119] netlink: 'syz.8.8529': attribute type 3 has an invalid length. [ 1047.612369][T31119] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.8529'. [ 1047.826700][T31124] netlink: 'syz.8.8533': attribute type 10 has an invalid length. [ 1047.841876][T31124] bridge0: port 3(dummy0) entered disabled state [ 1047.849490][T31124] bridge0: port 2(bridge_slave_1) entered disabled state [ 1047.862053][T31124] bridge0: port 1(bridge_slave_0) entered disabled state [ 1047.977906][T31124] bridge0: port 3(dummy0) entered blocking state [ 1047.985416][T31124] bridge0: port 3(dummy0) entered forwarding state [ 1047.997726][T31124] bridge0: port 2(bridge_slave_1) entered blocking state [ 1048.006182][T31124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1048.014879][T31124] bridge0: port 1(bridge_slave_0) entered blocking state [ 1048.023815][T31124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1048.096944][T31132] netlink: 'syz.6.8535': attribute type 3 has an invalid length. [ 1048.153892][T31132] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.8535'. [ 1048.207532][T31124] device bridge0 entered promiscuous mode [ 1048.245151][T31124] team0: Port device bridge0 added [ 1049.227793][T31157] netlink: 'syz.7.8543': attribute type 19 has an invalid length. [ 1049.474789][T31157] netlink: 'syz.7.8543': attribute type 3 has an invalid length. [ 1049.566902][T31157] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8543'. [ 1049.637254][T31162] netlink: 'syz.8.8545': attribute type 10 has an invalid length. [ 1049.696307][T31162] device geneve0 entered promiscuous mode [ 1049.960806][T31162] bond0: (slave geneve0): Enslaving as an active interface with an up link [ 1049.981755][T31172] netlink: 'syz.1.8548': attribute type 3 has an invalid length. [ 1049.991836][T31172] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.8548'. [ 1050.185905][T31180] netlink: 'syz.7.8551': attribute type 10 has an invalid length. [ 1050.208927][T31180] bridge0: port 3(dummy0) entered disabled state [ 1050.216652][T31180] bridge0: port 2(bridge_slave_1) entered disabled state [ 1050.805399][T31193] netlink: 'syz.0.8556': attribute type 10 has an invalid length. [ 1050.873677][T31191] delete_channel: no stack [ 1051.214166][T31204] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.8559'. [ 1051.401563][T31206] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.8560'. [ 1052.876499][T31236] validate_nla: 3 callbacks suppressed [ 1052.876579][T31236] netlink: 'syz.1.8571': attribute type 19 has an invalid length. [ 1052.984280][T31240] netlink: 'syz.1.8571': attribute type 3 has an invalid length. [ 1053.041506][T31240] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.8571'. [ 1053.633683][T31250] netlink: 'syz.1.8574': attribute type 3 has an invalid length. [ 1053.821929][T31250] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.8574'. [ 1054.614256][T31269] netlink: 203904 bytes leftover after parsing attributes in process `syz.1.8582'. [ 1054.901209][ T1424] ieee802154 phy0 wpan0: encryption failed: -22 [ 1054.907574][ T1424] ieee802154 phy1 wpan1: encryption failed: -22 [ 1055.207037][T31278] netlink: 'syz.7.8585': attribute type 19 has an invalid length. [ 1055.260081][T31276] netlink: 'syz.7.8585': attribute type 3 has an invalid length. [ 1055.278601][T31276] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8585'. [ 1055.721760][T31292] netlink: 'syz.7.8590': attribute type 3 has an invalid length. [ 1055.747908][T31292] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8590'. [ 1056.186574][T31304] netlink: 209852 bytes leftover after parsing attributes in process `syz.1.8595'. [ 1056.275544][T31302] netlink: 'syz.7.8594': attribute type 10 has an invalid length. [ 1056.453583][T31301] delete_channel: no stack [ 1057.220184][T31321] netlink: 'syz.7.8601': attribute type 19 has an invalid length. [ 1057.350459][T31326] netlink: 'syz.8.8604': attribute type 3 has an invalid length. [ 1057.383501][T31319] netlink: 'syz.7.8601': attribute type 3 has an invalid length. [ 1057.392093][T31326] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.8604'. [ 1057.435824][T31319] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8601'. [ 1057.628776][T31332] FAULT_INJECTION: forcing a failure. [ 1057.628776][T31332] name failslab, interval 1, probability 0, space 0, times 0 [ 1057.722712][T31332] CPU: 1 PID: 31332 Comm: syz.1.8606 Not tainted syzkaller #0 [ 1057.730320][T31332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1057.740485][T31332] Call Trace: [ 1057.743772][T31332] [ 1057.746705][T31332] dump_stack_lvl+0x188/0x250 [ 1057.751403][T31332] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 1057.757394][T31332] ? show_regs_print_info+0x20/0x20 [ 1057.762642][T31332] ? load_image+0x400/0x400 [ 1057.767176][T31332] should_fail+0x38c/0x4c0 [ 1057.771631][T31332] should_failslab+0x5/0x20 [ 1057.776182][T31332] slab_pre_alloc_hook+0x51/0xc0 [ 1057.781192][T31332] ? skb_clone+0x1bd/0x350 [ 1057.785662][T31332] kmem_cache_alloc+0x3d/0x290 [ 1057.790489][T31332] skb_clone+0x1bd/0x350 [ 1057.794793][T31332] __netlink_deliver_tap+0x3cd/0x7c0 [ 1057.800185][T31332] netlink_deliver_tap+0x16c/0x180 [ 1057.805352][T31332] netlink_unicast+0x74f/0x920 [ 1057.810217][T31332] netlink_sendmsg+0x8ba/0xbe0 [ 1057.815052][T31332] ? netlink_getsockopt+0x570/0x570 [ 1057.820305][T31332] ? aa_sock_msg_perm+0x94/0x150 [ 1057.825297][T31332] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1057.830621][T31332] ? security_socket_sendmsg+0x7c/0xa0 [ 1057.836128][T31332] ? netlink_getsockopt+0x570/0x570 [ 1057.841363][T31332] ____sys_sendmsg+0x5b7/0x8f0 [ 1057.846186][T31332] ? __sys_sendmsg_sock+0x30/0x30 [ 1057.851273][T31332] ? import_iovec+0x6f/0xa0 [ 1057.855861][T31332] ___sys_sendmsg+0x236/0x2e0 [ 1057.860643][T31332] ? __sys_sendmsg+0x2a0/0x2a0 [ 1057.865503][T31332] ? trace_event_raw_event_lock+0x270/0x270 [ 1057.871544][T31332] ? vfs_write+0x8b2/0xd60 [ 1057.876066][T31332] __se_sys_sendmsg+0x1af/0x290 [ 1057.880969][T31332] ? __x64_sys_sendmsg+0x80/0x80 [ 1057.885951][T31332] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 1057.892129][T31332] ? lockdep_hardirqs_on+0x94/0x140 [ 1057.897395][T31332] do_syscall_64+0x4c/0xa0 [ 1057.901865][T31332] ? clear_bhb_loop+0x30/0x80 [ 1057.906596][T31332] ? clear_bhb_loop+0x30/0x80 [ 1057.911337][T31332] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1057.917288][T31332] RIP: 0033:0x7f0532faedd9 [ 1057.921760][T31332] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1057.941531][T31332] RSP: 002b:00007f0531208028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1057.950012][T31332] RAX: ffffffffffffffda RBX: 00007f0533227fa0 RCX: 00007f0532faedd9 [ 1057.958240][T31332] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 000000000000000b [ 1057.966569][T31332] RBP: 00007f0531208090 R08: 0000000000000000 R09: 0000000000000000 [ 1057.974606][T31332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1057.982722][T31332] R13: 00007f0533228038 R14: 00007f0533227fa0 R15: 00007ffe3f1e3128 [ 1057.991011][T31332] [ 1058.048357][T31342] netlink: 'syz.7.8608': attribute type 10 has an invalid length. [ 1058.071476][T31342] netlink: 55 bytes leftover after parsing attributes in process `syz.7.8608'. [ 1058.878805][T31332] netlink: 'syz.1.8606': attribute type 10 has an invalid length. [ 1058.898128][T31332] netlink: 55 bytes leftover after parsing attributes in process `syz.1.8606'. [ 1058.945118][T31353] device wlan0 entered promiscuous mode [ 1060.105473][T31374] netlink: 'syz.7.8618': attribute type 19 has an invalid length. [ 1060.161887][T31374] netlink: 'syz.7.8618': attribute type 3 has an invalid length. [ 1060.212069][T31374] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8618'. [ 1061.233533][T31402] netlink: 150428 bytes leftover after parsing attributes in process `syz.0.8628'. [ 1061.336495][T31402] ksmbd: Daemon and kernel module version mismatch. ksmbd: 36, kernel module: 1. User-space ksmbd should terminate. [ 1061.368406][T31413] netlink: 'syz.7.8629': attribute type 3 has an invalid length. [ 1061.424501][T31413] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8629'. [ 1061.463086][T31412] netlink: 'syz.0.8628': attribute type 2 has an invalid length. [ 1061.476245][T31412] netlink: 150428 bytes leftover after parsing attributes in process `syz.0.8628'. [ 1061.821354][T31419] netlink: 'syz.1.8634': attribute type 19 has an invalid length. [ 1061.829475][T31417] netlink: 'syz.7.8632': attribute type 3 has an invalid length. [ 1061.829512][T31417] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8632'. [ 1061.869875][T31419] netlink: 'syz.1.8634': attribute type 3 has an invalid length. [ 1061.886057][T31419] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.8634'. [ 1062.454251][T31444] netlink: 'syz.1.8643': attribute type 3 has an invalid length. [ 1062.462990][T31444] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.8643'. [ 1063.063125][T31456] validate_nla: 1 callbacks suppressed [ 1063.063274][T31456] netlink: 'syz.8.8649': attribute type 3 has an invalid length. [ 1063.124825][T31456] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.8649'. [ 1063.197216][T31465] FAULT_INJECTION: forcing a failure. [ 1063.197216][T31465] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1063.250410][T31465] CPU: 0 PID: 31465 Comm: syz.0.8652 Not tainted syzkaller #0 [ 1063.257960][T31465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1063.268079][T31465] Call Trace: [ 1063.271387][T31465] [ 1063.274343][T31465] dump_stack_lvl+0x188/0x250 [ 1063.279071][T31465] ? show_regs_print_info+0x20/0x20 [ 1063.284304][T31465] ? load_image+0x400/0x400 [ 1063.288849][T31465] ? __lock_acquire+0x7d10/0x7d10 [ 1063.293910][T31465] ? slab_post_alloc_hook+0x4c/0x380 [ 1063.299224][T31465] ? __alloc_skb+0xf4/0x750 [ 1063.303758][T31465] ? alloc_skb_with_frags+0xa7/0x730 [ 1063.309072][T31465] ? sock_alloc_send_pskb+0x87f/0x9a0 [ 1063.314495][T31465] should_fail+0x38c/0x4c0 [ 1063.318962][T31465] prepare_alloc_pages+0x1e4/0x5f0 [ 1063.324124][T31465] __alloc_pages+0x11b/0x480 [ 1063.328758][T31465] ? zone_statistics+0x170/0x170 [ 1063.333819][T31465] kmalloc_large_node+0x7d/0x190 [ 1063.338830][T31465] __kmalloc_node_track_caller+0x22e/0x3a0 [ 1063.344680][T31465] ? alloc_skb_with_frags+0xa7/0x730 [ 1063.350017][T31465] ? kmem_cache_alloc_node+0x162/0x2d0 [ 1063.355514][T31465] ? __alloc_skb+0xf4/0x750 [ 1063.360058][T31465] ? alloc_skb_with_frags+0xa7/0x730 [ 1063.365380][T31465] __alloc_skb+0x22c/0x750 [ 1063.369848][T31465] alloc_skb_with_frags+0xa7/0x730 [ 1063.375019][T31465] sock_alloc_send_pskb+0x87f/0x9a0 [ 1063.380299][T31465] ? sock_kzfree_s+0x50/0x50 [ 1063.384954][T31465] tun_get_user+0x7c8/0x3a70 [ 1063.389707][T31465] ? perf_trace_lock+0x301/0x390 [ 1063.394885][T31465] ? tun_ring_recv+0xc40/0xc40 [ 1063.399731][T31465] ? rcu_lock_release+0x5/0x20 [ 1063.404555][T31465] ? __lock_acquire+0x7d10/0x7d10 [ 1063.409629][T31465] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 1063.415423][T31465] tun_chr_write_iter+0x112/0x1e0 [ 1063.420496][T31465] vfs_write+0x745/0xd60 [ 1063.424796][T31465] ? file_end_write+0x250/0x250 [ 1063.429718][T31465] ? __fget_files+0x40f/0x480 [ 1063.435080][T31465] ? __fdget_pos+0x1e2/0x370 [ 1063.439885][T31465] ? ksys_write+0x71/0x260 [ 1063.444952][T31465] ksys_write+0x152/0x260 [ 1063.449373][T31465] ? __ia32_sys_read+0x80/0x80 [ 1063.455177][T31465] ? lockdep_hardirqs_on+0x94/0x140 [ 1063.462558][T31465] do_syscall_64+0x4c/0xa0 [ 1063.467799][T31465] ? clear_bhb_loop+0x30/0x80 [ 1063.472755][T31465] ? clear_bhb_loop+0x30/0x80 [ 1063.478332][T31465] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1063.486464][T31465] RIP: 0033:0x7f1e0ca6fdd9 [ 1063.491132][T31465] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1063.511125][T31465] RSP: 002b:00007f1e0acc9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1063.519654][T31465] RAX: ffffffffffffffda RBX: 00007f1e0cce8fa0 RCX: 00007f1e0ca6fdd9 [ 1063.527711][T31465] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 1063.535841][T31465] RBP: 00007f1e0acc9090 R08: 0000000000000000 R09: 0000000000000000 [ 1063.544325][T31465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1063.552360][T31465] R13: 00007f1e0cce9038 R14: 00007f1e0cce8fa0 R15: 00007ffd1aa89ff8 [ 1063.560440][T31465] [ 1063.907010][T31468] netlink: 'syz.8.8654': attribute type 3 has an invalid length. [ 1063.962516][T31468] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.8654'. [ 1064.855424][T31493] netlink: 132 bytes leftover after parsing attributes in process `syz.0.8661'. [ 1065.203576][T31507] netlink: 'syz.6.8664': attribute type 19 has an invalid length. [ 1065.300476][T31507] netlink: 'syz.6.8664': attribute type 3 has an invalid length. [ 1065.383393][T31507] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.8664'. [ 1065.891995][T31519] netlink: 'syz.6.8669': attribute type 3 has an invalid length. [ 1066.425178][T31527] cgroup: fork rejected by pids controller in /syz6 [ 1066.924961][T31644] netlink: 'syz.7.8679': attribute type 19 has an invalid length. [ 1066.951686][T31644] netlink: 'syz.7.8679': attribute type 3 has an invalid length. [ 1067.041474][T31644] __nla_validate_parse: 1 callbacks suppressed [ 1067.041489][T31644] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8679'. [ 1067.608830][T31655] netlink: 'syz.0.8683': attribute type 19 has an invalid length. [ 1067.648588][T31656] netlink: 'syz.7.8682': attribute type 3 has an invalid length. [ 1067.681750][T31656] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8682'. [ 1067.710712][T31655] netlink: 'syz.0.8683': attribute type 3 has an invalid length. [ 1067.724771][T31655] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.8683'. [ 1067.792372][ T4424] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1067.931774][ T4424] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1068.031620][ T4424] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1068.195146][ T4424] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1069.012513][T31683] FAULT_INJECTION: forcing a failure. [ 1069.012513][T31683] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1069.072419][T31676] cgroup: fork rejected by pids controller in /syz0 [ 1069.116260][T31683] CPU: 0 PID: 31683 Comm: syz.1.8693 Not tainted syzkaller #0 [ 1069.123780][T31683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1069.133852][T31683] Call Trace: [ 1069.137148][T31683] [ 1069.140110][T31683] dump_stack_lvl+0x188/0x250 [ 1069.144831][T31683] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 1069.151128][T31683] ? show_regs_print_info+0x20/0x20 [ 1069.156375][T31683] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 1069.162562][T31683] ? dump_stack+0x5/0x20 [ 1069.166838][T31683] should_fail+0x38c/0x4c0 [ 1069.171308][T31683] _copy_from_user+0x2e/0x170 [ 1069.176009][T31683] iovec_from_user+0x142/0x370 [ 1069.180808][T31683] __import_iovec+0x70/0x490 [ 1069.185454][T31683] import_iovec+0x6f/0xa0 [ 1069.189817][T31683] ___sys_sendmsg+0x1fd/0x2e0 [ 1069.194544][T31683] ? __sys_sendmsg+0x2a0/0x2a0 [ 1069.199350][T31683] ? trace_event_raw_event_lock+0x270/0x270 [ 1069.205279][T31683] ? vfs_write+0x8b2/0xd60 [ 1069.209773][T31683] __se_sys_sendmsg+0x1af/0x290 [ 1069.214664][T31683] ? __x64_sys_sendmsg+0x80/0x80 [ 1069.219623][T31683] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 1069.225666][T31683] ? lockdep_hardirqs_on+0x94/0x140 [ 1069.230889][T31683] do_syscall_64+0x4c/0xa0 [ 1069.235323][T31683] ? clear_bhb_loop+0x30/0x80 [ 1069.240024][T31683] ? clear_bhb_loop+0x30/0x80 [ 1069.244752][T31683] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1069.258997][T31683] RIP: 0033:0x7f0532faedd9 [ 1069.269229][T31683] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1069.299837][T31683] RSP: 002b:00007f0531208028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1069.314259][T31683] RAX: ffffffffffffffda RBX: 00007f0533227fa0 RCX: 00007f0532faedd9 [ 1069.323609][T31683] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000004 [ 1069.333411][T31683] RBP: 00007f0531208090 R08: 0000000000000000 R09: 0000000000000000 [ 1069.342271][T31683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1069.351458][T31683] R13: 00007f0533228038 R14: 00007f0533227fa0 R15: 00007ffe3f1e3128 [ 1069.362182][T31683] [ 1069.388836][T31682] netlink: 'syz.8.8692': attribute type 19 has an invalid length. [ 1069.400863][T31703] netlink: 'syz.8.8692': attribute type 3 has an invalid length. [ 1069.400894][T31703] netlink: 105116 bytes leftover after parsing attributes in process `syz.8.8692'. [ 1069.681998][T31670] chnl_net:caif_netlink_parms(): no params data found [ 1070.026907][T31812] netlink: 'syz.7.8696': attribute type 3 has an invalid length. [ 1070.045484][T31805] netlink: 'syz.7.8696': attribute type 19 has an invalid length. [ 1070.057866][T31812] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8696'. [ 1070.168952][T31670] bridge0: port 1(bridge_slave_0) entered blocking state [ 1070.248842][T31670] bridge0: port 1(bridge_slave_0) entered disabled state [ 1070.282846][T31670] device bridge_slave_0 entered promiscuous mode [ 1070.406689][ T4254] Bluetooth: hci3: command 0x0409 tx timeout [ 1070.416181][T31670] bridge0: port 2(bridge_slave_1) entered blocking state [ 1070.423299][T31670] bridge0: port 2(bridge_slave_1) entered disabled state [ 1070.445808][T31670] device bridge_slave_1 entered promiscuous mode [ 1070.657313][T31670] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1070.717353][T31670] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1070.983165][T31670] team0: Port device team_slave_0 added [ 1071.419035][T31835] netlink: 'syz.1.8703': attribute type 10 has an invalid length. [ 1071.632356][T31835] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1071.685332][T31835] device bond0 entered promiscuous mode [ 1071.704715][T31835] device bond_slave_0 entered promiscuous mode [ 1071.716253][T31835] device bond_slave_1 entered promiscuous mode [ 1071.739167][T31835] team0: Port device bond0 added [ 1071.800740][T31841] cgroup: fork rejected by pids controller in /syz8 [ 1071.827247][ T4424] device wlan1 left promiscuous mode [ 1071.916116][ T4424] team0: Port device wlan1 removed [ 1071.967646][T31670] team0: Port device team_slave_1 added [ 1072.143618][T31670] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1072.217944][T31670] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1072.329970][T31670] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1072.416135][T31670] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1072.443458][T31670] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1072.474606][ T4232] Bluetooth: hci3: command 0x041b tx timeout [ 1072.479198][T31670] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1072.549081][T31952] netlink: 'syz.7.8707': attribute type 19 has an invalid length. [ 1072.578735][T31950] netlink: 'syz.7.8707': attribute type 3 has an invalid length. [ 1072.587142][T31950] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8707'. [ 1072.638928][T31956] IPv6: NLM_F_CREATE should be specified when creating new route [ 1072.692069][T31956] netlink: 1 bytes leftover after parsing attributes in process `syz.1.8708'. [ 1072.754336][ T4424] device team0 left promiscuous mode [ 1072.759835][ T4424] device team_slave_0 left promiscuous mode [ 1072.804521][ T4424] device team_slave_1 left promiscuous mode [ 1072.825913][ T4424] GPL: port 1(team0) entered disabled state [ 1072.850736][ T4424] device hsr_slave_0 left promiscuous mode [ 1072.864653][ T4424] device hsr_slave_1 left promiscuous mode [ 1072.878209][ T4424] bridge0: port 3(dummy0) entered disabled state [ 1072.890679][ T4424] device bridge_slave_0 left promiscuous mode [ 1072.913095][ T4424] bridge0: port 1(bridge_slave_0) entered disabled state [ 1073.090458][ T4424] device veth1_macvtap left promiscuous mode [ 1073.097838][ T4424] device veth0_macvtap left promiscuous mode [ 1073.103914][ T4424] device veth1_vlan left promiscuous mode [ 1073.119205][ T4232] Bluetooth: hci4: command 0x0409 tx timeout [ 1073.128264][ T4424] device veth0_vlan left promiscuous mode [ 1073.532661][ T4424] team0 (unregistering): Port device team_slave_1 removed [ 1073.555535][ T4424] team0 (unregistering): Port device team_slave_0 removed [ 1073.569354][ T4424] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1073.597374][ T4424] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1073.617498][ T4424] bond0 (unregistering): (slave bridge_slave_1): Releasing backup interface [ 1073.688281][ T4424] bond0 (unregistering): Released all slaves [ 1073.737152][T31670] device hsr_slave_0 entered promiscuous mode [ 1073.747849][T31670] device hsr_slave_1 entered promiscuous mode [ 1074.001531][T32003] netlink: 'syz.1.8712': attribute type 19 has an invalid length. [ 1074.095586][T32003] netlink: 'syz.1.8712': attribute type 3 has an invalid length. [ 1074.104614][T32003] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.8712'. [ 1074.130643][T31831] chnl_net:caif_netlink_parms(): no params data found [ 1074.391906][T32015] netlink: 'syz.7.8716': attribute type 3 has an invalid length. [ 1074.409694][T32015] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8716'. [ 1074.626007][ T4232] Bluetooth: hci3: command 0x040f tx timeout [ 1074.751442][T32024] mac80211_hwsim hwsim64 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1074.809118][T31831] bridge0: port 1(bridge_slave_0) entered blocking state [ 1074.853754][T31831] bridge0: port 1(bridge_slave_0) entered disabled state [ 1074.882031][T31831] device bridge_slave_0 entered promiscuous mode [ 1074.902695][T31973] chnl_net:caif_netlink_parms(): no params data found [ 1074.919422][T31831] bridge0: port 2(bridge_slave_1) entered blocking state [ 1074.935579][T31831] bridge0: port 2(bridge_slave_1) entered disabled state [ 1074.981750][T31831] device bridge_slave_1 entered promiscuous mode [ 1074.992912][T32037] netlink: 'syz.7.8719': attribute type 10 has an invalid length. [ 1075.022106][T32037] netlink: 209796 bytes leftover after parsing attributes in process `syz.7.8719'. [ 1075.035755][T32037] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1075.057863][T32040] netlink: 181252 bytes leftover after parsing attributes in process `syz.7.8719'. [ 1075.159689][T32042] netlink: 'syz.1.8720': attribute type 19 has an invalid length. [ 1075.188286][ T4234] Bluetooth: hci4: command 0x041b tx timeout [ 1075.203538][T31831] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1075.238030][T32042] netlink: 'syz.1.8720': attribute type 3 has an invalid length. [ 1075.253092][T31831] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1075.264530][ T4267] Bluetooth: hci1: command 0x0409 tx timeout [ 1075.288416][T32042] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.8720'. [ 1075.406291][T31973] bridge0: port 1(bridge_slave_0) entered blocking state [ 1075.415693][T31973] bridge0: port 1(bridge_slave_0) entered disabled state [ 1075.440747][T31973] device bridge_slave_0 entered promiscuous mode [ 1075.469323][T31831] team0: Port device team_slave_0 added [ 1075.494806][T31973] bridge0: port 2(bridge_slave_1) entered blocking state [ 1075.515835][T31973] bridge0: port 2(bridge_slave_1) entered disabled state [ 1075.564989][T31973] device bridge_slave_1 entered promiscuous mode [ 1075.591003][T31831] team0: Port device team_slave_1 added [ 1075.653306][T31670] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 1075.706858][T31973] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1075.724513][T31670] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 1075.742632][T31831] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1075.750528][T31831] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1075.804609][T31831] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1075.829670][T31973] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1075.847028][T31670] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 1075.864554][T31831] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1075.874174][T31831] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1076.027261][T31831] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1076.089053][T31670] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 1076.138572][T31973] team0: Port device team_slave_0 added [ 1076.218213][T31973] team0: Port device team_slave_1 added [ 1076.307716][T31831] device hsr_slave_0 entered promiscuous mode [ 1076.346149][T31831] device hsr_slave_1 entered promiscuous mode [ 1076.366471][T32065] netlink: 'syz.7.8728': attribute type 3 has an invalid length. [ 1076.375079][T31831] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1076.382649][T31831] Cannot create hsr debugfs directory [ 1076.394630][T32065] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8728'. [ 1076.492740][T31973] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1076.547386][T31973] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1076.604448][T31973] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1076.651327][T31973] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1076.671904][T31973] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1076.704765][ T1108] Bluetooth: hci3: command 0x0419 tx timeout [ 1076.728667][T31973] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1076.833835][T31670] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1076.886531][T31973] device hsr_slave_0 entered promiscuous mode [ 1076.906143][T31973] device hsr_slave_1 entered promiscuous mode [ 1076.929189][T31973] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1076.955697][T31973] Cannot create hsr debugfs directory [ 1076.995905][ T1283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1077.019005][ T1283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1077.053969][T31670] 8021q: adding VLAN 0 to HW filter on device team0 [ 1077.142644][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1077.168988][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1077.205664][ T4434] bridge0: port 1(bridge_slave_0) entered blocking state [ 1077.212796][ T4434] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1077.229113][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1077.242113][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1077.258916][ T4434] bridge0: port 2(bridge_slave_1) entered blocking state [ 1077.266053][ T4434] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1077.275169][ T4254] Bluetooth: hci4: command 0x040f tx timeout [ 1077.288482][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1077.302187][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1077.354522][ T4254] Bluetooth: hci1: command 0x041b tx timeout [ 1077.363827][T31831] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1077.422752][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1077.442952][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1077.473251][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1077.490141][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1077.500455][T32093] netlink: 'syz.1.8733': attribute type 3 has an invalid length. [ 1077.521126][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1077.529371][T32093] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.8733'. [ 1077.540155][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1077.562259][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1077.589782][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1077.612361][T32091] netlink: 'syz.1.8733': attribute type 19 has an invalid length. [ 1077.626923][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1077.636796][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1077.657167][T31831] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1077.672579][T32096] netlink: 8 bytes leftover after parsing attributes in process `syz.7.8734'. [ 1077.696140][T31670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1077.865717][T31831] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1077.978094][T31831] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1078.132046][T31973] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1078.194951][ T1283] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1078.202459][ T1283] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1078.243694][T31670] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1078.278448][T31973] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1078.537947][T31973] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1078.666073][T31973] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1078.772250][ T4424] tipc: Left network mode [ 1078.988456][T31831] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1079.036358][T31831] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1079.050694][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1079.062930][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1079.088544][T31831] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1079.122071][T31670] device veth0_vlan entered promiscuous mode [ 1079.134672][T31670] device veth1_vlan entered promiscuous mode [ 1079.143338][T31831] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1079.163409][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1079.179644][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1079.188917][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1079.198592][T31973] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 1079.251631][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1079.260707][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1079.281967][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1079.297098][T31973] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 1079.310723][T25735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1079.319860][T25735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1079.344816][ T4232] Bluetooth: hci4: command 0x0419 tx timeout [ 1079.356573][T31670] device veth0_macvtap entered promiscuous mode [ 1079.371919][T31973] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 1079.383194][T31973] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 1079.404309][T31670] device veth1_macvtap entered promiscuous mode [ 1079.422227][T31670] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1079.433000][T18747] Bluetooth: hci1: command 0x040f tx timeout [ 1079.446764][T31670] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1079.461839][T31670] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1079.481365][T31670] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1079.493541][T31670] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1079.512072][T31670] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1079.526687][T31670] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1079.570110][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1079.578966][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1079.596254][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1079.606032][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1079.616532][T31670] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1079.632907][T31670] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1079.643501][T31670] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1079.660826][T31670] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1079.674400][T31670] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1079.692100][T31670] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1079.702114][T31670] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1079.719954][T31670] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1079.733305][T31670] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1079.752080][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1079.761935][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1079.793763][T31670] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1079.804183][T31670] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1079.812965][T31670] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1079.821902][T31670] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1079.961211][T31831] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1079.998999][T31973] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1080.012115][T31831] 8021q: adding VLAN 0 to HW filter on device team0 [ 1080.027231][ T1283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1080.043911][ T1283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1080.083571][T31973] 8021q: adding VLAN 0 to HW filter on device team0 [ 1080.096511][ T4434] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1080.105047][ T1283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1080.109227][ T4434] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1080.125089][ T1283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1080.137274][ T1283] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1080.155416][ T1283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1080.168939][ T1283] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1080.177498][ T1283] bridge0: port 1(bridge_slave_0) entered blocking state [ 1080.184620][ T1283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1080.198998][ T1283] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1080.269691][T25735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1080.284867][T25735] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1080.311968][T25735] bridge0: port 1(bridge_slave_0) entered blocking state [ 1080.319068][T25735] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1080.339309][T25735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1080.348436][T25735] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1080.357459][T25735] bridge0: port 2(bridge_slave_1) entered blocking state [ 1080.364560][T25735] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1080.372524][T25735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1080.382297][T25735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1080.391902][T25735] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1080.400692][T25735] bridge0: port 2(bridge_slave_1) entered blocking state [ 1080.407807][T25735] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1080.441393][T25735] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1080.450338][T25735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1080.459234][T25735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1080.469508][T25735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1080.481077][T25735] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1080.490274][T25735] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1080.503166][ T4434] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1080.514229][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1080.525137][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1080.533135][ T4434] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1080.541125][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1080.563223][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1080.571295][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1080.580896][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1080.590288][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1080.599635][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1080.610343][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1080.620849][ T1283] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1080.630656][ T1283] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1080.653717][T31831] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1080.685142][T31831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1080.693241][T31973] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1080.722205][T31973] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1080.737055][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1080.746341][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1080.755507][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1080.764032][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1080.773102][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1080.782293][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1080.791773][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1080.818323][ T4424] device wlan1 left promiscuous mode [ 1080.839066][ T4424] team0: Port device wlan1 removed [ 1081.095959][T32172] netlink: 'syz.7.8740': attribute type 19 has an invalid length. [ 1081.122914][T32172] netlink: 'syz.7.8740': attribute type 3 has an invalid length. [ 1081.167405][T32172] netlink: 105116 bytes leftover after parsing attributes in process `syz.7.8740'. [ 1081.197906][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1081.217842][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1081.250848][T31831] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1081.355495][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1081.373031][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1081.452436][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1081.474268][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1081.507649][T31973] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1081.515460][T18747] Bluetooth: hci1: command 0x0419 tx timeout [ 1081.547155][T31831] device veth0_vlan entered promiscuous mode [ 1081.640304][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1081.673468][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1081.686960][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1081.710359][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1081.843338][T32191] netlink: 209844 bytes leftover after parsing attributes in process `syz.6.8744'. [ 1081.847280][T31831] device veth1_vlan entered promiscuous mode [ 1082.102543][ T4424] device team0 left promiscuous mode [ 1082.141425][ T4424] device team_slave_0 left promiscuous mode [ 1082.157041][ T4424] device team_slave_1 left promiscuous mode [ 1082.163242][ T4424] device bridge0 left promiscuous mode [ 1082.171296][ T4424] GPL: port 1(team0) entered disabled state [ 1082.201957][ T4424] device hsr_slave_0 left promiscuous mode [ 1082.211607][T32202] netlink: 'syz.1.8746': attribute type 3 has an invalid length. [ 1082.219872][ T4424] device hsr_slave_1 left promiscuous mode [ 1082.226523][T32202] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.8746'. [ 1082.243832][ T4424] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1082.251722][ T4424] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1082.266808][ T4424] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1082.274211][ T4424] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1082.282372][ T4424] bridge0: port 3(dummy0) entered disabled state [ 1082.297096][ T4424] device bridge_slave_1 left promiscuous mode [ 1082.303289][ T4424] bridge0: port 2(bridge_slave_1) entered disabled state [ 1082.313694][ T4424] device bridge_slave_0 left promiscuous mode [ 1082.320059][ T4424] bridge0: port 1(bridge_slave_0) entered disabled state [ 1082.334078][ T4424] device hsr_slave_0 left promiscuous mode [ 1082.341630][ T4424] device hsr_slave_1 left promiscuous mode [ 1082.349063][ T4424] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1082.356834][ T4424] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1082.365113][ T4424] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1082.372624][ T4424] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1082.381143][ T4424] bridge0: port 3(dummy0) entered disabled state [ 1082.394135][ T4424] device bridge_slave_0 left promiscuous mode [ 1082.407267][ T4424] bridge0: port 1(bridge_slave_0) entered disabled state [ 1082.424127][ T4424] device veth1_macvtap left promiscuous mode [ 1082.430431][ T4424] device veth0_macvtap left promiscuous mode [ 1082.437162][ T4424] device veth1_vlan left promiscuous mode [ 1082.443071][ T4424] device veth0_vlan left promiscuous mode [ 1082.451758][ T4424] device veth1_macvtap left promiscuous mode [ 1082.458447][ T4424] device veth0_macvtap left promiscuous mode [ 1082.465798][ T4424] device veth1_vlan left promiscuous mode [ 1082.727860][ T4424] bond0 (unregistering): (slave geneve0): Releasing backup interface [ 1082.850104][ T4424] team0 (unregistering): Port device team_slave_1 removed [ 1082.868078][ T4424] team0 (unregistering): Port device team_slave_0 removed [ 1082.889679][ T4424] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1082.908060][ T4424] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1082.989961][ T4424] team0 (unregistering): Port device bridge0 removed [ 1083.011732][ T4424] bond0 (unregistering): Released all slaves [ 1083.226064][ T4424] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1083.243607][ T4424] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1083.262385][ T4424] bond0 (unregistering): (slave bridge_slave_1): Releasing backup interface [ 1083.330852][ T4424] bond0 (unregistering): Released all slaves [ 1083.407277][T32198] netlink: 'syz.1.8746': attribute type 19 has an invalid length. [ 1083.437198][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1083.456342][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1083.483353][T31831] device veth0_macvtap entered promiscuous mode [ 1083.542610][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1083.566973][T32208] FAULT_INJECTION: forcing a failure. [ 1083.566973][T32208] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.596900][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1083.613528][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1083.624019][T32208] CPU: 1 PID: 32208 Comm: syz.1.8748 Not tainted syzkaller #0 [ 1083.631508][T32208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1083.641600][T32208] Call Trace: [ 1083.644917][T32208] [ 1083.647874][T32208] dump_stack_lvl+0x188/0x250 [ 1083.652616][T32208] ? show_regs_print_info+0x20/0x20 [ 1083.657851][T32208] ? load_image+0x400/0x400 [ 1083.662388][T32208] ? __might_sleep+0xf0/0xf0 [ 1083.667014][T32208] ? __lock_acquire+0x7d10/0x7d10 [ 1083.672067][T32208] ? mark_lock+0x94/0x320 [ 1083.676439][T32208] should_fail+0x38c/0x4c0 [ 1083.680939][T32208] should_failslab+0x5/0x20 [ 1083.685492][T32208] slab_pre_alloc_hook+0x51/0xc0 [ 1083.690477][T32208] __kmalloc+0x6b/0x330 [ 1083.694668][T32208] ? tomoyo_realpath_from_path+0x118/0x610 [ 1083.700520][T32208] tomoyo_realpath_from_path+0x118/0x610 [ 1083.706217][T32208] tomoyo_path_number_perm+0x242/0x660 [ 1083.711710][T32208] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 1083.717173][T32208] ? perf_trace_lock+0xe4/0x390 [ 1083.722093][T32208] security_file_ioctl+0x6c/0xa0 [ 1083.727044][T32208] __se_sys_ioctl+0x48/0x170 [ 1083.731650][T32208] do_syscall_64+0x4c/0xa0 [ 1083.736082][T32208] ? clear_bhb_loop+0x30/0x80 [ 1083.740759][T32208] ? clear_bhb_loop+0x30/0x80 [ 1083.745453][T32208] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1083.751377][T32208] RIP: 0033:0x7f0532faedd9 [ 1083.755829][T32208] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1083.775477][T32208] RSP: 002b:00007f0531208028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1083.783922][T32208] RAX: ffffffffffffffda RBX: 00007f0533227fa0 RCX: 00007f0532faedd9 [ 1083.791929][T32208] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 000000000000000d [ 1083.800018][T32208] RBP: 00007f0531208090 R08: 0000000000000000 R09: 0000000000000000 [ 1083.808046][T32208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1083.816054][T32208] R13: 00007f0533228038 R14: 00007f0533227fa0 R15: 00007ffe3f1e3128 [ 1083.824116][T32208] [ 1083.833355][T32208] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1083.843825][T31831] device veth1_macvtap entered promiscuous mode [ 1083.933775][T31831] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1083.966789][T31831] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1083.977769][T31831] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1083.988996][T31831] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1084.002007][T31831] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1084.022430][T31997] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1084.043540][T31997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1084.085320][T31997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1084.095898][T31997] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1084.106667][T31997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1084.129601][T31831] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1084.164493][T31831] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1084.182702][T31831] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1084.194679][T31831] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1084.211080][T31831] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1084.224589][T31831] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1084.248813][T31831] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1084.259991][T31831] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1084.268761][T31831] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1084.287503][T31831] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1084.296683][T31831] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1084.328954][T31973] device veth0_vlan entered promiscuous mode [ 1084.347788][T32217] netlink: 'syz.1.8753': attribute type 3 has an invalid length. [ 1084.381108][T32217] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.8753'. [ 1084.396635][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1084.421323][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1084.444139][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1084.461328][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1084.470754][T32216] netlink: 'syz.1.8753': attribute type 19 has an invalid length. [ 1084.508481][T32221] netlink: 188 bytes leftover after parsing attributes in process `syz.6.8755'. [ 1084.542254][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1084.556470][ T4242] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1084.586762][T31973] device veth1_vlan entered promiscuous mode [ 1084.701962][T31973] device veth0_macvtap entered promiscuous mode [ 1084.714215][T31973] device veth1_macvtap entered promiscuous mode [ 1084.725247][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1084.734183][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1084.743271][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1084.754211][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1084.771382][T31973] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1084.821036][T31973] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1084.831113][T31973] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1084.849583][T31973] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1084.875212][T31973] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1084.903310][T31973] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1084.941112][T31973] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1084.978133][T31997] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1085.049324][T31997] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1085.135355][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1085.166284][T32231] netlink: 'syz.1.8759': attribute type 3 has an invalid length. [ 1085.198845][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1085.210863][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1085.218806][T32231] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.8759'. [ 1085.231214][T31973] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1085.257974][T31973] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1085.272644][T31973] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1085.290866][T31973] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1085.302329][T31973] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1085.319996][T31973] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1085.332361][T31973] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1085.350979][T31973] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1085.364074][T31973] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1085.383981][T32230] netlink: 'syz.1.8759': attribute type 19 has an invalid length. [ 1085.403300][T32233] netlink: 'syz.6.8758': attribute type 10 has an invalid length. [ 1085.412752][T32233] netlink: 40 bytes leftover after parsing attributes in process `syz.6.8758'. [ 1085.429151][T32233] device dummy0 entered promiscuous mode [ 1085.460101][T32233] bridge0: port 3(dummy0) entered blocking state [ 1085.467714][T32233] bridge0: port 3(dummy0) entered disabled state [ 1085.489251][T32233] bridge0: port 3(dummy0) entered blocking state [ 1085.495668][T32233] bridge0: port 3(dummy0) entered listening state [ 1085.523512][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1085.536348][ T4428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1085.551440][T31973] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1085.560633][ T4434] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1085.574969][ T4434] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1085.582665][T31973] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1085.609274][T31973] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1085.618102][T31973] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1085.643260][T31997] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1085.883260][ T4428] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1085.900221][ T4428] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1085.951785][ T1283] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1086.007635][ T4242] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1086.021311][ T4242] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1086.053185][ T1283] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1086.505350][T32261] netlink: 'syz.7.8767': attribute type 10 has an invalid length. [ 1086.533861][T32261] netlink: 168 bytes leftover after parsing attributes in process `syz.7.8767'. [ 1086.720987][T32270] netlink: 'syz.6.8771': attribute type 19 has an invalid length. [ 1086.773145][T32273] netlink: 'syz.6.8771': attribute type 3 has an invalid length. [ 1086.804624][T32273] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.8771'. [ 1086.916112][T32277] netlink: 1047 bytes leftover after parsing attributes in process `syz.8.8772'. [ 1086.936719][T32277] bridge_slave_1: default FDB implementation only supports local addresses [ 1087.175319][ C1] ------------[ cut here ]------------ [ 1087.175334][ C1] WARNING: CPU: 1 PID: 32285 at mm/maccess.c:226 copy_from_user_nofault+0x160/0x1c0 [ 1087.175382][ C1] Modules linked in: [ 1087.175392][ C1] CPU: 1 PID: 32285 Comm: syz.6.8775 Not tainted syzkaller #0 [ 1087.175413][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1087.175424][ C1] RIP: 0010:copy_from_user_nofault+0x160/0x1c0 [ 1087.175446][ C1] Code: 24 45 31 f6 31 ff 89 de e8 7d 90 d8 ff 85 db 48 c7 c0 f2 ff ff ff 49 0f 44 c6 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 00 8d d8 ff <0f> 0b e9 1c ff ff ff 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c ea fe [ 1087.175463][ C1] RSP: 0018:fffffe000005d8e8 EFLAGS: 00010006 [ 1087.175479][ C1] RAX: ffffffff81a0a790 RBX: 0000000000000008 RCX: ffff88801e3c5940 [ 1087.175494][ C1] RDX: 0000000000110000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1087.175506][ C1] RBP: 0000000000000000 R08: ffff88801e3c5947 R09: 1ffff11003c78b28 [ 1087.175519][ C1] R10: dffffc0000000000 R11: ffffed1003c78b29 R12: ffff88801e3c70c8 [ 1087.175534][ C1] R13: 00007ffffffff000 R14: fffffe000005d958 R15: 0000000020000000 [ 1087.175548][ C1] FS: 00007f67b2b116c0(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000 [ 1087.175585][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1087.175599][ C1] CR2: 0000000000000000 CR3: 0000000067715000 CR4: 00000000003506e0 [ 1087.175616][ C1] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 1087.175630][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 1087.175643][ C1] Call Trace: [ 1087.175649][ C1] <#DB> [ 1087.175659][ C1] bpf_probe_read_compat+0xdd/0x170 [ 1087.175688][ C1] bpf_prog_ca2ebcd76953ac02_F+0x2c/0xb48 [ 1087.175707][ C1] bpf_prog_b89d7ca37128ef40+0x1a/0x620 [ 1087.175725][ C1] bpf_overflow_handler+0x1c2/0x4a0 [ 1087.175751][ C1] ? perf_event_switch_output+0x730/0x730 [ 1087.175779][ C1] ? __perf_event_account_interrupt+0x187/0x280 [ 1087.175801][ C1] __perf_event_overflow+0x364/0x530 [ 1087.175826][ C1] perf_swevent_event+0x4ad/0x530 [ 1087.175849][ C1] perf_bp_event+0x276/0x320 [ 1087.175873][ C1] ? perf_event_free_bpf_prog+0x110/0x110 [ 1087.175912][ C1] ? rcu_lock_acquire+0x9/0x30 [ 1087.175934][ C1] ? read_lock_is_recursive+0x10/0x10 [ 1087.175962][ C1] hw_breakpoint_exceptions_notify+0x152/0x470 [ 1087.175998][ C1] atomic_notifier_call_chain+0x15d/0x280 [ 1087.176021][ C1] notify_die+0x141/0x1a0 [ 1087.176042][ C1] ? srcu_init_notifier_head+0x90/0x90 [ 1087.176066][ C1] ? exc_debug+0x6e/0x130 [ 1087.176086][ C1] ? trace_hardirqs_off_finish+0x57/0x1f0 [ 1087.176110][ C1] notify_debug+0x20/0x30 [ 1087.176132][ C1] exc_debug+0xcf/0x130 [ 1087.176153][ C1] asm_exc_debug+0x1a/0x40 [ 1087.176171][ C1] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 1087.176195][ C1] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 1087.176211][ C1] RSP: 0018:ffffc900032cfd80 EFLAGS: 00050202 [ 1087.176227][ C1] RAX: ffffffff83e41101 RBX: 0000000000000050 RCX: 000000000000000c [ 1087.176240][ C1] RDX: 0000000000000050 RSI: 0000200000000304 RDI: ffffc900032cfe44 [ 1087.176252][ C1] RBP: 0000000000000000 R08: ffffc900032cfe4f R09: 1ffff92000659fc9 [ 1087.176262][ C1] R10: dffffc0000000000 R11: fffff52000659fca R12: 00007ffffffff000 [ 1087.176274][ C1] R13: 0000200000000310 R14: ffffc900032cfe00 R15: 00002000000002c0 [ 1087.176290][ C1] ? _copy_from_user+0x51/0x170 [ 1087.176315][ C1] [ 1087.176321][ C1] [ 1087.176326][ C1] _copy_from_user+0xfa/0x170 [ 1087.176346][ C1] __sys_bpf+0x26d/0x6f0 [ 1087.176376][ C1] ? bpf_link_show_fdinfo+0x380/0x380 [ 1087.176409][ C1] __x64_sys_bpf+0x78/0x90 [ 1087.176429][ C1] do_syscall_64+0x4c/0xa0 [ 1087.176447][ C1] ? clear_bhb_loop+0x30/0x80 [ 1087.176465][ C1] ? clear_bhb_loop+0x30/0x80 [ 1087.176484][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1087.176522][ C1] RIP: 0033:0x7f67b48b7dd9 [ 1087.176538][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1087.176556][ C1] RSP: 002b:00007f67b2b11028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1087.176590][ C1] RAX: ffffffffffffffda RBX: 00007f67b4b30fa0 RCX: 00007f67b48b7dd9 [ 1087.176604][ C1] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000001c [ 1087.176617][ C1] RBP: 00007f67b494dd69 R08: 0000000000000000 R09: 0000000000000000 [ 1087.176630][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1087.176642][ C1] R13: 00007f67b4b31038 R14: 00007f67b4b30fa0 R15: 00007fff7e937348 [ 1087.176666][ C1] [ 1087.176682][ C1] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1087.176691][ C1] CPU: 1 PID: 32285 Comm: syz.6.8775 Not tainted syzkaller #0 [ 1087.176710][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1087.176721][ C1] Call Trace: [ 1087.176726][ C1] <#DB> [ 1087.176732][ C1] dump_stack_lvl+0x188/0x250 [ 1087.176752][ C1] ? show_regs_print_info+0x20/0x20 [ 1087.176770][ C1] ? load_image+0x400/0x400 [ 1087.176795][ C1] panic+0x2e5/0x810 [ 1087.176819][ C1] ? bpf_jit_dump+0xd0/0xd0 [ 1087.176847][ C1] ? copy_from_user_nofault+0x160/0x1c0 [ 1087.176869][ C1] __warn+0x248/0x2b0 [ 1087.176889][ C1] ? copy_from_user_nofault+0x160/0x1c0 [ 1087.176910][ C1] report_bug+0x1b7/0x2e0 [ 1087.176935][ C1] handle_bug+0x3a/0x70 [ 1087.176953][ C1] exc_invalid_op+0x16/0x40 [ 1087.176972][ C1] asm_exc_invalid_op+0x16/0x20 [ 1087.176989][ C1] RIP: 0010:copy_from_user_nofault+0x160/0x1c0 [ 1087.177011][ C1] Code: 24 45 31 f6 31 ff 89 de e8 7d 90 d8 ff 85 db 48 c7 c0 f2 ff ff ff 49 0f 44 c6 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 00 8d d8 ff <0f> 0b e9 1c ff ff ff 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c ea fe [ 1087.177027][ C1] RSP: 0018:fffffe000005d8e8 EFLAGS: 00010006 [ 1087.177042][ C1] RAX: ffffffff81a0a790 RBX: 0000000000000008 RCX: ffff88801e3c5940 [ 1087.177055][ C1] RDX: 0000000000110000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1087.177067][ C1] RBP: 0000000000000000 R08: ffff88801e3c5947 R09: 1ffff11003c78b28 [ 1087.177080][ C1] R10: dffffc0000000000 R11: ffffed1003c78b29 R12: ffff88801e3c70c8 [ 1087.177094][ C1] R13: 00007ffffffff000 R14: fffffe000005d958 R15: 0000000020000000 [ 1087.177113][ C1] ? copy_from_user_nofault+0x160/0x1c0 [ 1087.177137][ C1] ? copy_from_user_nofault+0x160/0x1c0 [ 1087.177158][ C1] bpf_probe_read_compat+0xdd/0x170 [ 1087.177182][ C1] bpf_prog_ca2ebcd76953ac02_F+0x2c/0xb48 [ 1087.177199][ C1] bpf_prog_b89d7ca37128ef40+0x1a/0x620 [ 1087.177215][ C1] bpf_overflow_handler+0x1c2/0x4a0 [ 1087.177239][ C1] ? perf_event_switch_output+0x730/0x730 [ 1087.177265][ C1] ? __perf_event_account_interrupt+0x187/0x280 [ 1087.177286][ C1] __perf_event_overflow+0x364/0x530 [ 1087.177308][ C1] perf_swevent_event+0x4ad/0x530 [ 1087.177329][ C1] perf_bp_event+0x276/0x320 [ 1087.177351][ C1] ? perf_event_free_bpf_prog+0x110/0x110 [ 1087.177392][ C1] ? rcu_lock_acquire+0x9/0x30 [ 1087.177412][ C1] ? read_lock_is_recursive+0x10/0x10 [ 1087.177437][ C1] hw_breakpoint_exceptions_notify+0x152/0x470 [ 1087.177458][ C1] atomic_notifier_call_chain+0x15d/0x280 [ 1087.177480][ C1] notify_die+0x141/0x1a0 [ 1087.177499][ C1] ? srcu_init_notifier_head+0x90/0x90 [ 1087.177522][ C1] ? exc_debug+0x6e/0x130 [ 1087.177540][ C1] ? trace_hardirqs_off_finish+0x57/0x1f0 [ 1087.177561][ C1] notify_debug+0x20/0x30 [ 1087.177579][ C1] exc_debug+0xcf/0x130 [ 1087.177599][ C1] asm_exc_debug+0x1a/0x40 [ 1087.177615][ C1] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 1087.177636][ C1] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 1087.177651][ C1] RSP: 0018:ffffc900032cfd80 EFLAGS: 00050202 [ 1087.177666][ C1] RAX: ffffffff83e41101 RBX: 0000000000000050 RCX: 000000000000000c [ 1087.177679][ C1] RDX: 0000000000000050 RSI: 0000200000000304 RDI: ffffc900032cfe44 [ 1087.177692][ C1] RBP: 0000000000000000 R08: ffffc900032cfe4f R09: 1ffff92000659fc9 [ 1087.177705][ C1] R10: dffffc0000000000 R11: fffff52000659fca R12: 00007ffffffff000 [ 1087.177717][ C1] R13: 0000200000000310 R14: ffffc900032cfe00 R15: 00002000000002c0 [ 1087.177735][ C1] ? _copy_from_user+0x51/0x170 [ 1087.177766][ C1] [ 1087.177772][ C1] [ 1087.177777][ C1] _copy_from_user+0xfa/0x170 [ 1087.177794][ C1] __sys_bpf+0x26d/0x6f0 [ 1087.177813][ C1] ? bpf_link_show_fdinfo+0x380/0x380 [ 1087.177841][ C1] __x64_sys_bpf+0x78/0x90 [ 1087.177859][ C1] do_syscall_64+0x4c/0xa0 [ 1087.177875][ C1] ? clear_bhb_loop+0x30/0x80 [ 1087.177891][ C1] ? clear_bhb_loop+0x30/0x80 [ 1087.177908][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1087.177926][ C1] RIP: 0033:0x7f67b48b7dd9 [ 1087.177938][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1087.177951][ C1] RSP: 002b:00007f67b2b11028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1087.177967][ C1] RAX: ffffffffffffffda RBX: 00007f67b4b30fa0 RCX: 00007f67b48b7dd9 [ 1087.177979][ C1] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000001c [ 1087.177991][ C1] RBP: 00007f67b494dd69 R08: 0000000000000000 R09: 0000000000000000 [ 1087.178001][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1087.178011][ C1] R13: 00007f67b4b31038 R14: 00007f67b4b30fa0 R15: 00007fff7e937348 [ 1087.178032][ C1] [ 1087.178320][ C1] Kernel Offset: disabled [ 1087.178335][ C1] [ 1087.178338][ C1] ================================ [ 1087.178344][ C1] WARNING: inconsistent lock state [ 1087.178359][ C1] syzkaller #0 Not tainted [ 1087.178370][ C1] -------------------------------- [ 1087.178373][ C1] inconsistent {INITIAL USE} -> {IN-NMI} usage. [ 1087.178380][ C1] syz.6.8775/32285 [HC1[1]:SC0[0]:HE0:SE1] takes: [ 1087.178394][ C1] ffffffff8c3135f8 ((console_sem).lock){-.-.}-{2:2}, at: down_trylock+0x1c/0xa0 [ 1087.178426][ C1] {INITIAL USE} state was registered at: [ 1087.178431][ C1] irq event stamp: 5088 [ 1087.178435][ C1] hardirqs last enabled at (5087): [] asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 1087.178455][ C1] hardirqs last disabled at (5088): [] exc_debug+0x6e/0x130 [ 1087.178472][ C1] softirqs last enabled at (5002): [] __irq_exit_rcu+0x13b/0x230 [ 1087.178488][ C1] softirqs last disabled at (4991): [] __irq_exit_rcu+0x13b/0x230 [ 1087.178505][ C1] [ 1087.178505][ C1] other info that might help us debug this: [ 1087.178509][ C1] Possible unsafe locking scenario: [ 1087.178509][ C1] [ 1087.178512][ C1] CPU0 [ 1087.178515][ C1] ---- [ 1087.178517][ C1] lock((console_sem).lock); [ 1087.178525][ C1] [ 1087.178528][ C1] lock((console_sem).lock); [ 1087.178536][ C1] [ 1087.178536][ C1] *** DEADLOCK *** [ 1087.178536][ C1] [ 1087.178538][ C1] no locks held by syz.6.8775/32285. [ 1087.178544][ C1] [ 1087.178544][ C1] stack backtrace: [ 1087.178548][ C1] CPU: 1 PID: 32285 Comm: syz.6.8775 Not tainted syzkaller #0 [ 1087.178561][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1087.178569][ C1] Call Trace: [ 1087.178573][ C1] <#DB> [ 1087.178578][ C1] dump_stack_lvl+0x188/0x250 [ 1087.178592][ C1] ? show_regs_print_info+0x20/0x20 [ 1087.178609][ C1] ? print_usage_bug+0x42a/0x690 [ 1087.178621][ C1] ? verify_lock_unused+0x18/0x140 [ 1087.178639][ C1] lock_acquire+0x2c3/0x400 [ 1087.178656][ C1] ? down_trylock+0x1c/0xa0 [ 1087.178672][ C1] ? read_lock_is_recursive+0x10/0x10 [ 1087.178693][ C1] _raw_spin_lock_irqsave+0xb0/0x100 [ 1087.178707][ C1] ? down_trylock+0x1c/0xa0 [ 1087.178721][ C1] ? _raw_spin_lock+0x40/0x40 [ 1087.178734][ C1] ? verify_lock_unused+0x18/0x140 [ 1087.178753][ C1] down_trylock+0x1c/0xa0 [ 1087.178768][ C1] __down_trylock_console_sem+0xd4/0x1f0 [ 1087.178784][ C1] ? is_console_locked+0x5/0x10 [ 1087.178796][ C1] ? panic+0x37b/0x810 [ 1087.178810][ C1] ? console_trylock+0x70/0x70 [ 1087.178823][ C1] ? __lock_acquire+0x7d10/0x7d10 [ 1087.178839][ C1] ? give_up_console+0x20/0x20 [ 1087.178858][ C1] console_unblank+0x28/0x180 [ 1087.178872][ C1] panic+0x37b/0x810 [ 1087.178888][ C1] ? bpf_jit_dump+0xd0/0xd0 [ 1087.178908][ C1] ? copy_from_user_nofault+0x160/0x1c0 [ 1087.178924][ C1] __warn+0x248/0x2b0 [ 1087.178939][ C1] ? copy_from_user_nofault+0x160/0x1c0 [ 1087.178955][ C1] report_bug+0x1b7/0x2e0 [ 1087.178972][ C1] handle_bug+0x3a/0x70 [ 1087.178985][ C1] exc_invalid_op+0x16/0x40 [ 1087.178999][ C1] asm_exc_invalid_op+0x16/0x20 [ 1087.179012][ C1] RIP: 0010:copy_from_user_nofault+0x160/0x1c0 [ 1087.179028][ C1] Code: 24 45 31 f6 31 ff 89 de e8 7d 90 d8 ff 85 db 48 c7 c0 f2 ff ff ff 49 0f 44 c6 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 00 8d d8 ff <0f> 0b e9 1c ff ff ff 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c ea fe [ 1087.179040][ C1] RSP: 0018:fffffe000005d8e8 EFLAGS: 00010006 [ 1087.179051][ C1] RAX: ffffffff81a0a790 RBX: 0000000000000008 RCX: ffff88801e3c5940 [ 1087.179061][ C1] RDX: 0000000000110000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1087.179070][ C1] RBP: 0000000000000000 R08: ffff88801e3c5947 R09: 1ffff11003c78b28 [ 1087.179080][ C1] R10: dffffc0000000000 R11: ffffed1003c78b29 R12: ffff88801e3c70c8 [ 1087.179091][ C1] R13: 00007ffffffff000 R14: fffffe000005d958 R15: 0000000020000000 [ 1087.179104][ C1] ? copy_from_user_nofault+0x160/0x1c0 [ 1087.179124][ C1] ? copy_from_user_nofault+0x160/0x1c0 [ 1087.179140][ C1] bpf_probe_read_compat+0xdd/0x170 [ 1087.179158][ C1] bpf_prog_ca2ebcd76953ac02_F+0x2c/0xb48 [ 1087.179170][ C1] bpf_prog_b89d7ca37128ef40+0x1a/0x620 [ 1087.179182][ C1] bpf_overflow_handler+0x1c2/0x4a0 [ 1087.179200][ C1] ? perf_event_switch_output+0x730/0x730 [ 1087.179219][ C1] ? __perf_event_account_interrupt+0x187/0x280 [ 1087.179235][ C1] __perf_event_overflow+0x364/0x530 [ 1087.179251][ C1] perf_swevent_event+0x4ad/0x530 [ 1087.179268][ C1] perf_bp_event+0x276/0x320 [ 1087.179284][ C1] ? perf_event_free_bpf_prog+0x110/0x110 [ 1087.179309][ C1] ? rcu_lock_acquire+0x9/0x30 [ 1087.179324][ C1] ? read_lock_is_recursive+0x10/0x10 [ 1087.179343][ C1] hw_breakpoint_exceptions_notify+0x152/0x470 [ 1087.179359][ C1] atomic_notifier_call_chain+0x15d/0x280 [ 1087.179382][ C1] notify_die+0x141/0x1a0 [ 1087.179397][ C1] ? srcu_init_notifier_head+0x90/0x90 [ 1087.179414][ C1] ? exc_debug+0x6e/0x130 [ 1087.179428][ C1] ? trace_hardirqs_off_finish+0x57/0x1f0 [ 1087.179456][ C1] notify_debug+0x20/0x30 [ 1087.179470][ C1] exc_debug+0xcf/0x130 [ 1087.179497][ C1] asm_exc_debug+0x1a/0x40 [ 1087.179508][ C1] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 1087.179522][ C1] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 1087.179533][ C1] RSP: 0018:ffffc900032cfd80 EFLAGS: 00050202 [ 1087.179543][ C1] RAX: ffffffff83e41101 RBX: 0000000000000050 RCX: 000000000000000c [ 1087.179551][ C1] RDX: 0000000000000050 RSI: 0000200000000304 RDI: ffffc900032cfe44 [ 1087.179560][ C1] RBP: 0000000000000000 R08: ffffc900032cfe4f R09: 1ffff92000659fc9 [ 1087.179569][ C1] R10: dffffc0000000000 R11: fffff52000659fca R12: 00007ffffffff000 [ 1087.179579][ C1] R13: 0000200000000310 R14: ffffc900032cfe00 R15: 00002000000002c0 [ 1087.179591][ C1] ? _copy_from_user+0x51/0x170 [ 1087.179605][ C1] [ 1087.179608][ C1] [ 1087.179612][ C1] _copy_from_user+0xfa/0x170 [ 1087.179625][ C1] __sys_bpf+0x26d/0x6f0 [ 1087.179639][ C1] ? bpf_link_show_fdinfo+0x380/0x380 [ 1087.179660][ C1] __x64_sys_bpf+0x78/0x90 [ 1087.179673][ C1] do_syscall_64+0x4c/0xa0 [ 1087.179686][ C1] ? clear_bhb_loop+0x30/0x80 [ 1087.179698][ C1] ? clear_bhb_loop+0x30/0x80 [ 1087.179711][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 1087.179724][ C1] RIP: 0033:0x7f67b48b7dd9 [ 1087.179753][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1087.179765][ C1] RSP: 002b:00007f67b2b11028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1087.179778][ C1] RAX: ffffffffffffffda RBX: 00007f67b4b30fa0 RCX: 00007f67b48b7dd9 [ 1087.179788][ C1] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000001c [ 1087.179798][ C1] RBP: 00007f67b494dd69 R08: 0000000000000000 R09: 0000000000000000 [ 1087.179807][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1087.179815][ C1] R13: 00007f67b4b31038 R14: 00007f67b4b30fa0 R15: 00007fff7e937348 [ 1087.179832][ C1]