last executing test programs: 37m57.728861976s ago: executing program 4 (id=466): perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x15008}, r0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0xbf, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x200, 0x2}, 0x4132, 0x4, 0x100008, 0x9, 0x40000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3}) 37m41.225623744s ago: executing program 32 (id=466): perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x15008}, r0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0xbf, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x200, 0x2}, 0x4132, 0x4, 0x100008, 0x9, 0x40000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3}) 37m11.040141162s ago: executing program 3 (id=553): bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[], 0x48) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000600), 0x12) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000200000000000000020000040800000000000000030000000000000000000000020000000000"], 0x0, 0x56}, 0x28) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x81, 0x7602, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0xfffffffd}, 0x0, 0x0, r0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) 37m9.23803381s ago: executing program 3 (id=555): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x5, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x17, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000feffffff0000000000040000851000000200000085000000230000009500000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000001700), 0x12) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000300)=r5) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 37m0.36253137s ago: executing program 3 (id=561): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000070000000800000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, 0x0, &(0x7f0000000600), 0x44b, r0}, 0x38) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000003080)=ANY=[@ANYBLOB="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"/3584], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x103a, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2a3}, 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000300)=r5) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000"], 0xffdd) 36m57.322046822s ago: executing program 33 (id=545): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x5, 0x2, 0x8, 0x40, 0xc0, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r0}, 0x38) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)="dc7938c4210d73ac9a91ee14a9f4437e989ac366ce6fa16bb13fc913ec6ce55798adc3fa0a4f860fba101aaf61f4ed580251a0a481ca8ee2bd72cf908b747bac391d5276eb90be6316d1a6af7bf370ca35", &(0x7f0000000540), 0xfffffff3, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500), 0x0, 0x2, r0}, 0x38) 36m55.229940743s ago: executing program 3 (id=566): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x20bc, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0x8}, 0x14100, 0xbcd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r0}, 0x8) write$cgroup_int(r1, &(0x7f00000001c0), 0xfffffdef) 36m51.089154805s ago: executing program 3 (id=570): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=ANY=[@ANYBLOB="18001e0003000000000000000040000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000050000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r0}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a00)={0x2, 0x80, 0xa, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, @perf_bp={&(0x7f0000000280), 0x3}, 0x410, 0x2000000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r2, r3, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000020000000000000000000009"], 0x0, 0x4e}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000580)='cpu<-0||!') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000001c0), 0x12) 36m50.476218051s ago: executing program 3 (id=572): write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000002000000000000000000008500000023000000850000e67d000000950000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x3, 0xff, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000380)={0xfffffffffffffffe, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)="5aa40db80d601c31b90531cbd507b99f5b36ac4ee1de85ab7ac538e7cd3e07d0ca01ce0f5916a7b55c82f091ea0b5407f844a5f5954ad76aaf71b61e0b3961fb74e4939e919f49e8c22e252c47f629164c4ba0d7f6b30a91c68e34f07e4f8cc6b820482e493d50c4bc23ed9874ffc658a4036afa211e1bbdf8813426715f1d6993b530", 0x83}], 0x1, 0x0, 0x0, 0x40001}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 36m45.913557798s ago: executing program 2 (id=578): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x20bc, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0x8}, 0x14100, 0xbcd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r0}, 0x8) write$cgroup_int(r1, &(0x7f00000001c0), 0xfffffdef) 36m43.295993444s ago: executing program 34 (id=563): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x5, 0x2, 0x8, 0x40, 0xc0, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)="dc7938c4210d73ac9a91ee14a9f4437e989ac366ce6fa16bb13fc913ec6ce55798adc3fa0a4f860fba101aaf61f4ed580251a0a481ca8ee2bd72cf908b747bac391d5276", &(0x7f0000000540)="a64b69b21e606c57192c7da51be1254f0201016cf133eb278f99", 0xfffffff3, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500), 0x0, 0x2, r0}, 0x38) 36m39.7930381s ago: executing program 2 (id=583): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=ANY=[@ANYBLOB="18001e0003000000000000000040000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000050000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r0}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a00)={0x2, 0x80, 0xa, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, @perf_bp={&(0x7f0000000280), 0x3}, 0x410, 0x2000000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r2, r3, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000020000000000000000000009"], 0x0, 0x4e}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000580)='cpu<-0||!') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000001c0), 0x12) 36m37.249107256s ago: executing program 2 (id=595): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x140, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r0, 0x40047459, 0xf0ff1f00000000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0xfffffdef) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000980), 0x20000992) 36m35.594630932s ago: executing program 2 (id=588): bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'veth0_vlan\x00', @random="0100fe201000"}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000000}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0x11, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 36m34.808163711s ago: executing program 35 (id=572): write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000002000000000000000000008500000023000000850000e67d000000950000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x3, 0xff, &(0x7f0000000040)) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000380)={0xfffffffffffffffe, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)="5aa40db80d601c31b90531cbd507b99f5b36ac4ee1de85ab7ac538e7cd3e07d0ca01ce0f5916a7b55c82f091ea0b5407f844a5f5954ad76aaf71b61e0b3961fb74e4939e919f49e8c22e252c47f629164c4ba0d7f6b30a91c68e34f07e4f8cc6b820482e493d50c4bc23ed9874ffc658a4036afa211e1bbdf8813426715f1d6993b530", 0x83}], 0x1, 0x0, 0x0, 0x40001}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 36m30.230163957s ago: executing program 2 (id=600): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa0}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x5, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b708000000000000a50a000000000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 36m29.198300058s ago: executing program 2 (id=602): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a0000000500000002000000"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r1}, 0x38) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x2, 0x0, 0x100000, 0x0, 0x2, 0x0, 0x80}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000001040)=ANY=[@ANYBLOB="180000000000000000000000060000008500000061000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x14, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYRES16=r2, @ANYRESHEX=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffe803000008100000b704000000000000850002000300000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) syz_clone(0xc4201100, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) 36m13.967368853s ago: executing program 36 (id=602): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a0000000500000002000000"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r1}, 0x38) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x2, 0x0, 0x100000, 0x0, 0x2, 0x0, 0x80}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000001040)=ANY=[@ANYBLOB="180000000000000000000000060000008500000061000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x14, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYRES16=r2, @ANYRESHEX=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffe803000008100000b704000000000000850002000300000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) syz_clone(0xc4201100, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) 35m41.165803617s ago: executing program 9 (id=612): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x5, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b708000000000000a50a000000000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 35m40.776786931s ago: executing program 9 (id=729): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = gettid() perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x4240}, r0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000073013b0000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r1, &(0x7f00000002c0)="9fa6c146bef209184aee592401f0261fd3ef179b06acdc80eaef3b118e5294dbc9c40bcf9220b014cbd7965c12e12f052bf2b94937d8791b0ef36f8cca0fa6c344a938b0ff12130a8bcb3348e0c416168d3d3aebb2359dfb1ab1b2fafe29d821f338"}, 0x20) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000080)='./cgroup/../file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7fff, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000006c0)=ANY=[@ANYBLOB="9851a170a085c4218b5e72644b31d1bc513936255d9115705f9624b9c160d1fdcf7566177cd72292677092f11e6c261429766b1e893b75a246b8e95c19ebc8913de2269a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x2}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) syz_clone(0x200000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000005c0)=r2, 0x12) 35m25.314280748s ago: executing program 37 (id=729): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = gettid() perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x4240}, r0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000073013b0000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r1, &(0x7f00000002c0)="9fa6c146bef209184aee592401f0261fd3ef179b06acdc80eaef3b118e5294dbc9c40bcf9220b014cbd7965c12e12f052bf2b94937d8791b0ef36f8cca0fa6c344a938b0ff12130a8bcb3348e0c416168d3d3aebb2359dfb1ab1b2fafe29d821f338"}, 0x20) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000080)='./cgroup/../file0\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7fff, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000006c0)=ANY=[@ANYBLOB="9851a170a085c4218b5e72644b31d1bc513936255d9115705f9624b9c160d1fdcf7566177cd72292677092f11e6c261429766b1e893b75a246b8e95c19ebc8913de2269a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x2}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) syz_clone(0x200000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000005c0)=r2, 0x12) 34m55.272650144s ago: executing program 4 (id=770): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000100000007"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000180)=r1, 0x4) sendmsg$inet(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) 34m54.908226348s ago: executing program 4 (id=898): socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020206b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000870000008500000006000000850000009e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f78906", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$tun(0xffffffffffffff9c, 0x0, 0x80, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x600003, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0xedf0e51957efc755, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) recvmsg$unix(r2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) 34m54.340001613s ago: executing program 4 (id=902): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10400c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x6, 0x6}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0xc, &(0x7f0000000180)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x14}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0xe, 0xfeff, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 34m51.253268295s ago: executing program 4 (id=909): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000000}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0x11, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 34m50.77828707s ago: executing program 4 (id=912): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r1}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, 0x0}, 0x94) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) close(0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_clone(0x43b00000, 0x0, 0x5b, 0x0, 0x0, 0x0) unlink(&(0x7f0000000080)='./file0/file0\x00') 34m35.489863715s ago: executing program 38 (id=912): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r1}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, 0x0}, 0x94) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) close(0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_clone(0x43b00000, 0x0, 0x5b, 0x0, 0x0, 0x0) unlink(&(0x7f0000000080)='./file0/file0\x00') 16m39.03471453s ago: executing program 5 (id=6826): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x0, 0x0, 0x2}]}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) ioctl$SIOCSIFHWADDR(r0, 0x8b19, &(0x7f0000000000)={'wlan0\x00', @random="7cf1e97c9e4f"}) 16m38.821470152s ago: executing program 5 (id=6828): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x8000, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x10, 0x3, 0x10) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="d8000000100081046881f782db44b9090000000b01000000e8fe55a1180015000600140000000012080004003e000000a80016000a00001c06000200036010fab94dcf5c0461c1a6ced67f6f94007134cf6ee08000a0e408e8d8ef52878516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d95322fe7c9ffeffffff16a4683f1aeb4edbb57a5025ccca9e02360db70100000040fad95667e006dcffff951f215ce3bb9ad809d5e1cace81c639df2d04c343eb7a9db9596bb727ed0bffece0b42a9ecbee5de6ccd4", 0xd8}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0xf, 0xe1bf}, 0x0, 0x10000, 0x0, 0x8, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[], &(0x7f0000000140)='GPL\x00'}, 0x94) r1 = socket$kcm(0x2, 0x1, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000680)={r4}, 0xc) 16m37.814396863s ago: executing program 5 (id=6838): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1c, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r2, 0x0, 0x24040810) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, 0x0, 0x100000000000000, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x90) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001000)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000001040), 0x12) r5 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r5, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x300, &(0x7f00000001c0)=[{&(0x7f0000000940)="2e00000010008188e6b62aa73772cc9f1ba1f8482e0000005e140602000000000e000a001000000002800000128c", 0x2e}], 0x1}, 0x0) 16m36.881849082s ago: executing program 5 (id=6844): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000001c80)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)=""/217, 0xd9}, {&(0x7f0000003940)=""/4092, 0xffc}, {&(0x7f0000001a00)=""/206, 0xce}], 0x3}, 0x0) 16m35.647278226s ago: executing program 5 (id=6852): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc0100, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000002d0301000000000095001800000000006926000000000000bf67000000000000150600000fff070067060000200000006a0200000ee60000bf050000000000003d350000000000006507000002000000070700004a0000000f75000000000000bf54000000000000070400000400f9ff3d53010000000000840400000000000073720000000000009500000000000000db13d5d8b741f2cdaabc8383caf56b8c2b84a8d09535a157f9005bd38addaa65b925cd3ded25b8b9e2a095d2c51ef45c5588ec78c7f32946b17cecfe54c53ab530c58b67851b7e0e82452a083b98a6aa766401047d150203b0417edef332233b081df18961d6822d133bf72a4de1c2ea17f04537fc211576846ac629d1d93265ba4580047a9dc88de358ce795731891a2031de4e09740c64e5506f991ed4785a9773a433e0db9c1a7d4ab9d658ce9cfdb4db3bed62bcb2bc91ddcdfadfe6d4421c49fb6641cbf56914e76702f673b586c767562a90a3967093b000e3806f825f1d0da2a304e06543b56d35235d78b7a7fe912971aab876022e96f5143b6234f5a6b701690b07fb664a44e22b72e843e7cf55f394cf75d1cd3ee79a25fb98cc45b3fde43e42e150d4a2fddd9a97677400ef0bd697d135324ce480c2960344de346bd511dea4ff7a07400b2d12dd1a8c4c300aee5f948777085ca142b79dfc3aca5fadaa0532ab0572169f68584ff2ee063bc7e75ecd5cc8973464629ba236e3ff97f6033d0800000000000000cef54a60aff12590a50ef147e3e640193d00263003a4ef412420a070dd0327e47c8c7abb77b4b53874788d7e2e5d554de4713db957afb56d4673f1b904c5a317d3670003000000183fb7d36e173044f4ab34"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x100000, 0x8, 0x2, 0x0, 0x80}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0xfe80000000000000, 0x22072a18}}, 0x80, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x900}, 0x60) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x8}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x20e}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) 16m32.823555496s ago: executing program 5 (id=6856): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x4, @perf_config_ext={0x0, 0xffffffff}, 0x180, 0x100, 0x0, 0x9, 0x407, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa06a6, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0, 0xe}, 0x90, 0xa4, 0x2, 0x5, 0xa1, 0x9b9b, 0x8, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000001340), 0x888102, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000100), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) r2 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) socketpair(0x8, 0x1, 0xfffffffd, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/12], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_freezer_state(r4, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(r5, &(0x7f0000000040)='FROZEN\x00', 0x7) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$cgroup_procs(r4, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) write$cgroup_pid(r7, &(0x7f0000000300)=r6, 0x12) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x420}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_subtree(r8, &(0x7f0000000140), 0x2, 0x0) syz_clone(0x4508d000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(r9, &(0x7f0000000740)=ANY=[@ANYBLOB="2b706964732099e5d639fb42d6b590d466b18907ca21f11925a56b61cafc881272020dde5b3588d2e039bcdb117b4ef1afd733adf23f6469b79d7f03addfe8ea6067eba26bee5f750ecc96200254b7ceb91c870e06fd792ef3d715ec04a483160b6c7f8feed2ad1ecea08f448552667a8df5e73f05ce7895d6b3518a03f16a52f4cbd1053112d6b1ec6e66a35b446090c6925d6d7ffaabec134db7c50588bd81e8a8f38580c88598c5c16f34e5eab6fb7556c7b5b168f855de4e18cc73bd5de9d9889165a9013a"], 0x6) 16m17.644293498s ago: executing program 39 (id=6856): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x4, @perf_config_ext={0x0, 0xffffffff}, 0x180, 0x100, 0x0, 0x9, 0x407, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa06a6, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0, 0xe}, 0x90, 0xa4, 0x2, 0x5, 0xa1, 0x9b9b, 0x8, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000001340), 0x888102, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000100), 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) r2 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) socketpair(0x8, 0x1, 0xfffffffd, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/12], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_freezer_state(r4, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(r5, &(0x7f0000000040)='FROZEN\x00', 0x7) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$cgroup_procs(r4, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) write$cgroup_pid(r7, &(0x7f0000000300)=r6, 0x12) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x420}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_subtree(r8, &(0x7f0000000140), 0x2, 0x0) syz_clone(0x4508d000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(r9, &(0x7f0000000740)=ANY=[@ANYBLOB="2b706964732099e5d639fb42d6b590d466b18907ca21f11925a56b61cafc881272020dde5b3588d2e039bcdb117b4ef1afd733adf23f6469b79d7f03addfe8ea6067eba26bee5f750ecc96200254b7ceb91c870e06fd792ef3d715ec04a483160b6c7f8feed2ad1ecea08f448552667a8df5e73f05ce7895d6b3518a03f16a52f4cbd1053112d6b1ec6e66a35b446090c6925d6d7ffaabec134db7c50588bd81e8a8f38580c88598c5c16f34e5eab6fb7556c7b5b168f855de4e18cc73bd5de9d9889165a9013a"], 0x6) 35.264147499s ago: executing program 7 (id=11932): socket$kcm(0x21, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r2, 0x0, 0x36, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68886dd", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x1f00) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="1400000022003505d25a806f8c6394f97e24fc60", 0x14}], 0x1, 0x0, 0x0, 0x74000000}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r4, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfffffffffffff02a}, 0x10000, 0x0, 0xfffffffe, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="6232f2910000000000005000000095007400"/32], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 32.110658005s ago: executing program 7 (id=11941): socket$kcm(0xa, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x2}, 0x0, 0x0, 0xfffffffd, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$kcm(0x21, 0x2, 0x2) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, r1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x9, 0x1, 0x8c}]}, &(0x7f0000000080)='syzkaller\x00'}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000b80)=ANY=[@ANYBLOB="9feb010018000000060000000c0000004ce484bf84730c0000000200000000000000000000faaccb3fee8543cbe35b91216c0905cfdec9f485f4605064d9bdc702dd28efb26f90e5689689b3ca46c71f3d5d29c79d70a261f47e2d84d9b55ec83f75c96dce1e605163e8"], 0x0, 0x26}, 0x28) r4 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x34, 0x0, r4, 0x92, '\x00', 0x0, r3, 0x0, 0x3, 0x4}, 0x50) r7 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0xa, 0x9, 0x8, 0x2, 0x21040}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{r4, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000440)='%-5lx \x00'}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x4, '\x00', 0x0, r3, 0x0, 0x4, 0x2}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000008c0)={r4, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0xd, 0x16, &(0x7f0000000540)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@map_fd={0x18, 0x5, 0x1, 0x0, r7}, @map_val={0x18, 0x9, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000600)='syzkaller\x00', 0x3, 0x69, &(0x7f0000000640)=""/105, 0x40f00, 0x6a, '\x00', 0x0, @sock_ops, r3, 0x8, &(0x7f00000006c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x2, 0x8, 0x910c}, 0x10, 0x0, r2, 0x5, &(0x7f0000000900)=[r9, r10, r4, r4, r4, r4], &(0x7f0000000940)=[{0x4, 0x2, 0xe, 0x6}, {0x4, 0x2, 0x0, 0x1}, {0x3, 0x2, 0xd, 0x8}, {0x2, 0x2, 0xa, 0x7}, {0x0, 0x4, 0x2, 0xc}], 0x10, 0x6}, 0x94) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000b05d25a806f8c6394f90424fc60", 0x14}], 0x1}, 0x0) 31.270172694s ago: executing program 7 (id=11948): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, 0x0, 0x0) (fail_nth: 2) 30.548984102s ago: executing program 7 (id=11953): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000f40)=ANY=[@ANYBLOB="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", @ANYRES8], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x16, 0x0, 0xffffffffffffffff, 0xffffffffffffffc9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 28.161170888s ago: executing program 7 (id=11965): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x6, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x806, 0x0, 0x8dc, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x3a) recvmsg$kcm(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000780)}, 0x100) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0xfe80000000000000, 0xac14140c}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)='\x00\x00', 0xffe3}], 0x1, 0x0, 0x0, 0x900}, 0x60) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000005"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2d, 0x2041a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x86bf2056334f30a6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) r2 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa}, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x5, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x4}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}, @volatile, @func={0x3, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0, 0x0, 0x2e]}}, 0x0, 0x65}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000001) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000013c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@datasec={0x2, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x101}, {0x3, 0x4, 0x1}, {0x4, 0x5, 0x401}], 'H'}, @datasec={0x0, 0x5c, 0x0, 0xf, 0x3, [{0x1, 0x6, 0x8}], "7472e9"}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000003c0)=""/4096, 0x44, 0x1000, 0x1}, 0x20) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$kcm(0xa, 0x3, 0x3a) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875"], 0xfe1b) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="2e00000011008188040f80ec59acbc0413a1810031000000000f000000028002002d1f00"/46, 0x2e}], 0x1}, 0x44004) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)=@generic={&(0x7f0000000100)='./file0\x00', r3}, 0x18) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)}, 0x0) 27.612297354s ago: executing program 7 (id=11958): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80841, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fffffffbfffffff}, 0x10c002, 0xac5d, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000001f00)="89000000120081ae08060cdc030000017f03e3f7000000006ee2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c0001000c080c00bdad0140310068ad639a8ace8680210bc28b805508bc7a46e39a8285dcdf12176679df069163ce955fed0009d78f0a947ee2b49e33", 0x89}], 0x1}, 0xff0f000020000080) r3 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfe33) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB="1400"], 0x5000}, 0x0) mkdir(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000005c0)=r3, 0x12) openat$cgroup_ro(r4, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000080), 0x2, 0x0) 12.095205006s ago: executing program 40 (id=11958): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80841, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fffffffbfffffff}, 0x10c002, 0xac5d, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000001f00)="89000000120081ae08060cdc030000017f03e3f7000000006ee2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c0001000c080c00bdad0140310068ad639a8ace8680210bc28b805508bc7a46e39a8285dcdf12176679df069163ce955fed0009d78f0a947ee2b49e33", 0x89}], 0x1}, 0xff0f000020000080) r3 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfe33) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB="1400"], 0x5000}, 0x0) mkdir(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000005c0)=r3, 0x12) openat$cgroup_ro(r4, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000080), 0x2, 0x0) 9.141089148s ago: executing program 6 (id=12020): r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f00000006c0)='@', 0x1}], 0x1, &(0x7f0000000040)=[{0x18, 0x84, 0x0, 'r'}, {0x20, 0x84, 0x8, "eeb4fe8ba15e3999ef"}], 0x38}, 0x41) 8.903020531s ago: executing program 6 (id=12021): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x6, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x806, 0x0, 0x8dc, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x3a) recvmsg$kcm(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000780)}, 0x100) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0xfe80000000000000, 0xac14140c}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)='\x00\x00', 0xffe3}], 0x1, 0x0, 0x0, 0x900}, 0x60) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000005"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2d, 0x2041a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x86bf2056334f30a6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) r2 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa}, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x5, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x4}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}, @volatile, @func={0x3, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0, 0x0, 0x2e]}}, 0x0, 0x65}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000001) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000013c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@datasec={0x2, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x101}, {0x3, 0x4, 0x1}, {0x4, 0x5, 0x401}], 'H'}, @datasec={0x0, 0x5c, 0x0, 0xf, 0x3, [{0x1, 0x6, 0x8}], "7472e9"}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000003c0)=""/4096, 0x44, 0x1000, 0x1}, 0x20) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$kcm(0xa, 0x3, 0x3a) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="2e00000011008188040f80ec59acbc0413a1810031000000000f000000028002002d1f00"/46, 0x2e}], 0x1}, 0x44004) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)=@generic={&(0x7f0000000100)='./file0\x00', r3}, 0x18) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)}, 0x0) 8.684135993s ago: executing program 1 (id=12023): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x20100, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x10c002, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) close(0x3) 6.092189662s ago: executing program 1 (id=12025): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@func={0x2, 0x0, 0x0, 0xc, 0x2}, @func_proto]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x34}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x1b, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000cbaf96be4f31d2c4ba55e37d1f000000eb27f6d0497ff30400"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000000c0)={0x0, 0x1}, 0x1, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdc3}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2}, &(0x7f0000000240), &(0x7f0000000280)=r1}, 0x20) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="1806000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000001000000850000000a000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$kcm(0xa, 0x922000000003, 0x11) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='blkio.bfq.empty_time\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f0000000100)=r5, 0x4) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, r0, 0x5, 0x1, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x3}, [@btf_id={0x18, 0x8, 0x3, 0x0, 0x3}]}, &(0x7f0000000180)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000340)=[0x1, r2, r3, r5, r6], &(0x7f0000000380)=[{0x1, 0x5, 0xa, 0xb}, {0x5, 0x5, 0xb, 0x2}], 0x10, 0x7c}, 0x94) 6.042612493s ago: executing program 0 (id=12026): r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000001280)={&(0x7f00000010c0)=@in6={0xa, 0x4e1b, 0x3, @remote, 0x5}, 0x80, 0x0}, 0x4c810) 5.996854703s ago: executing program 0 (id=12027): socket$kcm(0x21, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0x36, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68886dd", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x1f00) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="1400000022003505d25a806f8c6394f97e24fc60", 0x14}], 0x1, 0x0, 0x0, 0x74000000}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r3, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfffffffffffff02a}, 0x10000, 0x0, 0xfffffffe, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="6232f2910000000000005000000095007400"/32], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 5.950450504s ago: executing program 8 (id=12028): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}, 0x0) 5.750567566s ago: executing program 6 (id=12029): socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x38}, 0x12160) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 5.686336456s ago: executing program 1 (id=12030): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="b700000001ed0a00bfa30000000000002503000028feffff6203f0fff8ffffff61a4f0ff000000001d04020000000000cf000000000000005504000017ffffff6604000017ffffff9c400000000000007b0300fe000000002c04000000000000c6000000000000009500000000000000023bc065b7a339d17cf9333379fc9e84af69912435f1b6a693002e7f3be361917adef6ee1c8a2b4f8ef1e50b91f32050e436fe275daf51efd601b6482a0800000098efefb202ee010400006e7a1de4a21f379dbf01de00b1b564fef3bef70548aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb7798b3e6440c2fbdb00a3e35208b0bbf12cd8df000d10e4000000000000009fbe4b61a615c6c57a2b649dc74a1a610643b08d9ec21ead2ed51b104d4d91af25b8123deda8a3658d42ecbf1dbf6d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31a76e42f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0800000000000000d5f728d236619074d6ebdf098bc908f50ae728a40f9411fe7226a4040bef29b66e3858d051c096e37c4f46010400000000c3da29faf75ddd1aa96960bca97af13382cb881cc1f62c0f8f8f0e8d76b86f9c45636614786f5a2cb77230a874640dcbe0b20bb77c022d4cab080078fce8c5c81b7037181fc2f18f781aaa6e2957d7e39cc1baddcb7ec6667e699f24e41697ee7ea23e4b29a8b6cc9a1f5a7b3caae05f13792292cb949b3aab06b1e042ff2164d80c605532b18ab1c156b97e5889685a96949e4cb40df77b8bb84b0e733a63784ccc214d930cbb7e090df9a2867bbacec439c163fcd7071b53ac29df826f8ae6d6e18c1eacf5bf870768d5217e809bb5a05d9e22ce67f1231bd236486727d970acc546087acbf30f2f8165b47ba56dfadd14b306e98931485747292c6fe6e188750cf4f8e3ce2a9414575833a9f05954cde298a35ea6d715ba80aee63300000000000000000000000000000000000040000000000000000386000000b854adb4f8080064e8407c6bdb37114c80fbaa4a0ec5aaf4b0ac6f2128668279eb6fc144344e2d461c9a1be8fa0061ea9d55ee4716bea8e1cebf9ed39325ab4c5530dd6ee9fffc00000000000000d7c5af73c683625aaad5eda5004a76c9f8975ed4c5e4eb3e77e9885769754932609f19e2f615a01cb6d17fbf5cb539403cb0d72534050000004ad8269b2bdf2ca4958a62a6e7449316cc65b5d4796005c2f9a4c1e646e1dd2ca19583f0f8b0dc53debd7d44f334e6ed7445a9580f970e483b307c4b3c018bc19488e5aab6fec586d52386e8c07a88c88e8faec5f1b16b2014f6952ce7d6be12c6bdb9651ca6fc907061be311d1354e6295698594a73136237bee068d3819400e43544830a3f74b7942f22336953978a5b2032da350bcc61162c04c1297395b73e18c9387615a2bc87d9e2445f3d323d3fac347932a4bac694c55fe9d145906d410f58f1951405d185afef5dbd617e87ddbd23834a50d7eb8e327fb5db12cbd6a9efe8e671c4f251fe3bf440cabdfe3400a670d14b9b3cd8d86e492997a0168c022ef3536bd1dc731f4f9f8cb6c3857fb8aaaa95024f8da775f72950212b84fc6133ae14d1429cd4905dabb52e43af7e65acf97b4951fa1e967d16a5ed642efc855a4a46b85cd079934ad3188276efae9387eaa2c910fb8de24b5d4fded86c3811ccd00520150b16000080122965558074956da5e4c3bbefcb64aa8be4456ed2caf0f467b6bbf3aa4371f5e76ab3f60afea80bb066aafb7517f787b090f419a20278a3c779e03afd9a6af6fd518e5dce030f88ec5a5cb7601a161da0f8089322d84ac523040d13e1f1300c2c6555bce60d95dd3288e53435713f03add23f14c8db5555c62de4f626483632a2ab547f88dd6efec73a0271a19ca3aa860aa4dcaeeb9bd91a0cb429efae2a5fcc08b3a572969bbe91c921ac1476027772c87d1767e38ba49e3e57fafea83e00006a1d1a4ebf83434986091dd66ffe3ffe9067f565c6f86b5f596d9c828c02f6fc13c8ddbb50bfd7dd8aa2f35f259fc83e007f00a292dd3b856faa4b7e66e1b64505f65900839df71a97d4d05db7f7ecf8ed9a22da26ae674bba16c204f6b2f8f74fc56b7126d7c11ece8d264a2b6adae02c821b6242894f33c81c0a6813497502aad499825ab85a348638384cd12e61dbde5c47056f0a20b4e2a2328d5db5cfe56557a129e6be231acf5f57995c60d9fca5f63a0dfd18054717120bda466d04774b530500d8b022719ca77a4e0a66b4708f791d849a5e2aaa0074a9560ede2600df5a5c41392fe9460080fcb1e65233fb8dbeec4c86dbcf6a0673e38d2d3615e5bfbde44afe0fa7564231fff7e7f1f3ad68492dd2ccb1decb15b5d7d3e37e8b7d28921c4b9280979521173f322df408d9818b6cc400098abb869921911480a876fbba698801937e8b4264eb6f5137bd9b075f1488d22230592a79000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f316aa0886c174b73decb46c1c85edf50d8fcbac5ff76b365611666da86a8e65b308706bd7c000000000000003f7cd4d5cb9076b81b7741ec03877afb5237ea1694addebc14c3ae49f88c462aa2050acf2d9a97d3be29a5614d1eba2c98cf0236401e02d7c445e50f76419ab4f78f67a09e63dd4faa2e7b59399f055f2fa278783fefb0a5ef0b41e14a6fe6ba306206670b84894e901a523fcbadfeff535f2514bc834e876810d9a6a78e70a9e22860c36a724770b4185de44db6bf21fef32a8d5b36d9014f38fee012365f963b2a85e7d8075c333475b9f0284405e3127dde7e41285fbe0bdd37220e316f2297743dd4731614a50c16c6a41744c3d24eab511317f97b7b4a1c2ec33fedc46e9bf0fa640eebd3d58f0ebdb7cb8ccffd6d6ab7e0e843591d2618e2d2cdc7081c8fafffe9c350a5c554a387de4ee7aac6478d99de7dd82bef044a6d33c789d566c90c46ad581aa22f910547a77d55e26bf19f1d4661550b177ef53933a305e69b8a95119dcf5bda599d625054776151b2cd1fcde238bdc527594a6c17aa9728af7a3830e7092b01b119ea4e7e7f0e21527d622ca231e9e98720195368f8a9d3374337ab4d130619d93c5ef37e7ddd0b2da147e6e513455b88753452de959a6cbfa1ffbc7ad5d8c3b48017fd31dcf72f337b639253f44cb27a12174bc4c191e21015d0c431a71906eb9c6a14c8a060459ef26787ce3d1cbfd5cc459f0048b5d06f6cbd3e9b34c89f3fb2f951ae81d7fcc8bc0000000000000000000000000000000000000000009231feef3117197c7963c2ba910969f776c8b2ea3970f358107945d9e74e9bdfa58e68b65a9201bc4b73b431df5aa29f363917f90e3fa1eaf553db1c761dd9b634a9c4d7c21d24fe6d953ed9438cad0f8dfe03e5e2f73019352f1fb682a5a6ebbf24ebc49e3d7058e696eb3f4b642f36c9006c0067e24a64aa8c53dd824a4ee271e35ed9eed636338f1835fc957729d63dc1bfc7b772cbe536c2d3aff27c22f9a2f876512616a5bdaf22a16e19d1b5f52abb40b433983d0cf50234de659c1a3997f1cfe8a87e08f87ce901000000caae1bcfdce33dae6adc260321702f239c25ab181390e7dc8c1e5b1cf3b4fef1cd5c44a89b5e5d8314e02f4673ded90bce9a4025b0232eec970f7aa17f175a14e8dc8de9bac0006b98a8283eee5665f3aede28228e0468dbcf8b776fe4c629d301183a7cba5adf77f23d31f9d5a183c08c3a86bbcd3705432ad3f96a7bbc4a13780cf9f4a5e3a9badca61367b377cc6f77e66febca94c8d9fe6fa1148a0b65c0f1b0d00aad352d7c7b5aea945185022f2c8cae549e77a290ebffb8c9dc99168e06461c7000"/2813], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1e}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0xd, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000002000000b70500000800000085000000c200000095"], &(0x7f0000000300)='GPL\x00', 0x6, 0x1013, &(0x7f0000000a40)=""/4115, 0x0, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001fc0)={0x1, 0x58, &(0x7f0000001f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002180)={0x18, 0x0, &(0x7f0000001dc0), &(0x7f0000001e40)='syzkaller\x00', 0x80000000, 0x82, &(0x7f0000001e80)=""/130, 0x41000, 0x9, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002000)={0x1ff, 0x2}, 0x8, 0x10, &(0x7f0000002040)={0x2, 0xc, 0x1ff, 0x3}, 0x10, 0x0, 0x0, 0x7, &(0x7f00000020c0)=[r2, r2, 0xffffffffffffffff], &(0x7f0000002100)=[{0x1, 0x1, 0x7, 0x1}, {0x4, 0x4, 0x1, 0x7}, {0x2, 0x2, 0x6, 0x6}, {0x0, 0x2, 0xb}, {0x0, 0x1, 0xc, 0x3}, {0x2, 0x5, 0xe, 0x17}, {0x200, 0x4, 0x8, 0x5}], 0x10, 0x2}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000100)=0x8, 0x12) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1e000000000000000100000007"], 0x50) r6 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r7 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0xb, [@struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x2, [{0xa, 0x3, 0x1000000}]}, @fwd={0x1}, @restrict={0x0, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x61, 0x0, 0x2e, 0x61, 0x30, 0x61, 0x61, 0x61, 0x61]}}, 0x0, 0x53}, 0x28) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="d80000001c0081044e81f782db44b904021d080201000000120000a1180002000000000000000e1208000f0100810401a8001600200001400300000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c11503c6bbace8017cb090000001fb79164", 0x6c}], 0x1, 0x0, 0x0, 0x7400}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x28, 0x0, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe100004000632f77fb080600017f020001be3e7d2a182f", 0x0, 0x104, 0x6000000000000000, 0xc1, 0x0, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab30", 0x0}, 0x50) sendmsg$kcm(r6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000440)="5c00000014006b030231a6080c000af32c00000000f800250502000f00e5aa000017d34460bc24eab556bd05251e6182949a2756f475ce36c2d13b48df000000000000ecb8f6ec63c9f4d4938037e786a6d1bdd700e6657594f1817d", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r5, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)=@o_path={&(0x7f0000000240)='./file0\x00', 0x0, 0x4010, r0}, 0x18) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18, r0}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_ext={0x1c, 0x19, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9e6, 0x0, 0x0, 0x0, 0xfffffffc}, [@jmp={0x5, 0x1, 0x7, 0xa, 0x5, 0x50, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x5}, @alu={0x7, 0x1, 0xa, 0x0, 0x1, 0xfffffffffffffff4, 0x8}, @jmp={0x5, 0x0, 0xa, 0x8, 0x6, 0x80, 0xffffffffffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @cb_func={0x18, 0x3}]}, 0xfffffffffffffffd, 0x8, 0x0, &(0x7f0000000180), 0x41100, 0x8, '\x00', r3, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x1, 0x5, 0x7, 0x6}, 0x10, 0x181f1, r0, 0x5, &(0x7f0000000340)=[r0, r5, r9, r10, 0x1], &(0x7f0000000380)=[{0x1, 0x4, 0x9, 0x5}, {0x0, 0x3, 0x1, 0x4}, {0x3, 0x1, 0x3, 0x5}, {0x5, 0x3, 0x10}, {0x4, 0x1, 0x10, 0x3}], 0x10, 0x2}, 0x94) 5.685669706s ago: executing program 8 (id=12031): socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa}, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ab1, 0x0, @perf_bp={&(0x7f0000000080), 0x5}, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)=@caif=@dgm={0x25, 0x1a}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000080)='r', 0x1}], 0x1}, 0x48004) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x13, &(0x7f0000000200), 0x4) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000440), 0x2, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000840)='ns/mnt\x00') bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1806000000000400000000000000000018120000", @ANYBLOB="0000000000000000b703000000000000850000000c000000b70700000000000018010000202070c84ec73887202500000000002020207b1af8ff00000000bfa100965300000007010000f8ffffff"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sched_cls=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$kcm(0xa, 0x5, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000000000)=ANY=[@ANYBLOB="9beb01031800000000000000000000008000000002"], 0x0, 0x1a}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x8916, &(0x7f0000000000)={r4}) r5 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8916, &(0x7f0000000000)={r5}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x8936, &(0x7f0000000000)={r4}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x4, 0x43, &(0x7f00000015c0)=ANY=[@ANYRES16], &(0x7f0000000340)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100)={0xfffffffc}, 0x10}, 0x94) r6 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r6, &(0x7f0000000040)={&(0x7f00000010c0)=@in6={0xa, 0x4e1b, 0x4, @remote, 0x5}, 0x80, 0x0}, 0x4c810) 5.464135149s ago: executing program 6 (id=12032): socket$kcm(0xa, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x2}, 0x0, 0x0, 0xfffffffd, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$kcm(0x21, 0x2, 0x2) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, r1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x9, 0x1, 0x8c}]}, &(0x7f0000000080)='syzkaller\x00'}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000b80)=ANY=[@ANYBLOB="9feb010018000000060000000c0000004ce484bf84730c0000000200000000000000000000faaccb3fee8543cbe35b91216c0905cfdec9f485f4605064d9bdc702dd28efb26f90e5689689b3ca46c71f3d5d29c79d70a261f47e2d84d9b55ec83f75c96dce1e605163e8"], 0x0, 0x26}, 0x28) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x34, 0x0, 0xffffffffffffffff, 0x92, '\x00', 0x0, r3, 0x0, 0x3, 0x4}, 0x50) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0xa, 0x9, 0x8, 0x2, 0x21040}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x3, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="180200000000000000000000005600", @ANYRES32=r6, @ANYBLOB], &(0x7f0000000000)='GPL\x00'}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000440)='%-5lx \x00'}, 0x20) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, r3, 0x0, 0x4, 0x2}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0xd, 0x16, &(0x7f0000000540)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_fd={0x18, 0x5, 0x1, 0x0, r6}, @map_val={0x18, 0x9, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000600)='syzkaller\x00', 0x3, 0x69, &(0x7f0000000640)=""/105, 0x40f00, 0x6a, '\x00', 0x0, @sock_ops, r3, 0x8, &(0x7f00000006c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x2, 0x8, 0x910c}, 0x10, 0x0, r2, 0x5, &(0x7f0000000900)=[r8, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000940)=[{0x4, 0x2, 0xe, 0x6}, {0x4, 0x2, 0x0, 0x1}, {0x3, 0x2, 0xd, 0x8}, {0x2, 0x2, 0xa, 0x7}, {0x0, 0x4, 0x2, 0xc}], 0x10, 0x6}, 0x94) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000b05d25a806f8c6394f90424fc60", 0x14}], 0x1}, 0x0) 5.445619529s ago: executing program 1 (id=12033): r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f00000006c0)='@', 0x1}], 0x1, &(0x7f0000000040)=[{0x18, 0x84, 0x0, 'r'}, {0x20, 0x84, 0x8, "eeb4fe8ba15e3999ef"}], 0x38}, 0x41) 5.074005993s ago: executing program 1 (id=12034): socket$kcm(0x21, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r2, 0x0, 0x36, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68886dd", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x1f00) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="1400000022003505d25a806f8c6394f97e24fc60", 0x14}], 0x1, 0x0, 0x0, 0x74000000}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r4, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfffffffffffff02a}, 0x10000, 0x0, 0xfffffffe, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="6232f2910000000000005000000095007400"/32], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.774519578s ago: executing program 8 (id=12035): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x20100, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x10c002, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) close(0x3) 1.77545253s ago: executing program 6 (id=12036): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000006c0)="5c00000013006bcd9e3fe3dc6e48aa310b6b8703100000001f03000000000000040014000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x4014) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x7, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000218100000", @ANYRES32=r3, @ANYBLOB="000000000000000018100000", @ANYRES32=r4, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r5, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000034d, &(0x7f0000001d00), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) socket$kcm(0x10, 0x3, 0x10) r6 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r1) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r7, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x4000}]}) socket$kcm(0x21, 0x2, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000012"], &(0x7f0000000c00)='GPL\x00'}, 0x94) r8 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x4, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000ffffffe100"/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) ioctl$TUNGETVNETBE(r7, 0x800454df, &(0x7f0000000240)=0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000fc0)={0x5, 0x80, 0x0, 0x20, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000001, 0x4, @perf_config_ext={0x2000000000000003, 0x60d}, 0x2080, 0x1, 0x0, 0x0, 0xa, 0x20000d5}, 0x0, 0xfff0000000000000, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r9, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0x0, 0xac14140c}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)="8bcd", 0xffe3}], 0x1, 0x0, 0x0, 0x900}, 0x60) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x9, 0x9, 0x81, 0xf, 0x0, 0xff, 0x11, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x24, 0x2, @perf_bp={&(0x7f0000000280), 0xc}, 0x2fa04, 0x6, 0x1, 0x5, 0x4, 0x8001, 0x0, 0x0, 0x0, 0x0, 0xff}, 0xffffffffffffffff, 0x5, r8, 0xf) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180200000300000000000000000000008500000027000000850000000800000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002940)={&(0x7f00000027c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000ffffffffffffffff0000008d000000000000"], 0x0, 0x26}, 0x20) 1.77244653s ago: executing program 0 (id=12037): r0 = socket$kcm(0x10, 0x2, 0x4) close(r0) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000780)="5c00000013006bcc9e3be35c6e17aa31076b876c1d0000007ea60864160af36514000cc008001900030002000600010005800005000056a705251e638294ff0051f60a84c9f4d4938037e786a6d072c6c95300"/92, 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x50) (fail_nth: 1) 1.69727051s ago: executing program 1 (id=12038): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000040)) r1 = socket$kcm(0x10, 0x2, 0x4) close(r1) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x5}, 0x0, 0x0, 0xc2ba, 0x0, 0x4000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x2, 0x73) r4 = getpid() bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="080000000400000002000000", @ANYRES32], 0x50) r5 = socket$kcm(0x1e, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f00000008c0), 0x43) recvmsg(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000005c0)=""/210, 0xd2}], 0x1}, 0x12122) perf_event_open(&(0x7f00000006c0)={0x5, 0x80, 0x5, 0x0, 0x8, 0x10, 0x0, 0x500e, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_bp={&(0x7f00000005c0), 0x8}, 0x2000, 0x2, 0x4, 0x8, 0x7, 0x40, 0xd, 0x0, 0x3565, 0x0, 0xc578}, r4, 0xffffffffffffffff, r2, 0x3) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x810, 0x2c6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0xfffffffffffffffe}, 0x100, 0x0, 0xc2ba, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$kcm(r3, &(0x7f0000000600)={&(0x7f0000000100)=@nfc={0x27, 0x0, 0x1, 0x6}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="f334c157df47cdf82cc7f7e3f31bb037a10cedfb7e94eca8a235a2ef0a5f671eaeb972eda41f1d2bc8c3c6761c402fa350f6e44140f17948c3e83b8403460a2393a4d368842be8d0c2f3913ac49edef7592c945f1c51aefd784b82d834cbc1cf75e7826c8ce24295d31802f23687e38b03204c215dc811d833263b7c9010767c9a978048a8a4b1c52e5ab9e8b2f49a0d1bc43816a898fb2fcfe25986a0dfaaa999ab933d22e6610879b1d813db8e4a105e4155e66a50c0f47336bb0a4cae", 0xbe}, {&(0x7f0000000340)}, {&(0x7f00000003c0)="c1836aee2e574bacb9b5224dce5e52a7bd46b90ddde7d7ae171aca67125e3abca0208e348bbdafd2101d11402480f4c478e935b0568d5d5514098db852c40347503b470f0398ee881878184a328e7487ce70e457425b580e1ff5406ab7a646d39f5bc88f83a9091382ba9cd1f3032ae1d1a4a54e8ab5fe44fa", 0x79}, {&(0x7f00000004c0)}, {&(0x7f0000000500)="f807c5d47d8245779aabe4bbea661bb3e978bd76905538cb127df2c5788365091900d7d7986148b57881fc6709", 0x2d}], 0x5, &(0x7f00000005c0)}, 0x0) close(r3) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0xe59}, 0x100c, 0x0, 0x0, 0x0, 0x20000000001, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETOFFLOAD(r7, 0x400454c9, 0xba98575a95aeb70d) ioctl$TUNGETVNETBE(r7, 0x800454df, &(0x7f0000000100)=0x1) ioctl$TUNATTACHFILTER(r7, 0x401054d5, &(0x7f0000000380)={0x4, &(0x7f0000000340)=[{0x9, 0x4d, 0x91, 0xfff}, {0x4, 0x0, 0x10, 0x9f}, {0x9, 0x7f, 0x97}, {0x8, 0xd6, 0x52, 0x7}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000011008188e6b62aa73f72cc9f0ba1f8483d0000005e140602000000000e000a0010000000028000001294", 0x2e}], 0x1}, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r6, 0x40047440, 0x110c230000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x1f, 0x9, &(0x7f0000000640)=ANY=[@ANYBLOB="180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000800fa00b70300000000000085000000bf0000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) socket$kcm(0x10, 0x2, 0x0) 1.691640391s ago: executing program 8 (id=12039): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x6, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x806, 0x0, 0x8dc, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x3, 0x3a) recvmsg$kcm(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000780)}, 0x100) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0xfe80000000000000, 0xac14140c}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)='\x00\x00', 0xffe3}], 0x1, 0x0, 0x0, 0x900}, 0x60) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000005"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2d, 0x2041a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x86bf2056334f30a6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) r2 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa}, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x5, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x4}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}, @volatile, @func={0x3, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0, 0x0, 0x2e]}}, 0x0, 0x65}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000001) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000013c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@datasec={0x2, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x101}, {0x3, 0x4, 0x1}, {0x4, 0x5, 0x401}], 'H'}, @datasec={0x0, 0x5c, 0x0, 0xf, 0x3, [{0x1, 0x6, 0x8}], "7472e9"}]}, {0x0, [0x61, 0x5f]}}, &(0x7f00000003c0)=""/4096, 0x44, 0x1000, 0x1}, 0x20) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$kcm(0xa, 0x3, 0x3a) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="2e00000011008188040f80ec59acbc0413a1810031000000000f000000028002002d1f00"/46, 0x2e}], 0x1}, 0x44004) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)=@generic={&(0x7f0000000100)='./file0\x00', r3}, 0x18) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)}, 0x0) 1.022621368s ago: executing program 0 (id=12040): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000080)={r0}) socketpair(0x26, 0x800, 0x8, &(0x7f0000000040)) 781.238591ms ago: executing program 0 (id=12041): socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x38}, 0x12160) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 251.813437ms ago: executing program 8 (id=12042): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{}], 0x1}, 0x0) 98.533788ms ago: executing program 8 (id=12043): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000001c0)="2e00000010008102b78cc358f86515e00000c9f1af642fb6429d6efb4400490009002e0010000000ba8000051201", 0x2e}], 0x1}, 0x4000000) 28.861259ms ago: executing program 6 (id=12044): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000001c0)="2e00000010008102b78cc358f86515e00000c9f1af642fb6429d6efb4400490009002e0010000000ba8000051201", 0x2e}], 0x1}, 0x4000000) (fail_nth: 1) 0s ago: executing program 0 (id=12045): socket$kcm(0xa, 0x5, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x2}, 0x0, 0x0, 0xfffffffd, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$kcm(0x21, 0x2, 0x2) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, r1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x9, 0x1, 0x8c}]}, &(0x7f0000000080)='syzkaller\x00'}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000b80)=ANY=[@ANYBLOB="9feb010018000000060000000c0000004ce484bf84730c0000000200000000000000000000faaccb3fee8543cbe35b91216c0905cfdec9f485f4605064d9bdc702dd28efb26f90e5689689b3ca46c71f3d5d29c79d70a261f47e2d84d9b55ec83f75c96dce1e605163e8"], 0x0, 0x26}, 0x28) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x34, 0x0, 0xffffffffffffffff, 0x92, '\x00', 0x0, r3, 0x0, 0x3, 0x4}, 0x50) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0xa, 0x9, 0x8, 0x2, 0x21040}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x3, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="180200000000000000000000005600", @ANYRES32=r6, @ANYBLOB], &(0x7f0000000000)='GPL\x00'}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000440)='%-5lx \x00'}, 0x20) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, r3, 0x0, 0x4, 0x2}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0xd, 0x16, &(0x7f0000000540)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_fd={0x18, 0x5, 0x1, 0x0, r6}, @map_val={0x18, 0x9, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000600)='syzkaller\x00', 0x3, 0x69, &(0x7f0000000640)=""/105, 0x40f00, 0x6a, '\x00', 0x0, @sock_ops, r3, 0x8, &(0x7f00000006c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x2, 0x8, 0x910c}, 0x10, 0x0, r2, 0x5, &(0x7f0000000900)=[r8, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000940)=[{0x4, 0x2, 0xe, 0x6}, {0x4, 0x2, 0x0, 0x1}, {0x3, 0x2, 0xd, 0x8}, {0x2, 0x2, 0xa, 0x7}, {0x0, 0x4, 0x2, 0xc}], 0x10, 0x6}, 0x94) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000029000b05d25a806f8c6394f90424fc60", 0x14}], 0x1}, 0x0) kernel console output (not intermixed with test programs): : 2 bytes leftover after parsing attributes in process `syz.7.11059'. [ 2274.901109][ T8469] netlink: 'syz.0.11060': attribute type 10 has an invalid length. [ 2274.911760][ T8469] netlink: 2 bytes leftover after parsing attributes in process `syz.0.11060'. [ 2275.427180][ T8478] netlink: 'syz.0.11064': attribute type 10 has an invalid length. [ 2275.461920][ T8478] netlink: 2 bytes leftover after parsing attributes in process `syz.0.11064'. [ 2275.773691][ T8494] netlink: 'syz.6.11067': attribute type 10 has an invalid length. [ 2275.861961][ T8494] team0: Device hsr_slave_0 failed to register rx_handler [ 2276.911788][ T8506] netlink: 'syz.0.11071': attribute type 10 has an invalid length. [ 2277.056892][ T8506] netlink: 2 bytes leftover after parsing attributes in process `syz.0.11071'. [ 2277.069080][ T8511] netlink: 'syz.7.11074': attribute type 10 has an invalid length. [ 2277.144428][ T8511] netlink: 2 bytes leftover after parsing attributes in process `syz.7.11074'. [ 2278.221461][ T8539] netlink: 'syz.7.11081': attribute type 10 has an invalid length. [ 2278.296884][ T8539] team0: Device hsr_slave_0 failed to register rx_handler [ 2278.857210][ T8549] netlink: 2 bytes leftover after parsing attributes in process `syz.7.11085'. [ 2279.085967][ T8551] validate_nla: 1 callbacks suppressed [ 2279.086081][ T8551] netlink: 'syz.1.11086': attribute type 10 has an invalid length. [ 2279.210121][ T8551] netlink: 2 bytes leftover after parsing attributes in process `syz.1.11086'. [ 2279.474830][ T8560] netlink: 'syz.8.11091': attribute type 10 has an invalid length. [ 2279.609386][ T8560] team0: Device hsr_slave_0 failed to register rx_handler [ 2280.354544][ T8578] netlink: 'syz.0.11098': attribute type 10 has an invalid length. [ 2280.453544][ T8578] team0: Device hsr_slave_0 failed to register rx_handler [ 2281.839800][ T8608] netlink: 'syz.0.11106': attribute type 10 has an invalid length. [ 2281.937331][ T8608] team0: Device hsr_slave_0 failed to register rx_handler [ 2283.273952][ T8629] netlink: 'syz.0.11113': attribute type 10 has an invalid length. [ 2283.344018][ T8629] team0: Device hsr_slave_0 failed to register rx_handler [ 2284.125458][ T8639] netlink: 'syz.8.11118': attribute type 10 has an invalid length. [ 2284.205291][ T8639] team0: Device hsr_slave_0 failed to register rx_handler [ 2284.310247][ T8644] netlink: 'syz.1.11120': attribute type 10 has an invalid length. [ 2284.327055][ T8644] team0: Device hsr_slave_0 failed to register rx_handler [ 2284.452344][ T8642] netlink: 'syz.0.11121': attribute type 10 has an invalid length. [ 2284.520647][ T8642] team0: Device hsr_slave_0 failed to register rx_handler [ 2284.861041][ T8652] netlink: 'syz.8.11123': attribute type 10 has an invalid length. [ 2284.887706][ T8652] team0: Device hsr_slave_0 failed to register rx_handler [ 2285.212807][ T8663] netlink: 'syz.7.11125': attribute type 10 has an invalid length. [ 2285.315231][ T8663] team0: Device hsr_slave_0 failed to register rx_handler [ 2285.569457][ T8666] netlink: 'syz.0.11127': attribute type 10 has an invalid length. [ 2285.604615][ T8666] team0: Device hsr_slave_0 failed to register rx_handler [ 2286.370498][ T8681] netlink: 'syz.7.11132': attribute type 10 has an invalid length. [ 2286.566183][ T8681] team0: Device hsr_slave_0 failed to register rx_handler [ 2287.334172][ T8692] netlink: 'syz.0.11137': attribute type 10 has an invalid length. [ 2287.375371][ T8692] netlink: 2 bytes leftover after parsing attributes in process `syz.0.11137'. [ 2287.458639][ T8700] netlink: 'syz.1.11138': attribute type 10 has an invalid length. [ 2287.492152][ T8700] team0: Device hsr_slave_0 failed to register rx_handler [ 2287.548946][ T8696] netlink: 'syz.6.11139': attribute type 10 has an invalid length. [ 2287.575809][ T8696] netlink: 2 bytes leftover after parsing attributes in process `syz.6.11139'. [ 2287.631502][ T8705] team0: Device hsr_slave_0 failed to register rx_handler [ 2287.939614][ T8713] team0: Device hsr_slave_0 failed to register rx_handler [ 2288.076964][ T8710] team0: Device hsr_slave_0 failed to register rx_handler [ 2288.555084][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 2288.561619][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 2288.570728][ T8726] team0: Device hsr_slave_0 failed to register rx_handler [ 2289.559395][ T8740] validate_nla: 4 callbacks suppressed [ 2289.559475][ T8740] netlink: 'syz.0.11155': attribute type 10 has an invalid length. [ 2289.748729][ T8740] netlink: 2 bytes leftover after parsing attributes in process `syz.0.11155'. [ 2289.788975][ T8743] netlink: 'syz.6.11156': attribute type 10 has an invalid length. [ 2289.819705][ T8743] team0: Device hsr_slave_0 failed to register rx_handler [ 2290.155743][ T8748] netlink: 'syz.1.11158': attribute type 10 has an invalid length. [ 2290.181598][ T8748] team0: Device hsr_slave_0 failed to register rx_handler [ 2290.288006][ T8750] netlink: 'syz.6.11161': attribute type 10 has an invalid length. [ 2290.319518][ T8750] team0: Device hsr_slave_0 failed to register rx_handler [ 2290.886723][ T8764] netlink: 'syz.7.11165': attribute type 10 has an invalid length. [ 2290.942683][ T8764] team0: Device hsr_slave_0 failed to register rx_handler [ 2291.201483][ T8771] netlink: 'syz.0.11168': attribute type 10 has an invalid length. [ 2291.264020][ T8771] team0: Device hsr_slave_0 failed to register rx_handler [ 2292.083039][ T8787] netlink: 'syz.7.11176': attribute type 10 has an invalid length. [ 2292.151753][ T8787] team0: Device hsr_slave_0 failed to register rx_handler [ 2293.112859][ T8781] netlink: 'syz.1.11175': attribute type 10 has an invalid length. [ 2293.236578][ T8781] team0: Device hsr_slave_0 failed to register rx_handler [ 2293.282534][ T8784] netlink: 'syz.0.11174': attribute type 10 has an invalid length. [ 2293.308993][ T8784] team0: Device hsr_slave_0 failed to register rx_handler [ 2293.377514][ T8793] netlink: 'syz.7.11177': attribute type 10 has an invalid length. [ 2293.392531][ T8793] netlink: 2 bytes leftover after parsing attributes in process `syz.7.11177'. [ 2293.618683][ T8797] team0: Device hsr_slave_0 failed to register rx_handler [ 2293.789905][ T8801] team0: Device hsr_slave_0 failed to register rx_handler [ 2293.871872][ T8805] team0: Device hsr_slave_0 failed to register rx_handler [ 2294.206584][ T8813] team0: Device hsr_slave_0 failed to register rx_handler [ 2294.486124][ T8815] team0: Device hsr_slave_0 failed to register rx_handler [ 2294.639885][ T8818] validate_nla: 5 callbacks suppressed [ 2294.639905][ T8818] netlink: 'syz.8.11188': attribute type 10 has an invalid length. [ 2294.717224][ T8818] team0: Device hsr_slave_0 failed to register rx_handler [ 2295.906438][ T8841] netlink: 'syz.6.11195': attribute type 10 has an invalid length. [ 2295.984429][ T8841] team0: Device hsr_slave_0 failed to register rx_handler [ 2296.401580][ T8846] netlink: 'syz.8.11196': attribute type 10 has an invalid length. [ 2296.523756][ T8846] team0: Device hsr_slave_0 failed to register rx_handler [ 2296.723516][ T8850] netlink: 'syz.7.11199': attribute type 10 has an invalid length. [ 2296.751379][ T8850] team0: Device hsr_slave_0 failed to register rx_handler [ 2297.048893][ T8857] netlink: 'syz.6.11200': attribute type 10 has an invalid length. [ 2297.089956][ T8857] team0: Device hsr_slave_0 failed to register rx_handler [ 2297.366763][ T8862] netlink: 'syz.8.11203': attribute type 10 has an invalid length. [ 2297.507824][ T8862] team0: Device hsr_slave_0 failed to register rx_handler [ 2297.596341][ T8866] netlink: 'syz.7.11204': attribute type 10 has an invalid length. [ 2297.626993][ T8866] team0: Device hsr_slave_0 failed to register rx_handler [ 2297.787018][ T8868] netlink: 'syz.0.11214': attribute type 10 has an invalid length. [ 2297.809014][ T8868] team0: Device hsr_slave_0 failed to register rx_handler [ 2298.947042][ T8888] netlink: 'syz.1.11211': attribute type 10 has an invalid length. [ 2299.007863][ T8888] team0: Device hsr_slave_0 failed to register rx_handler [ 2300.801147][ T8904] netlink: 'syz.1.11216': attribute type 10 has an invalid length. [ 2300.816416][ T8904] team0: Device hsr_slave_0 failed to register rx_handler [ 2300.850890][ T8903] netlink: 'syz.8.11215': attribute type 10 has an invalid length. [ 2300.927145][ T8903] team0: Device hsr_slave_0 failed to register rx_handler [ 2301.141811][ T8906] netlink: 'syz.0.11217': attribute type 10 has an invalid length. [ 2301.189231][ T8906] team0: Device hsr_slave_0 failed to register rx_handler [ 2301.428528][ T8911] netlink: 'syz.1.11218': attribute type 10 has an invalid length. [ 2301.464602][ T8911] team0: Device hsr_slave_0 failed to register rx_handler [ 2301.582032][ T8913] netlink: 'syz.7.11219': attribute type 10 has an invalid length. [ 2301.596505][ T8913] team0: Device hsr_slave_0 failed to register rx_handler [ 2301.701148][ T8917] netlink: 'syz.6.11221': attribute type 10 has an invalid length. [ 2301.730711][ T8917] team0: Device hsr_slave_0 failed to register rx_handler [ 2301.900517][ T8921] netlink: 'syz.8.11224': attribute type 10 has an invalid length. [ 2301.964159][ T8921] team0: Device hsr_slave_0 failed to register rx_handler [ 2302.139160][ T8923] netlink: 'syz.1.11222': attribute type 10 has an invalid length. [ 2302.177669][ T8923] team0: Device hsr_slave_0 failed to register rx_handler [ 2302.466881][ T8929] netlink: 'syz.7.11226': attribute type 10 has an invalid length. [ 2302.527497][ T8929] team0: Device hsr_slave_0 failed to register rx_handler [ 2303.440596][ T8958] netlink: 'syz.1.11237': attribute type 10 has an invalid length. [ 2303.456678][ T8958] team0: Device hsr_slave_0 failed to register rx_handler [ 2304.436401][ T8980] team0: Device hsr_slave_0 failed to register rx_handler [ 2304.728887][ T8987] team0: Device hsr_slave_0 failed to register rx_handler [ 2305.052029][ T8991] team0: Device hsr_slave_0 failed to register rx_handler [ 2305.225278][ T9001] team0: Device hsr_slave_0 failed to register rx_handler [ 2305.985158][ T9018] validate_nla: 4 callbacks suppressed [ 2305.985176][ T9018] netlink: 'syz.1.11260': attribute type 10 has an invalid length. [ 2306.046045][ T9018] team0: Device hsr_slave_0 failed to register rx_handler [ 2306.427289][ T9023] netlink: 'syz.8.11262': attribute type 10 has an invalid length. [ 2306.478797][ T9023] team0: Device hsr_slave_0 failed to register rx_handler [ 2306.643426][ T9032] netlink: 'syz.0.11265': attribute type 10 has an invalid length. [ 2306.685367][ T9032] team0: Device hsr_slave_0 failed to register rx_handler [ 2308.130915][ T9064] netlink: 'syz.8.11275': attribute type 10 has an invalid length. [ 2308.208911][ T9064] team0: Device hsr_slave_0 failed to register rx_handler [ 2308.645381][ T9074] netlink: 'syz.0.11279': attribute type 10 has an invalid length. [ 2308.716368][ T9074] team0: Device hsr_slave_0 failed to register rx_handler [ 2309.095905][ T9087] netlink: 'syz.1.11284': attribute type 10 has an invalid length. [ 2309.159588][ T9087] team0: Device hsr_slave_0 failed to register rx_handler [ 2309.509150][ T9089] netlink: 'syz.8.11285': attribute type 10 has an invalid length. [ 2309.557933][ T9089] team0: Device hsr_slave_0 failed to register rx_handler [ 2309.883274][ T9091] netlink: 'syz.7.11286': attribute type 10 has an invalid length. [ 2309.983412][ T9091] team0: Device hsr_slave_0 failed to register rx_handler [ 2310.194058][ T9098] netlink: 'syz.0.11298': attribute type 10 has an invalid length. [ 2310.270341][ T9098] team0: Device hsr_slave_0 failed to register rx_handler [ 2310.745983][ T9108] netlink: 'syz.0.11292': attribute type 10 has an invalid length. [ 2310.806142][ T9108] team0: Device hsr_slave_0 failed to register rx_handler [ 2311.065587][ T9113] netlink: 'syz.8.11294': attribute type 10 has an invalid length. [ 2311.123932][ T9113] team0: Device hsr_slave_0 failed to register rx_handler [ 2311.426102][ T9124] netlink: 'syz.1.11300': attribute type 10 has an invalid length. [ 2311.523980][ T9124] team0: Device hsr_slave_0 failed to register rx_handler [ 2311.778073][ T9120] netlink: 'syz.6.11297': attribute type 10 has an invalid length. [ 2311.834640][ T9120] team0: Device hsr_slave_0 failed to register rx_handler [ 2311.987908][ T9127] netlink: 'syz.0.11299': attribute type 10 has an invalid length. [ 2312.019237][ T9127] team0: Device hsr_slave_0 failed to register rx_handler [ 2312.375815][ T9134] netlink: 'syz.1.11303': attribute type 10 has an invalid length. [ 2312.466051][ T9134] team0: Device hsr_slave_0 failed to register rx_handler [ 2312.774627][ T9136] netlink: 'syz.6.11304': attribute type 10 has an invalid length. [ 2312.854873][ T9136] team0: Device hsr_slave_0 failed to register rx_handler [ 2313.020688][ T9141] netlink: 'syz.8.11306': attribute type 10 has an invalid length. [ 2313.111224][ T9141] team0: Device hsr_slave_0 failed to register rx_handler [ 2313.528104][ T9151] netlink: 'syz.0.11310': attribute type 10 has an invalid length. [ 2313.615841][ T9151] team0: Device hsr_slave_0 failed to register rx_handler [ 2313.987265][ T9161] netlink: 'syz.1.11313': attribute type 10 has an invalid length. [ 2314.115987][ T9161] team0: Device hsr_slave_0 failed to register rx_handler [ 2314.178218][ T9162] netlink: 'syz.6.11322': attribute type 10 has an invalid length. [ 2314.234215][ T9162] team0: Device hsr_slave_0 failed to register rx_handler [ 2315.232304][ T9175] team0: Device hsr_slave_0 failed to register rx_handler [ 2315.565532][ T9179] team0: Device hsr_slave_0 failed to register rx_handler [ 2316.052153][ T9186] team0: Device hsr_slave_0 failed to register rx_handler [ 2316.460564][ T9190] validate_nla: 3 callbacks suppressed [ 2316.460935][ T9190] netlink: 'syz.1.11323': attribute type 10 has an invalid length. [ 2316.541905][ T9190] team0: Device hsr_slave_0 failed to register rx_handler [ 2316.709079][ T9191] netlink: 'syz.6.11333': attribute type 10 has an invalid length. [ 2316.719860][ T9191] team0: Device hsr_slave_0 failed to register rx_handler [ 2316.890951][ T9203] netlink: 'syz.1.11327': attribute type 10 has an invalid length. [ 2316.943606][ T9203] team0: Device hsr_slave_0 failed to register rx_handler [ 2318.853726][ T9210] netlink: 'syz.0.11329': attribute type 10 has an invalid length. [ 2318.872059][ T9210] team0: Device hsr_slave_0 failed to register rx_handler [ 2318.894888][ T9215] netlink: 'syz.7.11331': attribute type 10 has an invalid length. [ 2318.912931][ T9215] team0: Device hsr_slave_0 failed to register rx_handler [ 2318.937640][ T9219] netlink: 'syz.1.11332': attribute type 10 has an invalid length. [ 2318.949638][ T9219] team0: Device hsr_slave_0 failed to register rx_handler [ 2319.215566][ T9226] netlink: 'syz.8.11337': attribute type 10 has an invalid length. [ 2319.251694][ T9226] team0: Device hsr_slave_0 failed to register rx_handler [ 2319.488470][ T9229] netlink: 'syz.7.11348': attribute type 10 has an invalid length. [ 2319.517766][ T9229] team0: Device hsr_slave_0 failed to register rx_handler [ 2319.781352][ T9234] netlink: 'syz.1.11338': attribute type 10 has an invalid length. [ 2319.826620][ T9234] team0: Device hsr_slave_0 failed to register rx_handler [ 2320.766584][ T9252] netlink: 'syz.7.11345': attribute type 10 has an invalid length. [ 2320.851315][ T9252] team0: Device hsr_slave_0 failed to register rx_handler [ 2321.543931][ T9263] netlink: 'syz.8.11347': attribute type 10 has an invalid length. [ 2321.637574][ T9263] team0: Device hsr_slave_0 failed to register rx_handler [ 2321.987130][ T9262] netlink: 'syz.6.11349': attribute type 10 has an invalid length. [ 2322.051226][ T9262] team0: Device hsr_slave_0 failed to register rx_handler [ 2322.223328][ T9273] netlink: 'syz.1.11353': attribute type 10 has an invalid length. [ 2322.269240][ T9273] team0: Device hsr_slave_0 failed to register rx_handler [ 2322.497205][ T9277] netlink: 'syz.8.11354': attribute type 10 has an invalid length. [ 2322.587438][ T9277] team0: Device hsr_slave_0 failed to register rx_handler [ 2322.809577][ T9281] netlink: 'syz.0.11355': attribute type 10 has an invalid length. [ 2322.882443][ T9281] team0: Device hsr_slave_0 failed to register rx_handler [ 2323.129483][ T9286] netlink: 'syz.1.11358': attribute type 10 has an invalid length. [ 2323.199273][ T9286] team0: Device hsr_slave_0 failed to register rx_handler [ 2323.989454][ T9302] netlink: 'syz.7.11376': attribute type 10 has an invalid length. [ 2324.093314][ T9302] team0: Device hsr_slave_0 failed to register rx_handler [ 2324.792045][ T9313] netlink: 'syz.8.11368': attribute type 10 has an invalid length. [ 2324.872212][ T9313] team0: Device hsr_slave_0 failed to register rx_handler [ 2325.159266][ T9318] netlink: 'syz.7.11369': attribute type 10 has an invalid length. [ 2325.315006][ T9318] team0: Device hsr_slave_0 failed to register rx_handler [ 2325.745063][ T9327] netlink: 'syz.0.11372': attribute type 10 has an invalid length. [ 2325.808528][ T9327] team0: Device hsr_slave_0 failed to register rx_handler [ 2326.819710][ T9345] netlink: 'syz.8.11379': attribute type 10 has an invalid length. [ 2326.881025][ T9345] team0: Device hsr_slave_0 failed to register rx_handler [ 2327.308483][ T9351] netlink: 'syz.1.11384': attribute type 10 has an invalid length. [ 2327.343772][ T9351] team0: Device hsr_slave_0 failed to register rx_handler [ 2327.787439][ T9364] netlink: 'syz.6.11397': attribute type 10 has an invalid length. [ 2327.871805][ T9364] team0: Device hsr_slave_0 failed to register rx_handler [ 2329.221403][ T9379] netlink: 'syz.1.11393': attribute type 10 has an invalid length. [ 2329.271731][ T9379] team0: Device hsr_slave_0 failed to register rx_handler [ 2329.803943][ T9386] netlink: 'syz.1.11396': attribute type 10 has an invalid length. [ 2329.901726][ T9386] team0: Device hsr_slave_0 failed to register rx_handler [ 2330.170093][ T9390] netlink: 'syz.7.11399': attribute type 10 has an invalid length. [ 2330.236479][ T9390] team0: Device hsr_slave_0 failed to register rx_handler [ 2330.520854][ T9388] netlink: 'syz.8.11409': attribute type 10 has an invalid length. [ 2330.583785][ T9388] team0: Device hsr_slave_0 failed to register rx_handler [ 2330.779607][ T9398] netlink: 'syz.1.11400': attribute type 10 has an invalid length. [ 2330.805822][ T9398] team0: Device hsr_slave_0 failed to register rx_handler [ 2330.836214][ T9397] netlink: 'syz.6.11402': attribute type 10 has an invalid length. [ 2330.875585][ T9397] team0: Device hsr_slave_0 failed to register rx_handler [ 2331.165576][ T9406] netlink: 'syz.8.11404': attribute type 10 has an invalid length. [ 2331.225814][ T9406] team0: Device hsr_slave_0 failed to register rx_handler [ 2332.156951][ T9425] netlink: 'syz.0.11414': attribute type 10 has an invalid length. [ 2332.330500][ T9425] team0: Device hsr_slave_0 failed to register rx_handler [ 2333.068877][ T9438] netlink: 'syz.0.11419': attribute type 10 has an invalid length. [ 2333.151666][ T9438] team0: Device hsr_slave_0 failed to register rx_handler [ 2333.507283][ T9440] netlink: 'syz.7.11418': attribute type 10 has an invalid length. [ 2333.548815][ T9440] team0: Device hsr_slave_0 failed to register rx_handler [ 2333.660589][ T9443] netlink: 'syz.1.11420': attribute type 10 has an invalid length. [ 2333.707546][ T9443] team0: Device hsr_slave_0 failed to register rx_handler [ 2333.919285][ T9450] netlink: 'syz.0.11435': attribute type 10 has an invalid length. [ 2334.039541][ T9450] team0: Device hsr_slave_0 failed to register rx_handler [ 2336.387723][ T9485] netlink: 'syz.0.11436': attribute type 10 has an invalid length. [ 2336.421069][ T9485] team0: Device hsr_slave_0 failed to register rx_handler [ 2337.626205][ T9501] netlink: 'syz.8.11438': attribute type 10 has an invalid length. [ 2337.706401][ T9501] team0: Device hsr_slave_0 failed to register rx_handler [ 2337.953298][ T9504] netlink: 'syz.0.11439': attribute type 10 has an invalid length. [ 2337.968812][ T9504] team0: Device hsr_slave_0 failed to register rx_handler [ 2338.028312][ T9510] netlink: 'syz.1.11441': attribute type 10 has an invalid length. [ 2338.043198][ T9510] team0: Device hsr_slave_0 failed to register rx_handler [ 2339.402205][ T9544] netlink: 'syz.1.11455': attribute type 10 has an invalid length. [ 2339.441984][ T9544] team0: Device hsr_slave_0 failed to register rx_handler [ 2339.532155][ T9545] netlink: 'syz.0.11454': attribute type 10 has an invalid length. [ 2339.587488][ T9545] team0: Device hsr_slave_0 failed to register rx_handler [ 2339.669183][ T9548] netlink: 'syz.7.11456': attribute type 10 has an invalid length. [ 2339.723468][ T9548] team0: Device hsr_slave_0 failed to register rx_handler [ 2339.760019][ T9550] netlink: 60 bytes leftover after parsing attributes in process `syz.8.11457'. [ 2340.042040][ T9550] netlink: 60 bytes leftover after parsing attributes in process `syz.8.11457'. [ 2340.073771][ T9555] netlink: 60 bytes leftover after parsing attributes in process `syz.8.11457'. [ 2341.519620][ T9596] netlink: 'syz.6.11470': attribute type 10 has an invalid length. [ 2341.621732][ T9596] team0: Device hsr_slave_0 failed to register rx_handler [ 2341.690628][ T9598] netlink: 'syz.8.11471': attribute type 10 has an invalid length. [ 2341.769349][ T9598] team0: Device hsr_slave_0 failed to register rx_handler [ 2344.385535][ T9666] netlink: 'syz.7.11491': attribute type 10 has an invalid length. [ 2344.444937][ T9666] team0: Device hsr_slave_0 failed to register rx_handler [ 2344.590431][ T9670] netlink: 'syz.6.11496': attribute type 10 has an invalid length. [ 2344.614414][ T9670] team0: Device hsr_slave_0 failed to register rx_handler [ 2349.983225][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 2349.989718][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 2355.464373][ T9863] netlink: 65047 bytes leftover after parsing attributes in process `syz.0.11547'. [ 2358.248673][ T9907] FAULT_INJECTION: forcing a failure. [ 2358.248673][ T9907] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2358.305757][ T9908] netlink: 168864 bytes leftover after parsing attributes in process `syz.8.11560'. [ 2358.335080][ T9908] netlink: zone id is out of range [ 2358.340098][ T9907] CPU: 0 PID: 9907 Comm: syz.1.11561 Not tainted syzkaller #0 [ 2358.348005][ T9907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2358.358108][ T9907] Call Trace: [ 2358.359876][ T9908] netlink: zone id is out of range [ 2358.361410][ T9907] [ 2358.361422][ T9907] dump_stack_lvl+0x188/0x24e [ 2358.361467][ T9907] ? show_regs_print_info+0x12/0x12 [ 2358.361503][ T9907] ? load_image+0x400/0x400 [ 2358.361536][ T9907] ? __lock_acquire+0x7d10/0x7d10 [ 2358.389149][ T9907] ? perf_trace_run_bpf_submit+0x1c0/0x1c0 [ 2358.395090][ T9907] should_fail_ex+0x399/0x4d0 [ 2358.399828][ T9907] _copy_from_user+0x2c/0x170 [ 2358.403755][ T9908] netlink: zone id is out of range [ 2358.404549][ T9907] ___sys_sendmsg+0x1c3/0x360 [ 2358.404601][ T9907] ? __sys_sendmsg+0x290/0x290 [ 2358.404738][ T9907] __se_sys_sendmsg+0x1bb/0x2a0 [ 2358.424247][ T9907] ? __x64_sys_sendmsg+0x80/0x80 [ 2358.429274][ T9907] do_syscall_64+0x4c/0xa0 [ 2358.433802][ T9907] ? clear_bhb_loop+0x60/0xb0 [ 2358.438539][ T9907] ? clear_bhb_loop+0x60/0xb0 [ 2358.443274][ T9907] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2358.449221][ T9907] RIP: 0033:0x7fa8a719cdd9 [ 2358.453684][ T9907] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2358.473448][ T9907] RSP: 002b:00007fa8a7fc2028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2358.482029][ T9907] RAX: ffffffffffffffda RBX: 00007fa8a7415fa0 RCX: 00007fa8a719cdd9 [ 2358.490087][ T9907] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000006 [ 2358.498130][ T9907] RBP: 00007fa8a7fc2090 R08: 0000000000000000 R09: 0000000000000000 [ 2358.506187][ T9907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2358.514269][ T9907] R13: 00007fa8a7416038 R14: 00007fa8a7415fa0 R15: 00007ffc3d07e298 [ 2358.522333][ T9907] [ 2358.561042][ T9908] netlink: del zone limit has 4 unknown bytes [ 2358.724496][ T4286] Bluetooth: hci0: ISO packet for unknown connection handle 2622 [ 2358.814492][ T9923] FAULT_INJECTION: forcing a failure. [ 2358.814492][ T9923] name failslab, interval 1, probability 0, space 0, times 0 [ 2358.858618][ T9923] CPU: 0 PID: 9923 Comm: syz.8.11566 Not tainted syzkaller #0 [ 2358.866165][ T9923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2358.876363][ T9923] Call Trace: [ 2358.879687][ T9923] [ 2358.882658][ T9923] dump_stack_lvl+0x188/0x24e [ 2358.887400][ T9923] ? show_regs_print_info+0x12/0x12 [ 2358.892703][ T9923] ? load_image+0x400/0x400 [ 2358.897263][ T9923] ? __might_sleep+0xd0/0xd0 [ 2358.901906][ T9923] ? __lock_acquire+0x7d10/0x7d10 [ 2358.906988][ T9923] ? mark_lock+0x94/0x320 [ 2358.911378][ T9923] should_fail_ex+0x399/0x4d0 [ 2358.916284][ T9923] should_failslab+0x5/0x20 [ 2358.920838][ T9923] slab_pre_alloc_hook+0x59/0x310 [ 2358.925914][ T9923] kmem_cache_alloc_node+0x5a/0x320 [ 2358.931160][ T9923] ? __alloc_skb+0xfc/0x7e0 [ 2358.935723][ T9923] __alloc_skb+0xfc/0x7e0 [ 2358.940120][ T9923] inet_netconf_notify_devconf+0x16f/0x230 [ 2358.946015][ T9923] inetdev_event+0x702/0x1400 [ 2358.950768][ T9923] ? devinet_exit_net+0x220/0x220 [ 2358.955853][ T9923] ? arp_netdev_event+0xd4/0x320 [ 2358.960935][ T9923] raw_notifier_call_chain+0xcb/0x160 [ 2358.966441][ T9923] unregister_netdevice_many_notify+0x10ac/0x19c0 [ 2358.973108][ T9923] ? unregister_netdevice_many+0x20/0x20 [ 2358.978809][ T9923] ? __mutex_lock+0x1ab/0xaf0 [ 2358.983560][ T9923] unregister_netdevice_queue+0x328/0x370 [ 2358.989351][ T9923] ? list_netdevice+0x6c0/0x6c0 [ 2358.994295][ T9923] ppp_release+0xec/0x1f0 [ 2358.998738][ T9923] ? ppp_open+0x70/0x70 [ 2359.003025][ T9923] __fput+0x22c/0x920 [ 2359.007082][ T9923] task_work_run+0x1d0/0x260 [ 2359.011802][ T9923] ? task_work_cancel+0x220/0x220 [ 2359.016953][ T9923] ? exit_to_user_mode_loop+0x3b/0x110 [ 2359.022598][ T9923] exit_to_user_mode_loop+0xe6/0x110 [ 2359.027941][ T9923] exit_to_user_mode_prepare+0xee/0x180 [ 2359.033632][ T9923] syscall_exit_to_user_mode+0x16/0x40 [ 2359.039164][ T9923] do_syscall_64+0x58/0xa0 [ 2359.043639][ T9923] ? clear_bhb_loop+0x60/0xb0 [ 2359.048367][ T9923] ? clear_bhb_loop+0x60/0xb0 [ 2359.053109][ T9923] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2359.059057][ T9923] RIP: 0033:0x7f6be739cdd9 [ 2359.063526][ T9923] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2359.083188][ T9923] RSP: 002b:00007f6be8265028 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 2359.091870][ T9923] RAX: 0000000000000000 RBX: 00007f6be7615fa0 RCX: 00007f6be739cdd9 [ 2359.099922][ T9923] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 2359.107946][ T9923] RBP: 00007f6be8265090 R08: 0000000000000000 R09: 0000000000000000 [ 2359.115977][ T9923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2359.123994][ T9923] R13: 00007f6be7616038 R14: 00007f6be7615fa0 R15: 00007ffe0de2d5c8 [ 2359.132033][ T9923] [ 2359.271787][ T9928] FAULT_INJECTION: forcing a failure. [ 2359.271787][ T9928] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2359.360782][ T9928] CPU: 0 PID: 9928 Comm: syz.7.11579 Not tainted syzkaller #0 [ 2359.368358][ T9928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2359.378581][ T9928] Call Trace: [ 2359.381918][ T9928] [ 2359.384898][ T9928] dump_stack_lvl+0x188/0x24e [ 2359.389657][ T9928] ? show_regs_print_info+0x12/0x12 [ 2359.394957][ T9928] ? load_image+0x400/0x400 [ 2359.399535][ T9928] ? __lock_acquire+0x7d10/0x7d10 [ 2359.404645][ T9928] should_fail_ex+0x399/0x4d0 [ 2359.409401][ T9928] _copy_from_user+0x2c/0x170 [ 2359.414158][ T9928] __sys_bpf+0x2ea/0x780 [ 2359.418478][ T9928] ? bpf_link_show_fdinfo+0x380/0x380 [ 2359.424032][ T9928] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2359.430277][ T9928] __x64_sys_bpf+0x78/0x90 [ 2359.434889][ T9928] do_syscall_64+0x4c/0xa0 [ 2359.439377][ T9928] ? clear_bhb_loop+0x60/0xb0 [ 2359.444248][ T9928] ? clear_bhb_loop+0x60/0xb0 [ 2359.449007][ T9928] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2359.454969][ T9928] RIP: 0033:0x7ff20499cdd9 [ 2359.459434][ T9928] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2359.479094][ T9928] RSP: 002b:00007ff205855028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2359.487584][ T9928] RAX: ffffffffffffffda RBX: 00007ff204c15fa0 RCX: 00007ff20499cdd9 [ 2359.495598][ T9928] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 2359.503613][ T9928] RBP: 00007ff205855090 R08: 0000000000000000 R09: 0000000000000000 [ 2359.511625][ T9928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2359.519635][ T9928] R13: 00007ff204c16038 R14: 00007ff204c15fa0 R15: 00007ffd27ec64b8 [ 2359.527653][ T9928] [ 2359.825528][ T9944] FAULT_INJECTION: forcing a failure. [ 2359.825528][ T9944] name failslab, interval 1, probability 0, space 0, times 0 [ 2359.918440][ T9944] CPU: 1 PID: 9944 Comm: syz.0.11575 Not tainted syzkaller #0 [ 2359.925999][ T9944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2359.936113][ T9944] Call Trace: [ 2359.939448][ T9944] [ 2359.942427][ T9944] dump_stack_lvl+0x188/0x24e [ 2359.947186][ T9944] ? show_regs_print_info+0x12/0x12 [ 2359.952537][ T9944] ? load_image+0x400/0x400 [ 2359.957140][ T9944] ? __might_sleep+0xd0/0xd0 [ 2359.961807][ T9944] ? __lock_acquire+0x7d10/0x7d10 [ 2359.966986][ T9944] should_fail_ex+0x399/0x4d0 [ 2359.971726][ T9944] should_failslab+0x5/0x20 [ 2359.976282][ T9944] slab_pre_alloc_hook+0x59/0x310 [ 2359.981379][ T9944] ? file_end_write+0x156/0x250 [ 2359.986299][ T9944] kmem_cache_alloc+0x56/0x2f0 [ 2359.991128][ T9944] ? getname_flags+0xb7/0x500 [ 2359.995902][ T9944] getname_flags+0xb7/0x500 [ 2360.000462][ T9944] do_sys_openat2+0xdd/0x4b0 [ 2360.005132][ T9944] ? do_sys_open+0xe0/0xe0 [ 2360.009700][ T9944] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2360.015738][ T9944] ? lock_chain_count+0x20/0x20 [ 2360.020653][ T9944] __x64_sys_openat+0x135/0x160 [ 2360.025580][ T9944] do_syscall_64+0x4c/0xa0 [ 2360.030055][ T9944] ? clear_bhb_loop+0x60/0xb0 [ 2360.034789][ T9944] ? clear_bhb_loop+0x60/0xb0 [ 2360.039536][ T9944] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2360.045509][ T9944] RIP: 0033:0x7fd6ee95d60e [ 2360.049970][ T9944] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2360.069747][ T9944] RSP: 002b:00007fd6ef809ec8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2360.078225][ T9944] RAX: ffffffffffffffda RBX: 00007fd6ef80a6c0 RCX: 00007fd6ee95d60e [ 2360.086253][ T9944] RDX: 0000000000000002 RSI: 00007fd6ef809f90 RDI: ffffffffffffff9c [ 2360.094283][ T9944] RBP: 00007fd6ef80a090 R08: 0000000000000000 R09: 0000000000000000 [ 2360.102318][ T9944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2360.110365][ T9944] R13: 00007fd6eec16038 R14: 00007fd6eec15fa0 R15: 00007ffc457e7d38 [ 2360.118845][ T9944] [ 2360.868567][ T9964] netlink: 112 bytes leftover after parsing attributes in process `syz.1.11580'. [ 2361.777439][ T9969] netlink: 14 bytes leftover after parsing attributes in process `syz.1.11580'. [ 2361.792990][ T9969] device hsr_slave_0 left promiscuous mode [ 2361.896125][ T9969] device hsr_slave_1 left promiscuous mode [ 2361.927872][ T9969] bridge0: port 3(hsr0) entered disabled state [ 2362.009663][ T9969] bridge0: port 3(hsr0) entered disabled state [ 2362.469023][ T9998] sctp: [Deprecated]: syz.1.11589 (pid 9998) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2362.469023][ T9998] Use struct sctp_sack_info instead [ 2363.054087][T10019] netlink: 'syz.0.11596': attribute type 3 has an invalid length. [ 2363.107491][T10019] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.11596'. [ 2363.826983][T10032] FAULT_INJECTION: forcing a failure. [ 2363.826983][T10032] name failslab, interval 1, probability 0, space 0, times 0 [ 2363.864032][T10032] CPU: 0 PID: 10032 Comm: syz.8.11601 Not tainted syzkaller #0 [ 2363.871669][T10032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2363.881865][T10032] Call Trace: [ 2363.885186][T10032] [ 2363.888155][T10032] dump_stack_lvl+0x188/0x24e [ 2363.892888][T10032] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2363.899099][T10032] ? show_regs_print_info+0x12/0x12 [ 2363.904357][T10032] ? load_image+0x400/0x400 [ 2363.908934][T10032] should_fail_ex+0x399/0x4d0 [ 2363.913767][T10032] should_failslab+0x5/0x20 [ 2363.918316][T10032] slab_pre_alloc_hook+0x59/0x310 [ 2363.923393][T10032] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 2363.929167][T10032] __kmem_cache_alloc_node+0x4f/0x260 [ 2363.934591][T10032] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 2363.940359][T10032] __kmalloc+0xa0/0x240 [ 2363.944646][T10032] tomoyo_realpath_from_path+0xdf/0x5d0 [ 2363.950324][T10032] ? tomoyo_path_number_perm+0x205/0x650 [ 2363.955991][T10032] tomoyo_path_number_perm+0x22f/0x650 [ 2363.961496][T10032] ? trace_event_raw_event_lock_acquire+0x2c0/0x2c0 [ 2363.968117][T10032] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 2363.973771][T10032] ? __fget_files+0x28/0x4b0 [ 2363.978404][T10032] ? __fget_files+0x28/0x4b0 [ 2363.983053][T10032] security_file_ioctl+0x6c/0xa0 [ 2363.988036][T10032] __se_sys_ioctl+0x48/0x170 [ 2363.992751][T10032] do_syscall_64+0x4c/0xa0 [ 2363.997207][T10032] ? clear_bhb_loop+0x60/0xb0 [ 2364.001915][T10032] ? clear_bhb_loop+0x60/0xb0 [ 2364.006640][T10032] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2364.012610][T10032] RIP: 0033:0x7f6be739cdd9 [ 2364.017058][T10032] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2364.036695][T10032] RSP: 002b:00007f6be8265028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2364.045233][T10032] RAX: ffffffffffffffda RBX: 00007f6be7615fa0 RCX: 00007f6be739cdd9 [ 2364.053273][T10032] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000007 [ 2364.061297][T10032] RBP: 00007f6be8265090 R08: 0000000000000000 R09: 0000000000000000 [ 2364.069316][T10032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2364.077357][T10032] R13: 00007f6be7616038 R14: 00007f6be7615fa0 R15: 00007ffe0de2d5c8 [ 2364.085383][T10032] [ 2364.127271][T10032] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2364.248653][T10045] FAULT_INJECTION: forcing a failure. [ 2364.248653][T10045] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2364.309419][T10045] CPU: 1 PID: 10045 Comm: syz.1.11605 Not tainted syzkaller #0 [ 2364.317050][T10045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2364.327242][T10045] Call Trace: [ 2364.330568][T10045] [ 2364.333551][T10045] dump_stack_lvl+0x188/0x24e [ 2364.338312][T10045] ? show_regs_print_info+0x12/0x12 [ 2364.343724][T10045] ? load_image+0x400/0x400 [ 2364.348366][T10045] ? __lock_acquire+0x7d10/0x7d10 [ 2364.353457][T10045] should_fail_ex+0x399/0x4d0 [ 2364.358317][T10045] _copy_from_user+0x2c/0x170 [ 2364.363064][T10045] __sys_bpf+0x2ea/0x780 [ 2364.367369][T10045] ? bpf_link_show_fdinfo+0x380/0x380 [ 2364.372821][T10045] ? lock_chain_count+0x20/0x20 [ 2364.377738][T10045] __x64_sys_bpf+0x78/0x90 [ 2364.382214][T10045] do_syscall_64+0x4c/0xa0 [ 2364.386714][T10045] ? clear_bhb_loop+0x60/0xb0 [ 2364.391441][T10045] ? clear_bhb_loop+0x60/0xb0 [ 2364.396175][T10045] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2364.402147][T10045] RIP: 0033:0x7fa8a719cdd9 [ 2364.406735][T10045] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2364.426478][T10045] RSP: 002b:00007fa8a7fc2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2364.434943][T10045] RAX: ffffffffffffffda RBX: 00007fa8a7415fa0 RCX: 00007fa8a719cdd9 [ 2364.442956][T10045] RDX: 0000000000000028 RSI: 00002000000000c0 RDI: 0000000000000012 [ 2364.450952][T10045] RBP: 00007fa8a7fc2090 R08: 0000000000000000 R09: 0000000000000000 [ 2364.458951][T10045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2364.466949][T10045] R13: 00007fa8a7416038 R14: 00007fa8a7415fa0 R15: 00007ffc3d07e298 [ 2364.474957][T10045] [ 2364.673144][T10049] netlink: 132 bytes leftover after parsing attributes in process `syz.8.11607'. [ 2364.844254][T10057] netlink: 55631 bytes leftover after parsing attributes in process `syz.6.11608'. [ 2364.886164][T10057] netlink: 6324 bytes leftover after parsing attributes in process `syz.6.11608'. [ 2364.909684][T10057] netlink: 2 bytes leftover after parsing attributes in process `syz.6.11608'. [ 2366.100319][T10089] netlink: 'syz.7.11620': attribute type 2 has an invalid length. [ 2366.148423][T10087] netlink: 14 bytes leftover after parsing attributes in process `syz.1.11619'. [ 2366.187427][T10094] FAULT_INJECTION: forcing a failure. [ 2366.187427][T10094] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2366.274618][T10094] CPU: 1 PID: 10094 Comm: syz.1.11619 Not tainted syzkaller #0 [ 2366.282442][T10094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2366.292672][T10094] Call Trace: [ 2366.295997][T10094] [ 2366.298969][T10094] dump_stack_lvl+0x188/0x24e [ 2366.303801][T10094] ? show_regs_print_info+0x12/0x12 [ 2366.309178][T10094] ? load_image+0x400/0x400 [ 2366.313752][T10094] ? __lock_acquire+0x7d10/0x7d10 [ 2366.318873][T10094] should_fail_ex+0x399/0x4d0 [ 2366.323612][T10094] _copy_from_user+0x2c/0x170 [ 2366.328450][T10094] ___sys_sendmsg+0x1c3/0x360 [ 2366.333683][T10094] ? __sys_sendmsg+0x290/0x290 [ 2366.338627][T10094] ? __lock_acquire+0x7d10/0x7d10 [ 2366.343733][T10094] __se_sys_sendmsg+0x1bb/0x2a0 [ 2366.348660][T10094] ? ct_nmi_exit+0x145/0x1c0 [ 2366.353313][T10094] ? __x64_sys_sendmsg+0x80/0x80 [ 2366.358536][T10094] ? lockdep_hardirqs_on+0x94/0x140 [ 2366.363793][T10094] do_syscall_64+0x4c/0xa0 [ 2366.368302][T10094] ? clear_bhb_loop+0x60/0xb0 [ 2366.373042][T10094] ? clear_bhb_loop+0x60/0xb0 [ 2366.377860][T10094] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2366.383900][T10094] RIP: 0033:0x7fa8a719cdd9 [ 2366.388367][T10094] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2366.408023][T10094] RSP: 002b:00007fa8a7fa1028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2366.416499][T10094] RAX: ffffffffffffffda RBX: 00007fa8a7416090 RCX: 00007fa8a719cdd9 [ 2366.424515][T10094] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 2366.432636][T10094] RBP: 00007fa8a7fa1090 R08: 0000000000000000 R09: 0000000000000000 [ 2366.440650][T10094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2366.448668][T10094] R13: 00007fa8a7416128 R14: 00007fa8a7416090 R15: 00007ffc3d07e298 [ 2366.456883][T10094] [ 2366.611889][T10087] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2366.670074][T10087] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2366.724783][T10087] bond0 (unregistering): Released all slaves [ 2366.751838][T10099] netlink: 'syz.7.11622': attribute type 46 has an invalid length. [ 2366.760042][T10100] netlink: 14 bytes leftover after parsing attributes in process `syz.7.11622'. [ 2366.954744][T10100] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2367.051439][T10100] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2367.110857][T10100] bond0 (unregistering): Released all slaves [ 2367.216213][T10115] netlink: 1047 bytes leftover after parsing attributes in process `syz.0.11627'. [ 2367.633465][T10133] FAULT_INJECTION: forcing a failure. [ 2367.633465][T10133] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2367.671073][T10134] netlink: 180900 bytes leftover after parsing attributes in process `syz.1.11633'. [ 2367.709923][T10134] openvswitch: netlink: Flow actions attr not present in new flow. [ 2367.716901][T10133] CPU: 0 PID: 10133 Comm: syz.7.11635 Not tainted syzkaller #0 [ 2367.725522][T10133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2367.735655][T10133] Call Trace: [ 2367.738994][T10133] [ 2367.741985][T10133] dump_stack_lvl+0x188/0x24e [ 2367.746759][T10133] ? show_regs_print_info+0x12/0x12 [ 2367.752054][T10133] ? load_image+0x400/0x400 [ 2367.756750][T10133] ? __lock_acquire+0x7d10/0x7d10 [ 2367.761849][T10133] should_fail_ex+0x399/0x4d0 [ 2367.766586][T10133] _copy_from_user+0x2c/0x170 [ 2367.771324][T10133] __sys_bpf+0x2ea/0x780 [ 2367.775625][T10133] ? bpf_link_show_fdinfo+0x380/0x380 [ 2367.781085][T10133] ? lock_chain_count+0x20/0x20 [ 2367.786012][T10133] __x64_sys_bpf+0x78/0x90 [ 2367.790486][T10133] do_syscall_64+0x4c/0xa0 [ 2367.794959][T10133] ? clear_bhb_loop+0x60/0xb0 [ 2367.799685][T10133] ? clear_bhb_loop+0x60/0xb0 [ 2367.804439][T10133] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2367.810489][T10133] RIP: 0033:0x7ff20499cdd9 [ 2367.814975][T10133] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2367.834720][T10133] RSP: 002b:00007ff205855028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2367.843278][T10133] RAX: ffffffffffffffda RBX: 00007ff204c15fa0 RCX: 00007ff20499cdd9 [ 2367.851291][T10133] RDX: 0000000000000028 RSI: 00002000000000c0 RDI: 0000000000000012 [ 2367.859308][T10133] RBP: 00007ff205855090 R08: 0000000000000000 R09: 0000000000000000 [ 2367.867421][T10133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2367.876691][T10133] R13: 00007ff204c16038 R14: 00007ff204c15fa0 R15: 00007ffd27ec64b8 [ 2367.885780][T10133] [ 2368.451350][T10138] netlink: 180900 bytes leftover after parsing attributes in process `syz.6.11636'. [ 2368.528554][T10138] openvswitch: netlink: Flow actions attr not present in new flow. [ 2369.143222][T10170] FAULT_INJECTION: forcing a failure. [ 2369.143222][T10170] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2369.167225][T10170] CPU: 1 PID: 10170 Comm: syz.0.11649 Not tainted syzkaller #0 [ 2369.174879][T10170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2369.185011][T10170] Call Trace: [ 2369.188352][T10170] [ 2369.191338][T10170] dump_stack_lvl+0x188/0x24e [ 2369.196092][T10170] ? show_regs_print_info+0x12/0x12 [ 2369.201418][T10170] ? load_image+0x400/0x400 [ 2369.205980][T10170] ? __lock_acquire+0x7d10/0x7d10 [ 2369.211108][T10170] should_fail_ex+0x399/0x4d0 [ 2369.215841][T10170] strncpy_from_user+0x32/0x350 [ 2369.220784][T10170] bpf_prog_load+0x1f3/0x1560 [ 2369.225532][T10170] ? map_freeze+0x390/0x390 [ 2369.230109][T10170] ? __might_fault+0xa6/0x120 [ 2369.234918][T10170] ? __might_fault+0xa6/0x120 [ 2369.239682][T10170] ? __might_fault+0xc2/0x120 [ 2369.244425][T10170] ? __might_fault+0xa6/0x120 [ 2369.249155][T10170] ? bpf_lsm_bpf+0x5/0x10 [ 2369.253808][T10170] ? security_bpf+0x7a/0xa0 [ 2369.258377][T10170] __sys_bpf+0x5b8/0x780 [ 2369.262694][T10170] ? bpf_link_show_fdinfo+0x380/0x380 [ 2369.268147][T10170] ? lock_chain_count+0x20/0x20 [ 2369.273054][T10170] __x64_sys_bpf+0x78/0x90 [ 2369.277545][T10170] do_syscall_64+0x4c/0xa0 [ 2369.282022][T10170] ? clear_bhb_loop+0x60/0xb0 [ 2369.286998][T10170] ? clear_bhb_loop+0x60/0xb0 [ 2369.291721][T10170] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2369.297650][T10170] RIP: 0033:0x7fd6ee99cdd9 [ 2369.302095][T10170] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2369.321749][T10170] RSP: 002b:00007fd6ef80a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2369.330211][T10170] RAX: ffffffffffffffda RBX: 00007fd6eec15fa0 RCX: 00007fd6ee99cdd9 [ 2369.338223][T10170] RDX: 0000000000000070 RSI: 0000200000000440 RDI: 0000000000000005 [ 2369.346247][T10170] RBP: 00007fd6ef80a090 R08: 0000000000000000 R09: 0000000000000000 [ 2369.354269][T10170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2369.362294][T10170] R13: 00007fd6eec16038 R14: 00007fd6eec15fa0 R15: 00007ffc457e7d38 [ 2369.370338][T10170] [ 2369.776950][T10176] netlink: 180900 bytes leftover after parsing attributes in process `syz.8.11652'. [ 2369.921044][T10176] openvswitch: netlink: Flow actions attr not present in new flow. [ 2370.622283][T10190] netlink: 1047 bytes leftover after parsing attributes in process `syz.7.11656'. [ 2371.855297][T10212] netlink: 14 bytes leftover after parsing attributes in process `syz.7.11662'. [ 2371.886510][T10212] device hsr_slave_0 left promiscuous mode [ 2371.907914][T10218] FAULT_INJECTION: forcing a failure. [ 2371.907914][T10218] name failslab, interval 1, probability 0, space 0, times 0 [ 2371.959899][T10212] device hsr_slave_1 left promiscuous mode [ 2371.962818][T10218] CPU: 1 PID: 10218 Comm: syz.8.11665 Not tainted syzkaller #0 [ 2371.973384][T10218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2371.983488][T10218] Call Trace: [ 2371.986813][T10218] [ 2371.989851][T10218] dump_stack_lvl+0x188/0x24e [ 2371.994599][T10218] ? show_regs_print_info+0x12/0x12 [ 2371.999867][T10218] ? load_image+0x400/0x400 [ 2372.004433][T10218] ? __might_sleep+0xd0/0xd0 [ 2372.009069][T10218] ? __lock_acquire+0x7d10/0x7d10 [ 2372.014176][T10218] should_fail_ex+0x399/0x4d0 [ 2372.018933][T10218] should_failslab+0x5/0x20 [ 2372.023488][T10218] slab_pre_alloc_hook+0x59/0x310 [ 2372.028565][T10218] ? bpf_prog_test_run_skb+0x234/0x12a0 [ 2372.034242][T10218] __kmem_cache_alloc_node+0x4f/0x260 [ 2372.039675][T10218] ? bpf_prog_test_run_skb+0x234/0x12a0 [ 2372.045273][T10218] __kmalloc+0xa0/0x240 [ 2372.049492][T10218] bpf_prog_test_run_skb+0x234/0x12a0 [ 2372.055001][T10218] ? __fget_files+0x28/0x4b0 [ 2372.059651][T10218] ? __fget_files+0x28/0x4b0 [ 2372.064302][T10218] ? __fget_files+0x43d/0x4b0 [ 2372.069047][T10218] ? cpu_online+0xa0/0xa0 [ 2372.073429][T10218] bpf_prog_test_run+0x31e/0x390 [ 2372.078429][T10218] __sys_bpf+0x62b/0x780 [ 2372.082817][T10218] ? bpf_link_show_fdinfo+0x380/0x380 [ 2372.088259][T10218] ? lock_chain_count+0x20/0x20 [ 2372.093261][T10218] __x64_sys_bpf+0x78/0x90 [ 2372.097732][T10218] do_syscall_64+0x4c/0xa0 [ 2372.102202][T10218] ? clear_bhb_loop+0x60/0xb0 [ 2372.106933][T10218] ? clear_bhb_loop+0x60/0xb0 [ 2372.111662][T10218] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2372.117617][T10218] RIP: 0033:0x7f6be739cdd9 [ 2372.122077][T10218] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2372.141830][T10218] RSP: 002b:00007f6be8265028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2372.150558][T10218] RAX: ffffffffffffffda RBX: 00007f6be7615fa0 RCX: 00007f6be739cdd9 [ 2372.158623][T10218] RDX: 0000000000000049 RSI: 0000200000000240 RDI: 000000000000000a [ 2372.166645][T10218] RBP: 00007f6be8265090 R08: 0000000000000000 R09: 0000000000000000 [ 2372.174668][T10218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2372.182804][T10218] R13: 00007f6be7616038 R14: 00007f6be7615fa0 R15: 00007ffe0de2d5c8 [ 2372.190840][T10218] [ 2372.230166][T10212] bridge0: port 3(hsr0) entered disabled state [ 2372.332781][T10212] bridge0: port 3(hsr0) entered disabled state [ 2372.632541][T10227] netlink: 65047 bytes leftover after parsing attributes in process `syz.0.11668'. [ 2372.674663][T10229] netlink: 61211 bytes leftover after parsing attributes in process `syz.6.11669'. [ 2372.769387][T10233] FAULT_INJECTION: forcing a failure. [ 2372.769387][T10233] name failslab, interval 1, probability 0, space 0, times 0 [ 2372.839224][T10233] CPU: 1 PID: 10233 Comm: syz.8.11671 Not tainted syzkaller #0 [ 2372.846972][T10233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2372.857518][T10233] Call Trace: [ 2372.860849][T10233] [ 2372.863826][T10233] dump_stack_lvl+0x188/0x24e [ 2372.868659][T10233] ? show_regs_print_info+0x12/0x12 [ 2372.874101][T10233] ? load_image+0x400/0x400 [ 2372.878664][T10233] ? __might_sleep+0xd0/0xd0 [ 2372.883310][T10233] ? __lock_acquire+0x7d10/0x7d10 [ 2372.888418][T10233] should_fail_ex+0x399/0x4d0 [ 2372.893344][T10233] should_failslab+0x5/0x20 [ 2372.897901][T10233] slab_pre_alloc_hook+0x59/0x310 [ 2372.903274][T10233] ? bpf_prog_test_run_flow_dissector+0x255/0x640 [ 2372.909772][T10233] __kmem_cache_alloc_node+0x4f/0x260 [ 2372.915206][T10233] ? bpf_prog_test_run_flow_dissector+0x255/0x640 [ 2372.921768][T10233] __kmalloc+0xa0/0x240 [ 2372.925993][T10233] bpf_prog_test_run_flow_dissector+0x255/0x640 [ 2372.932550][T10233] ? xdp_convert_buff_to_md+0x200/0x200 [ 2372.938172][T10233] ? __fget_files+0x28/0x4b0 [ 2372.943006][T10233] ? __fget_files+0x28/0x4b0 [ 2372.947668][T10233] ? __fget_files+0x43d/0x4b0 [ 2372.952436][T10233] ? xdp_convert_buff_to_md+0x200/0x200 [ 2372.958050][T10233] bpf_prog_test_run+0x31e/0x390 [ 2372.963062][T10233] __sys_bpf+0x62b/0x780 [ 2372.967377][T10233] ? bpf_link_show_fdinfo+0x380/0x380 [ 2372.972837][T10233] ? lock_chain_count+0x20/0x20 [ 2372.977774][T10233] __x64_sys_bpf+0x78/0x90 [ 2372.982294][T10233] do_syscall_64+0x4c/0xa0 [ 2372.986788][T10233] ? clear_bhb_loop+0x60/0xb0 [ 2372.991526][T10233] ? clear_bhb_loop+0x60/0xb0 [ 2372.996268][T10233] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2373.002233][T10233] RIP: 0033:0x7f6be739cdd9 [ 2373.006698][T10233] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2373.026367][T10233] RSP: 002b:00007f6be8265028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2373.034836][T10233] RAX: ffffffffffffffda RBX: 00007f6be7615fa0 RCX: 00007f6be739cdd9 [ 2373.043821][T10233] RDX: 0000000000000050 RSI: 0000200000000340 RDI: 000000000000000a [ 2373.051843][T10233] RBP: 00007f6be8265090 R08: 0000000000000000 R09: 0000000000000000 [ 2373.059859][T10233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2373.067863][T10233] R13: 00007f6be7616038 R14: 00007f6be7615fa0 R15: 00007ffe0de2d5c8 [ 2373.075886][T10233] [ 2373.089867][T10236] netlink: 'syz.0.11672': attribute type 10 has an invalid length. [ 2373.098476][T10236] netlink: 55 bytes leftover after parsing attributes in process `syz.0.11672'. [ 2373.733902][T10256] netlink: 15007 bytes leftover after parsing attributes in process `syz.0.11675'. [ 2374.170232][T10268] netlink: 76 bytes leftover after parsing attributes in process `syz.8.11684'. [ 2374.463031][T10277] FAULT_INJECTION: forcing a failure. [ 2374.463031][T10277] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2374.494819][T10277] CPU: 1 PID: 10277 Comm: syz.1.11687 Not tainted syzkaller #0 [ 2374.502449][T10277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2374.503838][T10275] netlink: 14 bytes leftover after parsing attributes in process `syz.6.11686'. [ 2374.512532][T10277] Call Trace: [ 2374.512543][T10277] [ 2374.512553][T10277] dump_stack_lvl+0x188/0x24e [ 2374.512594][T10277] ? show_regs_print_info+0x12/0x12 [ 2374.512628][T10277] ? load_image+0x400/0x400 [ 2374.512659][T10277] ? __lock_acquire+0x7d10/0x7d10 [ 2374.512693][T10277] ? __rwlock_init+0x140/0x140 [ 2374.512719][T10277] should_fail_ex+0x399/0x4d0 [ 2374.512748][T10277] strncpy_from_user+0x32/0x350 [ 2374.562070][T10277] bpf_prog_load+0x1f3/0x1560 [ 2374.566825][T10277] ? map_freeze+0x390/0x390 [ 2374.571399][T10277] ? __might_fault+0xa6/0x120 [ 2374.576132][T10277] ? ktime_get+0x7b/0x270 [ 2374.580528][T10277] ? __might_fault+0xa6/0x120 [ 2374.585231][T10277] ? __might_fault+0xc2/0x120 [ 2374.589935][T10277] ? __might_fault+0xa6/0x120 [ 2374.594642][T10277] ? bpf_lsm_bpf+0x5/0x10 [ 2374.599002][T10277] ? security_bpf+0x7a/0xa0 [ 2374.603532][T10277] __sys_bpf+0x5b8/0x780 [ 2374.607809][T10277] ? bpf_link_show_fdinfo+0x380/0x380 [ 2374.613232][T10277] ? lock_chain_count+0x20/0x20 [ 2374.618117][T10277] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2374.624225][T10277] __x64_sys_bpf+0x78/0x90 [ 2374.628676][T10277] do_syscall_64+0x4c/0xa0 [ 2374.633128][T10277] ? clear_bhb_loop+0x60/0xb0 [ 2374.637847][T10277] ? clear_bhb_loop+0x60/0xb0 [ 2374.642645][T10277] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2374.648656][T10277] RIP: 0033:0x7fa8a719cdd9 [ 2374.653094][T10277] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2374.672749][T10277] RSP: 002b:00007fa8a7fc2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2374.681194][T10277] RAX: ffffffffffffffda RBX: 00007fa8a7415fa0 RCX: 00007fa8a719cdd9 [ 2374.689210][T10277] RDX: 0000000000000080 RSI: 0000200000000200 RDI: 0000000000000005 [ 2374.697292][T10277] RBP: 00007fa8a7fc2090 R08: 0000000000000000 R09: 0000000000000000 [ 2374.705292][T10277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2374.713286][T10277] R13: 00007fa8a7416038 R14: 00007fa8a7415fa0 R15: 00007ffc3d07e298 [ 2374.721302][T10277] [ 2374.748610][T10275] device hsr_slave_0 left promiscuous mode [ 2374.781995][T10275] device hsr_slave_1 left promiscuous mode [ 2377.800597][T10275] bridge0: port 3(hsr0) entered disabled state [ 2377.908431][T10275] bridge0: port 3(hsr0) entered disabled state [ 2377.917957][T10302] FAULT_INJECTION: forcing a failure. [ 2377.917957][T10302] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2377.939837][T10285] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 2377.962665][T10299] netlink: 65027 bytes leftover after parsing attributes in process `syz.1.11692'. [ 2377.980309][T10285] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 2377.993142][T10302] CPU: 1 PID: 10302 Comm: syz.0.11693 Not tainted syzkaller #0 [ 2378.000758][T10302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2378.010862][T10302] Call Trace: [ 2378.012394][T10285] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 2378.014175][T10302] [ 2378.026061][T10302] dump_stack_lvl+0x188/0x24e [ 2378.030805][T10302] ? show_regs_print_info+0x12/0x12 [ 2378.036074][T10302] ? load_image+0x400/0x400 [ 2378.040727][T10302] ? __lock_acquire+0x7d10/0x7d10 [ 2378.045820][T10302] ? snprintf+0xe5/0x140 [ 2378.050145][T10302] should_fail_ex+0x399/0x4d0 [ 2378.054889][T10302] _copy_to_user+0x2c/0x130 [ 2378.059471][T10302] simple_read_from_buffer+0xe3/0x150 [ 2378.064901][T10302] proc_fail_nth_read+0x1a6/0x220 [ 2378.070016][T10302] ? proc_fault_inject_write+0x310/0x310 [ 2378.075723][T10302] ? fsnotify_perm+0x248/0x550 [ 2378.080548][T10302] ? proc_fault_inject_write+0x310/0x310 [ 2378.086243][T10302] vfs_read+0x2de/0xa00 [ 2378.090470][T10302] ? kernel_read+0x1e0/0x1e0 [ 2378.095123][T10302] ? __fget_files+0x28/0x4b0 [ 2378.099773][T10302] ? __fget_files+0x28/0x4b0 [ 2378.104423][T10302] ? __fget_files+0x43d/0x4b0 [ 2378.109169][T10302] ? __fdget_pos+0x2ae/0x360 [ 2378.113814][T10302] ? ksys_read+0x71/0x250 [ 2378.118201][T10302] ksys_read+0x14c/0x250 [ 2378.122503][T10302] ? vfs_write+0xa30/0xa30 [ 2378.126982][T10302] ? lockdep_hardirqs_on+0x94/0x140 [ 2378.132254][T10302] do_syscall_64+0x4c/0xa0 [ 2378.136726][T10302] ? clear_bhb_loop+0x60/0xb0 [ 2378.141456][T10302] ? clear_bhb_loop+0x60/0xb0 [ 2378.146197][T10302] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2378.152159][T10302] RIP: 0033:0x7fd6ee95d60e [ 2378.156650][T10302] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2378.176399][T10302] RSP: 002b:00007fd6ef809fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2378.184877][T10302] RAX: ffffffffffffffda RBX: 00007fd6ef80a6c0 RCX: 00007fd6ee95d60e [ 2378.192905][T10302] RDX: 000000000000000f RSI: 00007fd6ef80a0a0 RDI: 0000000000000004 [ 2378.200929][T10302] RBP: 00007fd6ef80a090 R08: 0000000000000000 R09: 0000000000000000 [ 2378.208951][T10302] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2378.217227][T10302] R13: 00007fd6eec16038 R14: 00007fd6eec15fa0 R15: 00007ffc457e7d38 [ 2378.225276][T10302] [ 2378.516189][T10314] FAULT_INJECTION: forcing a failure. [ 2378.516189][T10314] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2378.536899][T10314] CPU: 1 PID: 10314 Comm: syz.6.11698 Not tainted syzkaller #0 [ 2378.544543][T10314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2378.554738][T10314] Call Trace: [ 2378.558064][T10314] [ 2378.561095][T10314] dump_stack_lvl+0x188/0x24e [ 2378.565851][T10314] ? show_regs_print_info+0x12/0x12 [ 2378.571129][T10314] ? load_image+0x400/0x400 [ 2378.575700][T10314] ? __lock_acquire+0x7d10/0x7d10 [ 2378.580790][T10314] should_fail_ex+0x399/0x4d0 [ 2378.585527][T10314] strncpy_from_user+0x32/0x350 [ 2378.590447][T10314] bpf_prog_load+0x1f3/0x1560 [ 2378.595228][T10314] ? map_freeze+0x390/0x390 [ 2378.599817][T10314] ? __might_fault+0xa6/0x120 [ 2378.604544][T10314] ? __might_fault+0xa6/0x120 [ 2378.609244][T10314] ? __might_fault+0xc2/0x120 [ 2378.613943][T10314] ? __might_fault+0xa6/0x120 [ 2378.618685][T10314] ? bpf_lsm_bpf+0x5/0x10 [ 2378.623126][T10314] ? security_bpf+0x7a/0xa0 [ 2378.627658][T10314] __sys_bpf+0x5b8/0x780 [ 2378.631947][T10314] ? bpf_link_show_fdinfo+0x380/0x380 [ 2378.637358][T10314] ? lock_chain_count+0x20/0x20 [ 2378.642250][T10314] __x64_sys_bpf+0x78/0x90 [ 2378.646709][T10314] do_syscall_64+0x4c/0xa0 [ 2378.651243][T10314] ? clear_bhb_loop+0x60/0xb0 [ 2378.655950][T10314] ? clear_bhb_loop+0x60/0xb0 [ 2378.660668][T10314] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2378.666680][T10314] RIP: 0033:0x7f1b9ad9cdd9 [ 2378.671119][T10314] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2378.690935][T10314] RSP: 002b:00007f1b9bc12028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2378.699376][T10314] RAX: ffffffffffffffda RBX: 00007f1b9b015fa0 RCX: 00007f1b9ad9cdd9 [ 2378.707375][T10314] RDX: 0000000000000094 RSI: 0000200000000b00 RDI: 0000000000000005 [ 2378.715373][T10314] RBP: 00007f1b9bc12090 R08: 0000000000000000 R09: 0000000000000000 [ 2378.723391][T10314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2378.731404][T10314] R13: 00007f1b9b016038 R14: 00007f1b9b015fa0 R15: 00007ffda8cbce08 [ 2378.739421][T10314] [ 2379.388607][T10334] netlink: 14 bytes leftover after parsing attributes in process `syz.0.11706'. [ 2382.223506][T10334] device hsr_slave_0 left promiscuous mode [ 2382.258605][T10334] device hsr_slave_1 left promiscuous mode [ 2382.290676][T10334] bridge0: port 3(hsr0) entered disabled state [ 2382.326792][T10334] bridge0: port 3(hsr0) entered disabled state [ 2382.341738][T10338] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 2382.359961][T10338] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 2382.374986][T10338] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 2382.598457][T10353] FAULT_INJECTION: forcing a failure. [ 2382.598457][T10353] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2382.623240][T10353] CPU: 0 PID: 10353 Comm: syz.1.11714 Not tainted syzkaller #0 [ 2382.630870][T10353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2382.640971][T10353] Call Trace: [ 2382.644301][T10353] [ 2382.647284][T10353] dump_stack_lvl+0x188/0x24e [ 2382.652031][T10353] ? show_regs_print_info+0x12/0x12 [ 2382.657389][T10353] ? load_image+0x400/0x400 [ 2382.661950][T10353] ? __lock_acquire+0x7d10/0x7d10 [ 2382.667033][T10353] ? __fget_files+0x28/0x4b0 [ 2382.671685][T10353] should_fail_ex+0x399/0x4d0 [ 2382.676403][T10353] _copy_from_user+0x2c/0x170 [ 2382.681118][T10353] bpf_obj_get_info_by_fd+0x45b/0x2f50 [ 2382.686640][T10353] ? verify_lock_unused+0x140/0x140 [ 2382.691875][T10353] ? bpf_map_get_fd_by_id+0x310/0x310 [ 2382.697290][T10353] ? lockdep_hardirqs_on+0x94/0x140 [ 2382.702527][T10353] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2382.708724][T10353] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2382.714753][T10353] ? security_bpf+0x40/0xa0 [ 2382.719279][T10353] ? security_bpf+0x7a/0xa0 [ 2382.723812][T10353] __sys_bpf+0x505/0x780 [ 2382.728090][T10353] ? bpf_link_show_fdinfo+0x380/0x380 [ 2382.733506][T10353] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2382.739706][T10353] __x64_sys_bpf+0x78/0x90 [ 2382.744157][T10353] do_syscall_64+0x4c/0xa0 [ 2382.748612][T10353] ? clear_bhb_loop+0x60/0xb0 [ 2382.753341][T10353] ? clear_bhb_loop+0x60/0xb0 [ 2382.758051][T10353] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2382.763978][T10353] RIP: 0033:0x7fa8a719cdd9 [ 2382.768425][T10353] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2382.788070][T10353] RSP: 002b:00007fa8a7fc2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2382.796508][T10353] RAX: ffffffffffffffda RBX: 00007fa8a7415fa0 RCX: 00007fa8a719cdd9 [ 2382.804516][T10353] RDX: 0000000000000010 RSI: 0000200000000300 RDI: 000000000000000f [ 2382.812507][T10353] RBP: 00007fa8a7fc2090 R08: 0000000000000000 R09: 0000000000000000 [ 2382.820515][T10353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2382.828516][T10353] R13: 00007fa8a7416038 R14: 00007fa8a7415fa0 R15: 00007ffc3d07e298 [ 2382.836545][T10353] [ 2382.873496][T10357] netlink: 'syz.0.11716': attribute type 21 has an invalid length. [ 2382.894984][T10357] netlink: 'syz.0.11716': attribute type 11 has an invalid length. [ 2383.916989][T10380] netlink: 55631 bytes leftover after parsing attributes in process `syz.1.11724'. [ 2383.950624][T10380] netlink: 6320 bytes leftover after parsing attributes in process `syz.1.11724'. [ 2383.973377][T10380] tc_dump_action: action bad kind [ 2384.999684][T10389] netlink: 14 bytes leftover after parsing attributes in process `syz.8.11727'. [ 2385.045324][T10389] device hsr_slave_0 left promiscuous mode [ 2385.067109][T10389] device hsr_slave_1 left promiscuous mode [ 2385.153075][T10389] bridge0: port 3(hsr0) entered disabled state [ 2385.316084][T10389] bridge0: port 3(hsr0) entered disabled state [ 2385.817457][ T4286] Bluetooth: hci0: ISO packet for unknown connection handle 2622 [ 2386.036411][T10419] netlink: 55631 bytes leftover after parsing attributes in process `syz.8.11740'. [ 2386.046318][T10419] netlink: 6320 bytes leftover after parsing attributes in process `syz.8.11740'. [ 2386.104318][T10419] tc_dump_action: action bad kind [ 2386.800710][T10434] netlink: 14 bytes leftover after parsing attributes in process `syz.6.11747'. [ 2387.510660][T10451] FAULT_INJECTION: forcing a failure. [ 2387.510660][T10451] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2387.572667][T10451] CPU: 1 PID: 10451 Comm: syz.0.11753 Not tainted syzkaller #0 [ 2387.580393][T10451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2387.590492][T10451] Call Trace: [ 2387.593812][T10451] [ 2387.596851][T10451] dump_stack_lvl+0x188/0x24e [ 2387.601687][T10451] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2387.607988][T10451] ? show_regs_print_info+0x12/0x12 [ 2387.613241][T10451] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2387.619467][T10451] ? dump_stack+0x5/0x12 [ 2387.623777][T10451] should_fail_ex+0x399/0x4d0 [ 2387.628619][T10451] strncpy_from_user+0x32/0x350 [ 2387.633535][T10451] getname_flags+0xf2/0x500 [ 2387.638093][T10451] do_sys_openat2+0xdd/0x4b0 [ 2387.642749][T10451] ? do_sys_open+0xe0/0xe0 [ 2387.647218][T10451] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2387.653531][T10451] __x64_sys_openat+0x135/0x160 [ 2387.658432][T10451] do_syscall_64+0x4c/0xa0 [ 2387.662900][T10451] ? clear_bhb_loop+0x60/0xb0 [ 2387.667621][T10451] ? clear_bhb_loop+0x60/0xb0 [ 2387.672350][T10451] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2387.678310][T10451] RIP: 0033:0x7fd6ee99cdd9 [ 2387.682764][T10451] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2387.702413][T10451] RSP: 002b:00007fd6ef80a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2387.710872][T10451] RAX: ffffffffffffffda RBX: 00007fd6eec15fa0 RCX: 00007fd6ee99cdd9 [ 2387.718966][T10451] RDX: 0000000000000002 RSI: 0000200000000040 RDI: 0000000000000004 [ 2387.726975][T10451] RBP: 00007fd6ef80a090 R08: 0000000000000000 R09: 0000000000000000 [ 2387.735027][T10451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2387.743031][T10451] R13: 00007fd6eec16038 R14: 00007fd6eec15fa0 R15: 00007ffc457e7d38 [ 2387.751074][T10451] [ 2388.267428][T10466] netlink: 'syz.6.11759': attribute type 13 has an invalid length. [ 2388.339893][T10466] netlink: 152 bytes leftover after parsing attributes in process `syz.6.11759'. [ 2388.446386][T10466] syz_tun: refused to change device tx_queue_len [ 2388.489828][T10466] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 2388.534243][T10467] netlink: 'syz.6.11759': attribute type 13 has an invalid length. [ 2388.552589][T10467] netlink: 152 bytes leftover after parsing attributes in process `syz.6.11759'. [ 2388.584943][T10467] syz_tun: refused to change device tx_queue_len [ 2388.604916][T10467] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 2388.623127][T10469] netlink: 'syz.6.11759': attribute type 10 has an invalid length. [ 2388.707659][T10469] team0: Port device netdevsim0 added [ 2388.722322][T10475] netlink: 55631 bytes leftover after parsing attributes in process `syz.0.11761'. [ 2388.739210][T10475] netlink: 6320 bytes leftover after parsing attributes in process `syz.0.11761'. [ 2388.770118][T10475] tc_dump_action: action bad kind [ 2389.194069][T10488] FAULT_INJECTION: forcing a failure. [ 2389.194069][T10488] name failslab, interval 1, probability 0, space 0, times 0 [ 2389.289292][T10488] CPU: 1 PID: 10488 Comm: syz.6.11765 Not tainted syzkaller #0 [ 2389.297026][T10488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2389.307133][T10488] Call Trace: [ 2389.310462][T10488] [ 2389.313437][T10488] dump_stack_lvl+0x188/0x24e [ 2389.318187][T10488] ? show_regs_print_info+0x12/0x12 [ 2389.323441][T10488] ? load_image+0x400/0x400 [ 2389.328012][T10488] ? __might_sleep+0xd0/0xd0 [ 2389.332663][T10488] ? __lock_acquire+0x7d10/0x7d10 [ 2389.337759][T10488] should_fail_ex+0x399/0x4d0 [ 2389.342501][T10488] should_failslab+0x5/0x20 [ 2389.347138][T10488] slab_pre_alloc_hook+0x59/0x310 [ 2389.352224][T10488] kmem_cache_alloc_node+0x5a/0x320 [ 2389.357474][T10488] ? __alloc_skb+0xfc/0x7e0 [ 2389.362047][T10488] __alloc_skb+0xfc/0x7e0 [ 2389.366619][T10488] alloc_skb_with_frags+0xa7/0x710 [ 2389.371774][T10488] ? mark_lock+0x94/0x320 [ 2389.376174][T10488] ? trace_event_raw_event_lock+0x250/0x250 [ 2389.382113][T10488] ? __lock_acquire+0x13cf/0x7d10 [ 2389.387198][T10488] sock_alloc_send_pskb+0x87f/0x9a0 [ 2389.392595][T10488] ? sock_kzfree_s+0x50/0x50 [ 2389.397273][T10488] ? do_raw_spin_lock+0x128/0x2f0 [ 2389.402371][T10488] ? __rwlock_init+0x140/0x140 [ 2389.407282][T10488] ? do_raw_spin_unlock+0x11d/0x230 [ 2389.412534][T10488] unix_dgram_sendmsg+0x539/0x16e0 [ 2389.417800][T10488] ? is_dynamic_key+0x260/0x260 [ 2389.422716][T10488] ? aa_sk_perm+0x81f/0x950 [ 2389.427447][T10488] ? unix_dgram_poll+0x680/0x680 [ 2389.432442][T10488] ? tomoyo_socket_sendmsg_permission+0x1dd/0x2f0 [ 2389.439030][T10488] ? aa_sock_msg_perm+0x94/0x150 [ 2389.444023][T10488] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 2389.449360][T10488] ? security_socket_sendmsg+0x7c/0xa0 [ 2389.454885][T10488] ? unix_dgram_poll+0x680/0x680 [ 2389.459873][T10488] ____sys_sendmsg+0x5be/0x970 [ 2389.464706][T10488] ? __sys_sendmsg_sock+0x30/0x30 [ 2389.469790][T10488] ? __import_iovec+0x315/0x500 [ 2389.474700][T10488] ? import_iovec+0x6f/0xa0 [ 2389.479262][T10488] ___sys_sendmsg+0x2a2/0x360 [ 2389.484005][T10488] ? __sys_sendmsg+0x290/0x290 [ 2389.488852][T10488] ? __lock_acquire+0x7d10/0x7d10 [ 2389.493980][T10488] __se_sys_sendmsg+0x1bb/0x2a0 [ 2389.498891][T10488] ? __x64_sys_sendmsg+0x80/0x80 [ 2389.503990][T10488] ? lockdep_hardirqs_on+0x94/0x140 [ 2389.509248][T10488] do_syscall_64+0x4c/0xa0 [ 2389.513725][T10488] ? clear_bhb_loop+0x60/0xb0 [ 2389.518460][T10488] ? clear_bhb_loop+0x60/0xb0 [ 2389.523206][T10488] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2389.529154][T10488] RIP: 0033:0x7f1b9ad9cdd9 [ 2389.533621][T10488] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2389.553376][T10488] RSP: 002b:00007f1b9bc12028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2389.561934][T10488] RAX: ffffffffffffffda RBX: 00007f1b9b015fa0 RCX: 00007f1b9ad9cdd9 [ 2389.570133][T10488] RDX: 0000000020000000 RSI: 0000200000000100 RDI: 0000000000000007 [ 2389.578162][T10488] RBP: 00007f1b9bc12090 R08: 0000000000000000 R09: 0000000000000000 [ 2389.586201][T10488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2389.594218][T10488] R13: 00007f1b9b016038 R14: 00007f1b9b015fa0 R15: 00007ffda8cbce08 [ 2389.602259][T10488] [ 2389.639315][ T4286] Bluetooth: hci5: ISO packet for unknown connection handle 2622 [ 2390.034250][T10499] FAULT_INJECTION: forcing a failure. [ 2390.034250][T10499] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2390.068326][T10499] CPU: 1 PID: 10499 Comm: syz.0.11769 Not tainted syzkaller #0 [ 2390.075965][T10499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2390.086080][T10499] Call Trace: [ 2390.089401][T10499] [ 2390.092376][T10499] dump_stack_lvl+0x188/0x24e [ 2390.097118][T10499] ? show_regs_print_info+0x12/0x12 [ 2390.102470][T10499] ? load_image+0x400/0x400 [ 2390.107033][T10499] ? __lock_acquire+0x7d10/0x7d10 [ 2390.112127][T10499] ? __virt_addr_valid+0x188/0x540 [ 2390.117444][T10499] should_fail_ex+0x399/0x4d0 [ 2390.122175][T10499] _copy_from_user+0x2c/0x170 [ 2390.126928][T10499] sctp_setsockopt+0x19a/0xf90 [ 2390.131851][T10499] ? sock_common_recvmsg+0x190/0x190 [ 2390.137204][T10499] __sys_setsockopt+0x2bf/0x3d0 [ 2390.142118][T10499] __x64_sys_setsockopt+0xb1/0xc0 [ 2390.147217][T10499] do_syscall_64+0x4c/0xa0 [ 2390.151702][T10499] ? clear_bhb_loop+0x60/0xb0 [ 2390.156436][T10499] ? clear_bhb_loop+0x60/0xb0 [ 2390.161204][T10499] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2390.167151][T10499] RIP: 0033:0x7fd6ee99cdd9 [ 2390.171611][T10499] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2390.191315][T10499] RSP: 002b:00007fd6ef80a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2390.199766][T10499] RAX: ffffffffffffffda RBX: 00007fd6eec15fa0 RCX: 00007fd6ee99cdd9 [ 2390.207771][T10499] RDX: 0000000000000064 RSI: 0000000000000084 RDI: 0000000000000003 [ 2390.215767][T10499] RBP: 00007fd6ef80a090 R08: 0000000000000010 R09: 0000000000000000 [ 2390.223770][T10499] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2390.231771][T10499] R13: 00007fd6eec16038 R14: 00007fd6eec15fa0 R15: 00007ffc457e7d38 [ 2390.239783][T10499] [ 2390.864993][T10509] __nla_validate_parse: 1 callbacks suppressed [ 2390.865109][T10509] netlink: 14 bytes leftover after parsing attributes in process `syz.7.11774'. [ 2391.033521][T10518] netlink: 'syz.8.11776': attribute type 3 has an invalid length. [ 2391.120210][T10518] netlink: 118424 bytes leftover after parsing attributes in process `syz.8.11776'. [ 2391.239310][T10517] netlink: 'syz.8.11776': attribute type 3 has an invalid length. [ 2391.288473][T10517] netlink: 118424 bytes leftover after parsing attributes in process `syz.8.11776'. [ 2391.703961][ T4286] Bluetooth: hci3: ISO packet for unknown connection handle 2622 [ 2392.158493][T10542] FAULT_INJECTION: forcing a failure. [ 2392.158493][T10542] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2392.268384][T10542] CPU: 0 PID: 10542 Comm: syz.6.11786 Not tainted syzkaller #0 [ 2392.276043][T10542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2392.286240][T10542] Call Trace: [ 2392.289562][T10542] [ 2392.292535][T10542] dump_stack_lvl+0x188/0x24e [ 2392.297278][T10542] ? show_regs_print_info+0x12/0x12 [ 2392.302534][T10542] ? load_image+0x400/0x400 [ 2392.307105][T10542] ? __lock_acquire+0x7d10/0x7d10 [ 2392.312197][T10542] should_fail_ex+0x399/0x4d0 [ 2392.316932][T10542] _copy_from_user+0x2c/0x170 [ 2392.321673][T10542] __sys_bpf+0x2ea/0x780 [ 2392.326063][T10542] ? bpf_link_show_fdinfo+0x380/0x380 [ 2392.331519][T10542] ? lock_chain_count+0x20/0x20 [ 2392.336526][T10542] __x64_sys_bpf+0x78/0x90 [ 2392.341006][T10542] do_syscall_64+0x4c/0xa0 [ 2392.345490][T10542] ? clear_bhb_loop+0x60/0xb0 [ 2392.350397][T10542] ? clear_bhb_loop+0x60/0xb0 [ 2392.355172][T10542] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2392.361120][T10542] RIP: 0033:0x7f1b9ad9cdd9 [ 2392.365579][T10542] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2392.385241][T10542] RSP: 002b:00007f1b9bc12028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2392.393723][T10542] RAX: ffffffffffffffda RBX: 00007f1b9b015fa0 RCX: 00007f1b9ad9cdd9 [ 2392.401746][T10542] RDX: 0000000000000028 RSI: 00002000000000c0 RDI: 0000000000000012 [ 2392.409767][T10542] RBP: 00007f1b9bc12090 R08: 0000000000000000 R09: 0000000000000000 [ 2392.417867][T10542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2392.425892][T10542] R13: 00007f1b9b016038 R14: 00007f1b9b015fa0 R15: 00007ffda8cbce08 [ 2392.433929][T10542] [ 2392.677110][T10548] netlink: 14 bytes leftover after parsing attributes in process `syz.7.11789'. [ 2392.947275][T10557] FAULT_INJECTION: forcing a failure. [ 2392.947275][T10557] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2392.984397][T10560] netlink: 'syz.6.11791': attribute type 29 has an invalid length. [ 2393.010004][T10557] CPU: 0 PID: 10557 Comm: syz.7.11794 Not tainted syzkaller #0 [ 2393.017647][T10557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2393.028009][T10557] Call Trace: [ 2393.031336][T10557] [ 2393.034319][T10557] dump_stack_lvl+0x188/0x24e [ 2393.039065][T10557] ? show_regs_print_info+0x12/0x12 [ 2393.044332][T10557] ? load_image+0x400/0x400 [ 2393.048894][T10557] ? __lock_acquire+0x7d10/0x7d10 [ 2393.053996][T10557] should_fail_ex+0x399/0x4d0 [ 2393.058965][T10557] _copy_to_user+0x2c/0x130 [ 2393.063533][T10557] simple_read_from_buffer+0xe3/0x150 [ 2393.068957][T10557] proc_fail_nth_read+0x1a6/0x220 [ 2393.074030][T10557] ? proc_fault_inject_write+0x310/0x310 [ 2393.079893][T10557] ? fsnotify_perm+0x248/0x550 [ 2393.084723][T10557] ? proc_fault_inject_write+0x310/0x310 [ 2393.090399][T10557] vfs_read+0x2de/0xa00 [ 2393.094618][T10557] ? kernel_read+0x1e0/0x1e0 [ 2393.099261][T10557] ? __fget_files+0x28/0x4b0 [ 2393.099394][T10560] netlink: 'syz.6.11791': attribute type 29 has an invalid length. [ 2393.103889][T10557] ? __fget_files+0x28/0x4b0 [ 2393.103924][T10557] ? __fget_files+0x43d/0x4b0 [ 2393.103963][T10557] ? __fdget_pos+0x2ae/0x360 [ 2393.103992][T10557] ? ksys_read+0x71/0x250 [ 2393.104027][T10557] ksys_read+0x14c/0x250 [ 2393.104062][T10557] ? vfs_write+0xa30/0xa30 [ 2393.104099][T10557] ? syscall_enter_from_user_mode+0x2a/0x80 [ 2393.104131][T10557] do_syscall_64+0x4c/0xa0 [ 2393.104162][T10557] ? clear_bhb_loop+0x60/0xb0 [ 2393.104192][T10557] ? clear_bhb_loop+0x60/0xb0 [ 2393.104223][T10557] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2393.104252][T10557] RIP: 0033:0x7ff20495d60e [ 2393.104273][T10557] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2393.104293][T10557] RSP: 002b:00007ff205854fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2393.104318][T10557] RAX: ffffffffffffffda RBX: 00007ff2058556c0 RCX: 00007ff20495d60e [ 2393.104336][T10557] RDX: 000000000000000f RSI: 00007ff2058550a0 RDI: 0000000000000008 [ 2393.104351][T10557] RBP: 00007ff205855090 R08: 0000000000000000 R09: 0000000000000000 [ 2393.104367][T10557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2393.104381][T10557] R13: 00007ff204c16038 R14: 00007ff204c15fa0 R15: 00007ffd27ec64b8 [ 2393.104414][T10557] [ 2394.604821][T10608] netlink: 14 bytes leftover after parsing attributes in process `syz.7.11804'. [ 2396.056895][T10631] netlink: 'syz.0.11813': attribute type 13 has an invalid length. [ 2396.100362][T10631] netlink: 152 bytes leftover after parsing attributes in process `syz.0.11813'. [ 2396.129490][T10631] syz_tun: refused to change device tx_queue_len [ 2396.137170][T10631] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 2396.208238][T10633] netlink: 'syz.0.11813': attribute type 13 has an invalid length. [ 2396.237572][T10633] netlink: 152 bytes leftover after parsing attributes in process `syz.0.11813'. [ 2396.257812][T10633] syz_tun: refused to change device tx_queue_len [ 2396.265826][T10633] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 2396.277376][T10641] netlink: 'syz.8.11815': attribute type 29 has an invalid length. [ 2396.333969][T10630] netlink: 'syz.0.11813': attribute type 10 has an invalid length. [ 2396.664776][T10630] team0: Port device netdevsim0 added [ 2396.676936][T10641] netlink: 'syz.8.11815': attribute type 29 has an invalid length. [ 2396.803846][T10648] netlink: 14 bytes leftover after parsing attributes in process `syz.7.11818'. [ 2397.594497][T10669] netlink: 9286 bytes leftover after parsing attributes in process `syz.6.11825'. [ 2399.034356][T10688] netlink: 14 bytes leftover after parsing attributes in process `syz.8.11831'. [ 2399.316046][T10694] netlink: 'syz.1.11833': attribute type 13 has an invalid length. [ 2399.392085][T10694] netlink: 152 bytes leftover after parsing attributes in process `syz.1.11833'. [ 2399.435845][T10694] syz_tun: refused to change device tx_queue_len [ 2399.456279][T10694] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 2399.492777][T10699] netlink: 'syz.1.11833': attribute type 13 has an invalid length. [ 2399.559418][T10699] netlink: 152 bytes leftover after parsing attributes in process `syz.1.11833'. [ 2399.570132][T10699] syz_tun: refused to change device tx_queue_len [ 2399.576623][T10699] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 2399.597361][T10701] netlink: 'syz.1.11833': attribute type 10 has an invalid length. [ 2399.667928][T10701] team0: Port device netdevsim0 added [ 2400.279732][T10712] netlink: 'syz.7.11838': attribute type 29 has an invalid length. [ 2400.318861][T10712] netlink: 'syz.7.11838': attribute type 29 has an invalid length. [ 2400.606154][T10723] netlink: 128 bytes leftover after parsing attributes in process `syz.6.11841'. [ 2400.653599][T10723] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 2401.513622][T10740] netlink: 14 bytes leftover after parsing attributes in process `syz.1.11847'. [ 2406.659584][T10795] FAULT_INJECTION: forcing a failure. [ 2406.659584][T10795] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2406.744894][T10795] CPU: 1 PID: 10795 Comm: syz.8.11861 Not tainted syzkaller #0 [ 2406.752538][T10795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2406.762644][T10795] Call Trace: [ 2406.765959][T10795] [ 2406.768934][T10795] dump_stack_lvl+0x188/0x24e [ 2406.773675][T10795] ? show_regs_print_info+0x12/0x12 [ 2406.778935][T10795] ? load_image+0x400/0x400 [ 2406.783498][T10795] ? __lock_acquire+0x7d10/0x7d10 [ 2406.788578][T10795] ? lockdep_hardirqs_on+0x94/0x140 [ 2406.793841][T10795] should_fail_ex+0x399/0x4d0 [ 2406.798835][T10795] strncpy_from_user+0x32/0x350 [ 2406.803748][T10795] getname_flags+0xf2/0x500 [ 2406.808307][T10795] do_sys_openat2+0xdd/0x4b0 [ 2406.813080][T10795] ? do_sys_open+0xe0/0xe0 [ 2406.817584][T10795] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 2406.823848][T10795] __x64_sys_openat+0x135/0x160 [ 2406.828852][T10795] do_syscall_64+0x4c/0xa0 [ 2406.833329][T10795] ? clear_bhb_loop+0x60/0xb0 [ 2406.838146][T10795] ? clear_bhb_loop+0x60/0xb0 [ 2406.842878][T10795] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2406.848835][T10795] RIP: 0033:0x7f6be739cdd9 [ 2406.853289][T10795] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2406.873020][T10795] RSP: 002b:00007f6be8265028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2406.881468][T10795] RAX: ffffffffffffffda RBX: 00007f6be7615fa0 RCX: 00007f6be739cdd9 [ 2406.889476][T10795] RDX: 0000000000200002 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 2406.897470][T10795] RBP: 00007f6be8265090 R08: 0000000000000000 R09: 0000000000000000 [ 2406.905481][T10795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2406.913498][T10795] R13: 00007f6be7616038 R14: 00007f6be7615fa0 R15: 00007ffe0de2d5c8 [ 2406.921518][T10795] [ 2407.553031][T10812] netlink: 'syz.7.11865': attribute type 13 has an invalid length. [ 2407.589230][T10812] netlink: 152 bytes leftover after parsing attributes in process `syz.7.11865'. [ 2407.622569][T10812] syz_tun: refused to change device tx_queue_len [ 2407.639059][T10816] FAULT_INJECTION: forcing a failure. [ 2407.639059][T10816] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2407.680259][T10812] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 2407.738038][T10811] netlink: 14 bytes leftover after parsing attributes in process `syz.8.11866'. [ 2407.768279][T10816] CPU: 1 PID: 10816 Comm: syz.1.11867 Not tainted syzkaller #0 [ 2407.775943][T10816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2407.786088][T10816] Call Trace: [ 2407.789410][T10816] [ 2407.792555][T10816] dump_stack_lvl+0x188/0x24e [ 2407.797302][T10816] ? show_regs_print_info+0x12/0x12 [ 2407.802570][T10816] ? load_image+0x400/0x400 [ 2407.807149][T10816] ? __lock_acquire+0x7d10/0x7d10 [ 2407.812243][T10816] should_fail_ex+0x399/0x4d0 [ 2407.816972][T10816] _copy_from_user+0x2c/0x170 [ 2407.821708][T10816] iovec_from_user+0x143/0x360 [ 2407.826523][T10816] __import_iovec+0x6d/0x500 [ 2407.831346][T10816] import_iovec+0x6f/0xa0 [ 2407.835730][T10816] ___sys_sendmsg+0x252/0x360 [ 2407.840495][T10816] ? __sys_sendmsg+0x290/0x290 [ 2407.845331][T10816] ? __lock_acquire+0x7d10/0x7d10 [ 2407.850440][T10816] __se_sys_sendmsg+0x1bb/0x2a0 [ 2407.855349][T10816] ? ct_nmi_exit+0x145/0x1c0 [ 2407.859985][T10816] ? __x64_sys_sendmsg+0x80/0x80 [ 2407.865002][T10816] ? lockdep_hardirqs_on+0x94/0x140 [ 2407.870344][T10816] do_syscall_64+0x4c/0xa0 [ 2407.874819][T10816] ? clear_bhb_loop+0x60/0xb0 [ 2407.879545][T10816] ? clear_bhb_loop+0x60/0xb0 [ 2407.884270][T10816] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2407.890212][T10816] RIP: 0033:0x7fa8a719cdd9 [ 2407.894745][T10816] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2407.914378][T10816] RSP: 002b:00007fa8a7fc2028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2407.922826][T10816] RAX: ffffffffffffffda RBX: 00007fa8a7415fa0 RCX: 00007fa8a719cdd9 [ 2407.931039][T10816] RDX: 0000000000000000 RSI: 0000200000000940 RDI: 0000000000000003 [ 2407.939048][T10816] RBP: 00007fa8a7fc2090 R08: 0000000000000000 R09: 0000000000000000 [ 2407.947042][T10816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2407.955034][T10816] R13: 00007fa8a7416038 R14: 00007fa8a7415fa0 R15: 00007ffc3d07e298 [ 2407.963051][T10816] [ 2408.167633][T10818] netlink: 128 bytes leftover after parsing attributes in process `syz.1.11868'. [ 2408.185389][T10818] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 2410.574333][T10827] netlink: 'syz.8.11882': attribute type 13 has an invalid length. [ 2410.582731][T10827] netlink: 152 bytes leftover after parsing attributes in process `syz.8.11882'. [ 2410.633150][T10827] syz_tun: refused to change device tx_queue_len [ 2410.666778][T10827] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 2410.734785][T10833] FAULT_INJECTION: forcing a failure. [ 2410.734785][T10833] name failslab, interval 1, probability 0, space 0, times 0 [ 2410.755423][T10833] CPU: 1 PID: 10833 Comm: syz.1.11874 Not tainted syzkaller #0 [ 2410.763065][T10833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2410.773170][T10833] Call Trace: [ 2410.776499][T10833] [ 2410.779469][T10833] dump_stack_lvl+0x188/0x24e [ 2410.784208][T10833] ? show_regs_print_info+0x12/0x12 [ 2410.789476][T10833] ? load_image+0x400/0x400 [ 2410.794040][T10833] ? __might_sleep+0xd0/0xd0 [ 2410.798673][T10833] ? __lock_acquire+0x7d10/0x7d10 [ 2410.803755][T10833] should_fail_ex+0x399/0x4d0 [ 2410.808481][T10833] should_failslab+0x5/0x20 [ 2410.813027][T10833] slab_pre_alloc_hook+0x59/0x310 [ 2410.818103][T10833] ? tomoyo_encode+0x27e/0x540 [ 2410.822939][T10833] __kmem_cache_alloc_node+0x4f/0x260 [ 2410.828364][T10833] ? tomoyo_encode+0x27e/0x540 [ 2410.833180][T10833] __kmalloc+0xa0/0x240 [ 2410.837409][T10833] tomoyo_encode+0x27e/0x540 [ 2410.842066][T10833] tomoyo_realpath_from_path+0x58e/0x5d0 [ 2410.847771][T10833] ? tomoyo_path_number_perm+0x205/0x650 [ 2410.853720][T10833] tomoyo_path_number_perm+0x22f/0x650 [ 2410.859247][T10833] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 2410.864763][T10833] ? ksys_write+0x1c0/0x250 [ 2410.869322][T10833] ? common_file_perm+0x171/0x1c0 [ 2410.874431][T10833] ? __fget_files+0x28/0x4b0 [ 2410.879096][T10833] ? __fget_files+0x28/0x4b0 [ 2410.883760][T10833] security_file_ioctl+0x6c/0xa0 [ 2410.888766][T10833] __se_sys_ioctl+0x48/0x170 [ 2410.893415][T10833] do_syscall_64+0x4c/0xa0 [ 2410.897999][T10833] ? clear_bhb_loop+0x60/0xb0 [ 2410.902813][T10833] ? clear_bhb_loop+0x60/0xb0 [ 2410.907542][T10833] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2410.913491][T10833] RIP: 0033:0x7fa8a719cdd9 [ 2410.917944][T10833] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2410.937595][T10833] RSP: 002b:00007fa8a7fc2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2410.946068][T10833] RAX: ffffffffffffffda RBX: 00007fa8a7415fa0 RCX: 00007fa8a719cdd9 [ 2410.954086][T10833] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 0000000000000023 [ 2410.962104][T10833] RBP: 00007fa8a7fc2090 R08: 0000000000000000 R09: 0000000000000000 [ 2410.970117][T10833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2410.978130][T10833] R13: 00007fa8a7416038 R14: 00007fa8a7415fa0 R15: 00007ffc3d07e298 [ 2410.986341][T10833] [ 2411.058517][T10839] netlink: 60 bytes leftover after parsing attributes in process `syz.7.11875'. [ 2411.067866][T10833] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2411.160952][T10839] netlink: 60 bytes leftover after parsing attributes in process `syz.7.11875'. [ 2411.422677][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 2411.429106][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 2411.932492][T10856] netlink: 14 bytes leftover after parsing attributes in process `syz.0.11883'. [ 2412.206221][T10869] FAULT_INJECTION: forcing a failure. [ 2412.206221][T10869] name failslab, interval 1, probability 0, space 0, times 0 [ 2412.230354][T10869] CPU: 0 PID: 10869 Comm: syz.0.11888 Not tainted syzkaller #0 [ 2412.237980][T10869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2412.248107][T10869] Call Trace: [ 2412.251477][T10869] [ 2412.254458][T10869] dump_stack_lvl+0x188/0x24e [ 2412.259214][T10869] ? show_regs_print_info+0x12/0x12 [ 2412.264581][T10869] ? load_image+0x400/0x400 [ 2412.269177][T10869] ? __might_sleep+0xd0/0xd0 [ 2412.273940][T10869] ? __lock_acquire+0x7d10/0x7d10 [ 2412.279061][T10869] should_fail_ex+0x399/0x4d0 [ 2412.283814][T10869] should_failslab+0x5/0x20 [ 2412.288375][T10869] slab_pre_alloc_hook+0x59/0x310 [ 2412.293474][T10869] ? tomoyo_encode+0x27e/0x540 [ 2412.298305][T10869] __kmem_cache_alloc_node+0x4f/0x260 [ 2412.303926][T10869] ? tomoyo_encode+0x27e/0x540 [ 2412.308751][T10869] __kmalloc+0xa0/0x240 [ 2412.312971][T10869] tomoyo_encode+0x27e/0x540 [ 2412.317627][T10869] tomoyo_realpath_from_path+0x58e/0x5d0 [ 2412.323337][T10869] ? tomoyo_path_number_perm+0x205/0x650 [ 2412.329027][T10869] tomoyo_path_number_perm+0x22f/0x650 [ 2412.334544][T10869] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 2412.340072][T10869] ? ksys_write+0x1c0/0x250 [ 2412.344642][T10869] ? common_file_perm+0x171/0x1c0 [ 2412.349766][T10869] ? __fget_files+0x28/0x4b0 [ 2412.354415][T10869] ? __fget_files+0x28/0x4b0 [ 2412.359079][T10869] security_file_ioctl+0x6c/0xa0 [ 2412.364089][T10869] __se_sys_ioctl+0x48/0x170 [ 2412.368746][T10869] do_syscall_64+0x4c/0xa0 [ 2412.373224][T10869] ? clear_bhb_loop+0x60/0xb0 [ 2412.377959][T10869] ? clear_bhb_loop+0x60/0xb0 [ 2412.382738][T10869] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2412.388691][T10869] RIP: 0033:0x7fd6ee99cdd9 [ 2412.393163][T10869] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2412.412820][T10869] RSP: 002b:00007fd6ef80a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2412.421306][T10869] RAX: ffffffffffffffda RBX: 00007fd6eec15fa0 RCX: 00007fd6ee99cdd9 [ 2412.429429][T10869] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 000000000000001f [ 2412.437457][T10869] RBP: 00007fd6ef80a090 R08: 0000000000000000 R09: 0000000000000000 [ 2412.445486][T10869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2412.453516][T10869] R13: 00007fd6eec16038 R14: 00007fd6eec15fa0 R15: 00007ffc457e7d38 [ 2412.461564][T10869] [ 2412.502730][T10869] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2414.954667][T10866] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 2414.985186][T10866] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 2415.010476][T10866] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 2415.275237][T10880] netlink: 'syz.6.11889': attribute type 13 has an invalid length. [ 2415.284915][T10880] netlink: 152 bytes leftover after parsing attributes in process `syz.6.11889'. [ 2415.312412][T10880] syz_tun: refused to change device tx_queue_len [ 2415.338636][T10880] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 2415.576033][T10888] FAULT_INJECTION: forcing a failure. [ 2415.576033][T10888] name failslab, interval 1, probability 0, space 0, times 0 [ 2415.591655][T10888] CPU: 1 PID: 10888 Comm: syz.0.11895 Not tainted syzkaller #0 [ 2415.599298][T10888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2415.609402][T10888] Call Trace: [ 2415.612727][T10888] [ 2415.615702][T10888] dump_stack_lvl+0x188/0x24e [ 2415.620465][T10888] ? show_regs_print_info+0x12/0x12 [ 2415.625722][T10888] ? load_image+0x400/0x400 [ 2415.630291][T10888] ? __might_sleep+0xd0/0xd0 [ 2415.634928][T10888] ? __lock_acquire+0x7d10/0x7d10 [ 2415.640013][T10888] should_fail_ex+0x399/0x4d0 [ 2415.644753][T10888] should_failslab+0x5/0x20 [ 2415.649402][T10888] slab_pre_alloc_hook+0x59/0x310 [ 2415.654489][T10888] ? tomoyo_encode+0x27e/0x540 [ 2415.659309][T10888] __kmem_cache_alloc_node+0x4f/0x260 [ 2415.664728][T10888] ? tomoyo_encode+0x27e/0x540 [ 2415.669545][T10888] __kmalloc+0xa0/0x240 [ 2415.673767][T10888] tomoyo_encode+0x27e/0x540 [ 2415.678420][T10888] tomoyo_realpath_from_path+0x58e/0x5d0 [ 2415.684201][T10888] ? tomoyo_path_number_perm+0x205/0x650 [ 2415.689877][T10888] tomoyo_path_number_perm+0x22f/0x650 [ 2415.695363][T10888] ? irqentry_enter+0x33/0x50 [ 2415.700063][T10888] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 2415.705560][T10888] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2415.711792][T10888] ? __fget_files+0x28/0x4b0 [ 2415.716414][T10888] ? __fget_files+0x28/0x4b0 [ 2415.721049][T10888] security_file_ioctl+0x6c/0xa0 [ 2415.726037][T10888] __se_sys_ioctl+0x48/0x170 [ 2415.730663][T10888] do_syscall_64+0x4c/0xa0 [ 2415.735112][T10888] ? clear_bhb_loop+0x60/0xb0 [ 2415.739817][T10888] ? clear_bhb_loop+0x60/0xb0 [ 2415.744550][T10888] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2415.750479][T10888] RIP: 0033:0x7fd6ee99cdd9 [ 2415.754922][T10888] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2415.774548][T10888] RSP: 002b:00007fd6ef80a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2415.782992][T10888] RAX: ffffffffffffffda RBX: 00007fd6eec15fa0 RCX: 00007fd6ee99cdd9 [ 2415.790990][T10888] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 0000000000000046 [ 2415.798983][T10888] RBP: 00007fd6ef80a090 R08: 0000000000000000 R09: 0000000000000000 [ 2415.806974][T10888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2415.815059][T10888] R13: 00007fd6eec16038 R14: 00007fd6eec15fa0 R15: 00007ffc457e7d38 [ 2415.823154][T10888] [ 2415.854362][T10888] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2415.866629][T10892] netlink: 128 bytes leftover after parsing attributes in process `syz.6.11896'. [ 2415.883847][T10892] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 2416.210579][T10897] netlink: 14 bytes leftover after parsing attributes in process `syz.0.11898'. [ 2416.904392][T10914] FAULT_INJECTION: forcing a failure. [ 2416.904392][T10914] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2416.923619][T10914] CPU: 0 PID: 10914 Comm: syz.1.11904 Not tainted syzkaller #0 [ 2416.931334][T10914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2416.941562][T10914] Call Trace: [ 2416.944883][T10914] [ 2416.947854][T10914] dump_stack_lvl+0x188/0x24e [ 2416.952603][T10914] ? show_regs_print_info+0x12/0x12 [ 2416.957862][T10914] ? load_image+0x400/0x400 [ 2416.962434][T10914] ? __lock_acquire+0x7d10/0x7d10 [ 2416.967570][T10914] should_fail_ex+0x399/0x4d0 [ 2416.972314][T10914] _copy_from_user+0x2c/0x170 [ 2416.977048][T10914] iovec_from_user+0x143/0x360 [ 2416.981859][T10914] __import_iovec+0x6d/0x500 [ 2416.986502][T10914] import_iovec+0x6f/0xa0 [ 2416.990874][T10914] ___sys_sendmsg+0x252/0x360 [ 2416.995610][T10914] ? __sys_sendmsg+0x290/0x290 [ 2417.000456][T10914] ? ktime_get_real_ts64+0x440/0x440 [ 2417.005815][T10914] __se_sys_sendmsg+0x1bb/0x2a0 [ 2417.010733][T10914] ? __x64_sys_sendmsg+0x80/0x80 [ 2417.015738][T10914] ? lockdep_hardirqs_on+0x94/0x140 [ 2417.021064][T10914] do_syscall_64+0x4c/0xa0 [ 2417.025549][T10914] ? clear_bhb_loop+0x60/0xb0 [ 2417.030293][T10914] ? clear_bhb_loop+0x60/0xb0 [ 2417.035011][T10914] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2417.040942][T10914] RIP: 0033:0x7fa8a719cdd9 [ 2417.045394][T10914] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2417.065394][T10914] RSP: 002b:00007fa8a7fc2028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2417.073938][T10914] RAX: ffffffffffffffda RBX: 00007fa8a7415fa0 RCX: 00007fa8a719cdd9 [ 2417.081949][T10914] RDX: 0000000000000000 RSI: 0000200000000940 RDI: 0000000000000003 [ 2417.089966][T10914] RBP: 00007fa8a7fc2090 R08: 0000000000000000 R09: 0000000000000000 [ 2417.097976][T10914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2417.105988][T10914] R13: 00007fa8a7416038 R14: 00007fa8a7415fa0 R15: 00007ffc3d07e298 [ 2417.114016][T10914] [ 2417.340177][T10923] FAULT_INJECTION: forcing a failure. [ 2417.340177][T10923] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2417.354906][T10923] CPU: 0 PID: 10923 Comm: syz.6.11907 Not tainted syzkaller #0 [ 2417.362561][T10923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2417.372663][T10923] Call Trace: [ 2417.375986][T10923] [ 2417.378957][T10923] dump_stack_lvl+0x188/0x24e [ 2417.383711][T10923] ? show_regs_print_info+0x12/0x12 [ 2417.388979][T10923] ? load_image+0x400/0x400 [ 2417.393543][T10923] ? __lock_acquire+0x7d10/0x7d10 [ 2417.398632][T10923] should_fail_ex+0x399/0x4d0 [ 2417.403455][T10923] _copy_from_user+0x2c/0x170 [ 2417.408183][T10923] __copy_msghdr+0x3b7/0x580 [ 2417.412835][T10923] ___sys_sendmsg+0x210/0x360 [ 2417.417572][T10923] ? __sys_sendmsg+0x290/0x290 [ 2417.422413][T10923] __se_sys_sendmsg+0x1bb/0x2a0 [ 2417.427329][T10923] ? ct_nmi_exit+0x145/0x1c0 [ 2417.431954][T10923] ? __x64_sys_sendmsg+0x80/0x80 [ 2417.436932][T10923] ? lockdep_hardirqs_on+0x94/0x140 [ 2417.442170][T10923] do_syscall_64+0x4c/0xa0 [ 2417.446636][T10923] ? clear_bhb_loop+0x60/0xb0 [ 2417.451358][T10923] ? clear_bhb_loop+0x60/0xb0 [ 2417.456074][T10923] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2417.462006][T10923] RIP: 0033:0x7f1b9ad9cdd9 [ 2417.466535][T10923] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2417.486883][T10923] RSP: 002b:00007f1b9bc12028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2417.495330][T10923] RAX: ffffffffffffffda RBX: 00007f1b9b015fa0 RCX: 00007f1b9ad9cdd9 [ 2417.503346][T10923] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000006 [ 2417.511460][T10923] RBP: 00007f1b9bc12090 R08: 0000000000000000 R09: 0000000000000000 [ 2417.519476][T10923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2417.527473][T10923] R13: 00007f1b9b016038 R14: 00007f1b9b015fa0 R15: 00007ffda8cbce08 [ 2417.535490][T10923] [ 2417.862701][T10927] netlink: 'syz.1.11908': attribute type 2 has an invalid length. [ 2417.874862][T10927] netlink: 'syz.1.11908': attribute type 1 has an invalid length. [ 2417.898366][T10927] netlink: 'syz.1.11908': attribute type 2 has an invalid length. [ 2417.912623][T10927] netlink: 198452 bytes leftover after parsing attributes in process `syz.1.11908'. [ 2417.936644][T10928] netlink: 65047 bytes leftover after parsing attributes in process `syz.1.11908'. [ 2420.489901][T10941] netlink: 14 bytes leftover after parsing attributes in process `syz.7.11913'. [ 2421.408580][T10960] netlink: 'syz.6.11918': attribute type 7 has an invalid length. [ 2421.437181][T10960] netlink: 'syz.6.11918': attribute type 7 has an invalid length. [ 2421.480195][T10960] netlink: 198580 bytes leftover after parsing attributes in process `syz.6.11918'. [ 2423.873653][T10971] FAULT_INJECTION: forcing a failure. [ 2423.873653][T10971] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2423.958764][T10971] CPU: 1 PID: 10971 Comm: syz.8.11920 Not tainted syzkaller #0 [ 2423.966399][T10971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2423.976540][T10971] Call Trace: [ 2423.979874][T10971] [ 2423.982848][T10971] dump_stack_lvl+0x188/0x24e [ 2423.987597][T10971] ? show_regs_print_info+0x12/0x12 [ 2423.992880][T10971] ? load_image+0x400/0x400 [ 2423.997446][T10971] ? __lock_acquire+0x7d10/0x7d10 [ 2424.002532][T10971] ? snprintf+0xe5/0x140 [ 2424.006827][T10971] should_fail_ex+0x399/0x4d0 [ 2424.011568][T10971] _copy_to_user+0x2c/0x130 [ 2424.016133][T10971] simple_read_from_buffer+0xe3/0x150 [ 2424.021569][T10971] proc_fail_nth_read+0x1a6/0x220 [ 2424.026648][T10971] ? proc_fault_inject_write+0x310/0x310 [ 2424.032443][T10971] ? fsnotify_perm+0x248/0x550 [ 2424.037269][T10971] ? proc_fault_inject_write+0x310/0x310 [ 2424.042963][T10971] vfs_read+0x2de/0xa00 [ 2424.047185][T10971] ? kernel_read+0x1e0/0x1e0 [ 2424.051831][T10971] ? __fget_files+0x28/0x4b0 [ 2424.056471][T10971] ? __fget_files+0x28/0x4b0 [ 2424.061132][T10971] ? __fget_files+0x43d/0x4b0 [ 2424.065896][T10971] ? __fdget_pos+0x2ae/0x360 [ 2424.070535][T10971] ? ksys_read+0x71/0x250 [ 2424.074935][T10971] ksys_read+0x14c/0x250 [ 2424.079226][T10971] ? vfs_write+0xa30/0xa30 [ 2424.083679][T10971] ? lockdep_hardirqs_on+0x94/0x140 [ 2424.088909][T10971] do_syscall_64+0x4c/0xa0 [ 2424.093389][T10971] ? clear_bhb_loop+0x60/0xb0 [ 2424.098120][T10971] ? clear_bhb_loop+0x60/0xb0 [ 2424.102832][T10971] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2424.108761][T10971] RIP: 0033:0x7f6be735d60e [ 2424.113205][T10971] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2424.132934][T10971] RSP: 002b:00007f6be8243fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2424.141388][T10971] RAX: ffffffffffffffda RBX: 00007f6be82446c0 RCX: 00007f6be735d60e [ 2424.149394][T10971] RDX: 000000000000000f RSI: 00007f6be82440a0 RDI: 0000000000000005 [ 2424.157390][T10971] RBP: 00007f6be8244090 R08: 0000000000000000 R09: 0000000000000000 [ 2424.165384][T10971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2424.173380][T10971] R13: 00007f6be7616128 R14: 00007f6be7616090 R15: 00007ffe0de2d5c8 [ 2424.181393][T10971] [ 2425.244363][T10994] netlink: 128 bytes leftover after parsing attributes in process `syz.8.11930'. [ 2425.315005][T10994] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 2427.276528][T11011] FAULT_INJECTION: forcing a failure. [ 2427.276528][T11011] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2427.316713][T11011] CPU: 1 PID: 11011 Comm: syz.6.11936 Not tainted syzkaller #0 [ 2427.324350][T11011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2427.334451][T11011] Call Trace: [ 2427.337765][T11011] [ 2427.340732][T11011] dump_stack_lvl+0x188/0x24e [ 2427.345570][T11011] ? show_regs_print_info+0x12/0x12 [ 2427.350827][T11011] ? load_image+0x400/0x400 [ 2427.355387][T11011] ? __lock_acquire+0x7d10/0x7d10 [ 2427.360492][T11011] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 2427.366532][T11011] should_fail_ex+0x399/0x4d0 [ 2427.371256][T11011] _copy_from_user+0x2c/0x170 [ 2427.375988][T11011] iovec_from_user+0x143/0x360 [ 2427.380816][T11011] __import_iovec+0x6d/0x500 [ 2427.385488][T11011] import_iovec+0x6f/0xa0 [ 2427.389871][T11011] ___sys_sendmsg+0x252/0x360 [ 2427.394602][T11011] ? __sys_sendmsg+0x290/0x290 [ 2427.399438][T11011] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 2427.405236][T11011] __se_sys_sendmsg+0x1bb/0x2a0 [ 2427.410138][T11011] ? __x64_sys_sendmsg+0x80/0x80 [ 2427.415151][T11011] ? syscall_enter_from_user_mode+0x2a/0x80 [ 2427.421115][T11011] do_syscall_64+0x4c/0xa0 [ 2427.425599][T11011] ? clear_bhb_loop+0x60/0xb0 [ 2427.430328][T11011] ? clear_bhb_loop+0x60/0xb0 [ 2427.435062][T11011] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2427.441012][T11011] RIP: 0033:0x7f1b9ad9cdd9 [ 2427.445514][T11011] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2427.465166][T11011] RSP: 002b:00007f1b9bc12028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2427.473653][T11011] RAX: ffffffffffffffda RBX: 00007f1b9b015fa0 RCX: 00007f1b9ad9cdd9 [ 2427.481759][T11011] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000006 [ 2427.489775][T11011] RBP: 00007f1b9bc12090 R08: 0000000000000000 R09: 0000000000000000 [ 2427.497792][T11011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2427.505809][T11011] R13: 00007f1b9b016038 R14: 00007f1b9b015fa0 R15: 00007ffda8cbce08 [ 2427.513855][T11011] [ 2431.114380][T11051] FAULT_INJECTION: forcing a failure. [ 2431.114380][T11051] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2431.239804][T11051] CPU: 1 PID: 11051 Comm: syz.7.11948 Not tainted syzkaller #0 [ 2431.247628][T11051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2431.257747][T11051] Call Trace: [ 2431.261086][T11051] [ 2431.264089][T11051] dump_stack_lvl+0x188/0x24e [ 2431.268852][T11051] ? show_regs_print_info+0x12/0x12 [ 2431.274138][T11051] ? load_image+0x400/0x400 [ 2431.278707][T11051] ? __lock_acquire+0x7d10/0x7d10 [ 2431.284059][T11051] ? snprintf+0xe5/0x140 [ 2431.288380][T11051] should_fail_ex+0x399/0x4d0 [ 2431.293127][T11051] _copy_to_user+0x2c/0x130 [ 2431.297712][T11051] simple_read_from_buffer+0xe3/0x150 [ 2431.303231][T11051] proc_fail_nth_read+0x1a6/0x220 [ 2431.308326][T11051] ? proc_fault_inject_write+0x310/0x310 [ 2431.314025][T11051] ? fsnotify_perm+0x248/0x550 [ 2431.318859][T11051] ? proc_fault_inject_write+0x310/0x310 [ 2431.324726][T11051] vfs_read+0x2de/0xa00 [ 2431.328988][T11051] ? kernel_read+0x1e0/0x1e0 [ 2431.333654][T11051] ? __fget_files+0x28/0x4b0 [ 2431.338314][T11051] ? __fget_files+0x28/0x4b0 [ 2431.342969][T11051] ? __fget_files+0x43d/0x4b0 [ 2431.347722][T11051] ? __fdget_pos+0x2ae/0x360 [ 2431.352371][T11051] ? ksys_read+0x71/0x250 [ 2431.356762][T11051] ksys_read+0x14c/0x250 [ 2431.361066][T11051] ? vfs_write+0xa30/0xa30 [ 2431.365533][T11051] ? lockdep_hardirqs_on+0x94/0x140 [ 2431.370776][T11051] do_syscall_64+0x4c/0xa0 [ 2431.375231][T11051] ? clear_bhb_loop+0x60/0xb0 [ 2431.379945][T11051] ? clear_bhb_loop+0x60/0xb0 [ 2431.384661][T11051] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2431.390583][T11051] RIP: 0033:0x7ff20495d60e [ 2431.395019][T11051] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2431.414671][T11051] RSP: 002b:00007ff205854fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2431.423118][T11051] RAX: ffffffffffffffda RBX: 00007ff2058556c0 RCX: 00007ff20495d60e [ 2431.431127][T11051] RDX: 000000000000000f RSI: 00007ff2058550a0 RDI: 0000000000000005 [ 2431.439126][T11051] RBP: 00007ff205855090 R08: 0000000000000000 R09: 0000000000000000 [ 2431.447125][T11051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2431.455126][T11051] R13: 00007ff204c16038 R14: 00007ff204c15fa0 R15: 00007ffd27ec64b8 [ 2431.463142][T11051] [ 2434.776765][T11087] FAULT_INJECTION: forcing a failure. [ 2434.776765][T11087] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2434.800871][T11087] CPU: 0 PID: 11087 Comm: syz.0.11960 Not tainted syzkaller #0 [ 2434.808535][T11087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2434.818650][T11087] Call Trace: [ 2434.821960][T11087] [ 2434.824916][T11087] dump_stack_lvl+0x188/0x24e [ 2434.829637][T11087] ? show_regs_print_info+0x12/0x12 [ 2434.835238][T11087] ? load_image+0x400/0x400 [ 2434.839823][T11087] ? __lock_acquire+0x7d10/0x7d10 [ 2434.844890][T11087] ? snprintf+0xe5/0x140 [ 2434.849165][T11087] should_fail_ex+0x399/0x4d0 [ 2434.853887][T11087] _copy_to_user+0x2c/0x130 [ 2434.858485][T11087] simple_read_from_buffer+0xe3/0x150 [ 2434.863938][T11087] proc_fail_nth_read+0x1a6/0x220 [ 2434.869013][T11087] ? proc_fault_inject_write+0x310/0x310 [ 2434.874717][T11087] ? fsnotify_perm+0x248/0x550 [ 2434.879537][T11087] ? proc_fault_inject_write+0x310/0x310 [ 2434.885220][T11087] vfs_read+0x2de/0xa00 [ 2434.889426][T11087] ? kernel_read+0x1e0/0x1e0 [ 2434.894056][T11087] ? __fget_files+0x28/0x4b0 [ 2434.898687][T11087] ? __fget_files+0x28/0x4b0 [ 2434.903317][T11087] ? __fget_files+0x43d/0x4b0 [ 2434.908065][T11087] ? __fdget_pos+0x2ae/0x360 [ 2434.912691][T11087] ? ksys_read+0x71/0x250 [ 2434.917059][T11087] ksys_read+0x14c/0x250 [ 2434.921347][T11087] ? vfs_write+0xa30/0xa30 [ 2434.925824][T11087] ? lockdep_hardirqs_on+0x94/0x140 [ 2434.931068][T11087] do_syscall_64+0x4c/0xa0 [ 2434.935518][T11087] ? clear_bhb_loop+0x60/0xb0 [ 2434.940225][T11087] ? clear_bhb_loop+0x60/0xb0 [ 2434.944948][T11087] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2434.950922][T11087] RIP: 0033:0x7fd6ee95d60e [ 2434.955363][T11087] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2434.975001][T11087] RSP: 002b:00007fd6ef809fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2434.983533][T11087] RAX: ffffffffffffffda RBX: 00007fd6ef80a6c0 RCX: 00007fd6ee95d60e [ 2434.991529][T11087] RDX: 000000000000000f RSI: 00007fd6ef80a0a0 RDI: 0000000000000004 [ 2434.999611][T11087] RBP: 00007fd6ef80a090 R08: 0000000000000000 R09: 0000000000000000 [ 2435.007615][T11087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2435.015609][T11087] R13: 00007fd6eec16038 R14: 00007fd6eec15fa0 R15: 00007ffc457e7d38 [ 2435.023631][T11087] [ 2439.958388][T11117] netlink: 176 bytes leftover after parsing attributes in process `syz.8.11971'. [ 2440.863714][T11138] netlink: 132 bytes leftover after parsing attributes in process `syz.1.11981'. [ 2440.875986][T11141] FAULT_INJECTION: forcing a failure. [ 2440.875986][T11141] name failslab, interval 1, probability 0, space 0, times 0 [ 2440.900404][T11140] netlink: 128 bytes leftover after parsing attributes in process `syz.1.11981'. [ 2440.926404][T11140] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 2440.942708][T11141] CPU: 0 PID: 11141 Comm: syz.8.11982 Not tainted syzkaller #0 [ 2440.950489][T11141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2440.960606][T11141] Call Trace: [ 2440.963942][T11141] [ 2440.966956][T11141] dump_stack_lvl+0x188/0x24e [ 2440.971750][T11141] ? show_regs_print_info+0x12/0x12 [ 2440.977018][T11141] ? load_image+0x400/0x400 [ 2440.981587][T11141] ? __might_sleep+0xd0/0xd0 [ 2440.986235][T11141] ? __lock_acquire+0x7d10/0x7d10 [ 2440.991319][T11141] ? 0xffffffffff600000 [ 2440.995621][T11141] should_fail_ex+0x399/0x4d0 [ 2441.000361][T11141] should_failslab+0x5/0x20 [ 2441.004951][T11141] slab_pre_alloc_hook+0x59/0x310 [ 2441.010034][T11141] ? prepend_path+0xa68/0xc20 [ 2441.014868][T11141] ? tomoyo_encode+0x27e/0x540 [ 2441.019703][T11141] __kmem_cache_alloc_node+0x4f/0x260 [ 2441.025146][T11141] ? tomoyo_encode+0x27e/0x540 [ 2441.029979][T11141] __kmalloc+0xa0/0x240 [ 2441.034244][T11141] tomoyo_encode+0x27e/0x540 [ 2441.039036][T11141] tomoyo_realpath_from_path+0x58e/0x5d0 [ 2441.044776][T11141] ? tomoyo_path_number_perm+0x205/0x650 [ 2441.050475][T11141] tomoyo_path_number_perm+0x22f/0x650 [ 2441.056006][T11141] ? __bpf_trace_bpf_trace_printk+0x20/0x20 [ 2441.062039][T11141] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 2441.067629][T11141] ? __fget_files+0x28/0x4b0 [ 2441.072312][T11141] ? __fget_files+0x28/0x4b0 [ 2441.076990][T11141] security_file_ioctl+0x6c/0xa0 [ 2441.082013][T11141] __se_sys_ioctl+0x48/0x170 [ 2441.086676][T11141] do_syscall_64+0x4c/0xa0 [ 2441.091160][T11141] ? clear_bhb_loop+0x60/0xb0 [ 2441.095910][T11141] ? clear_bhb_loop+0x60/0xb0 [ 2441.100647][T11141] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2441.106776][T11141] RIP: 0033:0x7f6be739cdd9 [ 2441.111244][T11141] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2441.130905][T11141] RSP: 002b:00007f6be8265028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2441.139638][T11141] RAX: ffffffffffffffda RBX: 00007f6be7615fa0 RCX: 00007f6be739cdd9 [ 2441.147739][T11141] RDX: 0000200000000000 RSI: 00000000401c5820 RDI: 0000000000000006 [ 2441.155949][T11141] RBP: 00007f6be8265090 R08: 0000000000000000 R09: 0000000000000000 [ 2441.163977][T11141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2441.171991][T11141] R13: 00007f6be7616038 R14: 00007f6be7615fa0 R15: 00007ffe0de2d5c8 [ 2441.180115][T11141] [ 2441.228587][T11141] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2444.757545][T11169] IPv6: Can't replace route, no match found [ 2448.187472][T11199] netlink: 61211 bytes leftover after parsing attributes in process `syz.1.12002'. [ 2448.252041][T11199] IPv6: Can't replace route, no match found [ 2451.113353][ T3476] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 2451.136740][ T3476] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 2451.145090][ T3476] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 2451.155349][T11210] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 2451.164301][T11210] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 2451.172214][T11210] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 2451.580539][T11220] netlink: 132 bytes leftover after parsing attributes in process `syz.6.12007'. [ 2451.704050][T11224] netlink: 14 bytes leftover after parsing attributes in process `syz.1.12008'. [ 2451.849994][T11207] chnl_net:caif_netlink_parms(): no params data found [ 2451.998429][T11242] FAULT_INJECTION: forcing a failure. [ 2451.998429][T11242] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2452.019889][T11242] CPU: 0 PID: 11242 Comm: syz.6.12012 Not tainted syzkaller #0 [ 2452.027507][T11242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2452.037584][T11242] Call Trace: [ 2452.040881][T11242] [ 2452.043833][T11242] dump_stack_lvl+0x188/0x24e [ 2452.048561][T11242] ? show_regs_print_info+0x12/0x12 [ 2452.053818][T11242] ? load_image+0x400/0x400 [ 2452.058363][T11242] ? __lock_acquire+0x7d10/0x7d10 [ 2452.063451][T11242] should_fail_ex+0x399/0x4d0 [ 2452.068182][T11242] _copy_from_user+0x2c/0x170 [ 2452.072901][T11242] ___sys_sendmsg+0x1c3/0x360 [ 2452.077631][T11242] ? __sys_sendmsg+0x290/0x290 [ 2452.082557][T11242] ? __lock_acquire+0x7d10/0x7d10 [ 2452.087735][T11242] __se_sys_sendmsg+0x1bb/0x2a0 [ 2452.092725][T11242] ? ct_nmi_exit+0x145/0x1c0 [ 2452.097363][T11242] ? __x64_sys_sendmsg+0x80/0x80 [ 2452.102360][T11242] ? lockdep_hardirqs_on+0x94/0x140 [ 2452.107601][T11242] do_syscall_64+0x4c/0xa0 [ 2452.112057][T11242] ? clear_bhb_loop+0x60/0xb0 [ 2452.116771][T11242] ? clear_bhb_loop+0x60/0xb0 [ 2452.121494][T11242] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2452.127423][T11242] RIP: 0033:0x7f1b9ad9cdd9 [ 2452.131866][T11242] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2452.151499][T11242] RSP: 002b:00007f1b9bc12028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2452.160081][T11242] RAX: ffffffffffffffda RBX: 00007f1b9b015fa0 RCX: 00007f1b9ad9cdd9 [ 2452.168081][T11242] RDX: 0200000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 2452.176079][T11242] RBP: 00007f1b9bc12090 R08: 0000000000000000 R09: 0000000000000000 [ 2452.184103][T11242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2452.192198][T11242] R13: 00007f1b9b016038 R14: 00007f1b9b015fa0 R15: 00007ffda8cbce08 [ 2452.200218][T11242] [ 2452.264794][T11207] bridge0: port 1(bridge_slave_0) entered blocking state [ 2452.280487][T11207] bridge0: port 1(bridge_slave_0) entered disabled state [ 2452.296386][T11207] device bridge_slave_0 entered promiscuous mode [ 2452.308569][T11207] bridge0: port 2(bridge_slave_1) entered blocking state [ 2452.315832][T11207] bridge0: port 2(bridge_slave_1) entered disabled state [ 2452.325173][T11207] device bridge_slave_1 entered promiscuous mode [ 2452.377139][T11207] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2452.415950][T11207] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2452.461685][T11207] team0: Port device team_slave_0 added [ 2452.480399][T11207] team0: Port device team_slave_1 added [ 2452.533098][T11207] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2452.548199][T11207] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2452.579075][T11207] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2452.608720][T11207] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2452.626008][T11207] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2452.742477][T11207] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2452.754269][T11254] netlink: 48 bytes leftover after parsing attributes in process `syz.1.12016'. [ 2452.779964][T11254] bridge0: port 1(bridge_slave_0) entered disabled state [ 2453.258323][ T4286] Bluetooth: hci1: command 0x0409 tx timeout [ 2455.338355][T11210] Bluetooth: hci1: command 0x041b tx timeout [ 2456.103044][T11207] device hsr_slave_0 entered promiscuous mode [ 2456.117600][T11207] device hsr_slave_1 entered promiscuous mode [ 2456.132783][T11207] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2456.150977][T11207] Cannot create hsr debugfs directory [ 2456.165891][T11281] netlink: 14 bytes leftover after parsing attributes in process `syz.6.12021'. [ 2457.428768][T11210] Bluetooth: hci1: command 0x040f tx timeout [ 2459.498572][T11210] Bluetooth: hci1: command 0x0419 tx timeout [ 2460.677216][T11322] FAULT_INJECTION: forcing a failure. [ 2460.677216][T11322] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2460.698986][T11317] netlink: 'syz.6.12036': attribute type 10 has an invalid length. [ 2460.707568][T11322] CPU: 0 PID: 11322 Comm: syz.0.12037 Not tainted syzkaller #0 [ 2460.715182][T11322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2460.725287][T11322] Call Trace: [ 2460.728608][T11322] [ 2460.731582][T11322] dump_stack_lvl+0x188/0x24e [ 2460.736332][T11322] ? show_regs_print_info+0x12/0x12 [ 2460.741593][T11322] ? load_image+0x400/0x400 [ 2460.746239][T11322] ? __lock_acquire+0x7d10/0x7d10 [ 2460.751326][T11322] should_fail_ex+0x399/0x4d0 [ 2460.756144][T11322] _copy_from_user+0x2c/0x170 [ 2460.760884][T11322] ___sys_sendmsg+0x1c3/0x360 [ 2460.765635][T11322] ? __sys_sendmsg+0x290/0x290 [ 2460.770511][T11322] ? __lock_acquire+0x7d10/0x7d10 [ 2460.775624][T11322] __se_sys_sendmsg+0x1bb/0x2a0 [ 2460.780568][T11322] ? ct_nmi_exit+0x145/0x1c0 [ 2460.785217][T11322] ? __x64_sys_sendmsg+0x80/0x80 [ 2460.790235][T11322] ? lockdep_hardirqs_on+0x94/0x140 [ 2460.795494][T11322] do_syscall_64+0x4c/0xa0 [ 2460.799968][T11322] ? clear_bhb_loop+0x60/0xb0 [ 2460.804695][T11322] ? clear_bhb_loop+0x60/0xb0 [ 2460.809434][T11322] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2460.815391][T11322] RIP: 0033:0x7fd6ee99cdd9 [ 2460.820130][T11322] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2460.839882][T11322] RSP: 002b:00007fd6ef80a028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2460.848363][T11322] RAX: ffffffffffffffda RBX: 00007fd6eec15fa0 RCX: 00007fd6ee99cdd9 [ 2460.856388][T11322] RDX: 0000000000000050 RSI: 0000200000000240 RDI: 0000000000000003 [ 2460.864432][T11322] RBP: 00007fd6ef80a090 R08: 0000000000000000 R09: 0000000000000000 [ 2460.872461][T11322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2460.880529][T11322] R13: 00007fd6eec16038 R14: 00007fd6eec15fa0 R15: 00007ffc457e7d38 [ 2460.888574][T11322] [ 2460.910171][T11317] netlink: 40 bytes leftover after parsing attributes in process `syz.6.12036'. [ 2460.944535][T11317] device team0 entered promiscuous mode [ 2460.951932][T11317] device team_slave_0 entered promiscuous mode [ 2460.964896][T11317] device team_slave_1 entered promiscuous mode [ 2460.983167][T11317] device netdevsim0 entered promiscuous mode [ 2461.036552][T11317] bridge0: port 3(team0) entered blocking state [ 2461.048170][T11317] bridge0: port 3(team0) entered disabled state [ 2461.273380][T11321] netlink: 14 bytes leftover after parsing attributes in process `syz.8.12039'. [ 2461.492608][T11333] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 2461.520605][T11334] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 2461.526813][T11338] netlink: 'syz.1.12038': attribute type 10 has an invalid length. [ 2462.306599][T11356] netlink: 'syz.8.12043': attribute type 46 has an invalid length. [ 2462.315367][T11356] netlink: 2 bytes leftover after parsing attributes in process `syz.8.12043'. [ 2462.316514][T11358] FAULT_INJECTION: forcing a failure. [ 2462.316514][T11358] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2462.368375][T11358] CPU: 0 PID: 11358 Comm: syz.6.12044 Not tainted syzkaller #0 [ 2462.376015][T11358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2462.386117][T11358] Call Trace: [ 2462.389530][T11358] [ 2462.392506][T11358] dump_stack_lvl+0x188/0x24e [ 2462.397247][T11358] ? show_regs_print_info+0x12/0x12 [ 2462.402502][T11358] ? load_image+0x400/0x400 [ 2462.407062][T11358] ? __lock_acquire+0x7d10/0x7d10 [ 2462.412144][T11358] should_fail_ex+0x399/0x4d0 [ 2462.416874][T11358] _copy_from_user+0x2c/0x170 [ 2462.421612][T11358] ___sys_sendmsg+0x1c3/0x360 [ 2462.426359][T11358] ? __sys_sendmsg+0x290/0x290 [ 2462.431250][T11358] ? __lock_acquire+0x7d10/0x7d10 [ 2462.436403][T11358] __se_sys_sendmsg+0x1bb/0x2a0 [ 2462.441324][T11358] ? __x64_sys_sendmsg+0x80/0x80 [ 2462.446337][T11358] ? lockdep_hardirqs_on+0x94/0x140 [ 2462.451594][T11358] do_syscall_64+0x4c/0xa0 [ 2462.456063][T11358] ? clear_bhb_loop+0x60/0xb0 [ 2462.460789][T11358] ? clear_bhb_loop+0x60/0xb0 [ 2462.465523][T11358] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2462.471561][T11358] RIP: 0033:0x7f1b9ad9cdd9 [ 2462.476018][T11358] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2462.495765][T11358] RSP: 002b:00007f1b9bc12028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2462.504304][T11358] RAX: ffffffffffffffda RBX: 00007f1b9b015fa0 RCX: 00007f1b9ad9cdd9 [ 2462.512336][T11358] RDX: 0000000004000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 2462.520338][T11358] RBP: 00007f1b9bc12090 R08: 0000000000000000 R09: 0000000000000000 [ 2462.528343][T11358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2462.536350][T11358] R13: 00007f1b9b016038 R14: 00007f1b9b015fa0 R15: 00007ffda8cbce08 [ 2462.544470][T11358] [ 2463.455190][T11376] FAULT_INJECTION: forcing a failure. [ 2463.455190][T11376] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2463.482224][T11207] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 2463.520808][T11376] CPU: 0 PID: 11376 Comm: syz.8.12050 Not tainted syzkaller #0 [ 2463.528504][T11376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 2463.538627][T11376] Call Trace: [ 2463.541948][T11376] [ 2463.544914][T11376] dump_stack_lvl+0x188/0x24e [ 2463.549663][T11376] ? show_regs_print_info+0x12/0x12 [ 2463.554185][T11207] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 2463.554918][T11376] ? load_image+0x400/0x400 [ 2463.566186][T11376] ? __lock_acquire+0x7d10/0x7d10 [ 2463.571285][T11376] should_fail_ex+0x399/0x4d0 [ 2463.576024][T11376] _copy_from_user+0x2c/0x170 [ 2463.580764][T11376] ___sys_sendmsg+0x1c3/0x360 [ 2463.585523][T11376] ? __sys_sendmsg+0x290/0x290 [ 2463.590377][T11376] ? __lock_acquire+0x7d10/0x7d10 [ 2463.595495][T11376] __se_sys_sendmsg+0x1bb/0x2a0 [ 2463.600410][T11376] ? __x64_sys_sendmsg+0x80/0x80 [ 2463.605424][T11376] ? lockdep_hardirqs_on+0x94/0x140 [ 2463.610687][T11376] do_syscall_64+0x4c/0xa0 [ 2463.615208][T11376] ? clear_bhb_loop+0x60/0xb0 [ 2463.619950][T11376] ? clear_bhb_loop+0x60/0xb0 [ 2463.624699][T11376] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2463.630653][T11376] RIP: 0033:0x7f6be739cdd9 [ 2463.635125][T11376] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2463.654790][T11376] RSP: 002b:00007f6be8265028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2463.663270][T11376] RAX: ffffffffffffffda RBX: 00007f6be7615fa0 RCX: 00007f6be739cdd9 [ 2463.671292][T11376] RDX: 0000000000000050 RSI: 0000200000000240 RDI: 0000000000000003 [ 2463.679345][T11376] RBP: 00007f6be8265090 R08: 0000000000000000 R09: 0000000000000000 [ 2463.687464][T11376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2463.695492][T11376] R13: 00007f6be7616038 R14: 00007f6be7615fa0 R15: 00007ffe0de2d5c8 [ 2463.703537][T11376] [ 2463.726353][T11207] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 2463.767998][T11207] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 2464.047544][T11207] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2464.095470][T10753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2464.117413][T10753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2464.143842][T11207] 8021q: adding VLAN 0 to HW filter on device team0 [ 2464.177028][T10754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2464.186671][T10754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2464.204169][T10754] bridge0: port 1(bridge_slave_0) entered blocking state [ 2464.211380][T10754] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2464.248841][T10754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2464.259581][T10754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2464.294293][T10754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2464.303561][T10754] bridge0: port 2(bridge_slave_1) entered blocking state [ 2464.310734][T10754] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2464.328750][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2464.339328][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2464.359621][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2464.371026][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2464.384173][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2464.396735][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2464.413056][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2464.425056][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2464.447443][T11207] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2464.479710][T11207] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2464.500235][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2464.519142][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2464.538840][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2464.890573][T10754] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2464.899071][T10754] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2464.908874][T11207] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2464.937500][T10754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2464.955097][T10754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2464.987369][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2464.996645][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2465.008499][T11207] device veth0_vlan entered promiscuous mode [ 2465.019345][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2465.029622][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2465.040254][T11207] device veth1_vlan entered promiscuous mode [ 2465.075495][T10590] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 2465.085450][T10590] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 2465.095014][T10590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2465.104744][T10590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2465.117103][T11207] device veth0_macvtap entered promiscuous mode [ 2465.127908][T10590] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 2465.141406][T11207] device veth1_macvtap entered promiscuous mode [ 2465.167547][T11207] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2465.183954][T11207] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2465.202923][T11207] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2465.217081][T11207] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2465.235147][T11207] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2465.247638][T11207] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2465.267438][T11207] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2465.279814][T11207] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2465.292420][T11207] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2465.304694][T11207] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2465.314724][T11207] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2465.325569][T11207] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2465.337337][T11207] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2465.350011][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2465.359952][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2465.371996][T11207] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2465.383357][T11207] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2465.395996][T11207] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2465.421994][T11207] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2465.437579][T11207] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2465.456260][T11207] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2465.466385][T11207] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2465.485564][T11207] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2465.495541][T11207] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2465.518344][T11207] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2465.538193][T11207] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2465.552526][T11207] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2465.566307][T11207] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2465.580948][T11207] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2465.591996][T11207] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2465.608522][T11207] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2465.617349][T11207] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2465.643205][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2465.659128][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2465.800828][T10590] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2465.834768][T10590] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2465.874430][T10590] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 2465.913068][T10590] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2465.929024][T10590] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2465.936672][T10750] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 2472.866219][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 2472.872675][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 2534.302240][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 2534.308639][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 2577.338221][T11210] Bluetooth: hci1: command 0x0406 tx timeout [ 2595.743124][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 2595.749509][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 2657.181365][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 2657.187716][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 2718.622145][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 2718.628575][ T1277] ieee802154 phy1 wpan1: encryption failed: -22